咨询与建议

限定检索结果

文献类型

  • 91,625 篇 会议
  • 55,337 篇 期刊文献
  • 1,450 册 图书

馆藏范围

  • 148,412 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 89,352 篇 工学
    • 54,418 篇 计算机科学与技术...
    • 43,676 篇 软件工程
    • 21,525 篇 信息与通信工程
    • 14,338 篇 控制科学与工程
    • 13,507 篇 电子科学与技术(可...
    • 13,458 篇 电气工程
    • 9,658 篇 生物工程
    • 7,489 篇 生物医学工程(可授...
    • 7,434 篇 光学工程
    • 6,677 篇 化学工程与技术
    • 6,614 篇 机械工程
    • 5,778 篇 材料科学与工程(可...
    • 5,478 篇 动力工程及工程热...
    • 5,145 篇 仪器科学与技术
    • 3,547 篇 网络空间安全
    • 3,270 篇 安全科学与工程
    • 3,246 篇 交通运输工程
  • 52,579 篇 理学
    • 24,374 篇 数学
    • 19,125 篇 物理学
    • 11,084 篇 生物学
    • 7,926 篇 统计学(可授理学、...
    • 6,939 篇 化学
    • 5,383 篇 系统科学
  • 21,882 篇 管理学
    • 14,045 篇 管理科学与工程(可...
    • 8,546 篇 图书情报与档案管...
    • 6,211 篇 工商管理
  • 7,706 篇 医学
    • 6,261 篇 临床医学
    • 5,473 篇 基础医学(可授医学...
    • 3,341 篇 药学(可授医学、理...
  • 3,877 篇 法学
    • 3,191 篇 社会学
  • 2,499 篇 经济学
  • 1,911 篇 农学
  • 1,339 篇 教育学
  • 788 篇 文学
  • 332 篇 军事学
  • 233 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 4,154 篇 computer science
  • 3,789 篇 accuracy
  • 3,219 篇 deep learning
  • 3,123 篇 feature extracti...
  • 2,853 篇 machine learning
  • 2,817 篇 computational mo...
  • 2,572 篇 training
  • 1,880 篇 optimization
  • 1,766 篇 internet of thin...
  • 1,764 篇 support vector m...
  • 1,753 篇 artificial intel...
  • 1,745 篇 predictive model...
  • 1,600 篇 convolutional ne...
  • 1,535 篇 real-time system...
  • 1,512 篇 wireless sensor ...
  • 1,478 篇 data mining
  • 1,281 篇 neural networks
  • 1,263 篇 data models
  • 1,251 篇 security
  • 1,125 篇 computer archite...

机构

  • 1,640 篇 cavendish labora...
  • 1,338 篇 school of comput...
  • 1,006 篇 university of ch...
  • 945 篇 department of ph...
  • 898 篇 department for p...
  • 893 篇 department of co...
  • 885 篇 department of ph...
  • 883 篇 institute of phy...
  • 840 篇 oliver lodge lab...
  • 834 篇 physikalisches i...
  • 806 篇 institute of phy...
  • 789 篇 department of el...
  • 787 篇 fakultät physik ...
  • 783 篇 department of ph...
  • 783 篇 institute of hig...
  • 741 篇 school of physic...
  • 727 篇 physics departme...
  • 682 篇 cern geneva
  • 676 篇 dipartimento di ...
  • 664 篇 department of ph...

作者

  • 457 篇 bachacou h.
  • 450 篇 annovi a.
  • 417 篇 akimov a.v.
  • 411 篇 aad g.
  • 410 篇 alonso f.
  • 403 篇 alimonti g.
  • 403 篇 abulaiti y.
  • 402 篇 amidei d.
  • 402 篇 alexa c.
  • 401 篇 alexopoulos t.
  • 399 篇 arnaez o.
  • 398 篇 argyropoulos s.
  • 398 篇 adelman j.
  • 396 篇 anastopoulos c.
  • 394 篇 amelung c.
  • 393 篇 azuelos g.
  • 393 篇 aloisio a.
  • 388 篇 adye t.
  • 386 篇 arce a.t.h.
  • 385 篇 ahmadov f.

语言

  • 137,461 篇 英文
  • 8,775 篇 其他
  • 2,150 篇 中文
  • 68 篇 日文
  • 27 篇 德文
  • 26 篇 法文
  • 18 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 2 篇 荷兰文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 意大利文
检索条件"机构=Department of Computer Science and Engineering Nanjing University of Science and Technology"
148412 条 记 录,以下是481-490 订阅
排序:
Cloudformer: Contrastive Learning Based Cloud Workload Prediction
Cloudformer: Contrastive Learning Based Cloud Workload Predi...
收藏 引用
7th International Conference on Electronics technology, ICET 2024
作者: Lu, Hui Zhang, Yi Wu, Zebin Wei, Zhihui Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing China
During the last 3 years, researchers have endeavored to extend the efficacy of contrastive learning (CL) towards addressing the challenges inherent in cloud workload prediction, which has demonstrated considerable suc... 详细信息
来源: 评论
Focusing on your subject:Deep subject-aware image composition recommendation networks
收藏 引用
Computational Visual Media 2023年 第1期9卷 87-107页
作者: Guo-Ye Yang Wen-Yang Zhou Yun Cai Song-Hai Zhang Fang-Lue Zhang BNRist Department of Computer Science and TechnologyTsinghua UniversityBeiing 100084China School of Engineering and Computer Science Victoria University of WellingtonWellington 6012New Zealand
Photo composition is one of the most important factors in the aesthetics of *** a popular application,composition recommendation for a photo focusing on a specific subject has been ignored by recent deep-learning-base... 详细信息
来源: 评论
Reward Maximization for Disaster Zone Monitoring with Heterogeneous UAVs
收藏 引用
IEEE/ACM Transactions on Networking 2024年 第1期32卷 890-903页
作者: Xu, Wenzheng Wang, Chengxi Xie, Hongbin Liang, Weifa Dai, Haipeng Xu, Zichuan Wang, Ziming Guo, Bing Das, Sajal K. Sichuan University College of Computer Science Chengdu610065 China City University of Hong Kong Department of Computer Science Hong Kong Hong Kong Nanjing University Department of Computer Science and Technology Nanjing210023 China Dalian University of Technology School of Software Dalian116024 China Sichuan University Key Laboratory of Birth Defects and Related Maternal and Child Diseases West China Second Hospital College of Computer Science Chengdu610066 China Missouri University of Science and Technology Department of Computer Science RollaMO65409 United States
In this paper, we study the deployment of K heterogeneous UAVs to monitor Points of Interest (PoIs) in a disaster zone, where a PoI may represent a school building or an office building, in which people are trapped. A... 详细信息
来源: 评论
REGAC: Multi-Class Offensive Content Identification Using Graphical Approach
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第4期52卷 931-952页
作者: Chinivar, Sneha Roopa, M.S. Arunalatha, J.S. Venugopal, K.R. Department of Computer Science and Engineering Bangalore University K R Circle Karnataka Bengaluru India Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Karnataka Bengaluru India Department of Computer Science and Engineering Bangalore University K R Circle Karnataka Bengaluru India Karnataka Bengaluru India
Online offensive behaviour continues to rise with the increasing popularity and use of social media. Various techniques have been used to address this issue. However, most existing studies consider offensive content i... 详细信息
来源: 评论
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of Systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论
A location-based fog computing optimization of energy management in smart buildings:DEVS modeling and design of connected objects
收藏 引用
Frontiers of computer science 2023年 第2期17卷 179-195页
作者: Abdelfettah MAATOUG Ghalem BELALEM Saïd MAHMOUDI Computer Science Department Faculty of Exact and Applied SciencesUniversity of Oran 1 Ahmed Ben BellaOran 31000Algeria Science and Technology Department Faculty of Science and TechnologyUniversity of TIARETTiaret 14000Algeria Computer Science Department Faculty of EngineeringUniversity of MonsMons 7000Belgium
Nowadays,smart buildings rely on Internet of things(loT)technology derived from the cloud and fog computing paradigms to coordinate and collaborate between connected *** is characterized by low latency with a wider sp... 详细信息
来源: 评论
Energy Efficient Unequal Fault Tolerance Clustering Approach
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1971-1983页
作者: Sowjanya Ramisetty Divya Anand Kavita Sahil Verma NZ Jhanjhi Mehedi Masud Mohammed Baz Department of Computer Science and Engineering KG Reddy College of Engineering and TechnologyHyderabadIndia School of Computer Science and Engineering Lovely Professional UniversityPhagwaraIndia Department of Computer Science and Engineering Chandigarh UniversityMohaliIndia Department of Computer Science and Engineering Tailor’s UniversityMalaysia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Engineering College of Computer and Information TechnologyTaif UniversityTaif21994Saudi Arabia
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul... 详细信息
来源: 评论
Research on facial expression recognition based on multimodal data fusion and neural network
收藏 引用
International Journal of Wireless and Mobile Computing 2024年 第1期27卷 47-55页
作者: Han, Yi Wang, Xubin Lu, Zhengyu School of Mechanical Science and Engineering Huazhong University of Science and Technology Hubei Wuhan China Anyang Institute of Technology Department of Computer Science and Information Engineering Henan Province Anyang China School of Computer Science and Information Engineering Shanghai Institute of Technology FengXian District Shanghai China
Facial expression recognition is a challenging task when neural network is applied to pattern recognition. Most of the current recognition research is based on single source facial data, which generally has the disadv... 详细信息
来源: 评论
Jointly Estimation of Microstructure Maps Across Acquisition Protocols
Jointly Estimation of Microstructure Maps Across Acquisition...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Wang, Tenglong Yu, Jiahao Pan, Yiang He, Jianzhong He, Yifei Wu, Ye Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing China Zhejiang University of Technology College of Information Engineering Hangzhou China
Diffusion MRI (dMRI) allows for examining microarchitecture profiles and tissue changes using specific microstructure modeling but depends on advanced acquisition protocol and well-established biological model assumpt... 详细信息
来源: 评论
Cyber-attack detection based on a deep chaotic invasive weed kernel optimized machine learning classifier in cloud computing
收藏 引用
Soft Computing 2025年 第4期29卷 2015-2030页
作者: Indrasena Reddy, M. Siva Kumar, A.P. Subba Reddy, K. Department of Computer Science and Engineering BVRIT Hyderabad College of Engineering for Women Hyderabad500090 India Department of Computer Science and Engineering Jawaharlal Nehru Technological University Ananthapuramu Andhra Pradesh Ananthapuramu India Department of Computer Science and Engineering Rajeev Gandhi Memorial College of Engineering and Technology Andhra Pradesh Nandyala India
Nowadays, Cloud Computing has attracted a lot of interest from both individual users and organization. However, cloud computing applications face certain security issues, such as data integrity, user privacy, and serv... 详细信息
来源: 评论