咨询与建议

限定检索结果

文献类型

  • 18,343 篇 会议
  • 15,006 篇 期刊文献
  • 263 册 图书

馆藏范围

  • 33,612 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20,301 篇 工学
    • 13,293 篇 计算机科学与技术...
    • 10,662 篇 软件工程
    • 4,987 篇 信息与通信工程
    • 3,467 篇 控制科学与工程
    • 2,500 篇 电气工程
    • 2,409 篇 生物工程
    • 2,314 篇 电子科学与技术(可...
    • 2,125 篇 生物医学工程(可授...
    • 1,698 篇 光学工程
    • 1,407 篇 机械工程
    • 1,307 篇 网络空间安全
    • 1,283 篇 仪器科学与技术
    • 1,265 篇 化学工程与技术
    • 1,129 篇 动力工程及工程热...
    • 1,015 篇 安全科学与工程
    • 956 篇 材料科学与工程(可...
  • 12,925 篇 理学
    • 5,259 篇 物理学
    • 5,230 篇 数学
    • 2,933 篇 生物学
    • 1,762 篇 统计学(可授理学、...
    • 1,513 篇 化学
    • 1,091 篇 系统科学
  • 5,714 篇 管理学
    • 3,716 篇 管理科学与工程(可...
    • 2,182 篇 图书情报与档案管...
    • 1,566 篇 工商管理
  • 2,724 篇 医学
    • 2,191 篇 临床医学
    • 1,830 篇 基础医学(可授医学...
    • 1,241 篇 公共卫生与预防医...
    • 1,068 篇 药学(可授医学、理...
  • 1,036 篇 法学
    • 851 篇 社会学
  • 673 篇 农学
  • 636 篇 经济学
  • 312 篇 教育学
  • 156 篇 文学
  • 97 篇 军事学
  • 64 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 1,277 篇 deep learning
  • 1,239 篇 accuracy
  • 887 篇 machine learning
  • 795 篇 internet of thin...
  • 764 篇 feature extracti...
  • 633 篇 real-time system...
  • 562 篇 training
  • 552 篇 computational mo...
  • 544 篇 support vector m...
  • 519 篇 convolutional ne...
  • 486 篇 predictive model...
  • 457 篇 artificial intel...
  • 386 篇 computer science
  • 348 篇 optimization
  • 314 篇 cloud computing
  • 303 篇 security
  • 292 篇 educational inst...
  • 281 篇 reliability
  • 275 篇 data models
  • 274 篇 scalability

机构

  • 1,053 篇 physikalisches i...
  • 1,029 篇 department of ph...
  • 1,018 篇 cavendish labora...
  • 966 篇 oliver lodge lab...
  • 879 篇 university of ch...
  • 639 篇 infn laboratori ...
  • 603 篇 infn sezione di ...
  • 594 篇 infn sezione di ...
  • 589 篇 fakultät physik ...
  • 578 篇 infn sezione di ...
  • 561 篇 nikhef national ...
  • 558 篇 school of physic...
  • 541 篇 horia hulubei na...
  • 531 篇 school of physic...
  • 529 篇 department of ph...
  • 518 篇 imperial college...
  • 516 篇 h.h. wills physi...
  • 513 篇 iccub universita...
  • 505 篇 stfc rutherford ...
  • 498 篇 school of physic...

作者

  • 266 篇 barter w.
  • 252 篇 a. gomes
  • 237 篇 beiter a.
  • 233 篇 bellee v.
  • 229 篇 blake t.
  • 226 篇 c. alexa
  • 226 篇 j. m. izen
  • 223 篇 bowcock t.j.v.
  • 221 篇 brundu d.
  • 218 篇 g. bella
  • 218 篇 j. strandberg
  • 218 篇 s. chen
  • 216 篇 d. calvet
  • 216 篇 c. amelung
  • 215 篇 j. wang
  • 213 篇 borsato m.
  • 212 篇 amato s.
  • 211 篇 betancourt c.
  • 208 篇 boettcher t.
  • 208 篇 bencivenni g.

语言

  • 28,255 篇 英文
  • 5,027 篇 其他
  • 354 篇 中文
  • 18 篇 德文
  • 14 篇 法文
  • 13 篇 日文
  • 10 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science and Engineering and College of Information Sciences and Technology"
33612 条 记 录,以下是1-10 订阅
排序:
Enhancing User Experience in AI-Powered Human-computer Communication with Vocal Emotions Identification Using a Novel Deep Learning Method
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2909-2929页
作者: Ahmed Alhussen Arshiya Sajid Ansari Mohammad Sajid Mohammadi Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim51911Saudi Arabia
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de... 详细信息
来源: 评论
A Review of Image Steganography Based on Multiple Hashing Algorithm
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2463-2494页
作者: Abdullah Alenizi Mohammad Sajid Mohammadi Ahmad A.Al-Hajji Arshiya Sajid Ansari Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim56312Saudi Arabia
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover *** ancient times to the present,the security of secret or vital information has always been a signifi... 详细信息
来源: 评论
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG College of Information Science and Engineering Hunan Normal University School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Computer Science Department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 评论
WebFLex:A Framework for Web Browsers-Based Peer-to-Peer Federated Learning Systems Using WebRTC
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4177-4204页
作者: Mai Alzamel Hamza Ali Rizvi Najwa Altwaijry Isra Al-Turaiki Department of Computer Science College of Computer and Information SciencesKing Saud UniversityRiyadhKingdom of Saudi Arabia Department of Computer Science and Engineering Punjab Engineering CollegeChandigarhIndia
Scalability and information personal privacy are vital for training and deploying large-scale deep learning *** learning trains models on exclusive information by aggregating weights from various devices and taking ad... 详细信息
来源: 评论
Feature engineering Methods for Analyzing Blood Samples for Early Diagnosis of Hepatitis Using Machine Learning Approaches
收藏 引用
computer Modeling in engineering & sciences 2025年 第3期142卷 3229-3254页
作者: Mohamed A.G.Hazber Ebrahim Mohammed Senan Hezam Saud Alrashidi Department of Information and Computer Science College of Computer Science and EngineeringUniversity of Ha’ilHail81481Saudi Arabia Department of Computer Science College of Applied SciencesHajjah UniversityHajjah9677Yemen Department of Artificial Intelligence Faculty of Computer Science and Information TechnologyAl-Razi UniversitySana’a9671Yemen
Hepatitis is an infection that affects the liver through contaminated foods or blood transfusions,and it has many types,from normal to *** is diagnosed through many blood tests and factors;Artificial Intelligence(AI)t... 详细信息
来源: 评论
Real-Time Prediction of Urban Traffic Problems Based on Artificial Intelligence-Enhanced Mobile Ad Hoc Networks(MANETS)
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 1903-1923页
作者: Ahmed Alhussen Arshiya S.Ansari Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia
Traffic in today’s cities is a serious problem that increases travel times,negatively affects the environment,and drains financial *** study presents an Artificial Intelligence(AI)augmentedMobile Ad Hoc Networks(MANE... 详细信息
来源: 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 评论
A Novel CAPTCHA Recognition System Based on Refined Visual Attention
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 115-136页
作者: Zaid Derea Beiji Zou Xiaoyan Kui Monir Abdullah Alaa Thobhani Amr Abdussalam School of Computer Science and Engineering Central South UniversityChangsha410083China College of Computer Science and Information Technology Wasit UniversityWasit52001Iraq Department of Computer Science and Artificial Intelligence College of Computing and Information TechnologyUniversity of BishaBisha67714Saudi Arabia Electronic Engineering and Information Science Department University of Science and Technology of ChinaHefei230026China
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing huma... 详细信息
来源: 评论
DeepGAN: Utilizing generative adversarial networks for improved deep learning
收藏 引用
International Journal of Knowledge-Based and Intelligent engineering Systems 2024年 第4期28卷 732-748页
作者: V, Edward Naveen A, Jenefa T.M, Thiyagu A, Lincy Taurshia, Antony Department of Computer Science and Engineering Sri Shakthi Institute of Engineering and Technology India Department of Computer Science and Engineering Karunya Institute of Technology and Sciences India Division of Computer Science and Engineering Karunya Institute of Technology and Sciences India Department of Computer Science and Engineering National Engineering College India
In the realm of deep learning, Generative Adversarial Networks (GANs) have emerged as a topic of significant interest for their potential to enhance model performance and enable effective data augmentation. This paper... 详细信息
来源: 评论
Memory-enhanced text style transfer with dynamic style learning and calibration
收藏 引用
science China(information sciences) 2024年 第4期67卷 181-196页
作者: Fuqiang LIN Yiping SONG Zhiliang TIAN Wangqun CHEN Diwen DONG Bo LIU College of Computer Science and Technology National University of Defense Technology Department of Computer Science and Engineering The Hong Kong University of Science and Technology Strategic Assessments and Consultation Institute Academy of Military Sciences
Text style transfer aims to rephrase a sentence to match the desired style while retaining the original content. As a controllable text generation task, mainstream approaches use content-independent style embedding as... 详细信息
来源: 评论