咨询与建议

限定检索结果

文献类型

  • 288,196 篇 会议
  • 117,912 篇 期刊文献
  • 2,917 册 图书

馆藏范围

  • 409,024 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 237,128 篇 工学
    • 158,985 篇 计算机科学与技术...
    • 129,071 篇 软件工程
    • 56,921 篇 信息与通信工程
    • 37,130 篇 控制科学与工程
    • 32,601 篇 电气工程
    • 31,348 篇 电子科学与技术(可...
    • 27,357 篇 生物工程
    • 21,224 篇 生物医学工程(可授...
    • 18,468 篇 光学工程
    • 16,193 篇 机械工程
    • 13,531 篇 化学工程与技术
    • 12,666 篇 仪器科学与技术
    • 12,536 篇 动力工程及工程热...
    • 11,136 篇 材料科学与工程(可...
    • 8,708 篇 安全科学与工程
    • 8,019 篇 网络空间安全
  • 132,851 篇 理学
    • 66,522 篇 数学
    • 42,905 篇 物理学
    • 30,855 篇 生物学
    • 21,377 篇 统计学(可授理学、...
    • 15,539 篇 系统科学
    • 14,432 篇 化学
  • 59,563 篇 管理学
    • 35,885 篇 管理科学与工程(可...
    • 26,057 篇 图书情报与档案管...
    • 17,623 篇 工商管理
  • 19,898 篇 医学
    • 16,721 篇 临床医学
    • 15,040 篇 基础医学(可授医学...
    • 9,508 篇 药学(可授医学、理...
    • 7,936 篇 公共卫生与预防医...
  • 11,082 篇 法学
    • 9,061 篇 社会学
  • 6,796 篇 经济学
  • 5,249 篇 农学
  • 4,470 篇 教育学
  • 1,926 篇 文学
  • 924 篇 军事学
  • 552 篇 艺术学
  • 85 篇 哲学
  • 51 篇 历史学

主题

  • 20,562 篇 computer science
  • 9,162 篇 accuracy
  • 9,110 篇 computational mo...
  • 8,392 篇 feature extracti...
  • 7,722 篇 deep learning
  • 7,459 篇 machine learning
  • 6,904 篇 training
  • 5,571 篇 data mining
  • 5,372 篇 computer archite...
  • 5,177 篇 support vector m...
  • 5,102 篇 wireless sensor ...
  • 5,102 篇 predictive model...
  • 4,889 篇 costs
  • 4,746 篇 optimization
  • 4,733 篇 application soft...
  • 4,635 篇 bandwidth
  • 4,587 篇 testing
  • 4,566 篇 algorithm design...
  • 4,559 篇 protocols
  • 4,440 篇 neural networks

机构

  • 1,684 篇 department of co...
  • 1,348 篇 department of co...
  • 1,338 篇 department of el...
  • 1,152 篇 department of el...
  • 1,110 篇 college of compu...
  • 1,056 篇 cavendish labora...
  • 972 篇 department of ph...
  • 869 篇 department of co...
  • 839 篇 university of ch...
  • 839 篇 physikalisches i...
  • 829 篇 oliver lodge lab...
  • 816 篇 department of el...
  • 634 篇 department of co...
  • 535 篇 department of co...
  • 530 篇 infn sezione di ...
  • 513 篇 infn laboratori ...
  • 508 篇 chitkara univers...
  • 502 篇 infn sezione di ...
  • 499 篇 horia hulubei na...
  • 494 篇 infn sezione di ...

作者

  • 257 篇 s. chen
  • 256 篇 j. wang
  • 250 篇 barter w.
  • 237 篇 a. gomes
  • 225 篇 blake t.
  • 220 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 208 篇 j. m. izen
  • 207 篇 beiter a.
  • 204 篇 bencivenni g.
  • 193 篇 c. amelung
  • 193 篇 bay a.
  • 191 篇 g. bella
  • 191 篇 j. strandberg

语言

  • 392,005 篇 英文
  • 13,005 篇 其他
  • 4,019 篇 中文
  • 227 篇 日文
  • 50 篇 德文
  • 39 篇 朝鲜文
  • 32 篇 法文
  • 17 篇 斯洛文尼亚文
  • 10 篇 土耳其文
  • 8 篇 西班牙文
  • 8 篇 荷兰文
  • 6 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering and Software Engineering"
409025 条 记 录,以下是51-60 订阅
排序:
An end-to-end network for co-saliency detection in one single image
收藏 引用
science China(Information sciences) 2023年 第11期66卷 5-22页
作者: Yuanhao YUE Qin ZOU Hongkai YU Qian WANG Zhongyuan WANG Song WANG School of Cyber Science and Engineering Wuhan University School of Computer Science Wuhan University Department of Electrical Engineering and Computer Science Cleveland State University Department of Computer Science and Engineering University of South Carolina
Co-saliency detection within a single image is a common vision problem that has not yet been well addressed. Existing methods often used a bottom-up strategy to infer co-saliency in an image in which salient regions a... 详细信息
来源: 评论
Modified Bat Algorithm: a newly proposed approach for solving complex and real-world problems
收藏 引用
Soft Computing 2024年 第13-14期28卷 7983-7998页
作者: Umar, Shahla U. Rashid, Tarik A. Ahmed, Aram M. Hassan, Bryar A. Baker, Mohammed Rashad Department of Software College of Computer Science and Information Technology University of Kirkuk Kirkuk Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler KRI Erbil Iraq Department of Computer Science College of Science Charmo University Sulaimani Chamchamal46023 Iraq
Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of ... 详细信息
来源: 评论
Segmentation of Head and Neck Tumors Using Dual PET/CT Imaging:Comparative Analysis of 2D,2.5D,and 3D Approaches Using UNet Transformer
收藏 引用
computer Modeling in engineering & sciences 2024年 第12期141卷 2351-2373页
作者: Mohammed A.Mahdi Shahanawaj Ahamad Sawsan A.Saad Alaa Dafhalla Alawi Alqushaibi Rizwan Qureshi Information and Computer Science Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Software Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Computer Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Department of Computer and Information Sciences Universiti Teknologi PetronasSeri Iskandar32610Malaysia Center for Research in Computer Vision(CRCV) University of Central FloridaOrlandoFL 32816USA
The segmentation of head and neck(H&N)tumors in dual Positron Emission Tomography/Computed Tomogra-phy(PET/CT)imaging is a critical task in medical imaging,providing essential information for diagnosis,treatment p... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
Towards optimal path planning for sustainable data collection in real-time wireless sensor networks
收藏 引用
International Journal of computers and Applications 2024年 第5期46卷 301-309页
作者: Ranjan, Rajeev Kumar, Prabhat Department of Computer Science and Engineering National Institute of Technology Patna India Department of Computer Science and Engineering Bakhtiyarpur College of Engineering Bakhtiyarpur India
Data collection using mobile sink(s) has proven to reduce energy consumption and enhance the network lifetime of wireless sensor networks. Generally speaking, a mobile sink (MS) traverses the network region, sojournin... 详细信息
来源: 评论
Drug–target interactions prediction based on similarity graph features extraction and deep learning
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4303-4322页
作者: Torkey, Hanaa El-Behery, Heba Attia, Abdel-Fattah El-Fishawy, Nawal Computer Science and Engineering Department Faculty of Electronic Engineering Menoufia University Menouf Egypt Department of Computer Science and Engineering Faculty of Engineering Kafrelsheikh University Kafrelsheikh Egypt Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj Saudi Arabia
Identifying drug–target interactions (DTIs) is a critical step in both drug repositioning. The labor-intensive, time-consuming, and costly nature of classic DTI laboratory studies makes it imperative to create effici... 详细信息
来源: 评论
Word Sense Disambiguation for Indic Language using Bi-LSTM
收藏 引用
Multimedia Tools and Applications 2024年 1-26页
作者: Mishra, Binod Kumar Jain, Suresh Department of Computer Science and Engineering Chandigarh University Punjab Mohali India Department of Computer Science and Engineering IPS Academy Institute of Engineering and Science Indore India
In the enormous field of Natural Language Processing (NLP), deciphering the intended significance of a word among a multitude of possibilities is referred to as word sense disambiguation. This process is essential for... 详细信息
来源: 评论
A Generative Model-Based Network Framework for Ecological Data Reconstruction
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 929-948页
作者: Shuqiao Liu Zhao Zhang Hongyan Zhou Xuebo Chen School of Electronic and Information Engineering University of Science and Technology LiaoningAnshan114051China School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan114051China
This study examines the effectiveness of artificial intelligence techniques in generating high-quality environmental data for species introductory site selection *** Strengths,Weaknesses,Opportunities,Threats(SWOT)ana... 详细信息
来源: 评论
DocTTT: Test-Time Training for Handwritten Document Recognition Using Meta-Auxiliary Learning
DocTTT: Test-Time Training for Handwritten Document Recognit...
收藏 引用
2025 IEEE/CVF Winter Conference on Applications of computer Vision, WACV 2025
作者: Gu, Wenhao Gu, Li Wang, Ziqiang Suen, Ching Yee Wang, Yang Concordia University Department of Computer Science and Software Engineering Canada
Despite recent significant advancements in Handwritten Document Recognition (HDR), the efficient and accurate recognition of text against complex backgrounds, diverse handwriting styles, and varying document layouts r... 详细信息
来源: 评论
Redundant Transmission Control Algorithm for Information-Centric Vehicular IoT Networks
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 2217-2234页
作者: Abdur Rashid Sangi Satish Anamalamudi Mohammed SAlkatheiri Murali Krishna Enduri Anil Carie Mohammed AAlqarni Department of Computer Science College of Science and TechnologyWenzhou-Kean UniversityWenzhou325060China Department of Computer Science Engineering SRM University APAmaravati522502India Department of Cybersecurity College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science&EngineeringUniversity of JeddahJeddahSaudi Arabia
Vehicular Adhoc Networks(VANETs)enable vehicles to act as mobile nodes that can fetch,share,and disseminate information about vehicle safety,emergency events,warning messages,and passenger ***,the continuous dissemina... 详细信息
来源: 评论