咨询与建议

限定检索结果

文献类型

  • 6,787 篇 会议
  • 4,022 篇 期刊文献
  • 144 册 图书

馆藏范围

  • 10,953 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,011 篇 工学
    • 5,517 篇 计算机科学与技术...
    • 4,476 篇 软件工程
    • 1,397 篇 信息与通信工程
    • 963 篇 控制科学与工程
    • 677 篇 生物工程
    • 618 篇 电气工程
    • 478 篇 电子科学与技术(可...
    • 472 篇 机械工程
    • 419 篇 生物医学工程(可授...
    • 343 篇 光学工程
    • 268 篇 仪器科学与技术
    • 259 篇 安全科学与工程
    • 249 篇 动力工程及工程热...
    • 221 篇 化学工程与技术
    • 208 篇 交通运输工程
    • 207 篇 建筑学
  • 3,151 篇 理学
    • 1,873 篇 数学
    • 749 篇 生物学
    • 636 篇 物理学
    • 509 篇 统计学(可授理学、...
    • 453 篇 系统科学
    • 247 篇 化学
  • 2,144 篇 管理学
    • 1,383 篇 管理科学与工程(可...
    • 834 篇 图书情报与档案管...
    • 612 篇 工商管理
  • 496 篇 医学
    • 421 篇 临床医学
    • 367 篇 基础医学(可授医学...
    • 214 篇 公共卫生与预防医...
  • 331 篇 法学
    • 258 篇 社会学
  • 234 篇 经济学
    • 232 篇 应用经济学
  • 161 篇 教育学
  • 117 篇 农学
  • 42 篇 文学
  • 34 篇 军事学
  • 23 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 518 篇 computer science
  • 288 篇 software enginee...
  • 231 篇 deep learning
  • 210 篇 machine learning
  • 205 篇 computational mo...
  • 195 篇 data mining
  • 178 篇 feature extracti...
  • 152 篇 software
  • 151 篇 accuracy
  • 145 篇 laboratories
  • 141 篇 optimization
  • 141 篇 wireless sensor ...
  • 141 篇 semantics
  • 132 篇 predictive model...
  • 131 篇 application soft...
  • 130 篇 internet of thin...
  • 124 篇 educational inst...
  • 121 篇 software testing
  • 114 篇 computer archite...
  • 113 篇 costs

机构

  • 460 篇 state key labora...
  • 390 篇 department of co...
  • 246 篇 department of co...
  • 231 篇 school of softwa...
  • 175 篇 college of compu...
  • 154 篇 school of softwa...
  • 107 篇 state key labora...
  • 101 篇 school of comput...
  • 84 篇 school of inform...
  • 74 篇 department of co...
  • 67 篇 department of co...
  • 67 篇 department of co...
  • 51 篇 state key labora...
  • 50 篇 school of softwa...
  • 49 篇 school of softwa...
  • 48 篇 university of ch...
  • 47 篇 national key lab...
  • 47 篇 national key lab...
  • 44 篇 tsinghua nationa...
  • 39 篇 sri lanka instit...

作者

  • 45 篇 yunhao liu
  • 41 篇 xiang-yang li
  • 40 篇 baowen xu
  • 32 篇 shen furao
  • 30 篇 zhao jian
  • 28 篇 qi lianyong
  • 27 篇 aichholzer oswin
  • 27 篇 sun fuchun
  • 25 篇 zhou zhi-hua
  • 25 篇 yang tianbao
  • 25 篇 yu huiqun
  • 24 篇 vogtenhuber birg...
  • 24 篇 xu baowen
  • 23 篇 xuandong li
  • 23 篇 wang wei
  • 23 篇 zhang yan
  • 23 篇 guihai chen
  • 22 篇 wang jianmin
  • 22 篇 jiacun wang
  • 22 篇 xiao qin

语言

  • 9,462 篇 英文
  • 1,363 篇 其他
  • 149 篇 中文
  • 4 篇 德文
  • 2 篇 法文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Software Technology"
10953 条 记 录,以下是31-40 订阅
排序:
Generative adversarial networks based motion learning towards robotic calligraphy synthesis
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第2期9卷 452-466页
作者: Xiaoming Wang Yilong Yang Weiru Wang Yuanhua Zhou Yongfeng Yin Zhiguo Gong Department of Computer and Information Science University of MacaoMacaoChina School of Software Beihang UniversityBeijingChina Department of Computer Science and Technology Faculty of Information TechnologyBeijing University of TechnologyBeijingChina School of Foreign Languages Guangzhou Huashang CollegeGuangzhouChina
Robot calligraphy visually reflects the motion capability of robotic *** traditional researches mainly focus on image generation and the writing of simple calligraphic strokes or characters,this article presents a gen... 详细信息
来源: 评论
Tensor-Based Factorial Hidden Markov Model for Cyber-Physical-Social Services
收藏 引用
IEEE Transactions on Services Computing 2025年 第3期18卷 1825-1837页
作者: Lu, Zhixing Yang, Laurence T. Azman, Azreen Zhang, Shunli Zhou, Fang Hainan University School of Computer Science and Technology Hainan China Universiti Putra Malaysia Faculty of Computer Science and Information Technology Serdang Malaysia Zhengzhou University School of Computer and Artificial Intelligence School of Software Engineering Zhengzhou China Huazhong University of Science and Technology School of Computer Science and Technology Huazhong China St. Francis Xavier University Department of Computer Science Canada
With the rapid development and widespread application of information, computer, and communication technologies, Cyber-Physical-Social Systems (CPSS) have gained increasing importance and attention. To enable intellige... 详细信息
来源: 评论
A systematic mapping to investigate the application of machine learning techniques in requirement engineering activities
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第6期9卷 1412-1434页
作者: Shoaib Hassan Qianmu Li Khursheed Aurangzeb Affan Yasin Javed Ali Khan Muhammad Shahid Anwar School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjingJiangsuChina Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadhSaudi Arabia School of Software Northwestern Polytechnical UniversityXianShaanxiChina Department of Computer Science School of PhysicsEngineering&Computer ScienceUniversity of HertfordshireHatfieldUK Department of AI and Software Gachon University Seongnam-siSeongnamSouth Korea
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
Modified Bat Algorithm: a newly proposed approach for solving complex and real-world problems
收藏 引用
Soft Computing 2024年 第13-14期28卷 7983-7998页
作者: Umar, Shahla U. Rashid, Tarik A. Ahmed, Aram M. Hassan, Bryar A. Baker, Mohammed Rashad Department of Software College of Computer Science and Information Technology University of Kirkuk Kirkuk Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler KRI Erbil Iraq Department of Computer Science College of Science Charmo University Sulaimani Chamchamal46023 Iraq
Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of ... 详细信息
来源: 评论
Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
收藏 引用
High-Confidence Computing 2023年 第4期3卷 60-72页
作者: Vincent Omollo Nyangaresi Department of Computer Science&Software Engineering Jaramogi Oginga Odinga University of Science&TechnologyKenya
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and... 详细信息
来源: 评论
Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2609-2623页
作者: Muhammad Ahmad Nawaz Ul Ghani Kun She Muhammad Arslan Rauf Shumaila Khan Javed Ali Khan Eman Abdullah Aldakheel Doaa Sami Khafaga School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China Department of Computer Science University of Science&TechnologyBannu28100Pakistan Department of Computer Science University of HertfordshireHatfieldAL109ABUK Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
The use of privacy-enhanced facial recognition has increased in response to growing concerns about data securityand privacy in the digital age. This trend is spurred by rising demand for face recognition technology in... 详细信息
来源: 评论
Is GPT-4 Conscious?
Journal of Artificial Intelligence and Consciousness
收藏 引用
Journal of Artificial Intelligence and Consciousness 2024年 第1期11卷 1-16页
作者: Tait, Izak Bensemann, Joshua Wang, Ziqi Computer Science and Software Engineering Department Auckland University of Technology NAOInstitute The University of Auckland
GPT-4 (Generative Pre-Trained Transformer 4) is often heralded as a leading commercial AI offering, sparking debates over its potential as a steppingstone toward Artificial General Intelligence. But does it possess co... 详细信息
来源: 评论
A Double-Branch Xception Architecture for Acute Hemorrhage Detection and Subtype Classification
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3727-3744页
作者: Muhammad Naeem Akram Muhammad Usman Yaseen Muhammad Waqar Muhammad Imran Aftab Hussain Department of Computer Science COMSATS University IslamabadIslamabad45550Pakistan Department of Software Engineering Capital University of Science&TechnologyIslamabad44000Pakistan
This study presents a deep learning model for efficient intracranial hemorrhage(ICH)detection and subtype classification on non-contrast head computed tomography(CT)*** refers to bleeding in the skull,leading to the m... 详细信息
来源: 评论
Automatic Positioning of Intelligent Mobile Robot Based on Improved Front-End Scanning Matching
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2025年 第1期10卷 559-572页
作者: Wang, Hong Wang, Yi-Gui Zhang, Jie Department of Computer and Software Engineering Shandong College of Electronic Technology Jinan250200 China School of Computer Science and Technology Shandong Jianzhu University Jinan250101 China College of Agricultural Science and Technology Yana Royal Polytechnic University Chiang Mai50000 Thailand
Traditional autonomous navigation methods for mobile robots mainly rely on geometric feature-based LiDAR scan-matching algorithms, but in complex environments, this method is often affected due to the presence of movi... 详细信息
来源: 评论