咨询与建议

限定检索结果

文献类型

  • 134,252 篇 会议
  • 71,866 篇 期刊文献
  • 2,137 册 图书

馆藏范围

  • 208,254 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 123,674 篇 工学
    • 82,851 篇 计算机科学与技术...
    • 66,292 篇 软件工程
    • 28,522 篇 信息与通信工程
    • 19,093 篇 控制科学与工程
    • 15,277 篇 电气工程
    • 15,169 篇 电子科学与技术(可...
    • 13,183 篇 生物工程
    • 10,104 篇 生物医学工程(可授...
    • 9,263 篇 光学工程
    • 8,632 篇 机械工程
    • 7,547 篇 化学工程与技术
    • 6,336 篇 仪器科学与技术
    • 6,178 篇 动力工程及工程热...
    • 5,689 篇 材料科学与工程(可...
    • 4,428 篇 网络空间安全
    • 4,178 篇 安全科学与工程
  • 71,163 篇 理学
    • 36,669 篇 数学
    • 22,487 篇 物理学
    • 15,117 篇 生物学
    • 11,374 篇 统计学(可授理学、...
    • 7,895 篇 化学
    • 7,604 篇 系统科学
  • 32,841 篇 管理学
    • 20,090 篇 管理科学与工程(可...
    • 13,952 篇 图书情报与档案管...
    • 8,970 篇 工商管理
  • 10,183 篇 医学
    • 8,432 篇 临床医学
    • 7,239 篇 基础医学(可授医学...
    • 4,427 篇 药学(可授医学、理...
    • 3,992 篇 公共卫生与预防医...
  • 5,666 篇 法学
    • 4,699 篇 社会学
  • 3,430 篇 经济学
  • 2,585 篇 农学
  • 2,364 篇 教育学
  • 1,121 篇 文学
  • 427 篇 军事学
  • 371 篇 艺术学
  • 60 篇 哲学
  • 38 篇 历史学

主题

  • 9,210 篇 computer science
  • 4,693 篇 accuracy
  • 4,249 篇 feature extracti...
  • 4,159 篇 computational mo...
  • 3,884 篇 deep learning
  • 3,839 篇 machine learning
  • 3,426 篇 training
  • 2,889 篇 data mining
  • 2,631 篇 artificial intel...
  • 2,453 篇 support vector m...
  • 2,407 篇 optimization
  • 2,274 篇 predictive model...
  • 2,142 篇 algorithm design...
  • 2,117 篇 wireless sensor ...
  • 2,114 篇 internet of thin...
  • 2,105 篇 computer archite...
  • 2,026 篇 educational inst...
  • 1,989 篇 protocols
  • 1,898 篇 semantics
  • 1,869 篇 application soft...

机构

  • 5,010 篇 department of co...
  • 2,117 篇 college of compu...
  • 1,143 篇 university of ch...
  • 1,080 篇 cavendish labora...
  • 982 篇 department of ph...
  • 910 篇 oliver lodge lab...
  • 904 篇 physikalisches i...
  • 826 篇 department of el...
  • 659 篇 department of el...
  • 658 篇 department of co...
  • 576 篇 infn sezione di ...
  • 552 篇 department of co...
  • 548 篇 infn laboratori ...
  • 547 篇 chitkara univers...
  • 547 篇 infn sezione di ...
  • 521 篇 horia hulubei na...
  • 520 篇 infn sezione di ...
  • 512 篇 department of ph...
  • 499 篇 school of physic...
  • 497 篇 school of physic...

作者

  • 250 篇 barter w.
  • 246 篇 j. wang
  • 241 篇 cai h.
  • 232 篇 a. gomes
  • 231 篇 s. chen
  • 224 篇 c. alexa
  • 222 篇 blake t.
  • 221 篇 j. m. izen
  • 221 篇 bellee v.
  • 220 篇 bowcock t.j.v.
  • 219 篇 amato s.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 213 篇 brundu d.
  • 213 篇 boettcher t.
  • 212 篇 beiter a.
  • 208 篇 g. bella
  • 208 篇 c. amelung
  • 207 篇 j. strandberg
  • 207 篇 d. calvet

语言

  • 194,584 篇 英文
  • 10,611 篇 其他
  • 3,047 篇 中文
  • 99 篇 日文
  • 36 篇 德文
  • 22 篇 法文
  • 18 篇 朝鲜文
  • 16 篇 斯洛文尼亚文
  • 9 篇 俄文
  • 5 篇 西班牙文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science and Technology Changchun University of Science and Technology"
208255 条 记 录,以下是331-340 订阅
排序:
Mesh simplification algorithm for maintaining visual quality
Mesh simplification algorithm for maintaining visual quality
收藏 引用
2024 International Conference on Image, Signal Processing, and Pattern Recognition, ISPP 2024
作者: Cheng, Gong Awudong, Buhailiqiemu The school of Computer Science and Technology Changchun University of Science and Technology 7089 Weixing Road Jilin Changchun China Zhongshan Research Institute of Changchun University of Science and Technology Guangdong Province Zhongshan China
With the improvement of mesh accuracy, the amount of data generated by it is ***, existing computer hardware cannot meet the real-time rendering requirements for high-precision ***, it is necessary to simplify the ***... 详细信息
来源: 评论
Biometric-Based Secure Encryption Key Generation Using Convolutional Neural Networks and Particle Swarm Optimization
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第16期49卷 213-234页
作者: Almola, Sahera A.S. Khudeyer, Raidah S. Younis, Hameed Abdulkareem Department of Computer Information Systems College of Computer Science and Information Technology University of Basrah Basrah Iraq
With the rapid expansion of computer networks and information technology, ensuring secure data transmission is increasingly vital—especially for image data, which often contains sensitive information. This research p... 详细信息
来源: 评论
Preventing 51% Attack by Using Consecutive Block Limits in Bitcoin
收藏 引用
IEEE Access 2024年 12卷 77852-77869页
作者: Mahmood Babur, Sohail Ur Rehman Khan, Shafiq Yang, Jing Chen, Yen-Lin Soon Ku, Chin Yee Por, Lip Government Murray College Department of Information Technology Sialkot51010 Pakistan Capital University of Science and Technology Department of Computer Science Islamabad44730 Pakistan Universiti Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
In permissionless blockchain systems, Proof of Work (PoW) is utilized to address the issues of double-spending and transaction starvation. When an attacker acquires more than 50% of the hash power of the entire networ... 详细信息
来源: 评论
Informative task classification with concatenated embeddings using deep learning on crisisMMD
收藏 引用
International Journal of computers and Applications 2025年 第2期47卷 123-140页
作者: Jain, Tarun Gopalani, Dinesh Kumar Meena, Yogesh Department of Computer Science and Engineering Manipal University Jaipur Jaipur India Department of Computer Science and Engineering Malaviya National Institute of Technology Jaipur India
Disastrous situations pose a formidable challenge, testing our resilience against nature's fury and the race against time to prevent the loss of human life. It is noted that in such situations that Microblogging p... 详细信息
来源: 评论
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction
收藏 引用
science China(Information sciences) 2023年 第5期66卷 114-129页
作者: Haibin LI Yi ZHAO Wenbing YAO Ke XU Qi LI Department of Computer Science and Technology Tsinghua University Beijing National Research Center for Information Science and Technology (BNRist) Institute for Network Sciences and Cyberspace Tsinghua University
Distributed denial of service(DDoS) detection is still an open and challenging problem. In particular, sophisticated attacks, e.g., attacks that disguise attack packets as benign traffic always appear, which can easil... 详细信息
来源: 评论
Generation of mode‑locked states of conventional solitons and bright‑dark solitons in graphene mode‑locked fber laser
收藏 引用
Frontiers of Optoelectronics 2023年 第2期16卷 71-80页
作者: Zixiong Li Mingyu Li Xinyi Hou Lei Du Lin Xiao Tianshu Wang Wanzhuo Ma Department of Optical Engineering School of Opto-Electronic EngineeringChangchun University of Science and TechnologyChangchun 130022China
This paper proposes a mode-locked fber laser based on graphene-coated *** total length of the fber laser resonant cavity is 31.34 *** the condition of stable output of bright-dark soliton pairs from the fber laser,dua... 详细信息
来源: 评论
Robust Feature Matching for VSLAM in Non-Rigid Scenes
Robust Feature Matching for VSLAM in Non-Rigid Scenes
收藏 引用
2022 International Conference on Electronic Information Engineering and computer science, EIECS 2022
作者: Zhang, Guangzhi Feng, Guanyuan He, Fei Jiang, Zhengang School of Computer Science and Technology Changchun University of Science and Technology Changchun China Zhongshan Institute of Changchun University of Science and Technology Zhongshan China
Minimally invasive surgery (MIS) has a wide range of applications in the medical field. Its emergence has brought many benefits to patients but has also brought great challenges to surgeons, requiring doctors with ext... 详细信息
来源: 评论
Unsupervised Action Recognition using Spatiotemporal, Adaptive, and Attention-guided Refining-Network
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期6卷 1-12页
作者: Yin, Xinpeng Zhang, Cheng Huang, ZiXu He, Zhihai Cao, Wenming State Key Laboratory of Radio Frequency Heterogeneous IntegrationDepartment of Electronics and Information EngineeringShenzhen University Department of Computer Science and EngineeringSouthern University of Science and Technology Department of Electronic and Electrical EngineeringSouthern University of Science and Technology
Previous works on unsupervised skeleton-based action recognition primarily focused on strategies for utilizing features to drive model optimization through methods like contrastive learning and reconstruction. However... 详细信息
来源: 评论
Understanding and Detecting Inefficient Image Displaying Issues in Android Apps
收藏 引用
Journal of computer science & technology 2024年 第2期39卷 434-459页
作者: 李文杰 马骏 蒋炎岩 许畅 马晓星 State Key Laboratory of Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China
Mobile applications(apps for short)often need to display ***,inefficient image displaying(IID)issues are pervasive in mobile apps,and can severely impact app performance and user *** paper first establishes a descript... 详细信息
来源: 评论
Integrating blockchain and machine learning for enhanced anti-money laundering system
收藏 引用
International Journal of Information technology (Singapore) 2025年 第4期17卷 2439-2447页
作者: Shafin, Khandakar Md Reno, Saha Department of Computer Science and Engineering CCN University of Science and Technology Cumilla 3503 Bangladesh Department of Computer Science and Engineering Ahsanullah University of Science and Technology (AUST) Dhaka 1208 Bangladesh
Money laundering is a serious threat to global financial systems, causing instability and inflation, and especially hurting middle-class savings. This paper suggests a new way to tackle these problems by using blockch... 详细信息
来源: 评论