咨询与建议

限定检索结果

文献类型

  • 8,087 篇 会议
  • 4,353 篇 期刊文献
  • 159 册 图书

馆藏范围

  • 12,599 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,934 篇 工学
    • 6,170 篇 计算机科学与技术...
    • 5,004 篇 软件工程
    • 1,597 篇 信息与通信工程
    • 1,071 篇 控制科学与工程
    • 769 篇 生物工程
    • 706 篇 电气工程
    • 572 篇 电子科学与技术(可...
    • 531 篇 机械工程
    • 520 篇 生物医学工程(可授...
    • 400 篇 光学工程
    • 317 篇 仪器科学与技术
    • 285 篇 安全科学与工程
    • 281 篇 动力工程及工程热...
    • 256 篇 化学工程与技术
    • 222 篇 建筑学
  • 3,570 篇 理学
    • 2,117 篇 数学
    • 855 篇 生物学
    • 725 篇 物理学
    • 579 篇 统计学(可授理学、...
    • 509 篇 系统科学
    • 283 篇 化学
  • 2,408 篇 管理学
    • 1,556 篇 管理科学与工程(可...
    • 943 篇 图书情报与档案管...
    • 694 篇 工商管理
  • 573 篇 医学
    • 497 篇 临床医学
    • 440 篇 基础医学(可授医学...
    • 266 篇 药学(可授医学、理...
    • 235 篇 公共卫生与预防医...
  • 372 篇 法学
    • 291 篇 社会学
  • 246 篇 经济学
    • 246 篇 应用经济学
  • 188 篇 教育学
  • 131 篇 农学
  • 51 篇 文学
  • 36 篇 军事学
  • 26 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 524 篇 computer science
  • 338 篇 software enginee...
  • 251 篇 deep learning
  • 228 篇 computational mo...
  • 225 篇 data mining
  • 219 篇 machine learning
  • 187 篇 feature extracti...
  • 176 篇 application soft...
  • 175 篇 laboratories
  • 167 篇 accuracy
  • 163 篇 optimization
  • 157 篇 computer archite...
  • 157 篇 wireless sensor ...
  • 153 篇 software
  • 146 篇 internet of thin...
  • 137 篇 semantics
  • 135 篇 educational inst...
  • 133 篇 predictive model...
  • 125 篇 monitoring
  • 121 篇 support vector m...

机构

  • 466 篇 state key labora...
  • 384 篇 department of co...
  • 245 篇 department of co...
  • 235 篇 school of softwa...
  • 173 篇 college of compu...
  • 160 篇 school of softwa...
  • 109 篇 state key labora...
  • 100 篇 school of comput...
  • 82 篇 school of inform...
  • 75 篇 department of co...
  • 67 篇 department of co...
  • 66 篇 department of co...
  • 52 篇 state key labora...
  • 51 篇 school of softwa...
  • 50 篇 university of ch...
  • 49 篇 school of softwa...
  • 46 篇 national key lab...
  • 44 篇 tsinghua nationa...
  • 38 篇 school of comput...
  • 38 篇 national key lab...

作者

  • 43 篇 xiang-yang li
  • 40 篇 baowen xu
  • 35 篇 yunhao liu
  • 31 篇 shen furao
  • 30 篇 qi lianyong
  • 29 篇 zhao jian
  • 27 篇 aichholzer oswin
  • 25 篇 zhou zhi-hua
  • 25 篇 yang tianbao
  • 24 篇 vogtenhuber birg...
  • 24 篇 sun fuchun
  • 23 篇 rehman attique u...
  • 23 篇 xuandong li
  • 22 篇 wang jianmin
  • 22 篇 jiacun wang
  • 22 篇 guihai chen
  • 21 篇 jun zhang
  • 21 篇 wang wei
  • 21 篇 zhang yan
  • 20 篇 zhi-hui wang

语言

  • 11,324 篇 英文
  • 1,114 篇 其他
  • 182 篇 中文
  • 4 篇 德文
  • 2 篇 法文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Software and Computer Technology"
12599 条 记 录,以下是611-620 订阅
排序:
A novel transformer-based graph generation model for vectorized road design
A novel transformer-based graph generation model for vectori...
收藏 引用
作者: Zhou, Peichi Li, Chen Zhang, Jian Wang, Changbo Qin, Hong Liu, Long School of Software Engineering East China Normal University Shanghai China School of Computer Science and Technology East China Normal University Shanghai China Department of Computer Science StonyBrook University Stony BrookNY United States
Road network design, as an important part of landscape modeling, shows a great significance in automatic driving, video game development, and disaster simulation. To date, this task remains labor-intensive, tedious an... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Main Confidentiality Challenges in Network Security: A Literature Review  25
Main Confidentiality Challenges in Network Security: A Liter...
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Asassfeh, Mahmoud Al-Mousa, Mohammad Rasmi Amer, Waleed Almomani, Adai Mohammad Al-Shaikh, Ala'a Afaneh, Suha Alrefai, Mohammed Nayef Elrashidi, Ali Samara, Ghassan Zarqa University Department of Cybersecurity Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan Zarqa University Department of Software Enginereeing Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
Nowadays, a big challenge is how to protect information from unwanted accesses. It constitutes a big challenge when we have different ways to access data. That is, a lot of information today travels through networks a... 详细信息
来源: 评论
Towards Enhancing Aviation Safety Through Advanced Incident Analysis Using Large Language Models
Towards Enhancing Aviation Safety Through Advanced Incident ...
收藏 引用
Collaborative Advances in software and COmputiNg (CASCON), International Conference on
作者: Vaishali Siddeshwar Akramul Azim Sanaa Alwidian Masoud Makrehchi Department of Electrical Computer and Software Engineering University of Ontario Institute of Technology
Aerospace incident reports, crucial for identifying abnormal aircraft occurrences, are submitted to regulatory authorities like FAA or EASA. These reports, often in natural language, offer clarity and context. Existin... 详细信息
来源: 评论
Fusion of speech and handwritten signatures biometrics for person identification
收藏 引用
International Journal of Speech technology 2023年 第4期26卷 833-850页
作者: Abushariah, Ahmad A. M. Abushariah, Mohammad A. M. Gunawan, Teddy Surya Chebil, J. Alqudah, Assal A. M. Ting, Hua-Nong Mustafa, Mumtaz Begum Peer Faculty of Engineering University of Malaya Kuala Lumpur50603 Malaysia Department of Computer Information Systems King Abdullah II School of Information Technology The University of Jordan Amman Jordan ECE Department Faculty of Engineering International Islamic University Malaysia Kuala Lumpur53100 Malaysia Department of Computer Science Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan Department of Biomedical Engineering Faculty of Engineering University of Malaya Kuala Lumpur50603 Malaysia Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur50603 Malaysia
Automatic person identification (API) using human biometrics is essential and highly demanded compared to traditional API methods, where a person is automatically identified using his/her distinct characteristics incl... 详细信息
来源: 评论
Health-Care Monitoring of Patient using CNN based Model in Internet of Things  1
Health-Care Monitoring of Patient using CNN based Model in I...
收藏 引用
1st IEEE International Conference on Applied Intelligence and Sustainable Computing, ICAISC 2023
作者: Parameshachari, B.D. Hemalatha, K.L. Rahebi, Javad Baker, Mohammed Rashad Upendra Roy, B.P. Nitte Meenakshi Institute of Technology Department of Electronics and Communications Engineering Bengaluru India Sri Krishna Institute of Technology Department of Information Science and Engineering Bangalore India Istanbul Topkapi University Department of Software Engineering Turkey University of Kirkuk College of Computer Science and Information Technology Department of Software Kirkuk Iraq Channabasaveshwara Institute of Technology Gubbi Department of Electronics and Communication Engineering Tumkur India
There is rising public concern about exposure to radiofrequency (RF) electromagnetic fields (EMF) as more and more wireless communications become concentrated in everyday living surroundings. There are a number of obs... 详细信息
来源: 评论
A Novel Multiobjective Fireworks Algorithm and Its Applications to Imbalanced Distance Minimization Problems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第8期9卷 1476-1489页
作者: Shoufei Han Kun Zhu MengChu Zhou Xiaojing Liu Haoyue Liu Yusuf Al-Turki Abdullah Abusorrah College of Computer Science and Technology Nanjing University of Aeronautics and Astronauticsand also with the Collaborative Innovation Center of Novel Software Technology and IndustrializationNanjing 211106China Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewark NJ 07102 USA Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer EngineeringFaculty of Engineeringand also with the K.A.CARE Energy Research and Innovation CenterKing Abdulaziz UniversityJeddah 21589Saudi Arabia
Recently,multimodal multiobjective optimization problems(MMOPs)have received increasing *** goal is to find a Pareto front and as many equivalent Pareto optimal solutions as *** some evolutionary algorithms for them h... 详细信息
来源: 评论
Improved model for knowledge representation: TransMR  22
Improved model for knowledge representation: TransMR
收藏 引用
3rd Asia-Pacific Conference on Image Processing, Electronics and computers, IPEC 2022
作者: Wang, Xuyang Zhang, Yiyuan Department of Computer and Communication Lanzhou University of Technology Lanzhou China Software Engineering Lanzhou University of Technology Lanzhou China
Knowledge graphs have developed rapidly in recent years, and knowledge representation learning is a fundamental task of knowledge graphs, so knowledge representation learning has likewise received widespread attention... 详细信息
来源: 评论
Multi Layered Rule-Based Technique for Explicit Aspect Extraction from Online Reviews
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 4641-4656页
作者: Mubashar Hussain Toqir A.Rana Aksam Iftikhar M.Usman Ashraf Muhammad Waseem Iqbal Ahmed Alshaflut Abdullah Alourani School of Systems and Technology University of Management and TechnologyLahore54770Pakistan Department of Computer Science and It The University of LahoreLahore54000Pakistan School of Computer Sciences Universiti Sains Malaysia(USM)Penang11800Malaysia Department of Computer Science Comsats University IslamabadLahore54000Pakistan Department of Computer Science GC Women University SialkotPakistan Department of Software Engineering The Superior UniversityLahore53700Pakistan Faculty of Computing and It Albaha UniversityAlbahaSaudi Arabia Department of Computer Science Majmaah UniversitySaudi Arabia
In the field of sentiment analysis,extracting aspects or opinion targets fromuser reviews about a product is a key *** the polarity of an opinion is much more useful if we also know the targeted Aspect or *** based ap... 详细信息
来源: 评论
Deep Semantic and Attentive Network for Unsupervised Video Summarization
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2022年 第2期18卷 1–21页
作者: Zhong, Sheng-Hua Lin, Jingxu Lu, Jianglin Fares, Ahmed Ren, Tongwei College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical Engineering Computer Systems Engineering Program Faculty of Engineering at Shoubra Benha University Cairo Egypt State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China
With the rapid growth of video data, video summarization is a promising approach to shorten a lengthy video into a compact version. Although supervised summarization approaches have achieved state-of-the-art performan... 详细信息
来源: 评论