咨询与建议

限定检索结果

文献类型

  • 66,042 篇 会议
  • 41,623 篇 期刊文献
  • 798 册 图书

馆藏范围

  • 108,463 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 67,337 篇 工学
    • 43,663 篇 计算机科学与技术...
    • 35,723 篇 软件工程
    • 16,284 篇 信息与通信工程
    • 10,781 篇 控制科学与工程
    • 8,857 篇 电气工程
    • 8,373 篇 电子科学与技术(可...
    • 7,617 篇 生物工程
    • 5,488 篇 机械工程
    • 5,482 篇 光学工程
    • 5,394 篇 生物医学工程(可授...
    • 4,234 篇 化学工程与技术
    • 3,714 篇 仪器科学与技术
    • 3,714 篇 动力工程及工程热...
    • 3,007 篇 材料科学与工程(可...
    • 2,584 篇 交通运输工程
    • 2,537 篇 网络空间安全
    • 2,359 篇 安全科学与工程
  • 37,764 篇 理学
    • 18,952 篇 数学
    • 11,941 篇 物理学
    • 8,615 篇 生物学
    • 6,223 篇 统计学(可授理学、...
    • 4,450 篇 化学
    • 3,898 篇 系统科学
  • 17,723 篇 管理学
    • 11,324 篇 管理科学与工程(可...
    • 7,042 篇 图书情报与档案管...
    • 4,621 篇 工商管理
  • 5,187 篇 医学
    • 4,195 篇 临床医学
    • 3,764 篇 基础医学(可授医学...
    • 2,281 篇 药学(可授医学、理...
  • 2,769 篇 法学
    • 2,256 篇 社会学
  • 1,871 篇 经济学
  • 1,343 篇 农学
  • 965 篇 教育学
  • 441 篇 文学
  • 257 篇 军事学
  • 203 篇 艺术学
  • 8 篇 哲学
  • 8 篇 历史学

主题

  • 2,761 篇 feature extracti...
  • 2,755 篇 accuracy
  • 2,453 篇 deep learning
  • 2,409 篇 training
  • 2,249 篇 computational mo...
  • 2,045 篇 computer science
  • 1,817 篇 machine learning
  • 1,602 篇 optimization
  • 1,370 篇 predictive model...
  • 1,352 篇 semantics
  • 1,209 篇 internet of thin...
  • 1,154 篇 data mining
  • 1,145 篇 support vector m...
  • 1,133 篇 data models
  • 1,126 篇 convolutional ne...
  • 1,115 篇 neural networks
  • 1,102 篇 real-time system...
  • 1,013 篇 image segmentati...
  • 912 篇 artificial intel...
  • 853 篇 educational inst...

机构

  • 2,477 篇 school of comput...
  • 1,547 篇 school of comput...
  • 1,391 篇 school of comput...
  • 1,080 篇 cavendish labora...
  • 1,010 篇 department of ph...
  • 982 篇 school of comput...
  • 936 篇 physikalisches i...
  • 932 篇 oliver lodge lab...
  • 832 篇 university of ch...
  • 681 篇 school of comput...
  • 609 篇 infn sezione di ...
  • 589 篇 infn laboratori ...
  • 581 篇 infn sezione di ...
  • 566 篇 school of comput...
  • 542 篇 infn sezione di ...
  • 534 篇 horia hulubei na...
  • 525 篇 chitkara univers...
  • 521 篇 school of physic...
  • 521 篇 fakultät physik ...
  • 520 篇 school of physic...

作者

  • 273 篇 niyato dusit
  • 254 篇 barter w.
  • 252 篇 a. gomes
  • 235 篇 c. alexa
  • 233 篇 j. m. izen
  • 229 篇 beiter a.
  • 229 篇 blake t.
  • 229 篇 s. chen
  • 226 篇 g. bella
  • 226 篇 j. strandberg
  • 226 篇 c. amelung
  • 225 篇 bellee v.
  • 224 篇 d. calvet
  • 221 篇 bowcock t.j.v.
  • 220 篇 amato s.
  • 219 篇 borsato m.
  • 219 篇 betancourt c.
  • 218 篇 boettcher t.
  • 217 篇 brundu d.
  • 214 篇 j. wang

语言

  • 99,708 篇 英文
  • 6,880 篇 其他
  • 1,848 篇 中文
  • 68 篇 日文
  • 19 篇 德文
  • 17 篇 法文
  • 8 篇 朝鲜文
  • 5 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 2 篇 荷兰文
  • 2 篇 俄文
检索条件"机构=School of Computer Engineering Iran University of Science and Technology"
108463 条 记 录,以下是361-370 订阅
排序:
Rank-Based singular value decomposition recommendation algorithm for academic web pages
收藏 引用
International Journal of computers and Applications 2025年 第5期47卷 413-423页
作者: Naseer, Mehwish Zhang, Wu National University of Sciences and Technology Islamabad Pakistan School of Computer Engineering and Science Shanghai University Shanghai China
Finding appropriate information on the web is a tedious task and thus demands an intelligent mechanism to assist users for this purpose. Students are the victims of information overloading on the internet the most, as... 详细信息
来源: 评论
Prompt Learning for Few-Shot Question Answering via Self-Context Data Augmentation
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第3期6卷 589-603页
作者: Qiu, Jian-Qiang Zhang, Chun-Yang Chen, C. L. Philip Fuzhou University College of Computer and Data Science Fuzhou350108 China South China University of Technology School of Computer Science and Engineering Guangzhou510006 China
Pretrained language models (PLMs) have shown remarkable performance on question answering (QA) tasks, but they usually require fine-tuning (FT) that depends on a substantial quantity of QA pairs. Therefore, improving ... 详细信息
来源: 评论
Design, Mathematical Modeling, and Control of an Underactuated 3-DOF Experimental Helicopter
收藏 引用
IEEE Access 2024年 12卷 55568-55586页
作者: Makki, Osamah Talal Moosapour, Seyyed Sajjad Mobayen, Saleh Nobari, Jafar Heyrani Shahid Chamran University of Ahvaz Faculty of Engineering Ahvaz*** Iran National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu Yunlin640301 Taiwan K. N. Toosi University of Technology Department of Electrical and Computer Engineering Tehran19697 Iran
This article covers the design, implementation, mathematical modelling, and control of a multivariable, underactuated, low-cost, three-degrees-of-freedom experimental helicopter system (namely a 3-DOF helicopter). The... 详细信息
来源: 评论
Knowledge Probabilization in Ensemble Distillation: Improving Accuracy and Uncertainty Quantification for Object Detectors
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 221-233页
作者: Yang, Yang Wang, Chao Gong, Lei Wu, Min Chen, Zhenghua Li, Xiang Chen, Xianglan Zhou, Xuehai University of Science and Technology of China School of Computer Science and Technology Hefei230026 China 138632 Singapore East China Normal University School of Data Science and Engineering Shanghai200062 China
Ensemble object detectors have demonstrated remarkable effectiveness in enhancing prediction accuracy and uncertainty quantification. However, their widespread adoption is hindered by significant computational and sto... 详细信息
来源: 评论
The Formulation of Finite Difference RBFWENO Schemes for Hyperbolic Conservation Laws:An Alternative Technique
收藏 引用
Advances in Applied Mathematics and Mechanics 2023年 第4期15卷 1023-1055页
作者: Rooholah Abedian Mehdi Dehghan School of Engineering Science College of EngineeringUniversity of TehranIran Department of Applied Mathematics Faculty of Mathematics and Computer ScienceAmirkabir University of TechnologyNo.424Hafez Ave.TehranIran
To solve conservation laws,efficient schemes such as essentially nonoscillatory(ENO)and weighted ENO(WENO)have been introduced to control the Gibbs *** on radial basis functions(RBFs)with the classical WENO-JS weights... 详细信息
来源: 评论
Rotation,Translation and Scale Invariant Sign Word Recognition Using Deep Learning
收藏 引用
computer Systems science & engineering 2023年 第3期44卷 2521-2536页
作者: Abu Saleh Musa Miah Jungpil Shin Md.Al Mehedi Hasan Md Abdur Rahim Yuichi Okuyama School of Computer Science and Engineering The University of AizuAizuwakamatsuFukushima965-8580Japan Department of Computer Science and Engineering Pabna University of Science and TechnologyPabnaBangladesh
Communication between people with disabilities and people who do not understand sign language is a growing social need and can be a tedious *** of the main functions of sign language is to communicate with each other ... 详细信息
来源: 评论
Event-Driven Attention Network:A Cross-Modal Framework for Efficient Image-Text Retrieval in Mass Gathering Events
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 3277-3301页
作者: Kamil Yasen Heyan Jin Sijie Yang Li Zhan Xuyang Zhang Ke Qin Ye Li School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Information and Software Engineering University of Electronic Science and Technology ofChinaChengdu611731China Kashi Institute of Electronics and Information Industry Kashi844508China
Research on mass gathering events is critical for ensuring public security and maintaining social ***,most of the existing works focus on crowd behavior analysis areas such as anomaly detection and crowd counting,and ... 详细信息
来源: 评论
Enhancing surrogate-assisted evolutionary optimization for medium-scale expensive problems: a two-stage approach with unsupervised feature learning and Q-learning
收藏 引用
Neural Computing and Applications 2024年 第25期36卷 15545-15565页
作者: Gong, Yiyun Yu, Haibo Kang, Li Sun, Chaoli Zeng, Jianchao School of Electrical and Control Engineering North University of China Taiyuan030051 China School of Computer Science and Technology North University of China Taiyuan030051 China School of Environment and Safety Engineering North University of China Taiyuan030051 China School of Computer Science and Technology Taiyuan University of Science and Technology Taiyuan030024 China
This paper presents a novel two-stage progressive search approach with unsupervised feature learning and Q-learning (TSLL) to enhance surrogate-assisted evolutionary optimization for medium-scale expensive problems. T... 详细信息
来源: 评论
A systematic mapping to investigate the application of machine learning techniques in requirement engineering activities
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第6期9卷 1412-1434页
作者: Shoaib Hassan Qianmu Li Khursheed Aurangzeb Affan Yasin Javed Ali Khan Muhammad Shahid Anwar School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjingJiangsuChina Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadhSaudi Arabia School of Software Northwestern Polytechnical UniversityXianShaanxiChina Department of Computer Science School of PhysicsEngineering&Computer ScienceUniversity of HertfordshireHatfieldUK Department of AI and Software Gachon University Seongnam-siSeongnamSouth Korea
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a... 详细信息
来源: 评论
Adversarial multi-image steganography via texture evaluation and multi-scale image enhancement
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5793-5823页
作者: Li, Fengyong Li, Longwei Zeng, Yishu Yu, Jiang Qin, Chuan College of Computer Science and Technology Shanghai University of Electric Power Shanghai201306 China School of Information and Computer Shanghai Business School Shanghai201400 China School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai200092 China
Multi-image steganography refers to a data-hiding scheme where a user tries to hide confidential messages within multiple images. Different from the traditional steganography which only requires the security of an ind... 详细信息
来源: 评论