咨询与建议

限定检索结果

文献类型

  • 162,250 篇 会议
  • 89,591 篇 期刊文献
  • 1,640 册 图书
  • 1 篇 学位论文

馆藏范围

  • 253,482 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 157,292 篇 工学
    • 97,681 篇 计算机科学与技术...
    • 79,481 篇 软件工程
    • 38,322 篇 信息与通信工程
    • 24,996 篇 控制科学与工程
    • 22,254 篇 电子科学与技术(可...
    • 21,278 篇 电气工程
    • 15,977 篇 生物工程
    • 13,279 篇 机械工程
    • 13,176 篇 光学工程
    • 11,520 篇 生物医学工程(可授...
    • 10,817 篇 化学工程与技术
    • 10,074 篇 仪器科学与技术
    • 8,531 篇 动力工程及工程热...
    • 8,295 篇 材料科学与工程(可...
    • 5,473 篇 交通运输工程
    • 5,282 篇 安全科学与工程
    • 5,265 篇 网络空间安全
  • 89,342 篇 理学
    • 43,605 篇 数学
    • 30,455 篇 物理学
    • 18,079 篇 生物学
    • 13,930 篇 统计学(可授理学、...
    • 10,918 篇 化学
    • 9,450 篇 系统科学
  • 39,088 篇 管理学
    • 24,729 篇 管理科学与工程(可...
    • 15,855 篇 图书情报与档案管...
    • 10,163 篇 工商管理
  • 10,995 篇 医学
    • 9,105 篇 临床医学
    • 7,959 篇 基础医学(可授医学...
    • 4,875 篇 药学(可授医学、理...
  • 6,064 篇 法学
    • 4,900 篇 社会学
  • 4,068 篇 经济学
  • 3,355 篇 农学
  • 2,626 篇 教育学
  • 1,054 篇 文学
  • 721 篇 军事学
  • 483 篇 艺术学
  • 32 篇 哲学
  • 25 篇 历史学

主题

  • 6,327 篇 feature extracti...
  • 5,677 篇 accuracy
  • 5,029 篇 deep learning
  • 4,969 篇 training
  • 4,722 篇 computational mo...
  • 4,681 篇 computer science
  • 3,923 篇 machine learning
  • 3,372 篇 optimization
  • 3,073 篇 data mining
  • 3,004 篇 predictive model...
  • 2,878 篇 semantics
  • 2,685 篇 data models
  • 2,668 篇 support vector m...
  • 2,658 篇 neural networks
  • 2,507 篇 educational inst...
  • 2,493 篇 real-time system...
  • 2,464 篇 internet of thin...
  • 2,423 篇 convolutional ne...
  • 2,189 篇 artificial intel...
  • 2,167 篇 wireless sensor ...

机构

  • 2,477 篇 school of comput...
  • 1,858 篇 school of inform...
  • 1,549 篇 university of ch...
  • 1,507 篇 school of comput...
  • 1,333 篇 school of comput...
  • 1,052 篇 cavendish labora...
  • 1,032 篇 physikalisches i...
  • 973 篇 department of ph...
  • 943 篇 school of comput...
  • 851 篇 oliver lodge lab...
  • 774 篇 school of comput...
  • 617 篇 department of co...
  • 595 篇 school of inform...
  • 560 篇 school of comput...
  • 559 篇 chitkara univers...
  • 534 篇 school of inform...
  • 523 篇 infn laboratori ...
  • 521 篇 university of sc...
  • 511 篇 nikhef national ...
  • 497 篇 school of comput...

作者

  • 325 篇 niyato dusit
  • 303 篇 yang yang
  • 248 篇 barter w.
  • 235 篇 wang wei
  • 221 篇 s. chen
  • 217 篇 blake t.
  • 217 篇 a. gomes
  • 214 篇 bellee v.
  • 213 篇 bowcock t.j.v.
  • 209 篇 betancourt c.
  • 207 篇 borsato m.
  • 205 篇 brundu d.
  • 203 篇 liu yang
  • 199 篇 beiter a.
  • 198 篇 amato s.
  • 195 篇 y. li
  • 194 篇 c. alexa
  • 190 篇 boettcher t.
  • 188 篇 j. m. izen
  • 184 篇 c. amelung

语言

  • 234,393 篇 英文
  • 13,289 篇 其他
  • 5,457 篇 中文
  • 490 篇 日文
  • 42 篇 德文
  • 38 篇 法文
  • 21 篇 朝鲜文
  • 18 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 阿拉伯文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 土耳其文
检索条件"机构=School of Computer Science Engineering and Information Technology"
253482 条 记 录,以下是91-100 订阅
排序:
A Study on the Inter-Pretability of Network Attack Prediction Models Based on Light Gradient Boosting Machine(LGBM)and SHapley Additive exPlanations(SHAP)
收藏 引用
computers, Materials & Continua 2025年 第6期83卷 5781-5809页
作者: Shuqin Zhang Zihao Wang Xinyu Su School of Computer Science Zhongyuan University of TechnologyZhengzhou450000China School of Cyberspace Security Information Engineering UniversityZhengzhou450000China
The methods of network attacks have become increasingly sophisticated,rendering traditional cybersecurity defense mechanisms insufficient to address novel and complex threats *** recent years,artificial intelligence h... 详细信息
来源: 评论
Improved Double Deep Q Network-Based Task Scheduling Algorithm in Edge Computing for Makespan Optimization
收藏 引用
Tsinghua science and technology 2024年 第3期29卷 806-817页
作者: Lei Zeng Qi Liu Shigen Shen Xiaodong Liu School of Computer Science Nanjing University of Information Science and TechnologyNanjing 210044China School of Software Nanjing University of Information Science and TechnologyNanjing 210044China School of Information Engineering Huzhou UniversityHuzhou 313000China School of Computing Edinburgh Napier UniversityEdinburghEH105DTUK
Edge computing nodes undertake an increasing number of tasks with the rise of business ***,how to efficiently allocate large-scale and dynamic workloads to edge computing resources has become a critical *** study prop... 详细信息
来源: 评论
A novel approach to visual image encryption:2D hyperchaos,variable Josephus,and 3D diffusion
收藏 引用
Chinese Physics B 2025年 第4期34卷 335-352页
作者: Yan Hong Xinyan Duan Jingming Su Zhaopan Wang Shihui Fang School of Electrical and Information Engineering Anhui University of Science and TechnologyHuainan 232001China
With the development of the Internet,image encryption technology has become critical for network *** methods often suffer from issues such as insufficient chaos,low randomness in key generation,and poor encryption ***... 详细信息
来源: 评论
Study and circuit design of stochastic resonance system based on memristor chaos induction
收藏 引用
Chinese Physics B 2025年 第4期34卷 312-321页
作者: Qi Liang Wen-Xin Yu Qiu-Mei Xiao School of Information and Electrical Engineering Hunan University of Science and TechnologyXiangtan 411100China
Memristor chaotic research has become a hotspot in the academic ***,there is little exploration combining memristor and stochastic resonance,and the correlation research between chaos and stochastic resonance is still... 详细信息
来源: 评论
Secure Transmission Scheme for Blocks in Blockchain-Based Unmanned Aerial Vehicle Communication Systems
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2195-2217页
作者: Ting Chen Shuna Jiang Xin Fan Jianchuan Xia Xiujuan Zhang Chuanwen Luo Yi Hong School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Computer Science Qufu Normal UniversityRizhao276826China School of Information Science and Technology Beijing Forestry UniversityBeijing100083China
In blockchain-based unmanned aerial vehicle(UAV)communication systems,the length of a block affects the performance of the *** transmission performance of blocks in the form of finite character segments is also affect... 详细信息
来源: 评论
IensNet: A novel and efficient approach for iris spoof detection via ensemble of deep models
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Sharma, Deepika Selwal, Arvind School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Department of Computer Science and Information Technology Central University of Jammu Samba India
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ... 详细信息
来源: 评论
A Review on Smart Healthcare employing Quantum Internet of Things
收藏 引用
IEEE engineering Management Review 2024年 1-9页
作者: Sutradhar, Kartick Venkatesh, Ranjitha Venkatesh, Priyanka Department of Computer Science and Engineering Indian Institute of Information Technology Sri City India Department of Computer Science and Engineering GITAM School of Technology Bengaluru India Department of Computer Science and Engineering Presidency University Bengaluru India
The Quantum Internet of Things (QIoT) in the healthcare industry holds the promise of transforming patient care, diagnostics, and medical research. Quantum-enhanced sensors, communication, and computation offer unprec... 详细信息
来源: 评论
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG College of Information Science and Engineering Hunan Normal University School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Computer Science Department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 评论
A Weakly-Supervised Crowd Density Estimation Method Based on Two-Stage Linear Feature Calibration
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第4期11卷 965-981页
作者: Yong-Chao Li Rui-Sheng Jia Ying-Xiang Hu Hong-Mei Sun the College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao 266590 the Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266000China the College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao 266590China the College of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210000China
In a crowd density estimation dataset,the annotation of crowd locations is an extremely laborious task,and they are not taken into the evaluation *** this paper,we aim to reduce the annotation cost of crowd datasets,a... 详细信息
来源: 评论
An Exploration of Deep Learning Techniques for the Detection of Grape Diseases
收藏 引用
Recent Advances in computer science and Communications 2024年 第2期17卷 1-12页
作者: Pandey, Kavita Chandak, Abhimanyu Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Noida India
Plant diseases are one of the major contributors to economic loss in the agriculture industry worldwide. Detection of disease at early stages can help in the reduction of this loss. In recent times, a lot of emphasis ... 详细信息
来源: 评论