咨询与建议

限定检索结果

文献类型

  • 162,552 篇 会议
  • 89,266 篇 期刊文献
  • 1,632 册 图书

馆藏范围

  • 253,450 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 157,273 篇 工学
    • 97,336 篇 计算机科学与技术...
    • 79,099 篇 软件工程
    • 38,214 篇 信息与通信工程
    • 24,874 篇 控制科学与工程
    • 22,459 篇 电子科学与技术(可...
    • 21,284 篇 电气工程
    • 15,955 篇 生物工程
    • 13,268 篇 机械工程
    • 12,917 篇 光学工程
    • 11,487 篇 生物医学工程(可授...
    • 10,883 篇 化学工程与技术
    • 10,041 篇 仪器科学与技术
    • 8,650 篇 材料科学与工程(可...
    • 8,502 篇 动力工程及工程热...
    • 5,446 篇 交通运输工程
    • 5,252 篇 网络空间安全
    • 5,251 篇 安全科学与工程
  • 89,035 篇 理学
    • 43,549 篇 数学
    • 30,410 篇 物理学
    • 18,035 篇 生物学
    • 14,013 篇 统计学(可授理学、...
    • 10,989 篇 化学
    • 9,432 篇 系统科学
  • 38,911 篇 管理学
    • 24,617 篇 管理科学与工程(可...
    • 15,792 篇 图书情报与档案管...
    • 10,117 篇 工商管理
  • 10,934 篇 医学
    • 9,046 篇 临床医学
    • 7,916 篇 基础医学(可授医学...
    • 4,882 篇 药学(可授医学、理...
  • 6,053 篇 法学
    • 4,900 篇 社会学
  • 4,053 篇 经济学
  • 3,328 篇 农学
  • 2,618 篇 教育学
  • 1,054 篇 文学
  • 717 篇 军事学
  • 491 篇 艺术学
  • 34 篇 哲学
  • 25 篇 历史学

主题

  • 6,401 篇 feature extracti...
  • 5,784 篇 accuracy
  • 5,069 篇 deep learning
  • 4,997 篇 training
  • 4,783 篇 computational mo...
  • 4,676 篇 computer science
  • 3,928 篇 machine learning
  • 3,423 篇 optimization
  • 3,088 篇 data mining
  • 3,039 篇 predictive model...
  • 2,883 篇 semantics
  • 2,714 篇 data models
  • 2,677 篇 support vector m...
  • 2,669 篇 neural networks
  • 2,579 篇 real-time system...
  • 2,502 篇 educational inst...
  • 2,488 篇 internet of thin...
  • 2,432 篇 convolutional ne...
  • 2,236 篇 artificial intel...
  • 2,181 篇 wireless sensor ...

机构

  • 2,467 篇 school of comput...
  • 1,877 篇 school of inform...
  • 1,549 篇 university of ch...
  • 1,494 篇 school of comput...
  • 1,308 篇 school of comput...
  • 1,050 篇 cavendish labora...
  • 1,033 篇 physikalisches i...
  • 975 篇 department of ph...
  • 956 篇 school of comput...
  • 849 篇 oliver lodge lab...
  • 770 篇 school of comput...
  • 618 篇 department of co...
  • 597 篇 school of inform...
  • 564 篇 chitkara univers...
  • 557 篇 school of comput...
  • 533 篇 university of sc...
  • 529 篇 infn laboratori ...
  • 519 篇 nikhef national ...
  • 513 篇 school of comput...
  • 508 篇 school of inform...

作者

  • 316 篇 niyato dusit
  • 290 篇 yang yang
  • 249 篇 barter w.
  • 237 篇 wang wei
  • 224 篇 a. gomes
  • 218 篇 blake t.
  • 217 篇 bellee v.
  • 213 篇 bowcock t.j.v.
  • 212 篇 s. chen
  • 209 篇 betancourt c.
  • 207 篇 borsato m.
  • 205 篇 brundu d.
  • 202 篇 amato s.
  • 199 篇 liu yang
  • 197 篇 beiter a.
  • 196 篇 c. alexa
  • 192 篇 boettcher t.
  • 189 篇 j. m. izen
  • 189 篇 y. li
  • 185 篇 x. li

语言

  • 220,186 篇 英文
  • 27,465 篇 其他
  • 5,653 篇 中文
  • 491 篇 日文
  • 63 篇 德文
  • 58 篇 法文
  • 27 篇 斯洛文尼亚文
  • 21 篇 朝鲜文
  • 7 篇 俄文
  • 5 篇 阿拉伯文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 波兰文
检索条件"机构=School of Computer Science Engineering and Information Technology"
253450 条 记 录,以下是201-210 订阅
排序:
A Frog-Shaped UWB MIMO Antenna Design for 5G
收藏 引用
Progress in Electromagnetics Research C 2025年 151卷 101-112页
作者: Yao, Shanhua Yang, Tianchu Qiu, Xiaorong Li, Xiang School of Electrical and Information Engineering Anhui University of Science and Technology Huainan232001 China School of Computer Science Huainan Normal University Huainan232001 China
In this paper, a frog-shaped ultra-wideband (UWB) multiple-input multiple-output (MIMO) antenna is proposed for 5G applications in the n77, n78, n79, and 6 GHz bands with a compact antenna structure of 31 × 55 &#... 详细信息
来源: 评论
A Survey on Enhancing Image Captioning with Advanced Strategies and Techniques
收藏 引用
computer Modeling in engineering & sciences 2025年 第3期142卷 2247-2280页
作者: Alaa Thobhani Beiji Zou Xiaoyan Kui Amr Abdussalam Muhammad Asim Sajid Shah Mohammed ELAffendi School of Computer Science and Engineering Central South UniversityChangsha410083China Electronic Engineering and Information Science Department University of Science and Technology of ChinaHefei230026China EIAS Data Science Lab College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia
Image captioning has seen significant research efforts over the last *** goal is to generate meaningful semantic sentences that describe visual content depicted in photographs and are syntactically *** real-world appl... 详细信息
来源: 评论
Deep hash networks with cross-scale feature fusion for optimal binary encoding
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第5-6期47卷 411-426页
作者: Li, Jie Hong, Chaoqun Huang, Pengcheng Wang, Xiaodong Ran, Lang School of Computer and Information Engineering Xiamen University of Technology Xiamen China
Deep Hashing is a technique used for retrieving images on a large-scale, encoding the latent code of images into binary codes, which significantly reduces computational and storage costs in image retrieval. This enabl... 详细信息
来源: 评论
Enhanced Deep Reinforcement Learning Strategy for Energy Management in Plug-in Hybrid Electric Vehicles with Entropy Regularization and Prioritized Experience Replay
收藏 引用
Energy engineering 2024年 第12期121卷 3953-3979页
作者: Li Wang Xiaoyong Wang School of Computer Science and Engineering Anhui University of Science&TechnologyHuainan232001China School of Information Engineering Huainan Union UniversityHuainan232001China
Plug-in Hybrid Electric Vehicles(PHEVs)represent an innovative breed of transportation,harnessing diverse power sources for enhanced *** management strategies(EMSs)that coordinate and control different energy sources ... 详细信息
来源: 评论
Data Hiding Methods Using Voting Strategy and Mapping Table
收藏 引用
Journal of Internet technology 2024年 第3期25卷 365-377页
作者: Chi, Hengxiao Chang, Chin-Chen Lin, Chia-Chen Department of Information Engineering and Computer Science Feng Chia University Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taiwan
With advancements in technology, the study of data hiding (DH) in images has become more and more important. In this paper, we introduce a novel data hiding scheme that employs a voting strategy to predict pixels base... 详细信息
来源: 评论
Extreme Learning Machine Soft-sensing Model of SMB Chromatographic Separation Process Based on Multi-strategy Fusion Coati Optimization Algorithm
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第2期52卷 447-463页
作者: Xing, Cheng Yang, Qing-Da Wang, Jie-Sheng ShuangGuan, Yi-Peng Sun, Yong-Cheng School of Electronic and Information Engineering University of Science and Technology Liaoning Anshan114044 China School of Electronic and Information Engineering University of Science and Technology Liaoning Anshan114051 China
Simulated Moving Bed (SMB) chromatographic separation technology is an innovative method that combines traditional fixed-bed adsorption operation with real moving bed (TMB) chromatographic separation technology. In or... 详细信息
来源: 评论
DAFPN-YOLO: An Improved UAV-Based Object Detection Algorithm Based on YOLOv8s
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1929-1949页
作者: Honglin Wang Yaolong Zhang Cheng Zhu School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing210044China School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China Electrical&Computer Engineering University of Illinois at Urbana-ChampaignUrbanaIL 61801USA
UAV-based object detection is rapidly expanding in both civilian and military applications,including security surveillance,disaster assessment,and border ***,challenges such as small objects,occlusions,complex backgro... 详细信息
来源: 评论
Gaining Technological Autonomy and Social-emotional Support: A Case Study of How and Why Chinese Older Adults Engage with a Semi-acquaintance Online Community
收藏 引用
Proceedings of the ACM on Human-computer Interaction 2024年 第CSCW2期8卷 1-35页
作者: Qian, Zhigu Fu, Jiaojiao Zhou, Yangfan School of Computer Science Fudan University Shanghai Key Laboratory of Intelligent Information Processing Shanghai China School of Information Science and Engineering East China University of Science and Technology Shanghai China
Older adults are often underserved and marginalized in technology engagement due to their reluctance and the barriers they face in adopting and engaging with mainstream technology. However, Pinxiaoquan, a social featu... 详细信息
来源: 评论
Adversarial multi-image steganography via texture evaluation and multi-scale image enhancement
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5793-5823页
作者: Li, Fengyong Li, Longwei Zeng, Yishu Yu, Jiang Qin, Chuan College of Computer Science and Technology Shanghai University of Electric Power Shanghai201306 China School of Information and Computer Shanghai Business School Shanghai201400 China School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai200092 China
Multi-image steganography refers to a data-hiding scheme where a user tries to hide confidential messages within multiple images. Different from the traditional steganography which only requires the security of an ind... 详细信息
来源: 评论
On the Security of Key-Aggregate Searchable Encryption
收藏 引用
Journal of Cyber Security and Mobility 2024年 第3期13卷 565-584页
作者: Wen, Jing Li, Haifeng Lan, Caihui School of Information Engineering Lanzhou City University Lanzhou730070 China School of Computer and Information Science Qinghai University of Science and Technology Xining810016 China Department of Information Technology Qinghai University Xining810016 China
The sharing of encrypted data in cloud computing is an essential functionality with countless applications in our everyday life. However, the issue of how to securely, efficiently and flexibly share encrypted data in ... 详细信息
来源: 评论