咨询与建议

限定检索结果

文献类型

  • 162,552 篇 会议
  • 89,664 篇 期刊文献
  • 1,640 册 图书

馆藏范围

  • 253,856 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 157,196 篇 工学
    • 97,345 篇 计算机科学与技术...
    • 79,107 篇 软件工程
    • 38,222 篇 信息与通信工程
    • 24,903 篇 控制科学与工程
    • 22,372 篇 电子科学与技术(可...
    • 21,203 篇 电气工程
    • 15,954 篇 生物工程
    • 13,266 篇 机械工程
    • 12,971 篇 光学工程
    • 11,485 篇 生物医学工程(可授...
    • 10,879 篇 化学工程与技术
    • 10,043 篇 仪器科学与技术
    • 8,541 篇 材料科学与工程(可...
    • 8,503 篇 动力工程及工程热...
    • 5,452 篇 交通运输工程
    • 5,258 篇 网络空间安全
    • 5,252 篇 安全科学与工程
  • 89,055 篇 理学
    • 43,532 篇 数学
    • 30,417 篇 物理学
    • 18,038 篇 生物学
    • 13,987 篇 统计学(可授理学、...
    • 10,981 篇 化学
    • 9,434 篇 系统科学
  • 38,923 篇 管理学
    • 24,627 篇 管理科学与工程(可...
    • 15,793 篇 图书情报与档案管...
    • 10,117 篇 工商管理
  • 10,945 篇 医学
    • 9,056 篇 临床医学
    • 7,917 篇 基础医学(可授医学...
    • 4,882 篇 药学(可授医学、理...
  • 6,050 篇 法学
    • 4,895 篇 社会学
  • 4,057 篇 经济学
  • 3,331 篇 农学
  • 2,619 篇 教育学
  • 1,054 篇 文学
  • 718 篇 军事学
  • 490 篇 艺术学
  • 34 篇 哲学
  • 25 篇 历史学

主题

  • 6,400 篇 feature extracti...
  • 5,784 篇 accuracy
  • 5,074 篇 deep learning
  • 4,992 篇 training
  • 4,783 篇 computational mo...
  • 4,677 篇 computer science
  • 3,935 篇 machine learning
  • 3,421 篇 optimization
  • 3,093 篇 data mining
  • 3,046 篇 predictive model...
  • 2,877 篇 semantics
  • 2,739 篇 data models
  • 2,686 篇 support vector m...
  • 2,674 篇 neural networks
  • 2,584 篇 real-time system...
  • 2,508 篇 internet of thin...
  • 2,501 篇 educational inst...
  • 2,428 篇 convolutional ne...
  • 2,223 篇 artificial intel...
  • 2,186 篇 wireless sensor ...

机构

  • 2,473 篇 school of comput...
  • 1,874 篇 school of inform...
  • 1,554 篇 university of ch...
  • 1,488 篇 school of comput...
  • 1,324 篇 school of comput...
  • 1,056 篇 cavendish labora...
  • 1,041 篇 physikalisches i...
  • 981 篇 department of ph...
  • 950 篇 school of comput...
  • 851 篇 oliver lodge lab...
  • 778 篇 school of comput...
  • 615 篇 department of co...
  • 607 篇 school of inform...
  • 559 篇 chitkara univers...
  • 552 篇 school of comput...
  • 535 篇 infn laboratori ...
  • 520 篇 school of inform...
  • 516 篇 university of sc...
  • 513 篇 nikhef national ...
  • 500 篇 school of comput...

作者

  • 324 篇 niyato dusit
  • 297 篇 yang yang
  • 250 篇 barter w.
  • 230 篇 wang wei
  • 221 篇 blake t.
  • 219 篇 s. chen
  • 217 篇 a. gomes
  • 215 篇 bellee v.
  • 212 篇 betancourt c.
  • 211 篇 bowcock t.j.v.
  • 210 篇 borsato m.
  • 206 篇 brundu d.
  • 203 篇 liu yang
  • 201 篇 amato s.
  • 201 篇 y. li
  • 197 篇 beiter a.
  • 196 篇 c. alexa
  • 191 篇 boettcher t.
  • 189 篇 j. m. izen
  • 185 篇 c. amelung

语言

  • 220,525 篇 英文
  • 27,501 篇 其他
  • 5,683 篇 中文
  • 492 篇 日文
  • 63 篇 德文
  • 58 篇 法文
  • 27 篇 斯洛文尼亚文
  • 21 篇 朝鲜文
  • 7 篇 俄文
  • 5 篇 阿拉伯文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
  • 1 篇 波兰文
检索条件"机构=School of Computer Science Engineering and Information Technology"
253856 条 记 录,以下是581-590 订阅
排序:
Differential Evolution Strategy with Chebyshev Chaos Based Mutation
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第1期9卷 613-628页
作者: Sitenda, Amos Song, Pei-Cheng Chu, Shu-Chuan Chen, Shi-Huang College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China Department of Computer Science and Information Engineering Shu-Te UniversityKaohsiung Kaohsiung824 Taiwan
Differential Evolution (DE) is a potent stochastic evolutionary optimization algorithm garnering increasing research attention. Over the years, it has been found applicable in solving diverse real-world problems. DE e... 详细信息
来源: 评论
Multi-parameter ultrasound imaging for musculoskeletal tissues based on a physics informed generative adversarial network
收藏 引用
Chinese Physics B 2025年 第4期34卷 442-455页
作者: Pengxin Wang Heyu Ma Tianyu Liu Chengcheng Liu Dan Li Dean Ta Institute of Biomedical Engineering&Technology Academy for Engineering and TechnologyFudan UniversityShanghai 200433China State Key Laboratory of Integrated Chips and Systems Fudan UniversityShanghai 201203China Department of Electronic Engineering School of Information Science and TechnologyFudan UniversityShanghai 200438China Department of Biomedical Engineering School of Information Science and TechnologyFudan UniversityShanghai 200438China
Full waveform inversion(FWI)has showed great potential in the detection of musculoskeletal ***,FWI is an ill-posed inverse problem and has a high requirement on the initial model during the imaging *** inaccurate init... 详细信息
来源: 评论
Optimizing photo-to-anime translation with prestyled paired datasets
收藏 引用
Multimedia Tools and Applications 2024年 第41期83卷 89393-89414页
作者: Chang, Chuan-Wang Dharmawan, Pratamagusta Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung Taiwan
Animation is a widespread artistic expression that holds a special place in people's hearts. Traditionally, animation creation has relied heavily on manual techniques, demanding skilled drawing abilities and a sig... 详细信息
来源: 评论
Reinforcement learning (RL)-based semantic segmentation and attention based backpropagation convolutional neural network (ABB-CNN) for breast cancer identification and classification using mammogram images
收藏 引用
Neural Computing and Applications 2024年 第24期36卷 14797-14823页
作者: Thakur, Neha Kumar, Pardeep Kumar, Amit Department of Computer Science & amp Engineering Jaypee University of Information Technology HP Solan India
Breast cancer poses a threat to women’s health and contributes to an increase in mortality rates. Mammography has proven to be an effective tool for the early detection of breast cancer. However, it faces many challe... 详细信息
来源: 评论
Blockchain-Enabled Mitigation Strategies for Distributed Denial of Service Attacks in IoT Sensor Networks:An Experimental Approach
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 3679-3705页
作者: Kithmini Godewatte Arachchige Mohsin Murtaza Chi-Tsun Cheng Bader M.Albahlal Cheng-Chi Lee Department of Engineering Technologies School of ScienceComputing and Engineering TechnologiesSwinburne UniversityMelbourne3122Australia School of Engineering Science Technology Engineering and Mathematics CollegeRMIT UniversityMelbourneVIC 3001Australia Department of Information Technology College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia Department of Library and Information Science Fu Jen Catholic UniversityNew Taipei City24205TaiwanChina Department of Computer Science and Information Engineering Asia UniversityTaichung City41354TaiwanChina
information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data commu... 详细信息
来源: 评论
Liver Tumor Prediction with Advanced Attention Mechanisms Integrated into a Depth-Based Variant Search Algorithm
收藏 引用
computers, Materials & Continua 2023年 第10期77卷 1209-1226页
作者: P.Kalaiselvi S.Anusuya Department of Computer Science and Engineering Saveetha School of EngineeringChennaiTamil Nadu602117India Information Technology Saveetha School of EngineeringChennaiTamil Nadu602117India
In recent days,Deep Learning(DL)techniques have become an emerging transformation in the field of machine learning,artificial intelligence,computer vision,and so ***,researchers and industries have been highly endorse... 详细信息
来源: 评论
An Improved Hybrid Deep Learning Approach for Security Requirements Classification
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4041-4067页
作者: Shoaib Hassan QianmuLi Muhammad Zubair Rakan AAlsowail Muhammad Umair School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing210094China Faculty of Information Technology and Computer Science University of Central PunjabLahore5400Pakistan Computer Skills Self-Development Skills DevelopmentDeanship of Common First YearKing Saud UniversityRiyadh11362Saudia Arabia
As the trend to use the latestmachine learning models to automate requirements engineering processes continues,security requirements classification is tuning into the most researched field in the software engineering ... 详细信息
来源: 评论
MTAGCN: Mixed Temporal Adaptive GCN for Air Pollution Prediction  20
MTAGCN: Mixed Temporal Adaptive GCN for Air Pollution Predic...
收藏 引用
20th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, ICNC-FSKD 2024
作者: Cheng, Yuxuan Wang, Zhanquan School of Information Science and Engineering Computer Technology East China University of Science and Technology Shanghai China
As a crucial issue for the advancement of intelligent urban centers, the urgent resolution of air pollution in urban areas is necessary. The essential task for accurate air pollution forecasting aims to aptly capture ... 详细信息
来源: 评论
Cross-modal retrieval of large-scale images in social media based on spatial distribution entropy
收藏 引用
International Journal of Web Based Communities 2024年 第1-2期20卷 88-101页
作者: Ding, Jie Zhao, Guotao Xu, Fang College of Technology Hubei Engineering University Xiaogan China School of Foreign Languages Hubei Engineering University Xiaogan China School of Computer and Information Science Hubei Engineering University Xiaogan China
In order to improve the cross-modal retrieval accuracy of large-scale social media images, a cross-modal retrieval method for large-scale social media images based on spatial distribution entropy is proposed. First, e... 详细信息
来源: 评论
Elevating Image Steganography:A Fusion of MSB Matching and LSB Substitution for Enhanced Concealment Capabilities
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2923-2943页
作者: Muhammad Zaman Ali Omer Riaz Hafiz Muhammad Hasnain Waqas Sharif Tenvir Ali Gyu Sang Choi Department of Information Technology The Islamia University of BahawalpurBahawalpur63100Pakistan Department of Computer Science The Islamia University of BahawalpurBahawalpur63100Pakistan School of Computer Science and Engineering Yeungnam UniversityGyeongbuk38541Korea
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential *** overcome these difficulties,different steganography and data encryption m... 详细信息
来源: 评论