咨询与建议

限定检索结果

文献类型

  • 141,479 篇 会议
  • 70,388 篇 期刊文献
  • 1,416 册 图书

馆藏范围

  • 213,282 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 129,311 篇 工学
    • 86,253 篇 计算机科学与技术...
    • 70,310 篇 软件工程
    • 31,541 篇 信息与通信工程
    • 20,943 篇 控制科学与工程
    • 16,576 篇 电气工程
    • 16,086 篇 电子科学与技术(可...
    • 14,811 篇 生物工程
    • 10,432 篇 生物医学工程(可授...
    • 10,356 篇 光学工程
    • 9,783 篇 机械工程
    • 7,106 篇 化学工程与技术
    • 7,034 篇 仪器科学与技术
    • 6,493 篇 动力工程及工程热...
    • 5,014 篇 材料科学与工程(可...
    • 4,778 篇 交通运输工程
    • 4,744 篇 网络空间安全
    • 4,691 篇 安全科学与工程
  • 70,824 篇 理学
    • 35,915 篇 数学
    • 21,650 篇 物理学
    • 16,607 篇 生物学
    • 11,833 篇 统计学(可授理学、...
    • 7,748 篇 系统科学
    • 7,719 篇 化学
  • 33,635 篇 管理学
    • 20,994 篇 管理科学与工程(可...
    • 13,972 篇 图书情报与档案管...
    • 9,080 篇 工商管理
  • 10,091 篇 医学
    • 8,167 篇 临床医学
    • 7,235 篇 基础医学(可授医学...
    • 4,447 篇 药学(可授医学、理...
  • 5,720 篇 法学
    • 4,776 篇 社会学
  • 3,492 篇 经济学
  • 2,529 篇 农学
  • 2,212 篇 教育学
  • 1,005 篇 文学
  • 460 篇 军事学
  • 355 篇 艺术学
  • 32 篇 哲学
  • 22 篇 历史学

主题

  • 6,146 篇 computer science
  • 5,440 篇 accuracy
  • 5,231 篇 feature extracti...
  • 4,807 篇 deep learning
  • 4,713 篇 computational mo...
  • 4,668 篇 training
  • 3,848 篇 machine learning
  • 3,027 篇 optimization
  • 2,951 篇 predictive model...
  • 2,834 篇 semantics
  • 2,624 篇 data models
  • 2,523 篇 real-time system...
  • 2,360 篇 neural networks
  • 2,336 篇 support vector m...
  • 2,323 篇 data mining
  • 2,314 篇 convolutional ne...
  • 2,102 篇 internet of thin...
  • 2,054 篇 artificial intel...
  • 1,893 篇 image segmentati...
  • 1,880 篇 educational inst...

机构

  • 2,488 篇 school of comput...
  • 2,226 篇 school of comput...
  • 2,087 篇 school of comput...
  • 1,831 篇 school of comput...
  • 1,524 篇 school of comput...
  • 1,501 篇 school of comput...
  • 1,369 篇 school of comput...
  • 1,339 篇 school of electr...
  • 1,265 篇 school of comput...
  • 1,077 篇 cavendish labora...
  • 1,032 篇 school of comput...
  • 981 篇 school of comput...
  • 974 篇 department of ph...
  • 915 篇 school of comput...
  • 883 篇 physikalisches i...
  • 876 篇 university of ch...
  • 870 篇 oliver lodge lab...
  • 564 篇 chitkara univers...
  • 545 篇 school of comput...
  • 542 篇 school of comput...

作者

  • 404 篇 niyato dusit
  • 268 篇 a. gomes
  • 262 篇 barter w.
  • 241 篇 c. alexa
  • 236 篇 j. m. izen
  • 235 篇 blake t.
  • 233 篇 s. chen
  • 226 篇 betancourt c.
  • 225 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 223 篇 bellee v.
  • 223 篇 boettcher t.
  • 222 篇 borsato m.
  • 220 篇 brundu d.
  • 215 篇 bencivenni g.
  • 213 篇 bay a.
  • 211 篇 g. bella
  • 208 篇 j. strandberg
  • 208 篇 d. calvet
  • 208 篇 c. amelung

语言

  • 175,280 篇 英文
  • 34,987 篇 其他
  • 3,278 篇 中文
  • 183 篇 日文
  • 38 篇 朝鲜文
  • 34 篇 德文
  • 29 篇 法文
  • 16 篇 斯洛文尼亚文
  • 5 篇 西班牙文
  • 4 篇 阿拉伯文
  • 3 篇 俄文
  • 2 篇 捷克文
  • 2 篇 荷兰文
  • 2 篇 土耳其文
检索条件"机构=School of Computer Science and Computer Engineering"
213283 条 记 录,以下是661-670 订阅
排序:
Prediction Model of the End-point Carbon Content in BOF by Constructing the Graph of Heats
收藏 引用
ISIJ International 2025年 第5期65卷 613-618页
作者: Ning, Wen Hongbing, Wang Li, Li Anjun, Xu School of Computer and Communication Engineering University of Science and Technology Beijing Beijing100083 China School of Metallurgical and Ecological Engineering University of Science and Technology Beijing Beijing100083 China
For the differences in composition and proportions of input materials, end-point quality requirements and slagging specifications, it is difficult to construct a generalized model to guide steelmaking production. Ther... 详细信息
来源: 评论
Solar-Powered Waterborne Debris Collector Equipped with Sprinkler System  2
Solar-Powered Waterborne Debris Collector Equipped with Spri...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Keerthika, C. Jenitha Blesy, A. Grace Gnanam, J. Narmadha, D. Sundar, G. Naveen School of Computer Science and Engineering Karunya Institute of Technology and Sciences Divison of Computer Science and Engineering Coimbatore India
Conventional machine models of water trash collection is here enhanced with the integration of sprinkler system. This enhanced model for water trash collection combines conventional methods integrated with a sprinkler... 详细信息
来源: 评论
Improving Robustness of Time-Aware Shaper in Time-Sensitive Networking
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 25211-25223页
作者: Ma, Yanying Zhang, Tong Feng, XiaoQin Liu, Ping Yang, Hao Ren, Fengyuan Lanzhou University School of Information Science and Engineering Lanzhou730000 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing211106 China School of Information Science and Engineering Lanzhou China Tsinghua University Department of Computer Science and Technology Lanzhou Beijing730000 and 100084 China
Deterministic delivery of scheduled traffic (ST) is critical in time-sensitive networking (TSN). The time-aware shaper (TAS) defined by IEEE 802.1Qbv is the enabler to ensure deterministic end-to-end delays of ST flow... 详细信息
来源: 评论
Occluded human pose estimation based on limb joint augmentation
收藏 引用
Neural Computing and Applications 2025年 第3期37卷 1241-1253页
作者: Han, Gangtao Song, Chunxiao Wang, Song Wang, Hao Chen, Enqing Wang, Guanghui School of Electrical and Information Engineering Zhengzhou University Zhengzhou China School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou China Department of Computer Science Toronto Metropolitan University Toronto Canada
Human pose estimation aims at locating the specific joints of humans from the images or videos. While existing deep learning-based methods have achieved high positioning accuracy, they often struggle with generalizati... 详细信息
来源: 评论
Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 719-738页
作者: Tajinder Kumar Purushottam Sharma Xiaochun Cheng Sachin Lalar Shubham Kumar Sandhya Bansal Computer Science&Engineering Department Jai Parkash Mukand Lal Innovative Engineering&Technology InstituteRadaur135133HaryanaIndia School of Computer Science&Engineering Galgotias UniversityGreater Noida203201Uttar PradeshIndia Computer Science Department Bay Campus Fabian WaySwansea UniversitySwanseaSA18ENUK Department of Engineering and Technology Gurugram UniversityGurugram122003India Presidency School of Computer Science Presidency UniversityBangalore560089India Maharishi Markendeshwar Engineering College Maharishi Markandeshwar(Deemed to be)UniversityMullanaAmbala133203India
With cloud computing,large chunks of data can be handled at a small ***,there are some reservations regarding the security and privacy of cloud data *** solving these issues and enhancing cloud computing security,this... 详细信息
来源: 评论
A Metaheuristic-Based Scientific Workflow Scheduling in IaaS Cloud  1
A Metaheuristic-Based Scientific Workflow Scheduling in IaaS...
收藏 引用
1st International Conference on Cognitive, Green and Ubiquitous Computing, IC-CGU 2024
作者: Jaiprakash, Sahani Pooja Badal, Tapas Gupta, Indrajeet Kumar, Naween School of Computer Science Engineering and Technology Bennett Univarsity Greater Noida India Department of Computer Science and Engineering Bhubaneswar India School of Computer Science Engineering and AI SR Univarsity Warangal India
As cloud data centres expand and provide more services, they consume more energy and cause challenges for the environment. To address this, there is a focus on energy-saving scheduling approaches in cloud computing. T... 详细信息
来源: 评论
A Collaborative Framework for Intrusion Detection in Cloud Computing Based on HLA-CNN-BiLSTM-SVM Model
A Collaborative Framework for Intrusion Detection in Cloud C...
收藏 引用
2024 Asian Conference on Intelligent Technologies, ACOIT 2024
作者: Mogal, Amit K. Sonaje, Vaibhav P. Department of Computer Science & Application School of Computer Science and Engineering Sandip University Nashik India
In addition to describing a way to make better use of preexisting computer infrastructures, the phrase "cloud computing" describes a technology that facilitates the sale of access to shared computer resource... 详细信息
来源: 评论
Proactive Caching at the Wireless Edge:A Novel Predictive User Popularity-Aware Approach
收藏 引用
computer Modeling in engineering & sciences 2024年 第8期140卷 1997-2017页
作者: Yunye Wan Peng Chen Yunni Xia Yong Ma Dongge Zhu Xu Wang Hui Liu Weiling Li Xianhua Niu Lei Xu Yumin Dong College of Computer Science Chongqing UniversityChongqing400044China School of Computer and Software Engineering Xihua UniversityChengdu610039China School of Computer and Information Engineering Jiangxi Normal UniversityNanchang330022China Electric Power Research Institute of State Grid Ningxia Electric Power Co. Ltd.Yinchuan750002China College of Mechanical and Vehicle Engineering Chongqing UniversityChongqing400030China School of Computer Science and Technology Beijing Institute of TechnologyBeijing100083China School of Computer Science and Technology Dongguan University of TechnologyDongguan523808China School of Emergency Management Xihua UniversityChengdu610039China College of Computer and Information Science Chongqing Normal UniversityChongqing401331China
Mobile Edge Computing(MEC)is a promising technology that provides on-demand computing and efficient storage services as close to end users as *** an MEC environment,servers are deployed closer to mobile terminals to e... 详细信息
来源: 评论
Research on lightweight pavement disease detection model based on YOLOv7
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 10573-10589页
作者: Wang, Chishe Li, Jun Wang, Jie Zhao, Weikang School of Computer Science and Engineering Anhui University of Science and Technology Huainan China Jinling Institute of Technology Nanjing China
Rapid urbanization has made road construction and maintenance imperative, but detecting road diseases has been time-consuming with limited accuracy. To overcome these challenges, we propose an efficient YOLOv7 road di... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论