咨询与建议

限定检索结果

文献类型

  • 66,058 篇 会议
  • 44,812 篇 期刊文献
  • 783 册 图书

馆藏范围

  • 111,653 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 70,320 篇 工学
    • 43,628 篇 计算机科学与技术...
    • 35,603 篇 软件工程
    • 16,244 篇 信息与通信工程
    • 10,759 篇 控制科学与工程
    • 9,353 篇 电气工程
    • 8,983 篇 电子科学与技术(可...
    • 7,574 篇 生物工程
    • 5,880 篇 化学工程与技术
    • 5,748 篇 光学工程
    • 5,687 篇 机械工程
    • 5,243 篇 生物医学工程(可授...
    • 4,028 篇 动力工程及工程热...
    • 3,983 篇 材料科学与工程(可...
    • 3,929 篇 仪器科学与技术
    • 2,580 篇 网络空间安全
    • 2,569 篇 交通运输工程
    • 2,399 篇 安全科学与工程
  • 39,926 篇 理学
    • 19,005 篇 数学
    • 13,470 篇 物理学
    • 8,621 篇 生物学
    • 6,286 篇 统计学(可授理学、...
    • 5,612 篇 化学
    • 3,844 篇 系统科学
  • 17,682 篇 管理学
    • 11,300 篇 管理科学与工程(可...
    • 7,028 篇 图书情报与档案管...
    • 4,465 篇 工商管理
  • 5,051 篇 医学
    • 4,058 篇 临床医学
    • 3,605 篇 基础医学(可授医学...
    • 2,203 篇 药学(可授医学、理...
  • 2,708 篇 法学
    • 2,212 篇 社会学
  • 1,808 篇 经济学
  • 1,394 篇 农学
  • 974 篇 教育学
  • 436 篇 文学
  • 260 篇 军事学
  • 209 篇 艺术学
  • 9 篇 哲学
  • 8 篇 历史学

主题

  • 2,821 篇 feature extracti...
  • 2,797 篇 accuracy
  • 2,510 篇 deep learning
  • 2,428 篇 training
  • 2,224 篇 computational mo...
  • 2,001 篇 computer science
  • 1,822 篇 machine learning
  • 1,607 篇 optimization
  • 1,419 篇 semantics
  • 1,379 篇 predictive model...
  • 1,187 篇 internet of thin...
  • 1,168 篇 data models
  • 1,153 篇 real-time system...
  • 1,137 篇 data mining
  • 1,135 篇 support vector m...
  • 1,121 篇 convolutional ne...
  • 1,110 篇 neural networks
  • 1,008 篇 image segmentati...
  • 935 篇 artificial intel...
  • 859 篇 security

机构

  • 2,473 篇 school of comput...
  • 1,538 篇 school of comput...
  • 1,378 篇 school of comput...
  • 1,093 篇 cavendish labora...
  • 1,019 篇 university of ch...
  • 1,014 篇 department of ph...
  • 993 篇 school of comput...
  • 951 篇 physikalisches i...
  • 948 篇 oliver lodge lab...
  • 825 篇 school of comput...
  • 691 篇 school of comput...
  • 573 篇 school of comput...
  • 539 篇 fakultät physik ...
  • 534 篇 horia hulubei na...
  • 530 篇 school of physic...
  • 527 篇 chitkara univers...
  • 527 篇 school of physic...
  • 516 篇 department of ph...
  • 511 篇 h.h. wills physi...
  • 509 篇 school of optica...

作者

  • 268 篇 niyato dusit
  • 265 篇 barter w.
  • 264 篇 a. gomes
  • 246 篇 c. alexa
  • 244 篇 j. m. izen
  • 237 篇 blake t.
  • 236 篇 g. bella
  • 236 篇 j. strandberg
  • 236 篇 c. amelung
  • 235 篇 beiter a.
  • 234 篇 d. calvet
  • 230 篇 bellee v.
  • 227 篇 s. chen
  • 226 篇 betancourt c.
  • 225 篇 bowcock t.j.v.
  • 225 篇 amato s.
  • 224 篇 brundu d.
  • 223 篇 boettcher t.
  • 222 篇 borsato m.
  • 213 篇 bencivenni g.

语言

  • 95,699 篇 英文
  • 13,841 篇 其他
  • 2,171 篇 中文
  • 69 篇 日文
  • 33 篇 德文
  • 32 篇 法文
  • 8 篇 朝鲜文
  • 8 篇 斯洛文尼亚文
  • 2 篇 阿拉伯文
  • 2 篇 荷兰文
  • 1 篇 西班牙文
检索条件"机构=School of Computer Science and Engineering Anhui University of Science and Technology"
111653 条 记 录,以下是4491-4500 订阅
排序:
Empowering Semantic Segmentation with Selective Frequency Enhancement and Attention Mechanism for Tampering Detection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 3270-3283页
作者: Xu, Xu Lv, Wenrui Wang, Wei Zhang, Yushu Chen, Junxin Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen518172 China Beijing Institute of Technology School of Medical Technology Beijing100081 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210016 China
Nowadays, massive amounts of multimedia contents are exchanged in our daily life, while tampered images are also flooding the social networks. Tampering detection is therefore becoming increasingly important for multi... 详细信息
来源: 评论
Semi-Supervised Classifier Ensemble with High-Quality Subspace for High-Dimensional Data  13
Semi-Supervised Classifier Ensemble with High-Quality Subspa...
收藏 引用
13th International Conference on Information science and technology, ICIST 2023
作者: Li, Guojie Yu, Zhiwen Yang, Kaixiang School of Computer Science & Engineering South China University of Technology Guangzhou China
Due to the noisy and high-dimensional character of the data combined with a small sample size, semi-supervised classification of high-dimensional data with few labeled samples is a significant problem in machine learn... 详细信息
来源: 评论
Heart Diagnosis Using Deep Neural Network  3
Heart Diagnosis Using Deep Neural Network
收藏 引用
3rd IEEE International Conference on Computational Intelligence and Knowledge Economy, ICCIKE 2023
作者: Mall, Shachi Singh, Jagendra Benett University School of Computer Science Engineering and Technology Greater Noida India
Worldwide, heart disease is the leading cause of mortality. By providing proper therapy, early identification of heart disease can lower the likelihood of the illness advancing to a more severe level. It is possible t... 详细信息
来源: 评论
Research and implementation of network impairment simulation system  23
Research and implementation of network impairment simulation...
收藏 引用
4th International Conference on Computing, Networks and Internet of Things, CNIOT 2023
作者: Zhang, Dongyan Xu, Yuanjun School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China
Network impairment simulation is designed to simulate different Internet network environments on a local area network(LAN) and provide testing environments for different services under various network conditions (late... 详细信息
来源: 评论
Detection of Cyber Attacks in Smart Grid Using Optimization and Deep Learning Techniques  14
Detection of Cyber Attacks in Smart Grid Using Optimization ...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Simonthomas, S. Subramanian, R. Pondicherry University School of Engineering and Technology Department of Computer Science Pondicherry India
Smart Grids are complex and interconnected systems that are vulnerable to cyber-attacks, which can result in severe consequences such as equipment damage, data theft, and power outages. Therefore, developing effective... 详细信息
来源: 评论
Utilizing Deep Learning in Pre-Clinical and Clinical Diagnosis of Peripheral Neuropathies
Utilizing Deep Learning in Pre-Clinical and Clinical Diagnos...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Singh, Akhilendra Pratap Kharbas, Vikas Kumar Mahajan, Prerna Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Vivekananda Global University Department of Computer Science & Application Jaipur India Department of Computer Science and Information Technology Bangalore India
Peripheral neuropathies are a group of problems that affect the peripheral frightened machine, often leading to a spread of symptoms and impairments. Diagnosis of these situations is frequently imprecise and time-cons... 详细信息
来源: 评论
FSKD: Detecting Fake News with Few-Shot Knowledge Distillation  9th
FSKD: Detecting Fake News with Few-Shot Knowledge Distillat...
收藏 引用
19th International Conference on Advanced Data Mining and Applications, ADMA 2023
作者: Yuan, Jing Chen, Chen Hou, Chunyan Yuan, Xiaojie College of Computer Science TKLNDST Nankai University Tianjin China School of Computer Science and Engineering Tianjin University of Technology Tianjin China
The detection of fake news on social networks is highly desirable and socially beneficial. In real scenarios, there are few labeled news articles and a large number of unlabeled articles. One prominent way is to consi... 详细信息
来源: 评论
Representation of Semantic Word Embeddings Based on SLDA and Word2vec Model
收藏 引用
Chinese Journal of Electronics 2023年 第3期32卷 647-654页
作者: TANG Huanling ZHU Hui WEI Hongmin ZHENG Han MAO Xueli LU Mingyu GUO Jin School of Computer Science and Technology Shandong Technology and Business University Co-innovation Center of Shandong Colleges and Universities: Future Intelligent Computing Key Laboratory of Intelligent Information Processing in Universities of Shandong Shandong Technology and Business University School of Information and Electronic Engineering Shandong Technology and Business University Information Science and Technology College Dalian Maritime University School of Computer and Information Technology Liaoning Normal University
To solve the problem of semantic loss in text representation, this paper proposes a new embedding method of word representation in semantic space called wt2svec based on supervised latent Dirichlet allocation(SLDA) an... 详细信息
来源: 评论
Prediction of Reliability of Data in Underwater Communication Network Using Fuzzy Logic
Prediction of Reliability of Data in Underwater Communicatio...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Yadav, Surendra Gobi, N. Yadav, Rakesh Kumar Vivekananda Global University Department of Computer Science & Application Jaipur India Department of Computer Science and Information Technology Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
This paper uses fuzzy logic to propose a reliability prediction set of rules for the underwater communication community. The set of rules uses fixed fuzzy rules to expect communication reliability among nodes in an un... 详细信息
来源: 评论
Touch Pointer Movement-Based PIN Entry in Smartphones to Assist Persons with Visual Impairments  3rd
Touch Pointer Movement-Based PIN Entry in Smartphones to A...
收藏 引用
3rd International Conference on "Emerging Trends and Technologies on Intelligent Systems" (ETTIS-2023)
作者: Balayogi, G. Kuppusamy, K.S. Department of Computer Science School of Engineering and Technology Pondicherry University Puducherry India
Usable security is an area of active research. Several factors needs to be considered while making the security usable. As the digital platforms have evolved into the primary source of information and service consumpt... 详细信息
来源: 评论