咨询与建议

限定检索结果

文献类型

  • 66,478 篇 会议
  • 42,857 篇 期刊文献
  • 1,071 册 图书

馆藏范围

  • 110,406 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 66,769 篇 工学
    • 42,331 篇 计算机科学与技术...
    • 34,364 篇 软件工程
    • 15,897 篇 信息与通信工程
    • 11,202 篇 控制科学与工程
    • 9,651 篇 电气工程
    • 9,163 篇 电子科学与技术(可...
    • 8,085 篇 生物工程
    • 6,659 篇 生物医学工程(可授...
    • 5,914 篇 光学工程
    • 4,833 篇 机械工程
    • 4,385 篇 化学工程与技术
    • 3,991 篇 动力工程及工程热...
    • 3,813 篇 仪器科学与技术
    • 3,587 篇 材料科学与工程(可...
    • 2,699 篇 网络空间安全
    • 2,634 篇 安全科学与工程
  • 40,308 篇 理学
    • 19,080 篇 数学
    • 13,571 篇 物理学
    • 9,381 篇 生物学
    • 6,433 篇 统计学(可授理学、...
    • 4,827 篇 化学
    • 4,387 篇 系统科学
  • 16,990 篇 管理学
    • 10,962 篇 管理科学与工程(可...
    • 6,543 篇 图书情报与档案管...
    • 5,130 篇 工商管理
  • 7,035 篇 医学
    • 5,638 篇 临床医学
    • 4,960 篇 基础医学(可授医学...
    • 3,000 篇 药学(可授医学、理...
    • 2,905 篇 公共卫生与预防医...
  • 3,181 篇 法学
    • 2,698 篇 社会学
  • 2,017 篇 经济学
  • 1,531 篇 农学
  • 1,148 篇 教育学
  • 562 篇 文学
  • 234 篇 军事学
  • 135 篇 艺术学
  • 19 篇 哲学
  • 16 篇 历史学

主题

  • 3,019 篇 accuracy
  • 2,742 篇 computer science
  • 2,599 篇 deep learning
  • 2,253 篇 machine learning
  • 2,070 篇 feature extracti...
  • 2,066 篇 computational mo...
  • 1,932 篇 training
  • 1,429 篇 optimization
  • 1,378 篇 predictive model...
  • 1,377 篇 internet of thin...
  • 1,324 篇 real-time system...
  • 1,302 篇 support vector m...
  • 1,286 篇 artificial intel...
  • 1,235 篇 convolutional ne...
  • 1,033 篇 neural networks
  • 999 篇 data models
  • 957 篇 data mining
  • 886 篇 wireless sensor ...
  • 831 篇 image segmentati...
  • 802 篇 security

机构

  • 1,094 篇 cavendish labora...
  • 1,025 篇 department of ph...
  • 979 篇 physikalisches i...
  • 966 篇 oliver lodge lab...
  • 702 篇 university of ch...
  • 578 篇 fakultät physik ...
  • 550 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 539 篇 department of ph...
  • 537 篇 school of physic...
  • 530 篇 imperial college...
  • 517 篇 h.h. wills physi...
  • 516 篇 nikhef national ...
  • 515 篇 stfc rutherford ...
  • 503 篇 school of physic...
  • 502 篇 physik-institut ...
  • 493 篇 henryk niewodnic...
  • 484 篇 center for high ...
  • 483 篇 department of el...
  • 479 篇 van swinderen in...

作者

  • 270 篇 a. gomes
  • 258 篇 barter w.
  • 250 篇 c. alexa
  • 248 篇 j. m. izen
  • 244 篇 c. amelung
  • 243 篇 g. bella
  • 243 篇 j. strandberg
  • 243 篇 d. calvet
  • 237 篇 beiter a.
  • 235 篇 s. chen
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 218 篇 boettcher t.
  • 217 篇 g. spigo
  • 217 篇 brundu d.
  • 217 篇 borsato m.
  • 214 篇 bencivenni g.

语言

  • 104,119 篇 英文
  • 4,851 篇 其他
  • 1,285 篇 中文
  • 200 篇 日文
  • 17 篇 德文
  • 16 篇 法文
  • 13 篇 朝鲜文
  • 7 篇 荷兰文
  • 4 篇 斯洛文尼亚文
  • 2 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=School of Computer Science and System Engineering Department"
110406 条 记 录,以下是151-160 订阅
排序:
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
IensNet: A novel and efficient approach for iris spoof detection via ensemble of deep models
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Sharma, Deepika Selwal, Arvind School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Department of Computer Science and Information Technology Central University of Jammu Samba India
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ... 详细信息
来源: 评论
Soft-GNN:towards robust graph neural networks via self-adaptive data utilization
收藏 引用
Frontiers of computer science 2025年 第4期19卷 1-12页
作者: Yao WU Hong HUANG Yu SONG Hai JIN National Engineering Research Center for Big Data Technology and System Service Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China College of Information and Communication National University of Defense TechnologyWuhan 430019China Department of Computer Science and Operations Research Universitéde MontréalMontreal H3C 3J7Canada
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h... 详细信息
来源: 评论
Decomposition-Based Memetic Algorithm for Multi-Objective Fleet Size and Mix Vehicle Routing Problem  13
Decomposition-Based Memetic Algorithm for Multi-Objective Fl...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Ba, Yunpeng Zheng, Ruihao Wang, Zhenkun School of System Design and Intelligent Manufacturing Southern University of Science and Technology Shenzhen China School of System Design and Intelligent Manufacturing Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen China
The heterogeneous fleet vehicle routing problem (HFVRP) is of great significance in logistics and transportation. This paper considers a crucial and challenging HFVRP variant, namely multi-objective fleet size and mix... 详细信息
来源: 评论
Advancements in Remote Sensing Image Dehazing: Introducing URA-Net with Multi-Scale Dense Feature Fusion Clusters and Gated Jump Connection
收藏 引用
computer Modeling in engineering & sciences 2024年 第9期140卷 2397-2424页
作者: Hongchi Liu Xing Deng Haijian Shao School of Computer Jiangsu University of Science and TechnologyZhenjiang212003China Department of Electrical and Computer Engineering University of NevadaLas Vegas89119USA
The degradation of optical remote sensing images due to atmospheric haze poses a significant obstacle,profoundly impeding their effective utilization across various *** methodologies have emerged as pivotal components... 详细信息
来源: 评论
A Hybrid WSVM-Levy Approach for Energy-Efficient Manufacturing Using Big Data and IoT
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 4895-4914页
作者: Surbhi Bhatia Khan Mohammad Alojail Mahesh Thyluru Ramakrishna Hemant Sharma School of Science Engineering and EnvironmentUniversity of SalfordManchesterM68HDUK University Centre for Research and Development Chandigarh UniversityMohali140307India Management Information System Department College of Business AdministrationKing Saud UniversityRiyadh11495Saudi Arabia Department of Computer Science and Engineering JAIN(Deemed-to-be University)Bangalore560030India Department of Computer Science and Engineering IES College of TechnologyBhopal462044India
In Intelligent Manufacturing,Big Data and industrial information enable enterprises to closely monitor and respond to precise changes in both internal processes and external environmental factors,ensuring more informe... 详细信息
来源: 评论
An Efficient Encryption and Compression of Sensed IoT Medical Images Using Auto-Encoder
收藏 引用
computer Modeling in engineering & sciences 2023年 第2期134卷 909-926页
作者: Passent El-kafrawy Maie Aboghazalah Abdelmoty M.Ahmed Hanaa Torkey Ayman El-Sayed School of Information Technology and Computer Science Nile UniversityGiza12677Egypt Math and Computer Science Department Faculty of ScienceMenoufia UniversityMenoufia32511Egypt Department of Computer Engineering College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia Computer Science and Engineering Department Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common *** ofmedical images is very important to secure patient *** these images consumes a lot of time onedge computing;theref... 详细信息
来源: 评论
Use of Euclidean Distance to Improve Fingerprint Matching Accuracy  4th
Use of Euclidean Distance to Improve Fingerprint Matching Ac...
收藏 引用
4th International Conference on Innovations in Computational Intelligence and computer Vision, ICICV 2024
作者: Bhargava, Neeraj Yadav, Rajendra Choudhary, Usha Department of Computer Science School of Engineering System Sciences MDS University Rajasthan Ajmer India Department of Computer and Communication Engineering Manipal University Jaipur Rajasthan Jaipur India
Fingerprint authentication is the most sophisticated method of all biometric techniques and has been thoroughly verified through various applications. Fingerprint matching has been done using several fingerprint recog... 详细信息
来源: 评论
Development of a machine learning model for predicting abnormalities of commercial airplanes
收藏 引用
Data science and Management 2024年 第3期7卷 256-265页
作者: Rossi Passarella Siti Nurmaini Muhammad Naufal Rachmatullah Harumi Veny Fara Nissya Nur Hafidzoh Department of Computer Engineering Faculty of Computer ScienceUniversitas Sriwijaya30662Indonesia Intelligent System Research Group(ISysRG) Faculty of Computer ScienceUniversitas Sriwijaya30662Indonesia Department of Informatics Faculty of Computer ScienceUniversitas Sriwijaya30662Indonesia College of Engineering Studies Universiti Teknologi MARA(UiTM)Shah Alam40450Malaysia
Airplanes are a social necessity for movement of humans,goods,and *** are generally safe modes of transportation;however,incidents and accidents occasionally *** prevent aviation accidents,it is necessary to develop a... 详细信息
来源: 评论
A Novel Self-Supervised Learning Network for Binocular Disparity Estimation
收藏 引用
computer Modeling in engineering & sciences 2025年 第1期142卷 209-229页
作者: Jiawei Tian Yu Zhou Xiaobing Chen Salman A.AlQahtani Hongrong Chen Bo Yang Siyu Lu Wenfeng Zheng Department of Computer Science and Engineering Major in Bio Artificial IntelligenceHanyang UniversityAnsan-si15577Republic of Korea School of Electrical and Computer Engineering Louisiana State UniversityBaton RougeLA 70803USA Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11574Saudi Arabia School of Automation University of Electronic Science and Technology of ChinaChengdu610054China
Two-dimensional endoscopic images are susceptible to interferences such as specular reflections and monotonous texture illumination,hindering accurate three-dimensional lesion reconstruction by surgical *** study prop... 详细信息
来源: 评论