咨询与建议

限定检索结果

文献类型

  • 66,967 篇 会议
  • 42,897 篇 期刊文献
  • 1,075 册 图书

馆藏范围

  • 110,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 67,317 篇 工学
    • 42,670 篇 计算机科学与技术...
    • 34,635 篇 软件工程
    • 16,003 篇 信息与通信工程
    • 11,338 篇 控制科学与工程
    • 9,675 篇 电气工程
    • 9,195 篇 电子科学与技术(可...
    • 8,111 篇 生物工程
    • 6,719 篇 生物医学工程(可授...
    • 5,980 篇 光学工程
    • 4,861 篇 机械工程
    • 4,402 篇 化学工程与技术
    • 3,995 篇 动力工程及工程热...
    • 3,838 篇 仪器科学与技术
    • 3,606 篇 材料科学与工程(可...
    • 2,721 篇 网络空间安全
    • 2,652 篇 安全科学与工程
  • 40,534 篇 理学
    • 19,172 篇 数学
    • 13,661 篇 物理学
    • 9,404 篇 生物学
    • 6,473 篇 统计学(可授理学、...
    • 4,849 篇 化学
    • 4,390 篇 系统科学
  • 17,087 篇 管理学
    • 11,022 篇 管理科学与工程(可...
    • 6,582 篇 图书情报与档案管...
    • 5,175 篇 工商管理
  • 7,087 篇 医学
    • 5,703 篇 临床医学
    • 5,007 篇 基础医学(可授医学...
    • 3,000 篇 药学(可授医学、理...
    • 2,958 篇 公共卫生与预防医...
  • 3,203 篇 法学
    • 2,714 篇 社会学
  • 2,027 篇 经济学
  • 1,542 篇 农学
  • 1,179 篇 教育学
  • 562 篇 文学
  • 235 篇 军事学
  • 136 篇 艺术学
  • 19 篇 哲学
  • 16 篇 历史学

主题

  • 3,023 篇 accuracy
  • 2,744 篇 computer science
  • 2,627 篇 deep learning
  • 2,257 篇 machine learning
  • 2,075 篇 feature extracti...
  • 2,074 篇 computational mo...
  • 1,927 篇 training
  • 1,434 篇 optimization
  • 1,387 篇 predictive model...
  • 1,372 篇 internet of thin...
  • 1,333 篇 real-time system...
  • 1,308 篇 support vector m...
  • 1,287 篇 artificial intel...
  • 1,264 篇 convolutional ne...
  • 1,032 篇 neural networks
  • 1,005 篇 data models
  • 963 篇 data mining
  • 879 篇 wireless sensor ...
  • 857 篇 image segmentati...
  • 807 篇 security

机构

  • 1,098 篇 cavendish labora...
  • 1,027 篇 department of ph...
  • 979 篇 physikalisches i...
  • 968 篇 oliver lodge lab...
  • 703 篇 university of ch...
  • 580 篇 fakultät physik ...
  • 552 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 537 篇 department of ph...
  • 535 篇 school of physic...
  • 528 篇 imperial college...
  • 517 篇 h.h. wills physi...
  • 514 篇 nikhef national ...
  • 513 篇 stfc rutherford ...
  • 501 篇 school of physic...
  • 500 篇 physik-institut ...
  • 489 篇 department of el...
  • 489 篇 henryk niewodnic...
  • 482 篇 center for high ...
  • 479 篇 van swinderen in...

作者

  • 268 篇 a. gomes
  • 257 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 243 篇 c. amelung
  • 242 篇 g. bella
  • 242 篇 j. strandberg
  • 242 篇 d. calvet
  • 237 篇 beiter a.
  • 235 篇 s. chen
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 218 篇 boettcher t.
  • 217 篇 g. spigo
  • 217 篇 brundu d.
  • 217 篇 borsato m.
  • 214 篇 bencivenni g.

语言

  • 101,840 篇 英文
  • 7,627 篇 其他
  • 1,325 篇 中文
  • 201 篇 日文
  • 20 篇 德文
  • 14 篇 法文
  • 13 篇 朝鲜文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 2 篇 俄文
检索条件"机构=School of Computer Science and System Engineering Department"
110939 条 记 录,以下是721-730 订阅
排序:
Efficient tensor network contraction with GPU acceleration and parallel strategies  3
Efficient tensor network contraction with GPU acceleration a...
收藏 引用
3rd International Conference on Electronic Information engineering, Big Data, and computer Technology, EIBDCT 2024
作者: Xu, Wei Tong, Weiqin Liu, Xiaoyang School of Computer Engineering and Science Shanghai University China Department of Computer Science Rensselaer Polytechnic Institute United States
Tensor network contraction is a fundamental operation for dealing with high-dimensional data, which is now widely used in classical simulations of quantum circuits. To improve the performance of simulations, existing ... 详细信息
来源: 评论
Towards Intelligent Attendance Monitoring for Scalable Organization with Hybrid Model Using Deep Learning
Towards Intelligent Attendance Monitoring for Scalable Organ...
收藏 引用
International Conference on. Cryptology and Network Security with Machine Learning, ICCNSML 2023
作者: Srivastava, Akhilesh Kumar Mishra, Chandrahas Mishra, Anurag Srivastava, Atul Department of Computer Science and Engineering ABES Engineering College Ghaziabad India Department of Computer Science ABES Engineering College Ghaziabad India Department of Computer Science KIET Group of Institutions Ghaziabad India Amity School of Engineering and Technology AUUP Lucknow India
Face recognition technology using AI has seen paradigm shift in the evolving world. Automatic attendance monitoring using real-time face identification is a solution to handle attendance in any small/large as well as ... 详细信息
来源: 评论
Convergence of Deep Learning and Forensic Methodologies Using Self-attention Integrated EfficientNet Model for Deep Fake Detection
收藏 引用
SN computer science 2024年 第8期5卷 1-12页
作者: Singh, Rimjhim Padam Sree, Nichenametla Hima Reddy, Koti Leela Sai Praneeth Jashwanth, Kandukuri Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India
The immensely increasing number of Deepfake technologies poses significant challenges to digital media integrity, leading to the immediate need for effective Deepfake detection methods. In light of the growing threat ... 详细信息
来源: 评论
Learned, uncertainty-driven adaptive acquisition for photon-efficient scanning microscopy
收藏 引用
Optics Express 2025年 第6期33卷 12269-12287页
作者: Ye, Cassandra Tong Han, Jiashu Liu, Kunzan Angelopoulos, Anastasios Griffith, Linda Monakhova, Kristina You, Sixian The Department of Electrical Engineering and Computer Science CambridgeMA02139 United States Fu Foundation School of Engineering and Applied Science Columbia University in The City of New York New YorkNY10027 United States University of California Berkeley Department of Electrical Engineering and Computer Science BerkeleyCA94720 United States Department of Biological Engineering Massachusetts Institute of Technology CambridgeMA02139 United States
Scanning microscopy systems, such as confocal and multiphoton microscopy, are powerful imaging tools for probing deep into biological tissue. However, scanning systems have an inherent trade-off between acquisition ti... 详细信息
来源: 评论
Towards a lightweight security framework using blockchain and machine learning
收藏 引用
Blockchain(Research and Applications) 2024年 第1期5卷 107-118页
作者: Shereen Ismail Muhammad Nouman Diana W.Dawoud Hassan Reza School of Electrical Engineering and Computer Science University of North DakotaND 58202USA Department of Computer Science COMSATS University IslamabadIslamabad 44000Pakistan College of Engineering and Information Technology University of DubaiDubaiUnited Arab Emirates
Cyber-attacks pose a significant challenge to the security of Internet of Things(IoT)sensor networks,necessitating the development of robust countermeasures tailored to their unique characteristics and *** prevention ... 详细信息
来源: 评论
Deep Learning for Brain Stroke Disease Management: A Mapping Study
Deep Learning for Brain Stroke Disease Management: A Mapping...
收藏 引用
International Symposium on Automatic Control and Emerging Technologies, ACET 2023
作者: Barouhou, Annas Benhlima, Laila Bah, Slimane Elmaghraoui, Hajar Jaggour, Imane Belmoudden, Oumaima Computer Science Department Mohammadia School of Engineering Rabat Morocco Computer Science Department Mohammed V University in Rabat Rabat Morocco
The origin of the word "stroke" is based on the concept of receiving a sudden blow or impact, which reflects how quickly the symptoms of this illness can appear - people can be suddenly struck by it. A strok... 详细信息
来源: 评论
Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology
收藏 引用
computer Modeling in engineering & sciences 2024年 第6期139卷 3387-3415页
作者: Nazik Alturki Raed Alharthi Muhammad Umer Oumaima Saidani Amal Alshardan Reemah M.Alhebshi Shtwai Alsubai Ali Kashif Bashir Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia Department of Computer Science and Engineering University of Hafr Al-BatinHafar Al-BatinSaudi Arabia Department of Computer Science&Information Technology The Islamia University of BahawalpurBahawalpurPakistan Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-KharjSaudi Arabia Department of Computing and Mathematics Manchester Metropolitan UniversityManchesterUK Woxsen School of Business Woxsen UniversityHyderabadIndia Department of Computer Science and Mathematics Lebanese American UniversityBeirutLebanon
The concept of smart houses has grown in prominence in recent *** challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device **... 详细信息
来源: 评论
A Simple Algorithm to Secure Data Dissemination in Wireless Sensor Network  1
收藏 引用
1st International Conference on Machine Intelligence for Research and Innovations, MAiTRI 2023
作者: Sonai, Veeramani Bharathi, Indira Department of Computer Science and Engineering School of Engineering Shiv Nadar University Chennai Tamilnadu Chennai India School of Computer Science and Engineering Vellore Institute of Technology Tamilnadu Chennai India
Wireless sensor networks are heavily utilized in numerous applications in both industry and science. As the original data is transferred from the sensor node to the sink node, unauthorized individuals attempt to acces... 详细信息
来源: 评论
Combined Multi-Agent and Centralized Resource Allocation in Cloud Radio Access Networks
收藏 引用
IEEE Access 2025年 13卷 79098-79106页
作者: Rodoshi, Rehenuma Tasnim Nazib, Rezoan Ahmed Chun, Chanjun Choi, Wooyeol George Mason University Department of Computer Science Fairfax61452 United States Chosun University Department of Computer Engineering Gwangju61452 Korea Republic of Chung-Ang University School of Computer Science and Engineering Seoul06974 Korea Republic of
The fifth generation (5G) mobile network is designed to facilitate high data rates with massive connectivity with the benefit of small cell technology. The cloud radio access network (C-RAN) is a promising mobile netw... 详细信息
来源: 评论
FCA-based θ-iceberg core decomposition in graphs
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第2期15卷 1423-1428页
作者: Hao, Fei Xinchang, Khamphaphone Park, Doo-Soon Key Laboratory of Modern Teaching Technology Ministry of Education Xi’an China School of Computer Science Shaanxi Normal University Xi’an710119 China Department of Computer Science and Engineering Soonchunhyang University Asan31538 Korea Republic of Department of Computer Software Engineering Soonchunhyang University Asan31538 Korea Republic of
Complex networking analysis is a powerful technique for understanding both complex networks and big graphs in ubiquitous computing. Particularly, there are several novel metrics, such as k-clique and k-core are propos... 详细信息
来源: 评论