咨询与建议

限定检索结果

文献类型

  • 114,528 篇 会议
  • 61,275 篇 期刊文献
  • 1,133 册 图书
  • 1 篇 学位论文

馆藏范围

  • 176,937 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 109,260 篇 工学
    • 76,176 篇 计算机科学与技术...
    • 62,332 篇 软件工程
    • 25,583 篇 信息与通信工程
    • 16,365 篇 控制科学与工程
    • 12,066 篇 生物工程
    • 11,913 篇 电气工程
    • 11,482 篇 电子科学与技术(可...
    • 8,555 篇 机械工程
    • 8,105 篇 光学工程
    • 8,053 篇 生物医学工程(可授...
    • 5,740 篇 化学工程与技术
    • 5,499 篇 仪器科学与技术
    • 4,805 篇 动力工程及工程热...
    • 3,950 篇 网络空间安全
    • 3,732 篇 交通运输工程
    • 3,624 篇 安全科学与工程
    • 3,506 篇 材料科学与工程(可...
  • 59,220 篇 理学
    • 31,519 篇 数学
    • 16,759 篇 物理学
    • 13,416 篇 生物学
    • 10,013 篇 统计学(可授理学、...
    • 6,108 篇 化学
    • 5,999 篇 系统科学
  • 30,427 篇 管理学
    • 18,596 篇 管理科学与工程(可...
    • 13,130 篇 图书情报与档案管...
    • 7,411 篇 工商管理
  • 7,411 篇 医学
    • 6,099 篇 临床医学
    • 5,373 篇 基础医学(可授医学...
    • 3,284 篇 药学(可授医学、理...
  • 4,655 篇 法学
    • 3,788 篇 社会学
  • 2,851 篇 经济学
  • 2,252 篇 农学
  • 2,016 篇 教育学
  • 781 篇 文学
  • 402 篇 艺术学
  • 401 篇 军事学
  • 28 篇 历史学
  • 26 篇 哲学

主题

  • 5,002 篇 feature extracti...
  • 5,000 篇 computer science
  • 4,318 篇 accuracy
  • 4,079 篇 training
  • 3,993 篇 computational mo...
  • 3,812 篇 deep learning
  • 2,978 篇 semantics
  • 2,923 篇 machine learning
  • 2,508 篇 optimization
  • 2,439 篇 data mining
  • 2,330 篇 predictive model...
  • 2,212 篇 data models
  • 1,967 篇 neural networks
  • 1,924 篇 support vector m...
  • 1,786 篇 image segmentati...
  • 1,734 篇 real-time system...
  • 1,719 篇 convolutional ne...
  • 1,699 篇 educational inst...
  • 1,641 篇 internet of thin...
  • 1,597 篇 algorithm design...

机构

  • 2,918 篇 school of comput...
  • 2,477 篇 school of comput...
  • 1,591 篇 school of comput...
  • 1,524 篇 school of comput...
  • 1,362 篇 school of comput...
  • 1,355 篇 school of comput...
  • 1,312 篇 school of comput...
  • 1,276 篇 school of comput...
  • 1,122 篇 school of comput...
  • 1,099 篇 department of co...
  • 1,069 篇 cavendish labora...
  • 1,037 篇 university of ch...
  • 978 篇 department of ph...
  • 961 篇 school of comput...
  • 880 篇 oliver lodge lab...
  • 872 篇 physikalisches i...
  • 835 篇 school of comput...
  • 805 篇 school of comput...
  • 703 篇 school of comput...
  • 692 篇 college of compu...

作者

  • 266 篇 niyato dusit
  • 256 篇 barter w.
  • 252 篇 a. gomes
  • 231 篇 blake t.
  • 227 篇 c. alexa
  • 226 篇 bowcock t.j.v.
  • 225 篇 s. chen
  • 224 篇 j. m. izen
  • 223 篇 bellee v.
  • 223 篇 amato s.
  • 221 篇 betancourt c.
  • 217 篇 brundu d.
  • 217 篇 borsato m.
  • 215 篇 boettcher t.
  • 214 篇 beiter a.
  • 210 篇 bencivenni g.
  • 209 篇 g. bella
  • 209 篇 j. strandberg
  • 208 篇 bay a.
  • 205 篇 d. calvet

语言

  • 162,899 篇 英文
  • 10,435 篇 其他
  • 3,604 篇 中文
  • 176 篇 日文
  • 15 篇 德文
  • 15 篇 法文
  • 10 篇 朝鲜文
  • 9 篇 斯洛文尼亚文
  • 5 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
检索条件"机构=School of Computer and Technology Science and Technology"
176937 条 记 录,以下是281-290 订阅
排序:
Optimizing wireless sensor network topology with node load consideration
收藏 引用
虚拟现实与智能硬件(中英文) 2025年 第1期7卷 47-61页
作者: Ruizhi CHEN School of Computer Engineering Zhanjiang University of Science and TechnologyZhanjiang 524094China
Background With the development of the Internet,the topology optimization of wireless sensor networks has received increasing ***,traditional optimization methods often overlook the energy imbalance caused by node loa... 详细信息
来源: 评论
Braille Character Segmentation Algorithm Based on Gaussian Diffusion
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1481-1496页
作者: Zezheng Meng Zefeng Cai Jie Feng Hanjie Ma Haixiang Zhang Shaohua Li School of Computer Science and Technology Zhejiang Sci-Tech UniversityHangzhou310018China
Optical braille recognition methods typically employ existing target detection models or segmentation modelsfor the direct detection and recognition of braille characters in original braille images. However, these met... 详细信息
来源: 评论
Byzantine Robust Federated Learning Scheme Based on Backdoor Triggers
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2813-2831页
作者: Zheng Yang Ke Gu Yiming Zuo School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China
Federated learning is widely used to solve the problem of data decentralization and can provide privacy protectionfor data owners. However, since multiple participants are required in federated learning, this allows a... 详细信息
来源: 评论
GMS:A Novel Method for Detecting Reentrancy Vulnerabilities in Smart Contracts
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2207-2220页
作者: Dawei Xu Fan Huang Jiaxin Zhang Yunfang Liang Baokun Zheng Jian Zhao School of Computer Science Changchun UniversityChangchun130012China School of Computer Science and Technology Beijing Institute of TechnologyBeijing100081China School of InformationManagement for Law China University of Political Science and LawBeijing102249China
With the rapid proliferation of Internet ofThings(IoT)devices,ensuring their communication security has become increasingly *** and smart contract technologies,with their decentralized nature,provide strong security g... 详细信息
来源: 评论
Vision-Text Bidirectional Collaborative Image Captioning Algorithm
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第2期52卷 515-523页
作者: Li, Mei-Qi Zhou, Zi-Wei School of Computer Science and Software Engineering University of Science and Technology LiaoNing Anshan114051 China
Image captioning is an interdisciplinary research hotspot at the intersection of computer vision and natural language processing, representing a multimodal task that integrates core technologies from both fields. This... 详细信息
来源: 评论
Semi-Supervised Skin Lesion Segmentation Based on Pseudo-Labels
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第2期52卷 325-332页
作者: Mu, Bo Wei, JingXin Zhang, Yujun School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
In recent years, deep learning has significantly advanced skin lesion segmentation. However, annotating medical image data is specialized and costly, while obtaining unlabeled medical data is easier. To address this c... 详细信息
来源: 评论
A Systematic Review and Performance Evaluation of Open-Source Tools for Smart Contract Vulnerability Detection
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 995-1032页
作者: Yaqiong He Jinlin Fan Huaiguang Wu School of Computer Science and Technology Zhengzhou University of Light IndustryZhengzhou450001China
With the rise of blockchain technology,the security issues of smart contracts have become increasingly *** the availability of numerous smart contract vulnerability detection tools,many face challenges such as slow up... 详细信息
来源: 评论
Efficient breast cancer detection using neural networks and explainable artificial intelligence
收藏 引用
Neural Computing and Applications 2025年 第5期37卷 3759-3776页
作者: Murugan, Tamilarasi Kathirvel Karthikeyan, Pritikaa Sekar, Pavithra School of Computer Science Engineering Vellore Institute of Technology Tamilnadu Chennai India
The growing dependence on deep learning models for medical diagnosis underscores the critical need for robust interpretability and transparency to instill trust and ensure responsible usage. This study investigates th... 详细信息
来源: 评论
Enhance the Performance of Directional Feature-based Palmprint Recognition by Directional Response Stability Measurement
收藏 引用
Machine Intelligence Research 2024年 第3期21卷 597-614页
作者: Haitao Wang Wei Jia School of Computer Science and Information Engineering Hefei University of TechnologyHefei230009China
Palmprint recognition is an emerging biometrics technology that has attracted increasing attention in recent years. Many palmprint recognition methods have been proposed, including traditional methods and deep learnin... 详细信息
来源: 评论
YOLO-VSI: An Improved YOLOv8 Model for Detecting Railway Turnouts Defects in Complex Environments
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 3261-3280页
作者: Chenghai Yu Zhilong Lu School of Computer Science and Technology Zhejiang Sci-Tech UniversityHangzhou310018China
Railway turnouts often develop defects such as chipping,cracks,and wear during *** not detected and addressed promptly,these defects can pose significant risks to train operation safety and passenger *** advances in d... 详细信息
来源: 评论