咨询与建议

限定检索结果

文献类型

  • 6,207 篇 期刊文献
  • 6,064 篇 会议
  • 177 册 图书

馆藏范围

  • 12,448 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,665 篇 工学
    • 4,671 篇 计算机科学与技术...
    • 3,709 篇 软件工程
    • 1,503 篇 信息与通信工程
    • 1,245 篇 控制科学与工程
    • 868 篇 电气工程
    • 832 篇 生物工程
    • 780 篇 电子科学与技术(可...
    • 615 篇 生物医学工程(可授...
    • 558 篇 光学工程
    • 534 篇 机械工程
    • 426 篇 化学工程与技术
    • 406 篇 仪器科学与技术
    • 367 篇 动力工程及工程热...
    • 352 篇 材料科学与工程(可...
    • 313 篇 核科学与技术
    • 295 篇 力学(可授工学、理...
  • 5,906 篇 理学
    • 3,307 篇 数学
    • 1,892 篇 物理学
    • 983 篇 生物学
    • 980 篇 统计学(可授理学、...
    • 715 篇 系统科学
    • 480 篇 化学
    • 268 篇 地球物理学
  • 1,781 篇 管理学
    • 1,131 篇 管理科学与工程(可...
    • 698 篇 图书情报与档案管...
    • 520 篇 工商管理
  • 588 篇 医学
    • 491 篇 临床医学
    • 444 篇 基础医学(可授医学...
    • 273 篇 药学(可授医学、理...
  • 328 篇 法学
    • 275 篇 社会学
  • 219 篇 经济学
  • 148 篇 农学
  • 98 篇 教育学
  • 50 篇 文学
  • 31 篇 军事学
  • 21 篇 艺术学
  • 1 篇 哲学

主题

  • 279 篇 computer science
  • 242 篇 deep learning
  • 212 篇 mathematics
  • 208 篇 machine learning
  • 199 篇 computational mo...
  • 182 篇 feature extracti...
  • 168 篇 accuracy
  • 139 篇 optimization
  • 126 篇 educational inst...
  • 124 篇 predictive model...
  • 114 篇 neural networks
  • 106 篇 support vector m...
  • 105 篇 data mining
  • 104 篇 artificial intel...
  • 101 篇 training
  • 96 篇 image segmentati...
  • 95 篇 internet of thin...
  • 87 篇 decision making
  • 85 篇 authentication
  • 80 篇 semantics

机构

  • 413 篇 department for p...
  • 409 篇 faculty of scien...
  • 396 篇 department of ph...
  • 396 篇 kirchhoff-instit...
  • 387 篇 department of ph...
  • 385 篇 department of ph...
  • 358 篇 fakultät für phy...
  • 345 篇 institute of phy...
  • 326 篇 institute of phy...
  • 309 篇 department of ph...
  • 281 篇 department of ph...
  • 277 篇 instituto de fís...
  • 272 篇 department of ph...
  • 271 篇 graduate school ...
  • 270 篇 universidade fed...
  • 268 篇 ictp trieste
  • 254 篇 department of ph...
  • 251 篇 department of ph...
  • 249 篇 nikhef national ...
  • 248 篇 department of ph...

作者

  • 333 篇 c. alexa
  • 333 篇 g. bella
  • 333 篇 d. calvet
  • 333 篇 c. amelung
  • 331 篇 j. strandberg
  • 331 篇 g. spigo
  • 330 篇 j. m. izen
  • 330 篇 f. siegert
  • 322 篇 r. ströhmer
  • 322 篇 m. rijssenbeek
  • 322 篇 s. jin
  • 322 篇 g. gaudio
  • 321 篇 s. mohapatra
  • 307 篇 s. guindon
  • 305 篇 y. tayalati
  • 293 篇 a. kaczmarska
  • 287 篇 m. klein
  • 281 篇 j. schaarschmidt
  • 263 篇 a. d. pilkington
  • 262 篇 f. pastore

语言

  • 10,784 篇 英文
  • 1,530 篇 其他
  • 138 篇 中文
  • 2 篇 西班牙文
  • 2 篇 日文
  • 2 篇 俄文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Engineering Computer Science and Mathematics"
12448 条 记 录,以下是101-110 订阅
排序:
Watermarking technique for document images using discrete curvelet transform and discrete cosine transform
收藏 引用
Multimedia Tools and Applications 2024年 第40期83卷 87647-87671页
作者: Singh, Balkar Sharma, M.K. Post Graduate Department of Computer Science Gujranwala Guru Nanak Khalsa College Punjab Ludhiana India School of Mathematics Thapar Institute of Engineering and Technology Punjab Patiala India
In this paper, a watermarking technique based on discrete curvelet transform and discrete cosine trans- form is proposed to protect the color document images. The six layers of the document image are created using the... 详细信息
来源: 评论
A Spectral Convolutional Neural Network Model Based on Adaptive Fick’s Law for Hyperspectral Image Classification
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 19-46页
作者: Tsu-Yang Wu Haonan Li Saru Kumari Chien-Ming Chen School of Artificial Intelligence(School of Future Technology) Nanjing University of Information Science&TechnologyNanjing210044China College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China Department of Mathematics Chaudhary Charan Singh UniversityMeerutUttar Pradesh250004India
Hyperspectral image classification stands as a pivotal task within the field of remote sensing,yet achieving highprecision classification remains a significant *** response to this challenge,a Spectral Convolutional N... 详细信息
来源: 评论
UAMP-Based Delay-Doppler Channel Estimation for OTFS Systems
收藏 引用
China Communications 2024年 第10期21卷 1-15页
作者: Li Zhongjie Yuan Weijie Guo Qinghua Wu Nan Zhang Ji Department of Electronic and Electrical Engineering Southern University of Science and TechonologyShenzhen 518055China School of Electrical Computer and Telecommunications EngineeringUniversity of WollongongWollongongNSW 2522Australia School of Integrated Circuits and Electronics Beijing Institute of TechnologyBeijing 100081China School of Mathematics and Statistics Henan University of Science and TechnologyLuoyang 471000China
Orthogonal time frequency space(OTFS)technique, which modulates data symbols in the delayDoppler(DD) domain, presents a potential solution for supporting reliable information transmission in highmobility vehicular net... 详细信息
来源: 评论
Predicting Interpersonal Influence from Conversational Features  10
Predicting Interpersonal Influence from Conversational Featu...
收藏 引用
10th IEEE International Conference on Behavioural and Social Computing, BESC 2023
作者: Gassmann, Luke McConville, Ryan Edwards, Matthew University of Bristol School of Computer Science School of Engineering Mathematics and Technology Bristol United Kingdom
Interpersonal influence has a radical impact on the dissemination of information in online social media. Methods for measuring this influence between online conversation partners are often over-reliant on platform-lev... 详细信息
来源: 评论
ESM-LSTM based optimisation model for weather prediction  5
ESM-LSTM based optimisation model for weather prediction
收藏 引用
5th International Conference on Big Data and Artificial Intelligence and Software engineering, ICBASE 2024
作者: Luo, Guilan Wang, Long Zeng, Yongwang Chen, Zijie Wen, Shuzhen Zhang, Mei Dali University School of Mathematics and Computer Science Yunnan Dali China Dali University School of Engineering Yunnan Dali China
This study introduces an optimized prediction model based on the integration of the Event Synchronization Method (ESM) and Long Short-Term Memory (LSTM). The primary objective is to address the limitations inherent in... 详细信息
来源: 评论
Deep Learning-Powered Camouflaged Object Recognition Model  2
Deep Learning-Powered Camouflaged Object Recognition Model
收藏 引用
2nd IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2024
作者: Tomar, Riya Chauhan, Naman Chauhan, Chhavi Tomar, Yash Singh, Soumyendra Chauhan, Nishant Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Chennai India University of Petroleum and Energy Studies School of Computer Science Dehradun India Cmr University Department of Computer Science and Engineering Bengaluru India Amrita School of Engineering Amrita Vishwa Vidyapeetham Department of Mathematics Chennai India Amity School of Engineering and Technology Amity University Department of Computer Science and Engineering Noida India
This research paper delves into the intersection of advanced technology and military strategies, specifically focusing on the imperative task of camouflaged object detection within the Indian Paramilitary forces. Leve... 详细信息
来源: 评论
Distributed Online Optimization with Long-Term Constraints and Bandit Feedback: An Event-Triggered Approach  7th
Distributed Online Optimization with Long-Term Constraints ...
收藏 引用
7th Chinese Conference on Swarm Intelligence and Cooperative Control, CCSICC 2023
作者: Zhang, Difeng Feng, Zhangcheng Yang, Shaofu Xu, Wenying School of Mathematics Southeast University Nanjing211189 China School of Computer Science and Engineering Southeast University Nanjing21189 China
This paper considers the distributed online optimization problem (DOO) with long-term constraints (LTC) and bandit feedback under a time-varying communication network, where the cost function is time-varying and only ... 详细信息
来源: 评论
Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第2期15卷 1327-1337页
作者: Jiang, Han Xu, Qiuliang Liu, Changyuan Zheng, Zhihua Tang, Yi Wang, Mingqiang School of Computer Science and Technology ShanDong University Jinan China ShanDong Dazhong News Group Jinan China School of Information Science and Engineering Shandong Normal University Jinan China Department of Mathematics Guangzhou University Guangzhou China School of Mathematics ShanDong University Jinan China
In secure two-party computation protocols, the cut-and-choose paradigm is used to prevent the malicious party who constructs the garbled circuits from cheating. In previous realization of the cut-and-choose technique ...
来源: 评论
Fuzzy control design for time-delay systems under adaptive event-triggered mechanism
收藏 引用
Neural Computing and Applications 2024年 第9期36卷 4727-4739页
作者: Du, Zhenbin Qu, Zifang Kao, Yonggui Wu, Zhaojing School of Computer and Control Engineering Yantai University Shandong Yantai264005 China School of Mathematics and Information Science Shandong Technology and Business University Shandong Yantai264005 China Department of Mathematics Harbin Institute of Technology Weihai264209 China School of Mathematics and Information Sciences Yantai University Shandong Yantai264005 China
This manuscript studies the fuzzy H∞ control design problem for nonlinear time-varying delay systems in fuzzy form via adaptive event-triggered mechanism. The fuzzy model and an adaptive event-triggered controller ar... 详细信息
来源: 评论
A Key Node Identification Algorithm in Social Networks Based on Global Betweenness Entropy  5
A Key Node Identification Algorithm in Social Networks Based...
收藏 引用
5th International Conference on Big Data and Artificial Intelligence and Software engineering, ICBASE 2024
作者: Luo, Guilan Wen, Shuzhen Wang, Caikui Wang, Long Zeng, Yongwang Chen, Zijie Dali University School of Mathematics and Computer Science Yunnan Dali China Dali University School of Engineering Yunnan Dali China
As social networks continue to develop, accurately identifying key nodes has become crucial. Existing centrality algorithms often rely on local network structures and are susceptible to changes in the degree of indivi... 详细信息
来源: 评论