咨询与建议

限定检索结果

文献类型

  • 13,864 篇 期刊文献
  • 12,740 篇 会议
  • 385 册 图书

馆藏范围

  • 26,988 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 15,401 篇 工学
    • 9,459 篇 计算机科学与技术...
    • 7,321 篇 软件工程
    • 2,858 篇 信息与通信工程
    • 2,310 篇 控制科学与工程
    • 1,756 篇 电气工程
    • 1,555 篇 电子科学与技术(可...
    • 1,479 篇 生物工程
    • 1,090 篇 生物医学工程(可授...
    • 964 篇 机械工程
    • 926 篇 光学工程
    • 918 篇 化学工程与技术
    • 793 篇 材料科学与工程(可...
    • 793 篇 动力工程及工程热...
    • 732 篇 仪器科学与技术
    • 674 篇 力学(可授工学、理...
    • 486 篇 土木工程
    • 458 篇 建筑学
  • 13,546 篇 理学
    • 8,426 篇 数学
    • 4,126 篇 物理学
    • 2,288 篇 统计学(可授理学、...
    • 1,796 篇 生物学
    • 1,433 篇 系统科学
    • 1,040 篇 化学
    • 707 篇 地球物理学
  • 3,572 篇 管理学
    • 2,245 篇 管理科学与工程(可...
    • 1,452 篇 图书情报与档案管...
    • 1,074 篇 工商管理
  • 992 篇 医学
    • 841 篇 临床医学
    • 735 篇 基础医学(可授医学...
  • 565 篇 法学
    • 487 篇 社会学
  • 456 篇 经济学
  • 317 篇 农学
  • 250 篇 教育学
  • 87 篇 文学
  • 62 篇 军事学
  • 40 篇 艺术学
  • 14 篇 哲学
  • 6 篇 历史学

主题

  • 743 篇 computer science
  • 541 篇 mathematics
  • 341 篇 deep learning
  • 293 篇 computational mo...
  • 262 篇 accuracy
  • 259 篇 machine learning
  • 252 篇 optimization
  • 227 篇 support vector m...
  • 199 篇 feature extracti...
  • 195 篇 training
  • 191 篇 internet of thin...
  • 190 篇 educational inst...
  • 182 篇 artificial intel...
  • 178 篇 data mining
  • 174 篇 neural networks
  • 162 篇 approximation al...
  • 159 篇 image segmentati...
  • 149 篇 galaxies
  • 131 篇 computer archite...
  • 125 篇 application soft...

机构

  • 404 篇 faculty of scien...
  • 388 篇 department for p...
  • 384 篇 department of ph...
  • 381 篇 department of ph...
  • 359 篇 department of ph...
  • 323 篇 kirchhoff-instit...
  • 308 篇 department of ph...
  • 284 篇 institute of phy...
  • 283 篇 fakultät für phy...
  • 279 篇 department of ph...
  • 272 篇 instituto de fís...
  • 271 篇 department of ph...
  • 266 篇 institute of phy...
  • 264 篇 universidade fed...
  • 263 篇 ictp trieste
  • 254 篇 nikhef national ...
  • 250 篇 department of ph...
  • 248 篇 department of ph...
  • 246 篇 department of ph...
  • 242 篇 school of physic...

作者

  • 331 篇 c. alexa
  • 328 篇 j. m. izen
  • 324 篇 g. bella
  • 323 篇 d. calvet
  • 323 篇 c. amelung
  • 322 篇 j. strandberg
  • 317 篇 g. spigo
  • 315 篇 f. siegert
  • 306 篇 r. ströhmer
  • 303 篇 m. rijssenbeek
  • 302 篇 s. jin
  • 300 篇 g. gaudio
  • 294 篇 s. mohapatra
  • 291 篇 y. tayalati
  • 277 篇 m. klein
  • 255 篇 s. guindon
  • 252 篇 f. pastore
  • 243 篇 n. orlando
  • 239 篇 a. kaczmarska
  • 225 篇 j. schaarschmidt

语言

  • 23,731 篇 英文
  • 2,990 篇 其他
  • 265 篇 中文
  • 8 篇 德文
  • 7 篇 法文
  • 6 篇 西班牙文
  • 5 篇 俄文
  • 4 篇 日文
  • 4 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 意大利文
检索条件"机构=Science Technology Mathematics Computer Science"
26989 条 记 录,以下是291-300 订阅
排序:
Temporal pattern mining from user-generated content
收藏 引用
Digital Communications and Networks 2022年 第6期8卷 1027-1039页
作者: Adnan Ali Jinlong Li Huanhuan Chen Ali Kashif Bashir School of Computer Science and Technology University of Science and Technology of ChinaHefei230026AnhuiChina Department of Computing and Mathematics Manchester Metropolitan UniversityManchesterM156BHUnited Kingdom Department of Computer Science and Mathematics Lebanese American UniversityBeirutLebanon Woxsen School of Business Woxsen UniversityIndia
Faster internet, IoT, and social media have reformed the conventional web into a collaborative web resulting in enormous user-generated content. Several studies are focused on such content;however, they mainly focus o... 详细信息
来源: 评论
Modelling Smart Grid Instability Against Cyber Attacks in SCADA System Networks
Lecture Notes on Data Engineering and Communications Technol...
收藏 引用
Lecture Notes on Data Engineering and Communications Technologies 2023年 180卷 239-250页
作者: Efiong, John E. Akinyemi, Bodunde O. Olajubu, Emmanuel A. Ibrahim, Isa A. Aderounmu, Ganiyu A. Degila, Jules Department of Computer Science and Engineering Obafemi Awolowo University Ile-Ife Nigeria Department of Cybersecurity Federal University of Technology Owerri Nigeria Department of Computer Science Institute of Mathematics and Physics University of Abomey Calavi Benin
The SCADA systems in the Smart Grid Network (SGN) are increasingly facing cyber threats and divers attacks due to their known proprietary vulnerabilities, most often leading to power instability and cascading failures... 详细信息
来源: 评论
Straightforward Guess and Determine Analysis Based on Genetic Algorithm
收藏 引用
Journal of Systems science & Complexity 2022年 第5期35卷 1988-2003页
作者: CAO Chunping CEN Zhe FENG Xiutao WANG Zhangyi ZHU Yamin Department of Computer Science and Technology University of Shanghai for Science and TechnologyShang-hai 200093China Key Laboratory of Mathematics Mechanization Academy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing 100190China School of Cyber Science and Engineering Wuhan UniversityWuhan 430072China School of Science Xi'an Technological UniversityXi'an 710021China
With the development of artificial intelligence,the genetic algorithm has been widely used in many *** cryptography,the authors find it is natural to code an individual and design its fitness in a genetic algorithm fo... 详细信息
来源: 评论
Watermarking technique for copyright protection of digital images using coupled differential equations
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 11027-11039页
作者: Attaullah Javeed, Adnan Shah, Daud Shah, Tariq Department of Computer Science National University of Technology Islamabad Pakistan Government Associate College Daultala Rawalpindi Pakistan Department of Mathematics Quaid-I-Azam University Islamabad Pakistan
Advancement and expansion of the internet, along with regular software upgrades, have generated many benefits in communication patterns. This rapid growth has also had a negative impact on the security of communicated... 详细信息
来源: 评论
Verification of the Busy-Forbidden Protocol: (using an Extension of the Cones and Foci Proof Framework)  1
收藏 引用
10th IPM International Conference on Fundamentals of Software Engineering, FSEN 2023
作者: van Spaendonck, P.H.M. Department of Mathematics and Computer Science Eindhoven University of Technology Eindhoven Netherlands
The busy-forbidden protocol is a new readers-writer lock with no resource contention between readers, which allows it to outperform other locks. For its verification, specifications of its implementation and its less ... 详细信息
来源: 评论
Group decision making based on entropy measure of Pythagorean fuzzy sets and Pythagorean fuzzy weighted arithmetic mean aggregation operator of Pythagorean fuzzy numbers
收藏 引用
Information sciences 2023年 第1期624卷 361-377页
作者: Kumar, Kamal Chen, Shyi-Ming Department of Mathematics Amity University Haryana Gurugram India Department of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei Taiwan
In this paper, we propose a new entropy measure of Pythagorean fuzzy sets (PFSs). The proposed entropy measure of PFSs can conquer the shortcomings of the existing entropy measure of PFSs. We also propose the Pythagor... 详细信息
来源: 评论
Stochastic neuro-swarming intelligence paradigm for the analysis of magneto-hydrodynamic Prandtl-Eyring fluid flow with diffusive magnetic layers effect over an elongated surface
收藏 引用
Chinese Journal of Chemical Engineering 2024年 第10期74卷 295-311页
作者: Zeeshan Ikram Butt Iftikhar Ahmad Muhammad Shoaib Syed Ibrar Hussain Hira Ilyas Muhammad Asif Zahoor Raja Department of Mathematics University of GujratGujrat 50700Pakistan Yuan Ze University AI CenterTaoyuanTaiwan 320China Department of Mathematics and Computer Science University of PalermoVia Archirafi 34Palermo 90123Italy Department of Mathematics University of HoustonHoustonTX 77204USA Department of Physical Sciences University of ChenabGujrat 50700Pakistan Future Technology Research Centre National Yunlin University of Science and TechnologyYunlinTaiwan 64002China
In recent years,the integration of stochastic techniques,especially those based on artificial neural networks,has emerged as a pivotal advancement in the field of computational fluid *** techniques offer a powerful fr... 详细信息
来源: 评论
SMNDNet for Multiple Types of Deepfake Image Detection
收藏 引用
computers, Materials & Continua 2025年 第6期83卷 4607-4621页
作者: Qin Wang Xiaofeng Wang Jianghua Li Ruidong Han Zinian Liu Mingtao Guo Department of Computer Science and Engineering Xi’an University of TechnologyXi’an710048China Department of Mathematics Xi’an University of TechnologyXi’an710054China The National Key Laboratory of Fundamental Science on Synthetic Vision Sichuan UniversityChengdu610065China
The majority of current deepfake detection methods are constrained to identifying one or two specific types of counterfeit images,which limits their ability to keep pace with the rapid advancements in deepfake ***,in ... 详细信息
来源: 评论
Group decision making based on advanced interval-valued intuitionist fuzzy weighted averaging aggregation operator and score function of interval-valued intuitionist fuzzy values
收藏 引用
Information sciences 2023年 第1期624卷 908-923页
作者: Kumar, Kamal Chen, Shyi-Ming Department of Mathematics Amity University Haryana Gurugram India Department of Computer Science and Information Engineering National Taiwan University of Science and Technology Taipei Taiwan
This paper proposes a new group decision making (GDM) approach in the environments of interval-valued intuitionistic fuzzy values (IVIFVs). Firstly, we propose a new score function of IVIFVs, where the proposed score ... 详细信息
来源: 评论
EMA-Affinity: A Statistical Approach for Node Affinity Prediction in Dynamic Graphs  29
EMA-Affinity: A Statistical Approach for Node Affinity Predi...
收藏 引用
29th International computer Conference, computer Society of Iran, CSICC 2025
作者: Izadifar, Emad Rahmati, Zahed Davoodi, Amirehsan Department of Mathematics and Computer Science Amirkabir University of Technology Tehran Polytechnic Tehran Iran
Dynamic graphs serve as an abstract mathematical model applicable to various real-world scenarios, allowing the integration of complex temporal, structural, and relational patterns in data. To our knowledge, while muc... 详细信息
来源: 评论