咨询与建议

限定检索结果

文献类型

  • 13,864 篇 期刊文献
  • 12,740 篇 会议
  • 385 册 图书

馆藏范围

  • 26,988 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 15,401 篇 工学
    • 9,459 篇 计算机科学与技术...
    • 7,321 篇 软件工程
    • 2,858 篇 信息与通信工程
    • 2,310 篇 控制科学与工程
    • 1,756 篇 电气工程
    • 1,555 篇 电子科学与技术(可...
    • 1,479 篇 生物工程
    • 1,090 篇 生物医学工程(可授...
    • 964 篇 机械工程
    • 926 篇 光学工程
    • 918 篇 化学工程与技术
    • 793 篇 材料科学与工程(可...
    • 793 篇 动力工程及工程热...
    • 732 篇 仪器科学与技术
    • 674 篇 力学(可授工学、理...
    • 486 篇 土木工程
    • 458 篇 建筑学
  • 13,546 篇 理学
    • 8,426 篇 数学
    • 4,126 篇 物理学
    • 2,288 篇 统计学(可授理学、...
    • 1,796 篇 生物学
    • 1,433 篇 系统科学
    • 1,040 篇 化学
    • 707 篇 地球物理学
  • 3,572 篇 管理学
    • 2,245 篇 管理科学与工程(可...
    • 1,452 篇 图书情报与档案管...
    • 1,074 篇 工商管理
  • 992 篇 医学
    • 841 篇 临床医学
    • 735 篇 基础医学(可授医学...
  • 565 篇 法学
    • 487 篇 社会学
  • 456 篇 经济学
  • 317 篇 农学
  • 250 篇 教育学
  • 87 篇 文学
  • 62 篇 军事学
  • 40 篇 艺术学
  • 14 篇 哲学
  • 6 篇 历史学

主题

  • 743 篇 computer science
  • 541 篇 mathematics
  • 341 篇 deep learning
  • 293 篇 computational mo...
  • 262 篇 accuracy
  • 259 篇 machine learning
  • 252 篇 optimization
  • 227 篇 support vector m...
  • 199 篇 feature extracti...
  • 195 篇 training
  • 191 篇 internet of thin...
  • 190 篇 educational inst...
  • 182 篇 artificial intel...
  • 178 篇 data mining
  • 174 篇 neural networks
  • 162 篇 approximation al...
  • 159 篇 image segmentati...
  • 149 篇 galaxies
  • 131 篇 computer archite...
  • 125 篇 application soft...

机构

  • 404 篇 faculty of scien...
  • 388 篇 department for p...
  • 384 篇 department of ph...
  • 381 篇 department of ph...
  • 359 篇 department of ph...
  • 323 篇 kirchhoff-instit...
  • 308 篇 department of ph...
  • 284 篇 institute of phy...
  • 283 篇 fakultät für phy...
  • 279 篇 department of ph...
  • 272 篇 instituto de fís...
  • 271 篇 department of ph...
  • 266 篇 institute of phy...
  • 264 篇 universidade fed...
  • 263 篇 ictp trieste
  • 254 篇 nikhef national ...
  • 250 篇 department of ph...
  • 248 篇 department of ph...
  • 246 篇 department of ph...
  • 242 篇 school of physic...

作者

  • 331 篇 c. alexa
  • 328 篇 j. m. izen
  • 324 篇 g. bella
  • 323 篇 d. calvet
  • 323 篇 c. amelung
  • 322 篇 j. strandberg
  • 317 篇 g. spigo
  • 315 篇 f. siegert
  • 306 篇 r. ströhmer
  • 303 篇 m. rijssenbeek
  • 302 篇 s. jin
  • 300 篇 g. gaudio
  • 294 篇 s. mohapatra
  • 291 篇 y. tayalati
  • 277 篇 m. klein
  • 255 篇 s. guindon
  • 252 篇 f. pastore
  • 243 篇 n. orlando
  • 239 篇 a. kaczmarska
  • 225 篇 j. schaarschmidt

语言

  • 23,731 篇 英文
  • 2,990 篇 其他
  • 265 篇 中文
  • 8 篇 德文
  • 7 篇 法文
  • 6 篇 西班牙文
  • 5 篇 俄文
  • 4 篇 日文
  • 4 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 意大利文
检索条件"机构=Science Technology Mathematics Computer Science"
26989 条 记 录,以下是311-320 订阅
排序:
Interdisciplinary Synergy: Resources for Embedding Plugged and Unplugged computer and Data science Activities into the K-12 Curriculum  14
Interdisciplinary Synergy: Resources for Embedding Plugged a...
收藏 引用
14th IEEE Integrated STEM Education Conference, ISEC 2024
作者: Samaras, Ted Marlowe, Thomas J. Herbert, Katherine G. Anu, Vaibhav K. Hagiwara, Sumi Robila, Stefan A. Instructional Technology Coach Franklin Township Public Schools United States Seton Hall University Department of Mathematics and Computer Science United States School of Computing Montclair State University United States College for Education and Engaged Learning Montclair State University United States
In the ever changing environment of education, the skills learned and applied in computer and data science (CADS) have expanded beyond the reach of siloed, single-subject teaching in the classroom. The need for interd... 详细信息
来源: 评论
Algorithmic Perspective of Strongly Possible Keys and Functional Dependencies
收藏 引用
Informatica (Slovenia) 2024年 第4期48卷 507-512页
作者: Alattar, Munqath Sali, Attila ITRDC University of Kufa Iraq Alfréd Rényi Institute of Mathematics Budapest Hungary Department of Computer Science Budapest University of Technology and Economics Budapest Hungary
It is common to encounter missing values in database tables. For an incomplete table, a possible world can be obtained by replacing any missed value with a value from the attribute (infinite) domain. A possible key (p... 详细信息
来源: 评论
Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-Centric Communication in VANET
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 1747-1756页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Shamshad, Salman Ayub, Muhammad Faizan Bashir, Ali Kashif Omar, Marwan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan Manchester Metropolitan University Department of Computing and Mathematics ManchesterM15 6BH United Kingdom Woxsen University Woxsen School of Business Hyderabad502345 India Lebanese American University Department of Computer Science and Mathematics Beirut1102 2801 Lebanon Illinois Institute of Technology Information Technology and Management ChicagoIL60555 United States
Globally, the development of Intelligent Cyber-Physical Transportation Systems (ICTS) aims to tackle several challenges, including reducing traffic accidents and fuel usage, alleviating congestion, shortening travel t... 详细信息
来源: 评论
Foundations and Applications of Information Systems Dynamics
收藏 引用
Engineering 2023年 第8期27卷 254-265页
作者: Jianfeng Xu Zhenyu Liu Shuliang Wang Tao Zheng Yashi Wang Yingfei Wang Yingxu Dang Information Technology Service Center of People’s Court Beijing 100745China School of Information Management for Law China University of Political Science and LawBeijing 102249China School of Computer Science and Technology Beijing Institute of TechnologyBeijing 100081China School of Mathematics and Statistics Beijing Institute of TechnologyBeijing 100081China
Although numerous advances have been made in information technology in the past decades,there is still a lack of progress in information systems dynamics(ISD),owing to the lack of a mathematical foundation needed to d... 详细信息
来源: 评论
Innovative Video Classification Method based on Deep Learning Approach
收藏 引用
Recent Patents on Engineering 2025年 第2期19卷 95-107页
作者: Hemamalini, V. Jayasutha, D. Vinothini, V.R. Devi, R. Manjula Kumar, A. Anitha, E. Department of Networking and Communications School of Computing SRM Institute of Science and Technology Chennai India Department of Computer Science and Engineering Arjun College of Technology Coimbatore Thamaraikulam India Department of Mathematics Bannari Amman Institute of Technology Sathyamangalam Erode638401 India Department of Computer Science and Design Kongu Engineering College Perundurai Erode638060 India Department of Civil Engineering University Institute of Engineering & Technology Maharshi Dayanand University Rohtak124001 India Department of Artificial Intelligence and Data Science Sri Eshwar College of Engineering Coimbatore641202 India
Background: The automated classification of videos through artificial neural networks is addressed in this work. To explore the concepts and measure the results, the data set UCF101 is used, consisting of video clips ... 详细信息
来源: 评论
Ensuring Zero Trust IoT Data Privacy: Differential Privacy in Blockchain using Federated Learning
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 1-1页
作者: Hussain, Altaf Akbar, Wajahat Hussain, Tariq Bashir, Ali Kashif Dabel, Maryam M. Al Ali, Farman Yang, Bailin School of Electronic and Control Engineering Chang’an University Xi’an China School of Computer Science and Technology and School of Mathematics and Statistics Zhejiang Gongshang University Hangzhou China Department of Computing and Mathematics Manchester Metropolitan University UK Department of Computer Science and Engineering College of Computer Science and Engineering University of Hafr Al Batin Saudi Arabia Department of Applied AI School of Convergence College of Computing and Informatics Sungkyunkwan University Seoul South Korea
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to... 详细信息
来源: 评论
Deep learning for iris recognition: a review
收藏 引用
Neural Computing and Applications 2025年 第17期37卷 11125-11173页
作者: Yin, Yimin He, Siliang Zhang, Renye Chang, Hongli Zhang, Jinghua School of Mathematics and Statistics Hunan First Normal University Hunan Changsha410205 China School of Computer Science Hunan First Normal University Changsha410205 China School of Information Science and Engineering Southeast University Nanjing210096 China College of Intelligence Science and Technology National University of Defense Technology Hunan Changsha410073 China
Iris recognition is a secure biometric technology known for its stability and privacy. With no two irises being identical and little change throughout a person’s lifetime, iris recognition is considered more reliable... 详细信息
来源: 评论
Criss-Cross Attentional Siamese Networks for Object Tracking
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 2931-2946页
作者: Zhangdong Wang Jiaohua Qin Xuyu Xiang Yun Tan Neal N.Xiong College of Computer Science and Information Technology Central South University of Forestry&TechnologyChangsha410004China Department of Mathematics and Computer Science Northeastern State UniversityTahlequah74464OKUSA
Visual object tracking is a hot topic in recent *** the meanwhile,Siamese networks have attracted extensive attention in this field because of its balanced precision and ***,most of the Siamese network methods can onl... 详细信息
来源: 评论
Comparing UAV camera data with satellite imagery for global localization  7
Comparing UAV camera data with satellite imagery for global ...
收藏 引用
7th IEEE International Conference on Actual Problems of Unmanned Aerial Vehicles Development, APUAVD 2024
作者: Kozachuk, Oleksandr Prystavka, Pylyp National Aviation University Faculty of Computer Science and Technology Department of Applied Mathematics Kyiv03058 Ukraine
Global visual localization is critical for UAVs operating in environments where global navigation satellite systems (GNSS) are unreliable or unavailable. While many methods, such as visual odometry (VIO), rely on opti... 详细信息
来源: 评论
Target Group Influence Maximization using Reinforcement Learning Approach  10
Target Group Influence Maximization using Reinforcement Lear...
收藏 引用
10th International Conference on Web Research, ICWR 2024
作者: Binesh, Neda Haddadi, Mahdieh Arazkhani, Niloofar Semnan University Faculty of Mathematics Statistics and Computer Science Semnan Iran Department of Computer Engineering & Information Technology Tehran Iran
In social networks groups play a crucial role and making decisions based on majority consensus. Which influencer nodes should we select if our goal is to broadcast a subject in a target group and increase the number o... 详细信息
来源: 评论