咨询与建议

限定检索结果

文献类型

  • 31,961 篇 会议
  • 24,317 篇 期刊文献
  • 437 册 图书

馆藏范围

  • 56,715 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34,364 篇 工学
    • 20,596 篇 计算机科学与技术...
    • 16,667 篇 软件工程
    • 6,704 篇 信息与通信工程
    • 5,345 篇 电气工程
    • 5,221 篇 电子科学与技术(可...
    • 4,422 篇 控制科学与工程
    • 3,287 篇 生物工程
    • 3,253 篇 光学工程
    • 2,465 篇 生物医学工程(可授...
    • 2,296 篇 机械工程
    • 2,244 篇 化学工程与技术
    • 2,187 篇 材料科学与工程(可...
    • 1,854 篇 仪器科学与技术
    • 1,543 篇 动力工程及工程热...
    • 944 篇 力学(可授工学、理...
    • 884 篇 交通运输工程
    • 882 篇 安全科学与工程
  • 21,143 篇 理学
    • 9,094 篇 数学
    • 8,872 篇 物理学
    • 3,861 篇 生物学
    • 2,831 篇 统计学(可授理学、...
    • 2,494 篇 化学
    • 2,045 篇 系统科学
  • 7,711 篇 管理学
    • 4,821 篇 管理科学与工程(可...
    • 3,129 篇 图书情报与档案管...
    • 2,123 篇 工商管理
  • 2,254 篇 医学
    • 1,897 篇 临床医学
    • 1,561 篇 基础医学(可授医学...
    • 998 篇 药学(可授医学、理...
  • 1,116 篇 法学
    • 902 篇 社会学
  • 744 篇 经济学
  • 554 篇 教育学
  • 539 篇 农学
  • 195 篇 文学
  • 133 篇 军事学
  • 97 篇 艺术学
  • 12 篇 哲学
  • 8 篇 历史学

主题

  • 2,309 篇 computer science
  • 1,658 篇 laboratories
  • 1,162 篇 software enginee...
  • 954 篇 computational mo...
  • 660 篇 feature extracti...
  • 656 篇 application soft...
  • 656 篇 machine learning
  • 597 篇 deep learning
  • 584 篇 training
  • 569 篇 testing
  • 556 篇 computer archite...
  • 531 篇 semantics
  • 509 篇 data mining
  • 506 篇 costs
  • 495 篇 accuracy
  • 468 篇 artificial intel...
  • 434 篇 bandwidth
  • 421 篇 software
  • 411 篇 optimization
  • 388 篇 algorithm design...

机构

  • 1,102 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 979 篇 physikalisches i...
  • 966 篇 oliver lodge lab...
  • 818 篇 university of ch...
  • 645 篇 infn laboratori ...
  • 624 篇 infn sezione di ...
  • 602 篇 infn sezione di ...
  • 593 篇 fakultät physik ...
  • 592 篇 infn sezione di ...
  • 555 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 531 篇 school of physic...
  • 524 篇 department of ph...
  • 523 篇 iccub universita...
  • 519 篇 imperial college...
  • 517 篇 h.h. wills physi...
  • 514 篇 nikhef national ...
  • 508 篇 stfc rutherford ...
  • 506 篇 physik-institut ...

作者

  • 266 篇 barter w.
  • 261 篇 a. gomes
  • 252 篇 beiter a.
  • 246 篇 c. alexa
  • 244 篇 j. m. izen
  • 238 篇 c. amelung
  • 237 篇 bellee v.
  • 236 篇 g. bella
  • 236 篇 j. strandberg
  • 236 篇 d. calvet
  • 234 篇 s. chen
  • 233 篇 g. spigo
  • 231 篇 blake t.
  • 226 篇 brundu d.
  • 225 篇 bowcock t.j.v.
  • 221 篇 f. siegert
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 borsato m.
  • 219 篇 j. wang

语言

  • 54,137 篇 英文
  • 1,830 篇 其他
  • 748 篇 中文
  • 14 篇 德文
  • 7 篇 日文
  • 6 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering Laboratory Computer Science Department"
56715 条 记 录,以下是271-280 订阅
排序:
Forecasting land use changes in crop classification and drought using remote sensing
收藏 引用
Journal of Arid Land 2025年 第5期17卷 575-589页
作者: Mashael MAASHI Nada ALZABEN Noha NEGM Venkatesan VEERAMANI Sabarunisha Sheik BEGUM Geetha PALANIAPPAN Department of Software Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh 11451Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh 11671Saudi Arabia Department of Computer Science Applied College at MahayilKing Khalid UniversityAbha 61421Saudi Arabia Department of Civil Engineering University College of EngineeringAnna UniversityAriyalur 621731India Department of Biotechnology P.S.R.Engineering CollegeSivakasi 626140India Department of Electronics and Communication Engineering School of Engineering and TechnologyDhanalakshmi Srinivasan UniversitySamayapuram 621112India
Challenges in land use and land cover(LULC)include rapid urbanization encroaching on agricultural land,leading to fragmentation and loss of natural ***,the effects of urbanization on LULC of different crop types are l... 详细信息
来源: 评论
Efficient Fingerprint Database Organization for Optimized Recognition
Efficient Fingerprint Database Organization for Optimized Re...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Jeffrey Jeeva Dhas Adhip Koshy Nishit Dua D. Ajitha Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore Tamil Nadu India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore Vellore India
A popular biometric identification method, renowned for its dependability and individuality in personal identification, is fingerprint recognition. This article presents an efficient fingerprint identification system ... 详细信息
来源: 评论
Industry Upgrading and Public Opinion Prevention Using BERTopic  1
收藏 引用
2nd International Conference on Artificial Intelligence Security and Privacy, AIS and P 2024
作者: Wang, Xinhua Yu, Xiaomei Jiang, Yunmeng Zheng, Xiangwei Li, Wei School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan250358 China Shandong Normal University Library Shandong Normal University Jinan China
The development status of the hotel industry in a city is also an essential factor influencing local tourism revenue. In the tourism industry, besides dining and attractions, which are hotspots for public opinion, the... 详细信息
来源: 评论
Privacy protection and data security in intelligent recommendation systems
收藏 引用
Neural Computing and Applications 2025年 1-18页
作者: Zheng, Donghua Alkawaz, Mohammed Hazim Johar, Md Gapar Md School of Information Technology and Engineering Guangzhou College of Commerce Guangdong Guangzhou511363 China School of Graduate Studies Management and Science University Selangor Shah Alam40100 Malaysia Department of Computer Science College of Education for Pure Science University of Mosul Nineveh Mosul41002 Iraq Software Engineering and Digital Innovation Centre Management and Science University Selangor Shah Alam40100 Malaysia
Data security and privacy have emerged as major areas of study for recommendation systems. This is crucial for enhancing system security given the quick advancement of Internet technology and its increased use. Howeve... 详细信息
来源: 评论
Potential mechanisms of non-coding RNA regulation in Alzheimer's disease
收藏 引用
Neural Regeneration Research 2026年 第1期21卷 265-280页
作者: Yue Sun Xinping Pang Xudong Huang Dinglu Liu Jingyue Huang Pengtao Zheng Yanyu Wei Chaoyang Pang College of Computer Science Sichuan Normal UniversityChengduSichuan ProvinceChina School of Science Xi’an Jiaotong-Liverpool UniversitySuzhouJiangsu ProvinceChina Neurochemistry Laboratory Department of PsychiatryMassachusetts General Hospital and Harvard Medical SchoolCharlestownMAUSA National Key Laboratory of Science and Technology on Vacuum Electronics School of Electronic Science and EngineeringUniversity of Electronic Science and Technology of ChinaChengduSichuan ProvinceChina
Alzheimer's disease,a progressively degenerative neurological disorder,is the most common cause of dementia in the *** its precise etiology remains unclear,researchers have identified diverse pathological characte... 详细信息
来源: 评论
SAR Images Change Detection Based on Attention Mechanism-Convolutional Wavelet Neural Network
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12133-12149页
作者: Jiahui, E. Wang, Lu Zhao, Chunhui Mathiopoulos, P. Takis Ohtsuki, Tomoaki Adachi, Fumiyuki Harbin Engineering University College of Information and Communication Engineering Harbin150001 China Ministry of Industry and Information Technology Key Laboratory of Advanced Marine Communication and Information Technology Harbin150001 China National and Kapodistrian University of Athens Department of Informatics and Telecommunications Greece Keio University Department of Information and Computer Science Kanagawa223852 Japan Tohoku University International Research Institute of Disaster Science Sendai Japan
As Synthetic Aperture Radar (SAR) image change detection can continuously acquire target information under all weather conditions, it has been used in the past for various applications. However, it is very challenging... 详细信息
来源: 评论
A Memetic Algorithm Based Feature Weighting for Metabolomics Data Classification
收藏 引用
Chinese Journal of Electronics 2025年 第4期23卷 706-711页
作者: Jiarui Zhou Zexuan Zhu Zhen Ji College of Biomedical Engineering and Instrument Science Zhejiang University Hangzhou China Shenzhen City Key Laboratory of Embedded System Design College of Computer Science and Software Engineering Shenzhen University Shenzhen China
A metaheuristic chain based memetic algorithm namely MCMA is proposed for the classification of metabolomics data. MCMA regards both global evolution and local search as equivalent elemental metaheuristics, and search... 详细信息
来源: 评论
Evaluating Feature Prioritization in a Reduced Feature Set Using Explainable AI for Intracranial Aneurysm Classification
Evaluating Feature Prioritization in a Reduced Feature Set U...
收藏 引用
International Conference on Advancements in Computational sciences (ICACS)
作者: Iram Abdullah Ali Javed Department of Computer Science Air University Kamra Pakistan Department of Software Engineering University of Engineering & Technology Taxila Pakistan
The timely management of an unruptured aneurysm can prevent hemorrhage. Multiple anatomical, morphological, and hemodynamic features associated with an aneurysm can predict the risk of rupture and classify the nature ... 详细信息
来源: 评论
Security within Security: Attack Detection Model with Defenses Against Attacks Capability for Zero-trust Networks
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2312-2327页
作者: Wang, Tingting Fang, Kai Cai, Jijing Wang, Lina Tian, Jinyu Feng, Hailin Li, Jianqing Guizani, Mohsen Wang, Wei Macau University of Science and Technology Faculty of Innovation Engineering School of Computer Science and Engineering Macau999078 China Zhejiang A&F University College of Mathematics and Computer Science Hangzhou311300 China Machine Learning Department United Arab Emirates Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen518172 China Beijing Institute of Technology School of Medical Technology Beijing100081 China
Traditional traffic anomaly-based attack detection methods in Zero-trust Networks (ZTN) suffer from inherent security vulnerabilities, as they neglect considerations regarding their security defenses. Compromising the... 详细信息
来源: 评论
ATOM: An Automatic Topology Synthesis Framework for Operational Amplifiers
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年 第3期44卷 1193-1198页
作者: Shen, Jinyi Yang, Fan Shang, Li Yan, Changhao Bi, Zhaori Zhou, Dian Zeng, Xuan Fudan University State Key Laboratory of Integrated Chips and Systems School of Microelectronics Shanghai200433 China Fudan University State Key Laboratory of Integrated Chips and Systems The School of Computer Science Shanghai200433 China Fudan University State Key Laboratory of Integrated Chips and Systems Microelectronics Department Shanghai200433 China University of Texas at Dallas Department of Electrical Engineering DallasTX75080 United States
Bayesian optimization (BO) is more efficient in automatically synthesizing operational amplifier (opamp) topologies compared to conventional methods. However, the design space for behavior-level opamp topologies invol... 详细信息
来源: 评论