咨询与建议

限定检索结果

文献类型

  • 5,716 篇 会议
  • 3,636 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,464 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,213 篇 工学
    • 4,864 篇 计算机科学与技术...
    • 4,009 篇 软件工程
    • 1,349 篇 信息与通信工程
    • 738 篇 控制科学与工程
    • 692 篇 生物工程
    • 552 篇 电气工程
    • 443 篇 机械工程
    • 405 篇 电子科学与技术(可...
    • 388 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 233 篇 动力工程及工程热...
    • 224 篇 网络空间安全
    • 216 篇 化学工程与技术
    • 209 篇 安全科学与工程
    • 207 篇 仪器科学与技术
    • 174 篇 建筑学
  • 2,818 篇 理学
    • 1,575 篇 数学
    • 765 篇 生物学
    • 619 篇 物理学
    • 468 篇 统计学(可授理学、...
    • 310 篇 系统科学
    • 231 篇 化学
  • 1,917 篇 管理学
    • 1,186 篇 管理科学与工程(可...
    • 807 篇 图书情报与档案管...
    • 520 篇 工商管理
  • 394 篇 医学
    • 331 篇 临床医学
    • 303 篇 基础医学(可授医学...
    • 185 篇 公共卫生与预防医...
  • 329 篇 法学
    • 247 篇 社会学
  • 202 篇 经济学
    • 200 篇 应用经济学
  • 173 篇 教育学
  • 92 篇 农学
  • 39 篇 军事学
  • 34 篇 文学
  • 18 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 259 篇 computer science
  • 241 篇 software enginee...
  • 213 篇 deep learning
  • 205 篇 feature extracti...
  • 192 篇 computational mo...
  • 189 篇 machine learning
  • 165 篇 data mining
  • 155 篇 semantics
  • 152 篇 training
  • 137 篇 accuracy
  • 133 篇 cloud computing
  • 130 篇 internet of thin...
  • 129 篇 software
  • 124 篇 optimization
  • 123 篇 authentication
  • 121 篇 predictive model...
  • 111 篇 artificial intel...
  • 107 篇 security
  • 101 篇 neural networks
  • 101 篇 educational inst...

机构

  • 303 篇 college of compu...
  • 270 篇 school of inform...
  • 267 篇 school of comput...
  • 144 篇 school of comput...
  • 116 篇 state key labora...
  • 88 篇 school of softwa...
  • 87 篇 school of inform...
  • 54 篇 school of comput...
  • 49 篇 shandong provinc...
  • 45 篇 school of softwa...
  • 45 篇 shandong provinc...
  • 42 篇 college of infor...
  • 42 篇 college of compu...
  • 40 篇 school of comput...
  • 40 篇 sri lanka instit...
  • 39 篇 department of co...
  • 38 篇 university of el...
  • 38 篇 department of co...
  • 37 篇 school of big da...
  • 37 篇 department of so...

作者

  • 51 篇 shen linlin
  • 37 篇 xu xiaolong
  • 35 篇 sun xingming
  • 34 篇 qi lianyong
  • 32 篇 ismail leila
  • 31 篇 tao dacheng
  • 30 篇 mu yi
  • 29 篇 mohammad s. obai...
  • 27 篇 huang min
  • 27 篇 susilo willy
  • 26 篇 qi liu
  • 24 篇 shen jian
  • 23 篇 liu yang
  • 23 篇 wang guojun
  • 22 篇 fan guisheng
  • 21 篇 jiacun wang
  • 20 篇 lu dianjie
  • 20 篇 zhang zhao
  • 20 篇 wang wei
  • 19 篇 zhi-hui wang

语言

  • 8,602 篇 英文
  • 729 篇 其他
  • 151 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 罗马尼亚文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9464 条 记 录,以下是61-70 订阅
MA-MFIF: When misaligned multi-focus Image fusion meets deep homography estimation
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10877-10898页
作者: Zhao, Baojun Luo, Fei Fuentes, Joel Ding, Weichao Gu, Chunhua School of Information Science and Engineering East China University of Science and Technology Shanghai200237 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Department of Computer Science and Information Technologies Universidad del Bio-Bio Chillán3780000 Chile
Multi-focus image fusion is a technique that combines multiple out-of-focus images to enhance the overall image quality. It has gained significant attention in recent years, thanks to the advancements in deep learning... 详细信息
来源: 评论
Deep Learning-Based Trees Disease Recognition and Classification Using Hyperspectral Data
收藏 引用
computers, Materials & Continua 2023年 第10期77卷 681-697页
作者: Uzair Aslam Bhatti Sibghat Ullah Bazai Shumaila Hussain Shariqa Fakhar Chin Soon Ku Shah Marjan Por Lip Yee Liu Jing College of Information and Communication Engineering Hainan UniversityHaikou570228China Department of Computer Engineering Balochistan University of Information TechnologyEngineeringand Management Sciences(BUITEMS)QuettaPakistan Department of Computer Science Sardar Bahadur Khan Women’s UniversityQuettaPakistan Department of Computer Science Universiti Tunku Abdul RahmanKampar31900Malaysia Department of Software Engineering Balochistan University of Information TechnologyEngineeringand Management Sciences(BUITEMS)QuettaPakistan Faculty of Computer Science and Information Technology University of MalayaKuala Lumpur50603Malaysia
Crop diseases have a significant impact on plant growth and can lead to reduced *** methods of disease detection rely on the expertise of plant protection experts,which can be subjective and dependent on individual ex... 详细信息
来源: 评论
Binary Program Vulnerability Mining Based on Neural Network
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1861-1879页
作者: Zhenhui Li Shuangping Xing Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang School of Information and Software Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Electrical and Computer Engineering University ofWaterlooWaterlooN2L 3G1Canada
software security analysts typically only have access to the executable program and cannot directly access the source code of the *** poses significant challenges to security *** it is crucial to identify vulnerabilit... 详细信息
来源: 评论
A Lightweight Deep Learning-Based Model for Tomato Leaf Disease Classification
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3969-3992页
作者: Naeem Ullah Javed Ali Khan Sultan Almakdi Mohammed S.Alshehri Mimonah Al Qathrady Eman Abdullah Aldakheel Doaa Sami Khafaga Department of Software Engineering University of Engineering and TechnologyTaxila4400Pakistan Department of Computer Science Faculty of PhysicsEngineeringand Computer ScienceUniversity of HertfordshireHatfieldAL109ABUK Department of Computer Science College of Computer Science and Information SystemNajran UniversityNajran55461Saudi Arabia Departments of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Tomato leaf diseases significantly impact crop production,necessitating early detection for sustainable *** Learning(DL)has recently shown excellent results in identifying and classifying tomato leaf ***,current DL me... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
science China(information sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
Improved Double Deep Q Network-Based Task Scheduling Algorithm in Edge Computing for Makespan Optimization
收藏 引用
Tsinghua science and Technology 2024年 第3期29卷 806-817页
作者: Lei Zeng Qi Liu Shigen Shen Xiaodong Liu School of Computer Science Nanjing University of Information Science and TechnologyNanjing 210044China School of Software Nanjing University of Information Science and TechnologyNanjing 210044China School of Information Engineering Huzhou UniversityHuzhou 313000China School of Computing Edinburgh Napier UniversityEdinburghEH105DTUK
Edge computing nodes undertake an increasing number of tasks with the rise of business ***,how to efficiently allocate large-scale and dynamic workloads to edge computing resources has become a critical *** study prop... 详细信息
来源: 评论
Blockchain-enabled IoT access control model for sharing electronic healthcare data
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 8127-8148页
作者: Ilyas, Benkhaddra Kumar, Abhishek Ali, Setitra Mohamed Lei, Hang School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China Chandigarh University Gharuan Mohali Punjab140413 India School of Computer Science and Engineering University of Electronic Science and Technology of China Sichuan Chengdu611731 China
Deploying the Internet of Things (IoT) in the transfer of enormous medical data often promotes challenges with the security, confidentiality, and privacy of the user’s sensitive data. In addition, the access control ... 详细信息
来源: 评论
DIEONet:Domain-Invariant information Extraction and Optimization Network for Visual Place Recognition
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5019-5033页
作者: Shaoqi Hou Zebang Qin Chenyu Wu Guangqiang Yin Xinzhong Wang Zhiguo Wang School of Computer Science and Technology Xinjiang UniversityUrumqi830046China School of Information and Software Engineering University of Electronic Science and Technology ofChinaChengdu611731China Institute of Public Security Kash Institute of Electronics and Information IndustryKashi844000China
Visual Place Recognition(VPR)technology aims to use visual information to judge the location of agents,which plays an irreplaceable role in tasks such as loop closure detection and *** is well known that previous VPR ... 详细信息
来源: 评论
Algorithm for Identifying Critical Nodes in Networks Based on Spectral Clustering to Construct Hypergraphs  16
Algorithm for Identifying Critical Nodes in Networks Based o...
收藏 引用
16th International Conference on Wireless Communications and Signal Processing, WCSP 2024
作者: Li, Xujie Shao, Fei Li, Haotian College of Computer Science and Software Engineering Hohai University Nanjing China College of Information Science and Engineering Hohai University Nanjing China
Currently, the basis for critical nodes definition and identification lies in the representation learning of the network and the extraction of local and global features of the nodes. The effectiveness of the algorithm... 详细信息
来源: 评论
Fake News Classification: Past, Current, and Future
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 2225-2249页
作者: Muhammad Usman Ghani Khan Abid Mehmood Mourad Elhadef Shehzad Ashraf Chaudhry Department of Computer Science University of Engineering and TechnologyLahore54890Pakistan Department of Computer Science&Information Technology Abu Dhabi UniversityAbu Dhabi59911United Arab Emirates Department of Software Engineering Faculty of Engineering and ArchitectureNisantasi UniversityIstanbulTurkey
The proliferation of deluding data such as fake news and phony audits on news web journals,online publications,and internet business apps has been aided by the availability of the web,cell phones,and social *** can qu... 详细信息
来源: 评论