咨询与建议

限定检索结果

文献类型

  • 5,952 篇 会议
  • 3,437 篇 期刊文献
  • 41 册 图书

馆藏范围

  • 9,430 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,633 篇 工学
    • 3,498 篇 计算机科学与技术...
    • 2,782 篇 软件工程
    • 1,100 篇 信息与通信工程
    • 990 篇 控制科学与工程
    • 748 篇 电气工程
    • 744 篇 电子科学与技术(可...
    • 574 篇 生物工程
    • 492 篇 机械工程
    • 449 篇 光学工程
    • 414 篇 生物医学工程(可授...
    • 391 篇 仪器科学与技术
    • 298 篇 动力工程及工程热...
    • 291 篇 化学工程与技术
    • 226 篇 交通运输工程
    • 208 篇 材料科学与工程(可...
    • 191 篇 土木工程
    • 169 篇 安全科学与工程
  • 2,985 篇 理学
    • 1,436 篇 数学
    • 880 篇 物理学
    • 641 篇 生物学
    • 461 篇 统计学(可授理学、...
    • 360 篇 系统科学
    • 299 篇 化学
  • 1,477 篇 管理学
    • 964 篇 管理科学与工程(可...
    • 562 篇 图书情报与档案管...
    • 403 篇 工商管理
  • 391 篇 医学
    • 333 篇 临床医学
    • 256 篇 基础医学(可授医学...
    • 171 篇 药学(可授医学、理...
  • 206 篇 法学
    • 172 篇 社会学
  • 157 篇 经济学
  • 97 篇 农学
  • 80 篇 教育学
  • 32 篇 文学
  • 23 篇 军事学
  • 16 篇 艺术学
  • 1 篇 哲学

主题

  • 302 篇 computer science
  • 178 篇 feature extracti...
  • 173 篇 deep learning
  • 165 篇 computational mo...
  • 146 篇 data mining
  • 145 篇 systems engineer...
  • 129 篇 optimization
  • 122 篇 machine learning
  • 116 篇 neural networks
  • 108 篇 control systems
  • 101 篇 accuracy
  • 99 篇 semantics
  • 93 篇 computer archite...
  • 88 篇 laboratories
  • 85 篇 educational inst...
  • 85 篇 predictive model...
  • 83 篇 costs
  • 82 篇 training
  • 78 篇 bandwidth
  • 78 篇 wireless sensor ...

机构

  • 103 篇 national enginee...
  • 101 篇 college of compu...
  • 79 篇 school of comput...
  • 73 篇 national enginee...
  • 71 篇 department of co...
  • 56 篇 college of infor...
  • 44 篇 school of comput...
  • 41 篇 the key laborato...
  • 39 篇 school of comput...
  • 38 篇 school of optica...
  • 38 篇 school of comput...
  • 37 篇 school of inform...
  • 31 篇 national enginee...
  • 31 篇 university of ch...
  • 30 篇 faculty of compu...
  • 29 篇 huazhong univers...
  • 28 篇 school of comput...
  • 27 篇 hubei province k...
  • 25 篇 hubei key labora...
  • 25 篇 key laboratory o...

作者

  • 71 篇 hai jin
  • 39 篇 jin hai
  • 31 篇 yang yang
  • 30 篇 xiaofei liao
  • 28 篇 shen linlin
  • 24 篇 mei-ling shyu
  • 21 篇 chen shu-ching
  • 21 篇 abdelwahed motwa...
  • 21 篇 hu shengshan
  • 21 篇 shu-ching chen
  • 20 篇 ji zhen
  • 20 篇 dutta paramartha
  • 19 篇 jianchao zeng
  • 18 篇 wang xingjun
  • 17 篇 zhen ji
  • 16 篇 wang wei
  • 15 篇 wang lei
  • 15 篇 li peng
  • 15 篇 long zheng
  • 15 篇 zhuang songlin

语言

  • 8,767 篇 英文
  • 415 篇 其他
  • 219 篇 中文
  • 32 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=System Engineering and Computer Science"
9430 条 记 录,以下是521-530 订阅
排序:
Optimal Deep Convolutional Neural Network for Vehicle Detection in Remote Sensing Images
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3117-3131页
作者: Saeed Masoud Alshahrani Saud S.Alotaibi Shaha Al-Otaibi Mohamed Mousa Anwer Mustafa Hilal Amgad Atta Abdelmageed Abdelwahed Motwakel Mohamed I.Eldesouki Department of Computer Science College of Computing and Information TechnologyShaqra UniversityShaqraSaudi Arabia Department of Information Systems College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Electrical Engineering Faculty of Engineering&TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam Bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Information System College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlKharjSaudi Arabia
Object detection(OD)in remote sensing images(RSI)acts as a vital part in numerous civilian and military application areas,like urban planning,geographic information system(GIS),and search and rescue *** recognition fr... 详细信息
来源: 评论
Deep Learning Enabled Object Detection and Tracking Model for Big Data Environment
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 2541-2554页
作者: K.Vijaya Kumar E.Laxmi Lydia Ashit Kumar Dutta Velmurugan Subbiah Parvathy Gobi Ramasamy Irina V.Pustokhina Denis A.Pustokhin Department of Computer Science and Engineering Vignan’s Institute of Engineering for WomenVisakhapatnam530049India Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Computer Science and Information System College of Applied SciencesAlMaarefa UniversityRiyadh11597Kingdom of Saudi Arabia Department of Electronics and Communication Engineering Kalasalingam Academy of Research and EducationKrishnankoil626126TamilnaduIndia Department of Computer Science Christ UniversityBangalore560029India Department of Entrepreneurship and Logistics Plekhanov Russian University of Economics117997MoscowRussia Department of Logistics State University of ManagementMoscow109542Russia
Recently,big data becomes evitable due to massive increase in the generation of data in real time ***,object detection and tracking applications becomes popular among research communities and finds useful in different... 详细信息
来源: 评论
Mixed Hierarchical Networks for Deep Entity Matching
收藏 引用
Journal of computer science & Technology 2021年 第4期36卷 822-838页
作者: Chen-Chen Sun De-Rong Shen Engineering Research Center of Learning-Based Intelligent System(Ministry of Education)Tianjin University of Technology Tianjin 300384China School of Computer Science and Engineering Tianjin University of TechnologyTianjin 300384China School of Computer Science and Engineering Northeastern UniversityShenyang 110819China
Entity matching is a fundamental problem of data *** groups records according to underlying real-world *** is a growing trend of entity matching via deep learning *** design mixed hierarchical deep neural networks(MHN... 详细信息
来源: 评论
Verifiable Secure Aggregation Protocol Under Federated Learning  1st
Verifiable Secure Aggregation Protocol Under Federated Learn...
收藏 引用
1st International Conference on Artificial Intelligence Security and Privacy, AIS and P 2023
作者: Xu, Peiming Zheng, Meiling Xu, Lingling Guangdong Provincial Key Laboratory of Power System Network Security Electric Power Research Institute CSG Guangzhou China School of Computer Science and Engineering South China University of Technology Guangzhou China
Federated learning is a new machine learning paradigm used for collaborative training models among multiple devices. In federated learning, multiple clients participate in model training locally and use decentralized ... 详细信息
来源: 评论
Marine Predators Algorithm with Deep Learning-Based Leukemia Cancer Classification on Medical Images
收藏 引用
computer Modeling in engineering & sciences 2024年 第10期141卷 893-916页
作者: Sonali Das Saroja Kumar Rout Sujit Kumar Panda Pradyumna Kumar Mohapatra Abdulaziz S.Almazyad Muhammed Basheer Jasser Guojiang Xiong Ali Wagdy Mohamed Department of Computer Science&Engineering Gandhi Institute for TechnologyBPUTBhubaneswar752054India Department of Information Technology Vardhaman College of Engineering(Autonomous)Hyderabad501218TelanganaIndia Department of Electronic&Communication Engineering Vedang Institute of TechnologyBhubaneswar752010India Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Department of Computing and Information Systems School of Engineering and TechnologySunway UniversityJalan UniversitiBandar SunwaySelangor Darul Ehsan47500Malaysia Research Centre for Human-Machine Collaboration(HUMAC) School of Engineering and TechnologySunway UniversityJalan UniversitiBandar SunwaySelangor Darul Ehsan47500Malaysia Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmman11931Jordan
In blood or bone marrow,leukemia is a form of cancer.A person with leukemia has an expansion of white blood cells(WBCs).It primarily affects children and rarely affects *** depends on the type of leukemia and the exte... 详细信息
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
Hybrid Metaheuristics Feature Selection with Stacked Deep Learning-Enabled Cyber-Attack Detection Model
收藏 引用
computer systems science & engineering 2023年 第5期45卷 1679-1694页
作者: Mashael M Asiri Heba G.Mohamed Mohamed K Nour Mesfer Al Duhayyim Amira Sayed A.Aziz Abdelwahed Motwakel Abu Sarwar Zamani Mohamed I.Eldesouki Department of Computer Science College of Science&Art atMahayilKing Khalid UniversityMuhayel Aseer62529Saudi Arabia Department of Electrical Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia Department of Information System College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Due to exponential increase in smart resource limited devices and high speed communication technologies,Internet of Things(IoT)have received significant attention in different application ***,IoT environment is highly... 详细信息
来源: 评论
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent Diffusion  38
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent D...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Zeng, Yu Zhang, Yang Liu, Jiachen Shen, Linlin Deng, Kaijun He, Weizhao Wang, Jinbao Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Hair editing is a critical image synthesis task that aims to edit hair color and hairstyle using text descriptions or reference images, while preserving irrelevant attributes (e.g., identity, background, cloth). Many ...
来源: 评论
Competitive and Cooperative-Based Strength Pareto Evolutionary Algorithm for Green Distributed Heterogeneous Flow Shop Scheduling
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 2077-2101页
作者: Kuihua Huang Rui Li Wenyin Gong Weiwei Bian Rui Wang College of System Engineering National University of Defense TechnologyChangsha410073China School of Computer Science China University of GeosciencesWuhan430074China Equipment General Technology Laboratory Beijing Mechanical Equipment Research InstituteBeijing100854China
This work aims to resolve the distributed heterogeneous permutation flow shop scheduling problem(DHPFSP)with minimizing makespan and total energy consumption(TEC).To solve this NP-hard problem,this work proposed a com... 详细信息
来源: 评论
K-Banhatti Sombor Invariants of Certain computer Networks
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 15-31页
作者: Khalid Hamid Muhammad Waseem Iqbal Abaid Ur Rehman Virk Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Mathematics University of SialkotSialkot51013Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Any number that can be uniquely determined by a graph is called a graph *** the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation ***,no reliable examinati... 详细信息
来源: 评论