咨询与建议

限定检索结果

文献类型

  • 33,703 篇 期刊文献
  • 2,681 篇 会议
  • 3 册 图书

馆藏范围

  • 36,387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30,327 篇 工学
    • 19,352 篇 计算机科学与技术...
    • 8,285 篇 电气工程
    • 8,271 篇 软件工程
    • 8,240 篇 控制科学与工程
    • 7,246 篇 信息与通信工程
    • 7,192 篇 电子科学与技术(可...
    • 6,920 篇 材料科学与工程(可...
    • 5,961 篇 机械工程
    • 3,216 篇 仪器科学与技术
    • 2,887 篇 网络空间安全
    • 2,129 篇 生物医学工程(可授...
    • 1,924 篇 力学(可授工学、理...
    • 1,391 篇 动力工程及工程热...
    • 1,215 篇 化学工程与技术
    • 935 篇 光学工程
    • 651 篇 生物工程
    • 635 篇 航空宇航科学与技...
  • 18,657 篇 理学
    • 10,307 篇 数学
    • 4,433 篇 物理学
    • 3,145 篇 生物学
    • 1,597 篇 系统科学
    • 1,576 篇 化学
    • 1,570 篇 天文学
    • 1,033 篇 统计学(可授理学、...
  • 6,633 篇 管理学
    • 5,416 篇 管理科学与工程(可...
    • 1,293 篇 图书情报与档案管...
  • 3,340 篇 医学
    • 2,857 篇 临床医学
    • 1,017 篇 基础医学(可授医学...
  • 955 篇 教育学
  • 915 篇 农学
  • 879 篇 法学
    • 701 篇 社会学
  • 796 篇 经济学
    • 778 篇 应用经济学
  • 636 篇 艺术学
  • 568 篇 文学
  • 448 篇 军事学
  • 52 篇 哲学
  • 47 篇 历史学

主题

  • 1,241 篇 deep learning
  • 775 篇 machine learning
  • 291 篇 network
  • 281 篇 classification
  • 270 篇 internet of thin...
  • 268 篇 clustering
  • 264 篇 security
  • 244 篇 optimization
  • 239 篇 simulation
  • 224 篇 analysis
  • 199 篇 artificial intel...
  • 199 篇 cloud computing
  • 196 篇 model
  • 179 篇 blockchain
  • 178 篇 data
  • 173 篇 computer
  • 151 篇 system
  • 149 篇 algorithm
  • 142 篇 learning
  • 136 篇 convolutional ne...

机构

  • 250 篇 ieee
  • 195 篇 department of co...
  • 156 篇 university of ch...
  • 91 篇 school of comput...
  • 89 篇 department of co...
  • 74 篇 college of compu...
  • 69 篇 school of comput...
  • 58 篇 department of co...
  • 52 篇 school of comput...
  • 47 篇 college of infor...
  • 44 篇 department of el...
  • 43 篇 school of comput...
  • 39 篇 college of compu...
  • 39 篇 department of co...
  • 37 篇 college of compu...
  • 37 篇 school of comput...
  • 37 篇 school of comput...
  • 31 篇 school of comput...
  • 30 篇 school of comput...
  • 28 篇 department of co...

作者

  • 84 篇 yunyoung nam
  • 80 篇 abdelwahed motwa...
  • 54 篇 cheng-wei qiu
  • 51 篇 jian wang
  • 51 篇 mehedi masud
  • 42 篇 jun zhang
  • 42 篇 jing zhang
  • 40 篇 abu sarwar zaman...
  • 35 篇 jun wang
  • 34 篇 rui wang
  • 33 篇 xin liu
  • 32 篇 mengchu zhou
  • 30 篇 imran khan
  • 30 篇 anwer mustafa hi...
  • 29 篇 ge yu
  • 29 篇 li zhang
  • 28 篇 wei liu
  • 26 篇 mohamed k.nour
  • 26 篇 chen chen
  • 24 篇 minghui hong

语言

  • 35,595 篇 英文
  • 792 篇 中文
检索条件"机构=Computer Science Branch"
36387 条 记 录,以下是121-130 订阅
排序:
Japanese Sign Language Recognition by Combining Joint Skeleton-Based Handcrafted and Pixel-Based Deep Learning Features with Machine Learning Classification
收藏 引用
computer Modeling in Engineering & sciences 2024年 第6期139卷 2605-2625页
作者: Jungpil Shin Md.Al Mehedi Hasan Abu Saleh Musa Miah Kota Suzuki Koki Hirooka School of computer science and Engineering The University of AizuAizuwakamatsu965-8580Japan Department of computer science&Engineering Rajshahi University of Engineering&TechnologyRajshahi6204Bangladesh
Sign language recognition is vital for enhancing communication accessibility among the Deaf and hard-of-hearing *** Japan,approximately 360,000 individualswith hearing and speech disabilities rely on Japanese Sign Lan... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Federated Meta Reinforcement Learning for Personalized Tasks
收藏 引用
Tsinghua science and Technology 2024年 第3期29卷 911-926页
作者: Wentao Liu Xiaolong Xu Jintao Wu Jielin Jiang School of computer science Nanjing University of Information Science and TechnologyNanjing 210044China School of Software Nanjing University of Information Science and TechnologyNanjing 210044China
As an emerging privacy-preservation machine learning framework,Federated Learning(FL)facilitates different clients to train a shared model collaboratively through exchanging and aggregating model parameters while raw ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A CSMA/CA based MAC protocol for hybrid Power-line/Visible-light communication networks:Design and analysis
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 481-497页
作者: Sheng Hao Huyin Zhang Fei Yang Chenghao Li Jing Wang School of computer science Central China Normal UniversityWuhan430079PR China Hubei Key Laboratory of intelligent Robot(Wuhan Institute of Technology) Wuhan430079PR China School of computer science Wuhan UniversityWuhan430079China School of Information science and Engineering Shandong Normal UniversityJinan250000China School of computer science Hubei University of TechnologyWuhan430079China
Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and har... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Attention-Based Approach to Enhance the Detection and Classification of Android Malware
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2743-2760页
作者: Abdallah Ghourabi Department of computer science College of Computer and Information SciencesJouf UniversitySakaka72388Saudi Arabia
The dominance of Android in the global mobile market and the open development characteristics of this platform have resulted in a significant increase in *** malicious applications have become a serious concern to the... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Expression Complementary Disentanglement Network for Facial Expression Recognition
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 742-752页
作者: Shanmin WANG Hui SHUAI Lei ZHU Qingshan LIU College of computer science and Technology Nanjing University of Aeronautics and Astronautics College of computer and Software Nanjing University of Information Science and Technology School of Information and Control Nanjing University of Information Science and Technology
Disentangling facial expressions from other disturbing facial attributes in face images is an essential topic for facial expression *** methods only care about facial expression disentanglement(FED)itself,ignoring the... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
computer vision-based six layered ConvNeural network to recognize sign language for both numeral and alphabet signs
收藏 引用
Biomimetic Intelligence & Robotics 2024年 第1期4卷 45-58页
作者: Muhammad Aminur Rahaman Kabiratun Ummi Oyshe Prothoma Khan Chowdhury Tanoy Debnath Anichur Rahman Md.Saikat Islam Khan Department of computer science and Engineering Green University of BangladeshDhakaBangladesh Department of computer science and Engineering National Institute of Textile Engineering and Research(NITER)Constituent Institute of Dhaka UniversityDhakaBangladesh Department of computer science and Engineering Mawlana Bhashani Science and Technology UniversityTangailBangladesh
People who have trouble communicating verbally are often dependent on sign language,which can be difficult for most people to understand,making interaction with them a difficult *** Sign Language Recognition(SLR)syste... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Game-Theoretic Approach to Safe Crowd Evacuation in Emergencies
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1631-1657页
作者: Maria Gul Imran Ali Khan Gohar Zaman Atta Rahman Jamaluddin Mir Sardar Asad Ali Biabani May IssaAldossary Mustafa Youldash Ashraf Saadeldeen Maqsood Mahmud Asiya Abdus Salam Dania Alkhulaifi Abdullah AlTurkey31Department of computer science COMSATS University IslamabadAbbottabad CampusAbbottabad22010Pakistan Department of computer science Abbottabad University of Science and TechnologyAbbottabad22010Pakistan Department of computer science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia science and Technology Unit Umm Al-Qura UniversityMakkah21955Saudi Arabia Deanship of Scientific Research Umm Al-Qura UniversityMakkah21955Saudi Arabia Department of computer Information Systems College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of computer Engineering College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of computer science Faculty of Computer Science and Information TechnologyOmdurman Islamic UniversityOmdurman14415Sudan Business Analytic Program Department of Management and MarketingCollege of Business AdministrationUniversity of BahrainSakhir32038Bahrain
Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoret... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning
收藏 引用
Tsinghua science and Technology 2024年 第4期29卷 948-958页
作者: A.E.M.Eljialy Mohammed Yousuf Uddin Sultan Ahmad Department of Information Systems College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabia Department of computer science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabiaand also with University Center for Research and Development(UCRD)Department of Computer Science and EngineeringChandigarh UniversityPunjabIndia
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Rule acquisition of three-way semi-concept lattices in formal decision context
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第2期9卷 333-347页
作者: Jie Zhao Renxia Wan Duoqian Miao Boyang Zhang School of Mathematics and Information science North Minzu UniversityYinchuanNingxiaChina Department of computer science and Technology Tongji UniversityShanghaiChina Department of computer science Bowling Green State UniversityBowling GreenOhioUSA
Three-way concept analysis is an important tool for information processing,and rule acquisition is one of the research hotspots of three-way concept ***,compared with three-way concept lattices,three-way semi-concept ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of computer science Alhamd Islamic UniversityIslamabad44000Pakistan Department of computer science and Technology University of Science and Technology BeijingBeijing100083China Department of computer science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of computer science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of computer science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论