咨询与建议

限定检索结果

文献类型

  • 252,126 篇 会议
  • 106,619 篇 期刊文献
  • 2,843 册 图书
  • 22 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 361,610 篇 电子文献
  • 13 种 纸本馆藏

日期分布

学科分类号

  • 205,694 篇 工学
    • 128,816 篇 计算机科学与技术...
    • 103,665 篇 软件工程
    • 50,704 篇 信息与通信工程
    • 32,869 篇 控制科学与工程
    • 32,586 篇 电气工程
    • 32,449 篇 电子科学与技术(可...
    • 22,533 篇 生物工程
    • 18,044 篇 生物医学工程(可授...
    • 17,796 篇 光学工程
    • 14,842 篇 机械工程
    • 12,944 篇 化学工程与技术
    • 12,357 篇 仪器科学与技术
    • 11,940 篇 动力工程及工程热...
    • 10,777 篇 材料科学与工程(可...
    • 7,360 篇 安全科学与工程
    • 6,965 篇 网络空间安全
    • 6,705 篇 交通运输工程
  • 120,450 篇 理学
    • 57,783 篇 数学
    • 43,228 篇 物理学
    • 25,623 篇 生物学
    • 18,581 篇 统计学(可授理学、...
    • 13,847 篇 化学
    • 13,700 篇 系统科学
  • 49,515 篇 管理学
    • 30,941 篇 管理科学与工程(可...
    • 20,546 篇 图书情报与档案管...
    • 14,567 篇 工商管理
  • 17,257 篇 医学
    • 14,322 篇 临床医学
    • 12,791 篇 基础医学(可授医学...
    • 8,131 篇 药学(可授医学、理...
  • 8,958 篇 法学
    • 7,374 篇 社会学
  • 5,925 篇 经济学
  • 4,660 篇 农学
  • 3,443 篇 教育学
  • 1,662 篇 文学
  • 846 篇 军事学
  • 452 篇 艺术学
  • 67 篇 哲学
  • 38 篇 历史学

主题

  • 9,979 篇 computer science
  • 8,293 篇 accuracy
  • 7,671 篇 computational mo...
  • 7,534 篇 feature extracti...
  • 6,659 篇 deep learning
  • 6,326 篇 machine learning
  • 6,079 篇 training
  • 4,459 篇 support vector m...
  • 4,406 篇 predictive model...
  • 4,284 篇 optimization
  • 4,211 篇 data mining
  • 4,069 篇 neural networks
  • 4,046 篇 wireless sensor ...
  • 3,992 篇 computer archite...
  • 3,906 篇 bandwidth
  • 3,884 篇 convolutional ne...
  • 3,723 篇 artificial intel...
  • 3,702 篇 real-time system...
  • 3,668 篇 costs
  • 3,660 篇 testing

机构

  • 3,268 篇 school of electr...
  • 2,203 篇 chitkara univers...
  • 2,012 篇 department of el...
  • 1,708 篇 department of co...
  • 1,255 篇 university of ch...
  • 1,059 篇 cavendish labora...
  • 978 篇 department of ph...
  • 862 篇 oliver lodge lab...
  • 860 篇 physikalisches i...
  • 807 篇 department of el...
  • 716 篇 department of co...
  • 637 篇 department of co...
  • 610 篇 school of comput...
  • 607 篇 school of comput...
  • 567 篇 school of electr...
  • 533 篇 infn sezione di ...
  • 515 篇 infn laboratori ...
  • 509 篇 infn sezione di ...
  • 504 篇 horia hulubei na...
  • 488 篇 h.h. wills physi...

作者

  • 250 篇 barter w.
  • 239 篇 j. wang
  • 237 篇 s. chen
  • 228 篇 a. gomes
  • 223 篇 blake t.
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 219 篇 bellee v.
  • 217 篇 betancourt c.
  • 216 篇 c. alexa
  • 215 篇 borsato m.
  • 213 篇 boettcher t.
  • 211 篇 brundu d.
  • 210 篇 j. m. izen
  • 205 篇 beiter a.
  • 202 篇 bencivenni g.
  • 195 篇 g. bella
  • 195 篇 j. strandberg
  • 195 篇 c. amelung
  • 194 篇 d. calvet

语言

  • 346,683 篇 英文
  • 10,492 篇 其他
  • 4,393 篇 中文
  • 281 篇 日文
  • 72 篇 德文
  • 71 篇 法文
  • 41 篇 朝鲜文
  • 21 篇 土耳其文
  • 16 篇 荷兰文
  • 16 篇 斯洛文尼亚文
  • 7 篇 俄文
  • 3 篇 阿拉伯文
  • 3 篇 爱沙尼亚文
  • 3 篇 葡萄牙文
  • 2 篇 西班牙文
  • 1 篇 捷克文
  • 1 篇 意大利文
  • 1 篇 泰文
检索条件"机构=Computer Engineering Department and Computer Technology Institute"
361612 条 记 录,以下是71-80 订阅
排序:
Text steganography: enhanced character-level embedding algorithm using font attribute with increased resilience to statistical attacks
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9367-9392页
作者: KL, Shreya Narasimhan R, Bala Krishnan Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli Tamil Nadu Tiruchirappalli India
Text steganography, the science of hiding secret messages in innocent-looking text documents ensures the secrecy of the embedded secret. Cryptography, on the other hand, encrypts and converts the secret message into a... 详细信息
来源: 评论
Complex preference analysis: a score-based evaluation strategy for ranking and comparison of the evolutionary algorithms
收藏 引用
Soft Computing 2025年 第4期29卷 1967-1980页
作者: Sarkar, Debojyoti Biswas, Anupam Department of Computer Science and Engineering National Institute of Technology Silchar Assam Silchar788010 India
In this paper, an evaluation strategy is proposed for evaluation of optimization algorithms, called the Complex Preference Analysis, that assesses the efficiency of different evolutionary algorithms by considering mul... 详细信息
来源: 评论
A brief review on Quantum Key Distribution Protocols
收藏 引用
Multimedia Tools and Applications 2025年 1-40页
作者: Kumar, Mandeep Mondal, Bhaskar Department of Computer Science & Engineering National Institute of Technology Patna Bihar Patna800005 India
Development in Quantum computing paves the path to Quantum key distribution (QKD) by using the principles of quantum physics. QKD enables two remote parties to produce and share secure keys while removing all computin... 详细信息
来源: 评论
Improved security with novel M-Log chaos steganography algorithm for huffman compressed english text
收藏 引用
Multimedia Tools and Applications 2025年 第2期84卷 665-688页
作者: Raghuvanshi, Devvrat Joshi, Kamaldeep Nandal, Rainu Sehrawat, Harkesh Singh, Surender Singh, Srishti Department of Computer Science and Engineering University Institute of Engineering and Technology Maharshi Dayanand University Rohtak Haryana India
This paper addresses the underexplored landscape of chaotic functions in steganography, existing literature when examined under PRISMA-ScR framework it was realized that most of the studies predominantly focuses on ut... 详细信息
来源: 评论
HeRo: Heuristic-Based Routing in Payment Channel Networks
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2025年 第1期7卷 56-60页
作者: Mishra, Shruti Aggarwal, Virat Pal, Sujata Agarwal, Vidushi Indian Institute of Technology Ropar Department of Computer Science and Engineering Rupnagar140001 India
Payment channels support off-chain transactions by enhancing transaction speed and reducing fees in the main blockchain. However, the costs and complexity of the network increase as we increase the size of the network... 详细信息
来源: 评论
A Software Defect Prediction Method Using a Multivariate Heterogeneous Hybrid Deep Learning Algorithm
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3251-3279页
作者: Qi Fei Haojun Hu Guisheng Yin Zhian Sun College of Computer Science and Technology Harbin Engineering UniversityHarbin150001China Information Technology Research Department Jiangsu Automation Research InstituteLianyungang222062China School of Computer Science and Technology Harbin Institute of TechnologyShenzhen518055China
Software defect prediction plays a critical role in software development and quality assurance processes. Effective defect prediction enables testers to accurately prioritize testing efforts and enhance defect detecti... 详细信息
来源: 评论
Enhancing the Efficiency of Attacker with Improved Fruit Fly Optimization on Random Key Distribution for WSN
收藏 引用
SN computer Science 2025年 第3期6卷 1-24页
作者: Bathla, Rohit Ahlawat, Priyanka Department of Computer Engineering National Institute of Technology Kurukshetra India
Wireless sensor networks (WSN) have seen immense use in everyday life, like health, battle-field administration, and disaster administration. Nodes inside WSN are more vulnerable to safety attacks like data replay and... 详细信息
来源: 评论
A moment-based pooling approach in convolutional neural networks for breast cancer histopathology image classification
收藏 引用
Neural Computing and Applications 2025年 第2期37卷 1127-1156页
作者: Kumar, Arvind Singh, Chandan Sachan, Manoj Kumar Department of Computer Science and Engineering Sant Longowal Institute of Engineering and Technology Longowal Punjab Sangrur148106 India Department of Computer Science Punjabi University Punjab Patiala147002 India
Automated analysis of breast cancer (BC) histopathology images is a challenging task due to the high resolution, multiple magnifications, color variations, the presence of image artifacts, and morphological variabilit... 详细信息
来源: 评论
Real-Time, Free-Viewpoint Holographic Patient Rendering for Telerehabilitation via a Single Camera: A Data-driven Approach with 3D Gaussian Splatting for Real-World Adaptation
收藏 引用
IEEE Transactions on Visualization and computer Graphics 2025年 第5期31卷 2484-2493页
作者: Cao, Shengting Zhao, Jiamiao Hu, Fei Gan, Yu University of Alabama Department of Electrical Computer Engineering United States Stevens Technology Institute Department of Biomedical Engineering United States
Telerehabilitation is a cost-effective alternative to in-clinic rehabilitation. Although convenient, it lacks immersive and free-viewpoint patient visualization. Current research explores two solutions to this issue. ... 详细信息
来源: 评论
ProxaDyn: A Proximity-Aware Dynamic Caching Approach for Named Data Networks
收藏 引用
IEEE Transactions on Network Science and engineering 2025年 第3期12卷 2360-2372页
作者: Kumari, Matta Krishna Tripathi, Nikhil Joshi, Piyush Indian Institute of Information Technology Computer Science and Engineering Group Sri City517 646 India Department of Computer Science and Engineering Dhanbad826 004 India
Named Data Network (NDN), a future Internet architecture is introduced to address the shortcomings of the current Internet architecture. NDN supports in-network caching to facilitate scalable content distribution and ... 详细信息
来源: 评论