咨询与建议

限定检索结果

文献类型

  • 50,580 篇 会议
  • 25,718 篇 期刊文献
  • 893 册 图书

馆藏范围

  • 77,191 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 47,212 篇 工学
    • 34,955 篇 计算机科学与技术...
    • 27,960 篇 软件工程
    • 12,270 篇 信息与通信工程
    • 7,407 篇 控制科学与工程
    • 5,449 篇 生物工程
    • 5,262 篇 电气工程
    • 4,786 篇 电子科学与技术(可...
    • 4,086 篇 生物医学工程(可授...
    • 3,168 篇 机械工程
    • 3,033 篇 光学工程
    • 2,290 篇 仪器科学与技术
    • 2,195 篇 动力工程及工程热...
    • 2,132 篇 网络空间安全
    • 2,037 篇 安全科学与工程
    • 2,013 篇 化学工程与技术
    • 1,725 篇 交通运输工程
  • 25,057 篇 理学
    • 13,461 篇 数学
    • 6,960 篇 物理学
    • 6,172 篇 生物学
    • 4,282 篇 统计学(可授理学、...
    • 2,987 篇 系统科学
    • 2,180 篇 化学
  • 14,136 篇 管理学
    • 8,491 篇 管理科学与工程(可...
    • 6,234 篇 图书情报与档案管...
    • 3,914 篇 工商管理
  • 4,331 篇 医学
    • 3,615 篇 临床医学
    • 3,195 篇 基础医学(可授医学...
    • 1,948 篇 公共卫生与预防医...
    • 1,889 篇 药学(可授医学、理...
  • 2,398 篇 法学
    • 1,924 篇 社会学
  • 1,412 篇 经济学
  • 1,100 篇 农学
  • 1,071 篇 教育学
  • 439 篇 文学
  • 200 篇 军事学
  • 153 篇 艺术学
  • 25 篇 哲学
  • 14 篇 历史学

主题

  • 2,734 篇 computer science
  • 1,784 篇 deep learning
  • 1,727 篇 feature extracti...
  • 1,712 篇 accuracy
  • 1,664 篇 machine learning
  • 1,496 篇 computational mo...
  • 1,248 篇 data mining
  • 1,159 篇 training
  • 1,088 篇 information tech...
  • 1,059 篇 internet of thin...
  • 1,023 篇 support vector m...
  • 977 篇 artificial intel...
  • 864 篇 predictive model...
  • 834 篇 optimization
  • 817 篇 wireless sensor ...
  • 770 篇 educational inst...
  • 725 篇 protocols
  • 718 篇 security
  • 675 篇 real-time system...
  • 656 篇 neural networks

机构

  • 949 篇 department of co...
  • 479 篇 maharishi school...
  • 352 篇 department of co...
  • 286 篇 department of co...
  • 278 篇 faculty of scien...
  • 274 篇 department of ph...
  • 263 篇 department of ph...
  • 256 篇 faculté des scie...
  • 247 篇 departamento de ...
  • 223 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 department of ph...
  • 215 篇 physics division...
  • 200 篇 department of co...
  • 198 篇 department for p...
  • 196 篇 department of ph...
  • 191 篇 department of ph...
  • 161 篇 maharishi school...
  • 157 篇 institute of phy...
  • 157 篇 institute of phy...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 263 篇 m. klein
  • 262 篇 r. ströhmer
  • 260 篇 h. a. gordon
  • 259 篇 h. sakamoto
  • 256 篇 m. rijssenbeek
  • 249 篇 s. jin
  • 243 篇 y. tayalati
  • 243 篇 d. guest
  • 232 篇 g. gaudio
  • 204 篇 f. marroquim
  • 202 篇 n. orlando

语言

  • 73,789 篇 英文
  • 2,513 篇 其他
  • 892 篇 中文
  • 63 篇 日文
  • 16 篇 斯洛文尼亚文
  • 11 篇 法文
  • 9 篇 德文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science/Information Technology Department"
77191 条 记 录,以下是4991-5000 订阅
排序:
New automatic tool for finding impossible differentials and zero-correlation linear approximations
收藏 引用
science China(information sciences) 2021年 第2期64卷 246-248页
作者: Tingting CUI Shiyao CHEN Kai FU Meiqin WANG Keting JIA School of Cyberspace Hangzhou Dianzi University Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University China Academy of Information and Communications Technology Department of Computer Science and Technology Tsinghua University
Dear editor,Impossible differential cryptanalysis and zero-correlation linear cryptanalysis are two powerful methods in the block cipher field. Herein, we present an automatic tool to find impossible differentials(IDs... 详细信息
来源: 评论
LPG leak detection system using MQTT protocol on LoRa communication module  4
LPG leak detection system using MQTT protocol on LoRa commun...
收藏 引用
4th International Conference on Electrical, Telecommunication and computer Engineering, ELTICOM 2020
作者: Siregar, Baihaqi Pratama, Hendi Fakhri Jaya, Ivan Integrated Research Laboratory Universitas Sumatera Utara Faculty of Computer Science and Information Technology !!!Department of Information Technology Medan Indonesia Universitas Sumatera Utara Faculty of Computer Science and Information Technology Department of Information Technology Medan Indonesia
The fire disaster caused by the leaking of LPG in the air is still a serious threat, especially in densely populated settlements where the walls of houses or roofs stick together. If there has been a fire, the firefig... 详细信息
来源: 评论
A proposal for educational reform in higher education: A innovative use of e-portfolio - Show case at Kanazawa Inst. of Tech.
A proposal for educational reform in higher education: A inn...
收藏 引用
19th International Conference on computers in Education, ICCE 2011
作者: Nakazawa, Minoru Department of Information and Computer Science Kanazawa Institute of Technology Japan
Education in graduate school is expected to catch up rapid changes of social needs and to assure educational opportunities for various carrier goals of students. At KIT(Kanazawa Institute of technology), we started a ... 详细信息
来源: 评论
Comparing between web application effort estimation methods
Comparing between web application effort estimation methods
收藏 引用
2007 International Conference on Computational science and its Applications, ICCSA 2007
作者: Moayed, Majid Javid Ghani, Abdul Azim Abdul Seyedzadegan, Mojtaba Department of Computer Science and Information Technology Putra University Malaysia
Effort estimation consist in predict how many hours of work and how many workers are needed to develop a project. This is important in the process of project management. As far as estimation and prediction are concern... 详细信息
来源: 评论
Privacy-preserving decision tree for epistasis detection
收藏 引用
Cybersecurity 2019年 第1期2卷 138-149页
作者: Qingfeng Chen Xu Zhang Ruchang Zhang School of Computer Electronics and Information Guangxi UniversityNanningPeople’s Republic of China Department of Computer Science and Information Technology La Trobe UniversityMelbourneVictoria 3086Australia
The interaction between gene loci,namely epistasis,is a widespread biological genetic *** genome-wide association studies(GWAS),epistasis detection of complex diseases is a major *** many approaches using statistics,m... 详细信息
来源: 评论
Service-Oriented Resource Allocation in Clouds: Pursuing Flexibility and Efficiency
收藏 引用
Journal of computer science & technology 2015年 第2期30卷 421-436页
作者: 张胜 钱柱中 吴杰 陆桑璐 State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210023 China Department of Computer Science and Technology Nanjing University Nanjing 210023 China Department of Computer and Information Sciences Temple University Philadelphia PA 19122 U.S.A
The networking-oblivious resource reservation model in today's public clouds cannot guarantee the performance of tenants' applications. Virtual networks that capture both computing and networking resource requiremen... 详细信息
来源: 评论
Confidence interval on the kinetic parameters of simple condensed phase reactions
收藏 引用
Chemometrics and Intelligent Laboratory Systems 2025年 263卷
作者: Alireza Aghili Amir Hossein Haghighi Amir Hossein Shabani Department of Polymer Engineering Shiraz Branch Islamic Azad University Shiraz 71987-74731 Iran Department of Computer Science Engineering and Information Technology Shiraz University Shiraz 71946-84334 Iran
Confidence intervals play a crucial role in statistical inference, as they provide a range of values within which a population parameter is likely to fall, thereby enabling researchers to quantify the uncertainty asso...
来源: 评论
A Review of Activity Detection Methods Used in Videos Streaming
A Review of Activity Detection Methods Used in Videos Stream...
收藏 引用
2023 International Conference on Robotics and Automation in Industry, ICRAI 2023
作者: Khursheed, Sehrish Khalid, Samina Riaz, Farzana Shehryar, Tehmina Department of Computer Science & Information Technology AJK Mirpur Pakistan
Activity detection in videos embraces many recent sub-research directions, such as Action Recognition (what type of activity is being performed), Temporal Action Detection (that states the time of action occurred in a... 详细信息
来源: 评论
A Collaborative Approach for Secured Routing in Mobile Ad-Hoc Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第2期35卷 1337-1351页
作者: W.Gracy Theresa A.Gayathri P.Rama Department of Computer Science and Engineering Panimalar Institute of TechnologyChennai600123Tamil NaduIndia Department of Information Technology Vellore Institute of TechnologyVellore632014Tamil NaduIndia Department of Computer Science and Engineering Loyola Institute of TechnologyChennai600123Tamil NaduIndia
Mobile computing is the most powerful application for network com-munication and connectivity,given recent breakthroughs in thefield of wireless networks or Mobile Ad-hoc networks(MANETs).There are several obstacles th... 详细信息
来源: 评论
LAYER-STRIPPING SOLUTIONS OF MULTIDIMENSIONAL INVERSE SCATTERING PROBLEMS
收藏 引用
JOURNAL OF MATHEMATICAL PHYSICS 1986年 第6期27卷 1701-1710页
作者: YAGLE, AE LEVY, BC Laboratory for Information and Decision Systems Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Cambridge Massachusetts 02139
A layer‐stripping procedure for solving three‐dimensional Schrödinger equation inverse scattering problems is developed. This method operates by recursively reconstructing the potential from the jump in the sca...
来源: 评论