咨询与建议

限定检索结果

文献类型

  • 53,774 篇 会议
  • 27,402 篇 期刊文献
  • 754 册 图书

馆藏范围

  • 81,930 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,039 篇 工学
    • 36,796 篇 计算机科学与技术...
    • 29,921 篇 软件工程
    • 13,916 篇 信息与通信工程
    • 8,206 篇 控制科学与工程
    • 6,060 篇 电气工程
    • 6,001 篇 生物工程
    • 5,701 篇 电子科学与技术(可...
    • 4,141 篇 生物医学工程(可授...
    • 3,806 篇 机械工程
    • 3,686 篇 光学工程
    • 2,710 篇 仪器科学与技术
    • 2,506 篇 动力工程及工程热...
    • 2,369 篇 化学工程与技术
    • 2,279 篇 网络空间安全
    • 2,131 篇 安全科学与工程
    • 1,962 篇 交通运输工程
  • 26,785 篇 理学
    • 14,387 篇 数学
    • 7,349 篇 物理学
    • 6,661 篇 生物学
    • 4,635 篇 统计学(可授理学、...
    • 3,046 篇 系统科学
    • 2,488 篇 化学
  • 14,691 篇 管理学
    • 9,035 篇 管理科学与工程(可...
    • 6,260 篇 图书情报与档案管...
    • 3,812 篇 工商管理
  • 4,128 篇 医学
    • 3,458 篇 临床医学
    • 3,107 篇 基础医学(可授医学...
    • 1,873 篇 药学(可授医学、理...
    • 1,806 篇 公共卫生与预防医...
  • 2,382 篇 法学
    • 1,865 篇 社会学
  • 1,418 篇 经济学
  • 1,169 篇 农学
  • 977 篇 教育学
  • 372 篇 文学
  • 241 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,197 篇 feature extracti...
  • 2,084 篇 computer science
  • 1,967 篇 deep learning
  • 1,966 篇 accuracy
  • 1,618 篇 machine learning
  • 1,605 篇 computational mo...
  • 1,560 篇 training
  • 1,224 篇 data mining
  • 1,075 篇 internet of thin...
  • 1,074 篇 support vector m...
  • 1,049 篇 optimization
  • 1,002 篇 predictive model...
  • 891 篇 educational inst...
  • 870 篇 wireless sensor ...
  • 867 篇 semantics
  • 836 篇 artificial intel...
  • 823 篇 real-time system...
  • 789 篇 security
  • 773 篇 neural networks
  • 730 篇 image segmentati...

机构

  • 689 篇 school of comput...
  • 538 篇 school of comput...
  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 275 篇 department of ph...
  • 259 篇 department of ph...
  • 258 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 220 篇 department of ph...
  • 220 篇 departamento de ...
  • 216 篇 physics division...
  • 216 篇 department of co...
  • 206 篇 department of ph...
  • 201 篇 school of comput...
  • 197 篇 department of ph...
  • 186 篇 department of ph...
  • 175 篇 college of compu...
  • 168 篇 department for p...
  • 167 篇 department of ph...
  • 162 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 261 篇 m. klein
  • 260 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 253 篇 h. sakamoto
  • 246 篇 m. rijssenbeek
  • 243 篇 y. tayalati
  • 234 篇 niyato dusit
  • 226 篇 d. guest
  • 226 篇 s. jin
  • 201 篇 f. pastore
  • 201 篇 n. orlando

语言

  • 76,091 篇 英文
  • 4,603 篇 其他
  • 1,248 篇 中文
  • 66 篇 日文
  • 13 篇 斯洛文尼亚文
  • 9 篇 德文
  • 9 篇 法文
  • 6 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 土耳其文
检索条件"机构=Computer Science Engineering and Information Technology"
81930 条 记 录,以下是181-190 订阅
排序:
FLAG: frequency-based local and global network for face forgery detection
收藏 引用
Multimedia Tools and Applications 2025年 第2期84卷 647-663页
作者: Zhou, Kai Sun, Guanglu Wang, Jun Wang, Jiahui Yu, Linsen School of Computer Science and Technology Harbin University of Science and Technology Harbin150080 China Department of Information Engineering and Mathematics University of Siena Siena53100 Italy
Deepfake detection aims to mitigate the threat of manipulated content by identifying and exposing forgeries. However, previous methods primarily tend to perform poorly when confronted with cross-dataset scenarios. To ... 详细信息
来源: 评论
IoT-Based Women Safety Gadgets (WSG): Vision, Architecture, and Design Trends
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 1027-1045页
作者: Sharad Saxena Shailendra Mishra Mohammed Baljon Shamiksha Mishra Sunil Kumar Sharma Prakhar Goel Shubham Gupta Vinay Kishore Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyPatialaPunjab147001India Department of Computer Engineering College of Computer&Information ScienceMajmaah UniversityMajmaah11952Saudi Arabia Department of Computer Science and Engineering National Institute of TechnologyJamshedpur831001India
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s... 详细信息
来源: 评论
Sensitive information leakage analysis of database code by abstract interpretation
收藏 引用
International Journal of Security and Networks 2023年 第2期18卷 91-105页
作者: Jana, Angshuman Department of Computer Science and Engineering Indian Institute of Information Technology Guwahati India
An information system stores outside data in the backend database to process them efficiently and protects sensitive data from illegitimate flow or unauthorised users. However, most information systems are made in suc... 详细信息
来源: 评论
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5035-5048页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis... 详细信息
来源: 评论
Adversarial attacks and defenses for digital communication signals identification
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 756-764页
作者: Qiao Tian Sicheng Zhang Shiwen Mao Yun Lin College of Computer Science and Technology Harbin Engineering UniversityHarbin150001China College of Information and Communication Engineering Harbin Engineering UniversityHarbin150000China Department of Electrical and Computer Engineering Auburn UniversityAuburnAL36849USA
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi... 详细信息
来源: 评论
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论
An ensembled-deep-learning paradigm trained with a self-improved coyote optimization algorithm (SI-COA) for crop disease detection
收藏 引用
Multimedia Tools and Applications 2025年 第4期84卷 1697-1724页
作者: Shukla, Preeti Chandanan, Amit Kumar Department of Computer Science and Information Technology Guru Ghasidas Vishwavidyalaya CG Bilaspur India Department of Computer Science & Engineering Guru Ghasidas Vishwavidyalaya CG Bilaspur India
In recent times, drastic climate changes have caused a substantial increase in the growth of crop diseases. This causes large-scale demolition of crops, decreases cultivation, and eventually leads to the financial los... 详细信息
来源: 评论
An efficient multi-objective task scheduling in edge computing using adaptive honey badger optimisation
收藏 引用
International Journal of Web engineering and technology 2024年 第2期19卷 110-126页
作者: Nagalakshmi, Bantupalli Subramanian, Sumathy School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore632014 India
Task scheduling, which is important in cloud computing, is one of the most challenging issues in this area. Hence, an efficient and reliable task scheduling approach is needed to produce more efficient resource employ... 详细信息
来源: 评论
An overview on IRS-enabled sensing and communications for 6G: architectures, fundamental limits, and joint beamforming designs
收藏 引用
science China(information sciences) 2025年 第5期68卷 170-193页
作者: Xianxin SONG Yuan FANG Feng WANG Zixiang REN Xianghao YU Ye ZHANG Fan LIU Jie XU Derrick Wing Kwan NG Rui ZHANG Shuguang CUI School of Science and Engineering (SSE) Shenzhen Future Network of Intelligence Institute (FNii-Shenzhen)and Guangdong Provincial Key Laboratory of Future Networks of Intelligence The Chinese University of Hong Kong Department of Electrical Engineering City University of Hong Kong School of Information Engineering Guangdong University of Technology Key Laboratory of Wireless-Optical Communications Chinese Academy of Sciences School of Information Science and Technology University of Science and Technology of China Computer School Beijing Information Science and Technology University National Mobile Communications Research Laboratory School of Information Science and Engineering Southeast University School of Electrical Engineering and Telecommunications University of New South Wales School of Science and Engineering Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Department of Electrical and Computer Engineering National University of Singapore
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactiv... 详细信息
来源: 评论
AMachine Learning Approach to User Profiling for Data Annotation of Online Behavior
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2419-2440页
作者: Moona Kanwal Najeed AKhan Aftab A.Khan Computer Science and Information Technology Department NED University of Engineering and TechnologyKarachiPakistan Computer Engineering Department Sir Syed University of Engineering and TechnologyKarachiPakistan College of Education Health and Human ServicesLongwood UniversityFarmvilleVAUSA
The user’s intent to seek online information has been an active area of research in user *** profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and *** u... 详细信息
来源: 评论