咨询与建议

限定检索结果

文献类型

  • 422,194 篇 会议
  • 157,481 篇 期刊文献
  • 3,599 册 图书
  • 103 篇 学位论文

馆藏范围

  • 583,375 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 339,403 篇 工学
    • 228,279 篇 计算机科学与技术...
    • 186,547 篇 软件工程
    • 81,893 篇 信息与通信工程
    • 52,889 篇 控制科学与工程
    • 44,414 篇 电气工程
    • 43,684 篇 电子科学与技术(可...
    • 38,775 篇 生物工程
    • 28,574 篇 生物医学工程(可授...
    • 25,754 篇 光学工程
    • 24,253 篇 机械工程
    • 18,952 篇 化学工程与技术
    • 18,432 篇 仪器科学与技术
    • 17,520 篇 动力工程及工程热...
    • 14,291 篇 材料科学与工程(可...
    • 12,123 篇 安全科学与工程
    • 11,298 篇 交通运输工程
    • 10,936 篇 网络空间安全
  • 185,765 篇 理学
    • 94,460 篇 数学
    • 57,848 篇 物理学
    • 43,253 篇 生物学
    • 30,424 篇 统计学(可授理学、...
    • 21,690 篇 系统科学
    • 19,897 篇 化学
  • 86,063 篇 管理学
    • 51,695 篇 管理科学与工程(可...
    • 37,933 篇 图书情报与档案管...
    • 24,536 篇 工商管理
  • 25,986 篇 医学
    • 21,912 篇 临床医学
    • 19,849 篇 基础医学(可授医学...
    • 12,679 篇 药学(可授医学、理...
  • 15,409 篇 法学
    • 12,590 篇 社会学
  • 9,461 篇 经济学
  • 7,438 篇 农学
  • 6,280 篇 教育学
  • 2,643 篇 文学
  • 1,322 篇 军事学
  • 838 篇 艺术学
  • 105 篇 哲学
  • 58 篇 历史学

主题

  • 26,540 篇 computer science
  • 13,607 篇 computational mo...
  • 13,532 篇 accuracy
  • 13,324 篇 feature extracti...
  • 11,313 篇 deep learning
  • 11,212 篇 training
  • 10,370 篇 machine learning
  • 7,922 篇 data mining
  • 7,791 篇 predictive model...
  • 7,486 篇 support vector m...
  • 7,336 篇 computer archite...
  • 7,177 篇 optimization
  • 6,767 篇 neural networks
  • 6,734 篇 wireless sensor ...
  • 6,526 篇 data models
  • 6,440 篇 real-time system...
  • 6,363 篇 costs
  • 6,321 篇 algorithm design...
  • 6,260 篇 convolutional ne...
  • 6,176 篇 protocols

机构

  • 2,435 篇 school of comput...
  • 2,176 篇 school of comput...
  • 2,132 篇 chitkara univers...
  • 2,024 篇 school of comput...
  • 1,752 篇 school of comput...
  • 1,662 篇 department of co...
  • 1,450 篇 school of comput...
  • 1,399 篇 school of comput...
  • 1,315 篇 department of co...
  • 1,303 篇 school of electr...
  • 1,294 篇 department of el...
  • 1,269 篇 school of comput...
  • 1,131 篇 school of comput...
  • 1,101 篇 department of el...
  • 1,089 篇 college of compu...
  • 979 篇 university of ch...
  • 966 篇 department of ph...
  • 962 篇 school of comput...
  • 948 篇 college of compu...
  • 940 篇 cavendish labora...

作者

  • 413 篇 niyato dusit
  • 314 篇 liu yang
  • 275 篇 yang yang
  • 244 篇 barter w.
  • 236 篇 s. chen
  • 232 篇 j. wang
  • 228 篇 wang wei
  • 221 篇 blake t.
  • 217 篇 betancourt c.
  • 215 篇 bowcock t.j.v.
  • 215 篇 borsato m.
  • 214 篇 bellee v.
  • 210 篇 amato s.
  • 207 篇 a. gomes
  • 205 篇 beiter a.
  • 205 篇 brundu d.
  • 204 篇 boettcher t.
  • 195 篇 c. alexa
  • 193 篇 j. m. izen
  • 192 篇 c. amelung

语言

  • 558,874 篇 英文
  • 17,606 篇 其他
  • 6,803 篇 中文
  • 362 篇 日文
  • 110 篇 朝鲜文
  • 59 篇 德文
  • 39 篇 法文
  • 20 篇 斯洛文尼亚文
  • 10 篇 西班牙文
  • 9 篇 荷兰文
  • 8 篇 土耳其文
  • 6 篇 葡萄牙文
  • 4 篇 捷克文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Science and Computer Engineering"
583377 条 记 录,以下是151-160 订阅
排序:
A privacy-preserving method for publishing data with multiple sensitive attributes
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第1期9卷 222-238页
作者: Tong Yi Minyong Shi Wenqian Shang Haibin Zhu School of Computer Science and Engineering Guangxi Normal UniversityGuilinChina School of Computer Science Communication University of ChinaBeijingChina Department of Computer Science and Mathematics Nipissing UniversityNorth BayOntarioCanada
The overgeneralisation may happen because most studies on data publishing for multiple sensitive attributes(SAs)have not considered the personalised privacy ***,sensitive information disclosure may also be caused by t... 详细信息
来源: 评论
Poor and rich squirrel algorithm-based Deep Maxout network for credit card fraud detection
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第2期28卷 123-134页
作者: Paul, Annu Paul, Varghese Department of Computer Science Alphonsa College Kottayam Kerala Pala India Department of Computer Science and Engineering Rajagiri School of Engineering and Technology Kerala Kochi India
This paper proposes a Poor and Rich Squirrel Algorithm (PRSA)-based Deep Maxout network to find fraud data transactions in the credit card system. Initially, input transaction data is passed to the data transformation... 详细信息
来源: 评论
Multi-Scale Feature Optimization Point Cloud Completion Network Integrating SoftPool
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第1期52卷 233-243页
作者: Zhang, Wanpeng Zhou, Ziwei School of Computer Science and Software Engineering University of Science and Technology LiaoNing Anshan114051 China School of Computer Science and Software Engineering University of Science and Technology LiaoNing Anshan114051 China
Point cloud completion is crucial in point cloud processing, as it can repair and refine incomplete 3D data, ensuring more accurate models. However, current point cloud completion methods commonly face a challenge: th... 详细信息
来源: 评论
Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1205-1222页
作者: Jungpil Shin Md.AlMehedi Hasan Md.Maniruzzaman Taiki Watanabe Issei Jozume School of Computer Science and Engineering The University of AizuAizuwakamatsuFukushima965-8580Japan Department of Computer Science&Engineering Rajshahi University of Engineering&TechnologyRajshahi6204Bangladesh
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f... 详细信息
来源: 评论
Spectral analysis of bone-conducted speech using modified linear prediction
收藏 引用
International Journal of Speech Technology 2024年 第4期27卷 1039-1053页
作者: Ohidujjaman Hasan, Mahmudul Zhang, Shiming Huda, Mohammad Nurul Uddin, Mohammad Shorif Computer Science and Engineering Daffodil International University Dhaka1216 Bangladesh Computer Science and Engineering Comilla University Comilla3506 Bangladesh School of Electrical and Information Northeast Agricultural University Harbin150030 China Computer Science and Engineering United International University Dhaka1212 Bangladesh Computer Science and Engineering Green University of Bangladesh Kanchon1460 Bangladesh Computer Science and Engineering Jahangirnagar University Savar1342 Bangladesh
This paper improves the performance of linear prediction (LP) in precise spectral estimation of bone-conducted (BC) speech. Inherently, BC speech contains a wide spectral dynamic range that causes ill conditioning in ... 详细信息
来源: 评论
A Privacy-Preserving Graph Neural Network Framework with Attention Mechanism for Computational Offloading in the Internet of Vehicles
收藏 引用
computer Modeling in engineering & sciences 2025年 第4期143卷 225-254页
作者: Aishwarya Rajasekar Vetriselvi Vetrian Department of Computer Science and Engineering College of Engineering GuindyAnna UniversityChennai600025India
The integration of technologies like artificial intelligence,6G,and vehicular ad-hoc networks holds great potential to meet the communication demands of the Internet of Vehicles and drive the advancement of vehicle **... 详细信息
来源: 评论
Real-time earthquake magnitude prediction using designed machine learning ensemble trained on real and CTGAN generated synthetic data
收藏 引用
Geodesy and Geodynamics 2025年 第3期16卷 350-368页
作者: Joshi, Anushka Raman, Balasubramanian Mohan, C. Krishna Department of Computer Science and Engineering Indian Institute of Technology Uttarakhand Roorkee India Department of Computer Science and Engineering Indian Institute of Technology Telangana Hyderabad India
The earthquake early warning (EEW) system provides advance notice of potentially damaging ground shaking. In EEW, early estimation of magnitude is crucial for timely rescue operations. A set of thirty-four features is... 详细信息
来源: 评论
Highly Efficient Back‑End‑of‑Line Compatible Flexible Si‑Based Optical Memristive Crossbar Array for Edge Neuromorphic Physiological Signal Processing and Bionic Machine Vision
收藏 引用
Nano-Micro Letters 2024年 第11期16卷 323-339页
作者: Dayanand Kumar Hanrui Li Dhananjay D.Kumbhar Manoj Kumar Rajbhar Uttam Kumar Das Abdul Momin Syed Georgian Melinte Nazek El‑Atab Smart Advanced Memory Devices and Applications(SAMA)LaboratoryElectrical and Computer EngineeringComputer Electrical Mathematical Science and EngineeringKing Abdullah University of Science and Technology(KAUST)23955‑6900 ThuwalSaudi Arabia
The emergence of the Internet-of-Things is anticipated to create a vast market for what are known as smart edge devices,opening numerous opportunities across countless domains,including personalized healthcare and adv... 详细信息
来源: 评论
Adaptive ROI Optimization Pyramid Network: Lane Detection for FSD under Data Uncertainty
收藏 引用
engineering Letters 2025年 第2期33卷 282-291页
作者: Cao, Xu Liu, Weisheng Wang, Zhijian College of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan China College of Computer Science and Software Engineering University of Science and Technology Liaoning Co Anshan114051 China
To mitigate the challenges posed by data uncertainty in Full-Self Driving (FSD) systems. This paper proposes a novel feature extraction learning model called Adaptive Region of Interest Optimized Pyramid Network (ARO)... 详细信息
来源: 评论
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1901-1918页
作者: Ahmad O.Aseeri Sajjad Hussain Chauhdary Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science Texas Tech UniversityLubbockUSA
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ... 详细信息
来源: 评论