咨询与建议

限定检索结果

文献类型

  • 428,850 篇 会议
  • 159,698 篇 期刊文献
  • 3,629 册 图书
  • 16 篇 学位论文

馆藏范围

  • 592,191 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 344,555 篇 工学
    • 232,037 篇 计算机科学与技术...
    • 188,510 篇 软件工程
    • 83,762 篇 信息与通信工程
    • 55,097 篇 控制科学与工程
    • 45,567 篇 电气工程
    • 44,335 篇 电子科学与技术(可...
    • 38,955 篇 生物工程
    • 28,861 篇 生物医学工程(可授...
    • 26,081 篇 光学工程
    • 24,745 篇 机械工程
    • 19,238 篇 化学工程与技术
    • 18,845 篇 仪器科学与技术
    • 17,958 篇 动力工程及工程热...
    • 14,591 篇 材料科学与工程(可...
    • 12,656 篇 安全科学与工程
    • 11,861 篇 网络空间安全
    • 11,822 篇 交通运输工程
  • 187,823 篇 理学
    • 95,358 篇 数学
    • 58,537 篇 物理学
    • 43,488 篇 生物学
    • 30,842 篇 统计学(可授理学、...
    • 21,719 篇 系统科学
    • 20,459 篇 化学
  • 87,628 篇 管理学
    • 52,871 篇 管理科学与工程(可...
    • 38,567 篇 图书情报与档案管...
    • 24,762 篇 工商管理
  • 26,791 篇 医学
    • 22,331 篇 临床医学
    • 20,065 篇 基础医学(可授医学...
    • 12,698 篇 药学(可授医学、理...
  • 15,712 篇 法学
    • 12,862 篇 社会学
  • 9,557 篇 经济学
  • 7,542 篇 农学
  • 6,421 篇 教育学
  • 2,753 篇 文学
  • 1,328 篇 军事学
  • 845 篇 艺术学
  • 104 篇 哲学
  • 57 篇 历史学

主题

  • 26,553 篇 computer science
  • 14,540 篇 accuracy
  • 14,044 篇 computational mo...
  • 13,769 篇 feature extracti...
  • 12,202 篇 deep learning
  • 11,540 篇 training
  • 10,810 篇 machine learning
  • 8,106 篇 predictive model...
  • 7,986 篇 data mining
  • 7,667 篇 support vector m...
  • 7,448 篇 computer archite...
  • 7,436 篇 optimization
  • 7,052 篇 real-time system...
  • 6,867 篇 neural networks
  • 6,769 篇 wireless sensor ...
  • 6,759 篇 data models
  • 6,678 篇 convolutional ne...
  • 6,419 篇 costs
  • 6,322 篇 algorithm design...
  • 6,237 篇 protocols

机构

  • 2,488 篇 school of comput...
  • 2,219 篇 chitkara univers...
  • 2,193 篇 school of comput...
  • 2,072 篇 school of comput...
  • 1,788 篇 school of comput...
  • 1,692 篇 department of co...
  • 1,458 篇 school of comput...
  • 1,440 篇 school of comput...
  • 1,330 篇 school of comput...
  • 1,325 篇 department of co...
  • 1,291 篇 department of el...
  • 1,288 篇 school of electr...
  • 1,206 篇 school of comput...
  • 1,174 篇 college of compu...
  • 1,133 篇 department of el...
  • 1,010 篇 school of comput...
  • 1,005 篇 university of ch...
  • 969 篇 department of ph...
  • 962 篇 college of compu...
  • 948 篇 cavendish labora...

作者

  • 432 篇 niyato dusit
  • 325 篇 liu yang
  • 286 篇 yang yang
  • 252 篇 barter w.
  • 240 篇 wang wei
  • 229 篇 blake t.
  • 226 篇 s. chen
  • 225 篇 j. wang
  • 222 篇 betancourt c.
  • 220 篇 borsato m.
  • 217 篇 bellee v.
  • 217 篇 bowcock t.j.v.
  • 215 篇 amato s.
  • 210 篇 brundu d.
  • 209 篇 boettcher t.
  • 206 篇 a. gomes
  • 201 篇 beiter a.
  • 194 篇 c. alexa
  • 192 篇 j. m. izen
  • 191 篇 c. amelung

语言

  • 502,009 篇 英文
  • 83,557 篇 其他
  • 7,336 篇 中文
  • 364 篇 日文
  • 111 篇 朝鲜文
  • 95 篇 德文
  • 66 篇 法文
  • 64 篇 斯洛文尼亚文
  • 16 篇 阿拉伯文
  • 16 篇 俄文
  • 15 篇 西班牙文
  • 6 篇 捷克文
  • 6 篇 葡萄牙文
  • 5 篇 土耳其文
  • 4 篇 意大利文
  • 3 篇 荷兰文
  • 3 篇 波兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 芬兰文
  • 1 篇 泰文
检索条件"机构=Computer Science and Computer Engineering"
592193 条 记 录,以下是4761-4770 订阅
排序:
PDC-ViT: source camera identification using pixel difference convolution and vision transformer
收藏 引用
Neural Computing and Applications 2025年 第9期37卷 6933-6949页
作者: Elharrouss, Omar Akbari, Younes Almadeed, Noor Al-Maadeed, Somaya Khelifi, Fouad Bouridane, Ahmed Department of Computer Science and Software Engineering United Arab Emirates University Al Ain United Arab Emirates Department of Computer Science and Engineering Qatar University Doha Qatar Northumbria University Newcastle Newcastle upon Tyne United Kingdom University of Sharjah Sharjah United Arab Emirates
Source camera identification has emerged as a vital solution to unlock incidents involving critical cases like terrorism, violence, and other criminal activities. The ability to trace the origin of an image/video can ... 详细信息
来源: 评论
ER-Net:Efficient Recalibration Network for Multi-ViewMulti-Person 3D Pose Estimation
收藏 引用
computer Modeling in engineering & sciences 2023年 第8期136卷 2093-2109页
作者: Mi Zhou Rui Liu Pengfei Yi Dongsheng Zhou National and Local Joint Engineering Laboratory of Computer Aided Design School of Software EngineeringDalian UniversityDalian116622China School of Computer Science and Technology Dalian University of TechnologyDalian116024China
Multi-view multi-person 3D human pose estimation is a hot topic in the field of human pose estimation due to its wide range of application *** the introduction of end-to-end direct regression methods,the field has ent... 详细信息
来源: 评论
TCAM-based packet classification for many-field rules of SDNs
收藏 引用
computer Communications 2023年 第1期203卷 89-98页
作者: Lin, Hsin-Tsung Wang, Pi-Chung Department of Computer Science and Engineering National Chung Hsing University Taichung402 Taiwan
Software-defined networking (SDN) provides an emerging paradigm for future network architectures. OpenFlow is a widely deployed south-bound protocol for SDN. It uses rule-based packet forwarding and each rule may supp... 详细信息
来源: 评论
A review on applications of holomorphic embedding methods
收藏 引用
iEnergy 2023年 第4期2卷 264-274页
作者: Kaiyang Huang Kai Sun Department of Electrical Engineering and Computer Science University of TennesseeKnoxvilleTN 37996USA
The holomorphic embedding method(HEM)stands as a mathematical technique renowned for its favorable convergence properties when resolving algebraic systems involving complex *** key idea behind the HEM is to convert th... 详细信息
来源: 评论
Java-Powered Digital Healthcare Management: innovating Medical Administration Systems  5
Java-Powered Digital Healthcare Management: innovating Medic...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Kathiravan, M. Lakshmi, I. Durga, V. Sathya Saravanan, S. Vijayakumar, M. Bharathiraja, N. Computer Science and Engineering Chennai India Saveetha School of Engineering Computer Science and Engineering Chennai Thandalam India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
Web-based technology provides various online services to virtually all businesses. Almost everything can be completed online, so fewer duties, expenses, and labour costs exist. The article explores the concept of a we... 详细信息
来源: 评论
Intrusion detection and prevention of DDoS attacks in cloud computing environment: a review on issues and current methods
收藏 引用
International Journal of Cloud Computing 2023年 第5期12卷 450-481页
作者: Devi, B.S. Kiruthika Subbulakshmi, T. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai India
Cloud computing has emerged as the most successful service model for the IT/ITES community due to the various long-term incentives offered in terms of reduced cost, availability, reliability and improved QoS to the cl... 详细信息
来源: 评论
Deep learning model for plant-leaf disease detection in precision agriculture
收藏 引用
International Journal of Intelligent Systems Technologies and Applications 2023年 第1期21卷 72-91页
作者: Bajpai, Chandrabhanu Sahu, Ramnarayan Naik, K. Jairam Department of Computer Science and Engineering National Institute of Technology Raipur Chhattisgarh Raipur India
Crop disease in the agricultural is the main factor limiting yield and food quality. It requires timely diagnosis of crop illnesses for the better economy developing country. Manual crop illness assessment is limited ... 详细信息
来源: 评论
DeepQ Based Automated Irrigation Systems Using Deep Belief WSN
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 3415-3427页
作者: E.Gokulakannan Department of Computer Science and Engineering MRK Institute of TechnologyCuddalore608301TamilnaduIndia
Deep learning is the subset of artificial intelligence and it is used for effective decision *** Sensor based automated irrigation system is proposed to monitor and cultivate *** system consists of Distributed wire-les... 详细信息
来源: 评论
Efficient Approach to Improve the Security of PDF Readers Using Transfer Learning for Few Shots Sample Scenario  2
Efficient Approach to Improve the Security of PDF Readers Us...
收藏 引用
2nd International Conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Bhardwaj, Sonam Dave, Mayank Dalal, Sumit School of Computer Science Engineering and Technology Bennett University Greater Noida India National Institute of Technology Department of Computer Engineering Kurukshetra India
PDF malware is a significant threat to computer security. The purpose of this study is to introduce a new approach for improving the security of PDF readers. The method utilizes transfer learning by leveraging existin... 详细信息
来源: 评论
An Efficient Real Time Decision Making System for Autonomous Vehicle Using Timber Chased Wolf Optimization Based Ensemble Classifier
收藏 引用
Journal of engineering science and Technology Review 2023年 第1期16卷 75-84页
作者: Jaiswal, Swati Mohan, B. Chandra School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India
An autonomous vehicle is anticipated to increase comfort, safety, energy efficiency, emissions reduction, and mobility. The development of autonomous vehicles depends on decision-making algorithms that can handle comp... 详细信息
来源: 评论