咨询与建议

限定检索结果

文献类型

  • 422,339 篇 会议
  • 159,477 篇 期刊文献
  • 3,573 册 图书
  • 103 篇 学位论文

馆藏范围

  • 585,490 篇 电子文献
  • 9 种 纸本馆藏

日期分布

学科分类号

  • 341,343 篇 工学
    • 229,511 篇 计算机科学与技术...
    • 187,126 篇 软件工程
    • 82,634 篇 信息与通信工程
    • 53,426 篇 控制科学与工程
    • 45,381 篇 电气工程
    • 44,070 篇 电子科学与技术(可...
    • 38,835 篇 生物工程
    • 28,652 篇 生物医学工程(可授...
    • 25,906 篇 光学工程
    • 24,540 篇 机械工程
    • 19,094 篇 化学工程与技术
    • 18,530 篇 仪器科学与技术
    • 17,613 篇 动力工程及工程热...
    • 14,553 篇 材料科学与工程(可...
    • 12,212 篇 安全科学与工程
    • 11,401 篇 交通运输工程
    • 11,270 篇 网络空间安全
  • 186,829 篇 理学
    • 94,902 篇 数学
    • 58,266 篇 物理学
    • 43,445 篇 生物学
    • 30,572 篇 统计学(可授理学、...
    • 21,717 篇 系统科学
    • 20,098 篇 化学
  • 86,424 篇 管理学
    • 51,880 篇 管理科学与工程(可...
    • 38,144 篇 图书情报与档案管...
    • 24,589 篇 工商管理
  • 26,246 篇 医学
    • 22,036 篇 临床医学
    • 19,953 篇 基础医学(可授医学...
    • 12,691 篇 药学(可授医学、理...
  • 15,424 篇 法学
    • 12,599 篇 社会学
  • 9,484 篇 经济学
  • 7,474 篇 农学
  • 6,319 篇 教育学
  • 2,648 篇 文学
  • 1,323 篇 军事学
  • 845 篇 艺术学
  • 105 篇 哲学
  • 58 篇 历史学

主题

  • 26,541 篇 computer science
  • 13,630 篇 computational mo...
  • 13,551 篇 accuracy
  • 13,362 篇 feature extracti...
  • 11,440 篇 deep learning
  • 11,245 篇 training
  • 10,463 篇 machine learning
  • 7,932 篇 data mining
  • 7,808 篇 predictive model...
  • 7,487 篇 support vector m...
  • 7,342 篇 computer archite...
  • 7,199 篇 optimization
  • 6,784 篇 neural networks
  • 6,738 篇 wireless sensor ...
  • 6,539 篇 data models
  • 6,445 篇 real-time system...
  • 6,367 篇 costs
  • 6,321 篇 algorithm design...
  • 6,281 篇 convolutional ne...
  • 6,176 篇 protocols

机构

  • 2,441 篇 school of comput...
  • 2,184 篇 school of comput...
  • 2,135 篇 chitkara univers...
  • 2,033 篇 school of comput...
  • 1,755 篇 school of comput...
  • 1,668 篇 department of co...
  • 1,448 篇 school of comput...
  • 1,405 篇 school of comput...
  • 1,318 篇 department of co...
  • 1,300 篇 school of electr...
  • 1,294 篇 department of el...
  • 1,285 篇 school of comput...
  • 1,141 篇 school of comput...
  • 1,103 篇 department of el...
  • 1,096 篇 college of compu...
  • 989 篇 university of ch...
  • 976 篇 school of comput...
  • 969 篇 department of ph...
  • 953 篇 college of compu...
  • 943 篇 cavendish labora...

作者

  • 423 篇 niyato dusit
  • 336 篇 liu yang
  • 275 篇 yang yang
  • 244 篇 barter w.
  • 237 篇 wang wei
  • 234 篇 s. chen
  • 232 篇 j. wang
  • 221 篇 blake t.
  • 217 篇 betancourt c.
  • 215 篇 bowcock t.j.v.
  • 215 篇 borsato m.
  • 214 篇 bellee v.
  • 210 篇 amato s.
  • 207 篇 a. gomes
  • 205 篇 beiter a.
  • 205 篇 brundu d.
  • 204 篇 boettcher t.
  • 195 篇 c. alexa
  • 193 篇 j. m. izen
  • 192 篇 c. amelung

语言

  • 560,582 篇 英文
  • 17,984 篇 其他
  • 6,848 篇 中文
  • 362 篇 日文
  • 110 篇 朝鲜文
  • 59 篇 德文
  • 40 篇 法文
  • 20 篇 斯洛文尼亚文
  • 10 篇 西班牙文
  • 9 篇 荷兰文
  • 8 篇 土耳其文
  • 6 篇 葡萄牙文
  • 4 篇 捷克文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Science and Computer Engineering"
585492 条 记 录,以下是81-90 订阅
排序:
Advancements in training and deployment strategies for AI-based intrusion detection systems in IoT: a systematic literature review
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-33页
作者: Mallidi, S. Kumar Reddy Ramisetty, Rajeswara Rao Computer Science and Engineering Jawaharlal Nehru Technological University AP Kakinada533003 India Computer Science and Engineering Sri Vasavi Engineering College AP Tadepalligudem534101 India Computer Science and Engineering Jawaharlal Nehru Technological University Gurajada AP Vizianagaram535003 India
As the Internet of Things (IoT) grows, ensuring robust security is crucial. Intrusion Detection Systems (IDS) protect IoT networks from various cyber threats. This systematic literature review (SLR) explores the advan... 详细信息
来源: 评论
Deep Learning-Based Cloud Security: Innovative Attack Detection and Privacy Focused Key Management
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 1978-1989页
作者: Ahmad, Shahnawaz Arif, Mohd Mehfuz, Shabana Ahmad, Javed Nazim, Mohd Bennett University School of Computer Science Engineering and Technology Greater Noida201310 India Galgotias University School of Computer Science & Engineering Greater Noida203201 India Jamia Millia Islamia Department of Electrical Engineering New Delhi110025 India Sharda University Department of Computer Science and Engineering Sharda School of Engineering and Technology Greater Noida201310 India Noida Institute of Engineering and Technology Department of Computer Science and Engineering School of Computer Science and IT Greater Noida201306 India
Cloud Computing (CC) is widely adopted in sectors like education, healthcare, and banking due to its scalability and cost-effectiveness. However, its internet-based nature exposes it to cyber threats, necessitating ad... 详细信息
来源: 评论
Review on Meta-heuristic Algorithm-Based Priority-Aware Computation Offloading in Edge Computing System
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 1-26页
作者: Pilli, Neelima Mohapatra, Debasis Reddy, Shiva Shankar Department of Computer Science and Engineering Biju Patnaik University of Technology Odisha Rourkela India Department of Computer Science and Engineering Parala Maharaja Engineering College Odisha Brahmpur India Department of Computer Science and Engineering Sagi Rama Krishnam Raju Engineering College Andhra Pradesh Bhimavaram India
Advancements in smart applications highlight the need for increased processing and storage capacity at Smart Devices (SDs). To tackle this, Edge computing (EC) is enabled to offload SD workloads to distant edge server... 详细信息
来源: 评论
Improving fish image detection speed with hybrid VGG16 and darknet
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10551-10566页
作者: Sirigineedi, Manikanta Jagan Mohan, R.N.V. Sahu, Bandita Department of Computer Science and Engineering GIET University Odisha Gunupur765022 India Department of Computer Science and Engineering SRKR Engineering College Andhra Pradesh Bhimavaram534201 India
Fish classification and object detection are crucial tasks in the fishery industry. The use of computer vision and deep learning techniques can help automate these tasks and improve the efficiency of the fishery indus... 详细信息
来源: 评论
M-Bi-GRU-CNN: a hybrid deep learning model with optimized feature selection for enhanced crop yield prediction
收藏 引用
Multimedia Tools and Applications 2025年 1-25页
作者: J, Madhuri M, Indiramma N, Nagarathna Department of Computer Science and Engineering Bangalore Institute of Technology Karnataka Bengaluru560004 India Department of Computer Science and Engineering BMS College of Engineering Karnataka Bengaluru560019 India
Weather variability significantly impacts crop yield, posing challenges for large-scale agricultural operations. This study introduces a deep learning-based approach to enhance crop yield prediction accuracy. A Multi-... 详细信息
来源: 评论
Task offloading delay minimization in vehicular edge computing based on vehicle trajectory prediction
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 537-546页
作者: Feng Zeng Zheng Zhang Jinsong Wu School of Computer Science and Engineering Central South University School of Artificial Intelligence Guilin University of Electronic Technology The Department of Computer Science Universidad de Chile
In task offloading, the movement of vehicles causes the switching of connected RSUs and servers, which may lead to task offloading failure or high service delay. In this paper, we analyze the impact of vehicle movemen... 详细信息
来源: 评论
From light sensing to adaptive learning:hafnium diselenide reconfigurable memcapacitive devices in neuromorphic computing
收藏 引用
Light(science & Applications) 2025年 第1期14卷 215-226页
作者: Bashayr Alqahtani Hanrui Li Abdul Momin Syed Nazek El-Atab Electrical and Computer Engineering Program Computer Electrical Mathematical Science and Engineering DivisionKing Abdullah University of Science and Technology(KAUST)ThuwalSaudi Arabia Electrical Engineering Department College of EngineeringPrincess Nourah Bint Abdulrahman University(PNU)RiyadhSaudi Arabia
Advancements in neuromorphic computing have given an impetus to the development of systems with adaptive behavior,dynamic responses,and energy efficiency *** charge-based or emerging memory technologies such as memris... 详细信息
来源: 评论
Robust Image Forgery Localization Using Hybrid CNN-Transformer Synergy Based Framework
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4691-4708页
作者: Sachin Sharma Brajesh Kumar Singh Hitendra Garg Department of Computer Science Abdul Kalam Technical UniversityLucknow226031India Department of Computer Engineering & Applications GLA UniversityMathura281406India Department of Computer Science Raja Balwant Singh Engineering Technical CampusAgra283105India
Image tampering detection and localization have emerged as a critical domain in combating the pervasive issue of image manipulation due to the advancement of the large-scale availability of sophisticated image editing... 详细信息
来源: 评论
FIAC: fine-grained access control mechanism for cloud based IoT framework
收藏 引用
International Journal of Grid and Utility Computing 2025年 第3期16卷 269-278页
作者: Chaudhury, Bhagwat Prasad Dhal, Kasturi Pattnaik, Srikanta Nayak, Ajit Kumar Department of Computer Science and Engineering Silicon Institute of Technology Odisha Bhubaneswar India Department of Computer Science and Engineering S‘O’A University Odisha Bhubaneswar India
Cloud computing technology provides various computing resources on demand to users on pay per use basis. The technology fails in terms of its usage due to confidentiality and privacy issues. Access control mechanisms ... 详细信息
来源: 评论
Poor and rich squirrel algorithm-based Deep Maxout network for credit card fraud detection
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第2期28卷 123-134页
作者: Paul, Annu Paul, Varghese Department of Computer Science Alphonsa College Kottayam Kerala Pala India Department of Computer Science and Engineering Rajagiri School of Engineering and Technology Kerala Kochi India
This paper proposes a Poor and Rich Squirrel Algorithm (PRSA)-based Deep Maxout network to find fraud data transactions in the credit card system. Initially, input transaction data is passed to the data transformation... 详细信息
来源: 评论