咨询与建议

限定检索结果

文献类型

  • 275,253 篇 会议
  • 112,435 篇 期刊文献
  • 2,825 册 图书

馆藏范围

  • 390,512 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 225,730 篇 工学
    • 149,582 篇 计算机科学与技术...
    • 120,996 篇 软件工程
    • 54,342 篇 信息与通信工程
    • 35,728 篇 控制科学与工程
    • 31,928 篇 电气工程
    • 30,747 篇 电子科学与技术(可...
    • 25,989 篇 生物工程
    • 20,462 篇 生物医学工程(可授...
    • 17,657 篇 光学工程
    • 15,393 篇 机械工程
    • 13,037 篇 化学工程与技术
    • 12,145 篇 仪器科学与技术
    • 12,134 篇 动力工程及工程热...
    • 11,396 篇 材料科学与工程(可...
    • 8,308 篇 安全科学与工程
    • 7,753 篇 网络空间安全
  • 126,925 篇 理学
    • 63,184 篇 数学
    • 41,671 篇 物理学
    • 29,381 篇 生物学
    • 20,546 篇 统计学(可授理学、...
    • 14,865 篇 系统科学
    • 13,949 篇 化学
  • 55,947 篇 管理学
    • 33,719 篇 管理科学与工程(可...
    • 24,438 篇 图书情报与档案管...
    • 16,701 篇 工商管理
  • 19,298 篇 医学
    • 16,209 篇 临床医学
    • 14,572 篇 基础医学(可授医学...
    • 9,155 篇 药学(可授医学、理...
    • 7,767 篇 公共卫生与预防医...
  • 10,564 篇 法学
    • 8,647 篇 社会学
  • 6,447 篇 经济学
  • 5,079 篇 农学
  • 4,194 篇 教育学
  • 1,853 篇 文学
  • 874 篇 军事学
  • 509 篇 艺术学
  • 75 篇 哲学
  • 45 篇 历史学

主题

  • 20,001 篇 computer science
  • 9,234 篇 accuracy
  • 8,812 篇 computational mo...
  • 8,018 篇 feature extracti...
  • 7,655 篇 deep learning
  • 7,248 篇 machine learning
  • 6,556 篇 training
  • 5,282 篇 data mining
  • 5,183 篇 computer archite...
  • 5,093 篇 support vector m...
  • 4,972 篇 predictive model...
  • 4,930 篇 wireless sensor ...
  • 4,683 篇 costs
  • 4,560 篇 optimization
  • 4,547 篇 bandwidth
  • 4,479 篇 application soft...
  • 4,394 篇 protocols
  • 4,388 篇 testing
  • 4,361 篇 real-time system...
  • 4,360 篇 algorithm design...

机构

  • 1,721 篇 department of co...
  • 1,374 篇 department of el...
  • 1,372 篇 department of co...
  • 1,174 篇 department of el...
  • 1,063 篇 cavendish labora...
  • 977 篇 department of ph...
  • 877 篇 department of co...
  • 857 篇 physikalisches i...
  • 846 篇 oliver lodge lab...
  • 814 篇 department of el...
  • 753 篇 university of ch...
  • 641 篇 department of co...
  • 553 篇 department of co...
  • 546 篇 infn sezione di ...
  • 521 篇 chitkara univers...
  • 518 篇 infn laboratori ...
  • 514 篇 infn sezione di ...
  • 501 篇 horia hulubei na...
  • 498 篇 infn sezione di ...
  • 489 篇 department of co...

作者

  • 258 篇 barter w.
  • 254 篇 s. chen
  • 253 篇 j. wang
  • 240 篇 a. gomes
  • 233 篇 blake t.
  • 223 篇 amato s.
  • 222 篇 bellee v.
  • 222 篇 betancourt c.
  • 221 篇 c. alexa
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 216 篇 j. m. izen
  • 214 篇 brundu d.
  • 209 篇 bencivenni g.
  • 207 篇 beiter a.
  • 200 篇 bay a.
  • 193 篇 c. amelung
  • 192 篇 g. bella
  • 191 篇 j. strandberg

语言

  • 345,194 篇 英文
  • 41,695 篇 其他
  • 3,849 篇 中文
  • 220 篇 日文
  • 70 篇 德文
  • 48 篇 法文
  • 42 篇 斯洛文尼亚文
  • 34 篇 朝鲜文
  • 12 篇 西班牙文
  • 11 篇 阿拉伯文
  • 9 篇 俄文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 意大利文
  • 3 篇 捷克文
  • 3 篇 葡萄牙文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Computer Science and Computer Engineering Department"
390513 条 记 录,以下是1101-1110 订阅
排序:
A deep learning approach using modified Xception net for oral malignancy detection using histopathological images of oral mucosa
收藏 引用
International Journal of Applied Decision sciences 2025年 第2期18卷 168-188页
作者: Das, Madhusmita Dash, Rasmita Department of Computer Application Siksha ‘O’ Anusandhan Deemed to be University Odisha Bhubaneswar India Department of Computer Science and Engineering Siksha ‘O’ Anusandhan Deemed to be University Odisha Bhubaneswar India
The early detection of oral malignancy by physicians is a strenuous task. The analysis of histopathological oral malignancy images using image processing and deep learning techniques can be an add-on facility for doct... 详细信息
来源: 评论
An Ingenious IoT Based Crop Prediction System Using ML and EL
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 183-199页
作者: Shabana Ramzan Yazeed Yasin Ghadi Hanan Aljuaid Aqsa Mahmood Basharat Ali Department of Computer Science&IT Government Sadiq CollegeWomen UniversityBahawalpur63100Pakistan Department of Computer Science/Software Engineering Al Ain UniversityAl Ain64141UAE Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman University(PNU)Riyadh11671Saudi Arabia Agronomic Research Station Bahawalpur63100Pakistan
Traditional farming procedures are time-consuming and expensive as based on manual labor. Farmers haveno proper knowledge to select which crop is suitable to grow according to the environmental factors and soilcharact... 详细信息
来源: 评论
SFI-Swin: symmetric face inpainting with swin transformer by distinctly learning face components distributions
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 17581-17595页
作者: Givkashi, MohammadHossein Naderi, MohammadReza Karimi, Nader Shirani, Shahram Samavi, Shadrokh Department of Electrical and Computer Engineering Isfahan University of Technology Isfahan84156-83111 Iran Department of Electrical and Computer Engineering McMaster University HamiltonL8S 4L8 Canada Computer Science Department Seattle University Seattle98122 United States
Image inpainting consists of filling holes or missing parts of an image. Inpainting face images with symmetric characteristics is more challenging than inpainting a natural scene. None of the powerful existing models ... 详细信息
来源: 评论
AR-Light: Enabling Fast and Lightweight Multi-User Augmented Reality via Semantic Segmentation and Collaborative View Synchronization
收藏 引用
IEEE Transactions on computers 2025年 第6期74卷 2073-2086页
作者: Wen, Yu Shah, Aamir Bader Cao, Ruizhi Zhang, Chen Chen, Jiefu Wu, Xuqing Xie, Chenhao Fu, Xin University of Houston Department of Electrical and Computer Engineering HoustonTX77204 United States Beihang University School of Computer Science and Engineering Beijing100191 China University of Houston Department of Information Science Technology HoustonTX77204 United States
Multi-user Augmented Reality (MuAR) allows multiple users to interact with shared virtual objects, facilitated by exchanging environment information. Current MuAR systems rely on 3D point clouds for real-world analysi... 详细信息
来源: 评论
Resource Profiling for Virtualized Radio Access Networks  18
Resource Profiling for Virtualized Radio Access Networks
收藏 引用
18th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2024
作者: Tella, Rajashekhar Reddy Gupta, Utkarsh Venkateswarlu, Gudepu Chintapalli, Venkatarami Reddy Tamma, Bheemarjuna Reddy Kondepu, Koteswararao IIT Dharwad Department of Computer Science and Engineering Dharwad India National Institute of Technology Department of Computer Science and Engineering Kerala Calicut India IIT Hyderabad Department of Computer Science and Engineering Hyderabad India
The mobile networks are rapidly evolving, transitioning from specialized hardware to fully virtualized platforms that run on commercial off-the-shelf (COTS) hardware powered by general-purpose processors. Mobile opera... 详细信息
来源: 评论
A Review: DDoS Attack Detection Using Clustering Algorithms  5
A Review: DDoS Attack Detection Using Clustering Algorithms
收藏 引用
5th International Conference on Artificial Intelligence and Data sciences, AiDAS 2024
作者: Mishra, Amit Kumar Thapliyal, Siddhant Siddiqui, Junedh Bhatt, Rohit Naithani, Keshav Joshi, Ankit Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Department of Computer Science and Engineering Dehradun India
Distributed Denial of Service (DDoS) attacks pose a substantial threat to the stability and security of networked systems by disrupting server replies and services. Their popularity arises from their ease of setup and... 详细信息
来源: 评论
A Systematic Review on Federated Learning in Edge-Cloud Continuum
收藏 引用
SN computer science 2024年 第7期5卷 1-21页
作者: Mishra, Sambit Kumar Sahoo, Subham Kumar Swain, Chinmaya Kumar Department of Computer Science and Engineering SRM University-AP Andhra Pradesh Amaravati India Department of Computer Science and Engineering IMIT BPUT Odisha Cuttack India
Federated learning (FL) is a cutting-edge machine learning platform that protects user privacy while enabling collaborative learning across various devices. It is particularly relevant in the current environment when ... 详细信息
来源: 评论
Non Plant Specific Smart Greenhouse with Convective Drying Unit  2
Non Plant Specific Smart Greenhouse with Convective Drying U...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Mukherjee, Jhilam Mukherjee, Dibyasree Upadhyay, Sneha Basu, Ariyan Shaw, Lipakshi Singh, Debiya Manna, Sumana Adamas University Department of Computer Science Engineering Barasat India Adamas University Department of Computer Science and Engineering Barasat India
This paper presents a thorough analysis of the design and execution of a smart greenhouse system that makes use of machine learning and IoT technology. By automating critical procedures, improving monitoring capabilit... 详细信息
来源: 评论
Forecasting Bitcoin Prices Using Deep Learning for Consumer-Centric Industrial Applications
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 1351-1358页
作者: Roy, Pradeep Kumar Kumar, Abhinav Singh, Ashish Sangaiah, Arun Kumar Indian Institute of Information Technology Surat Department of Computer Science and Engineering Surat394190 India Motilal Nehru National Institute of Technology Allahabad Department of Computer Science and Engineering Prayagraj211004 India KIIT Deemed to Be University School of Computer Engineering Bhubaneswar751024 India National Yunlin University of Science and Technology International Graduate Institute of AI Douliou64002 Taiwan Lebanese American University Department of Electrical and Computer Engineering Byblos1102-2801 Lebanon
As cryptocurrencies become more popular as investment vehicles, bitcoin draws interest from businesses, consumers, and computer scientists all across the world. Bitcoin is a computer file stored in digital wallet appl... 详细信息
来源: 评论
A lightweight approach for intrusion detection in WSNs based on DCGAN
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第2期17卷 951-957页
作者: Devi, Manu Nandal, Priyanka Sehrawat, Harkesh Department of Computer Science and Engineering University Institute of Engineering and Technology Maharshi Dayanand University Haryana India Department of Computer Science and Engineering Maharaja Surajmal Institute of Technology New Delhi India
Ensuring strong security procedures is crucial in the rapidly advancing realm of wireless sensor networks (WSNs) in order to protect sensitive data and preserve network integrity. The resource limitations and unpredic... 详细信息
来源: 评论