咨询与建议

限定检索结果

文献类型

  • 274,856 篇 会议
  • 112,639 篇 期刊文献
  • 2,812 册 图书

馆藏范围

  • 390,306 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 225,694 篇 工学
    • 150,016 篇 计算机科学与技术...
    • 121,279 篇 软件工程
    • 54,556 篇 信息与通信工程
    • 36,037 篇 控制科学与工程
    • 31,625 篇 电气工程
    • 30,537 篇 电子科学与技术(可...
    • 26,051 篇 生物工程
    • 20,531 篇 生物医学工程(可授...
    • 17,875 篇 光学工程
    • 15,408 篇 机械工程
    • 13,043 篇 化学工程与技术
    • 12,219 篇 仪器科学与技术
    • 12,164 篇 动力工程及工程热...
    • 10,889 篇 材料科学与工程(可...
    • 8,337 篇 安全科学与工程
    • 7,801 篇 网络空间安全
  • 127,344 篇 理学
    • 63,208 篇 数学
    • 41,811 篇 物理学
    • 29,429 篇 生物学
    • 20,424 篇 统计学(可授理学、...
    • 14,885 篇 系统科学
    • 14,054 篇 化学
  • 56,054 篇 管理学
    • 33,765 篇 管理科学与工程(可...
    • 24,475 篇 图书情报与档案管...
    • 16,730 篇 工商管理
  • 19,441 篇 医学
    • 16,317 篇 临床医学
    • 14,614 篇 基础医学(可授医学...
    • 9,151 篇 药学(可授医学、理...
    • 7,793 篇 公共卫生与预防医...
  • 10,547 篇 法学
    • 8,627 篇 社会学
  • 6,457 篇 经济学
  • 5,123 篇 农学
  • 4,188 篇 教育学
  • 1,859 篇 文学
  • 873 篇 军事学
  • 507 篇 艺术学
  • 75 篇 哲学
  • 45 篇 历史学

主题

  • 19,991 篇 computer science
  • 9,084 篇 accuracy
  • 8,741 篇 computational mo...
  • 7,962 篇 feature extracti...
  • 7,622 篇 deep learning
  • 7,259 篇 machine learning
  • 6,522 篇 training
  • 5,268 篇 data mining
  • 5,155 篇 computer archite...
  • 5,066 篇 support vector m...
  • 4,923 篇 wireless sensor ...
  • 4,908 篇 predictive model...
  • 4,659 篇 costs
  • 4,535 篇 bandwidth
  • 4,522 篇 optimization
  • 4,478 篇 application soft...
  • 4,374 篇 protocols
  • 4,351 篇 algorithm design...
  • 4,348 篇 testing
  • 4,258 篇 neural networks

机构

  • 1,707 篇 department of co...
  • 1,360 篇 department of co...
  • 1,346 篇 department of el...
  • 1,169 篇 department of el...
  • 1,062 篇 cavendish labora...
  • 972 篇 department of ph...
  • 895 篇 department of co...
  • 845 篇 physikalisches i...
  • 843 篇 oliver lodge lab...
  • 824 篇 department of el...
  • 750 篇 university of ch...
  • 644 篇 department of co...
  • 559 篇 department of co...
  • 543 篇 infn sezione di ...
  • 521 篇 chitkara univers...
  • 513 篇 infn sezione di ...
  • 512 篇 infn laboratori ...
  • 499 篇 horia hulubei na...
  • 489 篇 infn sezione di ...
  • 488 篇 department of co...

作者

  • 255 篇 j. wang
  • 253 篇 s. chen
  • 250 篇 barter w.
  • 240 篇 a. gomes
  • 225 篇 blake t.
  • 221 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 j. m. izen
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 204 篇 bencivenni g.
  • 195 篇 bay a.
  • 194 篇 niyato dusit
  • 192 篇 c. amelung
  • 191 篇 g. bella

语言

  • 366,706 篇 英文
  • 19,894 篇 其他
  • 3,749 篇 中文
  • 220 篇 日文
  • 55 篇 德文
  • 35 篇 朝鲜文
  • 34 篇 法文
  • 24 篇 斯洛文尼亚文
  • 13 篇 西班牙文
  • 7 篇 俄文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 意大利文
  • 3 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Computer Science and Computer Engineering Department"
390307 条 记 录,以下是401-410 订阅
排序:
Deployment of UAV-assisted 6G wireless networks using whale optimisation algorithm
收藏 引用
International Journal of Wireless and Mobile Computing 2024年 第3期26卷 251-261页
作者: Hossain, Md. Sakir Haque, Nishat Tasnim Afrin, Sadia Hossain, Md. Shakhawat Anik, Md. Faisal Mahmud Paul, Swagoto Pramanik, Md. Ileas Rahman, Md. Masudur Department of Avionics Engineering Bangabandhu Sheikh Mujibur Rahman Aviation and Aerospace University Dhaka Bangladesh Department of Computer Science American International University – Bangladesh Dhaka Bangladesh Department of Computer Science and Engineering Independent University – Bangladesh Dhaka Bangladesh Department of Computer Science and Engineering Begum Rokeya University – Rangpur Rangpur Bangladesh
The UAV-assisted wireless network is envisioned as a key player in the sixth generation (6G) wireless systems. One of the most challenging tasks to make it practically viable is to deploy UAVs considering user density... 详细信息
来源: 评论
Detecting Low-Yield Machines in Batch Production Systems Based on Observed Defective Pieces
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2024年 第7期54卷 3972-3983页
作者: Adipraja, Philip F. E. Chang, Chin-Chun Yang, Hua-Sheng Wang, Wei-Jen Liang, Deron National Central University Department of Computer Science and Information Engineering Taoyuan City32001 Taiwan National Taiwan Ocean University Department of Computer Science and Engineering Keelung City20224 Taiwan
In batch production systems, detecting low-yield machines is essential for minimizing the production of defective pieces, which is a complex problem that currently requires multiple experts, considerable capital, or a... 详细信息
来源: 评论
Pentago SnW:An Improved Spray and Wait Protocol for Delay Tolerant Wireless Sensor Networks
收藏 引用
China Communications 2025年 第3期22卷 104-114页
作者: Idris Afzal Shah Mushtaq Ahmed Raghavendra Singh Department of Computer Science and Engineering Malaviya National Institute of TechnologyJaipur302017India
Delay tolerant wireless sensor networks(DTWSN)is a class of wireless network that finds its deployment in those application scenarios which demand for high packet delivery ratio while maintaining minimal overhead in o... 详细信息
来源: 评论
Proactive Crowdsourced Monitoring and Sensing With Expansible Activity Recognition Based on Internet of Things Localization
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17674-17686页
作者: Chen, Lien-Wu Liao, Chun-Wei Liu, Jun-Xian Feng Chia University Department of Information Engineering and Computer Science Taichung407 Taiwan
This article proposes a proactive crowdsourced monitoring and sensing (PCMS) framework with the designed Smart iBeacon device to accurately recognize the activities of an equipped target, exclusively customize the rec... 详细信息
来源: 评论
Diagnosis of Autism Spectrum Disorder by Imperialistic Competitive Algorithm and Logistic Regression Classifier
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 1515-1534页
作者: Shabana R.Ziyad Liyakathunisa Eman Aljohani I.A.Saeed Department of Computer Science College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl Kharj16274Saudi Arabia Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah41411Saudi Arabia Department of Information Systems College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl Kharj16274Saudi Arabia
Autism spectrum disorder(ASD),classified as a developmental disability,is now more common in children than ever.A drastic increase in the rate of autism spectrum disorder in children worldwide demands early detection ... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
Learner’s intention analysis to mitigate the cold start problem in personalized learning recommendation systems
收藏 引用
Multimedia Tools and Applications 2024年 1-55页
作者: Pal, Saurabh Pramanik, Pijush Kanti Dutta Choudhury, Prasenjit Department of Computer Science and Engineering School of Engineering Brainware University Kolkata India School of Computer Applications and Technology Galgotias University Uttar Pradesh Greater Noida India Department of Computer Science & amp Engineering National Institute of Technology Durgapur West Bengal India
Understanding the learner’s requirements and status is important for recommending relevant and appropriate learning materials to the learner in personalized learning. For this purpose, the learning recommendatio... 详细信息
来源: 评论
Adaptive Cyber Defense Technique Based on Multiagent Reinforcement Learning Strategies
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 2757-2771页
作者: Adel Alshamrani Abdullah Alshahrani Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia
The static nature of cyber defense systems gives attackers a sufficient amount of time to explore and further exploit the vulnerabilities of information technology *** this paper,we investigate a problem where multiag... 详细信息
来源: 评论
OSSIoT: An ontology-based Operational Security model for Social Internet of Things using Machine Learning Techniques
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2024年 第10期51卷 1440-1453页
作者: Kumar, K.S. Santhosh Hanumanthappa, J. Prakash, S.P. Shiva Krinkin, Kirill Department of Studies in Computer Science University of Mysore Karnataka Mysuru India Department of Information Science and Engineering JSS Science and Technology University Karnataka Mysuru India School of Computer Science and Engineering Constructor University Bremen Germany
The Social Internet of Things (SIoT) is an innovative fusion of IoT and smart devices that enable them to establish dynamic relationships. Securing sensitive data in a smart environment requires a model to determine t... 详细信息
来源: 评论
Secure Data Communication in a Clustered Network in Wireless Sensor Networks using AES Cipher  15
Secure Data Communication in a Clustered Network in Wireless...
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Manjunatha, A.S. Venkatramana Bhat, P. Department of Computer and Communication Engineering India Department of Computer Science and Engineering India
Data is collected and forwarded to the cluster head by sensor nodes in the Wireless Sensor Network (WSN). Ensuring the confidentiality and integrity of the data that must be provided to the base station is tough. We r... 详细信息
来源: 评论