咨询与建议

限定检索结果

文献类型

  • 18,846 篇 会议
  • 14,333 篇 期刊文献
  • 450 册 图书

馆藏范围

  • 33,629 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,879 篇 工学
    • 11,706 篇 计算机科学与技术...
    • 9,397 篇 软件工程
    • 4,219 篇 信息与通信工程
    • 3,250 篇 控制科学与工程
    • 3,037 篇 电气工程
    • 2,708 篇 电子科学与技术(可...
    • 2,161 篇 生物工程
    • 1,804 篇 生物医学工程(可授...
    • 1,766 篇 机械工程
    • 1,713 篇 化学工程与技术
    • 1,482 篇 光学工程
    • 1,391 篇 动力工程及工程热...
    • 1,306 篇 仪器科学与技术
    • 1,303 篇 材料科学与工程(可...
    • 737 篇 土木工程
    • 729 篇 交通运输工程
  • 12,981 篇 理学
    • 5,524 篇 数学
    • 5,327 篇 物理学
    • 2,577 篇 生物学
    • 1,769 篇 化学
    • 1,769 篇 统计学(可授理学、...
    • 1,260 篇 系统科学
  • 4,932 篇 管理学
    • 3,249 篇 管理科学与工程(可...
    • 1,819 篇 图书情报与档案管...
    • 1,587 篇 工商管理
  • 1,918 篇 医学
    • 1,589 篇 临床医学
    • 1,363 篇 基础医学(可授医学...
    • 827 篇 药学(可授医学、理...
    • 725 篇 公共卫生与预防医...
  • 842 篇 法学
    • 720 篇 社会学
  • 663 篇 经济学
  • 507 篇 农学
  • 399 篇 教育学
  • 93 篇 文学
  • 58 篇 艺术学
  • 57 篇 军事学
  • 5 篇 哲学
  • 5 篇 历史学

主题

  • 803 篇 deep learning
  • 715 篇 accuracy
  • 568 篇 machine learning
  • 483 篇 computer science
  • 445 篇 internet of thin...
  • 431 篇 feature extracti...
  • 396 篇 artificial intel...
  • 387 篇 training
  • 385 篇 computational mo...
  • 377 篇 support vector m...
  • 319 篇 optimization
  • 287 篇 predictive model...
  • 229 篇 convolutional ne...
  • 219 篇 data models
  • 212 篇 real-time system...
  • 211 篇 covid-19
  • 206 篇 reliability
  • 188 篇 computer archite...
  • 185 篇 simulation
  • 182 篇 reinforcement le...

机构

  • 1,096 篇 cavendish labora...
  • 1,028 篇 department of ph...
  • 979 篇 physikalisches i...
  • 974 篇 oliver lodge lab...
  • 644 篇 infn laboratori ...
  • 621 篇 infn sezione di ...
  • 605 篇 fakultät physik ...
  • 604 篇 infn sezione di ...
  • 600 篇 infn sezione di ...
  • 574 篇 university of ch...
  • 560 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 538 篇 iccub universita...
  • 537 篇 department of ph...
  • 535 篇 school of physic...
  • 519 篇 imperial college...
  • 516 篇 h.h. wills physi...
  • 516 篇 nikhef national ...
  • 510 篇 stfc rutherford ...
  • 508 篇 school of physic...

作者

  • 266 篇 barter w.
  • 258 篇 a. gomes
  • 250 篇 beiter a.
  • 247 篇 c. alexa
  • 245 篇 j. m. izen
  • 242 篇 g. bella
  • 241 篇 j. strandberg
  • 239 篇 c. amelung
  • 237 篇 d. calvet
  • 237 篇 bellee v.
  • 234 篇 g. spigo
  • 232 篇 bowcock t.j.v.
  • 231 篇 blake t.
  • 231 篇 s. chen
  • 230 篇 f. siegert
  • 228 篇 brundu d.
  • 220 篇 betancourt c.
  • 218 篇 borsato m.
  • 218 篇 amato s.
  • 216 篇 r. ströhmer

语言

  • 31,200 篇 英文
  • 1,979 篇 其他
  • 263 篇 中文
  • 180 篇 日文
  • 14 篇 德文
  • 12 篇 法文
  • 5 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 朝鲜文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Design Faculty of Engineering and Technology"
33629 条 记 录,以下是51-60 订阅
排序:
VSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain
收藏 引用
ACM Transactions on Sensor Networks 2024年 第2期20卷 1-22页
作者: Tian, Siben Bai, Fenhua Shen, Tao Zhang, Chi Gong, Bei Faculty of Information Engineering and Automation Kunming University of Science and Technology Yunnan Key Laboratory of Computer Technology Applications China Faculty of Information Technology Beijing University of Technology China
To solve the problems of vote forgery and malicious election of candidate nodes in the Raft consensus algorithm, we combine zero trust with the Raft consensus algorithm and propose a secure and efficient consensus alg... 详细信息
来源: 评论
A review on network function virtualisation security challenges and design considerations
收藏 引用
International Journal of Networking and Virtual Organisations 2024年 第4期31卷 368-393页
作者: Ahmad, Naveed Rathore, Muhammad Siraj Ngadi, Md Asri bin Faculty of Engineering University Teknologi Malaysia 81110 Malaysia Faculty of Computing Department of Computer Science Capital University of Science and Technology Islamabad46000 Pakistan
Network function virtualisation (NFV) offers several benefits to both network operators and end users. It is a more programmable and low-cost solution as compared to a traditional network. Since the network functions ... 详细信息
来源: 评论
Multi-Task Learning Model with Data Augmentation for Arabic Aspect-Based Sentiment Analysis
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4419-4444页
作者: Arwa Saif Fadel Osama Ahmed Abulnaja Mostafa Elsayed Saleh Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Faculty of Computer Sciences and EngineeringHodeidah UniversityYemen
Aspect-based sentiment analysis(ABSA)is a fine-grained *** fundamental subtasks are aspect termextraction(ATE)and aspect polarity classification(APC),and these subtasks are dependent and closely ***,most existing work... 详细信息
来源: 评论
Efficient Saliency Map Detection for Low-Light Images Based on Image Gradient
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2024年 第2期34卷 852-865页
作者: Lin, Chun-Yi Haq, Muhamad Amirul Chen, Jiun-Han Ruan, Shanq-Jang Naroska, Edwin National Taiwan University of Science and Technology Department of Electronic and Computer Engineering Taipei10607 Taiwan Hochschule Niederrhein University of Applied Science Faculty of Electrical Engineering and Computer Science Krefeld47805 Germany
Recently, deep learning has been widely employed across various domains. The Convolution Neural Network (CNN), a popular deep learning algorithm, has been successfully utilized in object recognition tasks, such as fac... 详细信息
来源: 评论
A review on spreading and Forensics Analysis of Windows-Based ransomware
收藏 引用
Annals of Data science 2024年 第5期11卷 1503-1524页
作者: Chayal, Narendrakumar Mangilal Saxena, Ankur Khan, Rijwan Department of Computer Science and Technology Faculty of Engineering and Technology Department of Computer Engineering Sankalchand Patel University Visnagar India Department of Computer Science Indus Institute of Information and Communication Technology Dean-ICT & ampDirector-IIICT Indus University Gujarat Ahmedabad India Department of Computer Science and Engineering ABES Institute of Technology Ghaziabad Affiliated to AKTU Lucknow India
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals... 详细信息
来源: 评论
OFDM-structure based waveform designs for integrated sensing and communication
收藏 引用
science China(Information sciences) 2025年 第5期68卷 267-284页
作者: Jiaqi LIU Ping YANG Ke JIANG Jiarong ZHAO Wei XIANG Jianping WEI Ruixiang DUAN Saviour ZAMMIT Tony Q.S.QUEK National Key Laboratory of Wireless Communications University of Electronic Science and Technology of China School of Computing Engineering and Mathematical Sciences La Trobe University Meituan Academy of Robotics Department of Communications and Computer Engineering University of Malta Information Systems Technology and Design Pillar Singapore University of Technology and Design
The future sixth-generation(6G) paradigm aims to seamlessly integrate communication and environmental sensing capabilities into a single radio signal, promising improved efficiency and cost-effectiveness through simul... 详细信息
来源: 评论
An Enhanced Hybrid Model Based on CNN and BiLSTM for Identifying Individuals via Handwriting Analysis
收藏 引用
computer Modeling in engineering & sciences 2024年 第8期140卷 1689-1710页
作者: Md.Abdur Rahim Fahmid Al Farid Abu Saleh Musa Miah Arpa Kar Puza Md.Nur Alam Md.Najmul Hossain Sarina Mansor Hezerul Abdul Karim Department of Computer Science and Engineering Pabna University of Science and TechnologyPabna6600Bangladesh Faculty of Engineering Multimedia UniversityCyberjaya63100Malaysia Department of Computer Science and Engineering Bangladesh Army University of Science and TechnologySaidpur5311Bangladesh Department of Mathematics Pabna University of Science and TechnologyPabna6600Bangladesh Department of Electrical Electronic and Communication EngineeringPabnaUniversity of Science and TechnologyPabna6600Bangladesh Department of Electrical and Communication Engineering Pabna University of Science and TechnologyPabna6600Bangladesh
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for perso... 详细信息
来源: 评论
IRS-enabled NOMA communication systems:A network architecture primer with future trends and challenges
收藏 引用
Digital Communications and Networks 2024年 第5期10卷 1503-1528页
作者: Haleema Sadia Ahmad Kamal Hassan Ziaul Haq Abbas Ghulam Abbas Muhammad Waqas Zhu Han Faculty of Electrical Engineering and Telecommunications and Networking(TeleCoN)Research Center Ghulam Ishaq Khan Institute of Engineering and Technology(GIKI)Topi 23640Pakistan Faculty of Computer Science and Engineering GIKITopi 23640Pakistan Department of Computer Engineering College of Information TechnologyUniversity of Bahrain32028Bahrain School of Engineering Edith Cowan UniversityPerth WA6027Australia Department of Electrical and Computer Engineering University of HoustonHoustonTX 77004USA Department of Computer Science and Engineering Kyung Hee UniversitySeoul 446-701South Korea
Non-Orthogonal Multiple Access(NOMA)has already proven to be an effective multiple access scheme for5th Generation(5G)wireless *** provides improved performance in terms of system throughput,spectral efficiency,fairne... 详细信息
来源: 评论
A Deep Learning Approach for Landmines Detection Based on Airborne Magnetometry Imaging and Edge Computing
收藏 引用
computer Modeling in engineering & sciences 2024年 第5期139卷 2117-2137页
作者: Ahmed Barnawi Krishan Kumar Neeraj Kumar Bander Alzahrani Amal Almansour Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyDeemed to be UniversityPatialaIndia
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported w... 详细信息
来源: 评论
Security to text (S2T): multi-layered based security approaches for secret text content
收藏 引用
Multimedia Tools and Applications 2025年 第15期84卷 15151-15171页
作者: Kashid, Shamal Awasthi, Lalit K. Berwal, Krishan Department of Computer Science and Engineering National Institute of Technology Uttarakhand IN Srinagar India Faculty of Communication Engineering Military College of Telecommunication Engineering IN Mhow India
In the digital world, text data is produced in an unstructured manner across various communication channels. Extracting valuable information from such data with security is crucial and requires the development of tech... 详细信息
来源: 评论