咨询与建议

限定检索结果

文献类型

  • 53,774 篇 会议
  • 27,402 篇 期刊文献
  • 754 册 图书

馆藏范围

  • 81,930 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,039 篇 工学
    • 36,796 篇 计算机科学与技术...
    • 29,921 篇 软件工程
    • 13,916 篇 信息与通信工程
    • 8,206 篇 控制科学与工程
    • 6,060 篇 电气工程
    • 6,001 篇 生物工程
    • 5,701 篇 电子科学与技术(可...
    • 4,141 篇 生物医学工程(可授...
    • 3,806 篇 机械工程
    • 3,686 篇 光学工程
    • 2,710 篇 仪器科学与技术
    • 2,506 篇 动力工程及工程热...
    • 2,369 篇 化学工程与技术
    • 2,279 篇 网络空间安全
    • 2,131 篇 安全科学与工程
    • 1,962 篇 交通运输工程
  • 26,785 篇 理学
    • 14,387 篇 数学
    • 7,349 篇 物理学
    • 6,661 篇 生物学
    • 4,635 篇 统计学(可授理学、...
    • 3,046 篇 系统科学
    • 2,488 篇 化学
  • 14,691 篇 管理学
    • 9,035 篇 管理科学与工程(可...
    • 6,260 篇 图书情报与档案管...
    • 3,812 篇 工商管理
  • 4,128 篇 医学
    • 3,458 篇 临床医学
    • 3,107 篇 基础医学(可授医学...
    • 1,873 篇 药学(可授医学、理...
    • 1,806 篇 公共卫生与预防医...
  • 2,382 篇 法学
    • 1,865 篇 社会学
  • 1,418 篇 经济学
  • 1,169 篇 农学
  • 977 篇 教育学
  • 372 篇 文学
  • 241 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,197 篇 feature extracti...
  • 2,084 篇 computer science
  • 1,967 篇 deep learning
  • 1,966 篇 accuracy
  • 1,618 篇 machine learning
  • 1,605 篇 computational mo...
  • 1,560 篇 training
  • 1,224 篇 data mining
  • 1,075 篇 internet of thin...
  • 1,074 篇 support vector m...
  • 1,049 篇 optimization
  • 1,002 篇 predictive model...
  • 891 篇 educational inst...
  • 870 篇 wireless sensor ...
  • 867 篇 semantics
  • 836 篇 artificial intel...
  • 823 篇 real-time system...
  • 789 篇 security
  • 773 篇 neural networks
  • 730 篇 image segmentati...

机构

  • 689 篇 school of comput...
  • 538 篇 school of comput...
  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 275 篇 department of ph...
  • 259 篇 department of ph...
  • 258 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 220 篇 department of ph...
  • 220 篇 departamento de ...
  • 216 篇 physics division...
  • 216 篇 department of co...
  • 206 篇 department of ph...
  • 201 篇 school of comput...
  • 197 篇 department of ph...
  • 186 篇 department of ph...
  • 175 篇 college of compu...
  • 168 篇 department for p...
  • 167 篇 department of ph...
  • 162 篇 department of co...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 264 篇 f. siegert
  • 263 篇 a. c. könig
  • 261 篇 m. klein
  • 260 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 253 篇 h. sakamoto
  • 246 篇 m. rijssenbeek
  • 243 篇 y. tayalati
  • 234 篇 niyato dusit
  • 226 篇 d. guest
  • 226 篇 s. jin
  • 201 篇 f. pastore
  • 201 篇 n. orlando

语言

  • 76,091 篇 英文
  • 4,603 篇 其他
  • 1,248 篇 中文
  • 66 篇 日文
  • 13 篇 斯洛文尼亚文
  • 9 篇 德文
  • 9 篇 法文
  • 6 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Engineering and Information Technology"
81930 条 记 录,以下是201-210 订阅
排序:
UAV-Assisted Multi-Object Computing Offloading for Blockchain-Enabled Vehicle-to-Everything Systems
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 3927-3950页
作者: Ting Chen Shujiao Wang Xin Fan Xiujuan Zhang Chuanwen Luo Yi Hong School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Computer Science Qufu Normal UniversityRizhao276826China School of Information Science and Technology Beijing Forestry UniversityBeijing100083China
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication... 详细信息
来源: 评论
Hybrid Sampling Technique for Imbalanced Android Malware Family Classification
收藏 引用
SN computer science 2025年 第3期6卷 1-16页
作者: Chauhan, Kshamta Gandotra, Ekta Department of Computer Science and Engineering and Information Technology Jaypee University of Information Technology Waknaghat Himachal Pradesh Solan India
The rapid explosion of Android-based devices has led to a disturbing surge in the volume and sophistication of Android malware. Effective classification of these malicious applications is essential for safeguarding us... 详细信息
来源: 评论
A Deep Learning Approach for Landmines Detection Based on Airborne Magnetometry Imaging and Edge Computing
收藏 引用
computer Modeling in engineering & sciences 2024年 第5期139卷 2117-2137页
作者: Ahmed Barnawi Krishan Kumar Neeraj Kumar Bander Alzahrani Amal Almansour Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyDeemed to be UniversityPatialaIndia
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported w... 详细信息
来源: 评论
Secure Transmission Scheme for Blocks in Blockchain-Based Unmanned Aerial Vehicle Communication Systems
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2195-2217页
作者: Ting Chen Shuna Jiang Xin Fan Jianchuan Xia Xiujuan Zhang Chuanwen Luo Yi Hong School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Computer Science Qufu Normal UniversityRizhao276826China School of Information Science and Technology Beijing Forestry UniversityBeijing100083China
In blockchain-based unmanned aerial vehicle(UAV)communication systems,the length of a block affects the performance of the *** transmission performance of blocks in the form of finite character segments is also affect... 详细信息
来源: 评论
A Novel Music Recommendation System Using Filtering Techniques
收藏 引用
Informatica (Slovenia) 2024年 第4期48卷 595-610页
作者: Vashishtha, Srishti Varshney, Deepika Sarin, Eva Kaur, Simran Computer Science and Engineering Dept. Bharati Vidyapeeth’s College of Engineering GGSIPU New Delhi India Computer Science and Engineering Dept. Jaypee Institute of Information Technology Noida India
With the growth of the World Wide Web, a large amount of music data is available on the Internet. A large number of people listen to music online rather than downloading and listening offline. But only some sites prov... 详细信息
来源: 评论
Analysis of community question-answering issues via machine learning and deep learning:State-of-the-art review
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第1期8卷 95-117页
作者: Pradeep Kumar Roy Sunil Saumya Jyoti Prakash Singh Snehasish Banerjee Adnan Gutub Department of Computer Science and Engineering Indian Institute of Information TechnologySuratIndia Indian Institute of Information Technology DharwadIndia Department of Computer Science and Engineering National Institute of TechnologyPatnaIndia The York Management School University of YorkYorkUK Computer Engineering Department College of Computer&Information SystemsUmm Al-Qura UniversityMakkahSaudi Arabia
Over the last couple of decades,community question-answering sites(CQAs)have been a topic of much academic *** have often leveraged traditional machine learning(ML)and deep learning(DL)to explore the ever-growing volu... 详细信息
来源: 评论
Detection and Navigation of Unmanned Vehicles in Wooded Environments Using Light Detection and Ranging Sensors
收藏 引用
Sensors and Materials 2023年 第11期35卷 3637-3654页
作者: Zhang, Zhiwei Jhang, Jyun-Yu Lin, Cheng-Jian School of Electronic Information Engineering Hebei University of Technology Tianjin300401 China Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taichung404 Taiwan Department of Computer Science & Information Engineering National Chin-Yi University of Technology Taichung411 Taiwan
With the advancement of automatic navigation, navigation control has become an indispensable core technology in the movement of unmanned vehicles. In particular, research on navigation control in outdoor wooded enviro... 详细信息
来源: 评论
Design of a Multifactor Unidentified Remote End User Authentication Mechanism for IoT Network
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第10期49卷 191-204页
作者: Sharma, Neha Dhiman, Pankaj Department of Computer Science and Engineering Jaypee University of Information Technology Waknaghat H. P. Solan India
The rapid proliferation of Internet of Things (IoT) devices, coupled with the rollout of advanced 5G networks, has generated significant concerns regarding security breaches. These concerns stem from the expanded atta... 详细信息
来源: 评论
Analysis of Software Trustworthiness Based on FAHP-CRITIC Method
收藏 引用
Journal of Shanghai Jiaotong university(science) 2024年 第3期29卷 588-600页
作者: 高晓彤 马艳芳 周伟 School of Computer Science and Technology Huaibei Normal UniversityHuaibei 235000AnhuiChina School of Computer Science and Information Engineering Changzhou Institute of TechnologyChangzhou 213000JiangsuChina
Software trustworthiness includes many *** weight allocation of trustworthy at-tributes plays a key role in the software trustworthiness *** practical application,attribute weight usually comes from experts'evalua... 详细信息
来源: 评论
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of Systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论