咨询与建议

限定检索结果

文献类型

  • 53,881 篇 会议
  • 27,302 篇 期刊文献
  • 750 册 图书

馆藏范围

  • 81,933 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,013 篇 工学
    • 36,684 篇 计算机科学与技术...
    • 29,779 篇 软件工程
    • 13,878 篇 信息与通信工程
    • 8,169 篇 控制科学与工程
    • 6,011 篇 电气工程
    • 5,997 篇 生物工程
    • 5,721 篇 电子科学与技术(可...
    • 4,128 篇 生物医学工程(可授...
    • 3,802 篇 机械工程
    • 3,623 篇 光学工程
    • 2,704 篇 仪器科学与技术
    • 2,505 篇 动力工程及工程热...
    • 2,380 篇 化学工程与技术
    • 2,275 篇 网络空间安全
    • 2,125 篇 安全科学与工程
    • 1,957 篇 交通运输工程
  • 26,693 篇 理学
    • 14,360 篇 数学
    • 7,335 篇 物理学
    • 6,652 篇 生物学
    • 4,658 篇 统计学(可授理学、...
    • 3,039 篇 系统科学
    • 2,500 篇 化学
  • 14,629 篇 管理学
    • 8,996 篇 管理科学与工程(可...
    • 6,239 篇 图书情报与档案管...
    • 3,798 篇 工商管理
  • 4,107 篇 医学
    • 3,438 篇 临床医学
    • 3,086 篇 基础医学(可授医学...
    • 1,871 篇 药学(可授医学、理...
    • 1,794 篇 公共卫生与预防医...
  • 2,379 篇 法学
    • 1,868 篇 社会学
  • 1,414 篇 经济学
  • 1,159 篇 农学
  • 973 篇 教育学
  • 370 篇 文学
  • 240 篇 军事学
  • 182 篇 艺术学
  • 8 篇 哲学
  • 3 篇 历史学

主题

  • 2,214 篇 feature extracti...
  • 2,084 篇 computer science
  • 2,000 篇 accuracy
  • 1,981 篇 deep learning
  • 1,637 篇 computational mo...
  • 1,622 篇 machine learning
  • 1,547 篇 training
  • 1,215 篇 data mining
  • 1,098 篇 internet of thin...
  • 1,081 篇 support vector m...
  • 1,070 篇 optimization
  • 1,004 篇 predictive model...
  • 895 篇 educational inst...
  • 891 篇 wireless sensor ...
  • 867 篇 semantics
  • 860 篇 real-time system...
  • 836 篇 artificial intel...
  • 801 篇 security
  • 775 篇 neural networks
  • 733 篇 image segmentati...

机构

  • 687 篇 school of comput...
  • 559 篇 school of comput...
  • 478 篇 maharishi school...
  • 351 篇 department of co...
  • 275 篇 department of ph...
  • 261 篇 department of ph...
  • 257 篇 faculté des scie...
  • 256 篇 faculty of scien...
  • 223 篇 departamento de ...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 217 篇 department of co...
  • 210 篇 school of comput...
  • 206 篇 department of ph...
  • 198 篇 department of ph...
  • 192 篇 department of ph...
  • 170 篇 department of co...
  • 168 篇 department for p...
  • 165 篇 department of ph...
  • 163 篇 college of compu...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 262 篇 m. klein
  • 261 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 254 篇 h. sakamoto
  • 248 篇 m. rijssenbeek
  • 244 篇 y. tayalati
  • 231 篇 niyato dusit
  • 227 篇 d. guest
  • 225 篇 s. jin
  • 206 篇 g. gaudio
  • 202 篇 f. pastore

语言

  • 71,072 篇 英文
  • 9,658 篇 其他
  • 1,285 篇 中文
  • 66 篇 日文
  • 19 篇 斯洛文尼亚文
  • 17 篇 德文
  • 17 篇 法文
  • 6 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 波兰文
检索条件"机构=Computer Science and Engineering and Information Technology"
81933 条 记 录,以下是301-310 订阅
排序:
Prioritization and offloading in P4 switch integrated with NFV
收藏 引用
Telecommunication Systems 2024年 第3期86卷 571-584页
作者: Neha, Farhin Faiza Lai, Yuan-Cheng Hossain, Md. Shohrab Lin, Ying-Dar Department of Computer Science and Engineering Bangladesh University of Engineering and Technology Dhaka Bangladesh Department of Information Management National Taiwan University of Science and Technology Taipei Taiwan Department of Computer Science National Yang Ming Chiao Tung University Hsinchu Taiwan
The architecture of integrating Software Defined Networking (SDN) with Network Function Virtualization (NFV) is excellent because the former virtualizes the control plane, and the latter virtualizes the data plane. As... 详细信息
来源: 评论
Vehicle Accident Detection and Reporting System using Internet of Things  5
Vehicle Accident Detection and Reporting System using Intern...
收藏 引用
5th International Conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Goyal, Atul Gupta, Priyansh Pandey, Kavita Jaypee Institute of Information Technology Department of Computer Science & Engineering and Information Technology Noida India
The rising number of vehicles on the road has led to a concerning increase in accidents, as reported by the Indian Government's Ministry of Road Transport and Highways. In many cases, prompt medical assistance can... 详细信息
来源: 评论
Traffic Flow Prediction with Heterogenous Data Using a Hybrid CNN-LSTM Model
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3097-3112页
作者: Jing-Doo Wang Chayadi Oktomy Noto Susanto Departement of Computer Science and Information Engineering Asia UniversityTaichungTaiwan Departement of Information Technology Universitas Muhammadiyah YogyakartaYogyakartaIndonesia
Predicting traffic flow is a crucial component of an intelligent transportation *** monitoring and predicting traffic flow remains a challenging ***,existingmethods for predicting traffic flow do not incorporate vario... 详细信息
来源: 评论
Dynamic UAV Deployment in Multi-UAV Wireless Networks: A Multi-Modal Feature-Based Deep Reinforcement Learning Approach
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 18765-18778页
作者: Bai, Yu Xie, Boxuan Liu, Ying Chang, Zheng Jäntti, Riku Aalto University Department of Information and Communications Engineering Espoo02150 Finland University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China University of Jyväskylä Faculty of Information Technology Jyväskylä40014 Finland
The use of Unmanned Aerial Vehicles (UAVs) as aerial base stations has attracted increasing research interest in recent years. A key challenge in this field is determining how to deploy multiple UAVs in dynamic enviro... 详细信息
来源: 评论
Harnessing Social Media Data for Text Classification During Emergency  2024
Harnessing Social Media Data for Text Classification During ...
收藏 引用
16th International Conference on Contemporary Computing, IC3 2024
作者: Dixit, Ankita Chawla, Indu Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Noida India
Social media platforms offer a plethora of valuable resources in times of disaster. Social media platforms like Twitter allow the sharing of information by individuals in the time of crisis. In this study, highlights ... 详细信息
来源: 评论
Centrality of Any Node in Social Network Analysis  2024
Centrality of Any Node in Social Network Analysis
收藏 引用
16th International Conference on Contemporary Computing, IC3 2024
作者: Srivastava, Milli Manju, Manju Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Noida India
In the contemporary landscape of advanced mobile technology, social media platforms have emerged as prominent arenas for expression, fostering vast volumes of communication ripe for research and analysis. Social netwo... 详细信息
来源: 评论
Leveraging the Potential of Large Language Models
收藏 引用
Informatica (Slovenia) 2024年 第8期48卷 1-16页
作者: Prasad, Shreya Gupta, Himank Ghosh, Arup Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Computer Science and Information Technology Graceland University LamoniIA United States
This study focuses on enhancing Natural Language Processing (NLP) in generative AI chatbots through the utilization of advanced pre-trained models. We assessed five distinct Large Language Models (LLMs): TRANSFORMER M... 详细信息
来源: 评论
Desktop Voice Assistant for Elderly People using Feed-forward Neural Network for Intent Recognition  2024
Desktop Voice Assistant for Elderly People using Feed-forwar...
收藏 引用
16th International Conference on Contemporary Computing, IC3 2024
作者: Garg, Kashish Alam, Taj Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Noida India
technology has deeply embedded itself in our daily lives, making it easier to carry out tasks. However, the use of technology can be complicated for some like elderly people, cognitively and visually impaired individu... 详细信息
来源: 评论
HASHL: Dynamic Hash Verification for Detecting and Preventing Eclipse Attacks
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23524-23535页
作者: He, Daojing Gong, Wei Tu, Chen Chan, Sammy Harbin Institute of Technology School of Computer Science and Technology Shenzhen China Jiangxi University of Science and Technology School of Information Engineering Jiangxi Ganzhou China City University of Hong Kong Department of Electrical Engineering Hong Kong
With the rapid development of blockchain technology, P2P networks are facing increasing security threats, among which Eclipse attacks, as a type of network isolation attack, have seriously affected the normal operatio... 详细信息
来源: 评论
Red deer algorithm to detect the secret key of the monoalphabetic cryptosystem
收藏 引用
Soft Computing 2024年 第17-18期28卷 10569-10582页
作者: Jain, Ashish Bansal, Sulabh Das, Nripendra Narayan Gupta, Shyam Sunder Department of Information Technology School of Information Security and Data Science Manipal University Jaipur Jaipur303007 India Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Madhya Pradesh Gwalior474005 India
Encryption of a plaintext involves a secret key. The secret key of classical cryptosystems can be successfully determined by utilizing metaheuristic techniques. Monoalphabetic cryptosystem is one of the famous classic... 详细信息
来源: 评论