咨询与建议

限定检索结果

文献类型

  • 201,379 篇 会议
  • 97,726 篇 期刊文献
  • 2,377 册 图书

馆藏范围

  • 301,482 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 179,474 篇 工学
    • 116,484 篇 计算机科学与技术...
    • 94,076 篇 软件工程
    • 44,992 篇 信息与通信工程
    • 27,595 篇 控制科学与工程
    • 25,061 篇 电子科学与技术(可...
    • 24,452 篇 电气工程
    • 19,360 篇 生物工程
    • 15,110 篇 生物医学工程(可授...
    • 14,763 篇 光学工程
    • 13,000 篇 机械工程
    • 11,076 篇 化学工程与技术
    • 10,589 篇 仪器科学与技术
    • 9,603 篇 动力工程及工程热...
    • 8,867 篇 材料科学与工程(可...
    • 6,500 篇 网络空间安全
    • 6,401 篇 安全科学与工程
    • 6,011 篇 交通运输工程
  • 102,416 篇 理学
    • 49,504 篇 数学
    • 35,665 篇 物理学
    • 22,039 篇 生物学
    • 15,842 篇 统计学(可授理学、...
    • 11,471 篇 化学
    • 11,147 篇 系统科学
  • 45,915 篇 管理学
    • 28,262 篇 管理科学与工程(可...
    • 19,417 篇 图书情报与档案管...
    • 12,910 篇 工商管理
  • 14,733 篇 医学
    • 12,352 篇 临床医学
    • 10,875 篇 基础医学(可授医学...
    • 6,775 篇 药学(可授医学、理...
  • 7,998 篇 法学
    • 6,450 篇 社会学
  • 5,117 篇 经济学
  • 4,112 篇 农学
  • 3,276 篇 教育学
  • 1,411 篇 文学
  • 761 篇 军事学
  • 444 篇 艺术学
  • 50 篇 哲学
  • 30 篇 历史学

主题

  • 9,644 篇 computer science
  • 7,082 篇 accuracy
  • 6,740 篇 feature extracti...
  • 5,993 篇 deep learning
  • 5,861 篇 computational mo...
  • 5,300 篇 machine learning
  • 5,228 篇 training
  • 4,117 篇 data mining
  • 3,880 篇 support vector m...
  • 3,669 篇 optimization
  • 3,527 篇 predictive model...
  • 3,444 篇 wireless sensor ...
  • 3,400 篇 internet of thin...
  • 3,143 篇 real-time system...
  • 3,124 篇 artificial intel...
  • 3,123 篇 convolutional ne...
  • 3,030 篇 neural networks
  • 2,879 篇 bandwidth
  • 2,865 篇 computer archite...
  • 2,865 篇 protocols

机构

  • 1,703 篇 department of co...
  • 1,348 篇 department of co...
  • 1,151 篇 university of ch...
  • 1,046 篇 physikalisches i...
  • 1,043 篇 cavendish labora...
  • 973 篇 department of ph...
  • 869 篇 infn laboratori ...
  • 862 篇 oliver lodge lab...
  • 823 篇 department of el...
  • 808 篇 department of el...
  • 783 篇 infn sezione di ...
  • 718 篇 school of comput...
  • 627 篇 department of el...
  • 618 篇 department of co...
  • 612 篇 infn sezione di ...
  • 551 篇 chitkara univers...
  • 533 篇 nikhef national ...
  • 515 篇 infn sezione di ...
  • 501 篇 school of comput...
  • 486 篇 university of sc...

作者

  • 247 篇 j. wang
  • 246 篇 niyato dusit
  • 242 篇 barter w.
  • 228 篇 s. chen
  • 225 篇 a. gomes
  • 213 篇 bellee v.
  • 212 篇 blake t.
  • 209 篇 bowcock t.j.v.
  • 206 篇 y. zhang
  • 203 篇 borsato m.
  • 203 篇 betancourt c.
  • 201 篇 beiter a.
  • 200 篇 c. alexa
  • 199 篇 brundu d.
  • 197 篇 j. m. izen
  • 194 篇 amato s.
  • 186 篇 c. amelung
  • 185 篇 g. bella
  • 184 篇 j. strandberg
  • 184 篇 d. calvet

语言

  • 281,679 篇 英文
  • 15,122 篇 其他
  • 4,495 篇 中文
  • 355 篇 日文
  • 52 篇 朝鲜文
  • 47 篇 德文
  • 39 篇 法文
  • 28 篇 斯洛文尼亚文
  • 10 篇 俄文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 2 篇 意大利文
  • 1 篇 加泰罗尼亚文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering and Information Technology Department"
301482 条 记 录,以下是4661-4670 订阅
排序:
Combining Ensemble Learning based Hybrid Classification Algorithm with Effective Feature Selection to identify Electricity Fraud in Advanced Metering Infrastructure of Smart Grid
Combining Ensemble Learning based Hybrid Classification Algo...
收藏 引用
2024 IEEE International Conference on Computing, Applications and Systems, COMPAS 2024
作者: Sikder, Md. Masum Ahmed, Boshir Rajshahi University of Engineering and Technology Department of Computer Science and Engineering Rajshahi Bangladesh
Consuming electricity through Advanced Metering Infrastructure (AMI) has become an irrefutable part of our daily micro-moments. In AMI, electricity fraud is regarded as one of the most significant Nontechnical losses ... 详细信息
来源: 评论
Unleashing the power of pseudo-code for binary code similarity analysis
收藏 引用
Cybersecurity 2023年 第2期6卷 44-61页
作者: Weiwei Zhang Zhengzi Xu Yang Xiao Yinxing Xue School of Computer Science and Engineering University of Science and Technology of ChinaHefeiChina School of Computer Science and Engineering Nanyang Technological UniversitySingaporeSingapore Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most... 详细信息
来源: 评论
Marine Life Analysis Based on Ocean Water Level Rise and Climate Change Using Underwater Imaging Techniques
收藏 引用
Remote Sensing in Earth Systems sciences 2024年 第4期7卷 657-669页
作者: Mate, Anuja Dinesh Arulananth, T.S. Sathiya, T. Jyothi, B. Swarna Raja, A. Wasim Yalawar, Mrutyunjaya S. Computer Technology Sou.Venutai Chavan Polytechnic Pune India Department of Electronics and Communication Engineering MLR Institute of Technology Telangana Hyderabad 500043 India Department of Computer Science and Engineering Sona College of Technology Tamil Nadu Salem India Computer Science & amp Engineering Madanapalle Institute of Technology & amp Science Andhra Pradesh Madanapalle India Artificial Intelligence and Data Science Sri Krishna College of Engineering and Technology Coimbatore India Department of Computer Science and Engineering CMR Engineering College Hyderabad India
Forecasting sea levels is crucial for harbour operations and coastal structure design. The oceans make up two-thirds of Earth’s surface;therefore, historically, the marine economy has been extremely diversified as we... 详细信息
来源: 评论
Influence of Access Points’ Height and High Signal Relation in WLAN Fingerprinting-Based Indoor Positioning Systems’ Accuracy  1
收藏 引用
26th International Conference on Distributed computer and Communication Networks: Control, Computation, Communications, DCCN 2023
作者: Nicholaus, Mrindoko R. Ruambo, Francis A. Masanga, Elijah E. Muthanna, Mohammed Saleh Ali Lashchev, Andrei Computer Science and Engineering Department College of Information and Communication Technology Mbeya University of Science and Technology 131 Mbeya Tanzania United Republic of Information Systems and Technology Department College of Information and Communication Technology Mbeya University of Science and Technology 131 Mbeya Tanzania United Republic of School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Research and Development Department Aifrruis Laboratories Mbeya Tanzania United Republic of Institute of Computer Technologies and Information Security Southern Federal University Taganrog347922 Russia
Wireless Local Area Network (WLAN) Fingerprinting-based Indoor Positioning Systems (IPS) offer several key advantages over other indoor positioning technologies, including cost-effectiveness with high accuracy and pas... 详细信息
来源: 评论
Flexible and Effective Cellular Traffic Data Synthesis with Large Language Model
Flexible and Effective Cellular Traffic Data Synthesis with ...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Duan, Sijing Lyu, Feng Cen, Jinfeng Ren, Ju Yang, Peng Zhang, Yaoxue Tsinghua University Department of Computer Science and Technology Beijing China Central South University School of Computer Science and Engineering Changsha China Huazhong University of Science and Technology School of Electronic Information and Communications Wuhan China
Cellular traffic data hold significant potential for applications such as network planning, traffic prediction, mobility modeling, and personalized recommendations. However, limited data accessibility hinders more ope... 详细信息
来源: 评论
Economical Calculation Basis of Synthetic Gas Production using Alternate Renewable Resources in Combining of Hydrogen and Carbon Dioxide  65
Economical Calculation Basis of Synthetic Gas Production usi...
收藏 引用
65th IEEE Annual International Scientific Conference on Power and Electrical engineering of Riga Technical University, RTUCON 2024
作者: Borisovs, Aleksandrs Dolgicers, Aleksandrs Riga Technical University Faculty of Computer Science Information Technology and Power Engineering Riga Latvia
The main task of this work is to establish the consumption of energy from renewable sources such as solar and wind energy for the production of such a combustible substance as hydrogen, and further optimal calculation... 详细信息
来源: 评论
Intelligent Intrusion Detection Framework for Anomaly-Based CAN Bus Network Using Bidirectional Long Short-Term Memory
收藏 引用
Journal of The Institution of Engineers (India): Series B 2024年 第3期105卷 541-564页
作者: Kishore, Ch. Ravi Rao, D. Chandrasekhar Nayak, Janmenjoy Behera, H.S. Department of Information Technology Veer Surendra Sai University of Technology Burla768018 India Department of Computer Science Maharaja Sriram Chandra Bhanja Deo University Odisha Baripada757003 India
The modern vehicle depends on controller area network (CAN) bus technology to facilitate communication among electronic control units. Although the CAN bus technology is significant, it lacks the typical authenticatio... 详细信息
来源: 评论
SoulMate: Short-Text Author Linking Through Multi-Aspect Temporal-Textual Embedding (Extended Abstract)  40
SoulMate: Short-Text Author Linking Through Multi-Aspect Tem...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Najafipour, Saeed Hosseini, Saeid Hua, Wen Kangavari, Mohammad Reza Zhou, Xiaofang School of Information Technology and Electrical Engineering Iran University of Science and Technology Tehran Iran Sohar University Faculty of Computing and Information Technology Sohar Oman Hong Kong Polytechnic University Department of Computing Hong Kong Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
We devise a neural network-based temporal-textual framework that generates subgraphs with highly correlated authors from short-text contents. Our approach computes the relevance score (edge weight) between authors by ... 详细信息
来源: 评论
Cluster-preserving sampling algorithm for large-scale graphs
收藏 引用
science China(information sciences) 2023年 第1期66卷 60-76页
作者: Jianpeng ZHANG Hongchang CHEN Dingjiu YU Yulong PEI Yingjun DENG National Digital Switching System E&T Research Center Information Engineering University Network Systems Department of the Strategic Support Force School of Computer Science and Technology Eindhoven University of Technology Center for Applied Mathematics Tianjin University
Graph sampling is a very effective method to deal with scalability issues when analyzing largescale graphs. Lots of sampling algorithms have been proposed, and sampling qualities have been quantified using explicit pr... 详细信息
来源: 评论
Detection of Compromised Accounts using Machine Learning Based Boosting Algorithms- AdaBoost, XGBoost, and CatBoost  14
Detection of Compromised Accounts using Machine Learning Bas...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Pandey, Arti Jain, Arti Jaypee Institute of Information Technology Computer Science & Engineering and Information Technology Uttar Pradesh Noida India
In today's digital era, Online Social Media (OSM) like Twitter, Facebook, and Instagram are used to share information. Everyone is trusted on these social network platforms for exchanging information such as perso... 详细信息
来源: 评论