咨询与建议

限定检索结果

文献类型

  • 201,379 篇 会议
  • 97,726 篇 期刊文献
  • 2,377 册 图书

馆藏范围

  • 301,482 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 179,474 篇 工学
    • 116,484 篇 计算机科学与技术...
    • 94,076 篇 软件工程
    • 44,992 篇 信息与通信工程
    • 27,595 篇 控制科学与工程
    • 25,061 篇 电子科学与技术(可...
    • 24,452 篇 电气工程
    • 19,360 篇 生物工程
    • 15,110 篇 生物医学工程(可授...
    • 14,763 篇 光学工程
    • 13,000 篇 机械工程
    • 11,076 篇 化学工程与技术
    • 10,589 篇 仪器科学与技术
    • 9,603 篇 动力工程及工程热...
    • 8,867 篇 材料科学与工程(可...
    • 6,500 篇 网络空间安全
    • 6,401 篇 安全科学与工程
    • 6,011 篇 交通运输工程
  • 102,416 篇 理学
    • 49,504 篇 数学
    • 35,665 篇 物理学
    • 22,039 篇 生物学
    • 15,842 篇 统计学(可授理学、...
    • 11,471 篇 化学
    • 11,147 篇 系统科学
  • 45,915 篇 管理学
    • 28,262 篇 管理科学与工程(可...
    • 19,417 篇 图书情报与档案管...
    • 12,910 篇 工商管理
  • 14,733 篇 医学
    • 12,352 篇 临床医学
    • 10,875 篇 基础医学(可授医学...
    • 6,775 篇 药学(可授医学、理...
  • 7,998 篇 法学
    • 6,450 篇 社会学
  • 5,117 篇 经济学
  • 4,112 篇 农学
  • 3,276 篇 教育学
  • 1,411 篇 文学
  • 761 篇 军事学
  • 444 篇 艺术学
  • 50 篇 哲学
  • 30 篇 历史学

主题

  • 9,644 篇 computer science
  • 7,082 篇 accuracy
  • 6,740 篇 feature extracti...
  • 5,993 篇 deep learning
  • 5,861 篇 computational mo...
  • 5,300 篇 machine learning
  • 5,228 篇 training
  • 4,117 篇 data mining
  • 3,880 篇 support vector m...
  • 3,669 篇 optimization
  • 3,527 篇 predictive model...
  • 3,444 篇 wireless sensor ...
  • 3,400 篇 internet of thin...
  • 3,143 篇 real-time system...
  • 3,124 篇 artificial intel...
  • 3,123 篇 convolutional ne...
  • 3,030 篇 neural networks
  • 2,879 篇 bandwidth
  • 2,865 篇 computer archite...
  • 2,865 篇 protocols

机构

  • 1,703 篇 department of co...
  • 1,348 篇 department of co...
  • 1,151 篇 university of ch...
  • 1,046 篇 physikalisches i...
  • 1,043 篇 cavendish labora...
  • 973 篇 department of ph...
  • 869 篇 infn laboratori ...
  • 862 篇 oliver lodge lab...
  • 823 篇 department of el...
  • 808 篇 department of el...
  • 783 篇 infn sezione di ...
  • 718 篇 school of comput...
  • 627 篇 department of el...
  • 618 篇 department of co...
  • 612 篇 infn sezione di ...
  • 551 篇 chitkara univers...
  • 533 篇 nikhef national ...
  • 515 篇 infn sezione di ...
  • 501 篇 school of comput...
  • 486 篇 university of sc...

作者

  • 247 篇 j. wang
  • 246 篇 niyato dusit
  • 242 篇 barter w.
  • 228 篇 s. chen
  • 225 篇 a. gomes
  • 213 篇 bellee v.
  • 212 篇 blake t.
  • 209 篇 bowcock t.j.v.
  • 206 篇 y. zhang
  • 203 篇 borsato m.
  • 203 篇 betancourt c.
  • 201 篇 beiter a.
  • 200 篇 c. alexa
  • 199 篇 brundu d.
  • 197 篇 j. m. izen
  • 194 篇 amato s.
  • 186 篇 c. amelung
  • 185 篇 g. bella
  • 184 篇 j. strandberg
  • 184 篇 d. calvet

语言

  • 281,679 篇 英文
  • 15,122 篇 其他
  • 4,495 篇 中文
  • 355 篇 日文
  • 52 篇 朝鲜文
  • 47 篇 德文
  • 39 篇 法文
  • 28 篇 斯洛文尼亚文
  • 10 篇 俄文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 2 篇 意大利文
  • 1 篇 加泰罗尼亚文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering and Information Technology Department"
301482 条 记 录,以下是4871-4880 订阅
排序:
Hybrid Flow Shop with Setup Times Scheduling Problem
收藏 引用
computer Systems science & engineering 2023年 第1期44卷 563-577页
作者: Mahdi Jemmali Lotfi Hidri Department of Computer Science and Information College of Science at ZulfiMajmaah UniversityMajmaah11952Saudi Arabia Mars Laboratory University of SousseSousseTunisia Department of Computer Science Higher Institute of Computer Science and Mathematics of MonastirMonastir UniversityMonastir5000Tunisia Industrial Engineering Department College of EngineeringKing Saud UniversityRiyadh11421Saudi Arabia
The two-stage hybridflow shop problem under setup times is addressed in this *** problem is *** the other hand,the studied problem is modeling different real-life applications especially in manufacturing and high *** ... 详细信息
来源: 评论
BengaliHateCB: A Hybrid Deep Learning Model to Identify Bengali Hate Speech Detection from Online Platform  6
BengaliHateCB: A Hybrid Deep Learning Model to Identify Beng...
收藏 引用
6th International Conference on Electrical engineering and information and Communication technology, ICEEICT 2024
作者: Saha, Sagor Kumar Mim, Afrina Akter Akter, Sanzida Hosen, Md. Mehraz Shihab, Arman Habib Mehedi, Md Humaion Kabir Bangladesh University of Business and Technology Department of Computer Science and Engineering Dhaka Bangladesh Brac University Department of Computer Science and Engineering Dhaka Bangladesh
Online issues including hate speech, abusive communications, and harassment have been exacerbated by the rising number of Internet users. People in Bangladesh often face online harassment and threats expressed in Beng... 详细信息
来源: 评论
Android Malware Detection Using Machine Learning and Neural Network: A Hybrid Approach with Federated Learning  7
Android Malware Detection Using Machine Learning and Neural ...
收藏 引用
7th International Conference on Advanced Communication Technologies and Networking, CommNet 2024
作者: Purkayastha, Bishal Shyam Rahman, Md. Musfiqur Shahpasand, Maryam University of Staffordshire Department of Computer Science London United Kingdom Chittagong University of Engineering and Technology Department of Computer Science and Engineering Chittagong Bangladesh
Android is the most popular mobile operating system, which makes it a major target for malware attacks. This paper focuses on the growing problem of malware targeting Android devices and presents a new approach for de... 详细信息
来源: 评论
The Multi-Way Path Over the Blockchain: The Development of the Security Algorithm RB-24-1  6
The Multi-Way Path Over the Blockchain: The Development of t...
收藏 引用
6th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Rajaprakash, S. Bagath Basha, C. Rathish Babu, T.K.S. Karthik, S. Subapriya, V. Kavitha, S. Department of Computer Science & Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Tamil Nadu Chennai India Department of Computer Science & Engineering Kommuri Pratap Reddy Institute of Technology Telagana Hyderabad India Department of Computer Science & Engineering SRM Institute of Science and Technology Ramapuram Tamil Nadu Chennai India Department of Computer Science & Engineering Aarupadai Veedu Institute of Technology Vinayaka Missions Research Foundation Tamil Nadu Chennai India Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Tamil Nadu Chennai India
In the current world, a lot of new technologies are becoming famous. The Block Chain is one of these technologies. A very high amount of safety is offered by the technology in question;it is extremely robust. Users ar... 详细信息
来源: 评论
Critical Analysis of Life Span Improvement Techniques in Energy Constraints Edge IoT Devices
收藏 引用
SN computer science 2023年 第3期4卷 221页
作者: Padmini, M.S. Kuzhalvaimozhi, S. Department of Computer Science and Engineering The National Institute of Engineering Mysuru India Department of Information Science and Engineering The National Institute of Engineering Mysuru India
IoT edge computing facilitates data to be processed at a location closer to the place where it is generated. Placing computing closer allows for faster and more reliable service to the users. It also benefits latency-... 详细信息
来源: 评论
Federated Learning With Massive Random Access
收藏 引用
IEEE Transactions on Wireless Communications 2024年 第10期23卷 13856-13871页
作者: Xia, Shuhao Shi, Yuanming Zhou, Yong Wu, Youlong Yang, Lin F. Letaief, Khaled B. The School of Information Science and Technology ShanghaiTech University Shanghai201210 China The Department of Electrical and Computer Engineering University of California at Los Angeles Los AngelesCA90095 United States Hong Kong
In this paper, we propose an online federated learning framework with massive random access, aiming to learn a sequence of global models using local data that are sequentially collected by massive edge devices. As onl... 详细信息
来源: 评论
DeepSurNet-NSGA II:Deep Surrogate Model-Assisted Multi-Objective Evolutionary Algorithm for Enhancing Leg Linkage in Walking Robots
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 229-249页
作者: Sayat Ibrayev Batyrkhan Omarov Arman Ibrayeva Zeinel Momynkulov Joldasbekov Institute of Mechanics and Engineering Almaty050000Kazakhstan Department of Mathematical and Computer Modeling International Information Technology UniversityAlmaty050000Kazakhstan Department of Information Systems Al-Farabi Kazakh National UniversityAlmaty050000Kazakhstan
This research paper presents a comprehensive investigation into the effectiveness of the DeepSurNet-NSGA II(Deep Surrogate Model-Assisted Non-dominated Sorting Genetic Algorithm II)for solving complex multiobjective o... 详细信息
来源: 评论
OIDS: A Smart Framework for Intrusion Detection in 5G WSN's by using Ontology
OIDS: A Smart Framework for Intrusion Detection in 5G WSN's ...
收藏 引用
2023 International Conference on Advances in Computation, Communication and information technology, ICAICCIT 2023
作者: Bisht, Sover Singh Rajput, Anuj Singh Mandal, Sanjeev Kumar Noida Institute of Engineering and Technology Department of Data Science Uttar Pradesh Greater Noida India Tula's Institute Department of Computer Science and Engineering Dehradun India Department of Computer Science and Information Technology Bangalore India
The increasing depth and applications of 5G wireless sensor networks also raise the possibility of network intrusions. In this research, a network intrusion detection system based on the ontology notion is proposed. A... 详细信息
来源: 评论
Implementing Robust Color and Multispectral Image Recognition with Deep Learning
Implementing Robust Color and Multispectral Image Recognitio...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Pawar, Rahul Kumar, Prafull Anand, Kul Bhushan Department of Computer Science and Information Technology Bangalore India College of Engineering Teetthanker Mahaveer University Uttar Pradesh Moradabad India
this technical abstract describes the implementation of strong shade and multispectral image popularity using a deep knowledge of techniques. Via know-how, the standards, and strategies of deep getting to know, the me... 详细信息
来源: 评论
Cyber Security Intrusion Detection Using Deep Learning Approaches, Datasets, Bot-IOT Dataset  4
Cyber Security Intrusion Detection Using Deep Learning Appro...
收藏 引用
4th International Conference on Advancements in Computational sciences, ICACS 2023
作者: Manan, Iram Rehman, Faisal Sharif, Hanan Ali, Chaudhry Nouman Ali, Rana Rashid Liaqat, Amiad Khawaja Fareed University of Engineering and Information Technology Department of Information Technology Rahim Yar Khan Pakistan Lahore Leads University Department of Computer Science & Information Technology Lahore Pakistan
Cyber Security is a crucial point of the current world;it is used to analyze, defend, and detect network intrusion systems. An intrusion detection system has been designed using Deep learning techniques, which helps t... 详细信息
来源: 评论