咨询与建议

限定检索结果

文献类型

  • 201,379 篇 会议
  • 97,726 篇 期刊文献
  • 2,377 册 图书

馆藏范围

  • 301,482 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 179,474 篇 工学
    • 116,484 篇 计算机科学与技术...
    • 94,076 篇 软件工程
    • 44,992 篇 信息与通信工程
    • 27,595 篇 控制科学与工程
    • 25,061 篇 电子科学与技术(可...
    • 24,452 篇 电气工程
    • 19,360 篇 生物工程
    • 15,110 篇 生物医学工程(可授...
    • 14,763 篇 光学工程
    • 13,000 篇 机械工程
    • 11,076 篇 化学工程与技术
    • 10,589 篇 仪器科学与技术
    • 9,603 篇 动力工程及工程热...
    • 8,867 篇 材料科学与工程(可...
    • 6,500 篇 网络空间安全
    • 6,401 篇 安全科学与工程
    • 6,011 篇 交通运输工程
  • 102,416 篇 理学
    • 49,504 篇 数学
    • 35,665 篇 物理学
    • 22,039 篇 生物学
    • 15,842 篇 统计学(可授理学、...
    • 11,471 篇 化学
    • 11,147 篇 系统科学
  • 45,915 篇 管理学
    • 28,262 篇 管理科学与工程(可...
    • 19,417 篇 图书情报与档案管...
    • 12,910 篇 工商管理
  • 14,733 篇 医学
    • 12,352 篇 临床医学
    • 10,875 篇 基础医学(可授医学...
    • 6,775 篇 药学(可授医学、理...
  • 7,998 篇 法学
    • 6,450 篇 社会学
  • 5,117 篇 经济学
  • 4,112 篇 农学
  • 3,276 篇 教育学
  • 1,411 篇 文学
  • 761 篇 军事学
  • 444 篇 艺术学
  • 50 篇 哲学
  • 30 篇 历史学

主题

  • 9,644 篇 computer science
  • 7,082 篇 accuracy
  • 6,740 篇 feature extracti...
  • 5,993 篇 deep learning
  • 5,861 篇 computational mo...
  • 5,300 篇 machine learning
  • 5,228 篇 training
  • 4,117 篇 data mining
  • 3,880 篇 support vector m...
  • 3,669 篇 optimization
  • 3,527 篇 predictive model...
  • 3,444 篇 wireless sensor ...
  • 3,400 篇 internet of thin...
  • 3,143 篇 real-time system...
  • 3,124 篇 artificial intel...
  • 3,123 篇 convolutional ne...
  • 3,030 篇 neural networks
  • 2,879 篇 bandwidth
  • 2,865 篇 computer archite...
  • 2,865 篇 protocols

机构

  • 1,703 篇 department of co...
  • 1,348 篇 department of co...
  • 1,151 篇 university of ch...
  • 1,046 篇 physikalisches i...
  • 1,043 篇 cavendish labora...
  • 973 篇 department of ph...
  • 869 篇 infn laboratori ...
  • 862 篇 oliver lodge lab...
  • 823 篇 department of el...
  • 808 篇 department of el...
  • 783 篇 infn sezione di ...
  • 718 篇 school of comput...
  • 627 篇 department of el...
  • 618 篇 department of co...
  • 612 篇 infn sezione di ...
  • 551 篇 chitkara univers...
  • 533 篇 nikhef national ...
  • 515 篇 infn sezione di ...
  • 501 篇 school of comput...
  • 486 篇 university of sc...

作者

  • 247 篇 j. wang
  • 246 篇 niyato dusit
  • 242 篇 barter w.
  • 228 篇 s. chen
  • 225 篇 a. gomes
  • 213 篇 bellee v.
  • 212 篇 blake t.
  • 209 篇 bowcock t.j.v.
  • 206 篇 y. zhang
  • 203 篇 borsato m.
  • 203 篇 betancourt c.
  • 201 篇 beiter a.
  • 200 篇 c. alexa
  • 199 篇 brundu d.
  • 197 篇 j. m. izen
  • 194 篇 amato s.
  • 186 篇 c. amelung
  • 185 篇 g. bella
  • 184 篇 j. strandberg
  • 184 篇 d. calvet

语言

  • 281,679 篇 英文
  • 15,122 篇 其他
  • 4,495 篇 中文
  • 355 篇 日文
  • 52 篇 朝鲜文
  • 47 篇 德文
  • 39 篇 法文
  • 28 篇 斯洛文尼亚文
  • 10 篇 俄文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 2 篇 意大利文
  • 1 篇 加泰罗尼亚文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science and Engineering and Information Technology Department"
301482 条 记 录,以下是4891-4900 订阅
排序:
A Review to Analyze Insider Threats Using Machine Learning Techniques  7th
A Review to Analyze Insider Threats Using Machine Learning T...
收藏 引用
7th International Conference on information and Communication technology for Competitive Strategies , ICTCS 2022
作者: Anju, A. Krishnamurthy, M. Nithakalyani, M. Shalini, K. Haritha, Ravikumar Department of Information Technology KCG College of Technology Chennai India Department of Computer Science and Engineering KCG College of Technology Chennai India
The most difficult risks in cyber world are insider threats, because of the modest nature of the insider threat it is quite difficult to identify attackers. Over the last few decades, insider threat detection has rise... 详细信息
来源: 评论
openGauss:An Enterprise-Grade Open-Source Database System
收藏 引用
Journal of computer science & technology 2024年 第5期39卷 1007-1028页
作者: Guo-Liang Li Jiang Wang Guo Chen Department of Computer Science Tsinghua UniversityBeijing 100084China Huawei Technologies Co. LtdBeijing 100088China China Mobile Information Technology Center Beijing 100027China
We have built openGauss,an enterprise-grade open-source database *** has fulfilled its design goal of high performance,high availability,high security,and high *** high performance,it leverages NUMA(non-uniform memory... 详细信息
来源: 评论
Prediction of Breast cancer survivability using semi supervised machine learning framework  3
Prediction of Breast cancer survivability using semi supervi...
收藏 引用
3rd International Conference on Smart Technologies and Systems for Next Generation Computing, ICSTSN 2024
作者: Bora, Mousoomi Baruah, Rupam The Assam Kaziranga University Department of Computer Science and Engineering Assam Jorhat India Assam Science and Technology University Department of Computer Science and Engineering Guwahati India
Artificial intelligence (AI) and machine learning (ML) algorithms are gaining acceptance in the field of health care analytics due to their effectiveness in terms of precision and prediction accuracy. A semi-supervise... 详细信息
来源: 评论
Joint trust-based detection and signature-based authentication technique for secure localization in underwater wireless sensor network
收藏 引用
Multimedia Tools and Applications 2025年 1-20页
作者: Kumar, Manni Goyal, Nitin Qaisi, Ramy Mohammed Aiesh Najim, Mohd Gupta, Sachin Kumar Department of Computer Science & Engineering Chandigarh University Gharuan Punjab India Department of Computer Science Engineering School of Engineering and Technology Central University of Haryana Haryana Mahendergarh123031 India Department of Electrical and Electronic Engineering College of Engineering University of Jeddah Jeddah21589 Saudi Arabia Department of Electronics and Communication Engineering Central University of Jammu UT of J&K Jammu181143 India
Ensuring secure and accurate node localization in Underwater Wireless Sensor Networks (UWSN) is a significant challenge, as conventional methods tend to neglect the security risks associated with malicious node interf... 详细信息
来源: 评论
Author profiling from Romanized Urdu text using transfer learning models
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4455-4470页
作者: Ali, Abid khan, Muhammad Sohail Khan, Muhammad Amin Khan, Sajid Ullah Khan, Faheem Department of Computer Software Engineering University of Engineering & Technology Mardan KPK Mardan23200 Pakistan Islamabad H-11/4 Islamabad44000 Pakistan Department of Information Systems College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj Saudi Arabia Department of Computer Engineering Gachon University Seongnam-Si Korea Republic of
This research concentrates on author profiling using transfer learning models for classifying age and gender. The investigation encompassed a diverse set of transfer learning techniques, including Roberta, BERT, ALBER... 详细信息
来源: 评论
information-Centric IoT-Based Smart Farming with Dynamic Data Optimization
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3865-3880页
作者: Souvik Pal Hannah VijayKumar D.Akila N.Z.Jhanjhi Omar A.Darwish Fathi Amsaad Department of Computer Science and Engineering Sister Nivedita UniversityKolkataIndia Post Doctoral Researcher Sambalpur UniversitySambalpurIndia Department of Computer Science Anna Adarsh College for WomenChennaiIndia Department of Information Technology Vels Institute of ScienceTechnology and Advanced StudiesChennaiIndia School of Computer Science and Engineering SCETaylor’s UniversitySubang Jaya47500SelangorMalaysia FITTaylor’s UniversitySubang Jaya47500SelangorMalaysia Department of Information Security and Applied Computing Eastern Michigan UniversityUSA School of Information Security and Applied Computing Eastern Michigan UniversityUSA
Smart farming has become a strategic approach of sustainable agriculture management and monitoring with the infrastructure to exploit modern technologies,including big data,the cloud,and the Internet of Things(IoT).Ma... 详细信息
来源: 评论
Invasive ductal carcinoma (IDC) detection in breast histopathology images using enhanced transfer learning of convolutional neural networks
收藏 引用
International Journal of information technology (Singapore) 2025年 1-13页
作者: Mahbub, Hafsa Binte Olowolayemo, Akeem Omari, Swaleh Maulid Adeleke, Imran Ademola Department of Computer Science KICT International Islamic University Malaysia Kuala Lumpur Malaysia School of Computing and Information Technology Jomo Kenyatta University of Agriculture and Technology Nairobi Kenya Department of Computer Science Education College of Information and Technology Education Lagos State University of Education Lagos Nigeria
This study introduces a deep learning methodology for the automated identification of tissue regions indicative of Invasive Ductal Carcinoma (IDC) within Whole Slide Images (WSI) associated with breast cancer. Deep le... 详细信息
来源: 评论
Optimizing Acoustic Echo Cancellation with Variable Step Size in Adaptive Filtering
Optimizing Acoustic Echo Cancellation with Variable Step Siz...
收藏 引用
2024 International Conference on Advanced Technologies for Communications, ATC 2024
作者: Chen, Yen-Yi Wang, Jian-Hong Chan, Po-Cheng Liang, Kai-Wen Wang, Ze-Yu Wang, Jia-Ching School of Computer Science and Technology Shandong University of Technology Shandong Zibo China National Central University Department of Computer Science and Information Engineering Taoyuan Taiwan Advanced Technology Laboratory Chunghwa Telecom Laboratories Taiwan
This paper presents an innovative approach to acoustic echo cancellation (AEC) by applying Variable Step Size (VSS) separately to each adaptive filtering technique: Normalized Least Mean Square (NLMS), and Proportiona... 详细信息
来源: 评论
Empowering Autonomous Decision-Making Through Quantum Reinforcement Learning and Cognitive Neuromorphic Frameworks  4
Empowering Autonomous Decision-Making Through Quantum Reinfo...
收藏 引用
4th IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2024
作者: Balasubramani, R. Biradar, Vidyadevi G. Nmam Institute of Technology Department of Information Science and Engineering Udupi India
The concept of Agentic AI, which focuses on empowering autonomous systems with human-like decision-making capabilities, has gained substantial attention in recent years. By leveraging advanced reinforcement learning (... 详细信息
来源: 评论
Data Security System using Blockchain technology  15
Data Security System using Blockchain Technology
收藏 引用
15th International Conference on Advances in Computing, Control, and Telecommunication Technologies, ACT 2024
作者: Aparna, R. Hegde, Indushree Manjunatha Meghana, V.S. Vardiya, Khushi Komal Department of Information Science and Engineering Siddaganga Institute of Technology Tumakuru India
Security has grown to be of utmost importance to both organizations and individuals in the current digital age. It has been shown that conventional centralized systems are susceptible to hacks, data breaches, identity... 详细信息
来源: 评论