咨询与建议

限定检索结果

文献类型

  • 282,716 篇 会议
  • 123,359 篇 期刊文献
  • 2,853 册 图书

馆藏范围

  • 408,927 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 237,606 篇 工学
    • 158,232 篇 计算机科学与技术...
    • 128,261 篇 软件工程
    • 57,179 篇 信息与通信工程
    • 37,408 篇 控制科学与工程
    • 33,362 篇 电气工程
    • 31,603 篇 电子科学与技术(可...
    • 27,945 篇 生物工程
    • 21,849 篇 生物医学工程(可授...
    • 18,934 篇 光学工程
    • 16,201 篇 机械工程
    • 13,990 篇 化学工程与技术
    • 12,750 篇 动力工程及工程热...
    • 12,730 篇 仪器科学与技术
    • 11,431 篇 材料科学与工程(可...
    • 8,826 篇 安全科学与工程
    • 8,294 篇 网络空间安全
  • 135,636 篇 理学
    • 67,439 篇 数学
    • 44,118 篇 物理学
    • 31,757 篇 生物学
    • 22,130 篇 统计学(可授理学、...
    • 15,734 篇 系统科学
    • 14,977 篇 化学
  • 59,403 篇 管理学
    • 35,526 篇 管理科学与工程(可...
    • 26,216 篇 图书情报与档案管...
    • 17,661 篇 工商管理
  • 20,961 篇 医学
    • 17,487 篇 临床医学
    • 15,681 篇 基础医学(可授医学...
    • 9,789 篇 药学(可授医学、理...
    • 8,387 篇 公共卫生与预防医...
  • 11,158 篇 法学
    • 9,158 篇 社会学
  • 6,865 篇 经济学
  • 5,410 篇 农学
  • 4,389 篇 教育学
  • 1,924 篇 文学
  • 903 篇 军事学
  • 526 篇 艺术学
  • 78 篇 哲学
  • 47 篇 历史学

主题

  • 20,106 篇 computer science
  • 9,400 篇 accuracy
  • 8,961 篇 computational mo...
  • 8,306 篇 feature extracti...
  • 8,030 篇 deep learning
  • 7,766 篇 machine learning
  • 6,902 篇 training
  • 5,485 篇 data mining
  • 5,253 篇 support vector m...
  • 5,237 篇 predictive model...
  • 5,203 篇 computer archite...
  • 4,956 篇 wireless sensor ...
  • 4,783 篇 costs
  • 4,713 篇 optimization
  • 4,562 篇 bandwidth
  • 4,467 篇 application soft...
  • 4,445 篇 neural networks
  • 4,411 篇 protocols
  • 4,395 篇 testing
  • 4,392 篇 real-time system...

机构

  • 1,690 篇 department of co...
  • 1,354 篇 department of co...
  • 1,344 篇 department of el...
  • 1,154 篇 department of el...
  • 1,060 篇 cavendish labora...
  • 976 篇 department of ph...
  • 932 篇 department of co...
  • 850 篇 physikalisches i...
  • 846 篇 university of ch...
  • 832 篇 oliver lodge lab...
  • 818 篇 department of el...
  • 634 篇 department of co...
  • 563 篇 department of co...
  • 543 篇 infn sezione di ...
  • 534 篇 chitkara univers...
  • 518 篇 infn laboratori ...
  • 516 篇 infn sezione di ...
  • 502 篇 infn sezione di ...
  • 498 篇 horia hulubei na...
  • 486 篇 department of co...

作者

  • 252 篇 j. wang
  • 252 篇 s. chen
  • 250 篇 barter w.
  • 245 篇 niyato dusit
  • 227 篇 a. gomes
  • 223 篇 blake t.
  • 217 篇 bellee v.
  • 217 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 amato s.
  • 210 篇 boettcher t.
  • 207 篇 brundu d.
  • 206 篇 c. alexa
  • 205 篇 beiter a.
  • 201 篇 j. m. izen
  • 196 篇 bencivenni g.
  • 192 篇 c. amelung
  • 191 篇 g. bella
  • 191 篇 j. strandberg

语言

  • 391,154 篇 英文
  • 13,951 篇 其他
  • 3,852 篇 中文
  • 220 篇 日文
  • 50 篇 德文
  • 37 篇 法文
  • 35 篇 朝鲜文
  • 19 篇 斯洛文尼亚文
  • 9 篇 西班牙文
  • 8 篇 荷兰文
  • 6 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 意大利文
  • 1 篇 泰文
检索条件"机构=Computer Science and Engineering-Data Science Department"
408928 条 记 录,以下是71-80 订阅
排序:
AGBUNet: an enhanced CNN-UNET architecture for the prediction of above ground biomass using deep learning
收藏 引用
Neural Computing and Applications 2025年 第5期37卷 3809-3826页
作者: Arumai Shiney, S. Geetha, R. Department of Computer Science and Engineering S.A. Engineering College Chennai India
Accurate prediction of above ground biomass (AGB) is critical for monitoring forest health and carbon cycling. It is crucial for understanding and managing forest ecosystems. In this paper, we propose an enhanced fram... 详细信息
来源: 评论
A verifiable multi-secret image sharing scheme based on DNA encryption
收藏 引用
Multimedia Tools and Applications 2025年 第4期84卷 1967-1983页
作者: Chattopadhyay, Arup Kumar Saha, Sanchita Nag, Amitava Singh, Jyoti Prakash Department of Computer Science and Engineering Central Institute of Technology Kokrajhar Kokrajhar India Department of Computer Science and Engineering National Institute of Technology Patna Bihar Patna India
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret... 详细信息
来源: 评论
3-D AAV Deployment for Maximizing Harvested Energy in WRSNs: A Soft Actor-Critic Approach
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12083-12093页
作者: Bhalerao, Nilesh Vijaykumar Mothku, Sai Krishna Raju, Mekala Ratna National Institute of Technology Tiruchirappalli Department of Computer Science and Engineering Tiruchirappalli620015 India SRM University AP Department of Computer Science and Engineering Amaravati522240 India
Autonomous aerial vehicles (AAVs) with wireless power transfer (WPT) technology offer a promising solution to extend the lifetime of wireless rechargeable sensor networks (WRSNs) by swiftly recharging multiple sensor ... 详细信息
来源: 评论
Enhancing link prediction in graph data augmentation through graphon mixup
收藏 引用
Neural Computing and Applications 2025年 第8期37卷 6267-6282页
作者: Sultana, Tangina Hossain, Md. Delowar Morshed, Md. Golam Lee, Young-Koo Department of Electronics and Communication Engineering Hajee Mohammad Danesh Science and Technology University Dinajpur Bangladesh Department of Computer Science and Engineering Kyung Hee University Yongin Korea Republic of Department of Computer Science and Engineering Hajee Mohammad Danesh Science and Technology University Dinajpur Bangladesh
Link prediction in complex networks is a fundamental problem with applications in diverse domains, from social networks to biological systems. Traditional approaches often struggle to capture intricate relationships i... 详细信息
来源: 评论
Stylometry-driven framework for Urdu intrinsic plagiarism detection: a comprehensive analysis using machine learning, deep learning, and large language models
收藏 引用
Neural Computing and Applications 2025年 第9期37卷 6479-6513页
作者: Manzoor, Muhammad Faraz Farooq, Muhammad Shoaib Abid, Adnan Department of Computer Science University of Management and Technology Lahore Pakistan Department of Data Science Faculty of Computing and Information Technology University of the Punjab Lahore Pakistan
Detecting plagiarism in documents is a well-established task in natural language processing (NLP). Broadly, plagiarism detection is categorized into two types (1) intrinsic: to check the whole document or all the pass... 详细信息
来源: 评论
Application of human activity/action recognition: a review
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: sedaghati, Nazanin ardebili, Sondos Ghaffari, Ali Department of Computer Engineering Tabriz Branch Islamic Azad University Tabriz Iran Department of Computer Engineering Faculty of Engineering and Natural Science Istinye University Istanbul Turkey Department of Computer Science Khazar University Baku Azerbaijan
Human activity recognition is a crucial domain in computer science and artificial intelligence that involves the Detection, Classification, and Prediction of human activities using sensor data such as accelerometers, ... 详细信息
来源: 评论
ResdenseNet: a lightweight dense ResNet enhanced with depthwise separable convolutions and its applications for early plant disease classification
收藏 引用
Neural Computing and Applications 2025年 第8期37卷 6305-6326页
作者: Nagpal, Jyoti Goel, Lavika Department of Computer Science & Engineering The NorthCap University Gurugram122017 India Department of Computer Science and Engineering Malaviya National Institute of Technology Rajasthan Jaipur302017 India
In recent years, artificial intelligence has undergone robust development, leading to the emergence of numerous autonomous AI applications. However, a crucial challenge lies in optimizing computational efficiency and ... 详细信息
来源: 评论
TRE-DSP: A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 455-464页
作者: Yousheng Zhou Rundong Peng Yuanni Liu Pandi Vijayakumar Brij Gupta College of Computer Science and Technology Chongqing University of Posts and Telecommunications College of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Department of Computer Science and Engineering University College of Engineering Department of Computer Engineering National Institute of Technology Kurukshetra
With the popularity of the Internet of Vehicles(IoV), a large amount of data is being generated every day. How to securely share data between the IoV operator and various value-added service providers becomes one of t... 详细信息
来源: 评论
Enhancing cyber threat detection with an improved artificial neural network model
收藏 引用
data science and Management 2025年 第1期8卷 107-115页
作者: Oyinloye, Toluwase Sunday Arowolo, Micheal Olaolu Prasad, Rajesh Department of Computer Science African University of Science and Technology Abuja900107 Nigeria Department of Electrical Engineering and Computer Science University of Missouri ColumbiaMO65201 United States
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i... 详细信息
来源: 评论
Proposing a digital twin-based sustainable water governance system for rural Indian villages
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第3期17卷 1777-1783页
作者: Singh, Dineshkumar Sharma, Vishnu Department of Computer Science and Engineering Faculty of Computer Science & Engineering (FCE) Poornima University Jaipur India Department of Computer Science and Application Faculty of Computer Science & Engineering (FCE) Poornima University Jaipur India
A sustainably governed water-ecosystem at village-level is crucial for the community's well-being. It requires understanding natures’ limits to store and yield water and balance it with the stakeholders’ needs, ... 详细信息
来源: 评论