咨询与建议

限定检索结果

文献类型

  • 149,501 篇 会议
  • 70,945 篇 期刊文献
  • 2,035 册 图书
  • 7 篇 专利

馆藏范围

  • 222,487 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 129,225 篇 工学
    • 89,504 篇 计算机科学与技术...
    • 71,774 篇 软件工程
    • 30,563 篇 信息与通信工程
    • 20,194 篇 控制科学与工程
    • 16,355 篇 电气工程
    • 14,975 篇 电子科学与技术(可...
    • 14,699 篇 生物工程
    • 10,975 篇 生物医学工程(可授...
    • 10,411 篇 光学工程
    • 8,929 篇 机械工程
    • 7,402 篇 化学工程与技术
    • 6,793 篇 仪器科学与技术
    • 6,374 篇 动力工程及工程热...
    • 5,602 篇 材料科学与工程(可...
    • 5,538 篇 网络空间安全
    • 4,945 篇 安全科学与工程
  • 76,108 篇 理学
    • 37,455 篇 数学
    • 25,835 篇 物理学
    • 16,688 篇 生物学
    • 12,041 篇 统计学(可授理学、...
    • 8,325 篇 化学
    • 7,597 篇 系统科学
  • 34,119 篇 管理学
    • 20,693 篇 管理科学与工程(可...
    • 14,987 篇 图书情报与档案管...
    • 9,256 篇 工商管理
  • 10,821 篇 医学
    • 8,908 篇 临床医学
    • 7,957 篇 基础医学(可授医学...
    • 4,889 篇 药学(可授医学、理...
    • 4,613 篇 公共卫生与预防医...
  • 6,071 篇 法学
    • 5,001 篇 社会学
  • 3,617 篇 经济学
  • 3,293 篇 农学
  • 2,280 篇 教育学
  • 1,006 篇 文学
  • 506 篇 军事学
  • 318 篇 艺术学
  • 72 篇 哲学
  • 40 篇 历史学

主题

  • 8,081 篇 computer science
  • 6,648 篇 accuracy
  • 5,580 篇 deep learning
  • 5,479 篇 feature extracti...
  • 5,251 篇 computational mo...
  • 4,624 篇 machine learning
  • 4,567 篇 training
  • 3,266 篇 predictive model...
  • 3,224 篇 convolutional ne...
  • 3,173 篇 real-time system...
  • 3,014 篇 support vector m...
  • 2,815 篇 artificial intel...
  • 2,772 篇 data mining
  • 2,767 篇 data models
  • 2,617 篇 optimization
  • 2,595 篇 internet of thin...
  • 2,469 篇 neural networks
  • 2,394 篇 semantics
  • 2,311 篇 computer archite...
  • 2,221 篇 security

机构

  • 2,880 篇 school of comput...
  • 2,296 篇 university of ch...
  • 2,259 篇 chitkara univers...
  • 1,383 篇 school of comput...
  • 1,086 篇 cavendish labora...
  • 1,037 篇 department of co...
  • 984 篇 department of ph...
  • 979 篇 institute of com...
  • 917 篇 physikalisches i...
  • 915 篇 oliver lodge lab...
  • 569 篇 infn sezione di ...
  • 553 篇 infn laboratori ...
  • 540 篇 infn sezione di ...
  • 524 篇 horia hulubei na...
  • 511 篇 infn sezione di ...
  • 508 篇 department of ph...
  • 504 篇 h.h. wills physi...
  • 504 篇 school of comput...
  • 503 篇 school of physic...
  • 501 篇 fakultät physik ...

作者

  • 258 篇 barter w.
  • 256 篇 j. wang
  • 239 篇 s. chen
  • 236 篇 a. gomes
  • 233 篇 blake t.
  • 225 篇 c. alexa
  • 224 篇 amato s.
  • 222 篇 j. m. izen
  • 222 篇 bellee v.
  • 222 篇 betancourt c.
  • 220 篇 bowcock t.j.v.
  • 220 篇 borsato m.
  • 218 篇 brundu d.
  • 218 篇 boettcher t.
  • 211 篇 d. calvet
  • 211 篇 bencivenni g.
  • 210 篇 beiter a.
  • 204 篇 g. bella
  • 204 篇 j. strandberg
  • 204 篇 bay a.

语言

  • 182,302 篇 英文
  • 37,606 篇 其他
  • 2,917 篇 中文
  • 213 篇 日文
  • 38 篇 德文
  • 31 篇 斯洛文尼亚文
  • 27 篇 法文
  • 17 篇 俄文
  • 16 篇 朝鲜文
  • 5 篇 葡萄牙文
  • 4 篇 西班牙文
  • 3 篇 阿拉伯文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 波兰文
检索条件"机构=Computer Science and Technology in Institute of Computing Technology"
222488 条 记 录,以下是101-110 订阅
Existence and uniqueness of mean field equilibrium in continuous bandit game
收藏 引用
science China(Information sciences) 2025年 第3期68卷 395-396页
作者: Xiong WANG Yuqing LI Riheng JIA School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Wuhan University Wuhan University Shenzhen Research Institute School of Computer Science and Technology Zhejiang Normal University
Multiarmed bandit(MAB) models are widely used for sequential decision-making in uncertain environments, such as resource allocation in computer communication systems.A critical challenge in interactive multiagent syst...
来源: 评论
Bayesian optimization based bloat prevention for secure IoT healthcare
收藏 引用
Journal of Intelligent and Fuzzy Systems 2025年 第6期48卷 897-908页
作者: Ramya, M. Sudhakaran, Pradeep Department of Computing Technologies SRM Institute of Science and Technology Tamilnadu Kattankulathur India
Health information technology is a subcategory of health technology that covers medical and healthcare information technology. It allows for the secure exchange of health information among consumers, providers, payers... 详细信息
来源: 评论
Early prediction of diabetics using three-layer classifier model and improved dimensionality reduction
收藏 引用
Multimedia Tools and Applications 2025年 1-27页
作者: G, Keerthana R, Mohanasundaram School of Computing Science and Engineering Vellore Institute of Technology TN Vellore India
Diabetes is a long-term illness that results in a variety of chronic body damage, such as kidney failure, heart problems, eye damage, depression, and nerve damage. This disease is caused by several risk factors, ... 详细信息
来源: 评论
Malicious iOS Apps Detection Through Multi-Criteria Decision-Making Approach
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第1期49卷 207-220页
作者: Bhatt, Arpita Jadhav Sardana, Neetu Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Indonesia
In today’s era, smartphones are used in daily lives because they are ubiquitous and can be customized by installing third-party apps. As a result, the menaces because of these apps, which are potentially risky for u... 详细信息
来源: 评论
CNN-LSTM: A Novel Hybrid Deep Neural Network Model for Brain Tumor Classification
收藏 引用
Intelligent Automation & Soft computing 2023年 第7期37卷 1129-1143页
作者: R.D.Dhaniya K.M.Umamaheswari Department of Computer Science and Engineering SRM Institute of Science and TechnologyKattankulathur603202India Department of Computing technologies SRM Institute of Science and TechnologyKattankulathur603202India
Current revelations in medical imaging have seen a slew of computer-aided diagnostic(CAD)tools for radiologists *** tumor classification is essential for radiologists to fully support and better interpret magnetic res... 详细信息
来源: 评论
A new perspective exploration of machine learning algorithms for defending Side-Channel attacks
收藏 引用
Multimedia Tools and Applications 2025年 第16期84卷 17021-17040页
作者: Ramakrishnan, Vedhavathy Thoguluva Seethapathy, Murugaanandam Sundar, Ramesh Dhandapani, Saveetha Munusamy, Sundarrajan Balasubrahmaniam, Lakshmi Dhevi Department of Networking and Communications School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur India
Machine learning algorithms are used in various real-time applications, where security is one of the major problems. Security is applied in various aspects of the application in cloud computing. One of the security is... 详细信息
来源: 评论
Semi-supervised learning based hybrid beamforming under time-varying propagation environments
收藏 引用
Digital Communications and Networks 2024年 第4期10卷 1168-1177页
作者: Yin Long Hang Ding Simon Murphy School of Computer Science and Technology Southwest University of Science and TechnologyMianyang621000China Department of Computing Science University of AlbertaEdmontonT6G 2R3Canada
Hybrid precoding is considered as a promising low-cost technique for millimeter wave(mm-wave)massive Multi-Input Multi-Output(MIMO)*** this work,referring to the time-varying propagation circumstances,with semi-superv... 详细信息
来源: 评论
SMOTE-Based deep network with adaptive boosted sooty for the detection and classification of type 2 diabetes mellitus
收藏 引用
Multimedia Tools and Applications 2024年 1-26页
作者: Immadisetty, Phani Kumar Rajabhushanam, C. Computer Science Engineering Bharath Institute of Science and Technology BIST Selaiyur Tamil Nadu Chennai600073 India School of Computing Bharath Institute of Science and Technology BIST Selaiyur Tamil Nadu Chennai600073 India
Type 2 diabetes (T2D) is a prolonged disease caused by abnormal rise in glucose levels due to poor insulin production in the pancreas. However, the detection and classification of this type of disease is very challeng... 详细信息
来源: 评论
Stylometry-driven framework for Urdu intrinsic plagiarism detection: a comprehensive analysis using machine learning, deep learning, and large language models
收藏 引用
Neural computing and Applications 2025年 第9期37卷 6479-6513页
作者: Manzoor, Muhammad Faraz Farooq, Muhammad Shoaib Abid, Adnan Department of Computer Science University of Management and Technology Lahore Pakistan Department of Data Science Faculty of Computing and Information Technology University of the Punjab Lahore Pakistan
Detecting plagiarism in documents is a well-established task in natural language processing (NLP). Broadly, plagiarism detection is categorized into two types (1) intrinsic: to check the whole document or all the pass... 详细信息
来源: 评论
Embedded Responsible computing: Mainstreaming Ethics into computer science Curriculum: A Case Study of Dedan Kimathi University of technology (DeKUT)
Embedded Responsible Computing: Mainstreaming Ethics into Co...
收藏 引用
2024 International Conference on Information and Communication technology for Development for Africa, ICT4DA 2024
作者: Musumba, George Kagiri, Michael Mwangi, Hellen Wachepele, David Miano, Dennis Dedan Kimathi University of Technology Dept. Computer Science Nyeri Kenya Dedan Kimathi University of Technology Institute of Criminology Forensics and Security Studies Nyeri Kenya
The rapid advancement of software solutions in the industry has brought significant ethical concerns, ranging from data privacy issues to algorithmic bias and cybersecurity threats. Addressing these concerns requires ... 详细信息
来源: 评论