咨询与建议

限定检索结果

文献类型

  • 244,436 篇 会议
  • 94,096 篇 期刊文献
  • 2,145 册 图书
  • 25 篇 学位论文
  • 2 篇 科技报告

馆藏范围

  • 340,704 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 197,738 篇 工学
    • 126,306 篇 计算机科学与技术...
    • 102,810 篇 软件工程
    • 50,494 篇 信息与通信工程
    • 32,122 篇 控制科学与工程
    • 30,483 篇 电气工程
    • 30,090 篇 电子科学与技术(可...
    • 21,545 篇 生物工程
    • 16,197 篇 生物医学工程(可授...
    • 15,795 篇 光学工程
    • 15,216 篇 机械工程
    • 11,839 篇 仪器科学与技术
    • 11,753 篇 化学工程与技术
    • 11,612 篇 动力工程及工程热...
    • 9,745 篇 材料科学与工程(可...
    • 7,301 篇 安全科学与工程
    • 7,087 篇 网络空间安全
    • 7,007 篇 交通运输工程
  • 109,189 篇 理学
    • 53,788 篇 数学
    • 36,781 篇 物理学
    • 24,024 篇 生物学
    • 17,413 篇 统计学(可授理学、...
    • 12,695 篇 系统科学
    • 12,164 篇 化学
  • 49,567 篇 管理学
    • 31,165 篇 管理科学与工程(可...
    • 20,526 篇 图书情报与档案管...
    • 13,952 篇 工商管理
  • 14,976 篇 医学
    • 12,527 篇 临床医学
    • 11,414 篇 基础医学(可授医学...
    • 7,268 篇 药学(可授医学、理...
  • 8,525 篇 法学
    • 6,872 篇 社会学
  • 5,683 篇 经济学
  • 4,317 篇 农学
  • 3,290 篇 教育学
  • 1,574 篇 文学
  • 813 篇 军事学
  • 487 篇 艺术学
  • 26 篇 哲学
  • 18 篇 历史学

主题

  • 8,341 篇 accuracy
  • 8,238 篇 feature extracti...
  • 7,544 篇 computational mo...
  • 7,258 篇 computer science
  • 6,987 篇 deep learning
  • 6,614 篇 training
  • 5,939 篇 machine learning
  • 4,511 篇 predictive model...
  • 4,498 篇 optimization
  • 4,410 篇 support vector m...
  • 4,120 篇 data mining
  • 4,050 篇 convolutional ne...
  • 3,994 篇 neural networks
  • 3,912 篇 real-time system...
  • 3,846 篇 wireless sensor ...
  • 3,762 篇 internet of thin...
  • 3,589 篇 computer archite...
  • 3,446 篇 bandwidth
  • 3,436 篇 data models
  • 3,318 篇 algorithm design...

机构

  • 3,276 篇 school of electr...
  • 2,435 篇 school of comput...
  • 2,208 篇 chitkara univers...
  • 1,489 篇 school of comput...
  • 1,294 篇 school of comput...
  • 1,118 篇 department of el...
  • 1,060 篇 university of ch...
  • 1,045 篇 cavendish labora...
  • 973 篇 department of ph...
  • 957 篇 college of compu...
  • 946 篇 school of comput...
  • 857 篇 department of co...
  • 840 篇 oliver lodge lab...
  • 839 篇 physikalisches i...
  • 828 篇 department of el...
  • 722 篇 department of co...
  • 706 篇 college of compu...
  • 649 篇 department of co...
  • 626 篇 school of comput...
  • 576 篇 school of electr...

作者

  • 283 篇 niyato dusit
  • 250 篇 barter w.
  • 243 篇 j. wang
  • 241 篇 a. gomes
  • 231 篇 s. chen
  • 227 篇 blake t.
  • 221 篇 bowcock t.j.v.
  • 220 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 214 篇 j. m. izen
  • 213 篇 brundu d.
  • 210 篇 boettcher t.
  • 210 篇 kukreja vinay
  • 209 篇 beiter a.
  • 206 篇 bencivenni g.
  • 199 篇 g. bella
  • 199 篇 c. amelung

语言

  • 325,274 篇 英文
  • 10,525 篇 其他
  • 4,833 篇 中文
  • 262 篇 日文
  • 53 篇 朝鲜文
  • 30 篇 德文
  • 28 篇 法文
  • 21 篇 斯洛文尼亚文
  • 21 篇 土耳其文
  • 7 篇 荷兰文
  • 3 篇 阿拉伯文
  • 3 篇 爱沙尼亚文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 捷克文
  • 1 篇 泰文
检索条件"机构=Computer Technology Engineering"
340704 条 记 录,以下是111-120 订阅
排序:
Enhancing aviation safety: Machine learning for real-time ADS-B injection detection through advanced data analysis
收藏 引用
Alexandria engineering Journal 2025年 126卷 262-276页
作者: Rahman, Md. Atiqur Bhuiyan, Touhid Ali, M. Ameer Department of Computer Science and Engineering East West university Dhaka Bangladesh School of Information Technology Washington University of Science and Technology Alexandria United States Department of Computer Science and Engineering Bangladesh University of Business and Technology Dhaka Bangladesh
Airplanes play a critical role in global transportation, ensuring the efficient movement of people and goods. Although generally safe, aviation systems occasionally encounter incidents and accidents that underscore th... 详细信息
来源: 评论
Clustered Reinforcement Learning
收藏 引用
Frontiers of computer Science 2025年 第4期19卷 43-57页
作者: Xiao MA Shen-Yi ZHAO Zhao-Heng YIN Wu-Jun LI National Key Laboratory for Novel Software Technology Department of Computer Science and TechnologyNanjing UniversityNanjing 210023China Department of Electrical Engineering and Computer Sciences University of CaliforniaBerkeleyCA 94720-1770USA
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)ar... 详细信息
来源: 评论
Enhancing patient-independent detection of freezing of gait in Parkinson’s disease with deep adversarial network
收藏 引用
Neural Computing and Applications 2025年 1-21页
作者: Fahad, Md Shah Ranjan, Ashish Kumar, Gautam Department of Computer Science and Engineering Birla Institute of Technology Mesra Jharkhand Ranchi India Department of Computer Science and Engineering C. V. Raman Global University Odisha Bhubaneswar India Department of Computer Science and Engineering National Institute of Technology Delhi Delhi India
Freezing of gait (FoG) refers to sudden, relatively brief episodes of gait arrest in Parkinson’s disease, known to manifest in the advanced stages of the condition. Events of freezing are associated with tumbles, tra... 详细信息
来源: 评论
Security in Bluetooth and Wearable Devices: A Survey  4
Security in Bluetooth and Wearable Devices: A Survey
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Kumar, Hardik Bhaidasna, Hetal Patel, Kajol Parul Institute of Engineering and Technology Computer Engineering Vadodara India Parul Institute of Engineering and Technology-Diploma Computer Engineering Vadodara India
The rise of Bluetooth tech & wearable gadgets has greatly changed our personal lives. These devices offer amazing convenience & help us connect in many areas like healthcare, fitness, and daily activities. But... 详细信息
来源: 评论
When Software Security Meets Large Language Models:A Survey
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第2期12卷 317-334页
作者: Xiaogang Zhu Wei Zhou Qing-Long Han Wanlun Ma Sheng Wen Yang Xiang IEEE the School of Computer and Mathematical Sciences the University of Adelaide the School of Science Computing and Engineering Technologies Swinburne University of Technology
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ... 详细信息
来源: 评论
Few-Shot Referring Video Single- and Multi-Object Segmentation Via Cross-Modal Affinity with Instance Sequence Matching
收藏 引用
International Journal of computer Vision 2025年 1-19页
作者: Liu, Heng Li, Guanghui Gao, Mingqi Zhen, Xiantong Zheng, Feng Wang, Yang School of Computer Science and Technology Anhui University of Technology Maxiang Road Ma’anshan243032 China Department of Computer Science and Engineering Southern University of Science and Technology Xueyuan Avenue Shenzhen518055 China School of Computer Science and Information Engineering Hefei University of Technology Feicui Road Hefei230601 China
Referring Video Object Segmentation (RVOS) aims to segment specific objects in videos based on the provided natural language descriptions. As a new supervised visual learning task, achieving RVOS for a given scene req... 详细信息
来源: 评论
A systematic review of machine learning and deep learning techniques for anomaly detection in data mining
收藏 引用
International Journal of computers and Applications 2025年 第2期47卷 169-187页
作者: Tahir, Mahjabeen Abdullah, Azizol Izura Udzir, Nur Azhar Kasmiran, Khairul Serdang Malaysia Serdang Malaysia Department of Computer Engineering Sir Syed University of Engineering & Technology Karachi Pakistan
The growing use of the internet has increased the threat of cyberattacks. Anomaly detection systems are vital for protecting networks by spotting irregular activities. Various studies investigated anomaly detection te... 详细信息
来源: 评论
GTE: learning code AST representation efficiently and effectively
收藏 引用
Science China(Information Sciences) 2025年 第3期68卷 393-394页
作者: Yihao QIN Shangwen WANG Bo LIN Kang YANG Xiaoguang MAO College of Computer Science and Technology National University of Defense Technology Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology
With the development of deep learning in recent years, code representation learning techniques have become the foundation of many software engineering tasks such as program classification [1] and defect detection. Ear...
来源: 评论
Improved employee bee algorithm for team formation
收藏 引用
Evolving Systems 2025年 第2期16卷 1-20页
作者: Shingade, Sandip Niyogi, Rajdeep Shelke, Sushila Department of Computer Science and Engineering Indian Institute of Technology Roorkee Uttarakhand Roorkee247667 India Department of Computer Engineering and Information Technology Veermata Jijabai Technological Institute Matunga Maharashtra Mumbai400019 India Department of Computer Engineering Cummins College of Engineering for Women Karve Nagar Maharashtra Pune411052 India
Finding an appropriate subset of agents (a team) from a larger pool of agents (the source set) so that the team exhibits a desired quality is the essence of the team formation problem. This problem is recognized to ha... 详细信息
来源: 评论
Improved security with novel M-Log chaos steganography algorithm for huffman compressed english text
收藏 引用
Multimedia Tools and Applications 2025年 第2期84卷 665-688页
作者: Raghuvanshi, Devvrat Joshi, Kamaldeep Nandal, Rainu Sehrawat, Harkesh Singh, Surender Singh, Srishti Department of Computer Science and Engineering University Institute of Engineering and Technology Maharshi Dayanand University Rohtak Haryana India
This paper addresses the underexplored landscape of chaotic functions in steganography, existing literature when examined under PRISMA-ScR framework it was realized that most of the studies predominantly focuses on ut... 详细信息
来源: 评论