咨询与建议

限定检索结果

文献类型

  • 87,582 篇 会议
  • 38,506 篇 期刊文献
  • 1,283 册 图书
  • 2 篇 科技报告

馆藏范围

  • 127,373 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 72,083 篇 工学
    • 45,786 篇 计算机科学与技术...
    • 36,764 篇 软件工程
    • 18,597 篇 信息与通信工程
    • 12,035 篇 控制科学与工程
    • 11,840 篇 电气工程
    • 11,442 篇 电子科学与技术(可...
    • 8,288 篇 生物工程
    • 7,014 篇 生物医学工程(可授...
    • 6,793 篇 光学工程
    • 5,113 篇 机械工程
    • 4,659 篇 化学工程与技术
    • 4,495 篇 仪器科学与技术
    • 4,354 篇 动力工程及工程热...
    • 4,141 篇 材料科学与工程(可...
    • 3,229 篇 网络空间安全
    • 2,950 篇 安全科学与工程
  • 43,357 篇 理学
    • 19,296 篇 数学
    • 16,697 篇 物理学
    • 9,561 篇 生物学
    • 6,300 篇 统计学(可授理学、...
    • 5,231 篇 化学
    • 4,683 篇 系统科学
  • 17,493 篇 管理学
    • 10,984 篇 管理科学与工程(可...
    • 7,255 篇 图书情报与档案管...
    • 5,335 篇 工商管理
  • 7,149 篇 医学
    • 5,879 篇 临床医学
    • 5,295 篇 基础医学(可授医学...
    • 3,286 篇 药学(可授医学、理...
    • 3,014 篇 公共卫生与预防医...
  • 3,451 篇 法学
    • 2,820 篇 社会学
  • 2,219 篇 经济学
  • 1,848 篇 农学
  • 1,137 篇 教育学
  • 555 篇 文学
  • 281 篇 军事学
  • 123 篇 艺术学
  • 14 篇 哲学
  • 9 篇 历史学

主题

  • 3,646 篇 accuracy
  • 2,988 篇 deep learning
  • 2,829 篇 feature extracti...
  • 2,828 篇 computer science
  • 2,707 篇 machine learning
  • 2,586 篇 computational mo...
  • 2,218 篇 training
  • 1,819 篇 internet of thin...
  • 1,802 篇 real-time system...
  • 1,795 篇 support vector m...
  • 1,705 篇 predictive model...
  • 1,690 篇 convolutional ne...
  • 1,563 篇 artificial intel...
  • 1,386 篇 neural networks
  • 1,383 篇 optimization
  • 1,329 篇 wireless sensor ...
  • 1,237 篇 data mining
  • 1,219 篇 bandwidth
  • 1,197 篇 computer archite...
  • 1,186 篇 security

机构

  • 1,093 篇 cavendish labora...
  • 1,019 篇 department of ph...
  • 970 篇 physikalisches i...
  • 961 篇 oliver lodge lab...
  • 763 篇 university of ch...
  • 645 篇 department of el...
  • 629 篇 chitkara univers...
  • 620 篇 infn laboratori ...
  • 610 篇 infn sezione di ...
  • 587 篇 infn sezione di ...
  • 572 篇 infn sezione di ...
  • 555 篇 fakultät physik ...
  • 546 篇 school of physic...
  • 543 篇 horia hulubei na...
  • 531 篇 department of ph...
  • 529 篇 school of physic...
  • 517 篇 h.h. wills physi...
  • 516 篇 imperial college...
  • 513 篇 nikhef national ...
  • 507 篇 stfc rutherford ...

作者

  • 259 篇 a. gomes
  • 252 篇 barter w.
  • 247 篇 c. alexa
  • 243 篇 j. m. izen
  • 238 篇 j. wang
  • 237 篇 c. amelung
  • 236 篇 g. bella
  • 236 篇 s. chen
  • 235 篇 j. strandberg
  • 235 篇 d. calvet
  • 232 篇 beiter a.
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 219 篇 betancourt c.
  • 218 篇 g. spigo
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 216 篇 boettcher t.
  • 214 篇 f. siegert

语言

  • 121,335 篇 英文
  • 4,708 篇 其他
  • 1,361 篇 中文
  • 119 篇 日文
  • 20 篇 法文
  • 13 篇 德文
  • 11 篇 斯洛文尼亚文
  • 8 篇 朝鲜文
  • 6 篇 荷兰文
  • 6 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 爱沙尼亚文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
检索条件"机构=Computer Technology Institute Department of Computer Engineering and Informatics"
127373 条 记 录,以下是81-90 订阅
排序:
Fuzzy clustering for electric field characterization and its application to thunderstorm interpretability
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 299-307页
作者: Xu Yang Hongyan Xing Xinyuan Ji Wei Xu Witold Pedrycz School of Electronics and Information Engineering Nanjing University of Information Science and Technology Department of Electrical and Computer Engineering University of Alberta Systems Research Institute Polish Academy of Sciences Department of Computer Engineering Faculty of Engineering and Natural Sciences Istinye University
Changes in the Atmospheric Electric Field Signal(AEFS) are highly correlated with weather changes, especially with thunderstorm activities. However, little attention has been paid to the ambiguous weather information ... 详细信息
来源: 评论
Improved security with novel M-Log chaos steganography algorithm for huffman compressed english text
收藏 引用
Multimedia Tools and Applications 2025年 第2期84卷 665-688页
作者: Raghuvanshi, Devvrat Joshi, Kamaldeep Nandal, Rainu Sehrawat, Harkesh Singh, Surender Singh, Srishti Department of Computer Science and Engineering University Institute of Engineering and Technology Maharshi Dayanand University Rohtak Haryana India
This paper addresses the underexplored landscape of chaotic functions in steganography, existing literature when examined under PRISMA-ScR framework it was realized that most of the studies predominantly focuses on ut... 详细信息
来源: 评论
Joint V2V Group Association and Transmission Power Control in Federated Vehicular Networks
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 18167-18182页
作者: Liu, Su Guan, Peiyuan Li, Yushuai Li, Tianyi Zolfagharian, Zolaikha Yu, Jiong Huang, Tingwen Xinjiang University School of Computer Science and Technology Urumqi830046 China University of Oslo Department of Informatics Oslo0316 Norway Aalborg University Department of Computer Science Aalborg9220 Denmark University of Tehran School of Electrical and Computer Engineering Iran Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518055 China
With growing awareness of privacy protection, Federated Learning (FL) in vehicular network scenarios effectively addresses privacy concerns, leading to the development of Federated Vehicular Networks (FVN). In FVN, ve... 详细信息
来源: 评论
HeRo: Heuristic-Based Routing in Payment Channel Networks
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2025年 第1期7卷 56-60页
作者: Mishra, Shruti Aggarwal, Virat Pal, Sujata Agarwal, Vidushi Indian Institute of Technology Ropar Department of Computer Science and Engineering Rupnagar140001 India
Payment channels support off-chain transactions by enhancing transaction speed and reducing fees in the main blockchain. However, the costs and complexity of the network increase as we increase the size of the network... 详细信息
来源: 评论
Analysing theoretical and neural distinguishers in Salsa 128 bits
收藏 引用
International Journal of Ad Hoc and Ubiquitous Computing 2025年 第1期49卷 43-59页
作者: Karthika, S.K. Singh, Kunwar Department of Computer Science and Engineering Vellore Institute of Technology Tamilnadu Chennai India Department of Computer Science and Engineering National Institute of Technology Tamilnadu Tiruchirappalli India
One of the finalists for the eSTREAM projects in 2005 was Salsa, created by Daniel J. Bernstein. Salsa is a widely recognised stream cipher that gained prominence after multiple cryptanalytic techniques were applied t... 详细信息
来源: 评论
Derandomizing Codes for the Adversarial Wiretap Channel of Type II
收藏 引用
IEEE Transactions on Information Theory 2025年 第6期71卷 4686-4707页
作者: Ruzomberka, Eric Nikbakht, Homa Brinton, Christopher G. Love, David J. Poor, H. Vincent Air Force Institute of Technology Department of Electrical and Computer Engineering United States Princeton University Department of Electrical and Computer Engineering United States Purdue University Elmore Family School of Electrical and Computer Engineering West Lafayette United States
The adversarial wiretap channel of type II (AWTC-II) is a communication channel that can a) read a fraction of the transmitted symbols up to a given bound and b) induce both errors and erasures in a fraction of the sy... 详细信息
来源: 评论
A Software Defect Prediction Method Using a Multivariate Heterogeneous Hybrid Deep Learning Algorithm
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3251-3279页
作者: Qi Fei Haojun Hu Guisheng Yin Zhian Sun College of Computer Science and Technology Harbin Engineering UniversityHarbin150001China Information Technology Research Department Jiangsu Automation Research InstituteLianyungang222062China School of Computer Science and Technology Harbin Institute of TechnologyShenzhen518055China
Software defect prediction plays a critical role in software development and quality assurance processes. Effective defect prediction enables testers to accurately prioritize testing efforts and enhance defect detecti... 详细信息
来源: 评论
Enhancing the Efficiency of Attacker with Improved Fruit Fly Optimization on Random Key Distribution for WSN
收藏 引用
SN computer Science 2025年 第3期6卷 1-24页
作者: Bathla, Rohit Ahlawat, Priyanka Department of Computer Engineering National Institute of Technology Kurukshetra India
Wireless sensor networks (WSN) have seen immense use in everyday life, like health, battle-field administration, and disaster administration. Nodes inside WSN are more vulnerable to safety attacks like data replay and... 详细信息
来源: 评论
A moment-based pooling approach in convolutional neural networks for breast cancer histopathology image classification
收藏 引用
Neural Computing and Applications 2025年 第2期37卷 1127-1156页
作者: Kumar, Arvind Singh, Chandan Sachan, Manoj Kumar Department of Computer Science and Engineering Sant Longowal Institute of Engineering and Technology Longowal Punjab Sangrur148106 India Department of Computer Science Punjabi University Punjab Patiala147002 India
Automated analysis of breast cancer (BC) histopathology images is a challenging task due to the high resolution, multiple magnifications, color variations, the presence of image artifacts, and morphological variabilit... 详细信息
来源: 评论
A Magnetic Signal Based Device Fingerprinting Scheme in Wireless Charging
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2943-2958页
作者: Li, Jiachun Meng, Yan Zhang, Le Chen, Guoxing Tian, Yuan Zhu, Haojin Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai200240 China Electrical and Computer Engineering Department Institute for Technology Los AngelesCA90095 United States
Wireless charging is widely used to charge smart devices with limited battery capacity. However, it is susceptible to the identity spoofing attack, where adversaries can impersonate malicious devices as legitimate one... 详细信息
来源: 评论