咨询与建议

限定检索结果

文献类型

  • 67,109 篇 会议
  • 31,757 篇 期刊文献
  • 850 册 图书

馆藏范围

  • 99,716 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 61,455 篇 工学
    • 43,562 篇 计算机科学与技术...
    • 35,490 篇 软件工程
    • 16,980 篇 信息与通信工程
    • 9,739 篇 控制科学与工程
    • 7,523 篇 电气工程
    • 7,255 篇 电子科学与技术(可...
    • 7,052 篇 生物工程
    • 4,945 篇 生物医学工程(可授...
    • 4,659 篇 机械工程
    • 4,383 篇 光学工程
    • 3,447 篇 仪器科学与技术
    • 3,139 篇 动力工程及工程热...
    • 2,918 篇 化学工程与技术
    • 2,558 篇 网络空间安全
    • 2,508 篇 安全科学与工程
    • 2,325 篇 交通运输工程
  • 32,228 篇 理学
    • 17,213 篇 数学
    • 8,982 篇 物理学
    • 7,820 篇 生物学
    • 5,591 篇 统计学(可授理学、...
    • 3,785 篇 系统科学
    • 3,068 篇 化学
  • 17,286 篇 管理学
    • 10,729 篇 管理科学与工程(可...
    • 7,297 篇 图书情报与档案管...
    • 4,553 篇 工商管理
  • 4,808 篇 医学
    • 4,049 篇 临床医学
    • 3,637 篇 基础医学(可授医学...
    • 2,252 篇 药学(可授医学、理...
    • 2,023 篇 公共卫生与预防医...
  • 2,794 篇 法学
    • 2,189 篇 社会学
  • 1,720 篇 经济学
  • 1,405 篇 农学
  • 1,191 篇 教育学
  • 466 篇 文学
  • 286 篇 军事学
  • 216 篇 艺术学
  • 9 篇 哲学
  • 3 篇 历史学

主题

  • 2,600 篇 feature extracti...
  • 2,178 篇 accuracy
  • 2,165 篇 deep learning
  • 2,109 篇 computer science
  • 1,923 篇 computational mo...
  • 1,877 篇 training
  • 1,853 篇 machine learning
  • 1,463 篇 data mining
  • 1,296 篇 internet of thin...
  • 1,279 篇 optimization
  • 1,272 篇 support vector m...
  • 1,186 篇 information tech...
  • 1,121 篇 predictive model...
  • 1,114 篇 educational inst...
  • 1,092 篇 wireless sensor ...
  • 960 篇 artificial intel...
  • 947 篇 neural networks
  • 929 篇 semantics
  • 901 篇 security
  • 863 篇 real-time system...

机构

  • 648 篇 school of comput...
  • 511 篇 school of comput...
  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 276 篇 department of ph...
  • 264 篇 school of comput...
  • 259 篇 faculté des scie...
  • 253 篇 department of ph...
  • 224 篇 faculty of scien...
  • 219 篇 department of ph...
  • 215 篇 physics division...
  • 206 篇 school of comput...
  • 200 篇 department of co...
  • 193 篇 department of ph...
  • 186 篇 department of ph...
  • 177 篇 departamento de ...
  • 170 篇 college of compu...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 159 篇 department for p...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 265 篇 g. spigo
  • 263 篇 f. siegert
  • 262 篇 a. c. könig
  • 260 篇 h. a. gordon
  • 256 篇 m. klein
  • 253 篇 r. ströhmer
  • 244 篇 h. sakamoto
  • 243 篇 y. tayalati
  • 229 篇 niyato dusit
  • 227 篇 m. rijssenbeek
  • 201 篇 f. pastore
  • 201 篇 n. orlando
  • 200 篇 d. guest
  • 190 篇 s. jin

语言

  • 95,067 篇 英文
  • 3,057 篇 其他
  • 1,603 篇 中文
  • 78 篇 日文
  • 23 篇 法文
  • 19 篇 德文
  • 11 篇 斯洛文尼亚文
  • 10 篇 朝鲜文
  • 4 篇 荷兰文
  • 3 篇 土耳其文
  • 1 篇 俄文
检索条件"机构=Computer and Information Technology Engineering"
99716 条 记 录,以下是51-60 订阅
排序:
Exploring Nonuniform Structure of NSRTDs for Characterizing MACA Rules in the Null-Boundary Condition
收藏 引用
Complex Systems 2025年 第1期34卷 91-127页
作者: Hazra, Suvadip Banerjee, Som Dalui, Mamata Chakraborty, Bidesh Department of Computer Science and Engineering Indian Institute of Information Technology Karnataka Dharwad58009 India Department of Computer Science and Engineering National Institute of Technology West Bengal Durgapur713209 India Department of Computer Science and Engineering Haldia Institute of Technology West Bengal Haldia721657 India
The cellular automaton (CA), a discrete model, is gaining popularity in simulations and scientific exploration across various domains, including cryptography, error-correcting codes, VLSI design and test pattern gener... 详细信息
来源: 评论
Hybrid Sampling Technique for Imbalanced Android Malware Family Classification
收藏 引用
SN computer Science 2025年 第3期6卷 1-16页
作者: Chauhan, Kshamta Gandotra, Ekta Department of Computer Science and Engineering and Information Technology Jaypee University of Information Technology Waknaghat Himachal Pradesh Solan India
The rapid explosion of Android-based devices has led to a disturbing surge in the volume and sophistication of Android malware. Effective classification of these malicious applications is essential for safeguarding us... 详细信息
来源: 评论
Securing Next-Generation Quantum IoT Applications using Quantum Key Distribution
收藏 引用
IEEE Internet of Things Magazine 2025年 第1期8卷 50-56页
作者: Bera, Basudeb Das, Ashok Kumar Sikdar, Biplab The Department of Electrical and Computer Engineering National University of Singapore Singapore The International Institute of Information Technology Hyderabad India
The next generation of Quantum Internet of Things (QIoT) has the potential to revolutionize various sectors, including smart homes, healthcare, and smart cities, by enabling more sophisticated and interconnected syste... 详细信息
来源: 评论
Classifying distinct emotions from parents of ASD child using EEG source data by combining Bernoulli–Laplace Prior and graph neural networks
收藏 引用
Neural Computing and Applications 2025年 第12期37卷 7877-7895页
作者: ArulDass, Stephen Dass Jayagopal, Prabhu School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore632014 India
Emotion recognition using biological brain signals needs to be reliable to attain effective signal processing and feature extraction techniques. The impact of emotions in interpretations, conversations, and decision-m... 详细信息
来源: 评论
MOHSQO: Multi objective harmony search algorithm based QoS optimization in delay tolerant networks
收藏 引用
Multimedia Tools and Applications 2025年 1-26页
作者: Sonkar, Nidhi Pandey, Sudhakar Kumar, Sanjay Department of Computer Science and Engineering National Institute of Technology Warangal Hanamkonda India Department of Information Technology National Institute of Technology Raipur Raipur India
Delay Tolerant Networks (DTNs) have the ability to make communication possible without end-to-end connectivity using store-carry-forward technique. Efficient data dissemination in DTNs is very challenging problem due ... 详细信息
来源: 评论
DMF: A Deep Multimodal Fusion-Based Network Traffic Classification Model
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2267-2285页
作者: Xiangbin Wang Qingjun Yuan Weina Niu Qianwei Meng Yongjuan Wang Chunxiang Gu Henan Key Laboratory of Network Cryptography Technology Information Engineering UniversityZhengzhou450001China School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China
With the rise of encrypted traffic,traditional network analysis methods have become less effective,leading to a shift towards deep learning-based *** these,multimodal learning-based classification methods have gained ... 详细信息
来源: 评论
Semantic Segmentation of Lumbar Vertebrae Using Meijering U-Net(MU-Net)on Spine Magnetic Resonance Images
收藏 引用
computer Modeling in engineering & Sciences 2025年 第1期142卷 733-757页
作者: Lakshmi S V V Shiloah Elizabeth Darmanayagam Sunil Retmin Raj Cyril Department of Computer Science and Engineering College of Engineering GuindyAnna UniversityChennai600025India Department of Information Technology Madras Institute of TechnologyAnna UniversityChrompetChennai600044India
Lower back pain is one of the most common medical problems in the world and it is experienced by a huge percentage of people *** to its ability to produce a detailed view of the soft tissues,including the spinal cord,... 详细信息
来源: 评论
An Integrated Framework with Enhanced Primitives for Post-Quantum Cryptography: HEDT and ECSIDH for Cloud Data Security and Key Exchange
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第11期49卷 165-176页
作者: Ilias, Shaik Mohammad Sharmila, V. Ceronmani Durga, V. Sathya Dept. of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India Department of Information Technology Hindustan Institute of Technology and Science Chennai India Department of Computer Science&Engineering Hindustan Institute of Technology and Science Chennai India
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must... 详细信息
来源: 评论
Enhancing aviation safety: Machine learning for real-time ADS-B injection detection through advanced data analysis
收藏 引用
Alexandria engineering Journal 2025年 126卷 262-276页
作者: Rahman, Md. Atiqur Bhuiyan, Touhid Ali, M. Ameer Department of Computer Science and Engineering East West university Dhaka Bangladesh School of Information Technology Washington University of Science and Technology Alexandria United States Department of Computer Science and Engineering Bangladesh University of Business and Technology Dhaka Bangladesh
Airplanes play a critical role in global transportation, ensuring the efficient movement of people and goods. Although generally safe, aviation systems occasionally encounter incidents and accidents that underscore th... 详细信息
来源: 评论
A Generative Image Steganography Based on Disentangled Attribute Feature Transformation and Invertible Mapping Rule
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1149-1171页
作者: Xiang Zhang Shenyan Han Wenbin Huang Daoyong Fu School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China Engineering Research Center of Digital Forensics Nanjing University of Information Science and TechnologyMinistry of EducationNanjing210044China
Generative image steganography is a technique that directly generates stego images from secret *** traditional methods,it theoretically resists steganalysis because there is no cover ***,the existing generative image ... 详细信息
来源: 评论