咨询与建议

限定检索结果

文献类型

  • 22,237 篇 会议
  • 19,753 篇 期刊文献
  • 518 册 图书

馆藏范围

  • 42,508 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,890 篇 工学
    • 14,368 篇 计算机科学与技术...
    • 11,218 篇 软件工程
    • 5,433 篇 信息与通信工程
    • 4,257 篇 电气工程
    • 4,239 篇 电子科学与技术(可...
    • 3,580 篇 控制科学与工程
    • 3,058 篇 光学工程
    • 2,863 篇 生物工程
    • 2,619 篇 生物医学工程(可授...
    • 2,066 篇 化学工程与技术
    • 1,897 篇 材料科学与工程(可...
    • 1,674 篇 仪器科学与技术
    • 1,565 篇 机械工程
    • 1,407 篇 动力工程及工程热...
    • 971 篇 网络空间安全
    • 854 篇 安全科学与工程
  • 17,681 篇 理学
    • 8,349 篇 物理学
    • 6,575 篇 数学
    • 3,564 篇 生物学
    • 2,518 篇 化学
    • 2,254 篇 统计学(可授理学、...
    • 1,299 篇 系统科学
  • 5,633 篇 管理学
    • 3,566 篇 管理科学与工程(可...
    • 2,188 篇 图书情报与档案管...
    • 1,717 篇 工商管理
  • 3,029 篇 医学
    • 2,419 篇 临床医学
    • 1,998 篇 基础医学(可授医学...
    • 1,215 篇 药学(可授医学、理...
    • 1,163 篇 公共卫生与预防医...
  • 1,035 篇 法学
    • 876 篇 社会学
  • 672 篇 经济学
  • 654 篇 农学
  • 414 篇 教育学
  • 175 篇 文学
  • 83 篇 军事学
  • 54 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 1,043 篇 accuracy
  • 1,030 篇 deep learning
  • 890 篇 machine learning
  • 821 篇 computer science
  • 627 篇 feature extracti...
  • 622 篇 computational mo...
  • 579 篇 artificial intel...
  • 571 篇 training
  • 563 篇 internet of thin...
  • 490 篇 real-time system...
  • 418 篇 support vector m...
  • 380 篇 predictive model...
  • 370 篇 convolutional ne...
  • 356 篇 optimization
  • 296 篇 reliability
  • 275 篇 scalability
  • 270 篇 data models
  • 250 篇 security
  • 235 篇 reinforcement le...
  • 232 篇 computer archite...

机构

  • 1,108 篇 cavendish labora...
  • 1,033 篇 department of ph...
  • 988 篇 physikalisches i...
  • 982 篇 oliver lodge lab...
  • 709 篇 university of ch...
  • 663 篇 infn laboratori ...
  • 623 篇 infn sezione di ...
  • 610 篇 fakultät physik ...
  • 605 篇 infn sezione di ...
  • 599 篇 infn sezione di ...
  • 560 篇 school of physic...
  • 555 篇 department of ph...
  • 542 篇 horia hulubei na...
  • 533 篇 school of physic...
  • 525 篇 iccub universita...
  • 524 篇 imperial college...
  • 522 篇 school of physic...
  • 516 篇 h.h. wills physi...
  • 514 篇 stfc rutherford ...
  • 511 篇 nikhef national ...

作者

  • 273 篇 barter w.
  • 254 篇 a. gomes
  • 244 篇 c. alexa
  • 242 篇 j. m. izen
  • 237 篇 bellee v.
  • 236 篇 beiter a.
  • 235 篇 blake t.
  • 234 篇 brundu d.
  • 233 篇 c. amelung
  • 231 篇 g. bella
  • 231 篇 j. strandberg
  • 231 篇 d. calvet
  • 230 篇 j. wang
  • 229 篇 s. chen
  • 228 篇 g. spigo
  • 226 篇 bowcock t.j.v.
  • 224 篇 f. siegert
  • 224 篇 amato s.
  • 222 篇 betancourt c.
  • 222 篇 boettcher t.

语言

  • 34,094 篇 英文
  • 8,079 篇 其他
  • 395 篇 中文
  • 20 篇 日文
  • 18 篇 德文
  • 12 篇 法文
  • 5 篇 朝鲜文
  • 3 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 意大利文
检索条件"机构=Department Computer Science and Computer Engineering and Applied Computing Research Institute"
42508 条 记 录,以下是111-120 订阅
Beamforming and Reflection Design for Short Packet ISAC With Non-Ideal RIS: An A3C-Based Approach
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8379-8384页
作者: Mahmoudi, Behrad Khonsari, Ahmad Zeinali, Farshad Mili, Mohammad Robat Mashhadi, Mahdi Boloursaz Xiao, Pei University of Tehran Department of Electrical and Computer Engineering Tehran Iran University of Tehran School of Electrical and Computer Engineering College of Engineering Tehran Iran School of Computer Science in the Institute for Research in Fundamental Sciences Tehran Iran United Kingdom Institute for Advanced Innovative Solutions Tehran Iran
Integrated sensing and communication (ISAC) is a promising solution to mitigate the increasing congestion of the wireless spectrum. In this paper, we investigate the short packet communication regime within an ISAC sy... 详细信息
来源: 评论
Zero Trust Networks: Evolution and Application from Concept to Practice
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1593-1613页
作者: Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang School of Computer Science School of Cyber Science and EngineeringEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China Department of Computing Science University of AberdeenAberdeenAB243FXUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Sanya Institute of Hunan University of Science and Technology Sanya572024China
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address... 详细信息
来源: 评论
Collaborative Search With Knowledge Sharing And Summarization  4
Collaborative Search With Knowledge Sharing And Summarizatio...
收藏 引用
4th International Conference on Sustainable Expert Systems, ICSES 2024
作者: Mohan, Venkateshwaran Sivaganesan, D. Balasubramaniam, S. Vikhas, S.G. Dhinesh, S.P. Psg Institute of Technology and Applied Research Department of Computer Science and Engineering Coimbatore India Dr Mahalingam College of Engineering and Technology Department of Computer Science and Engineering Pollachi India Psg College of Technology Department of Computer Science and Engineering Coimbatore India Sri Krishna Arts and Science College Department of Computer Science Coimbatore India
A collaborative search engine is used for a group of users who want to search information together for various group activities. This will be time saving as the users can split the work between them. Summarization is ... 详细信息
来源: 评论
An intrusion detection system using ranked feature bagging
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第2期16卷 1213-1219页
作者: Azhagiri, M. Rajesh, A. Karthik, S. Raja, K. Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India Department of Computer Science and Engineering Jain University Bangalore India Department of IT College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India
An Intrusion Detection System monitors the network for any malicious attacks. It is an ideal tool for protecting extensive business networks from any kind of attack. In this paper, an Intrusion Detection System using ... 详细信息
来源: 评论
Wrapper Based Linear Discriminant Analysis(LDA)for Intrusion Detection in IIoT
收藏 引用
computer Systems science & engineering 2023年 第5期45卷 1625-1640页
作者: B.Yasotha T.Sasikala M.Krishnamurthy Department of Computer Science and Engineering MNM Jain Engineering CollegeChennai600097India Department of School of Computing Sathyabama Institute of Science and TechnologyChennai600119India Department of Computer Science and Engineering KCG College of TechnologyChennai600097India
The internet has become a part of every human ***,various devices that are connected through the internet are ***,the Industrial Internet of things(IIoT)is an evolutionary technology interconnecting various industries... 详细信息
来源: 评论
IRS-enabled NOMA communication systems:A network architecture primer with future trends and challenges
收藏 引用
Digital Communications and Networks 2024年 第5期10卷 1503-1528页
作者: Haleema Sadia Ahmad Kamal Hassan Ziaul Haq Abbas Ghulam Abbas Muhammad Waqas Zhu Han Faculty of Electrical Engineering and Telecommunications and Networking(TeleCoN)Research Center Ghulam Ishaq Khan Institute of Engineering and Technology(GIKI)Topi 23640Pakistan Faculty of Computer Science and Engineering GIKITopi 23640Pakistan Department of Computer Engineering College of Information TechnologyUniversity of Bahrain32028Bahrain School of Engineering Edith Cowan UniversityPerth WA6027Australia Department of Electrical and Computer Engineering University of HoustonHoustonTX 77004USA Department of Computer Science and Engineering Kyung Hee UniversitySeoul 446-701South Korea
Non-Orthogonal Multiple Access(NOMA)has already proven to be an effective multiple access scheme for5th Generation(5G)wireless *** provides improved performance in terms of system throughput,spectral efficiency,fairne... 详细信息
来源: 评论
Fuzzy and IRLNC-based routing approach to improve data storage and system reliability in IoT
收藏 引用
Intelligent and Converged Networks 2024年 第1期5卷 68-80页
作者: U.Indumathi A.R.Arunachalam the Department of Computer Science and Engineering Dr.M.G.R.Educational and Research InstituteChennai 600095India
Internet of Things(IoT)based sensor network is largely utilized in various field for transmitting huge amount of data due to their ease and cheaper *** performing this entire process,there is a high possibility for da... 详细信息
来源: 评论
Enhancing pre-trained models for text summarization: a multi-objective genetic algorithm optimization approach
收藏 引用
Multimedia Tools and Applications 2024年 1-17页
作者: Mohan, G. Bharathi Kumar, R. Prasanna Elakkiya, R. Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India Birla Institute of Technology and Science Dubai345055 United Arab Emirates
Pre-trained language models have significantly advanced text summarization by leveraging extensive pre-training data to enhance performance. Many cutting-edge models undergo an initial pre-training phase on a large co... 详细信息
来源: 评论
Features enhancement of micro-service based cab booking system using block-chain  4th
Features enhancement of micro-service based cab booking syst...
收藏 引用
4th International Conference on Computational Methods in science and Technology, ICCMST 2024
作者: Rohit Singh, Neelaksh Shukla, Riya Singh, Ashutosh Kumar Department of Computer Science and Engineering Institute of Engineering and Rural Technology Prayagraj India Department of Computer Science and Engineering United College of Engineering and Research Prayagraj India
Cab booking services help people order taxis. Existing cab booking services use client server-based architecture. The paper gives a study of the architecture and workings of the Uber cab booking website (Dissanayake, ... 详细信息
来源: 评论
Optimized Image Dehazing using Dark Channel Prior with Minimum Fusion and Improved Atmospheric Light Handling
收藏 引用
IEEE Access 2025年 13卷 100720-100730页
作者: Hussain, Ahmad Iqbal, Mansoor Aslam, Sheraz Alahmari, Saad Alkharashi, Abdulwahab University of Wah Department of Computer Science Cantt Wah Pakistan CTL eurocollege Department of Computer Science Limassol 3077 Cyprus Cyprus University of Technology Department of Electrical Engineering Computer Engineering and Informatics Limassol 3036 Cyprus Northern Border University Applied College Department of Computer Science Arar Saudi Arabia Saudi Electronic University College of Computing and Informatics Department of Computer Science Saudi Arabia
Haze-induced image degradation in outdoor scenes, caused by atmospheric scattering and absorption, poses significant challenges for applications such as surveillance, autonomous navigation, and remote sensing. This re... 详细信息
来源: 评论