咨询与建议

限定检索结果

文献类型

  • 57,166 篇 会议
  • 26,958 篇 期刊文献
  • 930 册 图书

馆藏范围

  • 85,054 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 51,463 篇 工学
    • 37,171 篇 计算机科学与技术...
    • 29,623 篇 软件工程
    • 14,127 篇 信息与通信工程
    • 8,265 篇 控制科学与工程
    • 6,227 篇 电气工程
    • 5,954 篇 电子科学与技术(可...
    • 5,663 篇 生物工程
    • 4,269 篇 生物医学工程(可授...
    • 3,480 篇 机械工程
    • 3,472 篇 光学工程
    • 2,679 篇 仪器科学与技术
    • 2,451 篇 动力工程及工程热...
    • 2,119 篇 化学工程与技术
    • 2,114 篇 网络空间安全
    • 2,049 篇 安全科学与工程
    • 1,772 篇 交通运输工程
  • 26,766 篇 理学
    • 14,586 篇 数学
    • 7,405 篇 物理学
    • 6,376 篇 生物学
    • 4,513 篇 统计学(可授理学、...
    • 3,177 篇 系统科学
    • 2,353 篇 化学
  • 14,304 篇 管理学
    • 8,788 篇 管理科学与工程(可...
    • 6,063 篇 图书情报与档案管...
    • 4,060 篇 工商管理
  • 4,447 篇 医学
    • 3,740 篇 临床医学
    • 3,215 篇 基础医学(可授医学...
    • 1,919 篇 药学(可授医学、理...
    • 1,890 篇 公共卫生与预防医...
  • 2,415 篇 法学
    • 1,923 篇 社会学
  • 1,465 篇 经济学
  • 1,136 篇 农学
  • 1,090 篇 教育学
  • 441 篇 文学
  • 243 篇 军事学
  • 151 篇 艺术学
  • 12 篇 哲学
  • 7 篇 历史学

主题

  • 4,341 篇 computer science
  • 1,862 篇 feature extracti...
  • 1,794 篇 accuracy
  • 1,764 篇 deep learning
  • 1,629 篇 computational mo...
  • 1,611 篇 machine learning
  • 1,545 篇 data mining
  • 1,259 篇 training
  • 1,139 篇 wireless sensor ...
  • 1,060 篇 support vector m...
  • 1,030 篇 internet of thin...
  • 964 篇 bandwidth
  • 946 篇 artificial intel...
  • 932 篇 optimization
  • 922 篇 protocols
  • 880 篇 computer archite...
  • 865 篇 educational inst...
  • 858 篇 routing
  • 840 篇 application soft...
  • 834 篇 predictive model...

机构

  • 1,462 篇 department of co...
  • 629 篇 department of co...
  • 496 篇 institute of inf...
  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 349 篇 department of co...
  • 275 篇 department of ph...
  • 260 篇 department of ph...
  • 258 篇 faculté des scie...
  • 258 篇 faculty of scien...
  • 220 篇 department of ph...
  • 220 篇 departamento de ...
  • 216 篇 physics division...
  • 216 篇 department of co...
  • 213 篇 department of ph...
  • 206 篇 department of co...
  • 197 篇 department of ph...
  • 195 篇 department of co...
  • 185 篇 department of ph...
  • 162 篇 department for p...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 264 篇 f. siegert
  • 264 篇 a. c. könig
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 260 篇 h. a. gordon
  • 257 篇 h. sakamoto
  • 247 篇 m. rijssenbeek
  • 243 篇 y. tayalati
  • 233 篇 s. jin
  • 229 篇 d. guest
  • 218 篇 g. gaudio
  • 204 篇 chang chin-chen
  • 201 篇 f. pastore

语言

  • 79,811 篇 英文
  • 4,251 篇 其他
  • 993 篇 中文
  • 55 篇 日文
  • 17 篇 德文
  • 11 篇 法文
  • 11 篇 斯洛文尼亚文
  • 4 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 西班牙文
检索条件"机构=Department Computer Science and Information Engineering"
85054 条 记 录,以下是1-10 订阅
排序:
Malicious iOS Apps Detection Through Multi-Criteria Decision-Making Approach
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第1期49卷 207-220页
作者: Bhatt, Arpita Jadhav Sardana, Neetu Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Indonesia
In today’s era, smartphones are used in daily lives because they are ubiquitous and can be customized by installing third-party apps. As a result, the menaces because of these apps, which are potentially risky for u... 详细信息
来源: 评论
Enhanced Acceleration for Generalized Nonconvex Low-Rank Matrix Learning
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 98-113页
作者: Hengmin Zhang Jian Yang Wenli Du Bob Zhang Zhiyuan Zha Bihan Wen School of Electrical and Electronic Engineering Nanyang Technological University School of Computer Science and Engineering Nanjing University of Science and Technology School of Information Science and Engineering East China University of Science and Technology Department of Electrical and Computer Engineering University of Macau
Matrix minimization techniques that employ the nuclear norm have gained recognition for their applicability in tasks like image inpainting, clustering, classification, and reconstruction. However, they come with inher... 详细信息
来源: 评论
Data Hiding Methods Using Voting Strategy and Mapping Table
收藏 引用
Journal of Internet Technology 2024年 第3期25卷 365-377页
作者: Chi, Hengxiao Chang, Chin-Chen Lin, Chia-Chen Department of Information Engineering and Computer Science Feng Chia University Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taiwan
With advancements in technology, the study of data hiding (DH) in images has become more and more important. In this paper, we introduce a novel data hiding scheme that employs a voting strategy to predict pixels base... 详细信息
来源: 评论
Exploration of alzheimer disease using design of experiments
收藏 引用
Multimedia Tools and Applications 2025年 第3期84卷 1079-1101页
作者: Gupta, Pranav Pandey, Kavita Gupta, Sanskar Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Noida India
This study examines the use of experimental designs, specifically full and fractional factorial designs, for predicting Alzheimer’s disease with fewer variables. The full factorial design systematically investigates ... 详细信息
来源: 评论
WebFLex:A Framework for Web Browsers-Based Peer-to-Peer Federated Learning Systems Using WebRTC
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4177-4204页
作者: Mai Alzamel Hamza Ali Rizvi Najwa Altwaijry Isra Al-Turaiki Department of Computer Science College of Computer and Information SciencesKing Saud UniversityRiyadhKingdom of Saudi Arabia Department of Computer Science and Engineering Punjab Engineering CollegeChandigarhIndia
Scalability and information personal privacy are vital for training and deploying large-scale deep learning *** learning trains models on exclusive information by aggregating weights from various devices and taking ad... 详细信息
来源: 评论
Modern Machine Learning Solution for Electricity Consumption Management in Smart Buildings
收藏 引用
IEEE engineering Management Review 2025年 第1期53卷 54-62页
作者: Gautam, Sandeep Kumar Shrivastava, Vinayak Udmale, Sandeep S. Singh, Amit Kumar Singh, Sanjay Kumar Department of Computer Science and Engineering Varanasi221005 India Department of Computer Engineering and Information Technology Mumbai400019 India National Institute of Technology Department of Computer Science and Engineering Patna800005 India
Effective management of electricity consumption (EC) in smart buildings (SBs) is crucial for optimizing operational efficiency, cost savings, and ensuring sustainable resource utilization. Accurate EC prediction enabl... 详细信息
来源: 评论
Local Search-Based Anytime Algorithms for Continuous Distributed Constraint Optimization Problems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 288-290页
作者: Xin Liao Khoi Hoang Xin Luo the College of Computer and Information Science Southwest University the Department of Computer Science and Engineering Washington University in St.Louis IEEE
Dear Editor,The distributed constraint optimization problems(DCOPs) [1]-[3]provide an efficient model for solving the cooperative problems of multi-agent systems, which has been successfully applied to model the real-...
来源: 评论
Enhancing Arabic Cyberbullying Detection with End-to-End Transformer Model
收藏 引用
computer Modeling in engineering & sciences 2024年 第11期141卷 1651-1671页
作者: Mohamed A.Mahdi Suliman Mohamed Fati Mohamed A.G.Hazber Shahanawaj Ahamad Sawsan A.Saad Information and Computer Science Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Information Systems Department College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia Software Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Computer Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online *** tackle this challenge,our study introduces a new ap... 详细信息
来源: 评论
Visual quality-enhanced reversible data hiding scheme based on interpolation and variant Sudoku matrics
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 20219-20247页
作者: Yuan, Longfei Lin, Chia-Chen Chang, Chin-Chen Department of Computer Science National Tsing Hua University Hsinchu Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung Taiwan Department of Information Engineering and Computer Science Feng Chia University Taichung Taiwan
Utilizing interpolation techniques (IT) within reversible data hiding (RDH) algorithms presents the advantage of a substantial embedding capacity. Nevertheless, prevalent algorithms often straightforwardly embed confi... 详细信息
来源: 评论
Anomaly Detection Model of Time Segment Power Usage Behavior Using Unsupervised Learning
收藏 引用
Journal of Internet Technology 2024年 第3期25卷 455-463页
作者: Ho, Wen-Jen Hsieh, Hsin-Yuan Tsai, Chia-Wei Software Technology Institute Institute for Information Industry Taiwan Department of Computer Science and Information Engineering National Taitung University Taiwan Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taiwan
In Taiwan, the current electricity prices for residential users remain relatively low. This results in a diminished incentive for these users to invest in energy-saving improvements. Consequently, devising strategies ... 详细信息
来源: 评论