咨询与建议

限定检索结果

文献类型

  • 286,146 篇 会议
  • 130,632 篇 期刊文献
  • 3,012 册 图书

馆藏范围

  • 419,788 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 247,704 篇 工学
    • 154,615 篇 计算机科学与技术...
    • 124,882 篇 软件工程
    • 55,719 篇 信息与通信工程
    • 37,472 篇 控制科学与工程
    • 33,015 篇 电气工程
    • 31,593 篇 电子科学与技术(可...
    • 27,010 篇 生物工程
    • 21,156 篇 生物医学工程(可授...
    • 18,481 篇 光学工程
    • 17,809 篇 化学工程与技术
    • 17,454 篇 机械工程
    • 17,027 篇 材料科学与工程(可...
    • 14,361 篇 动力工程及工程热...
    • 13,207 篇 仪器科学与技术
    • 11,576 篇 土木工程
    • 11,403 篇 建筑学
    • 9,909 篇 安全科学与工程
    • 9,439 篇 交通运输工程
  • 142,023 篇 理学
    • 68,152 篇 数学
    • 46,621 篇 物理学
    • 31,123 篇 生物学
    • 22,046 篇 统计学(可授理学、...
    • 18,112 篇 化学
    • 15,655 篇 系统科学
  • 59,559 篇 管理学
    • 36,719 篇 管理科学与工程(可...
    • 25,011 篇 图书情报与档案管...
    • 18,319 篇 工商管理
  • 20,269 篇 医学
    • 16,926 篇 临床医学
    • 15,104 篇 基础医学(可授医学...
    • 9,359 篇 药学(可授医学、理...
  • 11,212 篇 法学
  • 7,344 篇 经济学
  • 6,190 篇 农学
  • 4,468 篇 教育学
  • 1,906 篇 文学
  • 928 篇 军事学
  • 561 篇 艺术学
  • 87 篇 哲学
  • 66 篇 历史学

主题

  • 20,012 篇 computer science
  • 9,212 篇 accuracy
  • 8,850 篇 computational mo...
  • 8,047 篇 feature extracti...
  • 7,757 篇 deep learning
  • 7,476 篇 machine learning
  • 6,611 篇 training
  • 5,326 篇 data mining
  • 5,166 篇 computer archite...
  • 5,158 篇 support vector m...
  • 5,042 篇 predictive model...
  • 4,994 篇 wireless sensor ...
  • 4,736 篇 costs
  • 4,666 篇 optimization
  • 4,541 篇 bandwidth
  • 4,484 篇 application soft...
  • 4,446 篇 testing
  • 4,410 篇 protocols
  • 4,386 篇 algorithm design...
  • 4,374 篇 neural networks

机构

  • 1,703 篇 department of co...
  • 1,358 篇 department of co...
  • 1,344 篇 department of el...
  • 1,173 篇 department of el...
  • 1,060 篇 cavendish labora...
  • 972 篇 department of ph...
  • 891 篇 department of co...
  • 844 篇 university of ch...
  • 841 篇 physikalisches i...
  • 839 篇 oliver lodge lab...
  • 824 篇 department of el...
  • 642 篇 department of co...
  • 559 篇 department of co...
  • 539 篇 infn sezione di ...
  • 519 篇 chitkara univers...
  • 514 篇 infn sezione di ...
  • 510 篇 infn laboratori ...
  • 499 篇 horia hulubei na...
  • 489 篇 infn sezione di ...
  • 488 篇 department of co...

作者

  • 257 篇 j. wang
  • 251 篇 s. chen
  • 250 篇 barter w.
  • 236 篇 a. gomes
  • 225 篇 blake t.
  • 220 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 borsato m.
  • 212 篇 j. m. izen
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 202 篇 bencivenni g.
  • 193 篇 bay a.
  • 191 篇 calabrese r.
  • 190 篇 c. amelung
  • 189 篇 g. bella

语言

  • 394,011 篇 英文
  • 21,107 篇 其他
  • 4,546 篇 中文
  • 272 篇 日文
  • 125 篇 德文
  • 106 篇 法文
  • 37 篇 朝鲜文
  • 24 篇 斯洛文尼亚文
  • 13 篇 西班牙文
  • 9 篇 阿拉伯文
  • 9 篇 俄文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 意大利文
  • 3 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Department of Civil Engineering and Computer Science Engineering"
419790 条 记 录,以下是231-240 订阅
排序:
Representing a Model for the Anonymization of Big Data Stream Using In-Memory Processing
收藏 引用
Annals of Data science 2025年 第1期12卷 223-252页
作者: Shamsinejad, Elham Banirostam, Touraj Pedram, Mir Mohsen Rahmani, Amir Masoud Department of Computer Engineering Central Tehran Branch Islamic Azad University Tehran Iran Department of Electrical and Computer Engineering Faculty of Engineering Kharazmi University Tehran Iran Department of Computer Engineering Science and Research Branch Islamic Azad University Tehran Iran
In light of the escalating privacy risks in the big data era, this paper introduces an innovative model for the anonymization of big data streams, leveraging in-memory processing within the Spark framework. The approa... 详细信息
来源: 评论
Privacy-preserving intrusion detection with federated learning: enhancing privacy and efficiency in IoT networks
收藏 引用
International Journal of Machine Learning and Cybernetics 2025年 1-19页
作者: Sharma, Hemant Yadav, Gyan Singh Department of Computer Science and Engineering IIIT Kota Rajasthan Kota India
Intrusion detection systems (IDS) are crucial in the identification of unauthorized activities on a digital network, enabling cybersecurity measures to initiate prevention protocols to protect the security of their ne... 详细信息
来源: 评论
Investigation of the working mechanism of a quasi-floating hierarchically sacrificial seismic system for small and mid-span girder bridges
收藏 引用
Frontiers of Structural and civil engineering 2025年 第2期19卷 180-193页
作者: Guo LI Lei YAN Fenglei HAN Wenbing YU Xisheng LIN Cruz Y.LI Daniel Ziyue PENG Institute of Future Civil Engineering Science and Technology Chongqing Jiaotong UniversityChongqing 400074China State Key Laboratory of Mountain Bridge and Tunnel Engineering Chongqing Jiaotong UniversityChongqing 400074China School of Civil Engineering Chongqing Jiaotong UniversityChongqing 400074China School of Civil Engineering Chongqing Three Gorges UniversityChongqing 404100China Department of Civil and Environmental Engineering The Hong Kong University of Science and TechnologyHong Kong 999077China School of Civil Engineering Chongqing UniversityChongqing 400045China
Seismic resistance systems for small and mid-span girder bridges often lacks hierarchically repeatable earthquake resistance, leading to challenging and time-consuming post-earthquake repairs. This research introduces... 详细信息
来源: 评论
3D brain image based tumor classification using ensemble of reinforcement transfer-based belief neural networks
收藏 引用
Multimedia Tools and Applications 2025年 第14期84卷 14001-14028页
作者: Arora, Shraddha Lamba, Monika Department of Computer Science and Engineering The NorthCap University Haryana Gurugram India
The procedure of segmenting a brain tumour is an essential step in the field of medical image processing. In order to improve the efficacy of disease treatment choices and the likelihood of patient survival, the timel... 详细信息
来源: 评论
Virtual machine workload prediction using deep learning
收藏 引用
International Journal of Cloud Computing 2024年 第6期13卷 549-565页
作者: Abhilash, C.S. Chaithra Garag, Veena Priyanka, H. Department of Computer Science and Engineering PES University Bengaluru India
This paper presents a novel approach to optimise resource allocation in virtualised systems, aiming to maximise performance and minimise operational expenses. Leveraging deep learning models, specifically long-short-t... 详细信息
来源: 评论
Scalable data management in global health crises: Leveraging blockchain technology
IET Blockchain
收藏 引用
IET Blockchain 2024年 第S1期4卷 596-615页
作者: Al Jobaid, Sakib Kabir, Upama Jahan, Mosarrat Department of Computer Science and Engineering University of Dhaka Dhaka Bangladesh
Effective data management is crucial in navigating any health crisis. With proper data management protocols in place, stakeholders can swiftly adapt to evolving circumstances during challenging times. A recent event l... 详细信息
来源: 评论
Wanet: weight and attention network for video summarization
收藏 引用
Discover Artificial Intelligence 2024年 第1期4卷 5页
作者: Basu, Arpan Pramanik, Rishav Sarkar, Ram Department of Computer Science and Engineering Jadavpur University Kolkata India
In this paper, we propose a deep learning-based model, called Weight and Attention Network (WANet), for video summarization. The network comprises a simple multi-head attention mechanism, followed by a feed-forward ne... 详细信息
来源: 评论
A Color Image Encryption Scheme Based on Singular Values and Chaos
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 965-999页
作者: Adnan Malik Muhammad Ali Faisal S.Alsubaei Nisar Ahmed Harish Kumar Electrical Engineering Department University of Engineering and TechnologyLahore54000Pakistan Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21959Saudi Arabia Computer Engineering Department University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ... 详细信息
来源: 评论
Adversarial attacks and defenses for digital communication signals identification
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 756-764页
作者: Qiao Tian Sicheng Zhang Shiwen Mao Yun Lin College of Computer Science and Technology Harbin Engineering UniversityHarbin150001China College of Information and Communication Engineering Harbin Engineering UniversityHarbin150000China Department of Electrical and Computer Engineering Auburn UniversityAuburnAL36849USA
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi... 详细信息
来源: 评论
Emotion mining for early suicidal threat detection on both social media and suicide notes using context dynamic masking-based transformer with deep learning
收藏 引用
Multimedia Tools and Applications 2025年 第13期84卷 11729-11752页
作者: Kodati, Dheeraj Tene, Ramakrishnudu Department of Computer Science and Engineering National Institute of Technology Warangal India
Suicide represents a poignant societal issue deeply entwined with mental well-being. While existing research primarily focuses on identifying suicide-related texts, there is a gap in the advanced detection of mental h... 详细信息
来源: 评论