咨询与建议

限定检索结果

文献类型

  • 284,321 篇 会议
  • 129,247 篇 期刊文献
  • 3,000 册 图书

馆藏范围

  • 416,566 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 245,617 篇 工学
    • 153,445 篇 计算机科学与技术...
    • 124,258 篇 软件工程
    • 55,305 篇 信息与通信工程
    • 36,896 篇 控制科学与工程
    • 32,741 篇 电气工程
    • 31,398 篇 电子科学与技术(可...
    • 26,908 篇 生物工程
    • 21,002 篇 生物医学工程(可授...
    • 18,357 篇 光学工程
    • 17,701 篇 化学工程与技术
    • 17,378 篇 机械工程
    • 16,809 篇 材料科学与工程(可...
    • 14,262 篇 动力工程及工程热...
    • 13,128 篇 仪器科学与技术
    • 11,499 篇 土木工程
    • 11,313 篇 建筑学
    • 9,851 篇 安全科学与工程
    • 9,380 篇 交通运输工程
  • 141,141 篇 理学
    • 67,884 篇 数学
    • 46,323 篇 物理学
    • 31,010 篇 生物学
    • 21,926 篇 统计学(可授理学、...
    • 17,922 篇 化学
    • 15,636 篇 系统科学
  • 59,263 篇 管理学
    • 36,541 篇 管理科学与工程(可...
    • 24,899 篇 图书情报与档案管...
    • 18,216 篇 工商管理
  • 20,036 篇 医学
    • 16,731 篇 临床医学
    • 14,987 篇 基础医学(可授医学...
    • 9,355 篇 药学(可授医学、理...
  • 11,173 篇 法学
  • 7,317 篇 经济学
  • 6,116 篇 农学
  • 4,427 篇 教育学
  • 1,907 篇 文学
  • 927 篇 军事学
  • 557 篇 艺术学
  • 87 篇 哲学
  • 67 篇 历史学

主题

  • 20,005 篇 computer science
  • 8,913 篇 accuracy
  • 8,704 篇 computational mo...
  • 7,931 篇 feature extracti...
  • 7,496 篇 deep learning
  • 7,364 篇 machine learning
  • 6,502 篇 training
  • 5,311 篇 data mining
  • 5,124 篇 computer archite...
  • 5,094 篇 support vector m...
  • 4,986 篇 wireless sensor ...
  • 4,930 篇 predictive model...
  • 4,718 篇 costs
  • 4,606 篇 optimization
  • 4,532 篇 bandwidth
  • 4,484 篇 application soft...
  • 4,410 篇 protocols
  • 4,410 篇 testing
  • 4,386 篇 algorithm design...
  • 4,354 篇 neural networks

机构

  • 1,686 篇 department of co...
  • 1,359 篇 department of co...
  • 1,346 篇 department of el...
  • 1,159 篇 department of el...
  • 1,058 篇 cavendish labora...
  • 970 篇 department of ph...
  • 869 篇 department of co...
  • 845 篇 physikalisches i...
  • 839 篇 oliver lodge lab...
  • 834 篇 university of ch...
  • 820 篇 department of el...
  • 636 篇 department of co...
  • 542 篇 infn sezione di ...
  • 537 篇 department of co...
  • 516 篇 infn laboratori ...
  • 515 篇 infn sezione di ...
  • 510 篇 chitkara univers...
  • 499 篇 horia hulubei na...
  • 497 篇 infn sezione di ...
  • 485 篇 department of co...

作者

  • 258 篇 j. wang
  • 254 篇 s. chen
  • 250 篇 barter w.
  • 237 篇 a. gomes
  • 225 篇 blake t.
  • 222 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 j. m. izen
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 204 篇 bencivenni g.
  • 193 篇 bay a.
  • 192 篇 g. bella
  • 192 篇 c. amelung
  • 191 篇 j. strandberg

语言

  • 398,540 篇 英文
  • 13,417 篇 其他
  • 4,448 篇 中文
  • 272 篇 日文
  • 83 篇 德文
  • 69 篇 法文
  • 35 篇 朝鲜文
  • 17 篇 斯洛文尼亚文
  • 8 篇 西班牙文
  • 8 篇 荷兰文
  • 6 篇 阿拉伯文
  • 5 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Department of Civil Engineering and Computer Science Engineering"
416568 条 记 录,以下是41-50 订阅
排序:
Automated face recognition using deep learning technique and center symmetric multivariant local binary pattern
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 263-281页
作者: Sekhar, J.C. Josephson, P. Joel Chinnasamy, A. Maheswari, M. Sankar, S. Kalangi, Ruth Ramya Department of Computer Science and Engineering NRI Institute of Technology Andhra Pradesh Guntur India Department of Electronics and Communication Engineering Malla Reddy Engineering College Telangana Hyderabad India Department of Data Science and Business Systems School of Computing SRMIST Kattankulathur Chennai India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vijayawada India
Researchers have recently created several deep learning strategies for various tasks, and facial recognition has made remarkable progress in employing these techniques. Face recognition is a noncontact, nonobligatory,... 详细信息
来源: 评论
Genetic algorithm based data controlling method using IoT enabled WSNs
收藏 引用
Soft Computing 2025年 第5期29卷 2465-2482页
作者: Singh, Samayveer Nandan, Aridaman Singh Sikka, Geeta Malik, Aruna Singh, Pradeep Kumar Department of Computer Science and Engineering National Institute of Technology Punjab Jalandhar India Department of Computer Science and Engineering National Institute of Technology Delhi India Department of Computer Science and Engineering Central University of Jammu J&K Jammu India
Internet of Things (IoT) enabled Wireless Sensor Networks (WSNs) is not only constitute an encouraging research domain but also represent a promising industrial trend that permits the development of various IoT-based ... 详细信息
来源: 评论
Strength and friction dependency of the stress Lode angle in true triaxial configurations: A discrete element perspective
收藏 引用
Particuology 2025年 102卷 70-77页
作者: Kodicherla, Shiva Prashanth Kumar Zhu, Minyi Department of Civil Mining and Process Engineering Namibia University of Science and Technology Windhoek Namibia Department of Geotechnical Engineering College of Civil Engineering Tongji University Shanghai China
This article investigates the strength and frictional dependence on the stress Lode angle in drained true triaxial configurations using the discrete element method (DEM). A clump logic based on the multi-sphere (MS) a... 详细信息
来源: 评论
Enhanced Offline Writer Recognition System Employing Blended Multi-Input CNN and Bi-LSTM Model on Diverse Handwritten Texts
International Journal of Mathematical, Engineering and Manag...
收藏 引用
International Journal of Mathematical, engineering and Management sciences 2025年 第4期10卷 1032-1054页
作者: Purohit, Naresh Panwar, Subhash Department of Computer Science & Engineering Government Engineering College Bikaner Rajasthan Bikaner India
Since author’s writing styles are often ambiguous, writer recognition is an appealing research problem for handwritten manuscript investigation. Pattern identification allows for recognizing the author of a handwritt... 详细信息
来源: 评论
Cyber-attack detection based on a deep chaotic invasive weed kernel optimized machine learning classifier in cloud computing
收藏 引用
Soft Computing 2025年 第4期29卷 2015-2030页
作者: Indrasena Reddy, M. Siva Kumar, A.P. Subba Reddy, K. Department of Computer Science and Engineering BVRIT Hyderabad College of Engineering for Women Hyderabad500090 India Department of Computer Science and Engineering Jawaharlal Nehru Technological University Ananthapuramu Andhra Pradesh Ananthapuramu India Department of Computer Science and Engineering Rajeev Gandhi Memorial College of Engineering and Technology Andhra Pradesh Nandyala India
Nowadays, Cloud Computing has attracted a lot of interest from both individual users and organization. However, cloud computing applications face certain security issues, such as data integrity, user privacy, and serv... 详细信息
来源: 评论
Identification of Human Activity from Video Streaming Smartphone Data Using Intensified VGG16
收藏 引用
International Journal of engineering, Transactions B: Applications 2025年 第6期38卷 1340-1352页
作者: Yadav, R.K. Daniel, A. Semwal, V.B. Department of Computer Science and Engineering Amity University Gwalior India Data Science and Engineering Manipal University Jaipur India Department of Computer Science and Engineering Maulana Azad National Institute Technology Bhopal India
Human activity recognition (HAR) techniques pick out and interpret human behaviors and actions by analyzing data gathered from various sensor devices. HAR aims to recognize and automatically categorize human activitie... 详细信息
来源: 评论
A survey on cross-user federated recommendation
收藏 引用
science China(Information sciences) 2025年 第4期68卷 7-32页
作者: Enyue YANG Yudi XIONG Wei YUAN Weike PAN Qiang YANG Zhong MING College of Computer Science and Software Engineering Shenzhen University School of Electrical Engineering and Computer Science The University of Queensland WeBank AI Lab WeBank Department of Computer Science and Engineering Hong Kong University of Science and Technology College of Big Data and Internet Shenzhen Technology University Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ)
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri... 详细信息
来源: 评论
Isomorphic Classification of First Degree Cellular Automata
收藏 引用
Complex Systems 2025年 第1期34卷 59-90页
作者: Vikrant, Vicky Bhattacharjee, Kamalika Mukherjee, Sukanya Department of Computer Science and Engineering National Institute of Technology Tamil Nadu Tiruchirappalli620015 India Department of Computer Science and Engineering Institute of Engineering and Management West Bengal Kolkata700091 India
This paper explores the concept of isomorphism in cellular automata (CAs), focusing on identifying and understanding isomorphic relationships between distinct CAs. A cellular automaton (CA) is said to be isomorphic to... 详细信息
来源: 评论
Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第2期106卷 459-473页
作者: Ponnuviji, N.P. Nirmala, G. Kokila, M. L. Sworna Priyadharshini, S. Indra Department of Computer Science and Engineering RMK College of Engineering and Technology Puduvoyal Thiruvallur India Department of Computer Science and Engineering RMD Engineering College Chennai India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nādu Kattankulathur Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c... 详细信息
来源: 评论
FIAC: fine-grained access control mechanism for cloud based IoT framework
收藏 引用
International Journal of Grid and Utility Computing 2025年 第3期16卷 269-278页
作者: Chaudhury, Bhagwat Prasad Dhal, Kasturi Pattnaik, Srikanta Nayak, Ajit Kumar Department of Computer Science and Engineering Silicon Institute of Technology Odisha Bhubaneswar India Department of Computer Science and Engineering S‘O’A University Odisha Bhubaneswar India
Cloud computing technology provides various computing resources on demand to users on pay per use basis. The technology fails in terms of its usage due to confidentiality and privacy issues. Access control mechanisms ... 详细信息
来源: 评论