咨询与建议

限定检索结果

文献类型

  • 42,265 篇 会议
  • 20,833 篇 期刊文献
  • 695 册 图书

馆藏范围

  • 63,793 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 38,727 篇 工学
    • 27,563 篇 计算机科学与技术...
    • 22,097 篇 软件工程
    • 11,054 篇 信息与通信工程
    • 6,592 篇 控制科学与工程
    • 4,996 篇 电气工程
    • 4,761 篇 电子科学与技术(可...
    • 4,560 篇 生物工程
    • 3,488 篇 生物医学工程(可授...
    • 2,798 篇 光学工程
    • 2,770 篇 机械工程
    • 2,193 篇 仪器科学与技术
    • 2,100 篇 动力工程及工程热...
    • 1,916 篇 网络空间安全
    • 1,816 篇 安全科学与工程
    • 1,739 篇 化学工程与技术
    • 1,529 篇 交通运输工程
  • 20,611 篇 理学
    • 10,786 篇 数学
    • 5,963 篇 物理学
    • 5,140 篇 生物学
    • 3,510 篇 统计学(可授理学、...
    • 2,513 篇 系统科学
    • 1,927 篇 化学
  • 10,981 篇 管理学
    • 6,977 篇 管理科学与工程(可...
    • 4,448 篇 图书情报与档案管...
    • 3,156 篇 工商管理
  • 3,725 篇 医学
    • 3,101 篇 临床医学
    • 2,733 篇 基础医学(可授医学...
    • 1,669 篇 公共卫生与预防医...
    • 1,648 篇 药学(可授医学、理...
  • 1,899 篇 法学
    • 1,509 篇 社会学
  • 1,172 篇 经济学
  • 925 篇 农学
  • 756 篇 教育学
  • 353 篇 文学
  • 176 篇 军事学
  • 117 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 1,637 篇 accuracy
  • 1,604 篇 computer science
  • 1,561 篇 deep learning
  • 1,472 篇 feature extracti...
  • 1,425 篇 machine learning
  • 1,232 篇 computational mo...
  • 1,056 篇 training
  • 974 篇 internet of thin...
  • 866 篇 information tech...
  • 860 篇 data mining
  • 839 篇 artificial intel...
  • 830 篇 support vector m...
  • 770 篇 optimization
  • 760 篇 wireless sensor ...
  • 743 篇 predictive model...
  • 686 篇 real-time system...
  • 643 篇 security
  • 631 篇 convolutional ne...
  • 593 篇 protocols
  • 586 篇 cloud computing

机构

  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 280 篇 faculty of scien...
  • 275 篇 department of ph...
  • 264 篇 department of ph...
  • 262 篇 department of co...
  • 261 篇 departamento de ...
  • 259 篇 faculté des scie...
  • 241 篇 department of ph...
  • 225 篇 department for p...
  • 221 篇 department of ph...
  • 219 篇 department of ph...
  • 216 篇 physics division...
  • 216 篇 department of ph...
  • 197 篇 department of ph...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 162 篇 department of co...
  • 157 篇 department of co...
  • 154 篇 institute of phy...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 260 篇 m. rijssenbeek
  • 254 篇 s. jin
  • 252 篇 g. gaudio
  • 244 篇 d. guest
  • 243 篇 y. tayalati
  • 217 篇 s. mohapatra
  • 207 篇 f. marroquim

语言

  • 60,716 篇 英文
  • 2,276 篇 其他
  • 797 篇 中文
  • 51 篇 日文
  • 11 篇 斯洛文尼亚文
  • 9 篇 法文
  • 8 篇 德文
  • 4 篇 朝鲜文
  • 3 篇 荷兰文
  • 2 篇 土耳其文
  • 1 篇 俄文
检索条件"机构=Department of Computer Engineering and Information Technology"
63793 条 记 录,以下是101-110 订阅
排序:
An ensemble approach for classification of diabetic retinopathy in fundus image
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10567-10586页
作者: Prakash, J. Vinoth kumar, B. Department of Computer Science & Engineering PSG College of Technology Tamil Nadu Coimbatore India Department of Information Technology PSG College of Technology Tamil Nadu Coimbatore India
Diabetes-oriented diabetic retinopathy impacts the blood vessels in the region of the retina to enlarge and leak blood and other fluids. In most cases, diabetic retinopathy affects both eyes. If left untreated, it wou... 详细信息
来源: 评论
IensNet: A novel and efficient approach for iris spoof detection via ensemble of deep models
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Sharma, Deepika Selwal, Arvind School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Department of Computer Science and Information Technology Central University of Jammu Samba India
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ... 详细信息
来源: 评论
Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation
收藏 引用
computer Systems Science & engineering 2023年 第3期44卷 2293-2307页
作者: B.Murugeshwari S.Rajalakshmi K.Sudharson Department of Computer Science and Engineering Velammal Engineering CollegeChennai600066India Department of Information Technology Velammal Institute of TechnologyChennai601204India
Imagine numerous clients,each with personal data;individual inputs are severely corrupt,and a server only concerns the collective,statistically essential facets of this *** several data mining methods,privacy has beco... 详细信息
来源: 评论
Deep Learning Enabled Social Media Recommendation Based on User Comments
收藏 引用
computer Systems Science & engineering 2023年 第2期44卷 1691-1702页
作者: K.Saraswathi V.Mohanraj Y.Suresh J.Senthilkumar Department of Computer Science and Engineering Government College of EngineeringSalem636011India Department of Information Technology Sona College of TechnologySalem636005India
Nowadays,review systems have been developed with social media Recommendation systems(RS).Although research on RS social media is increas-ing year by year,the comprehensive literature review and classification of this R... 详细信息
来源: 评论
Constructing multi-modal emotion recognition model based on convolutional neural network
收藏 引用
Multimedia Tools and Applications 2024年 1-26页
作者: Kuo, Jong-Yih Hsieh, Ti-Feng Lin, Ta-Yu Department of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan
As society advances, an increasing number of individuals spend significant time interacting with computers daily. To enhance the human-computer interaction experience, it has become crucial to augment the computer’s ... 详细信息
来源: 评论
Reliable Task Offloading for 6G-Based IoT Applications
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2255-2274页
作者: Usman Mahmood Malik Muhammad Awais Javed Ahmad Naseem Alvi Mohammed Alkhathami Department of Computer Software Engineering National University of Science and Technology(NUST)Islamabad44000Pakistan Department of Electrical and Computer Engineering COMSATS University IslamabadIslamabad45550Pakistan Information Systems Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ... 详细信息
来源: 评论
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5035-5048页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis... 详细信息
来源: 评论
A review on spreading and Forensics Analysis of Windows-Based ransomware
收藏 引用
Annals of Data Science 2024年 第5期11卷 1503-1524页
作者: Chayal, Narendrakumar Mangilal Saxena, Ankur Khan, Rijwan Department of Computer Science and Technology Faculty of Engineering and Technology Department of Computer Engineering Sankalchand Patel University Visnagar India Department of Computer Science Indus Institute of Information and Communication Technology Dean-ICT & ampDirector-IIICT Indus University Gujarat Ahmedabad India Department of Computer Science and Engineering ABES Institute of Technology Ghaziabad Affiliated to AKTU Lucknow India
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals... 详细信息
来源: 评论
Sensitive information leakage analysis of database code by abstract interpretation
收藏 引用
International Journal of Security and Networks 2023年 第2期18卷 91-105页
作者: Jana, Angshuman Department of Computer Science and Engineering Indian Institute of Information Technology Guwahati India
An information system stores outside data in the backend database to process them efficiently and protects sensitive data from illegitimate flow or unauthorised users. However, most information systems are made in suc... 详细信息
来源: 评论
Secure probe-based latency measurement using NTP and PTP for optimized gateway placement in LoRaWAN
收藏 引用
International Journal of information technology (Singapore) 2025年 1-10页
作者: Bhatnagar, Kumar Vaibhav Kushwah, Rashmi Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida 201304 India
The paper presents a novel framework for optimizing LoRaWAN gateway placement to enhance network performance and reliability. By integrating Network Time Protocol (NTP) for global synchronization and Precision Time Pr... 详细信息
来源: 评论