咨询与建议

限定检索结果

文献类型

  • 42,582 篇 会议
  • 20,911 篇 期刊文献
  • 702 册 图书

馆藏范围

  • 64,195 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 38,997 篇 工学
    • 27,664 篇 计算机科学与技术...
    • 22,163 篇 软件工程
    • 11,082 篇 信息与通信工程
    • 6,642 篇 控制科学与工程
    • 4,981 篇 电气工程
    • 4,783 篇 电子科学与技术(可...
    • 4,571 篇 生物工程
    • 3,499 篇 生物医学工程(可授...
    • 2,783 篇 机械工程
    • 2,775 篇 光学工程
    • 2,193 篇 仪器科学与技术
    • 2,092 篇 动力工程及工程热...
    • 1,942 篇 网络空间安全
    • 1,820 篇 安全科学与工程
    • 1,744 篇 化学工程与技术
    • 1,531 篇 交通运输工程
  • 20,633 篇 理学
    • 10,827 篇 数学
    • 5,971 篇 物理学
    • 5,139 篇 生物学
    • 3,548 篇 统计学(可授理学、...
    • 2,507 篇 系统科学
    • 1,932 篇 化学
  • 11,000 篇 管理学
    • 6,996 篇 管理科学与工程(可...
    • 4,452 篇 图书情报与档案管...
    • 3,174 篇 工商管理
  • 3,724 篇 医学
    • 3,100 篇 临床医学
    • 2,736 篇 基础医学(可授医学...
    • 1,686 篇 公共卫生与预防医...
    • 1,647 篇 药学(可授医学、理...
  • 1,905 篇 法学
    • 1,516 篇 社会学
  • 1,175 篇 经济学
  • 921 篇 农学
  • 767 篇 教育学
  • 349 篇 文学
  • 175 篇 军事学
  • 117 篇 艺术学
  • 4 篇 哲学
  • 2 篇 历史学

主题

  • 1,691 篇 accuracy
  • 1,603 篇 computer science
  • 1,600 篇 deep learning
  • 1,487 篇 feature extracti...
  • 1,429 篇 machine learning
  • 1,253 篇 computational mo...
  • 1,056 篇 training
  • 991 篇 internet of thin...
  • 869 篇 information tech...
  • 867 篇 data mining
  • 857 篇 artificial intel...
  • 843 篇 support vector m...
  • 784 篇 optimization
  • 767 篇 wireless sensor ...
  • 766 篇 predictive model...
  • 718 篇 real-time system...
  • 649 篇 security
  • 646 篇 convolutional ne...
  • 597 篇 protocols
  • 595 篇 cloud computing

机构

  • 475 篇 maharishi school...
  • 353 篇 department of co...
  • 280 篇 faculty of scien...
  • 276 篇 department of ph...
  • 267 篇 department of ph...
  • 265 篇 departamento de ...
  • 260 篇 department of co...
  • 259 篇 faculté des scie...
  • 244 篇 department of ph...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 221 篇 department for p...
  • 218 篇 physics division...
  • 217 篇 department of ph...
  • 199 篇 department of ph...
  • 164 篇 maharishi school...
  • 160 篇 department of co...
  • 160 篇 department of co...
  • 155 篇 department of co...
  • 154 篇 institute of phy...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 266 篇 f. siegert
  • 266 篇 a. c. könig
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 262 篇 m. rijssenbeek
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 255 篇 s. jin
  • 254 篇 g. gaudio
  • 246 篇 d. guest
  • 244 篇 y. tayalati
  • 221 篇 s. mohapatra
  • 209 篇 f. marroquim

语言

  • 55,699 篇 英文
  • 7,694 篇 其他
  • 839 篇 中文
  • 51 篇 日文
  • 19 篇 斯洛文尼亚文
  • 16 篇 德文
  • 15 篇 法文
  • 4 篇 朝鲜文
  • 4 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 荷兰文
检索条件"机构=Department of Computer Engineering Information Technology"
64195 条 记 录,以下是111-120 订阅
排序:
Deep Learning Enabled Social Media Recommendation Based on User Comments
收藏 引用
computer Systems Science & engineering 2023年 第2期44卷 1691-1702页
作者: K.Saraswathi V.Mohanraj Y.Suresh J.Senthilkumar Department of Computer Science and Engineering Government College of EngineeringSalem636011India Department of Information Technology Sona College of TechnologySalem636005India
Nowadays,review systems have been developed with social media Recommendation systems(RS).Although research on RS social media is increas-ing year by year,the comprehensive literature review and classification of this R... 详细信息
来源: 评论
Deep Learning-Based CNN Multi-Modal Camera Model Identification for Video Source Identification
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2023年 第3期47卷 417-430页
作者: Singh, Surjeet Sehgal, Vivek Kumar Department of Computer Science and Engineering and Information Technology Jaypee University of Information Technology Solan Himachal Pradesh Waknaghat India
Here is a high demand for multimedia forensics analysts to locate the original camera of photographs and videos that are being taken nowadays. There has been considerable progress in the technology of identifying the ... 详细信息
来源: 评论
Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation
收藏 引用
computer Systems Science & engineering 2023年 第3期44卷 2293-2307页
作者: B.Murugeshwari S.Rajalakshmi K.Sudharson Department of Computer Science and Engineering Velammal Engineering CollegeChennai600066India Department of Information Technology Velammal Institute of TechnologyChennai601204India
Imagine numerous clients,each with personal data;individual inputs are severely corrupt,and a server only concerns the collective,statistically essential facets of this *** several data mining methods,privacy has beco... 详细信息
来源: 评论
Constructing multi-modal emotion recognition model based on convolutional neural network
收藏 引用
Multimedia Tools and Applications 2024年 1-26页
作者: Kuo, Jong-Yih Hsieh, Ti-Feng Lin, Ta-Yu Department of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan
As society advances, an increasing number of individuals spend significant time interacting with computers daily. To enhance the human-computer interaction experience, it has become crucial to augment the computer’s ... 详细信息
来源: 评论
Reliable Task Offloading for 6G-Based IoT Applications
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2255-2274页
作者: Usman Mahmood Malik Muhammad Awais Javed Ahmad Naseem Alvi Mohammed Alkhathami Department of Computer Software Engineering National University of Science and Technology(NUST)Islamabad44000Pakistan Department of Electrical and Computer Engineering COMSATS University IslamabadIslamabad45550Pakistan Information Systems Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ... 详细信息
来源: 评论
Deep learning intelligence for influencer-based topological classification for online social networks
收藏 引用
International Journal of Innovative Computing and Applications 2023年 第4期14卷 211-219页
作者: Jain, Somya Sinha, Adwitiya Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology 62 Uttar Pradesh Noida India
Social network analysis provides quantifiable methods and topological metrics to examine the networked structure for several interdisciplinary applications. In our research, a social network of GitHub community is con... 详细信息
来源: 评论
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5035-5048页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis... 详细信息
来源: 评论
A review on spreading and Forensics Analysis of Windows-Based ransomware
收藏 引用
Annals of Data Science 2024年 第5期11卷 1503-1524页
作者: Chayal, Narendrakumar Mangilal Saxena, Ankur Khan, Rijwan Department of Computer Science and Technology Faculty of Engineering and Technology Department of Computer Engineering Sankalchand Patel University Visnagar India Department of Computer Science Indus Institute of Information and Communication Technology Dean-ICT & ampDirector-IIICT Indus University Gujarat Ahmedabad India Department of Computer Science and Engineering ABES Institute of Technology Ghaziabad Affiliated to AKTU Lucknow India
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals... 详细信息
来源: 评论
Sensitive information leakage analysis of database code by abstract interpretation
收藏 引用
International Journal of Security and Networks 2023年 第2期18卷 91-105页
作者: Jana, Angshuman Department of Computer Science and Engineering Indian Institute of Information Technology Guwahati India
An information system stores outside data in the backend database to process them efficiently and protects sensitive data from illegitimate flow or unauthorised users. However, most information systems are made in suc... 详细信息
来源: 评论
An Adaptive Framework for Classification and Detection of Android Malware
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第21期18卷 59-73页
作者: Al Sharah, Ashraf Alrub, Yousef Abu Owida, Hamza Abu Elsoud, Esraa Abu Alshdaifat, Nawaf Khtatnaha, Hamzah Department of Electrical Engineering College of Engineering Technology Al-Balqa Applied University Amman Jordan Department of Computer Information Systems Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Medical Engineering Faculty of Engineering Al-Ahliyya Amman University Amman Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa Jordan Faculty of Information Technology Applied Science Private University Amman Jordan
The hardware and software of a computer are controlled by its operating system (OS), which performs essential tasks such as input and output processing, file and memory management, and the management of peripheral dev... 详细信息
来源: 评论