咨询与建议

限定检索结果

文献类型

  • 112,998 篇 会议
  • 52,299 篇 期刊文献
  • 1,504 册 图书

馆藏范围

  • 166,801 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98,022 篇 工学
    • 65,275 篇 计算机科学与技术...
    • 52,866 篇 软件工程
    • 25,259 篇 信息与通信工程
    • 16,192 篇 控制科学与工程
    • 14,436 篇 电气工程
    • 13,755 篇 电子科学与技术(可...
    • 11,775 篇 生物工程
    • 9,332 篇 生物医学工程(可授...
    • 8,323 篇 光学工程
    • 6,912 篇 机械工程
    • 5,930 篇 化学工程与技术
    • 5,824 篇 动力工程及工程热...
    • 5,579 篇 仪器科学与技术
    • 4,899 篇 材料科学与工程(可...
    • 4,466 篇 网络空间安全
    • 4,142 篇 安全科学与工程
  • 56,455 篇 理学
    • 26,957 篇 数学
    • 19,345 篇 物理学
    • 13,367 篇 生物学
    • 8,774 篇 统计学(可授理学、...
    • 6,380 篇 化学
    • 6,315 篇 系统科学
  • 25,767 篇 管理学
    • 16,052 篇 管理科学与工程(可...
    • 10,749 篇 图书情报与档案管...
    • 7,522 篇 工商管理
  • 9,290 篇 医学
    • 7,725 篇 临床医学
    • 6,987 篇 基础医学(可授医学...
    • 4,364 篇 药学(可授医学、理...
    • 4,013 篇 公共卫生与预防医...
  • 4,886 篇 法学
    • 3,978 篇 社会学
  • 3,004 篇 经济学
  • 2,412 篇 农学
  • 1,585 篇 教育学
  • 868 篇 文学
  • 360 篇 军事学
  • 223 篇 艺术学
  • 15 篇 哲学
  • 12 篇 历史学

主题

  • 5,206 篇 computer science
  • 4,840 篇 accuracy
  • 4,154 篇 deep learning
  • 3,920 篇 feature extracti...
  • 3,592 篇 machine learning
  • 3,475 篇 computational mo...
  • 3,089 篇 training
  • 2,495 篇 support vector m...
  • 2,369 篇 internet of thin...
  • 2,339 篇 convolutional ne...
  • 2,251 篇 predictive model...
  • 2,241 篇 real-time system...
  • 2,132 篇 optimization
  • 1,948 篇 artificial intel...
  • 1,897 篇 wireless sensor ...
  • 1,893 篇 data mining
  • 1,682 篇 neural networks
  • 1,582 篇 computer archite...
  • 1,559 篇 security
  • 1,508 篇 data models

机构

  • 1,080 篇 cavendish labora...
  • 1,002 篇 department of ph...
  • 947 篇 physikalisches i...
  • 932 篇 oliver lodge lab...
  • 918 篇 department of co...
  • 839 篇 department of el...
  • 737 篇 university of ch...
  • 675 篇 department of el...
  • 673 篇 department of co...
  • 593 篇 infn sezione di ...
  • 584 篇 infn laboratori ...
  • 574 篇 infn sezione di ...
  • 552 篇 chitkara univers...
  • 546 篇 infn sezione di ...
  • 536 篇 horia hulubei na...
  • 533 篇 school of physic...
  • 523 篇 fakultät physik ...
  • 521 篇 department of ph...
  • 520 篇 school of physic...
  • 514 篇 imperial college...

作者

  • 254 篇 a. gomes
  • 250 篇 barter w.
  • 244 篇 s. chen
  • 241 篇 c. alexa
  • 239 篇 j. wang
  • 238 篇 j. m. izen
  • 231 篇 g. bella
  • 231 篇 j. strandberg
  • 231 篇 c. amelung
  • 229 篇 d. calvet
  • 227 篇 blake t.
  • 225 篇 beiter a.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 213 篇 brundu d.
  • 210 篇 g. spigo

语言

  • 158,744 篇 英文
  • 6,276 篇 其他
  • 1,810 篇 中文
  • 127 篇 日文
  • 20 篇 法文
  • 20 篇 朝鲜文
  • 18 篇 德文
  • 13 篇 斯洛文尼亚文
  • 6 篇 荷兰文
  • 2 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
检索条件"机构=Department of Computer Engineering Science and Technology"
166801 条 记 录,以下是21-30 订阅
排序:
DDSS: Driver decision support system based on the driver behaviour prediction to avoid accidents in intelligent transport system
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 1-13页
作者: S, Balasubramani D, John Aravindhar Renjith, P.N. Ramesh, K. Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vaddeswaram India Department of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India Department of Computer Science and Engineering Sri Krishna College of Engineering and Technology Coimbatore India
Accidents caused by drivers who exhibit unusual behavior are putting road safety at ever-greater risk. When one or more vehicle nodes behave in this way, it can put other nodes in danger and result in potentially cata... 详细信息
来源: 评论
AI-based small arms firing skill evaluation system in the military domain
收藏 引用
Defence technology(防务技术) 2023年 第11期29卷 164-180页
作者: Rezoanul Hafiz Chandan Nusrat Sharmin Muhaimin Bin Munir Abdur Razzak Tanvir Ahamad Naim Tasneem Mubashshira Mokhlesur Rahman Department of Computer Science and Engineering Military Institute of Science and TechnologyDhakaBangladesh
Evaluation system of small arms firing has an important effect in the context of military domain. A partially automated evaluation system has been conducted and performed at the ground level. Automation of such system... 详细信息
来源: 评论
Genetic algorithm based data controlling method using IoT enabled WSNs
收藏 引用
Soft Computing 2025年 第5期29卷 2465-2482页
作者: Singh, Samayveer Nandan, Aridaman Singh Sikka, Geeta Malik, Aruna Singh, Pradeep Kumar Department of Computer Science and Engineering National Institute of Technology Punjab Jalandhar India Department of Computer Science and Engineering National Institute of Technology Delhi India Department of Computer Science and Engineering Central University of Jammu J&K Jammu India
Internet of Things (IoT) enabled Wireless Sensor Networks (WSNs) is not only constitute an encouraging research domain but also represent a promising industrial trend that permits the development of various IoT-based ... 详细信息
来源: 评论
An Integrated Framework with Enhanced Primitives for Post-Quantum Cryptography: HEDT and ECSIDH for Cloud Data Security and Key Exchange
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第11期49卷 165-176页
作者: Ilias, Shaik Mohammad Sharmila, V. Ceronmani Durga, V. Sathya Dept. of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India Department of Information Technology Hindustan Institute of Technology and Science Chennai India Department of Computer Science&Engineering Hindustan Institute of Technology and Science Chennai India
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must... 详细信息
来源: 评论
Towards optimal path planning for sustainable data collection in real-time wireless sensor networks
收藏 引用
International Journal of computers and Applications 2024年 第5期46卷 301-309页
作者: Ranjan, Rajeev Kumar, Prabhat Department of Computer Science and Engineering National Institute of Technology Patna India Department of Computer Science and Engineering Bakhtiyarpur College of Engineering Bakhtiyarpur India
Data collection using mobile sink(s) has proven to reduce energy consumption and enhance the network lifetime of wireless sensor networks. Generally speaking, a mobile sink (MS) traverses the network region, sojournin... 详细信息
来源: 评论
Optimizing medical image analysis through MViTX on multiple datasets with explainable AI
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8479-8507页
作者: Sheakh, Md. Alif Tahosin, Mst. Sazia Alam, Mohammad Jahangir Begum, Mahbuba Department of Computer Science and Engineering Daffodil International University Dhaka Bangladesh Department of Computer Science and Engineering Mawlana Bhashani Science and Technology University Tangail Bangladesh
Cancer remains a leading cause of mortality worldwide, with early detection and accurate diagnosis critical to improving patient outcomes. While computer-aided diagnosis systems powered by deep learning have shown con... 详细信息
来源: 评论
Transformer-Based Person Re-Identification: A Comprehensive Review
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第7期9卷 1-19页
作者: Sarker, Prodip Kumar Zhao, Qingjie Uddin, Md. Kamal School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science and Telecommunication Engineering Noakhali Science and Technology University Bangladesh
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc... 详细信息
来源: 评论
Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第2期106卷 459-473页
作者: Ponnuviji, N.P. Nirmala, G. Kokila, M. L. Sworna Priyadharshini, S. Indra Department of Computer Science and Engineering RMK College of Engineering and Technology Puduvoyal Thiruvallur India Department of Computer Science and Engineering RMD Engineering College Chennai India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nādu Kattankulathur Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c... 详细信息
来源: 评论
A survey on cross-user federated recommendation
收藏 引用
science China(Information sciences) 2025年 第4期68卷 7-32页
作者: Enyue YANG Yudi XIONG Wei YUAN Weike PAN Qiang YANG Zhong MING College of Computer Science and Software Engineering Shenzhen University School of Electrical Engineering and Computer Science The University of Queensland WeBank AI Lab WeBank Department of Computer Science and Engineering Hong Kong University of Science and Technology College of Big Data and Internet Shenzhen Technology University Guangdong Laboratory of Artificial Intelligence and Digital Economy (SZ)
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri... 详细信息
来源: 评论
Lightweight and privacy-preserving device-to-device authentication to enable secure transitive communication in IoT-based smart healthcare systems
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第9期15卷 3331-3345页
作者: Das, Sangjukta Singh, Maheshwari Prasad Namasudra, Suyel Department of Computer Science and Engineering National Institute of Technology Patna Bihar India Department of Computer Science and Engineering National Institute of Technology Agartala Tripura India
Internet of Things (IoT) devices are often directly authenticated by the gateways within the network. In complex and large systems, IoT devices may be connected to the gateway through another device in the network. In... 详细信息
来源: 评论