咨询与建议

限定检索结果

文献类型

  • 113,836 篇 会议
  • 52,630 篇 期刊文献
  • 1,508 册 图书

馆藏范围

  • 167,974 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98,917 篇 工学
    • 65,837 篇 计算机科学与技术...
    • 53,180 篇 软件工程
    • 25,490 篇 信息与通信工程
    • 16,485 篇 控制科学与工程
    • 14,558 篇 电气工程
    • 13,860 篇 电子科学与技术(可...
    • 11,815 篇 生物工程
    • 9,404 篇 生物医学工程(可授...
    • 8,394 篇 光学工程
    • 6,951 篇 机械工程
    • 5,963 篇 化学工程与技术
    • 5,857 篇 动力工程及工程热...
    • 5,618 篇 仪器科学与技术
    • 4,986 篇 材料科学与工程(可...
    • 4,535 篇 网络空间安全
    • 4,167 篇 安全科学与工程
  • 56,808 篇 理学
    • 27,083 篇 数学
    • 19,484 篇 物理学
    • 13,405 篇 生物学
    • 8,823 篇 统计学(可授理学、...
    • 6,446 篇 化学
    • 6,325 篇 系统科学
  • 25,913 篇 管理学
    • 16,141 篇 管理科学与工程(可...
    • 10,802 篇 图书情报与档案管...
    • 7,579 篇 工商管理
  • 9,392 篇 医学
    • 7,812 篇 临床医学
    • 7,050 篇 基础医学(可授医学...
    • 4,364 篇 药学(可授医学、理...
    • 4,080 篇 公共卫生与预防医...
  • 4,903 篇 法学
    • 3,991 篇 社会学
  • 3,020 篇 经济学
  • 2,435 篇 农学
  • 1,600 篇 教育学
  • 867 篇 文学
  • 360 篇 军事学
  • 224 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,208 篇 computer science
  • 4,974 篇 accuracy
  • 4,270 篇 deep learning
  • 3,962 篇 feature extracti...
  • 3,618 篇 machine learning
  • 3,540 篇 computational mo...
  • 3,123 篇 training
  • 2,519 篇 support vector m...
  • 2,411 篇 convolutional ne...
  • 2,370 篇 internet of thin...
  • 2,308 篇 real-time system...
  • 2,305 篇 predictive model...
  • 2,145 篇 optimization
  • 1,973 篇 artificial intel...
  • 1,906 篇 data mining
  • 1,901 篇 wireless sensor ...
  • 1,691 篇 neural networks
  • 1,613 篇 computer archite...
  • 1,588 篇 security
  • 1,547 篇 data models

机构

  • 1,082 篇 cavendish labora...
  • 1,003 篇 department of ph...
  • 947 篇 physikalisches i...
  • 934 篇 oliver lodge lab...
  • 926 篇 department of co...
  • 842 篇 department of el...
  • 741 篇 university of ch...
  • 679 篇 department of el...
  • 675 篇 department of co...
  • 591 篇 infn sezione di ...
  • 581 篇 infn laboratori ...
  • 570 篇 infn sezione di ...
  • 558 篇 chitkara univers...
  • 544 篇 infn sezione di ...
  • 537 篇 school of physic...
  • 536 篇 horia hulubei na...
  • 527 篇 fakultät physik ...
  • 519 篇 department of ph...
  • 518 篇 school of physic...
  • 512 篇 h.h. wills physi...

作者

  • 252 篇 a. gomes
  • 250 篇 barter w.
  • 242 篇 s. chen
  • 241 篇 c. alexa
  • 239 篇 j. wang
  • 238 篇 j. m. izen
  • 232 篇 g. bella
  • 231 篇 j. strandberg
  • 231 篇 c. amelung
  • 229 篇 d. calvet
  • 227 篇 blake t.
  • 224 篇 beiter a.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 213 篇 brundu d.
  • 210 篇 g. spigo

语言

  • 156,020 篇 英文
  • 10,140 篇 其他
  • 1,863 篇 中文
  • 127 篇 日文
  • 20 篇 朝鲜文
  • 19 篇 法文
  • 18 篇 德文
  • 16 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 意大利文
  • 2 篇 土耳其文
  • 1 篇 捷克文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Engineering Science and Technology"
167974 条 记 录,以下是821-830 订阅
排序:
Cooperative Channel and Optimized Route Selection in Adhoc Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第5期36卷 1547-1560页
作者: D.Manohari M.S.Kavitha K.Periyakaruppan B.Chellapraba Department of Computer Science and Engineering St.Joseph’s Institute of TechnologyChennai600119TamilnaduIndia Department of Computer Science&Engineering SNS College of TechnologyCoimbatore641035TamilnaduIndia Department of Computer Science&Engineering SNS College of EngineeringCoimbatore641107TamilnaduIndia Department of Information Technology Karpagam Institute of TechnologyCoimbatore641032TamilnaduIndia
Over the last decade,mobile Adhoc networks have expanded dramati-cally in popularity,and their impact on the communication sector on a variety of levels is *** uses have expanded in lockstep with its *** to its instab... 详细信息
来源: 评论
Enhancing Security in Logic-Locked Systems Through UART-Based Key Authentication
Enhancing Security in Logic-Locked Systems Through UART-Base...
收藏 引用
2025 IEEE International Conference on Computational, Communication and Information technology, ICCCIT 2025
作者: Jaisachin, B. SRM Institute of Science and Technology Department of Computer Science and Engineering Chennai India
The security of integrated circuits is crucial due to their wide range of applications in modern gadgets. An unauthorized access (i.e., third-party access) or a security breach in the logic-locked system can pose a gr... 详细信息
来源: 评论
Trust and QoS-Driven Query Service Provisioning Using Optimization
收藏 引用
Intelligent Automation & Soft Computing 2023年 第5期36卷 1827-1844页
作者: K.Narmatha K.Karthikeyan Department of Computer Science and Engineering SRM Institute of Engineering and TechnologyRamapuramChennaiIndia Department of Information Technology Coimbatore Institute of TechnologyCoimbatoreIndia
The growing advancements with the Internet of Things(IoT)devices handle an enormous amount of data collected from various applications like healthcare,vehicle-based communication,and smart *** research analyses cloud-... 详细信息
来源: 评论
Medical Image Classification Using DL-based Feature Extraction in IoMT
收藏 引用
Recent Patents on engineering 2024年 第9期18卷 e220223213881-e220223213881页
作者: Thimmapuram, Madhuri Salvadi, Shoba Rani Pallati, Narsimhulu Aluvalu, Rajanikanth Department of Information Technology Chaitanya Bharathi Institute of Technology Telangana Hyderabad India Department of Computer Science & Engineering Chaitanya Bharathi Institute of Technology Telangana Hyderabad India
Aim: Recent advances in Artificial Intelligence (AI) and the addition of Deep Learning (DL) have made it possible to analyse both real-time and historical data from the Internet of Things (IoT). Recently, IoT technolo... 详细信息
来源: 评论
A comparative study of recommender systems in different domains  4th
A comparative study of recommender systems in different doma...
收藏 引用
4th International Conference on Computational Methods in science and technology, ICCMST 2024
作者: Rohit Sharma, Aditi Kumar, Aditya Singh, Prabal Singh, Ashutosh Kumar Department of Computer Science and Engineering Institute of Engineering and Rural Technology Prayagraj India
Recommender systems are techniques designed to enhance user experience in various domains. They suggest relevant items to users based on their behavior and preferences (Linyuan et al. Feb 2012). These systems are bein... 详细信息
来源: 评论
Subchannel selection methods for 3GPP C-V2X networks by considering vehicular mobility
收藏 引用
Telecommunication Systems 2024年 第3期86卷 503-518页
作者: Pan, Meng-Shiuan Kao, Shao-Wei Department of Electronic Engineering National Taipei University of Technology Taipei Taiwan Department of Computer Science and Information Engineering Tamkang University New Taipei Taiwan
The 3GPP vehicle-to-everything (C-V2X) technology is a key solution to provide communication services for applications of intelligent transportation systems (ITS). According to the C-V2X specification, vehicles are al... 详细信息
来源: 评论
Physical-layer security for primary users in 5G underlay cognitive radio system via artificial-noise-aided by secondary users
收藏 引用
International Journal of computers and Applications 2024年 第9期46卷 702-714页
作者: Al-Rjoob, Ayat M. Ababnah, Ahmad A. Al-Mistarihi, Mamoun F. Darabkh, Khalid A. Electrical and Communication Engineering Department German-Jordanian University and Technology Amman Jordan Electrical Engineering Department Faculty of Engineering Jordan University of Science and Technology Irbid Jordan Computer Engineering Department School of Engineering The University of Jordan Amman Jordan
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Securi... 详细信息
来源: 评论
Weed Classification Using Particle Swarm Optimization and Deep Learning Models
收藏 引用
computer Systems science & engineering 2023年 第1期44卷 913-927页
作者: M.Manikandakumar P.Karthikeyan Department of Computer Science and Engineering Thiagarajar College of EngineeringTamil NaduIndia Department of Information Technology Thiagarajar College of EngineeringTamil NaduIndia
Weed is a plant that grows along with nearly allfield crops,including rice,wheat,cotton,millets and sugar cane,affecting crop yield and *** and accurate identification of all types of weeds is a challenging task for f... 详细信息
来源: 评论
Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
收藏 引用
Multimedia Tools and Applications 2024年 1-20页
作者: Bouke, Mohamed Aly El Atigh, Hayate Abdullah, Azizol Department of Communication Technology and Network Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang43400 Malaysia Departement of Computer Engineering Faculty of Computer Engineering Bandirma Onyedi Eylul University Balikesir10200 Turkey
The Internet of Medical Things (IoMT) brings advanced patient monitoring and predictive analytics to healthcare but also raises cybersecurity and data privacy issues. This paper introduces a deep-learning model for Io... 详细信息
来源: 评论
3GPP Edge–Fog federation: Transparent 3rd-party authentication and application mobility
收藏 引用
computer Communications 2024年 222卷 220-229页
作者: Ali, Asad Islam, Minhajul Mallick, Tushin Islam, Mohammad Sakibul Sakib, Sadman Shohrab Hossain, Md. Lin, Ying-Dar National Institute of Cyber Security Ministry of Digital Affairs Taiwan Department of Computer Science National Yang Ming Chiao Tung University Hsinchu Taiwan Department of Computer Science and Engineering Bangladesh University of Engineering and Technology Bangladesh
3GPP edge and fog computing paradigms provide computational services to users at low latency. These paradigms alone are not enough to fulfill the users’ requirements completely. Therefore, a federation among these co... 详细信息
来源: 评论