咨询与建议

限定检索结果

文献类型

  • 272,371 篇 会议
  • 112,271 篇 期刊文献
  • 2,764 册 图书

馆藏范围

  • 387,405 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 225,162 篇 工学
    • 149,099 篇 计算机科学与技术...
    • 120,714 篇 软件工程
    • 54,242 篇 信息与通信工程
    • 35,457 篇 控制科学与工程
    • 32,324 篇 电气工程
    • 30,860 篇 电子科学与技术(可...
    • 25,971 篇 生物工程
    • 20,409 篇 生物医学工程(可授...
    • 17,556 篇 光学工程
    • 15,376 篇 机械工程
    • 13,024 篇 化学工程与技术
    • 12,163 篇 仪器科学与技术
    • 12,116 篇 动力工程及工程热...
    • 11,548 篇 材料科学与工程(可...
    • 8,288 篇 安全科学与工程
    • 7,657 篇 网络空间安全
  • 126,896 篇 理学
    • 63,218 篇 数学
    • 41,667 篇 物理学
    • 29,405 篇 生物学
    • 20,543 篇 统计学(可授理学、...
    • 14,873 篇 系统科学
    • 13,976 篇 化学
  • 55,778 篇 管理学
    • 33,603 篇 管理科学与工程(可...
    • 24,376 篇 图书情报与档案管...
    • 16,644 篇 工商管理
  • 19,220 篇 医学
    • 16,117 篇 临床医学
    • 14,544 篇 基础医学(可授医学...
    • 9,156 篇 药学(可授医学、理...
    • 7,679 篇 公共卫生与预防医...
  • 10,492 篇 法学
    • 8,591 篇 社会学
  • 6,439 篇 经济学
  • 5,054 篇 农学
  • 4,145 篇 教育学
  • 1,861 篇 文学
  • 870 篇 军事学
  • 509 篇 艺术学
  • 75 篇 哲学
  • 46 篇 历史学

主题

  • 19,997 篇 computer science
  • 8,532 篇 accuracy
  • 8,509 篇 computational mo...
  • 7,753 篇 feature extracti...
  • 7,276 篇 deep learning
  • 7,129 篇 machine learning
  • 6,359 篇 training
  • 5,271 篇 data mining
  • 5,088 篇 computer archite...
  • 4,960 篇 support vector m...
  • 4,906 篇 wireless sensor ...
  • 4,670 篇 predictive model...
  • 4,653 篇 costs
  • 4,553 篇 bandwidth
  • 4,497 篇 application soft...
  • 4,426 篇 optimization
  • 4,395 篇 algorithm design...
  • 4,374 篇 protocols
  • 4,337 篇 testing
  • 4,252 篇 neural networks

机构

  • 1,704 篇 department of co...
  • 1,394 篇 department of el...
  • 1,384 篇 department of co...
  • 1,163 篇 department of el...
  • 1,062 篇 cavendish labora...
  • 974 篇 department of ph...
  • 860 篇 department of co...
  • 855 篇 physikalisches i...
  • 845 篇 oliver lodge lab...
  • 834 篇 department of el...
  • 753 篇 university of ch...
  • 660 篇 department of co...
  • 545 篇 infn sezione di ...
  • 538 篇 department of co...
  • 520 篇 chitkara univers...
  • 516 篇 infn sezione di ...
  • 515 篇 infn laboratori ...
  • 507 篇 horia hulubei na...
  • 498 篇 department of co...
  • 495 篇 infn sezione di ...

作者

  • 256 篇 s. chen
  • 255 篇 j. wang
  • 250 篇 barter w.
  • 237 篇 a. gomes
  • 227 篇 blake t.
  • 221 篇 bellee v.
  • 221 篇 bowcock t.j.v.
  • 219 篇 c. alexa
  • 219 篇 borsato m.
  • 219 篇 betancourt c.
  • 218 篇 amato s.
  • 216 篇 j. m. izen
  • 216 篇 boettcher t.
  • 213 篇 brundu d.
  • 209 篇 beiter a.
  • 208 篇 bencivenni g.
  • 199 篇 g. bella
  • 199 篇 bay a.
  • 198 篇 j. strandberg
  • 197 篇 c. amelung

语言

  • 371,496 篇 英文
  • 12,274 篇 其他
  • 3,660 篇 中文
  • 220 篇 日文
  • 47 篇 德文
  • 34 篇 朝鲜文
  • 33 篇 法文
  • 17 篇 斯洛文尼亚文
  • 8 篇 西班牙文
  • 8 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Engineering and Computer Science"
387406 条 记 录,以下是221-230 订阅
排序:
Autonomous vehicle surveillance through fuzzy C-means segmentation and DeepSORT on aerial images
收藏 引用
PeerJ computer science 2025年 11卷 1-23页
作者: Qureshi, Asifa Mehmood Alotaibi, Moneerah Alotaibi, Sultan Refa AlHammadi, Dina Abdulaziz Jamal, Muhammad Asif Jalal, Ahmad Lee, Bumshik Department of Computer Science Air University Islamabad Pakistan Department of Computer Science College of Science and Humanities Shaqra University Dawadmi Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh Saudi Arabia Information and Communication Engineering Chosun University Gwangju Korea Republic of Department of Computer Science and Engineering College of Informatics Korea University Seoul Korea Republic of
The high mobility of uncrewed aerial vehicles (UAVs) has led to their usage in various computer vision applications, notably in intelligent traffic surveillance, where it enhances productivity and simplifies the proce... 详细信息
来源: 评论
Enhancing Prediction Accuracy with an Innovative Hybrid Fuzzy Time Series Framework
收藏 引用
SN computer science 2025年 第2期6卷 1-11页
作者: Gogoi, Abhijit Borah, Bhogeswar Department of Computer Science and Engineering Tezpur University Naapam Assam Tezpur 784028 India Department of Computer Science and Engineering Dibrugarh Uiversity Dibrugarh India
This study introduces a new hybrid fuzzy time series (FTS) model designed to improve forecasting abilities by independently applying forecasting techniques using both overlapping and non-overlapping partitions. By lev... 详细信息
来源: 评论
EPDTNet + -EM: Advanced Transfer Learning and SubNet Architecture for Medical Image Diagnosis
收藏 引用
Cognitive Computation 2025年 第2期17卷 1-22页
作者: K, Dhivya K, Sangamithrai S, Indra Priyadharshini M, Vedaraj Department of Electronics and Communication Engineering SRM Institute of Science and Technology Tamilnadu Kattankulathur India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R & d Institute of Science and Technology Tamilnadu Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India Department of Computer Science and Engineering R.M.D. Engineering College RSM Nagar Tamilnadu Kavaraipettai Thiruvallur601206 India
This paper presents a novel medical imaging framework, Efficient Parallel Deep Transfer SubNet+-based Explainable Model (EPDTNet + -EM), designed to improve the detection and classification of abnormalities in medical... 详细信息
来源: 评论
IMPROVEMENT OF THE ACO ALGORITHM FOR INTELLIGENT TASK SCHEDULING IN CLOUD SYSTEMS
收藏 引用
Scalable Computing 2025年 第2期26卷 531-539页
作者: DJEBBAR, ESMA INSAF BELALEM, GHALEM Department of Computer Science Systems Engineering National Polytechnic School of Oran-Maurie Audin Oran Algeria Department of Computer Science University of Oran1-Ahmed Ben Bella Algeria
Cloud computing involves accessing and using computing resources, such as servers, storage, and software applications, over the Internet, enabling scalable access on demand. Cloud computing systems are becoming an ess... 详细信息
来源: 评论
Quantitative Assessment of Generative Large Language Models on Design Pattern Application
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 3843-3872页
作者: Dae-Kyoo Kim Department of Computer Science and Engineering Oakland University115 Library Dr.RochesterMI 48309USA
Design patterns offer reusable solutions for common software issues,enhancing *** advent of generative large language models(LLMs)marks progress in software development,but their efficacy in applying design patterns i... 详细信息
来源: 评论
Improvised Spectral Efficiency and Channel Estimation Parameters in Visible Light Vehicular Communication by Integrating Simulation of Urban Mobility Data
收藏 引用
IEEE Access 2025年 13卷 70828-70848页
作者: Wheeb, Ali H. Maurya, Sudhanshu Karimullah, Shaik Shaik, Fahimuddin Chowdhury, Subrata Siva Prasad, B.V.V. Sinha, Anurag Sood, Adamya Hussain, Syed Abid University of Baghdad College of Engineering Department of Aeronautical Engineering Baghdad10071 Iraq Department of Computer Science and Engineering Pune412115 India Annamacharya University Department of ECE Rajampet516126 India Sreenivasa Institute of Technology and Management Studies Department of Computer Science and Engineering Chittoor517127 India Anurag University School of Engineering Department of Computer Science and Engineering Hyderabad500088 India ICFAI University Tech School Computer Science Department Ranchi835222 India Amity University Amity School of Engineering and Technology Computer Science Department Noida201313 India Bakhtar University Department of Computer Science and Engineering Karta-e-Chahar Kabul1001 Afghanistan Lovely Professional University Division of Research and Development Phagwara144001 India Chitkara University Institute of Engineering and Technology Chitkara University Centre for Research Impact and Outcome Rajpura140401 India
Visible Light Communication (VLC) has emerged as a promising technology for vehicular communication due to its high data rates, low latency, and immunity to electromagnetic interference. However, optimizing spectral e... 详细信息
来源: 评论
Osmotic Computing Based Secure Resource Orchestration Scheme for Vehicular Communication  17
Osmotic Computing Based Secure Resource Orchestration Scheme...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Garg, Deepanshu Angurala, Mohit Bali, Rasmeet S. Kumar, Neeraj Chandigarh University Computer Science & Engineering Department India Guru Nanak Dev University Computer Science Department India Thapar University Patiala Computer Science & Engineering Department India
The advancement in technology leads to provide an efficient communication among vehicles to offload resource-intensive tasks for transportation-based services. However, it may cause issue related to efficient secure r... 详细信息
来源: 评论
Usability and Security Analysis of the Compare-and-Confirm Method in Mobile Push-Based Two-Factor Authentication
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4623-4638页
作者: Jubur, Mohammed Saxena, Nitesh Reegu, Faheem A. Jazan University Department of Computer Network Engineering Jazan45142 Saudi Arabia Texas A&M University Department of Computer Science Engineering College StationTX77840 United States
Push-based two-factor authentication (2FA) methods, such as the "Just-Confirm" approach, are popular due to their user-friendly design, requiring users to simply approve or deny a push notification on their ... 详细信息
来源: 评论
Improved security with novel M-Log chaos steganography algorithm for huffman compressed english text
收藏 引用
Multimedia Tools and Applications 2025年 第2期84卷 665-688页
作者: Raghuvanshi, Devvrat Joshi, Kamaldeep Nandal, Rainu Sehrawat, Harkesh Singh, Surender Singh, Srishti Department of Computer Science and Engineering University Institute of Engineering and Technology Maharshi Dayanand University Rohtak Haryana India
This paper addresses the underexplored landscape of chaotic functions in steganography, existing literature when examined under PRISMA-ScR framework it was realized that most of the studies predominantly focuses on ut... 详细信息
来源: 评论
A lightweight identity based mutual authenticated key agreement scheme for telecare medical information system
收藏 引用
Multimedia Tools and Applications 2025年 1-25页
作者: Banerjee, Ananya Sahana, Subhas Chandra Department of Computer Science & Engineering National Institute of Technology West Bengal Durgapur713209 India
The Telecare Medical Information System (TMIS) faces challenges in securely exchanging sensitive health information between TMIS nodes. A Mutual Authenticated Key Agreement (MAKA) scheme is used to eliminate security ... 详细信息
来源: 评论