咨询与建议

限定检索结果

文献类型

  • 273,058 篇 会议
  • 111,566 篇 期刊文献
  • 2,800 册 图书

馆藏范围

  • 387,423 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 223,859 篇 工学
    • 148,864 篇 计算机科学与技术...
    • 120,655 篇 软件工程
    • 54,157 篇 信息与通信工程
    • 35,469 篇 控制科学与工程
    • 31,362 篇 电气工程
    • 30,351 篇 电子科学与技术(可...
    • 25,955 篇 生物工程
    • 20,383 篇 生物医学工程(可授...
    • 17,748 篇 光学工程
    • 15,337 篇 机械工程
    • 12,967 篇 化学工程与技术
    • 12,145 篇 仪器科学与技术
    • 12,084 篇 动力工程及工程热...
    • 10,729 篇 材料科学与工程(可...
    • 8,278 篇 安全科学与工程
    • 7,667 篇 网络空间安全
  • 126,616 篇 理学
    • 62,953 篇 数学
    • 41,534 篇 物理学
    • 29,344 篇 生物学
    • 20,314 篇 统计学(可授理学、...
    • 14,866 篇 系统科学
    • 13,892 篇 化学
  • 55,766 篇 管理学
    • 33,591 篇 管理科学与工程(可...
    • 24,363 篇 图书情报与档案管...
    • 16,633 篇 工商管理
  • 19,214 篇 医学
    • 16,123 篇 临床医学
    • 14,494 篇 基础医学(可授医学...
    • 9,147 篇 药学(可授医学、理...
    • 7,676 篇 公共卫生与预防医...
  • 10,507 篇 法学
    • 8,598 篇 社会学
  • 6,434 篇 经济学
  • 5,066 篇 农学
  • 4,146 篇 教育学
  • 1,861 篇 文学
  • 872 篇 军事学
  • 505 篇 艺术学
  • 75 篇 哲学
  • 46 篇 历史学

主题

  • 19,984 篇 computer science
  • 8,790 篇 accuracy
  • 8,596 篇 computational mo...
  • 7,848 篇 feature extracti...
  • 7,366 篇 deep learning
  • 7,164 篇 machine learning
  • 6,413 篇 training
  • 5,253 篇 data mining
  • 5,106 篇 computer archite...
  • 5,015 篇 support vector m...
  • 4,921 篇 wireless sensor ...
  • 4,800 篇 predictive model...
  • 4,647 篇 costs
  • 4,532 篇 bandwidth
  • 4,478 篇 application soft...
  • 4,463 篇 optimization
  • 4,369 篇 protocols
  • 4,351 篇 algorithm design...
  • 4,319 篇 testing
  • 4,246 篇 neural networks

机构

  • 1,690 篇 department of co...
  • 1,361 篇 department of co...
  • 1,348 篇 department of el...
  • 1,154 篇 department of el...
  • 1,060 篇 cavendish labora...
  • 970 篇 department of ph...
  • 877 篇 department of co...
  • 853 篇 physikalisches i...
  • 841 篇 oliver lodge lab...
  • 820 篇 department of el...
  • 742 篇 university of ch...
  • 636 篇 department of co...
  • 546 篇 infn sezione di ...
  • 537 篇 department of co...
  • 522 篇 infn laboratori ...
  • 514 篇 infn sezione di ...
  • 512 篇 chitkara univers...
  • 499 篇 horia hulubei na...
  • 497 篇 infn sezione di ...
  • 485 篇 department of co...

作者

  • 258 篇 s. chen
  • 256 篇 j. wang
  • 250 篇 barter w.
  • 241 篇 a. gomes
  • 225 篇 blake t.
  • 223 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 j. m. izen
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 204 篇 bencivenni g.
  • 195 篇 bay a.
  • 194 篇 g. bella
  • 194 篇 c. amelung
  • 192 篇 j. strandberg

语言

  • 371,355 篇 英文
  • 12,409 篇 其他
  • 3,666 篇 中文
  • 220 篇 日文
  • 47 篇 德文
  • 34 篇 朝鲜文
  • 32 篇 法文
  • 17 篇 斯洛文尼亚文
  • 8 篇 西班牙文
  • 8 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Engineering and Computer Science"
387424 条 记 录,以下是661-670 订阅
排序:
A Comparative Study of C Compilers: Evaluating Operator Precedence and Associativity in Compilers  5
A Comparative Study of C Compilers: Evaluating Operator Prec...
收藏 引用
5th International Conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Kumar, Lalit Sharma, Isha Department of Computer Science and Engineering Ambala Haryana Mullana133207 India CodeQuotient Department of Computer Science and Engineering
Operator precedence and associativity are fundamental concepts in the C programming language that govern the order of evaluation of expressions. Understanding these principles is essential for writing correct and effi... 详细信息
来源: 评论
ChatOps for microservice systems: A low-code approach using service composition and large language models
收藏 引用
Future Generation computer Systems 2024年 161卷 518-530页
作者: Wang, Sheng-Kai Ma, Shang-Pin Lai, Guan-Hong Chao, Chen-Hao Department of Computer Science and Engineering National Taiwan Ocean University Keelung202 Taiwan
The Microservice Architecture (MSA) plays a pivotal role in contemporary e-business, promoting service independence, autonomy, and continual evolution in line with the principles of DevOps. However, the distributed na... 详细信息
来源: 评论
Occupancy Map Guided Attributes Artifacts Removal for Video-Based Point Cloud Compression
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2024年 第12期20卷 1-20页
作者: Chen, Peilin Wang, Shiqi Li, Zhu Department of Computer Science City University of Hong Kong Kowloon Hong Kong Department of Computer Science and Electrical Engineering University of Missouri-Kansas City KansasMO United States
Point clouds offer realistic 3D representations of objects and scenes at the expense of large data volumes. To represent such data compactly in real-world applications, Video-Based Point Cloud Compression (V-PCC) conv... 详细信息
来源: 评论
An efficient botnet detection approach based on feature learning and classification
收藏 引用
Journal of Control and Decision 2023年 第1期10卷 40-53页
作者: B.Padmavathi B.Muthukumar Department of Computer Science and Engineering Sathyabama Institute of Science and TechnologyChennaiIndia Computer Science and Engineering Easwari Engineering CollegeChennaiIndia DMI College of Engineering ChennaiIndia
Bot detection is considered a crucial security issue that is extensively analysed in various existingapproaches. Machine Learning is an efficient way of botnet attack detection. Bot detectionis the major issue faced b... 详细信息
来源: 评论
Congruent Feature Selection Method to Improve the Efficacy of Machine Learning-Based Classification in Medical Image Processing
收藏 引用
computer Modeling in engineering & sciences 2025年 第1期142卷 357-384页
作者: Mohd Anjum Naoufel Kraiem Hong Min Ashit Kumar Dutta Yousef Ibrahim Daradkeh Department of Computer Engineering Aligarh Muslim UniversityAligarh202002India College of Computer Science King Khalid UniversityAbha61413Saudi Arabia School of Computing Gachon UniversitySeongnam13120Republic of Korea Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Engineering and Information College of Engineering in Wadi AlddawasirPrince Sattam bin Abdulaziz UniversityAl-Kharj16273Saudi Arabia
Machine learning(ML)is increasingly applied for medical image processing with appropriate learning *** applications include analyzing images of various organs,such as the brain,lung,eye,etc.,to identify specific flaws... 详细信息
来源: 评论
Deep CNNs for glioma grading on conventional MRIs: Performance analysis, challenges, and future directions
收藏 引用
Mathematical Biosciences and engineering 2024年 第4期21卷 5250-5282页
作者: Saluja, Sonam Trivedi, Munesh Chandra Saha, Ashim Department of Computer Science and Engineering National Institute of Technology Agartala Tripura 799046 India
The increasing global incidence of glioma tumors has raised significant healthcare concerns due to their high mortality rates. Traditionally, tumor diagnosis relies on visual analysis of medical imaging and invasive b... 详细信息
来源: 评论
Efficient Clustering Using Memetic Adaptive Hill Climbing Algorithm in WSN
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 3169-3185页
作者: M.Manikandan S.Sakthivel V.Vivekanandhan Department of Computer Science and Engineering Adhiyamaan College of EngineeringHosur635109TamilnaduIndia Department of Computer Science and Engineering Sona College of TechnologySalem636005TamilnaduIndia
Wireless Sensor Networks are composed of autonomous sensing devices which are interconnected to form a closed *** closed network is intended to share sensitive location-centric information from a source node to the ba... 详细信息
来源: 评论
Deep Learning-Based Dual Watermarking for Image Copyright Protection and Authentication
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6134-6145页
作者: Padhi, Sudev Kumar Tiwari, Archana Ali, Sk. Subidh Indian Institute of Technology Bhilai Department of Computer Science and Engineering Durg491002 India
Advancements in digital technologies make it easy to modify the content of digital images. Hence, ensuring digital images' integrity and authenticity is necessary to protect them against various attacks that manip... 详细信息
来源: 评论
Elevating Image Steganography:A Fusion of MSB Matching and LSB Substitution for Enhanced Concealment Capabilities
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2923-2943页
作者: Muhammad Zaman Ali Omer Riaz Hafiz Muhammad Hasnain Waqas Sharif Tenvir Ali Gyu Sang Choi Department of Information Technology The Islamia University of BahawalpurBahawalpur63100Pakistan Department of Computer Science The Islamia University of BahawalpurBahawalpur63100Pakistan School of Computer Science and Engineering Yeungnam UniversityGyeongbuk38541Korea
In today’s rapidly evolving landscape of communication technologies,ensuring the secure delivery of sensitive data has become an essential *** overcome these difficulties,different steganography and data encryption m... 详细信息
来源: 评论
MLMO-HSM: Multi-label Multi-output Hybrid Sequential Model for multi-resident smart home activity recognition
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第3期14卷 2313-2325页
作者: Ramanujam, E. Perumal, Thinagaran Department of Computer Science and Engineering National Institute of Technology Silchar Assam 788010 India Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang India
Smart home automation is protective and preventive measures that are taken to monitor elderly people in a non-intrusive manner using simple and pervasive sensors termed Ambient Assistive Living. The smart home produce... 详细信息
来源: 评论