咨询与建议

限定检索结果

文献类型

  • 273,058 篇 会议
  • 111,566 篇 期刊文献
  • 2,800 册 图书

馆藏范围

  • 387,423 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 223,859 篇 工学
    • 148,864 篇 计算机科学与技术...
    • 120,655 篇 软件工程
    • 54,157 篇 信息与通信工程
    • 35,469 篇 控制科学与工程
    • 31,362 篇 电气工程
    • 30,351 篇 电子科学与技术(可...
    • 25,955 篇 生物工程
    • 20,383 篇 生物医学工程(可授...
    • 17,748 篇 光学工程
    • 15,337 篇 机械工程
    • 12,967 篇 化学工程与技术
    • 12,145 篇 仪器科学与技术
    • 12,084 篇 动力工程及工程热...
    • 10,729 篇 材料科学与工程(可...
    • 8,278 篇 安全科学与工程
    • 7,667 篇 网络空间安全
  • 126,616 篇 理学
    • 62,953 篇 数学
    • 41,534 篇 物理学
    • 29,344 篇 生物学
    • 20,314 篇 统计学(可授理学、...
    • 14,866 篇 系统科学
    • 13,892 篇 化学
  • 55,766 篇 管理学
    • 33,591 篇 管理科学与工程(可...
    • 24,363 篇 图书情报与档案管...
    • 16,633 篇 工商管理
  • 19,214 篇 医学
    • 16,123 篇 临床医学
    • 14,494 篇 基础医学(可授医学...
    • 9,147 篇 药学(可授医学、理...
    • 7,676 篇 公共卫生与预防医...
  • 10,507 篇 法学
    • 8,598 篇 社会学
  • 6,434 篇 经济学
  • 5,066 篇 农学
  • 4,146 篇 教育学
  • 1,861 篇 文学
  • 872 篇 军事学
  • 505 篇 艺术学
  • 75 篇 哲学
  • 46 篇 历史学

主题

  • 19,984 篇 computer science
  • 8,790 篇 accuracy
  • 8,596 篇 computational mo...
  • 7,848 篇 feature extracti...
  • 7,366 篇 deep learning
  • 7,164 篇 machine learning
  • 6,413 篇 training
  • 5,253 篇 data mining
  • 5,106 篇 computer archite...
  • 5,015 篇 support vector m...
  • 4,921 篇 wireless sensor ...
  • 4,800 篇 predictive model...
  • 4,647 篇 costs
  • 4,532 篇 bandwidth
  • 4,478 篇 application soft...
  • 4,463 篇 optimization
  • 4,369 篇 protocols
  • 4,351 篇 algorithm design...
  • 4,319 篇 testing
  • 4,246 篇 neural networks

机构

  • 1,690 篇 department of co...
  • 1,361 篇 department of co...
  • 1,348 篇 department of el...
  • 1,154 篇 department of el...
  • 1,060 篇 cavendish labora...
  • 970 篇 department of ph...
  • 877 篇 department of co...
  • 853 篇 physikalisches i...
  • 841 篇 oliver lodge lab...
  • 820 篇 department of el...
  • 742 篇 university of ch...
  • 636 篇 department of co...
  • 546 篇 infn sezione di ...
  • 537 篇 department of co...
  • 522 篇 infn laboratori ...
  • 514 篇 infn sezione di ...
  • 512 篇 chitkara univers...
  • 499 篇 horia hulubei na...
  • 497 篇 infn sezione di ...
  • 485 篇 department of co...

作者

  • 258 篇 s. chen
  • 256 篇 j. wang
  • 250 篇 barter w.
  • 241 篇 a. gomes
  • 225 篇 blake t.
  • 223 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 j. m. izen
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 204 篇 bencivenni g.
  • 195 篇 bay a.
  • 194 篇 g. bella
  • 194 篇 c. amelung
  • 192 篇 j. strandberg

语言

  • 371,355 篇 英文
  • 12,409 篇 其他
  • 3,666 篇 中文
  • 220 篇 日文
  • 47 篇 德文
  • 34 篇 朝鲜文
  • 32 篇 法文
  • 17 篇 斯洛文尼亚文
  • 8 篇 西班牙文
  • 8 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Engineering and Computer Science"
387424 条 记 录,以下是741-750 订阅
排序:
Energy-Efficient Cluster in Wireless Sensor Network Using Life Time Delay Clustering Algorithms
收藏 引用
computer Systems science & engineering 2022年 第10期43卷 77-86页
作者: V.Kumar N.Jayapandian P.Balasubramanie Department of Computer Science and Engineering Knowledge Institute of TechnologySalemIndia Department of Computer Science and Engineering Christ UniversityBangaloreIndia Department of Computer Science and Engineering Kongu Engineering CollegePerunduraiIndia
Through Wireless Sensor Networks(WSN)formation,industrial and academic communities have seen remarkable development in recent *** of the most common techniques to derive the best out of wireless sensor networks is to ... 详细信息
来源: 评论
Dual-Cloud Multi-Secret Sharing Architecture for Privacy Preserving Persistent Computation
收藏 引用
IEEE Transactions on Information Forensics and Security 2024年 19卷 7523-7535页
作者: Chen, Yu-Chi Yang, Jhe-Kai Yen, Hsin-Chan Lin, Pei-Wen National Taipei University of Technology Department of Computer Science and Information Engineering Taipei10608 Taiwan Yuan Ze University Department of Computer Science and Engineering Taoyuan32003 Taiwan Genie Networks Taipei114064 Taiwan
With the prevalence of artificial intelligence, people collect data through numerous sensors and use machine learning to create models for intelligent services. However, data privacy and massive data issues are raised... 详细信息
来源: 评论
Space/Air Covert Communications:Potentials,Scenarios,and Key Technologies
收藏 引用
China Communications 2024年 第3期21卷 1-18页
作者: Mao Haobin Liu Yanming Zhu Lipeng Mao Tianqi Xiao Zhenyu Zhang Rui Han Zhu Xia Xianggen School of Electronic and Information Engineering Beihang UniversityBeijing 100191China Department of Electrical and Computer Engineering National University of SingaporeSingapore 117583Singapore School of Science and Engineering Shenzhen Research Institute of Big Datathe Chinese University of Hong KongShenzhenGuangdong 518172China Department of Electrical and Computer Engineering University of HoustonHoustonTX 77004USA Department of Computer Science and Engineering Kyung Hee UniversitySeoulSouth Korea446-701 Department of Electrical and Computer Engineering University of DelawareNewarkDE 19716USA
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel... 详细信息
来源: 评论
A Surface Crack Detection System Based on Image Input: The CNN Approach  2
A Surface Crack Detection System Based on Image Input: The C...
收藏 引用
2nd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2024
作者: Tiwari, Shweta Srivastava, Animesh Parihar, Parul Yadav, Puneet Kumar Chandigarh University Department of Computer Science and Engineering India Graphic Era Hill University Department of Computer Science and Engineering Dehradun India Alliance University Department of Computer Science and Engineering India
Any concrete construction that has surface fractures can seriously harm both its surroundings and the people nearby. Cracks that are discovered early on can help stop additional harm. Cracks are found using traditiona... 详细信息
来源: 评论
Convolutional Neural Networks for Accurate Brain Tumor Detection and Analysis  2
Convolutional Neural Networks for Accurate Brain Tumor Detec...
收藏 引用
2nd International Conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Srinivasa Rao, Narisetty Kasi Viswesh, Pasalapudi Sushma Reddy, Dumpa Sandesh, Balasaraswati Department of Computer Science and Engineering Mylavaram India
Brain tumor detection is a crucial diagnostic process that depends on analyzing MRI images fine contrast of soft tissues and non-intrusive nature. Although through the manual analysis of MRI scans is a time taking pro... 详细信息
来源: 评论
DeepVNE: Deep Reinforcement and Graph Convolution Fusion for Virtual Network Embedding  16
DeepVNE: Deep Reinforcement and Graph Convolution Fusion for...
收藏 引用
16th International Conference on COMmunication Systems and NETworkS, COMSNETS 2024
作者: Keerthan Kumar, T.G. Kb, Aneesh Siddheshwar, Anagha Marali, Amulya Kamath, Anupama Koolagudi, S.G. Addya, Sourav Kanti National Institute of Technology Department of Computer Science and Engineering Karnataka India Siddaganga Institute of Technology Department of Computer Science and Engineering India Pes University Department of Computer Science and Engineering India
Network virtualization (NV) plays a crucial role in modern network management. One of the fundamental challenges in NV is allocating physical network (PN) resources to the demands of the virtual network requests (VNRs... 详细信息
来源: 评论
Cycle Consistency Loss with Long Short Connection in Convolutional Neural Network-Generative Adversarial Network for Image Steganography  1
Cycle Consistency Loss with Long Short Connection in Convolu...
收藏 引用
1st International Conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Fatima, Syeda Imrana Garapati, Yugandhar Department of Computer Science and Engineering Hyderabad India
Image steganography is the practice of concealing secret information within a digital image in such a way that the alteration is undetectable to the human eye. It ensures secure communication by embedding data into th... 详细信息
来源: 评论
Artificial Intelligence and Natural Language Processing Inspired Chabot Technologies
收藏 引用
Recent Advances in computer science and Communications 2024年 第1期17卷 11-20页
作者: Singh, Deepti Manju Jatain, Aman Netaji Subhash Institute of Technology New Delhi India Department of Computer Science and Engineering & Information Technology Jaypee Institute of Information Technology Noida India Department of Computer Science and Engineering Amity University Haryana India
Chatbots use artificial intelligence (AI) and natural language processing (NLP) algorithms to construct a clever system. By copying human connections in the most helpful way possi-ble, chatbots emulate individuals and... 详细信息
来源: 评论
Comparative Evaluation of Mango Fruit Diseases Classification Using Machine Learning
Comparative Evaluation of Mango Fruit Diseases Classificatio...
收藏 引用
2024 International Conference on Emerging Innovations and Advanced Computing, INNOCOMP 2024
作者: Kumar, Sandeep Gupta, Bhupesh Chhabra, Mohit Garg, Lucy Department of Computer Science & Engineering Mullana India Panipat Institute of Engineering Technology Department of Computer Science & Engineering Panipat India
A fruit valued for its great flavor, scent, and nutritional content;the mango (Mangifera indica L.) is one of the most significant tropical fruits in the world economically. However, several illnesses that compromise ... 详细信息
来源: 评论
Segmentation Based Real Time Anomaly Detection and Tracking Model for Pedestrian Walkways
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 2491-2504页
作者: B.Sophia D.Chitra Department of Computer Science and Engineering Sri Krishna College of Engineering and TechnologyCoimbatoreTamilnaduIndia Department of Computer Science and Engineering P.A College of Engineering and TechnologyPollachiTamilnaduIndia
Presently,video surveillance is commonly employed to ensure security in public places such as traffic signals,malls,railway stations,etc.A major chal-lenge in video surveillance is the identification of anomalies that... 详细信息
来源: 评论