咨询与建议

限定检索结果

文献类型

  • 536,623 篇 会议
  • 185,477 篇 期刊文献
  • 3,688 册 图书
  • 2 篇 科技报告
  • 1 篇 学位论文

馆藏范围

  • 725,787 篇 电子文献
  • 18 种 纸本馆藏

日期分布

学科分类号

  • 394,505 篇 工学
    • 225,260 篇 计算机科学与技术...
    • 180,354 篇 软件工程
    • 95,804 篇 信息与通信工程
    • 74,129 篇 电气工程
    • 73,297 篇 电子科学与技术(可...
    • 64,218 篇 控制科学与工程
    • 38,376 篇 生物工程
    • 33,341 篇 光学工程
    • 30,845 篇 生物医学工程(可授...
    • 28,064 篇 机械工程
    • 24,708 篇 仪器科学与技术
    • 24,084 篇 动力工程及工程热...
    • 23,123 篇 化学工程与技术
    • 21,941 篇 材料科学与工程(可...
    • 12,118 篇 安全科学与工程
    • 11,834 篇 交通运输工程
  • 222,767 篇 理学
    • 105,612 篇 数学
    • 83,907 篇 物理学
    • 43,036 篇 生物学
    • 33,890 篇 统计学(可授理学、...
    • 28,147 篇 系统科学
    • 24,536 篇 化学
  • 82,789 篇 管理学
    • 51,970 篇 管理科学与工程(可...
    • 33,796 篇 图书情报与档案管...
    • 25,904 篇 工商管理
  • 28,023 篇 医学
    • 23,344 篇 临床医学
    • 20,636 篇 基础医学(可授医学...
    • 13,136 篇 药学(可授医学、理...
  • 15,037 篇 法学
    • 12,430 篇 社会学
  • 10,390 篇 经济学
    • 10,333 篇 应用经济学
  • 7,182 篇 农学
  • 6,736 篇 教育学
  • 3,383 篇 文学
  • 1,705 篇 军事学
  • 815 篇 艺术学
  • 110 篇 哲学
  • 59 篇 历史学

主题

  • 20,521 篇 computer science
  • 16,287 篇 computational mo...
  • 12,495 篇 feature extracti...
  • 12,407 篇 accuracy
  • 12,048 篇 bandwidth
  • 10,289 篇 computer archite...
  • 10,027 篇 delay
  • 10,005 篇 training
  • 9,934 篇 costs
  • 9,924 篇 testing
  • 9,848 篇 machine learning
  • 9,801 篇 hardware
  • 9,787 篇 control systems
  • 9,753 篇 application soft...
  • 9,573 篇 algorithm design...
  • 9,272 篇 deep learning
  • 9,258 篇 wireless sensor ...
  • 8,929 篇 robustness
  • 8,751 篇 mathematical mod...
  • 8,745 篇 neural networks

机构

  • 5,278 篇 department of el...
  • 1,658 篇 department of co...
  • 1,340 篇 ieee
  • 1,313 篇 department of co...
  • 1,288 篇 department of el...
  • 1,275 篇 department of el...
  • 1,147 篇 department of el...
  • 1,080 篇 department of el...
  • 1,017 篇 department of el...
  • 984 篇 department of el...
  • 961 篇 department of ph...
  • 948 篇 department of el...
  • 937 篇 cavendish labora...
  • 807 篇 oliver lodge lab...
  • 806 篇 physikalisches i...
  • 776 篇 department of co...
  • 775 篇 department of el...
  • 774 篇 department of el...
  • 713 篇 university of ch...
  • 705 篇 department of el...

作者

  • 264 篇 j. wang
  • 254 篇 s. chen
  • 244 篇 barter w.
  • 221 篇 blake t.
  • 217 篇 bellee v.
  • 217 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 206 篇 amato s.
  • 206 篇 a. gomes
  • 205 篇 brundu d.
  • 204 篇 boettcher t.
  • 203 篇 beiter a.
  • 200 篇 han zhu
  • 193 篇 c. alexa
  • 190 篇 c. amelung
  • 190 篇 y. chen
  • 188 篇 j. m. izen
  • 188 篇 g. bella
  • 188 篇 j. strandberg

语言

  • 698,089 篇 英文
  • 19,154 篇 其他
  • 8,286 篇 中文
  • 297 篇 日文
  • 124 篇 朝鲜文
  • 83 篇 土耳其文
  • 61 篇 德文
  • 49 篇 法文
  • 22 篇 斯洛文尼亚文
  • 13 篇 西班牙文
  • 12 篇 葡萄牙文
  • 10 篇 俄文
  • 9 篇 荷兰文
  • 3 篇 阿拉伯文
  • 3 篇 爱沙尼亚文
  • 2 篇 捷克文
  • 2 篇 泰文
  • 1 篇 加泰罗尼亚文
检索条件"机构=Department of Computer Engineering of Computer Engineering"
725791 条 记 录,以下是291-300 订阅
排序:
Enhancing eyeglasses removal in facial images: a novel approach using translation models for eyeglasses mask completion
收藏 引用
Multimedia Tools and Applications 2024年 1-20页
作者: Esmaily, Zahra Ebrahimpour-Komleh, Hossein Department of Electrical and Computer Engineering University of Kashan Kashan Iran
Accurately removing eyeglasses from facial images is crucial for improving the performance of various face-related tasks such as verification, identification, and reconstruction. This paper presents a novel approach t... 详细信息
来源: 评论
An incremental tree seed algorithm for balancing local and global search behaviors in continuous optimization problems
收藏 引用
Neural Computing and Applications 2024年 第31期36卷 19879-19914页
作者: Beşkirli, Mehmet Department of Computer Engineering Şırnak University Şırnak73000 Turkey
Population-based tree seed algorithm (TSA), a popular optimization algorithm, was used in this study. The purpose of this study is to develop a TSA via improving its exploitation and exploration capability which is th... 详细信息
来源: 评论
Continuously non-malleable codes from block ciphers in split-state model
收藏 引用
Cybersecurity 2024年 第2期7卷 68-80页
作者: Anit Kumar Ghosal Dipanwita Roychowdhury Department of Computer Science and Engineering I KharagpurKharagpurWest BengalIndia
Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to *** ensures with high probability that decoded message is either completely unrela... 详细信息
来源: 评论
Knowledge distillation on spatial-temporal graph convolutional network for traffic prediction
收藏 引用
International Journal of computers and Applications 2025年 第1期47卷 45-56页
作者: Izadi, Mohammad Safayani, Mehran Mirzaei, Abdolreza Department of Electrical and Computer Engineering Isfahan University of Technology Isfahan Iran
Efficient real-time traffic prediction is crucial for reducing transportation time. To predict traffic conditions, we employ a spatio-temporal graph neural network (ST-GNN) to model our real-time traffic data as tempo... 详细信息
来源: 评论
Joint Energy Predication and Gathering Data in Wireless Rechargeable Sensor Network
收藏 引用
computer Systems Science & engineering 2023年 第3期44卷 2349-2360页
作者: I.Vallirathi S.Ebenezer Juliet Department of Computer Science and Engineering PET Engineering CollegeVallioor627117India Department of Computer Science and Engineering VV College of EngineeringThisayanvilai627657India
Wireless Sensor Network(WSNs)is an infrastructure-less wireless net-work deployed in an increasing number of wireless sensors in an ad-hoc *** the sensor nodes could be powered using batteries,the development of WSN e... 详细信息
来源: 评论
Drawing a parallel between the trend of confirmed COVID-19 deaths in the winters of 2022/2023 and 2023/2024 in Italy, with a prediction
收藏 引用
Mathematical Biosciences and engineering 2024年 第3期21卷 3742-3754页
作者: Roccetti, Marco Department of Computer Science and Engineering University of Bologna Bologna Italy
We studied the weekly number and the growth/decline rates of COVID-19 deaths of the period from October 31, 2022, to February 9, 2023, in Italy. We found that the COVID-19 winter wave reached its peak during the three... 详细信息
来源: 评论
Local Search-Based Anytime Algorithms for Continuous Distributed Constraint Optimization Problems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 288-290页
作者: Xin Liao Khoi Hoang Xin Luo the College of Computer and Information Science Southwest University the Department of Computer Science and Engineering Washington University in St.Louis IEEE
Dear Editor,The distributed constraint optimization problems(DCOPs) [1]-[3]provide an efficient model for solving the cooperative problems of multi-agent systems, which has been successfully applied to model the real-...
来源: 评论
Network traffic analysis using machine learning techniques in IoT network
收藏 引用
International Journal of Vehicle Information and Communication Systems 2025年 第2期10卷 113-131页
作者: Mishra, Shailendra Department of Computer Engineering Majmaah University Majmaah11952 Saudi Arabia
End-node internet-of-things devices are not very intelligent and resource-constrained;thus, they are vulnerable to cyber threats. They have their IP address, and once the hacker traces the IP, it becomes easy to get i... 详细信息
来源: 评论
Composite spectral spatial pixel CNN for land-use hyperspectral image classification with hybrid activation function
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10527-10550页
作者: Banerjee, Anasua Swain, Satyajit Rout, Minakhi Bandyopadhyay, Mainak School of Computer Engineering Kalinga Institute of Industrial Technology-Deemed-to-be-University Bhubaneswar India Department of Computer Science and Engineering National Institute of Technology Silchar India
Deep learning methods have played a prominent role in the development of computer visualization in recent years. Hyperspectral imaging (HSI) is a popular analytical technique based on spectroscopy and visible imaging ... 详细信息
来源: 评论
Privacy-preserving intrusion detection with federated learning: enhancing privacy and efficiency in IoT networks
收藏 引用
International Journal of Machine Learning and Cybernetics 2025年 1-19页
作者: Sharma, Hemant Yadav, Gyan Singh Department of Computer Science and Engineering IIIT Kota Rajasthan Kota India
Intrusion detection systems (IDS) are crucial in the identification of unauthorized activities on a digital network, enabling cybersecurity measures to initiate prevention protocols to protect the security of their ne... 详细信息
来源: 评论