咨询与建议

限定检索结果

文献类型

  • 538,680 篇 会议
  • 186,448 篇 期刊文献
  • 3,697 册 图书
  • 2 篇 科技报告
  • 1 篇 学位论文

馆藏范围

  • 728,824 篇 电子文献
  • 18 种 纸本馆藏

日期分布

学科分类号

  • 396,814 篇 工学
    • 226,557 篇 计算机科学与技术...
    • 181,346 篇 软件工程
    • 96,315 篇 信息与通信工程
    • 74,485 篇 电气工程
    • 73,576 篇 电子科学与技术(可...
    • 64,661 篇 控制科学与工程
    • 38,465 篇 生物工程
    • 33,642 篇 光学工程
    • 31,033 篇 生物医学工程(可授...
    • 28,211 篇 机械工程
    • 24,816 篇 仪器科学与技术
    • 24,158 篇 动力工程及工程热...
    • 23,222 篇 化学工程与技术
    • 22,062 篇 材料科学与工程(可...
    • 12,213 篇 安全科学与工程
    • 11,918 篇 交通运输工程
  • 223,768 篇 理学
    • 106,070 篇 数学
    • 84,281 篇 物理学
    • 43,151 篇 生物学
    • 34,124 篇 统计学(可授理学、...
    • 28,177 篇 系统科学
    • 24,642 篇 化学
  • 83,237 篇 管理学
    • 52,279 篇 管理科学与工程(可...
    • 33,942 篇 图书情报与档案管...
    • 26,104 篇 工商管理
  • 28,276 篇 医学
    • 23,583 篇 临床医学
    • 20,848 篇 基础医学(可授医学...
    • 13,139 篇 药学(可授医学、理...
  • 15,134 篇 法学
    • 12,508 篇 社会学
  • 10,438 篇 经济学
    • 10,382 篇 应用经济学
  • 7,241 篇 农学
  • 6,836 篇 教育学
  • 3,383 篇 文学
  • 1,711 篇 军事学
  • 817 篇 艺术学
  • 110 篇 哲学
  • 59 篇 历史学

主题

  • 20,524 篇 computer science
  • 16,394 篇 computational mo...
  • 12,637 篇 accuracy
  • 12,568 篇 feature extracti...
  • 12,055 篇 bandwidth
  • 10,324 篇 computer archite...
  • 10,046 篇 training
  • 10,025 篇 delay
  • 9,946 篇 costs
  • 9,946 篇 testing
  • 9,881 篇 machine learning
  • 9,807 篇 hardware
  • 9,790 篇 control systems
  • 9,752 篇 application soft...
  • 9,573 篇 algorithm design...
  • 9,476 篇 deep learning
  • 9,262 篇 wireless sensor ...
  • 8,956 篇 robustness
  • 8,763 篇 neural networks
  • 8,751 篇 mathematical mod...

机构

  • 5,287 篇 department of el...
  • 1,670 篇 department of co...
  • 1,340 篇 ieee
  • 1,316 篇 department of co...
  • 1,288 篇 department of el...
  • 1,277 篇 department of el...
  • 1,146 篇 department of el...
  • 1,080 篇 department of el...
  • 1,017 篇 department of el...
  • 983 篇 department of el...
  • 963 篇 department of ph...
  • 946 篇 department of el...
  • 939 篇 cavendish labora...
  • 809 篇 oliver lodge lab...
  • 806 篇 physikalisches i...
  • 780 篇 department of co...
  • 775 篇 department of el...
  • 773 篇 department of el...
  • 716 篇 university of ch...
  • 706 篇 department of el...

作者

  • 264 篇 j. wang
  • 254 篇 s. chen
  • 244 篇 barter w.
  • 221 篇 blake t.
  • 217 篇 bellee v.
  • 217 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 206 篇 amato s.
  • 206 篇 a. gomes
  • 205 篇 brundu d.
  • 205 篇 han zhu
  • 204 篇 boettcher t.
  • 203 篇 beiter a.
  • 193 篇 c. alexa
  • 190 篇 c. amelung
  • 190 篇 niyato dusit
  • 190 篇 y. chen
  • 188 篇 j. m. izen
  • 188 篇 g. bella

语言

  • 690,604 篇 英文
  • 29,584 篇 其他
  • 8,393 篇 中文
  • 297 篇 日文
  • 125 篇 朝鲜文
  • 83 篇 土耳其文
  • 71 篇 德文
  • 54 篇 法文
  • 31 篇 斯洛文尼亚文
  • 20 篇 西班牙文
  • 15 篇 俄文
  • 12 篇 葡萄牙文
  • 9 篇 阿拉伯文
  • 6 篇 荷兰文
  • 5 篇 意大利文
  • 3 篇 爱沙尼亚文
  • 2 篇 捷克文
  • 2 篇 泰文
  • 1 篇 加泰罗尼亚文
检索条件"机构=Department of Computer Engineering of Computer Engineering"
728828 条 记 录,以下是51-60 订阅
排序:
A Review of Anonymization Algorithms and Methods in Big Data
收藏 引用
Annals of Data Science 2025年 第1期12卷 253-279页
作者: Shamsinejad, Elham Banirostam, Touraj Pedram, Mir Mohsen Rahmani, Amir Masoud Department of Computer Engineering Central Tehran Branch Islamic Azad University Tehran Iran Department of Electrical and Computer Engineering Faculty of Engineering Kharazmi University Tehran Iran Department of Computer Engineering Science and Research Branch Islamic Azad University Tehran Iran
In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of users. This study was conducted with the aim of finding a solution ... 详细信息
来源: 评论
A State-Migration Particle Swarm Optimizer for Adaptive Latent Factor Analysis of High-Dimensional and Incomplete Data
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2220-2235页
作者: Jiufang Chen Kechen Liu Xin Luo Ye Yuan Khaled Sedraoui Yusuf Al-Turki MengChu Zhou IEEE the College of Computer Science and Technology Chongqing University of Posts and Telecommunications the Department of Computer Science Columbia University the College of Computer and Information Science Southwest University the Department of Electrical and Computer Engineering Faculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Center of Research Excellence in Renewable Energy and Power Systems the Department of Electrical and Computer EngineeringFaculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Department of Electrical and Computer Engineering New Jersey Institute of Technology
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation lear... 详细信息
来源: 评论
An end-to-end network for co-saliency detection in one single image
收藏 引用
Science China(Information Sciences) 2023年 第11期66卷 5-22页
作者: Yuanhao YUE Qin ZOU Hongkai YU Qian WANG Zhongyuan WANG Song WANG School of Cyber Science and Engineering Wuhan University School of Computer Science Wuhan University Department of Electrical Engineering and Computer Science Cleveland State University Department of Computer Science and Engineering University of South Carolina
Co-saliency detection within a single image is a common vision problem that has not yet been well addressed. Existing methods often used a bottom-up strategy to infer co-saliency in an image in which salient regions a... 详细信息
来源: 评论
Enhancing Predictive Capabilities for Cyber Physical Systems Through Supervised Learning
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第16期49卷 77-86页
作者: Dhanalakshmi, B. Tamije Selvy, P. Department of Computer Science and Engineering Dr.N.G. P Institute of technology India Department of Computer Science and Engineering Hindusthan College of Engineering and Technology India
The rapid advancement and proliferation of Cyber-Physical Systems (CPS) have led to an exponential increase in the volume of data generated continuously. Efficient classification of this streaming data is crucial for ... 详细信息
来源: 评论
Bengali reduplication generation with finite-state transducers (FSTs)
收藏 引用
International Journal of Speech Technology 2024年 第3期27卷 729-737页
作者: Barman, Abhijit Saha, Diganta Pal, Alok Ranjan Department of Computer Science and Engineering Jadavpur University Kolkata700032 India Department of Computer Science and Engineering College of Engineering and Management Kolaghat721171 India
Reduplication is a highly productive process in Bengali word formation, with significant implications for various natural language processing (NLP) applications, such as parts-of-speech tagging and sentiment analysis.... 详细信息
来源: 评论
Building a Robust and Efficient Defensive System Using Hybrid Adversarial Attack
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第9期5卷 4470-4478页
作者: Dhanaraj, Rachel Selva Sridevi, M. Goa College of Engineering Computer Engineering Department Goa 403401 India National Institute of Technology Department of Computer Science and Engineering Tiruchirappalli620015 India
Adversarial attack is a method used to deceive machine learning models, which offers a technique to test the robustness of the given model, and it is vital to balance robustness with accuracy. Artificial intelligence ... 详细信息
来源: 评论
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks
收藏 引用
Digital Communications and Networks 2024年 第4期10卷 989-1000页
作者: Kumar Sekhar Roy Subhrajyoti Deb Hemanta Kumar Kalita Department of Computer Science and Engineering Manipal Institute of Technology BengaluruManipal Academy of Higher EducationManipal576104KarnatakaIndia Department of Computer Science&Engineering ICFAI UniversityAgartala799210India Department of Computer Science&Engineering Central Institute of TechnologyKokrajhar783370India
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the... 详细信息
来源: 评论
Applications of information technology (IT) in Iraq's petroleum industry
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer Science and Mathematics 2024年 第2期5卷 112-121页
作者: Alkhaisi, Whalaa Almadany, Yasser Almashhadni, Mohammad Ibrahim Albawi, Saad Diyala university Department of chemical engineering Iraq Diyala university Department of computer engineering Iraq College of Education Department of Computer Iraq
The crucial role of information technology (IT) in operating and managing industrial systems is widely recognized, and Iraq's IT capabilities hold great promise for its industrial and other economic sectors. The d... 详细信息
来源: 评论
Innovations in Mechanical Drawing and computer Graphics: Enhancing Precision and Visualization in engineering Design  4
Innovations in Mechanical Drawing and Computer Graphics: Enh...
收藏 引用
4th IEEE International Conference on ICT in Business Industry and Government, ICTBIG 2024
作者: Shrivastava, Anurag Goyal, Himanshu Rai Hussein, Layth Bansal, Saloni Sharma, Vishal Harikrishna, M. Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Tamilnadu Chennai India Graphic Era Deemed to be University Department of Computer Science & Engineering Dehradun India The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Gla University Department of Computer Engineering and Applications Mathura India Lovely Professional University Phagwara India Institute of Aeronautical Engineering Department of Computer Science and Engineering Telangana Hyderabad India
This study examines the significant advancements in computer graphics and mechanical drawing, with an emphasis on how these developments have revolutionised engineering design precision and visualisation. For engineer... 详细信息
来源: 评论
Residual-enhanced graph convolutional networks with hypersphere mapping for anomaly detection in attributed networks
收藏 引用
Data Science and Management 2025年 第2期8卷 137-146页
作者: Khan, Wasim Mohd, Afsaruddin Suaib, Mohammad Ishrat, Mohammad Shaikh, Anwar Ahamed Faisal, Syed Mohd Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram 522502 India Department of Computer Engineering & Applications GLA University Mathura281406 India Department of Computer Science and Engineering Integral University Lucknow226026 India
In the burgeoning field of anomaly detection within attributed networks, traditional methodologies often encounter the intricacies of network complexity, particularly in capturing nonlinearity and sparsity. This study... 详细信息
来源: 评论