咨询与建议

限定检索结果

文献类型

  • 538,687 篇 会议
  • 187,067 篇 期刊文献
  • 3,689 册 图书
  • 2 篇 科技报告
  • 1 篇 学位论文

馆藏范围

  • 729,442 篇 电子文献
  • 18 种 纸本馆藏

日期分布

学科分类号

  • 397,352 篇 工学
    • 226,910 篇 计算机科学与技术...
    • 181,322 篇 软件工程
    • 96,493 篇 信息与通信工程
    • 74,673 篇 电气工程
    • 73,686 篇 电子科学与技术(可...
    • 64,967 篇 控制科学与工程
    • 38,547 篇 生物工程
    • 33,589 篇 光学工程
    • 31,112 篇 生物医学工程(可授...
    • 28,229 篇 机械工程
    • 24,836 篇 仪器科学与技术
    • 24,208 篇 动力工程及工程热...
    • 23,261 篇 化学工程与技术
    • 22,231 篇 材料科学与工程(可...
    • 12,224 篇 安全科学与工程
    • 11,946 篇 交通运输工程
  • 224,027 篇 理学
    • 106,084 篇 数学
    • 84,448 篇 物理学
    • 43,190 篇 生物学
    • 34,095 篇 统计学(可授理学、...
    • 28,184 篇 系统科学
    • 24,817 篇 化学
  • 83,261 篇 管理学
    • 52,264 篇 管理科学与工程(可...
    • 33,973 篇 图书情报与档案管...
    • 26,079 篇 工商管理
  • 28,389 篇 医学
    • 23,661 篇 临床医学
    • 20,835 篇 基础医学(可授医学...
    • 13,144 篇 药学(可授医学、理...
  • 15,107 篇 法学
    • 12,484 篇 社会学
  • 10,438 篇 经济学
    • 10,380 篇 应用经济学
  • 7,253 篇 农学
  • 6,807 篇 教育学
  • 3,384 篇 文学
  • 1,709 篇 军事学
  • 817 篇 艺术学
  • 110 篇 哲学
  • 59 篇 历史学

主题

  • 20,524 篇 computer science
  • 16,411 篇 computational mo...
  • 12,676 篇 accuracy
  • 12,588 篇 feature extracti...
  • 12,058 篇 bandwidth
  • 10,331 篇 computer archite...
  • 10,071 篇 training
  • 10,026 篇 delay
  • 9,952 篇 costs
  • 9,950 篇 testing
  • 9,935 篇 machine learning
  • 9,810 篇 hardware
  • 9,791 篇 control systems
  • 9,752 篇 application soft...
  • 9,573 篇 algorithm design...
  • 9,553 篇 deep learning
  • 9,265 篇 wireless sensor ...
  • 8,963 篇 robustness
  • 8,767 篇 neural networks
  • 8,751 篇 mathematical mod...

机构

  • 5,287 篇 department of el...
  • 1,670 篇 department of co...
  • 1,340 篇 ieee
  • 1,314 篇 department of co...
  • 1,288 篇 department of el...
  • 1,277 篇 department of el...
  • 1,146 篇 department of el...
  • 1,080 篇 department of el...
  • 1,018 篇 department of el...
  • 985 篇 department of el...
  • 963 篇 department of ph...
  • 948 篇 department of el...
  • 939 篇 cavendish labora...
  • 809 篇 oliver lodge lab...
  • 806 篇 physikalisches i...
  • 780 篇 department of co...
  • 775 篇 department of el...
  • 775 篇 department of el...
  • 720 篇 university of ch...
  • 706 篇 department of el...

作者

  • 264 篇 j. wang
  • 252 篇 s. chen
  • 244 篇 barter w.
  • 221 篇 blake t.
  • 217 篇 bellee v.
  • 217 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 207 篇 han zhu
  • 206 篇 amato s.
  • 206 篇 a. gomes
  • 205 篇 brundu d.
  • 204 篇 boettcher t.
  • 203 篇 beiter a.
  • 193 篇 c. alexa
  • 190 篇 c. amelung
  • 190 篇 niyato dusit
  • 188 篇 j. m. izen
  • 188 篇 g. bella
  • 188 篇 j. strandberg

语言

  • 691,119 篇 英文
  • 29,712 篇 其他
  • 8,388 篇 中文
  • 297 篇 日文
  • 126 篇 朝鲜文
  • 83 篇 土耳其文
  • 71 篇 德文
  • 54 篇 法文
  • 31 篇 斯洛文尼亚文
  • 20 篇 西班牙文
  • 15 篇 俄文
  • 12 篇 葡萄牙文
  • 9 篇 阿拉伯文
  • 6 篇 荷兰文
  • 5 篇 意大利文
  • 3 篇 爱沙尼亚文
  • 2 篇 捷克文
  • 2 篇 泰文
  • 1 篇 加泰罗尼亚文
检索条件"机构=Department of Computer Engineering of Computer Engineering"
729446 条 记 录,以下是591-600 订阅
排序:
Probe Attack Detection Using an Improved Intrusion Detection System
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 4769-4784页
作者: Abdulaziz Almazyad Laila Halman Alaa Alsaeed Department of Computer Engineering College of Computer ScienceKing Saud UniversityRiyadh11421Saudi Arabia
The novel SoftwareDefined Networking(SDN)architecture potentially resolves specific challenges arising from rapid internet growth of and the static nature of conventional networks to manage organizational business req... 详细信息
来源: 评论
Derandomizing Codes for the Adversarial Wiretap Channel of Type II
收藏 引用
IEEE Transactions on Information Theory 2025年 第6期71卷 4686-4707页
作者: Ruzomberka, Eric Nikbakht, Homa Brinton, Christopher G. Love, David J. Vincent Poor, H. Air Force Institute of Technology Department of Electrical and Computer Engineering DaytonOH45433 United States Princeton University Department of Electrical and Computer Engineering PrincetonNJ08540 United States Purdue University Elmore Family School of Electrical and Computer Engineering West LafayetteIN47907 United States
The adversarial wiretap channel of type II (AWTC-II) is a communication channel that can a) read a fraction of the transmitted symbols up to a given bound and b) induce both errors and erasures in a fraction of the sy... 详细信息
来源: 评论
VoWi-Fi security threats: Address resolution protocol attack and countermeasures
收藏 引用
IET Networks 2024年 第2期13卷 129-146页
作者: Lu, Kuan-Chu Liu, I.-Hsien Chang, Keng-Hao Li, Jung-Shian Department of Electrical Engineering Institute of Computer and Communication Engineering National Cheng Kung University Tainan Taiwan
B5G/6G networks are facing challenges in the deployment of additional base stations. However, Taiwan's four major operators have launched VoWi-Fi calling services to maintain signal quality and coverage for custom... 详细信息
来源: 评论
A novel deep learning approach (Bi-xBcNet-96) considering green AI to discover breast cancer using mammography images
收藏 引用
Neural Computing and Applications 2024年 第21期36卷 12701-12723页
作者: El-Mawla, Nesma Abd Berbar, Mohamed A. El-Fishawy, Nawal A. El-Rashidy, Mohamed A. Communication and Electronics Engineering Department Nile Higher Institute for Engineering and Technology Mansoura Egypt Department of Computer Science and Engineering Faculty of Electronic Engineering Menoufia University Shebeen El-Kom Egypt Department of Computer Arab East Colleges Riyadh Saudi Arabia
Clinical decision support systems (CDSSs) can effectively detect illnesses such as breast cancer (BC) using a variety of medical imaging techniques. BC is a key factor contributing to the rise in the death rate among ... 详细信息
来源: 评论
Author profiling from Romanized Urdu text using transfer learning models
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4455-4470页
作者: Ali, Abid khan, Muhammad Sohail Khan, Muhammad Amin Khan, Sajid Ullah Khan, Faheem Department of Computer Software Engineering University of Engineering & Technology Mardan KPK Mardan23200 Pakistan Islamabad H-11/4 Islamabad44000 Pakistan Department of Information Systems College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj Saudi Arabia Department of Computer Engineering Gachon University Seongnam-Si Korea Republic of
This research concentrates on author profiling using transfer learning models for classifying age and gender. The investigation encompassed a diverse set of transfer learning techniques, including Roberta, BERT, ALBER... 详细信息
来源: 评论
Photometric Analysis in Designing 5G Enabled Smart Indoor-Campus Network Using VLC  6
Photometric Analysis in Designing 5G Enabled Smart Indoor-Ca...
收藏 引用
6th International Conference on Electrical engineering and Information and Communication Technology, ICEEICT 2024
作者: Rahman, Muhammad Towfiqur Haque, Maria Akhtaruzzaman, M. Department of Computer Science & Engineering Bangladesh Department of Computer Science & Engineering Dhaka Bangladesh
In recent decades, there has been a notable surge in interest surrounding visible light communication (VLC), which utilizes visible light as a means of transmission. LEDs have emerged as the preferred light source for... 详细信息
来源: 评论
AI-Driven Resource and Communication-Aware Virtual Machine Placement Using Multi-Objective Swarm Optimization for Enhanced Efficiency in Cloud-Based Smart Manufacturing
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 4743-4756页
作者: Praveena Nuthakki Pavan Kumar T. Musaed Alhussein Muhammad Shahid Anwar Khursheed Aurangzeb Leenendra Chowdary Gunnam Department of Computer Science&Engineering Koneru Lakshmaiah Education FoundationGuntur522302India Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Department of AI and Software Gachon UniversitySeongnam-Si13120Republic of Korea Department of Electronics and Communication Engineering SRM UniversityAmaravati522502India
Cloud computing has emerged as a vital platform for processing resource-intensive workloads in smart manu-facturing environments,enabling scalable and flexible access to remote data centers over the *** these environm... 详细信息
来源: 评论
Comprehensive analysis of multiple machine learning techniques for rock slope failure prediction
收藏 引用
Journal of Rock Mechanics and Geotechnical engineering 2024年 第11期16卷 4386-4398页
作者: Arsalan Mahmoodzadeh Abed Alanazi Adil Hussein Mohammed Hawkar Hashim Ibrahim Abdullah Alqahtani Shtwai Alsubai Ahmed Babeker Elhag Department of Civil Engineering University of HalabjaHalabjaKurdistan Region46018Iraq Department of Computer Science College of Computer Engineering and Sciences in Al-KharjPrince Sattam bin Abdulaziz UniversityP.O.Box 151Al-Kharj11942Saudi Arabia Department of Communication and Computer Engineering Faculty of EngineeringCihan University-ErbilKurdistan RegionIraq Department of Civil Engineering College of EngineeringSalahaddin University-Erbil44002ErbilKurdistan RegionIraq Software Engineering Department College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityP.O.Box 151Al-Kharj11942Saudi Arabia Department of Civil Engineering College of EngineeringKing Khalid UniversityAbha61413Saudi Arabia
In this study,twelve machine learning(ML)techniques are used to accurately estimate the safety factor of rock slopes(SFRS).The dataset used for developing these models consists of 344 rock slopes from various open-pit... 详细信息
来源: 评论
Machine Vision Based Fish Cutting Point Prediction for Target Weight
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 2247-2263页
作者: Yonghun Jang Yeong-Seok Seo Department of Computer Engineering Yeungnam UniversityGyeongsan38541Korea
Food processing companies pursue the distribution of ingredientsthat were packaged according to a certain weight. Particularly, foods like fishare highly demanded and supplied. However, despite the high quantity offis... 详细信息
来源: 评论
A review on spreading and Forensics Analysis of Windows-Based ransomware
收藏 引用
Annals of Data Science 2024年 第5期11卷 1503-1524页
作者: Chayal, Narendrakumar Mangilal Saxena, Ankur Khan, Rijwan Department of Computer Science and Technology Faculty of Engineering and Technology Department of Computer Engineering Sankalchand Patel University Visnagar India Department of Computer Science Indus Institute of Information and Communication Technology Dean-ICT & ampDirector-IIICT Indus University Gujarat Ahmedabad India Department of Computer Science and Engineering ABES Institute of Technology Ghaziabad Affiliated to AKTU Lucknow India
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals... 详细信息
来源: 评论