咨询与建议

限定检索结果

文献类型

  • 33,854 篇 会议
  • 17,991 篇 期刊文献
  • 631 册 图书

馆藏范围

  • 52,476 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 32,277 篇 工学
    • 23,428 篇 计算机科学与技术...
    • 18,784 篇 软件工程
    • 9,084 篇 信息与通信工程
    • 5,558 篇 控制科学与工程
    • 4,075 篇 电气工程
    • 3,894 篇 生物工程
    • 3,737 篇 电子科学与技术(可...
    • 2,924 篇 生物医学工程(可授...
    • 2,323 篇 光学工程
    • 2,282 篇 机械工程
    • 1,740 篇 仪器科学与技术
    • 1,732 篇 动力工程及工程热...
    • 1,697 篇 网络空间安全
    • 1,571 篇 安全科学与工程
    • 1,429 篇 化学工程与技术
    • 1,330 篇 交通运输工程
  • 17,290 篇 理学
    • 9,084 篇 数学
    • 4,951 篇 物理学
    • 4,394 篇 生物学
    • 2,942 篇 统计学(可授理学、...
    • 2,060 篇 系统科学
    • 1,597 篇 化学
  • 9,408 篇 管理学
    • 5,930 篇 管理科学与工程(可...
    • 3,860 篇 图书情报与档案管...
    • 2,655 篇 工商管理
  • 3,193 篇 医学
    • 2,645 篇 临床医学
    • 2,333 篇 基础医学(可授医学...
    • 1,461 篇 公共卫生与预防医...
    • 1,379 篇 药学(可授医学、理...
  • 1,631 篇 法学
    • 1,304 篇 社会学
  • 964 篇 经济学
  • 787 篇 农学
  • 620 篇 教育学
  • 290 篇 文学
  • 147 篇 军事学
  • 104 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 1,592 篇 computer science
  • 1,387 篇 deep learning
  • 1,373 篇 accuracy
  • 1,226 篇 machine learning
  • 1,215 篇 feature extracti...
  • 977 篇 computational mo...
  • 874 篇 training
  • 869 篇 internet of thin...
  • 717 篇 support vector m...
  • 714 篇 artificial intel...
  • 696 篇 data mining
  • 617 篇 predictive model...
  • 582 篇 convolutional ne...
  • 579 篇 optimization
  • 566 篇 wireless sensor ...
  • 540 篇 real-time system...
  • 511 篇 cloud computing
  • 509 篇 security
  • 468 篇 information tech...
  • 414 篇 educational inst...

机构

  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 283 篇 faculty of scien...
  • 279 篇 department of co...
  • 275 篇 department of ph...
  • 273 篇 departamento de ...
  • 265 篇 department of ph...
  • 259 篇 faculté des scie...
  • 258 篇 department for p...
  • 255 篇 department of ph...
  • 250 篇 department of ph...
  • 221 篇 department of ph...
  • 221 篇 department of ph...
  • 216 篇 physics division...
  • 197 篇 department of ph...
  • 162 篇 department of co...
  • 162 篇 department of co...
  • 157 篇 department of co...
  • 156 篇 maharishi school...
  • 154 篇 centre de calcul...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 265 篇 a. c. könig
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 261 篇 m. rijssenbeek
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 257 篇 s. jin
  • 256 篇 g. gaudio
  • 248 篇 d. guest
  • 245 篇 s. mohapatra
  • 243 篇 y. tayalati
  • 217 篇 y. nagasaka

语言

  • 49,848 篇 英文
  • 2,017 篇 其他
  • 614 篇 中文
  • 44 篇 日文
  • 10 篇 斯洛文尼亚文
  • 8 篇 法文
  • 6 篇 德文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science Engineering&Information Technology"
52476 条 记 录,以下是81-90 订阅
排序:
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of Systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论
A Local Differential Privacy Trajectory Protection Method Based on Temporal and Spatial Restrictions for Staying Detection
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 617-633页
作者: Weiqi Zhang Zhenzhen Xie Akshita Maradapu Vera Venkata Sai Qasim Zia Zaobo He Guisheng Yin College of Computer Science and Technology Harbin Engineering UniversityHarbin 150001China School of Computer Science and Technology Shandong UniversityQingdao 266237China Department of Computer Science Georgia State UniversityAtlantaGA 30303USA College of Information Science and Technology Jinan UniversityGuangzhou 510632China
The widespread availability of GPS has opened up a whole new market that provides a plethora of location-based ***-based social networks have become very popular as they provide end users like us with several such ser... 详细信息
来源: 评论
Semantic Segmentation of Lumbar Vertebrae Using Meijering U-Net(MU-Net)on Spine Magnetic Resonance Images
收藏 引用
computer Modeling in engineering & sciences 2025年 第1期142卷 733-757页
作者: Lakshmi S V V Shiloah Elizabeth Darmanayagam Sunil Retmin Raj Cyril Department of Computer Science and Engineering College of Engineering GuindyAnna UniversityChennai600025India Department of Information Technology Madras Institute of TechnologyAnna UniversityChrompetChennai600044India
Lower back pain is one of the most common medical problems in the world and it is experienced by a huge percentage of people *** to its ability to produce a detailed view of the soft tissues,including the spinal cord,... 详细信息
来源: 评论
IoT-Based Women Safety Gadgets (WSG): Vision, Architecture, and Design Trends
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 1027-1045页
作者: Sharad Saxena Shailendra Mishra Mohammed Baljon Shamiksha Mishra Sunil Kumar Sharma Prakhar Goel Shubham Gupta Vinay Kishore Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyPatialaPunjab147001India Department of Computer Engineering College of Computer&Information ScienceMajmaah UniversityMajmaah11952Saudi Arabia Department of Computer Science and Engineering National Institute of TechnologyJamshedpur831001India
In recent years,the growth of female employees in the commercial market and industries has *** a result,some people think travelling to distant and isolated locations during odd hours generates new threats to women’s... 详细信息
来源: 评论
Single-Valued Neutrosophic Graph with Heptapartitioend Structure
收藏 引用
Neutrosophic Sets and Systems 2025年 80卷 728-748页
作者: Fathi, Hanaa Myvizhi, M. Abdelhafeez, Ahmed Abdellah, Mohamed Refaat Eassa, Mohamed Sawah, Mohamed S. Elbehiery, Hussam College of Information Technology Amman Arab University Amman Jordan KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut... 详细信息
来源: 评论
Micro-expressions: a survey
收藏 引用
Multimedia Tools and Applications 2024年 第18期83卷 53165-53200页
作者: Jain, Ankita Bhakta, Dhananjoy Department of Computer Science and Engineering Indian Institute of Information Technology Ranchi Jharkhand Ranchi834010 India
This paper surveys some of the most important recent works related to micro-expression analysis. It includes discussions on algorithms for spotting and recognizing micro-expressions, their performances, databases, and... 详细信息
来源: 评论
REAL-TIME GLUCOSE MONITORING SYSTEM AND DIETARY RECOMMENDATIONS FOR DIABETES MELLITUS USING FOG COMPUTING
收藏 引用
Telecommunications and Radio engineering (English translation of Elektrosvyaz and Radiotekhnika) 2025年 第5期84卷 55-67页
作者: Sathish, N. Elangovan, D. Nagalakshmi, R. Suresh, G. Chitra, Devi D. Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India Department of Information Technology Saveetha Engineering College Chennai India Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India Department of Artificial Intelligence and Data Science Kings Engineering College Sriperumbudur India Department of Computer Science And Engineering S.A. Engineering College Chennai India
This systematic review gave special attention to diabetes and the advancements in food and nutrition needed to prevent or manage diabetes in all its forms. There are two main forms of diabetes mellitus: Type 1 (T1D) a... 详细信息
来源: 评论
A review on spreading and Forensics Analysis of Windows-Based ransomware
收藏 引用
Annals of Data science 2024年 第5期11卷 1503-1524页
作者: Chayal, Narendrakumar Mangilal Saxena, Ankur Khan, Rijwan Department of Computer Science and Technology Faculty of Engineering and Technology Department of Computer Engineering Sankalchand Patel University Visnagar India Department of Computer Science Indus Institute of Information and Communication Technology Dean-ICT & ampDirector-IIICT Indus University Gujarat Ahmedabad India Department of Computer Science and Engineering ABES Institute of Technology Ghaziabad Affiliated to AKTU Lucknow India
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals... 详细信息
来源: 评论
Deep Learning Based Signal Detection for Quadrature Spatial Modulation System
收藏 引用
China Communications 2024年 第10期21卷 78-85页
作者: Shu Dingyun Peng Yuyang Yue Ming Fawaz AL-Hazemi Mohammad Meraj Mirza School of Computer Science and Engineering Macao University of Science and TechnologyMacaoChina Department of Computer and Network Engineering University of JeddahSaudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia
With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. ... 详细信息
来源: 评论
Multiclass Classification for Cyber Threats Detection on Twitter
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3853-3866页
作者: Adnan Hussein Abdulwahab Ali Almazroi College of Computer Science and Engineering Department of Computer ScienceAL-Ahgaff UniversityMukallaYemen College of Computing and Information Technology at Khulais Department of Information TechnologyUniversity of JeddahJeddahSaudi Arabia
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not ... 详细信息
来源: 评论