咨询与建议

限定检索结果

文献类型

  • 201,413 篇 会议
  • 98,228 篇 期刊文献
  • 2,370 册 图书

馆藏范围

  • 302,011 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 179,921 篇 工学
    • 116,802 篇 计算机科学与技术...
    • 94,063 篇 软件工程
    • 45,139 篇 信息与通信工程
    • 27,880 篇 控制科学与工程
    • 25,144 篇 电子科学与技术(可...
    • 24,576 篇 电气工程
    • 19,385 篇 生物工程
    • 15,128 篇 生物医学工程(可授...
    • 14,728 篇 光学工程
    • 13,010 篇 机械工程
    • 11,113 篇 化学工程与技术
    • 10,583 篇 仪器科学与技术
    • 9,642 篇 动力工程及工程热...
    • 8,960 篇 材料科学与工程(可...
    • 6,543 篇 网络空间安全
    • 6,412 篇 安全科学与工程
    • 6,035 篇 交通运输工程
  • 102,585 篇 理学
    • 49,523 篇 数学
    • 35,733 篇 物理学
    • 22,068 篇 生物学
    • 15,830 篇 统计学(可授理学、...
    • 11,564 篇 化学
    • 11,153 篇 系统科学
  • 45,941 篇 管理学
    • 28,262 篇 管理科学与工程(可...
    • 19,438 篇 图书情报与档案管...
    • 12,900 篇 工商管理
  • 14,792 篇 医学
    • 12,382 篇 临床医学
    • 10,878 篇 基础医学(可授医学...
    • 6,776 篇 药学(可授医学、理...
  • 7,981 篇 法学
    • 6,437 篇 社会学
  • 5,121 篇 经济学
  • 4,114 篇 农学
  • 3,261 篇 教育学
  • 1,413 篇 文学
  • 761 篇 军事学
  • 445 篇 艺术学
  • 50 篇 哲学
  • 30 篇 历史学

主题

  • 9,644 篇 computer science
  • 7,102 篇 accuracy
  • 6,762 篇 feature extracti...
  • 6,039 篇 deep learning
  • 5,865 篇 computational mo...
  • 5,334 篇 machine learning
  • 5,244 篇 training
  • 4,119 篇 data mining
  • 3,880 篇 support vector m...
  • 3,681 篇 optimization
  • 3,533 篇 predictive model...
  • 3,441 篇 wireless sensor ...
  • 3,405 篇 internet of thin...
  • 3,151 篇 real-time system...
  • 3,146 篇 artificial intel...
  • 3,130 篇 convolutional ne...
  • 3,029 篇 neural networks
  • 2,875 篇 bandwidth
  • 2,868 篇 computer archite...
  • 2,861 篇 protocols

机构

  • 1,703 篇 department of co...
  • 1,346 篇 department of co...
  • 1,157 篇 university of ch...
  • 1,050 篇 physikalisches i...
  • 1,041 篇 cavendish labora...
  • 973 篇 department of ph...
  • 869 篇 infn laboratori ...
  • 862 篇 oliver lodge lab...
  • 821 篇 department of el...
  • 810 篇 department of el...
  • 783 篇 infn sezione di ...
  • 715 篇 school of comput...
  • 629 篇 department of el...
  • 617 篇 department of co...
  • 612 篇 infn sezione di ...
  • 552 篇 chitkara univers...
  • 533 篇 nikhef national ...
  • 515 篇 infn sezione di ...
  • 503 篇 school of comput...
  • 488 篇 university of sc...

作者

  • 247 篇 j. wang
  • 244 篇 niyato dusit
  • 242 篇 barter w.
  • 228 篇 s. chen
  • 225 篇 a. gomes
  • 213 篇 bellee v.
  • 212 篇 blake t.
  • 209 篇 bowcock t.j.v.
  • 209 篇 y. zhang
  • 203 篇 borsato m.
  • 203 篇 betancourt c.
  • 201 篇 beiter a.
  • 200 篇 c. alexa
  • 199 篇 brundu d.
  • 197 篇 j. m. izen
  • 194 篇 amato s.
  • 186 篇 c. amelung
  • 184 篇 g. bella
  • 184 篇 j. strandberg
  • 184 篇 d. calvet

语言

  • 282,019 篇 英文
  • 15,344 篇 其他
  • 4,490 篇 中文
  • 355 篇 日文
  • 52 篇 朝鲜文
  • 46 篇 德文
  • 39 篇 法文
  • 28 篇 斯洛文尼亚文
  • 10 篇 俄文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 2 篇 意大利文
  • 1 篇 加泰罗尼亚文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science Engineering and Information Technology"
302011 条 记 录,以下是131-140 订阅
排序:
Micro-expressions: a survey
收藏 引用
Multimedia Tools and Applications 2024年 第18期83卷 53165-53200页
作者: Jain, Ankita Bhakta, Dhananjoy Department of Computer Science and Engineering Indian Institute of Information Technology Ranchi Jharkhand Ranchi834010 India
This paper surveys some of the most important recent works related to micro-expression analysis. It includes discussions on algorithms for spotting and recognizing micro-expressions, their performances, databases, and... 详细信息
来源: 评论
Fuzzy vision image denoising algorithm based on Bayesian estimation
收藏 引用
International Journal of Reasoning-based Intelligent Systems 2025年 第1期17卷 24-31页
作者: Ye, Cong Department of Computer Science and Technology Suzhou College of Information Technology Jiangsu215200 China
A fuzzy visual image denoising algorithm based on Bayesian estimation is proposed to address the problems of poor denoising performance and long denoising time in traditional image denoising algorithms. First, analyse... 详细信息
来源: 评论
A review on spreading and Forensics Analysis of Windows-Based ransomware
收藏 引用
Annals of Data science 2024年 第5期11卷 1503-1524页
作者: Chayal, Narendrakumar Mangilal Saxena, Ankur Khan, Rijwan Department of Computer Science and Technology Faculty of Engineering and Technology Department of Computer Engineering Sankalchand Patel University Visnagar India Department of Computer Science Indus Institute of Information and Communication Technology Dean-ICT & ampDirector-IIICT Indus University Gujarat Ahmedabad India Department of Computer Science and Engineering ABES Institute of Technology Ghaziabad Affiliated to AKTU Lucknow India
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals... 详细信息
来源: 评论
Deep Learning Based Signal Detection for Quadrature Spatial Modulation System
收藏 引用
China Communications 2024年 第10期21卷 78-85页
作者: Shu Dingyun Peng Yuyang Yue Ming Fawaz AL-Hazemi Mohammad Meraj Mirza School of Computer Science and Engineering Macao University of Science and TechnologyMacaoChina Department of Computer and Network Engineering University of JeddahSaudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia
With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. ... 详细信息
来源: 评论
Multiclass Classification for Cyber Threats Detection on Twitter
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3853-3866页
作者: Adnan Hussein Abdulwahab Ali Almazroi College of Computer Science and Engineering Department of Computer ScienceAL-Ahgaff UniversityMukallaYemen College of Computing and Information Technology at Khulais Department of Information TechnologyUniversity of JeddahJeddahSaudi Arabia
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not ... 详细信息
来源: 评论
Predictive VNF auto-scaling based on genetic programming
收藏 引用
Neural Computing and Applications 2025年 第5期37卷 3129-3150页
作者: Nikbazm, Rojia Ahmadi, Mahmood Computer Engineering and Information Technology Department Razi Univeristy Kermanshah Iran
With the continuous growth of cloud computing and virtualization technology, network function virtualization (NFV) techniques have been significantly enhanced. NFV has many advantages such as simplified services, prov... 详细信息
来源: 评论
TRE-DSP:A traceable and revocable CP-ABE based data sharing scheme for IoV with partially hidden policy
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 455-464页
作者: Yousheng Zhou Rundong Peng Yuanni Liu Pandi Vijayakumar Brij Gupta College of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing 400065China Department of Computer Science and Engineering University College of EngineeringTindivanamMelpakkamTamil nadu 604001India Department of Computer Engineering National Institute of Technology KurukshetraIndia
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri... 详细信息
来源: 评论
AMachine Learning Approach to User Profiling for Data Annotation of Online Behavior
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2419-2440页
作者: Moona Kanwal Najeed AKhan Aftab A.Khan Computer Science and Information Technology Department NED University of Engineering and TechnologyKarachiPakistan Computer Engineering Department Sir Syed University of Engineering and TechnologyKarachiPakistan College of Education Health and Human ServicesLongwood UniversityFarmvilleVAUSA
The user’s intent to seek online information has been an active area of research in user *** profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and *** u... 详细信息
来源: 评论
A fully flexible key delegation mechanism with efficient fine-grained access control in CP-ABE
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第9期14卷 12837-12856页
作者: Porwal, Shardha Mittal, Sangeeta Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida India
Ciphertext Policy-Attribute Based Encryption (CP-ABE) is a secure one-to-many asymmetric encryption schemes where access control of a shared resource is defined in terms of a set of attributes possessed by a user. Key... 详细信息
来源: 评论
Constructing multi-modal emotion recognition model based on convolutional neural network
收藏 引用
Multimedia Tools and Applications 2024年 1-26页
作者: Kuo, Jong-Yih Hsieh, Ti-Feng Lin, Ta-Yu Department of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan
As society advances, an increasing number of individuals spend significant time interacting with computers daily. To enhance the human-computer interaction experience, it has become crucial to augment the computer’s ... 详细信息
来源: 评论