咨询与建议

限定检索结果

文献类型

  • 201,413 篇 会议
  • 98,228 篇 期刊文献
  • 2,370 册 图书

馆藏范围

  • 302,011 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 179,921 篇 工学
    • 116,802 篇 计算机科学与技术...
    • 94,063 篇 软件工程
    • 45,139 篇 信息与通信工程
    • 27,880 篇 控制科学与工程
    • 25,144 篇 电子科学与技术(可...
    • 24,576 篇 电气工程
    • 19,385 篇 生物工程
    • 15,128 篇 生物医学工程(可授...
    • 14,728 篇 光学工程
    • 13,010 篇 机械工程
    • 11,113 篇 化学工程与技术
    • 10,583 篇 仪器科学与技术
    • 9,642 篇 动力工程及工程热...
    • 8,960 篇 材料科学与工程(可...
    • 6,543 篇 网络空间安全
    • 6,412 篇 安全科学与工程
    • 6,035 篇 交通运输工程
  • 102,585 篇 理学
    • 49,523 篇 数学
    • 35,733 篇 物理学
    • 22,068 篇 生物学
    • 15,830 篇 统计学(可授理学、...
    • 11,564 篇 化学
    • 11,153 篇 系统科学
  • 45,941 篇 管理学
    • 28,262 篇 管理科学与工程(可...
    • 19,438 篇 图书情报与档案管...
    • 12,900 篇 工商管理
  • 14,792 篇 医学
    • 12,382 篇 临床医学
    • 10,878 篇 基础医学(可授医学...
    • 6,776 篇 药学(可授医学、理...
  • 7,981 篇 法学
    • 6,437 篇 社会学
  • 5,121 篇 经济学
  • 4,114 篇 农学
  • 3,261 篇 教育学
  • 1,413 篇 文学
  • 761 篇 军事学
  • 445 篇 艺术学
  • 50 篇 哲学
  • 30 篇 历史学

主题

  • 9,644 篇 computer science
  • 7,102 篇 accuracy
  • 6,762 篇 feature extracti...
  • 6,039 篇 deep learning
  • 5,865 篇 computational mo...
  • 5,334 篇 machine learning
  • 5,244 篇 training
  • 4,119 篇 data mining
  • 3,880 篇 support vector m...
  • 3,681 篇 optimization
  • 3,533 篇 predictive model...
  • 3,441 篇 wireless sensor ...
  • 3,405 篇 internet of thin...
  • 3,151 篇 real-time system...
  • 3,146 篇 artificial intel...
  • 3,130 篇 convolutional ne...
  • 3,029 篇 neural networks
  • 2,875 篇 bandwidth
  • 2,868 篇 computer archite...
  • 2,861 篇 protocols

机构

  • 1,703 篇 department of co...
  • 1,346 篇 department of co...
  • 1,157 篇 university of ch...
  • 1,050 篇 physikalisches i...
  • 1,041 篇 cavendish labora...
  • 973 篇 department of ph...
  • 869 篇 infn laboratori ...
  • 862 篇 oliver lodge lab...
  • 821 篇 department of el...
  • 810 篇 department of el...
  • 783 篇 infn sezione di ...
  • 715 篇 school of comput...
  • 629 篇 department of el...
  • 617 篇 department of co...
  • 612 篇 infn sezione di ...
  • 552 篇 chitkara univers...
  • 533 篇 nikhef national ...
  • 515 篇 infn sezione di ...
  • 503 篇 school of comput...
  • 488 篇 university of sc...

作者

  • 247 篇 j. wang
  • 244 篇 niyato dusit
  • 242 篇 barter w.
  • 228 篇 s. chen
  • 225 篇 a. gomes
  • 213 篇 bellee v.
  • 212 篇 blake t.
  • 209 篇 bowcock t.j.v.
  • 209 篇 y. zhang
  • 203 篇 borsato m.
  • 203 篇 betancourt c.
  • 201 篇 beiter a.
  • 200 篇 c. alexa
  • 199 篇 brundu d.
  • 197 篇 j. m. izen
  • 194 篇 amato s.
  • 186 篇 c. amelung
  • 184 篇 g. bella
  • 184 篇 j. strandberg
  • 184 篇 d. calvet

语言

  • 282,019 篇 英文
  • 15,344 篇 其他
  • 4,490 篇 中文
  • 355 篇 日文
  • 52 篇 朝鲜文
  • 46 篇 德文
  • 39 篇 法文
  • 28 篇 斯洛文尼亚文
  • 10 篇 俄文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 2 篇 意大利文
  • 1 篇 加泰罗尼亚文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science Engineering and Information Technology"
302011 条 记 录,以下是4981-4990 订阅
排序:
A fast verifiable fully homomorphic encryption technique for secret computation on cloud data
收藏 引用
International Journal of information technology (Singapore) 2025年 第4期17卷 2193-2207页
作者: Mahato, Ganesh Kumar Chakraborty, Swarnendu Kumar Department of Computer Science and Engineering National Institute of Technology Arunachal Pradesh Jote 791113 India
In the domain of cloud computing, safeguarding the confidentiality and integrity of outsourced sensitive data during computational processes is of utmost importance. This paper introduces a pioneering verifiable homom... 详细信息
来源: 评论
Tourism Route Recommendation Based on A Multi-Objective Evolutionary Algorithm Using Two-Stage Decomposition and Pareto Layering
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第2期10卷 486-500页
作者: Xiaoyao Zheng Baoting Han Zhen Ni IEEE the School of Computer and Information Anhui Normal UniversityWuhu 241002China the Department of Electrical Engineering and Computer Science Florida Atlantic UniversityBoca Raton FL33431 USA
Tourism route planning is widely applied in the smart tourism *** Pareto-optimal front obtained by the traditional multi-objective evolutionary algorithm exhibits long tails,sharp peaks and disconnected regions proble... 详细信息
来源: 评论
Deep Learning Based Cervical Cancer Detection Using Hunter Prey Optimizer Algorithm
Deep Learning Based Cervical Cancer Detection Using Hunter P...
收藏 引用
2024 International Conference on System, Computation, Automation and Networking, ICSCAN 2024
作者: Arikaran, N. Shanmugapriya, S. Shamili Sathishkumar, R. Barseth, A. Mohamed Sai, S. Sriram Vishvesh, S. Manakula Vinayagar Institute of Technology Department of Computer Science and Engineering Puducherry India Sri Venkateswara College of Engineering Department of Computer Science and Engineering Chennai India
Deep learning (DL) is a widely employed technique in many different sectors these days, including medicine. Many problems that may be difficult to solve with traditional synthetic intelligence (AI) strategies can be s... 详细信息
来源: 评论
Deep learning on medical image analysis
收藏 引用
CAAI Transactions on Intelligence technology 2025年 第1期10卷 1-35页
作者: Jiaji Wang Shuihua Wang Yudong Zhang School of Computing and Mathematical Sciences University of LeicesterLeicesterUK Department of Biological Sciences Xi'an Jiaotong-Liverpool UniversitySuzhouJiangsuChina Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia School of Computer Science and Engineering Southeast UniversityNanjingJiangsuChina
Medical image analysis plays an irreplaceable role in diagnosing,treating,and monitoring various *** neural networks(CNNs)have become popular as they can extract intricate features and patterns from extensive *** pape... 详细信息
来源: 评论
CRRC: Coordinating Retention Errors, Read Disturb Errors and Huffman Coding on TLC NAND Flash Memory
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2023年 第3期20卷 2208-2220页
作者: Yu, Ta-Ching Wu, Chin-Hsien Liao, Yan-Qi National Taiwan University of Science and Technology Department of Electronic and Computer Engineering Taipei106 Taiwan
Nowadays, TLC NAND flash memory has become a mainstream storage medium because of its large capacity and low cost. However, TLC NAND flash memory could have the reliability problem (such as the retention errors and th... 详细信息
来源: 评论
An Automated Real-Time Face Mask Detection System Using Transfer Learning with Faster-RCNN in the Era of the COVID-19 Pandemic
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 4151-4166页
作者: Maha Farouk S.Sabir Irfan Mehmood Wafaa Adnan Alsaggaf Enas Fawai Khairullah Samar Alhuraiji Ahmed S.Alghamdi Ahmed A.Abd El-Latif Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversitySaudi Arabia Centre for Visual Computing Faculty of Engineering and InformaticsUniversity of BradfordBradfordU.K Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahP.O.Box 23713Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahSaudi Arabia Department of Mathematics and Computer Science Faculty of ScienceMenoufia University32511Egypt
Today,due to the pandemic of COVID-19 the entire world is facing a serious health *** to the World Health Organization(WHO),people in public places should wear a face mask to control the rapid transmission of *** gove... 详细信息
来源: 评论
Enhancing Wireless Sensor Network Efficiency through Al-Biruni Earth Radius Optimization
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 3549-3568页
作者: Reem Ibrahim Alkanhel Doaa Sami Khafaga Ahmed Mohamed Zaki Marwa M.Eid Abdyalaziz A.Al-Mooneam Abdelhameed Ibrahim S.K.Towfek Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Computer Science and Intelligent Systems Research Center BlacksburgVirginia24060USA Delta Higher Institute for Engineering and Technology Mansoura35511Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Artificial Intelligence and Computational Intelligence Research Center MeridenConnecticut06450USA School of ICT Faculty of EngineeringDesign and Information&Communications Technology(EDICT)Bahrain PolytechnicP.O.Box 33349Isa TownBahrain
The networks of wireless sensors provide the ground for a range of applications,including environmental moni-toring and industrial *** the networks can overcome obstacles like power and communication reliability and s... 详细信息
来源: 评论
Detecting Public Hate Sentiment Using Transformers  14
Detecting Public Hate Sentiment Using Transformers
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Mitra, Sowmen Kanungoe, Proma Hebei University of Technology Department of Computer Science and Technology Department of Artifical Intelligence Beijing China Vellore Institute of Technology School of Information Technology and Engineering Department of Information Technology Vellore India
This research explores the application of deep learning techniques, specifically BERT and DistilBERT models, for detecting public hate sentiment in text data. Through a systematic analysis of the literature and a thor... 详细信息
来源: 评论
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2637-2664页
作者: Reshma Siyal Muhammad Asim Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug School of Computer Science and Engineering Central South UniversityChangsha410083China EIAS LAB College of Computer and Information Sciencesand Center of Excellence in Quantum and Intelligent ComputingPrince Sultan UniversityRiyadh11586Saudi Arabia Gianforte School of Computing Montana State UniversityBozemanMT 59717USA Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... 详细信息
来源: 评论
A Game Theoretic Link Scheduler for Wireless Networks with Heterogeneous Energy Sources
收藏 引用
China Communications 2024年 第12期21卷 108-125页
作者: He Tengjiao Kwanwu Chin Wang Yishun Sieteng Soh College of Information Science and Technology Jinan UniversityGuangzhouChina School of Electrical Computer and Telecommunications EngineeringUniversity of WollongongNSWAustralia School of Electrical Engineering Computing and Mathematical SciencesCurtin UniversityWAAustralia
This paper considers link scheduling in a wireless network comprising of two types of nodes:(i)hybrid access points(HAPs)that harvest solar en-ergy,and(ii)devices that harvest radio frequency(RF)energy whenever HAPs *... 详细信息
来源: 评论