咨询与建议

限定检索结果

文献类型

  • 201,379 篇 会议
  • 97,726 篇 期刊文献
  • 2,377 册 图书

馆藏范围

  • 301,482 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 179,474 篇 工学
    • 116,484 篇 计算机科学与技术...
    • 94,076 篇 软件工程
    • 44,992 篇 信息与通信工程
    • 27,595 篇 控制科学与工程
    • 25,061 篇 电子科学与技术(可...
    • 24,452 篇 电气工程
    • 19,360 篇 生物工程
    • 15,110 篇 生物医学工程(可授...
    • 14,763 篇 光学工程
    • 13,000 篇 机械工程
    • 11,076 篇 化学工程与技术
    • 10,589 篇 仪器科学与技术
    • 9,603 篇 动力工程及工程热...
    • 8,867 篇 材料科学与工程(可...
    • 6,500 篇 网络空间安全
    • 6,401 篇 安全科学与工程
    • 6,011 篇 交通运输工程
  • 102,416 篇 理学
    • 49,504 篇 数学
    • 35,665 篇 物理学
    • 22,039 篇 生物学
    • 15,842 篇 统计学(可授理学、...
    • 11,471 篇 化学
    • 11,147 篇 系统科学
  • 45,915 篇 管理学
    • 28,262 篇 管理科学与工程(可...
    • 19,417 篇 图书情报与档案管...
    • 12,910 篇 工商管理
  • 14,733 篇 医学
    • 12,352 篇 临床医学
    • 10,875 篇 基础医学(可授医学...
    • 6,775 篇 药学(可授医学、理...
  • 7,998 篇 法学
    • 6,450 篇 社会学
  • 5,117 篇 经济学
  • 4,112 篇 农学
  • 3,276 篇 教育学
  • 1,411 篇 文学
  • 761 篇 军事学
  • 444 篇 艺术学
  • 50 篇 哲学
  • 30 篇 历史学

主题

  • 9,644 篇 computer science
  • 7,082 篇 accuracy
  • 6,740 篇 feature extracti...
  • 5,993 篇 deep learning
  • 5,861 篇 computational mo...
  • 5,300 篇 machine learning
  • 5,228 篇 training
  • 4,117 篇 data mining
  • 3,880 篇 support vector m...
  • 3,669 篇 optimization
  • 3,527 篇 predictive model...
  • 3,444 篇 wireless sensor ...
  • 3,400 篇 internet of thin...
  • 3,143 篇 real-time system...
  • 3,124 篇 artificial intel...
  • 3,123 篇 convolutional ne...
  • 3,030 篇 neural networks
  • 2,879 篇 bandwidth
  • 2,865 篇 computer archite...
  • 2,865 篇 protocols

机构

  • 1,703 篇 department of co...
  • 1,348 篇 department of co...
  • 1,151 篇 university of ch...
  • 1,046 篇 physikalisches i...
  • 1,043 篇 cavendish labora...
  • 973 篇 department of ph...
  • 869 篇 infn laboratori ...
  • 862 篇 oliver lodge lab...
  • 823 篇 department of el...
  • 808 篇 department of el...
  • 783 篇 infn sezione di ...
  • 718 篇 school of comput...
  • 627 篇 department of el...
  • 618 篇 department of co...
  • 612 篇 infn sezione di ...
  • 551 篇 chitkara univers...
  • 533 篇 nikhef national ...
  • 515 篇 infn sezione di ...
  • 501 篇 school of comput...
  • 486 篇 university of sc...

作者

  • 247 篇 j. wang
  • 246 篇 niyato dusit
  • 242 篇 barter w.
  • 228 篇 s. chen
  • 225 篇 a. gomes
  • 213 篇 bellee v.
  • 212 篇 blake t.
  • 209 篇 bowcock t.j.v.
  • 206 篇 y. zhang
  • 203 篇 borsato m.
  • 203 篇 betancourt c.
  • 201 篇 beiter a.
  • 200 篇 c. alexa
  • 199 篇 brundu d.
  • 197 篇 j. m. izen
  • 194 篇 amato s.
  • 186 篇 c. amelung
  • 185 篇 g. bella
  • 184 篇 j. strandberg
  • 184 篇 d. calvet

语言

  • 281,679 篇 英文
  • 15,122 篇 其他
  • 4,495 篇 中文
  • 355 篇 日文
  • 52 篇 朝鲜文
  • 47 篇 德文
  • 39 篇 法文
  • 28 篇 斯洛文尼亚文
  • 10 篇 俄文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 2 篇 意大利文
  • 1 篇 加泰罗尼亚文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science Engineering and Information Technology"
301482 条 记 录,以下是691-700 订阅
排序:
Tensor Factorization for Accurate Anomaly Detection in Dynamic Networks
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2024年 第3期10卷 439-450页
作者: Li, Xiaocan Wen, Jigang Xie, Kun Xie, Gaogang Liang, Wei Hunan University College of Computer Science and Electronics Engineering Changsha China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan China Chinese Academy of Sciences Computer Network Information Center China
Accurately detecting traffic anomalies becomes increasingly crucial in network management. Algorithms that model the traffic data as a matrix suffers from low detection accuracy, while the work using the tensor model ... 详细信息
来源: 评论
Enhanced MADM Strategy with Heptapartitioned Neutrosophic Distance Metrics
收藏 引用
Neutrosophic Sets and Systems 2025年 78卷 74-96页
作者: Eassa, Mohamed Myvizhi, M. Elkholy, Mohamed Abdelhafeez, Ahmed Elbehiery, Hussam Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Mathematics KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Faculty of Computer Science& Engineering Alamein International University Egypt
In this work, a novel methodological approach to multi-attribute decision-making problems is developed and the notion of Heptapartitioned Neutrosophic Set Distance Measures (HNSDM) is introduced. By averaging the Pent... 详细信息
来源: 评论
Japanese Sign Language Recognition by Combining Joint Skeleton-Based Handcrafted and Pixel-Based Deep Learning Features with Machine Learning Classification
收藏 引用
computer Modeling in engineering & sciences 2024年 第6期139卷 2605-2625页
作者: Jungpil Shin Md.Al Mehedi Hasan Abu Saleh Musa Miah Kota Suzuki Koki Hirooka School of Computer Science and Engineering The University of AizuAizuwakamatsu965-8580Japan Department of Computer Science&Engineering Rajshahi University of Engineering&TechnologyRajshahi6204Bangladesh
Sign language recognition is vital for enhancing communication accessibility among the Deaf and hard-of-hearing *** Japan,approximately 360,000 individualswith hearing and speech disabilities rely on Japanese Sign Lan... 详细信息
来源: 评论
Research on Path Planning method for Intelligent Vehicle  6
Research on Path Planning method for Intelligent Vehicle
收藏 引用
6th International Conference on Frontier Technologies of information and computer, ICFTIC 2024
作者: Zuo, Yihan Wang, Jingbin Beijing Information Science and Technology University Department of Computer Science and Technology Beijing China Beijing Information Science and Technology University Department of Management Engineering and Science Beijing China
This paper proposes A dynamic switching strategy based on Dijkstra algorithm and A ∗ algorithm. By setting a threshold, the dynamic switching algorithm according to the distance can improve the efficiency of path plan... 详细信息
来源: 评论
Enhancing the job scheduling procedure to develop an efficient cloud environment using near optimal clustering algorithm
收藏 引用
International Journal of Cloud Computing 2023年 第2-4期12卷 134-147页
作者: Suganya, R. Joseph, Niju P. Rajadevi, R. Ramamoorthy, S. Department of Information Technology Sri Krishna College of Technology Tamil Nadu India Bengaluru India Department of Information Technology Kongu Engineering College Perundurai India Department of Computer Science and Engineering SRM Institute of Science and Technology Kanchipuram Tamilnadu Kattankulathur India
In this internet era, cloud computing and there are various problems in the cloud computing, where the consumers as well as the service providers facing in their day to day cloud activities. Job scheduling problem pla... 详细信息
来源: 评论
Abnormal behaviors recognition in crowd environments based on semi-supervised deep learning and hierarchical approach
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第12期15卷 3925-3943页
作者: Asl, Vahid Fazel Karasfi, Babak Masoumi, Behrooz Keyvanpour, Mohammad Reza Department of Computer and Information Technology Engineering Qazvin Branch Islamic Azad University Qazvin Iran Department of Computer Engineering Alzahra University Tehran Iran
This paper tackles the complexity of detecting abnormal behavior by focusing on temporal patterns, such as social force and optical flow, rather than spatial patterns. The CycleGAN system trains on normal behaviors, e... 详细信息
来源: 评论
RAPID-AV: Realtime Adaptive and Intelligent Detection For AV's Against DDoS Attacks  18
RAPID-AV: Realtime Adaptive and Intelligent Detection For AV...
收藏 引用
18th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2024
作者: Kotha, Aditya Venkanna, U. International Institute of Information Technology Department of Computer Science and Engineering Naya Raipur India National Institute of Technology Department of Computer Science and Engineering Warangal India
Autonomous vehicles (AVs) increasingly rely on vehicle-to-everything (V2X) networks for communication. However, due to the devices' heterogeneity, they are more susceptible to attacks like distributed denial of se... 详细信息
来源: 评论
A dual hashing-based authentication and secure data transmission scheme for vehicular cloud environment using MECC with optimal resource allocation mechanism
收藏 引用
Soft Computing 2024年 第17-18期28卷 10423-10437页
作者: Varalakshmi, J. Dhanasekaran, S. Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Krishnankoil India Department of Information Technology Kalasalingam Academy of Research and Education Krishnankoil India
Vehicle cloud computing (VCC) is a recent area of study that blends vehicular networks with cloud computing, offering networking and sensor capabilities to vehicles for interaction with other vehicles and roadside inf... 详细信息
来源: 评论
Pose Control of Three-dimensional Inverted Pendulum Using Reaction Wheel
收藏 引用
Journal of Institute of Control, Robotics and Systems 2025年 第2期31卷 131-136页
作者: Park, Young-Hoon Lee, In-Woo Yi, Soo-Yeong Department of Electronical and Information Engineering Seoul National University of Science and Technology Korea Republic of
This study presents a three-dimensional inverted pendulum system using three symmetrically arranged vertical reaction wheels for balance control and an additional horizontal reaction wheel for direction control. The d... 详细信息
来源: 评论
Adjustable Model Compression Using Multiple Genetic Algorithm
收藏 引用
IEEE Transactions on Multimedia 2023年 25卷 1125-1132页
作者: Ople, Jose Jaena Mari Huang, Tai-Ming Chiu, Ming-Chih Chen, Yi-Ling Hua, Kai-Lung National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei106 Taiwan
Generative Adversarial Networks (GAN) is a popular machine learning method that possesses powerful image generation ability, which is useful for different multimedia applications (e.g., photographic filters, image edi... 详细信息
来源: 评论