咨询与建议

限定检索结果

文献类型

  • 201,379 篇 会议
  • 97,726 篇 期刊文献
  • 2,377 册 图书

馆藏范围

  • 301,482 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 179,474 篇 工学
    • 116,484 篇 计算机科学与技术...
    • 94,076 篇 软件工程
    • 44,992 篇 信息与通信工程
    • 27,595 篇 控制科学与工程
    • 25,061 篇 电子科学与技术(可...
    • 24,452 篇 电气工程
    • 19,360 篇 生物工程
    • 15,110 篇 生物医学工程(可授...
    • 14,763 篇 光学工程
    • 13,000 篇 机械工程
    • 11,076 篇 化学工程与技术
    • 10,589 篇 仪器科学与技术
    • 9,603 篇 动力工程及工程热...
    • 8,867 篇 材料科学与工程(可...
    • 6,500 篇 网络空间安全
    • 6,401 篇 安全科学与工程
    • 6,011 篇 交通运输工程
  • 102,416 篇 理学
    • 49,504 篇 数学
    • 35,665 篇 物理学
    • 22,039 篇 生物学
    • 15,842 篇 统计学(可授理学、...
    • 11,471 篇 化学
    • 11,147 篇 系统科学
  • 45,915 篇 管理学
    • 28,262 篇 管理科学与工程(可...
    • 19,417 篇 图书情报与档案管...
    • 12,910 篇 工商管理
  • 14,733 篇 医学
    • 12,352 篇 临床医学
    • 10,875 篇 基础医学(可授医学...
    • 6,775 篇 药学(可授医学、理...
  • 7,998 篇 法学
    • 6,450 篇 社会学
  • 5,117 篇 经济学
  • 4,112 篇 农学
  • 3,276 篇 教育学
  • 1,411 篇 文学
  • 761 篇 军事学
  • 444 篇 艺术学
  • 50 篇 哲学
  • 30 篇 历史学

主题

  • 9,644 篇 computer science
  • 7,082 篇 accuracy
  • 6,740 篇 feature extracti...
  • 5,993 篇 deep learning
  • 5,861 篇 computational mo...
  • 5,300 篇 machine learning
  • 5,228 篇 training
  • 4,117 篇 data mining
  • 3,880 篇 support vector m...
  • 3,669 篇 optimization
  • 3,527 篇 predictive model...
  • 3,444 篇 wireless sensor ...
  • 3,400 篇 internet of thin...
  • 3,143 篇 real-time system...
  • 3,124 篇 artificial intel...
  • 3,123 篇 convolutional ne...
  • 3,030 篇 neural networks
  • 2,879 篇 bandwidth
  • 2,865 篇 computer archite...
  • 2,865 篇 protocols

机构

  • 1,703 篇 department of co...
  • 1,348 篇 department of co...
  • 1,151 篇 university of ch...
  • 1,046 篇 physikalisches i...
  • 1,043 篇 cavendish labora...
  • 973 篇 department of ph...
  • 869 篇 infn laboratori ...
  • 862 篇 oliver lodge lab...
  • 823 篇 department of el...
  • 808 篇 department of el...
  • 783 篇 infn sezione di ...
  • 718 篇 school of comput...
  • 627 篇 department of el...
  • 618 篇 department of co...
  • 612 篇 infn sezione di ...
  • 551 篇 chitkara univers...
  • 533 篇 nikhef national ...
  • 515 篇 infn sezione di ...
  • 501 篇 school of comput...
  • 486 篇 university of sc...

作者

  • 247 篇 j. wang
  • 246 篇 niyato dusit
  • 242 篇 barter w.
  • 228 篇 s. chen
  • 225 篇 a. gomes
  • 213 篇 bellee v.
  • 212 篇 blake t.
  • 209 篇 bowcock t.j.v.
  • 206 篇 y. zhang
  • 203 篇 borsato m.
  • 203 篇 betancourt c.
  • 201 篇 beiter a.
  • 200 篇 c. alexa
  • 199 篇 brundu d.
  • 197 篇 j. m. izen
  • 194 篇 amato s.
  • 186 篇 c. amelung
  • 185 篇 g. bella
  • 184 篇 j. strandberg
  • 184 篇 d. calvet

语言

  • 281,679 篇 英文
  • 15,122 篇 其他
  • 4,495 篇 中文
  • 355 篇 日文
  • 52 篇 朝鲜文
  • 47 篇 德文
  • 39 篇 法文
  • 28 篇 斯洛文尼亚文
  • 10 篇 俄文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 2 篇 意大利文
  • 1 篇 加泰罗尼亚文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science Engineering and Information Technology"
301482 条 记 录,以下是701-710 订阅
排序:
Robust Stability of Discrete-time Genetic Regulatory Networks with Reaction Diffusion
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第9期54卷 1756-1764页
作者: Zou, Chengye Yang, Yongwei Li, Haifeng Shang, Yubao Liu, Yunong Information Science and Engineering Yanshan University Qinhuangdao066004 China School of Mathematics and Computer Science Tongling University Anhui Tongling244000 China Computer and Information Science Qinghai Institute of Technology Xining810016 China Information Science and Engineering Yanshan University Qinhuangdao066004 China
In the realm of discrete-time modeling for gene regulatory networks, significant focus has been placed on addressing the time lags inherent in the process of DNA transcription to RNA and the subsequent translation of ... 详细信息
来源: 评论
PULSE: Progressive Utilization of Log-Structured Techniques to Ease SSD Write Amplification in B-epsilon-tree  25
PULSE: Progressive Utilization of Log-Structured Techniques ...
收藏 引用
30th Asia and South Pacific Design Automation Conference, ASP-DAC 2025
作者: Peng, Huai-De Chen, Yi-Shen Chen, Tseng-Yi Chang, Yuan-Hao Department of Computer Science and Information Engineering National Central University Taiwan Department of Electronic and Computer Engineering National Taiwan University of Science and Technology Taiwan Institute of Information Science Academia Sinica Taiwan
During the unprecedented expansion of global data, efficient storage solutions are essential for processing massive datasets stored on modern storage devices. B-epsilon-tree (Bϵ-tree) is one of the most well-known tec... 详细信息
来源: 评论
QR Code-Based Visual Secret Sharing Scheme: A Review
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第4期9卷 2642-2661页
作者: Chu, Shu-Chuan Liu, Tao Pan, Jeng-Shyang Information Engineering College Guangzhou City Construction College Guangzhou510925 China School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing210044 China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China Department of Information Management Chaoyang University of Technology Taichung41349 Taiwan
Visual secret sharing (VSS) scheme is the technology that divides a secret into shares. The decoding operation on the share is performed to restore the secret image. The quick response (QR) code is an image carrying t... 详细信息
来源: 评论
EPASAD:ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
收藏 引用
Cybersecurity 2024年 第3期7卷 32-48页
作者: Vikas Maurya Rachit Agarwal Saurabh Kumar Sandeep Shukla Department of Computer Science and Engineering Indian Institute of Technology KanpurkanpurIndia Merkle Science BangaloreIndia
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and se... 详细信息
来源: 评论
Predicting and Forecasting Metal Stock Prices Using Machine Learning  6
Predicting and Forecasting Metal Stock Prices Using Machine ...
收藏 引用
6th International Conference on Cybernetics, Cognition and Machine Learning Applications, ICCCMLA 2024
作者: Bhavana, Katakam Varma, Indukuri Raghu Rohitha, Kalluri Suryanarayana, G. Anvesh, Kachi Kruthika, Sama Department of Information Technology Hyderabad India Department of Computer Science and Engineering Hyderabad India
Machine Learning algorithms analyze past market data to forecast future trends in metal stock prices. Precise estimation of metal stock values is essential for industry stakeholders, policy makers, and investors. Corr... 详细信息
来源: 评论
Exploring the Potential of Deep Learning Algorithms in Medical Image Processing: A Comprehensive Analysis  5th
Exploring the Potential of Deep Learning Algorithms in Medic...
收藏 引用
5th International Conference on Communication and Intelligent Systems, ICCIS 2023
作者: Pal, Ganesh Prasad Pal, Raju Department of Computer Science and Engineering Jaypee Institute of Information Technology Noida India Department of Computer Science and Engineering School of Information and Communication Technology Gautam Buddha University Greater Noida India
In this study, we comprehensively examine the potential of deep learning algorithms in the domain of medical image processing. Through a systematic analysis of existing literature, we explore the applications, methodo... 详细信息
来源: 评论
A Self-Adapting and Efficient Dandelion Algorithm and Its Application to Feature Selection for Credit Card Fraud Detection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第2期11卷 377-390页
作者: Honghao Zhu MengChu Zhou Yu Xie Aiiad Albeshri IEEE School of Computer and Information Engineering Bengbu UniversityBengbu 233030China School of Information and Electronic Engineering Zhejiang Gongshang UniversityHangzhou 310018China Helen and John C.Hartmann the Department of Electrical and Computer EngineeringNew Jersey Institute of TechnologyNewark NJ 07102 USA College of Information Engineering Shanghai Maritime UniversityShanghai 201306China Department of Computer Science King Abdulaziz UniversityJeddah 21481Saudi Arabia
A dandelion algorithm(DA) is a recently developed intelligent optimization algorithm for function optimization problems. Many of its parameters need to be set by experience in DA,which might not be appropriate for all... 详细信息
来源: 评论
Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications
收藏 引用
Journal of engineering and Applied science 2024年 第1期71卷 8页
作者: Arpitha, T. Chouhan, Dharamendra Shreyas, J. Department of Computer Science and Engineering University Visvesvaraya College of Engineering Bangalore University Bengaluru India Department of Information Technology Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India
In the era of rapid technological advancement, the Internet of Things (IoT) has revolutionised healthcare through systems like the Telecare Medicine information System (TMIS), designed to streamline patient-doctor int... 详细信息
来源: 评论
Review on Meta-heuristic Algorithm-Based Priority-Aware Computation Offloading in Edge Computing System
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 1-26页
作者: Pilli, Neelima Mohapatra, Debasis Reddy, Shiva Shankar Department of Computer Science and Engineering Biju Patnaik University of Technology Odisha Rourkela India Department of Computer Science and Engineering Parala Maharaja Engineering College Odisha Brahmpur India Department of Computer Science and Engineering Sagi Rama Krishnam Raju Engineering College Andhra Pradesh Bhimavaram India
Advancements in smart applications highlight the need for increased processing and storage capacity at Smart Devices (SDs). To tackle this, Edge computing (EC) is enabled to offload SD workloads to distant edge server... 详细信息
来源: 评论
Isomorphic Classification of First Degree Cellular Automata
收藏 引用
Complex Systems 2025年 第1期34卷 59-90页
作者: Vikrant, Vicky Bhattacharjee, Kamalika Mukherjee, Sukanya Department of Computer Science and Engineering National Institute of Technology Tamil Nadu Tiruchirappalli620015 India Department of Computer Science and Engineering Institute of Engineering and Management West Bengal Kolkata700091 India
This paper explores the concept of isomorphism in cellular automata (CAs), focusing on identifying and understanding isomorphic relationships between distinct CAs. A cellular automaton (CA) is said to be isomorphic to... 详细信息
来源: 评论