咨询与建议

限定检索结果

文献类型

  • 112,899 篇 会议
  • 52,851 篇 期刊文献
  • 1,491 册 图书

馆藏范围

  • 167,241 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98,668 篇 工学
    • 65,697 篇 计算机科学与技术...
    • 53,070 篇 软件工程
    • 25,537 篇 信息与通信工程
    • 16,400 篇 控制科学与工程
    • 14,761 篇 电气工程
    • 13,897 篇 电子科学与技术(可...
    • 11,798 篇 生物工程
    • 9,358 篇 生物医学工程(可授...
    • 8,382 篇 光学工程
    • 7,049 篇 机械工程
    • 5,996 篇 化学工程与技术
    • 5,867 篇 动力工程及工程热...
    • 5,622 篇 仪器科学与技术
    • 5,011 篇 材料科学与工程(可...
    • 4,591 篇 网络空间安全
    • 4,175 篇 安全科学与工程
  • 56,844 篇 理学
    • 27,110 篇 数学
    • 19,515 篇 物理学
    • 13,433 篇 生物学
    • 8,826 篇 统计学(可授理学、...
    • 6,474 篇 化学
    • 6,324 篇 系统科学
  • 25,874 篇 管理学
    • 16,102 篇 管理科学与工程(可...
    • 10,819 篇 图书情报与档案管...
    • 7,548 篇 工商管理
  • 9,368 篇 医学
    • 7,758 篇 临床医学
    • 7,031 篇 基础医学(可授医学...
    • 4,372 篇 药学(可授医学、理...
    • 4,058 篇 公共卫生与预防医...
  • 4,892 篇 法学
    • 3,978 篇 社会学
  • 3,019 篇 经济学
  • 2,416 篇 农学
  • 1,587 篇 教育学
  • 870 篇 文学
  • 361 篇 军事学
  • 224 篇 艺术学
  • 15 篇 哲学
  • 12 篇 历史学

主题

  • 5,204 篇 computer science
  • 4,808 篇 accuracy
  • 4,189 篇 deep learning
  • 3,903 篇 feature extracti...
  • 3,619 篇 machine learning
  • 3,465 篇 computational mo...
  • 3,065 篇 training
  • 2,487 篇 support vector m...
  • 2,372 篇 internet of thin...
  • 2,326 篇 convolutional ne...
  • 2,237 篇 predictive model...
  • 2,215 篇 real-time system...
  • 2,120 篇 optimization
  • 1,963 篇 artificial intel...
  • 1,899 篇 wireless sensor ...
  • 1,896 篇 data mining
  • 1,687 篇 neural networks
  • 1,576 篇 computer archite...
  • 1,566 篇 security
  • 1,495 篇 data models

机构

  • 1,083 篇 cavendish labora...
  • 1,006 篇 department of ph...
  • 956 篇 physikalisches i...
  • 935 篇 oliver lodge lab...
  • 906 篇 department of co...
  • 836 篇 department of el...
  • 736 篇 university of ch...
  • 676 篇 department of el...
  • 671 篇 department of co...
  • 598 篇 infn sezione di ...
  • 592 篇 infn laboratori ...
  • 575 篇 infn sezione di ...
  • 556 篇 infn sezione di ...
  • 551 篇 chitkara univers...
  • 539 篇 horia hulubei na...
  • 532 篇 school of physic...
  • 527 篇 fakultät physik ...
  • 522 篇 department of ph...
  • 518 篇 school of physic...
  • 515 篇 h.h. wills physi...

作者

  • 255 篇 a. gomes
  • 250 篇 barter w.
  • 247 篇 s. chen
  • 243 篇 c. alexa
  • 240 篇 j. m. izen
  • 240 篇 j. wang
  • 233 篇 g. bella
  • 233 篇 j. strandberg
  • 233 篇 c. amelung
  • 231 篇 d. calvet
  • 227 篇 blake t.
  • 225 篇 beiter a.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 213 篇 brundu d.
  • 212 篇 g. spigo

语言

  • 159,046 篇 英文
  • 6,403 篇 其他
  • 1,826 篇 中文
  • 127 篇 日文
  • 21 篇 法文
  • 20 篇 朝鲜文
  • 18 篇 德文
  • 13 篇 斯洛文尼亚文
  • 6 篇 荷兰文
  • 2 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
检索条件"机构=Department of Computer Science Engineering and Technology"
167241 条 记 录,以下是101-110 订阅
排序:
SkinMultiNet: Advancements in Skin Cancer Prediction Using Deep Learning with Web Interface
收藏 引用
Biomedical Materials and Devices 2025年 第1期3卷 621-637页
作者: Likhon, Md Nur Hosain Rana, Sahab Uddin Akter, Sadeka Ahmed, Md. Shorup Tanha, Khadiza Akter Rahman, Md. Mahbubur Nayeem, Md Emran Hussain Department of Computer Science and Engineering Dhaka International University Dhaka Bangladesh Department of Computer Science and Engineering Dhaka University of Engineering and Technology Gazipur Bangladesh Department of Computer Science and Engineering Bangladesh University of Business and Technology Dhaka Bangladesh
Cancer remains the leading cause of death worldwide, significantly impacting individuals and healthcare systems alike. In recent decades, skin cancer has surged in prevalence compared to other major cancer types. Vari... 详细信息
来源: 评论
From light sensing to adaptive learning:hafnium diselenide reconfigurable memcapacitive devices in neuromorphic computing
收藏 引用
Light(science & Applications) 2025年 第1期14卷 215-226页
作者: Bashayr Alqahtani Hanrui Li Abdul Momin Syed Nazek El-Atab Electrical and Computer Engineering Program Computer Electrical Mathematical Science and Engineering DivisionKing Abdullah University of Science and Technology(KAUST)ThuwalSaudi Arabia Electrical Engineering Department College of EngineeringPrincess Nourah Bint Abdulrahman University(PNU)RiyadhSaudi Arabia
Advancements in neuromorphic computing have given an impetus to the development of systems with adaptive behavior,dynamic responses,and energy efficiency *** charge-based or emerging memory technologies such as memris... 详细信息
来源: 评论
Enhancing cyber threat detection with an improved artificial neural network model
收藏 引用
Data science and Management 2025年 第1期8卷 107-115页
作者: Oyinloye, Toluwase Sunday Arowolo, Micheal Olaolu Prasad, Rajesh Department of Computer Science African University of Science and Technology Abuja900107 Nigeria Department of Electrical Engineering and Computer Science University of Missouri ColumbiaMO65201 United States
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i... 详细信息
来源: 评论
EPDTNet + -EM: Advanced Transfer Learning and SubNet Architecture for Medical Image Diagnosis
收藏 引用
Cognitive Computation 2025年 第2期17卷 1-22页
作者: K, Dhivya K, Sangamithrai S, Indra Priyadharshini M, Vedaraj Department of Electronics and Communication Engineering SRM Institute of Science and Technology Tamilnadu Kattankulathur India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R & d Institute of Science and Technology Tamilnadu Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India Department of Computer Science and Engineering R.M.D. Engineering College RSM Nagar Tamilnadu Kavaraipettai Thiruvallur601206 India
This paper presents a novel medical imaging framework, Efficient Parallel Deep Transfer SubNet+-based Explainable Model (EPDTNet + -EM), designed to improve the detection and classification of abnormalities in medical... 详细信息
来源: 评论
Clustered Reinforcement Learning
收藏 引用
Frontiers of computer science 2025年 第4期19卷 43-57页
作者: Xiao MA Shen-Yi ZHAO Zhao-Heng YIN Wu-Jun LI National Key Laboratory for Novel Software Technology Department of Computer Science and TechnologyNanjing UniversityNanjing 210023China Department of Electrical Engineering and Computer Sciences University of CaliforniaBerkeleyCA 94720-1770USA
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)ar... 详细信息
来源: 评论
RoPe-Door: Toward Robust and Persistent Backdoor Data Poisoning Attacks in Federated Learning
收藏 引用
IEEE Network 2025年 第3期39卷 302-310页
作者: Liu, Ye Chang, Shan Li, Denghui Shi, Shaohuai Li, Bo Jiangxi Normal University School of Computer and Information Engineering Nanchang330022 China Donghua University School of Computer Science and Technology Shanghai201620 China Harbin Institute of Technology School of Computer Science and Technology Shenzhen518057 China The Hong Kong University of Science and Technology Department of Computer Science and Engineering Sai Kung Hong Kong
Federated Learning (FL) enables privacy-preserving collaborative training and builds a federation through exchanges of immutable data such as model parameters or gradient updates. FL remains vulnerable to a variety of... 详细信息
来源: 评论
Genetic Algorithm-optimized k-nearest Neighbors and Support Vector Machines for Breast Cancer Detection in Resource-constrained Environments
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第3期52卷 848-861页
作者: Alemu, Abebe Girma, Anteneh Abebe, Mesfin Srinivasagan, Ramasamy Adama Science and Technology University Adama Ethiopia Computer Science/Cyber-Security department University of the District of Columbia WashingtonDC United States Computer Science and Engineering department Adama Science and Technology University Adama Ethiopia Computer Engineering department CCSIT King Faisal University Al Hufuf Saudi Arabia
Breast cancer poses a significant global threat, highlighting the urgent need for early detection to reduce mortality rates. Researchers are working to minimize the occurrence of false positives and false negatives, t... 详细信息
来源: 评论
An efficient security testing for android application based on behavior and activities using RFE-MLP and ensemble classifier
收藏 引用
Multimedia Tools and Applications 2025年 第15期84卷 15357-15386页
作者: Kumar, Pawan Singh, Sukhdip Department of Computer Science and Engineering Deenbandhu Chhotu Ram University of Science and Technology Murthal Sonipat131039 India
An enormous amount of applications that are available for download permits users to enhance the functionality of the devices with brand-new features, which is a significant factor in the growing popularity of smartpho... 详细信息
来源: 评论
IensNet: A novel and efficient approach for iris spoof detection via ensemble of deep models
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Sharma, Deepika Selwal, Arvind School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Department of Computer Science and Information Technology Central University of Jammu Samba India
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ... 详细信息
来源: 评论
Cyber-attack detection based on a deep chaotic invasive weed kernel optimized machine learning classifier in cloud computing
收藏 引用
Soft Computing 2025年 第4期29卷 2015-2030页
作者: Indrasena Reddy, M. Siva Kumar, A.P. Subba Reddy, K. Department of Computer Science and Engineering BVRIT Hyderabad College of Engineering for Women Hyderabad500090 India Department of Computer Science and Engineering Jawaharlal Nehru Technological University Ananthapuramu Andhra Pradesh Ananthapuramu India Department of Computer Science and Engineering Rajeev Gandhi Memorial College of Engineering and Technology Andhra Pradesh Nandyala India
Nowadays, Cloud Computing has attracted a lot of interest from both individual users and organization. However, cloud computing applications face certain security issues, such as data integrity, user privacy, and serv... 详细信息
来源: 评论