咨询与建议

限定检索结果

文献类型

  • 112,998 篇 会议
  • 52,299 篇 期刊文献
  • 1,504 册 图书

馆藏范围

  • 166,801 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98,022 篇 工学
    • 65,275 篇 计算机科学与技术...
    • 52,866 篇 软件工程
    • 25,259 篇 信息与通信工程
    • 16,192 篇 控制科学与工程
    • 14,436 篇 电气工程
    • 13,755 篇 电子科学与技术(可...
    • 11,775 篇 生物工程
    • 9,332 篇 生物医学工程(可授...
    • 8,323 篇 光学工程
    • 6,912 篇 机械工程
    • 5,930 篇 化学工程与技术
    • 5,824 篇 动力工程及工程热...
    • 5,579 篇 仪器科学与技术
    • 4,899 篇 材料科学与工程(可...
    • 4,466 篇 网络空间安全
    • 4,142 篇 安全科学与工程
  • 56,455 篇 理学
    • 26,957 篇 数学
    • 19,345 篇 物理学
    • 13,367 篇 生物学
    • 8,774 篇 统计学(可授理学、...
    • 6,380 篇 化学
    • 6,315 篇 系统科学
  • 25,767 篇 管理学
    • 16,052 篇 管理科学与工程(可...
    • 10,749 篇 图书情报与档案管...
    • 7,522 篇 工商管理
  • 9,290 篇 医学
    • 7,725 篇 临床医学
    • 6,987 篇 基础医学(可授医学...
    • 4,364 篇 药学(可授医学、理...
    • 4,013 篇 公共卫生与预防医...
  • 4,886 篇 法学
    • 3,978 篇 社会学
  • 3,004 篇 经济学
  • 2,412 篇 农学
  • 1,585 篇 教育学
  • 868 篇 文学
  • 360 篇 军事学
  • 223 篇 艺术学
  • 15 篇 哲学
  • 12 篇 历史学

主题

  • 5,206 篇 computer science
  • 4,840 篇 accuracy
  • 4,154 篇 deep learning
  • 3,920 篇 feature extracti...
  • 3,592 篇 machine learning
  • 3,475 篇 computational mo...
  • 3,089 篇 training
  • 2,495 篇 support vector m...
  • 2,369 篇 internet of thin...
  • 2,339 篇 convolutional ne...
  • 2,251 篇 predictive model...
  • 2,241 篇 real-time system...
  • 2,132 篇 optimization
  • 1,948 篇 artificial intel...
  • 1,897 篇 wireless sensor ...
  • 1,893 篇 data mining
  • 1,682 篇 neural networks
  • 1,582 篇 computer archite...
  • 1,559 篇 security
  • 1,508 篇 data models

机构

  • 1,080 篇 cavendish labora...
  • 1,002 篇 department of ph...
  • 947 篇 physikalisches i...
  • 932 篇 oliver lodge lab...
  • 918 篇 department of co...
  • 839 篇 department of el...
  • 737 篇 university of ch...
  • 675 篇 department of el...
  • 673 篇 department of co...
  • 593 篇 infn sezione di ...
  • 584 篇 infn laboratori ...
  • 574 篇 infn sezione di ...
  • 552 篇 chitkara univers...
  • 546 篇 infn sezione di ...
  • 536 篇 horia hulubei na...
  • 533 篇 school of physic...
  • 523 篇 fakultät physik ...
  • 521 篇 department of ph...
  • 520 篇 school of physic...
  • 514 篇 imperial college...

作者

  • 254 篇 a. gomes
  • 250 篇 barter w.
  • 244 篇 s. chen
  • 241 篇 c. alexa
  • 239 篇 j. wang
  • 238 篇 j. m. izen
  • 231 篇 g. bella
  • 231 篇 j. strandberg
  • 231 篇 c. amelung
  • 229 篇 d. calvet
  • 227 篇 blake t.
  • 225 篇 beiter a.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 213 篇 brundu d.
  • 210 篇 g. spigo

语言

  • 158,744 篇 英文
  • 6,276 篇 其他
  • 1,810 篇 中文
  • 127 篇 日文
  • 20 篇 法文
  • 20 篇 朝鲜文
  • 18 篇 德文
  • 13 篇 斯洛文尼亚文
  • 6 篇 荷兰文
  • 2 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
检索条件"机构=Department of Computer Science Engineering and Technology"
166801 条 记 录,以下是181-190 订阅
排序:
Genetic Algorithm-optimized k-nearest Neighbors and Support Vector Machines for Breast Cancer Detection in Resource-constrained Environments
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第3期52卷 848-861页
作者: Alemu, Abebe Girma, Anteneh Abebe, Mesfin Srinivasagan, Ramasamy Adama Science and Technology University Adama Ethiopia Computer Science/Cyber-Security department University of the District of Columbia WashingtonDC United States Computer Science and Engineering department Adama Science and Technology University Adama Ethiopia Computer Engineering department CCSIT King Faisal University Al Hufuf Saudi Arabia
Breast cancer poses a significant global threat, highlighting the urgent need for early detection to reduce mortality rates. Researchers are working to minimize the occurrence of false positives and false negatives, t... 详细信息
来源: 评论
An efficient security testing for android application based on behavior and activities using RFE-MLP and ensemble classifier
收藏 引用
Multimedia Tools and Applications 2025年 第15期84卷 15357-15386页
作者: Kumar, Pawan Singh, Sukhdip Department of Computer Science and Engineering Deenbandhu Chhotu Ram University of Science and Technology Murthal Sonipat131039 India
An enormous amount of applications that are available for download permits users to enhance the functionality of the devices with brand-new features, which is a significant factor in the growing popularity of smartpho... 详细信息
来源: 评论
IensNet: A novel and efficient approach for iris spoof detection via ensemble of deep models
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Sharma, Deepika Selwal, Arvind School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Department of Computer Science and Information Technology Central University of Jammu Samba India
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ... 详细信息
来源: 评论
Highly transparent anti-reflection coating enhances the underwater efficiency and stability of perovskite solar modules
收藏 引用
Nano Research 2024年 第9期17卷 8126-8133页
作者: Feng Qian Shihao Yuan Ting Zhang Lei Wang Xiaobo Li Hualin Zheng Qien Xu Zhi David Chen Shibin Li School of Optoelectronic Science and Engineering University of Electronic Science and Technology of ChinaChengdu 610054China Department of Electrical and Computer Engineering and Center for Nanoscale Science and Engineering University of KentuckyLexingtonKentucky 40506USA
Perovskite solar cells have shown great potential in the field of underwater solar cells due to their excellent optoelectronic properties;however,their underwater performance and stability still hinder their practical... 详细信息
来源: 评论
rafPS:A shapley-based visual analytics approach to interpret traffic
收藏 引用
Computational Visual Media 2024年 第6期10卷 1101-1119页
作者: Zezheng Feng Yifan Jiang Hongjun Wang Zipei Fan Yuxin Ma Shuang-Hua Yang Huamin Qu Xuan Song Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 18055China Department of Computer Science and Engineering Hong Kong University of Science and TechnologyHong KongChina Department of Computer Science University of ReadingBerkshire RG66AHUK Center for Spatial Information Science the University of TokyoTokyo 113-00331Japan Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Southern University of Science and TechnologyShenzhen 518055China
Recent achievements in deep learning(DL)have demonstrated its potential in predicting traffic *** predictions are beneficial for understanding the situation and making traffic control ***,most state-of-the-art DL mode... 详细信息
来源: 评论
Cyber-attack detection based on a deep chaotic invasive weed kernel optimized machine learning classifier in cloud computing
收藏 引用
Soft Computing 2025年 第4期29卷 2015-2030页
作者: Indrasena Reddy, M. Siva Kumar, A.P. Subba Reddy, K. Department of Computer Science and Engineering BVRIT Hyderabad College of Engineering for Women Hyderabad500090 India Department of Computer Science and Engineering Jawaharlal Nehru Technological University Ananthapuramu Andhra Pradesh Ananthapuramu India Department of Computer Science and Engineering Rajeev Gandhi Memorial College of Engineering and Technology Andhra Pradesh Nandyala India
Nowadays, Cloud Computing has attracted a lot of interest from both individual users and organization. However, cloud computing applications face certain security issues, such as data integrity, user privacy, and serv... 详细信息
来源: 评论
Manhattan-based k-member clustering and enhanced rabbit optimization algorithm for k-anonymization in social network
收藏 引用
Multimedia Tools and Applications 2024年 第30期83卷 74739-74756页
作者: Sivasankari, K. Maheswari, K. M. Uma Department of computer science and engineering SRM Institute of Science and Technology Ramapuram Chennai India Department of computing technologies School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur India
Online social networks are becoming more and more popular, according to recent trends. The user's primary concern is the secure preservation of their data and privacy. A well-known method for preventing individual... 详细信息
来源: 评论
Improved security with novel M-Log chaos steganography algorithm for huffman compressed english text
收藏 引用
Multimedia Tools and Applications 2025年 第2期84卷 665-688页
作者: Raghuvanshi, Devvrat Joshi, Kamaldeep Nandal, Rainu Sehrawat, Harkesh Singh, Surender Singh, Srishti Department of Computer Science and Engineering University Institute of Engineering and Technology Maharshi Dayanand University Rohtak Haryana India
This paper addresses the underexplored landscape of chaotic functions in steganography, existing literature when examined under PRISMA-ScR framework it was realized that most of the studies predominantly focuses on ut... 详细信息
来源: 评论
A Hybrid Regularized Multilayer Perceptron for Input Noise Immunity
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第1期5卷 115-126页
作者: Mondal, Rahul Pal, Tandra Dey, Prasenjit National Institute of Technology Durgapur Department of Computer Science and Engineering Durgapur713209 India Cooch Behar Government Engineering College Department of Computer Science and Engineering Cooch Behar736170 India
The immunity of multilayer perceptron (MLP) is less effective toward input noise. In this article, we have focused on the robustness of MLP with respect to input noise where noise can be additive or multiplicative. He... 详细信息
来源: 评论
A Novel Optimized Deep Convolutional Neural Network for Efficient Seizure Stage Classification
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 3903-3926页
作者: Umapathi Krishnamoorthy Shanmugam Jagan Mohammed Zakariah Abdulaziz S.Almazyad K.Gurunathan Department of Biomedical Engineering KIT-Kalaignarkarunanidhi Institute of TechnologyCoimbatore641402India Department of Computer Sciences and Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and TechnologyChennai600062India Department of Computer Sciences and Engineering College of Applied ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Department of Computer Science and Engineering Mount Zion College of Engineering and TechnologyPudukkottai622507India
Brain signal analysis from electroencephalogram(EEG)recordings is the gold standard for diagnosing various neural disorders especially epileptic *** signals are highly chaotic compared to normal brain signals and thus... 详细信息
来源: 评论