咨询与建议

限定检索结果

文献类型

  • 683,524 篇 会议
  • 281,015 篇 期刊文献
  • 6,815 册 图书
  • 21 篇 学位论文
  • 7 篇 专利
  • 6 篇 科技报告

馆藏范围

  • 971,384 篇 电子文献
  • 23 种 纸本馆藏

日期分布

学科分类号

  • 567,303 篇 工学
    • 410,953 篇 计算机科学与技术...
    • 326,765 篇 软件工程
    • 121,933 篇 信息与通信工程
    • 82,589 篇 控制科学与工程
    • 60,147 篇 电气工程
    • 57,647 篇 生物工程
    • 54,224 篇 电子科学与技术(可...
    • 41,924 篇 生物医学工程(可授...
    • 35,573 篇 光学工程
    • 35,379 篇 机械工程
    • 26,722 篇 化学工程与技术
    • 24,496 篇 仪器科学与技术
    • 22,073 篇 动力工程及工程热...
    • 18,922 篇 材料科学与工程(可...
    • 16,956 篇 安全科学与工程
    • 15,484 篇 网络空间安全
    • 15,044 篇 交通运输工程
  • 315,820 篇 理学
    • 181,755 篇 数学
    • 84,139 篇 物理学
    • 65,422 篇 生物学
    • 53,401 篇 统计学(可授理学、...
    • 34,052 篇 系统科学
    • 28,727 篇 化学
  • 147,749 篇 管理学
    • 83,397 篇 管理科学与工程(可...
    • 70,506 篇 图书情报与档案管...
    • 40,344 篇 工商管理
  • 38,260 篇 医学
    • 32,188 篇 临床医学
    • 28,673 篇 基础医学(可授医学...
    • 17,734 篇 药学(可授医学、理...
  • 25,019 篇 法学
    • 20,793 篇 社会学
  • 14,898 篇 经济学
  • 13,539 篇 教育学
  • 11,813 篇 农学
  • 4,700 篇 文学
  • 1,903 篇 军事学
  • 1,638 篇 艺术学
  • 759 篇 哲学
  • 312 篇 历史学

主题

  • 63,832 篇 computer science
  • 21,862 篇 computational mo...
  • 18,903 篇 feature extracti...
  • 17,499 篇 accuracy
  • 15,450 篇 training
  • 15,093 篇 data mining
  • 15,088 篇 machine learning
  • 14,431 篇 deep learning
  • 13,642 篇 application soft...
  • 12,880 篇 computer archite...
  • 12,223 篇 semantics
  • 12,175 篇 algorithm design...
  • 11,436 篇 costs
  • 11,386 篇 protocols
  • 11,266 篇 testing
  • 10,855 篇 artificial intel...
  • 10,768 篇 predictive model...
  • 10,497 篇 support vector m...
  • 10,480 篇 neural networks
  • 10,100 篇 optimization

机构

  • 5,008 篇 department of co...
  • 2,892 篇 school of comput...
  • 2,480 篇 college of compu...
  • 2,461 篇 school of comput...
  • 2,417 篇 college of compu...
  • 2,128 篇 chitkara univers...
  • 2,049 篇 department of co...
  • 1,652 篇 department of co...
  • 1,557 篇 university of ch...
  • 1,520 篇 school of comput...
  • 1,488 篇 department of co...
  • 1,443 篇 school of comput...
  • 1,277 篇 school of comput...
  • 1,273 篇 department of el...
  • 1,268 篇 department of co...
  • 1,257 篇 school of comput...
  • 1,223 篇 school of comput...
  • 1,156 篇 school of comput...
  • 1,082 篇 department of co...
  • 1,056 篇 department of el...

作者

  • 524 篇 liu yang
  • 426 篇 wang wei
  • 378 篇 niyato dusit
  • 307 篇 yang yang
  • 288 篇 wei li
  • 270 篇 wei wang
  • 257 篇 li li
  • 245 篇 li yang
  • 240 篇 barter w.
  • 238 篇 zhang lei
  • 232 篇 s. chen
  • 215 篇 j. wang
  • 214 篇 blake t.
  • 208 篇 bellee v.
  • 206 篇 bowcock t.j.v.
  • 204 篇 zhang wei
  • 203 篇 a. gomes
  • 201 篇 brundu d.
  • 201 篇 borsato m.
  • 199 篇 betancourt c.

语言

  • 917,623 篇 英文
  • 43,143 篇 其他
  • 10,590 篇 中文
  • 448 篇 日文
  • 219 篇 德文
  • 93 篇 法文
  • 76 篇 西班牙文
  • 68 篇 朝鲜文
  • 58 篇 俄文
  • 57 篇 斯洛文尼亚文
  • 29 篇 葡萄牙文
  • 25 篇 意大利文
  • 10 篇 土耳其文
  • 5 篇 阿拉伯文
  • 5 篇 荷兰文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science Technology and Computer Science"
971388 条 记 录,以下是111-120 订阅
排序:
Enhancing Predictive Capabilities for Cyber Physical Systems Through Supervised Learning
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第16期49卷 77-86页
作者: Dhanalakshmi, B. Tamije Selvy, P. Department of Computer Science and Engineering Dr.N.G. P Institute of technology India Department of Computer Science and Engineering Hindusthan College of Engineering and Technology India
The rapid advancement and proliferation of Cyber-Physical Systems (CPS) have led to an exponential increase in the volume of data generated continuously. Efficient classification of this streaming data is crucial for ... 详细信息
来源: 评论
Cryptographic Solutions for Data Security in Cloud Computing: A Run Time Trend-based Comparison of NCS, ERSA, and EHS
收藏 引用
Journal of Cyber Security and Mobility 2024年 第2期13卷 265-282页
作者: Dawson, John Kwao Twum, Frimpong Acquah, James Benjamin Hayfron Missah, Yaw Marfo Computer Science Department Sunyani Technical University Sunyani Ghana Computer Science Department Kwame Nkrumah University of Science and Technology Kumasi Ghana Ghana Department of Kwame Nkrumah University of Science and Technology Ghana
Due to the recent explosion in the amount of data being created by various social media platforms, e-commerce websites, and other businesses, a paradigm shift from on-site data centers to the cloud is required. Concer... 详细信息
来源: 评论
A pure quantum secret sharing scheme based on GHZ basis measurement and quantum entanglement exchange
收藏 引用
Chinese Physics B 2025年 第3期34卷 95-102页
作者: Bai Liu Jun Zhang Shupin Qiu Mingwu Zhang School of Computer Science Hubei University of TechnologyWuhan 430068China
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing *** the increasing maturity of quantum technology,QSS protocols based on pure quantum m... 详细信息
来源: 评论
Pushing the Limits of WiFi-Based Gait Recognition Towards Non-Gait Human Behaviors
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6137-6153页
作者: Yan, Dawei Yang, Panlong Shang, Fei Han, Feiyu Yan, Yubo Li, Xiang-Yang University of Science and Technology of China School of Computer Science and Technology Hefei230021 China Nanjing University of Information Science & Technology School of Computer Science Nanjing210044 China
WiFi-based gait recognition technologies have seen significant advancements in recent years. However, most existing approaches rely on a critical assumption: users must walk continuously and maintain a consistent body... 详细信息
来源: 评论
Refinement modeling and verification of secure operating systems for communication in digital twins
收藏 引用
Digital Communications and Networks 2024年 第2期10卷 304-314页
作者: Zhenjiang Qian Gaofei Sun Xiaoshuang Xing Gaurav Dhiman School of Computer Science and Engineering Changshu Institute of TechnologySuzhou215500China University Centre for Research and Development Department of Computer Science and EngineeringChandigarh UniversityMohali140413India Department of Computer Science and Engineering Graphic Era Deemed to be UniversityDehradun248002India
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d... 详细信息
来源: 评论
Modified DS np Chart Using Generalized Multiple Dependent State Sampling under Time Truncated Life Test
收藏 引用
computer Modeling in Engineering & sciences 2024年 第3期138卷 2471-2495页
作者: Wimonmas Bamrungsetthapong Pramote Charongrattanasakul Division of Applied Statistics Department of Mathematics and Computer ScienceFaculty of Science and TechnologyRajamangala University of Technology ThanyaburiPathum Thani12110Thailand Division of Mathematics Department of Mathematics and Computer ScienceFaculty of Science and TechnologyRajamangala University of Technology KrungthepBangkok10120Thailand
This study presents the design of a modified attributed control chart based on a double sampling(DS)np chart applied in combination with generalized multiple dependent state(GMDS)sampling to monitor the mean life of t... 详细信息
来源: 评论
Integrating element correlation with prompt-based spatial relation extraction
收藏 引用
Frontiers of computer science 2025年 第2期19卷 59-69页
作者: Feng WANG Sheng XU Peifeng LI Qiaoming ZHU School of Computer Science and Technology Soochow UniversitySuzhou 215006China
Spatial relations in text refer to how a geographical entity is located in space in relation to a reference *** spatial relations from text is a fundamental task in natural language *** studies have only focused on ge... 详细信息
来源: 评论
Enhancing cyber threat detection with an improved artificial neural network model
收藏 引用
Data science and Management 2025年 第1期8卷 107-115页
作者: Oyinloye, Toluwase Sunday Arowolo, Micheal Olaolu Prasad, Rajesh Department of Computer Science African University of Science and Technology Abuja900107 Nigeria Department of Electrical Engineering and Computer Science University of Missouri ColumbiaMO65201 United States
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i... 详细信息
来源: 评论
A Deep Learning Approach to Industrial Corrosion Detection
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2587-2605页
作者: Mehwash Farooqui Atta Rahman Latifa Alsuliman Zainab Alsaif Fatimah Albaik Cadi Alshammari Razan Sharaf Sunday Olatunji Sara Waslallah Althubaiti Hina Gull Department of Computer Engineering(CE) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Science(CS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Information Systems(CIS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have... 详细信息
来源: 评论
A Novel CAPTCHA Recognition System Based on Refined Visual Attention
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 115-136页
作者: Zaid Derea Beiji Zou Xiaoyan Kui Monir Abdullah Alaa Thobhani Amr Abdussalam School of Computer Science and Engineering Central South UniversityChangsha410083China College of Computer Science and Information Technology Wasit UniversityWasit52001Iraq Department of Computer Science and Artificial Intelligence College of Computing and Information TechnologyUniversity of BishaBisha67714Saudi Arabia Electronic Engineering and Information Science Department University of Science and Technology of ChinaHefei230026China
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing huma... 详细信息
来源: 评论