咨询与建议

限定检索结果

文献类型

  • 687,887 篇 会议
  • 281,724 篇 期刊文献
  • 6,822 册 图书
  • 7 篇 专利
  • 5 篇 学位论文

馆藏范围

  • 976,441 篇 电子文献
  • 18 种 纸本馆藏

日期分布

学科分类号

  • 569,735 篇 工学
    • 412,847 篇 计算机科学与技术...
    • 327,883 篇 软件工程
    • 123,616 篇 信息与通信工程
    • 83,851 篇 控制科学与工程
    • 61,020 篇 电气工程
    • 57,656 篇 生物工程
    • 54,656 篇 电子科学与技术(可...
    • 42,009 篇 生物医学工程(可授...
    • 35,791 篇 机械工程
    • 35,756 篇 光学工程
    • 26,894 篇 化学工程与技术
    • 24,834 篇 仪器科学与技术
    • 22,443 篇 动力工程及工程热...
    • 19,032 篇 材料科学与工程(可...
    • 17,478 篇 安全科学与工程
    • 16,463 篇 网络空间安全
    • 15,563 篇 交通运输工程
  • 317,004 篇 理学
    • 182,330 篇 数学
    • 84,511 篇 物理学
    • 65,586 篇 生物学
    • 53,816 篇 统计学(可授理学、...
    • 34,053 篇 系统科学
    • 29,112 篇 化学
  • 149,172 篇 管理学
    • 84,605 篇 管理科学与工程(可...
    • 71,114 篇 图书情报与档案管...
    • 40,506 篇 工商管理
  • 38,855 篇 医学
    • 32,434 篇 临床医学
    • 28,780 篇 基础医学(可授医学...
    • 17,750 篇 药学(可授医学、理...
  • 25,359 篇 法学
    • 21,117 篇 社会学
  • 15,018 篇 经济学
  • 13,697 篇 教育学
  • 11,862 篇 农学
  • 4,797 篇 文学
  • 1,908 篇 军事学
  • 1,649 篇 艺术学
  • 766 篇 哲学
  • 316 篇 历史学

主题

  • 63,832 篇 computer science
  • 22,122 篇 computational mo...
  • 19,230 篇 feature extracti...
  • 18,153 篇 accuracy
  • 15,658 篇 training
  • 15,421 篇 machine learning
  • 15,142 篇 data mining
  • 15,028 篇 deep learning
  • 13,642 篇 application soft...
  • 12,949 篇 computer archite...
  • 12,279 篇 semantics
  • 12,175 篇 algorithm design...
  • 11,480 篇 costs
  • 11,423 篇 protocols
  • 11,346 篇 testing
  • 11,035 篇 artificial intel...
  • 10,973 篇 predictive model...
  • 10,614 篇 support vector m...
  • 10,576 篇 neural networks
  • 10,343 篇 optimization

机构

  • 4,981 篇 department of co...
  • 2,848 篇 school of comput...
  • 2,474 篇 school of comput...
  • 2,468 篇 college of compu...
  • 2,433 篇 college of compu...
  • 2,202 篇 chitkara univers...
  • 2,061 篇 department of co...
  • 1,665 篇 department of co...
  • 1,578 篇 university of ch...
  • 1,521 篇 school of comput...
  • 1,495 篇 department of co...
  • 1,438 篇 school of comput...
  • 1,283 篇 school of comput...
  • 1,279 篇 department of co...
  • 1,267 篇 department of el...
  • 1,259 篇 school of comput...
  • 1,244 篇 school of comput...
  • 1,156 篇 school of comput...
  • 1,082 篇 department of co...
  • 1,075 篇 department of el...

作者

  • 527 篇 liu yang
  • 433 篇 wang wei
  • 386 篇 niyato dusit
  • 302 篇 yang yang
  • 283 篇 wei li
  • 277 篇 wei wang
  • 258 篇 li li
  • 250 篇 barter w.
  • 242 篇 li yang
  • 237 篇 zhang lei
  • 233 篇 s. chen
  • 225 篇 blake t.
  • 216 篇 j. wang
  • 213 篇 bellee v.
  • 208 篇 brundu d.
  • 206 篇 bowcock t.j.v.
  • 206 篇 zhang wei
  • 204 篇 borsato m.
  • 203 篇 a. gomes
  • 202 篇 betancourt c.

语言

  • 847,413 篇 英文
  • 119,093 篇 其他
  • 10,905 篇 中文
  • 450 篇 日文
  • 262 篇 德文
  • 133 篇 斯洛文尼亚文
  • 129 篇 法文
  • 74 篇 西班牙文
  • 69 篇 俄文
  • 68 篇 朝鲜文
  • 28 篇 葡萄牙文
  • 27 篇 意大利文
  • 18 篇 阿拉伯文
  • 7 篇 捷克文
  • 7 篇 土耳其文
  • 4 篇 荷兰文
  • 3 篇 波兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 芬兰文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science Technology and Computer Science"
976445 条 记 录,以下是4631-4640 订阅
排序:
Decentralized Stock Exchange using Blockchain Network  7
Decentralized Stock Exchange using Blockchain Network
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Shabu, S.L. Jany Ronie Joe, J. Pooja, R.A. Sathyabama Institute of Science And Technology Department of Computer Science And Engineering Tamil Nadu 600119 India
This research intends to contribute to the ongoing evolution of decentralized financial systems by proposing a novel architecture for a decentralized stock exchange. By analyzing the successes and challenges of existi... 详细信息
来源: 评论
An approach to on-stream DDoS blitz detection using machine learning algorithms
收藏 引用
Materials Today: Proceedings 2023年 80卷 3492-3499页
作者: Manjula, H.T. Neha Mangla Atria Institute Of Technology Bengaluru India Department Of Computer Science & Engineering CMRIT Bengaluru India Department of Information Science & Engineering Atria Institute of Technology Bengaluru India
Distributed Denial of service (DDoS) attacks is an enormous threat to today's cyber world, cyber networks are compromised by the attackers to distribute attacks in a large volume by denying the service to legitima... 详细信息
来源: 评论
Predicting User Behavior Models Using M-Commerce Methods Decorated with Weighted Scoring and Mining Techniques  2
Predicting User Behavior Models Using M-Commerce Methods Dec...
收藏 引用
2nd International Conference on Computing and Data Analytics, ICCDA 2024
作者: Karthikeyan, Nagarajan Ramaraj, Muniappan Bhaarathi, Ilango Thangarasu, N. Chembath, Jothish Kumuthini, C. Kristu Jayanti College of Arts and Science Department of Computer Science Bengaluru India Rathinam College of Arts and Science Department of Computer Science Coimbatore India Karpagam Academy of Higher Education Department of Computer Science Coimbatore India Presidency University Department of Computer Science Bengaluru India Dr.NGP Arts and Science College Department of Computer Applications Coimbatore India
Mobile-based devices and systems are now a common feature of daily life. Mobile trade is a new and more powerful emerging technology. In addition to the fast progress of the increasing popularity of powerful mobile de... 详细信息
来源: 评论
Adversarial Attack on Object Detection via Object Feature-Wise Attention and Perturbation Extraction
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1174-1189页
作者: Wei Xue Xiaoyan Xia Pengcheng Wan Ping Zhong Xiao Zheng School of Computer Science and Technology Anhui University of TechnologyMaanshan 243032China National Key Laboratory of Science and Technology on Automatic Target Recognition National University of Defense TechnologyChangsha 410073China
Deep neural networks are commonly used in computer vision tasks,but they are vulnerable to adversarial samples,resulting in poor recognition *** traditional algorithms that craft adversarial samples have been effectiv... 详细信息
来源: 评论
NB-SSH: NB-IoT-Based Remote SSH Access to UAVs under Symmetric NAT
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2024年 第1期6卷 6-10页
作者: Zhu, Xiaojun Tang, Jiao Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing211106 China
When NB-IoT is used to monitor UAVs, developers need to access a UAV via SSH (Secure Shell). However, NB-IoT services are sometimes behind symmetric NAT, and NB-IoT modules can only be controlled by specific AT comman... 详细信息
来源: 评论
Machine Learning-Based Approach to Predict Heart Diseases Using Fused Dataset  3rd
Machine Learning-Based Approach to Predict Heart Diseases Us...
收藏 引用
3rd International Conference on Trends in Electronics and Health Informatics, TEHI 2023
作者: Uddin, Khandaker Mohammad Mohi Mohamed, Abdirahman Biswas, Nitish Mostafiz, Rafid Department of Computer Science and Engineering Southeast University Dhaka1208 Bangladesh Department of Computer Science and Engineering Dhaka International University Dhaka1205 Bangladesh Institute of Information Technology Noakhali Science and Technology University Noakhali Bangladesh
Cardiovascular disease is currently a prominent sickness that kills the majority of sufferers. The medical evaluation of cardiac disease presents significant problems. This diagnostic method is complex, requiring prec... 详细信息
来源: 评论
Energy-Efficient Multi-AAV Collaborative Reliable Storage: A Deep Reinforcement Learning Approach
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20913-20926页
作者: Huang, Zhaoxiang Yu, Zhiwen Huang, Zhijie Zhou, Huan Yang, Erhe Yu, Ziyue Xu, Jiangyan Guo, Bin Northwestern Polytechnical University School of Computer Science Xi’an710129 China Harbin Engineering University College of Computer Science and Technology Harbin150001 China Northwestern Polytechnical University School of Software Xi’an710129 China
Autonomous aerial vehicle (AAV) crowdsensing, as a complement to mobile crowdsensing, can provide ubiquitous sensing in extreme environments and has gathered significant attention in recent years. In this article, we ... 详细信息
来源: 评论
Research on Path Planning method for Intelligent Vehicle  6
Research on Path Planning method for Intelligent Vehicle
收藏 引用
6th International Conference on Frontier Technologies of Information and computer, ICFTIC 2024
作者: Zuo, Yihan Wang, Jingbin Beijing Information Science and Technology University Department of Computer Science and Technology Beijing China Beijing Information Science and Technology University Department of Management Engineering and Science Beijing China
This paper proposes A dynamic switching strategy based on Dijkstra algorithm and A ∗ algorithm. By setting a threshold, the dynamic switching algorithm according to the distance can improve the efficiency of path plan... 详细信息
来源: 评论
Covid-19 Future Forecasting Using Supervised Machine Learning Models  8
Covid-19 Future Forecasting Using Supervised Machine Learnin...
收藏 引用
8th IEEE International Conference on science, technology, Engineering and Mathematics, ICONSTEM 2023
作者: Lavanya, Bassetti Lakshmi Katyayani, Vemula Jancy, S. Pushpa Latha, S. Marya, Viji Amutha Sujihelen, L. Selvan, Mercy Paul Sathyabama Institute of Science and Technology Computer Science and Engineering Chennai India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Chennai India
The outbreak of the unconventional coronavirus or COVID-19 is affecting the whole global in various parts of the arena and has resulted in hundreds of thousands of deaths. This stays an ominous public fitness caution ... 详细信息
来源: 评论
Spatial Pyramid Image Representation with DCT Features for Offline Signature Verification  8th
Spatial Pyramid Image Representation with DCT Features for...
收藏 引用
8th International Symposium on Intelligent Informatics, ISI 2023
作者: Pilar, Bharathi Shekar, B.H. Abraham, Wincy Kumar, D. S. Sunil Department of Computer Science Mangalore University Karnataka Konaje India Department of Computer Science Assumption College Kerala Changanassery India Department of Computer Science University College Mangalore Kerala Mangaluru India
This paper presents a Spatial Pyramid image representation-based technique with global and local features captured through DCT coefficient at various levels for offline signature verification. The spatial pyramid feat... 详细信息
来源: 评论