咨询与建议

限定检索结果

文献类型

  • 684,331 篇 会议
  • 280,664 篇 期刊文献
  • 6,822 册 图书
  • 7 篇 专利
  • 5 篇 学位论文

馆藏范围

  • 971,825 篇 电子文献
  • 18 种 纸本馆藏

日期分布

学科分类号

  • 567,023 篇 工学
    • 409,772 篇 计算机科学与技术...
    • 326,002 篇 软件工程
    • 121,410 篇 信息与通信工程
    • 81,563 篇 控制科学与工程
    • 60,718 篇 电气工程
    • 57,480 篇 生物工程
    • 54,563 篇 电子科学与技术(可...
    • 41,805 篇 生物医学工程(可授...
    • 35,309 篇 机械工程
    • 35,044 篇 光学工程
    • 26,707 篇 化学工程与技术
    • 24,391 篇 仪器科学与技术
    • 22,005 篇 动力工程及工程热...
    • 19,839 篇 材料科学与工程(可...
    • 16,898 篇 安全科学与工程
    • 15,445 篇 网络空间安全
    • 14,977 篇 交通运输工程
  • 314,896 篇 理学
    • 181,585 篇 数学
    • 83,915 篇 物理学
    • 65,352 篇 生物学
    • 53,760 篇 统计学(可授理学、...
    • 34,016 篇 系统科学
    • 28,549 篇 化学
  • 147,389 篇 管理学
    • 83,209 篇 管理科学与工程(可...
    • 70,352 篇 图书情报与档案管...
    • 40,284 篇 工商管理
  • 38,029 篇 医学
    • 32,043 篇 临床医学
    • 28,633 篇 基础医学(可授医学...
    • 17,735 篇 药学(可授医学、理...
  • 25,035 篇 法学
    • 20,826 篇 社会学
  • 14,863 篇 经济学
  • 13,573 篇 教育学
  • 11,750 篇 农学
  • 4,692 篇 文学
  • 1,904 篇 军事学
  • 1,642 篇 艺术学
  • 771 篇 哲学
  • 313 篇 历史学

主题

  • 63,870 篇 computer science
  • 22,033 篇 computational mo...
  • 19,036 篇 feature extracti...
  • 17,771 篇 accuracy
  • 15,541 篇 training
  • 15,136 篇 data mining
  • 15,068 篇 machine learning
  • 14,474 篇 deep learning
  • 13,676 篇 application soft...
  • 12,933 篇 computer archite...
  • 12,241 篇 semantics
  • 12,202 篇 algorithm design...
  • 11,478 篇 costs
  • 11,415 篇 protocols
  • 11,341 篇 testing
  • 10,896 篇 artificial intel...
  • 10,864 篇 predictive model...
  • 10,559 篇 neural networks
  • 10,545 篇 support vector m...
  • 10,201 篇 optimization

机构

  • 4,993 篇 department of co...
  • 2,841 篇 school of comput...
  • 2,459 篇 college of compu...
  • 2,457 篇 school of comput...
  • 2,413 篇 college of compu...
  • 2,128 篇 chitkara univers...
  • 2,045 篇 department of co...
  • 1,671 篇 department of co...
  • 1,559 篇 university of ch...
  • 1,526 篇 school of comput...
  • 1,500 篇 department of co...
  • 1,431 篇 school of comput...
  • 1,294 篇 department of el...
  • 1,286 篇 department of co...
  • 1,275 篇 school of comput...
  • 1,244 篇 school of comput...
  • 1,229 篇 school of comput...
  • 1,150 篇 school of comput...
  • 1,087 篇 department of co...
  • 1,063 篇 department of el...

作者

  • 524 篇 liu yang
  • 422 篇 wang wei
  • 376 篇 niyato dusit
  • 301 篇 yang yang
  • 279 篇 wei li
  • 272 篇 wei wang
  • 254 篇 li li
  • 250 篇 barter w.
  • 238 篇 zhang lei
  • 237 篇 li yang
  • 233 篇 s. chen
  • 222 篇 blake t.
  • 216 篇 j. wang
  • 213 篇 bellee v.
  • 208 篇 brundu d.
  • 206 篇 bowcock t.j.v.
  • 206 篇 borsato m.
  • 203 篇 a. gomes
  • 202 篇 betancourt c.
  • 197 篇 beiter a.

语言

  • 874,274 篇 英文
  • 87,468 篇 其他
  • 10,522 篇 中文
  • 448 篇 日文
  • 245 篇 德文
  • 116 篇 法文
  • 101 篇 斯洛文尼亚文
  • 74 篇 西班牙文
  • 67 篇 朝鲜文
  • 63 篇 俄文
  • 28 篇 葡萄牙文
  • 27 篇 意大利文
  • 14 篇 阿拉伯文
  • 9 篇 土耳其文
  • 6 篇 捷克文
  • 6 篇 荷兰文
  • 3 篇 波兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science Technology and Computer Science"
971829 条 记 录,以下是721-730 订阅
排序:
supported by the National Natural science Foundation of China(Nos.62172051,61772085,and 61877005)and Jiangsu Agriculture science and technology Innovation Fund(***(18)3054).
收藏 引用
Tsinghua science and technology 2023年 第1期28卷 82-92页
作者: Jinghui Zhang Yuchen Wang Tianyu Huang Fang Dong Wei Zhao Dian Shen School of Computer Science and Engineering Southeast UniversityNanjing 211189China Hefei Comprehensive National Science Center Hefei 231299China School of Computer Science and Technology Anhui University of TechnologyHefei 230026China Department of Computer Science&Engineering The Chinese University of Hong KongHong Kong 999077China
Numerous neural network(NN)applications are now being deployed to mobile *** applications usually have large amounts of calculation and data while requiring low inference latency,which poses challenges to the computin... 详细信息
来源: 评论
Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4663-4686页
作者: Aljuaid Turkea Ayedh M Ainuddin Wahid Abdul Wahab Mohd Yamani Idna Idris Faculty of Computer Science and Information Technology Universiti MalayaKuala Lumpur50603Malaysia Faculty of Computer Science and Information Technology Shaqra UniversityShaqra11961Saudi Arabia Center for Mobile Cloud Computing Faculty of Computer Science and Information TechnologyUniversiti MalayaKuala Lumpur50603Malaysia
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce ***,this trend introduces security challenges,such as unauthorized *** access control systems,such as Attribute-Base... 详细信息
来源: 评论
Optimized AI and IoT-Driven Framework for Intelligent Water Resource Management
收藏 引用
IEEE Access 2025年 13卷 97628-97646页
作者: Rokaya, Mahmoud Hemdan, Dalia I. Alajmani, Samah Hazzaa Alyami, Raneem Yousif Elmarhomy, Ghada Hashim, Hasan Atlam, El-Sayed College of Computers and Information Technology Taif University Department of Information Technology P.O. Box 11099 Taif21944 Saudi Arabia Taif University Faculty of Science Department of Food Science and Nutrition P.O. Box 11099 Taif21944 Saudi Arabia College of Computer Science and Engineering Taibah University Department of Information Systems Saudi Arabia Tanta University Department Computer Science Faculty of Science Tanta31527 Egypt Taibah University College of Computer Science and Engineering Department of Computer Science Yanbu6421 Saudi Arabia
The scheme of water resources management is a necessity for reducing water scarcity in arid areas and improving water availability in general [1]. However, water leak detection and irrigation scheduling traditional AI... 详细信息
来源: 评论
Predictive VM placement algorithm for resource optimization: leveraging deep learning forecasting and resource relationship modeling
收藏 引用
International Journal of computers and Applications 2025年 第4期47卷 398-411页
作者: Garg, Rajni Arora, Indu Gupta, Anu Department of Computer Science Lala Lajpat Rai Govt. College Moga India Department of Computer Science Mehr Chand Mahajan DAV College for Women Chandigarh India Department of Computer Science and Applications Panjab University Chandigarh India
The growing demand for cloud computing has made it imperative to optimize the utilization of cloud resources. Resource optimization can be improved through Virtual Machine (VM) Placement. In order to effectively optim... 详细信息
来源: 评论
Comprehensive analysis of various imputation and forecasting models for predicting PM2.5 pollutant in Delhi
收藏 引用
Neural Computing and Applications 2025年 第17期37卷 11441-11458页
作者: Karnati, Hemanth Soma, Anuraag Alam, Adnan Kalaavathi, B. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India Department of IoT School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India
Understanding and predicting air quality is pivotal for public health and environmental management, especially in urban areas like Delhi. This study utilizes a comprehensive dataset from the Central Pollution Control ... 详细信息
来源: 评论
UAV-Assisted Multi-Object Computing Offloading for Blockchain-Enabled Vehicle-to-Everything Systems
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 3927-3950页
作者: Ting Chen Shujiao Wang Xin Fan Xiujuan Zhang Chuanwen Luo Yi Hong School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Computer Science Qufu Normal UniversityRizhao276826China School of Information Science and Technology Beijing Forestry UniversityBeijing100083China
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication... 详细信息
来源: 评论
Object Segmentation in Thermal Images Using YOLOv8  5th
Object Segmentation in Thermal Images Using YOLOv8
收藏 引用
5th International Conference on Computing and Network Communications, CoCoNet 2023
作者: Muften, Haider Ali Khayeat, Ali Retha Hasoon College of Computer Science and Information Technology University of Kerbala Computer Science Department Karbala Iraq
Thermal images are crucial for object detection in surveillance, security, industrial automation, and vehicular navigation due to their ability to capture heat signatures. However, complexities like low contrast, fluc... 详细信息
来源: 评论
Explainable AI model for PDFMal detection based on gradient boosting model
收藏 引用
Neural Computing and Applications 2024年 第34期36卷 21607-21622页
作者: Elattar, Mona Younes, Ahmed Gad, Ibrahim Elkabani, Islam Department of Computer Science Faculty of Science Tanta University Tanta31527 Egypt Department of Mathematics and Computer Science Faculty of Science Alexandria University Alexandria21511 Egypt Faculty of Computer Science and Engineering Al Alamein International University Alamein51718 Egypt
Portable document formats (PDFs) are widely used for document exchange due to their widespread usage and versatility. However, PDFs are highly vulnerable to malware attacks, which pose significant security risks. Exis... 详细信息
来源: 评论
Cultivating road safety: A comprehensive examination of intelligent ensemble-based road crack detection
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10747-10780页
作者: Navpreet Roul, Rajendra Kumar Rani, Rinkle Department of Computer Science and Engineering Thapar Institute of Engineering & Technology Punjab Patiala147004 India
Detecting and promptly identifying cracks on road surfaces is of paramount importance for preserving infrastructure integrity and ensuring the safety of road users, including both drivers and pedestrians. Presently, t... 详细信息
来源: 评论
An Attention-Based Approach to Enhance the Detection and Classification of Android Malware
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2743-2760页
作者: Abdallah Ghourabi Department of Computer Science College of Computer and Information SciencesJouf UniversitySakaka72388Saudi Arabia
The dominance of Android in the global mobile market and the open development characteristics of this platform have resulted in a significant increase in *** malicious applications have become a serious concern to the... 详细信息
来源: 评论