咨询与建议

限定检索结果

文献类型

  • 478,728 篇 会议
  • 301,720 篇 期刊文献
  • 4,757 册 图书
  • 1 篇 学位论文

馆藏范围

  • 785,200 篇 电子文献
  • 14 种 纸本馆藏

日期分布

学科分类号

  • 474,482 篇 工学
    • 242,237 篇 计算机科学与技术...
    • 193,032 篇 软件工程
    • 89,366 篇 信息与通信工程
    • 72,239 篇 电气工程
    • 72,072 篇 电子科学与技术(可...
    • 65,176 篇 控制科学与工程
    • 64,937 篇 化学工程与技术
    • 51,748 篇 材料科学与工程(可...
    • 43,111 篇 生物工程
    • 38,510 篇 机械工程
    • 36,518 篇 光学工程
    • 35,725 篇 生物医学工程(可授...
    • 34,874 篇 动力工程及工程热...
    • 27,839 篇 仪器科学与技术
    • 20,922 篇 冶金工程
    • 20,484 篇 力学(可授工学、理...
    • 16,408 篇 土木工程
    • 15,373 篇 建筑学
    • 15,173 篇 环境科学与工程(可...
  • 295,656 篇 理学
    • 120,875 篇 数学
    • 120,798 篇 物理学
    • 60,626 篇 化学
    • 51,758 篇 生物学
    • 38,354 篇 统计学(可授理学、...
    • 25,959 篇 系统科学
  • 98,875 篇 管理学
    • 63,961 篇 管理科学与工程(可...
    • 37,780 篇 图书情报与档案管...
    • 28,596 篇 工商管理
  • 35,596 篇 医学
    • 27,955 篇 临床医学
    • 23,813 篇 基础医学(可授医学...
  • 16,089 篇 法学
  • 12,671 篇 经济学
  • 11,149 篇 农学
  • 7,275 篇 教育学
  • 2,919 篇 文学
  • 1,736 篇 军事学
  • 1,064 篇 艺术学
  • 182 篇 哲学
  • 122 篇 历史学

主题

  • 26,077 篇 computer science
  • 13,464 篇 computational mo...
  • 13,285 篇 accuracy
  • 12,804 篇 feature extracti...
  • 10,711 篇 deep learning
  • 10,561 篇 training
  • 10,456 篇 machine learning
  • 8,252 篇 data mining
  • 7,999 篇 optimization
  • 7,490 篇 predictive model...
  • 7,395 篇 costs
  • 7,341 篇 bandwidth
  • 7,317 篇 computer archite...
  • 7,268 篇 algorithm design...
  • 7,200 篇 neural networks
  • 7,114 篇 wireless sensor ...
  • 7,113 篇 support vector m...
  • 6,914 篇 testing
  • 6,755 篇 robustness
  • 6,517 篇 protocols

机构

  • 4,977 篇 department of co...
  • 2,439 篇 school of comput...
  • 2,217 篇 chitkara univers...
  • 2,199 篇 university of ch...
  • 1,937 篇 infn laboratori ...
  • 1,779 篇 infn sezione di ...
  • 1,598 篇 cavendish labora...
  • 1,514 篇 department of co...
  • 1,502 篇 infn sezione di ...
  • 1,415 篇 department of el...
  • 1,291 篇 school of comput...
  • 1,256 篇 infn sezione di ...
  • 1,233 篇 infn sezione di ...
  • 1,232 篇 institute of hig...
  • 1,082 篇 school of comput...
  • 1,065 篇 department of co...
  • 1,046 篇 infn sezione di ...
  • 1,038 篇 department of el...
  • 989 篇 yerevan physics ...
  • 980 篇 infn sezione di ...

作者

  • 513 篇 ali b.
  • 441 篇 annovi a.
  • 440 篇 bachacou h.
  • 398 篇 akimov a.v.
  • 397 篇 alexopoulos t.
  • 393 篇 waltenberger w.
  • 393 篇 lowette s.
  • 393 篇 azuelos g.
  • 393 篇 aad g.
  • 388 篇 aloisio a.
  • 379 篇 tavernier s.
  • 372 篇 alonso f.
  • 369 篇 amidei d.
  • 366 篇 arce a.t.h.
  • 365 篇 arnaez o.
  • 365 篇 alimonti g.
  • 364 篇 liu yang
  • 363 篇 alexa c.
  • 362 篇 argyropoulos s.
  • 358 篇 yang yang

语言

  • 678,310 篇 英文
  • 92,784 篇 其他
  • 13,689 篇 中文
  • 1,357 篇 日文
  • 567 篇 德文
  • 530 篇 法文
  • 214 篇 朝鲜文
  • 91 篇 斯洛文尼亚文
  • 60 篇 阿拉伯文
  • 45 篇 俄文
  • 25 篇 西班牙文
  • 19 篇 土耳其文
  • 13 篇 意大利文
  • 12 篇 荷兰文
  • 6 篇 波兰文
  • 6 篇 葡萄牙文
  • 5 篇 爱沙尼亚文
  • 4 篇 捷克文
  • 2 篇 克罗地亚文
  • 2 篇 泰文
检索条件"机构=Department of Computer Science University of Engineering and Technology"
785206 条 记 录,以下是551-560 订阅
排序:
Introduction to the Special Issue on the Bottleneck of Blockchain Techniques Scalability,Security and Privacy Protection
收藏 引用
computer Modeling in engineering & sciences 2024年 第12期141卷 1933-1937页
作者: Shen Su Daojing He Neeraj Kumar Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China School of Computer Science and Technology Harbin Institute of Technology(Shenzhen)Shenzhen518055China Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyPatiala147004India
Blockchain technology has been extensively studied over the past decade as a foundation for decentralized information-sharing platforms due to its promising *** the success of existing blockchain architectures like Bi... 详细信息
来源: 评论
Fault-tolerant capability analysis of six-phase induction motor with distributed, concentrated, and pseudo-concentrated windings
收藏 引用
Scientia Iranica 2024年 第10期31卷 775-789页
作者: Alemi-Rostami, Mehdi Rezazadeh, Ghasem Tahami, Farzad Akbari-Resketi, Hamid Reza Ministry of Science Research and Technology Tehran Iran School of Electrical and Computer Engineering College of Engineering University of Tehran Tehran Iran Department of Electrical Engineering Sharif University of Technology Tehran Iran Department of Electrical and Computer Engineering Babol Noshirvani University of Technology Babol Iran
Six-phase motors are becoming more popular because of their advantages such as lower torque ripple, better power distribution per phase, higher efficiency, and fault-tolerant capability compared to the three-phase one... 详细信息
来源: 评论
Formalization of the Telegrapher’s Equations using Higher-Order-Logic Theorem Proving
Journal of Applied Logics
收藏 引用
Journal of Applied Logics 2024年 第2期11卷 197-236页
作者: Deniz, Elif Rashid, Adnan Hasan, Osman Tahar, Sofiène Department of Electrical and Computer Engineering Concordia University MontrealQC Canada School of Electrical Engineering and Computer Science National University of Sciences and Technology Islamabad Pakistan
The telegrapher’s equations constitute a set of linear partial differential equations that establish a mathematical correspondence between the electrical current and voltage within transmission lines, taking into acc... 详细信息
来源: 评论
Multi-Task Chinese Speech Recognition Method Based on the Squeezeformer Model
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第1期52卷 23-31页
作者: Guo, Ying Wang, Li School of Computer Science and software Engineering University of Science and Technology Liaoning Anshan114051 China College of Computer Science and Technology Liaoning Anshan114051 China
End-to-end training has emerged as a prominent trend in speech recognition, with Conformer models effectively integrating Transformer and CNN architectures. However, their complexity and high computational cost pose d... 详细信息
来源: 评论
Performance Analysis of ZF and RZF in Low-Resolution ADC/DAC Massive MIMO Systems
收藏 引用
China Communications 2024年 第8期21卷 115-126页
作者: Talha Younas Shen Jin Muluneh Mekonnen Gao Mingliang Saqib Saleem Sohaib Tahir Mahrukh Liaqat School of Electrical and Electronic Engineering Shandong University of TechnologyZibo 255000China Department of Electrical and Computer Engineering COMSATS University IslamabadSahiwal Campus Department of Electrical and Computer Engineering College of EngineeringDhofar UniversitySalalah 211Oman Department of Electrical and Computer Engineering Addis Ababa Science and Technology UniversityAddis AbabaEthiopia Department of Electrical Engineering College of Electrical and Mechanical EngineeringNUSTIslamabadPakistan
Large number of antennas and higher bandwidth usage in massive multiple-input-multipleoutput(MIMO)systems create immense burden on receiver in terms of higher power *** power consumption at the receiver radio frequenc... 详细信息
来源: 评论
Hybrid Optimization Algorithm for Handwritten Document Enhancement
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3763-3786页
作者: Shu-Chuan Chu Xiaomeng Yang Li Zhang Václav Snášel Jeng-Shyang Pan College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China School of Information and Control Engineering Qingdao University of TechnologyQingdao266520China Faculty of Electrical Engineering and Computer Science VŠB-TU OstravaOstrava70080Czech Republic Department of Information Management Chaoyang University of TechnologyTaichung41349Taiwan
The Gannet Optimization Algorithm (GOA) and the Whale Optimization Algorithm (WOA) demonstrate strong performance;however, there remains room for improvement in convergence and practical applications. This study intro... 详细信息
来源: 评论
Color Image Compression and Encryption Algorithm Based on 2D Compressed Sensing and Hyperchaotic System
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1977-1993页
作者: Zhiqing Dong Zhao Zhang Hongyan Zhou Xuebo Chen School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan114051China School of Electronic and Information Engineering University of Science and Technology LiaoningAnshan114051China
With the advent of the information security era,it is necessary to guarantee the privacy,accuracy,and dependable transfer of *** study presents a new approach to the encryption and compression of color *** is predicat... 详细信息
来源: 评论
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论
A comprehensive review and open issues on energy aware resource allocation in cloud
收藏 引用
International Journal of Web engineering and technology 2023年 第4期17卷 353-371页
作者: Singh, Shubham Singh, Pawan Tanwar, Sudeep Department of Computer Science and Engineering Amity University Uttar Pradesh Lucknow Campus India Department of Computer Science and Engineering Institute of Technology Nirma University India
Cloud computing is an on-demand service resource that includes applications to data centres on a pay-per-use basis. While allocating resources, the node failure causes the cloud service failures. This reduces the qual... 详细信息
来源: 评论
Per-user network access control kernel module with secure multifactor authentication
收藏 引用
Journal of Supercomputing 2024年 第1期80卷 970-1008页
作者: Cheng, Sheng-Tzong Horng, Gwo-Jiun Hsu, Chih-Wei Su, Z.-Yu Department of Computer Science and Information Engineering National Cheng Kung University Tainan701 Taiwan Department of Computer Science and Information Engineering Southern Taiwan University of Science and Technology Tainan Taiwan
Network attacks, such as botnets stealing sensitive data, constitute a critical concern for administrators in the Internet area. Such attacks can be prevented using a network access control (NAC) scheme. However, exis... 详细信息
来源: 评论