咨询与建议

限定检索结果

文献类型

  • 32,392 篇 会议
  • 19,406 篇 期刊文献
  • 722 册 图书

馆藏范围

  • 52,520 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30,556 篇 工学
    • 19,649 篇 计算机科学与技术...
    • 15,729 篇 软件工程
    • 8,306 篇 信息与通信工程
    • 4,992 篇 控制科学与工程
    • 4,705 篇 电子科学与技术(可...
    • 4,685 篇 电气工程
    • 3,552 篇 生物工程
    • 3,224 篇 生物医学工程(可授...
    • 2,553 篇 光学工程
    • 2,281 篇 机械工程
    • 2,065 篇 仪器科学与技术
    • 2,007 篇 动力工程及工程热...
    • 1,916 篇 化学工程与技术
    • 1,396 篇 材料科学与工程(可...
    • 1,339 篇 网络空间安全
    • 1,270 篇 安全科学与工程
  • 19,025 篇 理学
    • 8,534 篇 数学
    • 7,344 篇 物理学
    • 4,213 篇 生物学
    • 2,783 篇 统计学(可授理学、...
    • 2,144 篇 化学
    • 1,886 篇 系统科学
  • 7,668 篇 管理学
    • 4,923 篇 管理科学与工程(可...
    • 3,014 篇 图书情报与档案管...
    • 2,403 篇 工商管理
  • 3,461 篇 医学
    • 2,859 篇 临床医学
    • 2,485 篇 基础医学(可授医学...
    • 1,491 篇 公共卫生与预防医...
    • 1,476 篇 药学(可授医学、理...
  • 1,364 篇 法学
    • 1,133 篇 社会学
  • 984 篇 经济学
  • 806 篇 农学
  • 540 篇 教育学
  • 231 篇 文学
  • 130 篇 军事学
  • 60 篇 艺术学
  • 8 篇 哲学
  • 8 篇 历史学

主题

  • 1,461 篇 accuracy
  • 1,318 篇 deep learning
  • 1,170 篇 computer science
  • 1,042 篇 machine learning
  • 969 篇 feature extracti...
  • 962 篇 internet of thin...
  • 824 篇 artificial intel...
  • 814 篇 computational mo...
  • 738 篇 training
  • 735 篇 real-time system...
  • 663 篇 convolutional ne...
  • 606 篇 support vector m...
  • 567 篇 optimization
  • 532 篇 predictive model...
  • 466 篇 wireless sensor ...
  • 421 篇 neural networks
  • 414 篇 security
  • 407 篇 data models
  • 389 篇 wireless communi...
  • 364 篇 reliability

机构

  • 1,096 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 979 篇 physikalisches i...
  • 972 篇 oliver lodge lab...
  • 644 篇 infn laboratori ...
  • 619 篇 infn sezione di ...
  • 604 篇 infn sezione di ...
  • 601 篇 fakultät physik ...
  • 593 篇 infn sezione di ...
  • 560 篇 school of physic...
  • 547 篇 university of ch...
  • 542 篇 horia hulubei na...
  • 536 篇 department of ph...
  • 533 篇 school of physic...
  • 526 篇 iccub universita...
  • 520 篇 imperial college...
  • 516 篇 h.h. wills physi...
  • 516 篇 nikhef national ...
  • 510 篇 stfc rutherford ...
  • 505 篇 school of physic...

作者

  • 264 篇 barter w.
  • 258 篇 a. gomes
  • 246 篇 c. alexa
  • 246 篇 beiter a.
  • 244 篇 j. m. izen
  • 241 篇 s. chen
  • 239 篇 g. bella
  • 239 篇 j. strandberg
  • 237 篇 c. amelung
  • 236 篇 d. calvet
  • 236 篇 bellee v.
  • 233 篇 g. spigo
  • 228 篇 brundu d.
  • 228 篇 bowcock t.j.v.
  • 227 篇 blake t.
  • 226 篇 f. siegert
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 y. tayalati

语言

  • 48,813 篇 英文
  • 3,229 篇 其他
  • 380 篇 中文
  • 86 篇 日文
  • 16 篇 德文
  • 13 篇 法文
  • 5 篇 俄文
  • 3 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 荷兰文
  • 3 篇 斯洛文尼亚文
  • 2 篇 朝鲜文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
  • 1 篇 泰文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Communication Engineering Faculty of Engineering"
52520 条 记 录,以下是121-130 订阅
排序:
Joint trust-based detection and signature-based authentication technique for secure localization in underwater wireless sensor network
收藏 引用
Multimedia Tools and Applications 2025年 1-20页
作者: Kumar, Manni Goyal, Nitin Qaisi, Ramy Mohammed Aiesh Najim, Mohd Gupta, Sachin Kumar Department of Computer Science & Engineering Chandigarh University Gharuan Punjab India Department of Computer Science Engineering School of Engineering and Technology Central University of Haryana Haryana Mahendergarh123031 India Department of Electrical and Electronic Engineering College of Engineering University of Jeddah Jeddah21589 Saudi Arabia Department of Electronics and Communication Engineering Central University of Jammu UT of J&K Jammu181143 India
Ensuring secure and accurate node localization in Underwater Wireless Sensor Networks (UWSN) is a significant challenge, as conventional methods tend to neglect the security risks associated with malicious node interf... 详细信息
来源: 评论
Review On the Techniques Used for Detection of Fabric Defects Using AI  1
Review On the Techniques Used for Detection of Fabric Defect...
收藏 引用
1st IEEE International Conference on Advances in Electronics, communication, Computing and Intelligent Information Systems, ICAECIS 2023
作者: Batra, Isheeta Prasad, S A Hari Arvind, K.S. Faculty of Engineering & Technology Department of Computer Science and Engineering Karnataka India Faculty of Engineering & Technology Department of Electronics and Communication Engineering Karnataka India
The garment industry is the second-most polluting industry after oil. These mass-produced clothes if rejected are dumped and have an enormous impact on the environment. Therefore, to save the cost post production it i... 详细信息
来源: 评论
Remote Interference Source Localization: A Multi-UAV-Based Cooperative Framework
收藏 引用
Chinese Journal of Electronics 2022年 第3期31卷 442-455页
作者: WU Guangyu GU Jiangchun Department of Computer Science and Technology University of Science and Technology of China School of Communication Engineering Army Engineering University of PLA
Interference source localization with high accuracy and time efficiency is of crucial importance for protecting spectrum resources. Due to the flexibility of unmanned aerial vehicles(UAVs), exploiting UAVs to locate t... 详细信息
来源: 评论
Enhancing face recognition performance: a comprehensive evaluation of deep learning models and a novel ensemble approach with hyperparameter tuning
收藏 引用
Soft Computing 2024年 第20期28卷 12399-12424页
作者: Selvaganesan, Jana Sudharani, B. Shekhar, S. N. Chandra Vaishnavi, K. Priyadarsini, K. Raju, K. Srujan Rao, T. Srinivasa Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr. Sagunthala R & ampD Institute of Science and Technology Avadi Tamil Nadu Chennai600062 India Guntur Dist. Andhra Pradesh Vadlamudi India Department of Electronics and Communication Engineering Sreenidhi Institute of Science and Technology Telangana Hyderabad501301 India Department of Computer Science and Engineering Sona College of Technology Tamil Nadu Salem636005 India Department of Data Science and Business Systems School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nadu Kattankulathur603203 India Department of Computer Science and Engineering CMR Technical Campus Medchal Telangana Hyderabad501401 India Department of Electronics and Communication Engineering Aditya Engineering College Surampalem533437 India
In response to growing security concerns and the increasing demand for face recognition (FR) technology in various sectors, this research explores the application of deep learning techniques, specifically pre-trained ... 详细信息
来源: 评论
Blockchain Integration in IoT:Applications,Opportunities,and Challenges
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1561-1605页
作者: Mozhgan Gholami Ali Ghaffari Nahideh Derakhshanfard Nadir iBRAHIMO GLU Ali Asghar Pourhaji Kazem Department of Computer Engineering Tabriz BranchIslamic Azad UniversityTabriz***Iran Department of Computer Engineering Faculty of Engineering and Natural ScienceIstinye UniversityIstanbul34396Türkiye Department of Computer Science Khazar UniversityBakuAZ1096Azerbaijan MSDC Department Huawei R&D Center˙Istanbul34768Türkiye
The Internet has been enhanced recently by blockchain and Internet of Things(IoT)*** Internet of Things is a network of various sensor-equipped *** gradually integrates the Internet,sensors,and cloud *** is based on e... 详细信息
来源: 评论
Fake and propaganda images detection using automated adaptive gaining sharing knowledge algorithm with DenseNet121
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第9期15卷 3519-3531页
作者: Muthukumar, A. Raj, M. Thanga Ramalakshmi, R. Meena, A. Kaleeswari, P. Department of Electronics and Communication Engineering Kalasalingam Academy of Research and Education Tamil Nadu Krishnankoil India Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Tamil Nadu Krishnankoil India Department of Electronics and Communication Engineering KLN College of Engineering Tamil Nadu Pottapalayam India
An additional tool for swaying public opinion on social media is to present recent developments in the creation of natural language. The term "Deep fake" originates from deep learning technology, which effor... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Co-clustering method for cold start issue in collaborative filtering movie recommender system
收藏 引用
Multimedia Tools and Applications 2024年 1-25页
作者: AbbasiRad, Ensieh Keyvanpour, Mohammad Reza Tohidi, Nasim Data Mining Laboratory Department of Computer Engineering Faculty of Engineering Alzahra University Tehran Iran Department of Computer Engineering Faculty of Engineering Alzahra University Tehran Iran Computer Engineering Faculty K.N.Toosi University of Technology Tehran Iran Computer Science & amp Engineering University of Michigan Ann ArborMI United States
Recommender systems play an essential role in decision-making in the information age by reducing information overload via retrieving the most relevant information in various applications. They also present great oppor... 详细信息
来源: 评论
Autoencoder-Based Architecture for Identification and Mitigating Phishing URL Attack in IoT Using DNN
收藏 引用
Journal of The Institution of Engineers (India): Series B 2023年 第6期104卷 1227-1240页
作者: Gopal, S.B. Poongodi, C. Nanthiya, D. Kirubakaran, T. Kulavishnusaravanan, B. Logeshwar, D. Department of Electronics and Communication Engineering Kongu Engineering College Perundurai India Department of Computer Science and Engineering Vivekanandha College of Engineering for Women Namakkal India Department of Computer Technology-UG Kongu Engineering College Perundurai India
As a new and potentially devastating form of cyberattack, ‘Phishing’ URLs pose a risk to users by impersonating legitimate websites in an effort to obtain sensitive information such as usernames, passwords, and fina... 详细信息
来源: 评论
Introduction to the Special Issue on Machine Learning-Guided Intelligent Modeling with Its Industrial Applications
收藏 引用
computer Modeling in engineering & sciences 2024年 第10期141卷 7-11页
作者: Xiong Luo Yongqiang Cheng Zhifang Liao School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Faculty of Technology University of SunderlandSunderlandSR60DDUK School of Computer Science and Engineering Central South UniversityChangsha410083China
With the advancement of Artificial Intelligence(AI)technology,traditional industrial systems are undergoing an intelligent transformation,bringing together advanced computing,communication and control technologies,Mac... 详细信息
来源: 评论