咨询与建议

限定检索结果

文献类型

  • 273,162 篇 会议
  • 112,863 篇 期刊文献
  • 2,781 册 图书

馆藏范围

  • 388,805 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 225,103 篇 工学
    • 149,617 篇 计算机科学与技术...
    • 121,008 篇 软件工程
    • 54,628 篇 信息与通信工程
    • 35,815 篇 控制科学与工程
    • 31,966 篇 电气工程
    • 30,609 篇 电子科学与技术(可...
    • 26,000 篇 生物工程
    • 20,441 篇 生物医学工程(可授...
    • 17,850 篇 光学工程
    • 15,546 篇 机械工程
    • 13,079 篇 化学工程与技术
    • 12,209 篇 仪器科学与技术
    • 12,154 篇 动力工程及工程热...
    • 10,920 篇 材料科学与工程(可...
    • 8,327 篇 安全科学与工程
    • 7,877 篇 网络空间安全
  • 127,332 篇 理学
    • 63,220 篇 数学
    • 41,829 篇 物理学
    • 29,490 篇 生物学
    • 20,402 篇 统计学(可授理学、...
    • 14,882 篇 系统科学
    • 14,048 篇 化学
  • 55,978 篇 管理学
    • 33,687 篇 管理科学与工程(可...
    • 24,484 篇 图书情报与档案管...
    • 16,673 篇 工商管理
  • 19,407 篇 医学
    • 16,215 篇 临床医学
    • 14,576 篇 基础医学(可授医学...
    • 9,158 篇 药学(可授医学、理...
    • 7,764 篇 公共卫生与预防医...
  • 10,518 篇 法学
    • 8,605 篇 社会学
  • 6,451 篇 经济学
  • 5,099 篇 农学
  • 4,167 篇 教育学
  • 1,866 篇 文学
  • 872 篇 军事学
  • 511 篇 艺术学
  • 75 篇 哲学
  • 46 篇 历史学

主题

  • 19,985 篇 computer science
  • 8,799 篇 accuracy
  • 8,606 篇 computational mo...
  • 7,863 篇 feature extracti...
  • 7,458 篇 deep learning
  • 7,238 篇 machine learning
  • 6,427 篇 training
  • 5,257 篇 data mining
  • 5,110 篇 computer archite...
  • 5,016 篇 support vector m...
  • 4,932 篇 wireless sensor ...
  • 4,799 篇 predictive model...
  • 4,649 篇 costs
  • 4,531 篇 bandwidth
  • 4,483 篇 optimization
  • 4,478 篇 application soft...
  • 4,369 篇 protocols
  • 4,351 篇 algorithm design...
  • 4,321 篇 testing
  • 4,273 篇 neural networks

机构

  • 1,696 篇 department of co...
  • 1,364 篇 department of co...
  • 1,346 篇 department of el...
  • 1,158 篇 department of el...
  • 1,063 篇 cavendish labora...
  • 973 篇 department of ph...
  • 879 篇 department of co...
  • 856 篇 physikalisches i...
  • 844 篇 oliver lodge lab...
  • 818 篇 department of el...
  • 745 篇 university of ch...
  • 638 篇 department of co...
  • 550 篇 infn sezione di ...
  • 539 篇 department of co...
  • 521 篇 infn laboratori ...
  • 519 篇 infn sezione di ...
  • 516 篇 chitkara univers...
  • 502 篇 horia hulubei na...
  • 502 篇 infn sezione di ...
  • 486 篇 department of co...

作者

  • 258 篇 s. chen
  • 256 篇 j. wang
  • 250 篇 barter w.
  • 237 篇 a. gomes
  • 225 篇 blake t.
  • 223 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 j. m. izen
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 204 篇 bencivenni g.
  • 195 篇 bay a.
  • 193 篇 g. bella
  • 193 篇 c. amelung
  • 192 篇 j. strandberg

语言

  • 372,465 篇 英文
  • 12,661 篇 其他
  • 3,698 篇 中文
  • 220 篇 日文
  • 47 篇 德文
  • 34 篇 朝鲜文
  • 33 篇 法文
  • 17 篇 斯洛文尼亚文
  • 8 篇 西班牙文
  • 8 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Computer Engineering"
388806 条 记 录,以下是151-160 订阅
排序:
Relay Type Link Fabrication Attack in SDN: A Review
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2025年 第1期7卷 51-55页
作者: Metaferia, Getahun Lemma, Frezewd Adama Science and Technology University Department of Computer Science and Engineering Adama1881 Ethiopia
Software-defined Networking (SDN) is an innovative network architecture tailored to address the modern demands of network virtualization and cloud computing, which require features such as programmability, flexibility... 详细信息
来源: 评论
Semantic deep learning and adaptive clustering for handling multimodal multimedia information retrieval
收藏 引用
Multimedia Tools and Applications 2025年 第13期84卷 11795-11831页
作者: Sattari, Saeid Yazici, Adnan Computer Engineering Department Middle East Technical University Ankara06531 Turkey Computer Science Department Nazarbayev University Astana010000 Kazakhstan
Multimedia data encompasses various modalities, including audio, visual, and text, necessitating the development of robust retrieval methods capable of harnessing these modalities to extract and retrieve semantic info... 详细信息
来源: 评论
Ensuring safety of vehicular cyber physical systems using machine learning and MQTT
收藏 引用
International Journal of Vehicle Information and Communication Systems 2025年 第2期10卷 165-183页
作者: Bagga, Neha Kalra, Sheetal Kaur, Parminder Department of Computer Science Guru Nanak Dev University Punjab Amritsar India School of Computer Science Engineering Lovely Professional University Punjab Phagwara India Department of Computer Science and Engineering G.N.D.U. Regional Campus Punjab Jalandhar India
One of the pressing concerns for emerging nations is maintenance of roads, including identification and repair of pavement distress. Previous research has focused on pothole detection and lane identification, with the... 详细信息
来源: 评论
Predicting heart disease based on an intelligent healthcare monitoring system using HPM-NIA
收藏 引用
Multimedia Tools and Applications 2025年 第13期84卷 11475-11501页
作者: Alharbi, Meshal Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj Saudi Arabia
Before a heart attack happens, treating cardiac patients effectively depends on precise heart disease prediction. A heart disease prediction system for the determination of whether the patient has a heart disease cond... 详细信息
来源: 评论
Enhancing User Experience in AI-Powered Human-computer Communication with Vocal Emotions Identification Using a Novel Deep Learning Method
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2909-2929页
作者: Ahmed Alhussen Arshiya Sajid Ansari Mohammad Sajid Mohammadi Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Science College of Engineering and Information TechnologyOnaizah CollegesQassim51911Saudi Arabia
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de... 详细信息
来源: 评论
Genetic Algorithm-optimized k-nearest Neighbors and Support Vector Machines for Breast Cancer Detection in Resource-constrained Environments
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第3期52卷 848-861页
作者: Alemu, Abebe Girma, Anteneh Abebe, Mesfin Srinivasagan, Ramasamy Adama Science and Technology University Adama Ethiopia Computer Science/Cyber-Security department University of the District of Columbia WashingtonDC United States Computer Science and Engineering department Adama Science and Technology University Adama Ethiopia Computer Engineering department CCSIT King Faisal University Al Hufuf Saudi Arabia
Breast cancer poses a significant global threat, highlighting the urgent need for early detection to reduce mortality rates. Researchers are working to minimize the occurrence of false positives and false negatives, t... 详细信息
来源: 评论
ClipArtGAN: An Application of Pix2Pix Generative Adversarial Network for Clip Art Generation
收藏 引用
Multimedia Tools and Applications 2025年 1-25页
作者: Elnabawy, Reham H. Abdennadher, Slim Hellwich, Olaf Eldawlatly, Seif Technische Universität Berlin Berlin Germany Computer Science and Engineering Department Faculty of Media Engineering and Technology German University in Cairo Cairo Egypt Computer Science Department Faculty of Informatics and Computer Science German International University New Administrative Capital Egypt Computer and Systems Engineering Department Faculty of Engineering Ain Shams University 1 El-sarayat st. Abbassia Cairo Egypt Computer Science and Engineering Department The American University in Cairo Cairo Egypt School of Information Technology New Giza University Giza Egypt
An image can convey a thousand words. This statement emphasizes the importance of illustrating ideas visually rather than writing them down. Although detailed image representation is typically instructive, there are s... 详细信息
来源: 评论
White shark optimizer via support vector machine for video-based gender classification system
收藏 引用
Multimedia Tools and Applications 2025年 1-17页
作者: Oyediran, Mayowa Oyedepo Ajagbe, Sunday Adeola Ojo, Olufemi Samuel Alshahrani, Reem Awodoye, Olufemi O. Adigun, Matthew O. Department of Computer Engineering Ajayi Crowther University Oyo Nigeria Department of Computer Science University of Zululand Kwadlangezwa3886 South Africa Department of Computer Engineering Abiola Ajimobi Technical University Ibadan200255 Nigeria Department of Computer Science College of Computers and IT Taif University P.O.Box 11099 Taif21944 Saudi Arabia Department of Computer Engineering Ladoke Akintola University of Technology Ogbomoso Nigeria
Gender identification from videos is a challenging task with significant real-world applications, such as video content analysis and social behavior research. In this study, we propose a novel approach, the White Shar... 详细信息
来源: 评论
SkinMultiNet: Advancements in Skin Cancer Prediction Using Deep Learning with Web Interface
收藏 引用
Biomedical Materials and Devices 2025年 第1期3卷 621-637页
作者: Likhon, Md Nur Hosain Rana, Sahab Uddin Akter, Sadeka Ahmed, Md. Shorup Tanha, Khadiza Akter Rahman, Md. Mahbubur Nayeem, Md Emran Hussain Department of Computer Science and Engineering Dhaka International University Dhaka Bangladesh Department of Computer Science and Engineering Dhaka University of Engineering and Technology Gazipur Bangladesh Department of Computer Science and Engineering Bangladesh University of Business and Technology Dhaka Bangladesh
Cancer remains the leading cause of death worldwide, significantly impacting individuals and healthcare systems alike. In recent decades, skin cancer has surged in prevalence compared to other major cancer types. Vari... 详细信息
来源: 评论
Intrumer:A Multi Module Distributed Explainable IDS/IPS for Securing Cloud Environment
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 579-607页
作者: Nazreen Banu A S.K.B.Sangeetha Department of Computer Science and Engineering SRM Institute of Science and TechnologyVadapalani CampusChennai600026Tamil NaduIndia
The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network *** environments pose significant challenges in maintaining privacy and *** approaches,such as IDS,have be... 详细信息
来源: 评论