咨询与建议

限定检索结果

文献类型

  • 273,058 篇 会议
  • 111,566 篇 期刊文献
  • 2,800 册 图书

馆藏范围

  • 387,423 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 223,859 篇 工学
    • 148,864 篇 计算机科学与技术...
    • 120,655 篇 软件工程
    • 54,157 篇 信息与通信工程
    • 35,469 篇 控制科学与工程
    • 31,362 篇 电气工程
    • 30,351 篇 电子科学与技术(可...
    • 25,955 篇 生物工程
    • 20,383 篇 生物医学工程(可授...
    • 17,748 篇 光学工程
    • 15,337 篇 机械工程
    • 12,967 篇 化学工程与技术
    • 12,145 篇 仪器科学与技术
    • 12,084 篇 动力工程及工程热...
    • 10,729 篇 材料科学与工程(可...
    • 8,278 篇 安全科学与工程
    • 7,667 篇 网络空间安全
  • 126,616 篇 理学
    • 62,953 篇 数学
    • 41,534 篇 物理学
    • 29,344 篇 生物学
    • 20,314 篇 统计学(可授理学、...
    • 14,866 篇 系统科学
    • 13,892 篇 化学
  • 55,766 篇 管理学
    • 33,591 篇 管理科学与工程(可...
    • 24,363 篇 图书情报与档案管...
    • 16,633 篇 工商管理
  • 19,214 篇 医学
    • 16,123 篇 临床医学
    • 14,494 篇 基础医学(可授医学...
    • 9,147 篇 药学(可授医学、理...
    • 7,676 篇 公共卫生与预防医...
  • 10,507 篇 法学
    • 8,598 篇 社会学
  • 6,434 篇 经济学
  • 5,066 篇 农学
  • 4,146 篇 教育学
  • 1,861 篇 文学
  • 872 篇 军事学
  • 505 篇 艺术学
  • 75 篇 哲学
  • 46 篇 历史学

主题

  • 19,984 篇 computer science
  • 8,790 篇 accuracy
  • 8,596 篇 computational mo...
  • 7,848 篇 feature extracti...
  • 7,366 篇 deep learning
  • 7,164 篇 machine learning
  • 6,413 篇 training
  • 5,253 篇 data mining
  • 5,106 篇 computer archite...
  • 5,015 篇 support vector m...
  • 4,921 篇 wireless sensor ...
  • 4,800 篇 predictive model...
  • 4,647 篇 costs
  • 4,532 篇 bandwidth
  • 4,478 篇 application soft...
  • 4,463 篇 optimization
  • 4,369 篇 protocols
  • 4,351 篇 algorithm design...
  • 4,319 篇 testing
  • 4,246 篇 neural networks

机构

  • 1,690 篇 department of co...
  • 1,361 篇 department of co...
  • 1,348 篇 department of el...
  • 1,154 篇 department of el...
  • 1,060 篇 cavendish labora...
  • 970 篇 department of ph...
  • 877 篇 department of co...
  • 853 篇 physikalisches i...
  • 841 篇 oliver lodge lab...
  • 820 篇 department of el...
  • 742 篇 university of ch...
  • 636 篇 department of co...
  • 546 篇 infn sezione di ...
  • 537 篇 department of co...
  • 522 篇 infn laboratori ...
  • 514 篇 infn sezione di ...
  • 512 篇 chitkara univers...
  • 499 篇 horia hulubei na...
  • 497 篇 infn sezione di ...
  • 485 篇 department of co...

作者

  • 258 篇 s. chen
  • 256 篇 j. wang
  • 250 篇 barter w.
  • 241 篇 a. gomes
  • 225 篇 blake t.
  • 223 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 j. m. izen
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 204 篇 bencivenni g.
  • 195 篇 bay a.
  • 194 篇 g. bella
  • 194 篇 c. amelung
  • 192 篇 j. strandberg

语言

  • 371,355 篇 英文
  • 12,409 篇 其他
  • 3,666 篇 中文
  • 220 篇 日文
  • 47 篇 德文
  • 34 篇 朝鲜文
  • 32 篇 法文
  • 17 篇 斯洛文尼亚文
  • 8 篇 西班牙文
  • 8 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Computer Engineering"
387424 条 记 录,以下是321-330 订阅
排序:
Bidirectional Legendre memory unit: bidirectional memory for person authentication combining voice and online signature
收藏 引用
Neural Computing and Applications 2025年 第3期37卷 1541-1563页
作者: Kumar, Rohitesh Ghosh, Rajib Department of Computer Science and Engineering National Institute of Technology Patna Ashok Rajpath Patna800005 India
With the increasing popularity of smart portable electronic gadgets, voice-based online person verification systems have become prevalent. However, these systems are susceptible to attacks where illegitimate individua... 详细信息
来源: 评论
Statistical assessment of Indian classical music’s role in diabetes, thyroid, hypertension management
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第1期17卷 423-429页
作者: Pingle, Yogesh Prabhakar Ragha, Lakshmappa K. Research Scholar at Department of Computer Engineering Terna Engineering College Assistant Professor at Department of Computer Science and Engineering (Data Science) Vidyavardhinis College of Engineering and Technology University of Mumbai Maharashtra Mumbai India Department of Computer Engineering Terna Engineering College University of Mumbai Maharashtra Mumbai India
This multi-center randomized controlled trial explores the therapeutic benefits of Indian classical music, specifically “Raga Therapy,” for managing diabetes, thyroid disorders, and hypertension—prevalent global he... 详细信息
来源: 评论
Geometric Interpretation of Sensitivity to Structured Uncertainties in Spintronic Networks
收藏 引用
IEEE Control Systems Letters 2025年 9卷 192-197页
作者: O'Neil, S.P. Jonckheere, E.A. Schirmer, S. United States Military Academy Department of Electrical Engineering and Computer Science NY United States University of Southern California Dept of Electrical and Computer Engineering CA United States Swansea University Faculty of Science and Engineering Physics United Kingdom
We present a geometric model of the differential sensitivity of the fidelity error for state transfer in a spintronic network based on the relationship between a set of matrix operators. We show an explicit dependence... 详细信息
来源: 评论
ORIGINAL STUDY Data Envelopment Analysis using Stochastic Frontier Analysis and Bootstrap Confidence Intervals
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer science and Mathematics 2025年 第2期6卷 150-166页
作者: Alqahtani, Fahad F. Department of computer science College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University Al-Kharj11942 Saudi Arabia
Evaluating company growth potential has moved away from traditional financial focused ratios and ratios analysis that has origins in the early twentieth-century economics. However, these conventional methods might not... 详细信息
来源: 评论
A Two-Stage Deep Learning Approach for Optimizing Fashion Product Recommendations
收藏 引用
SN computer science 2025年 第4期6卷 1-13页
作者: Buradagunta, Suvarna Balakrishna, Sivadi Department of Computer Science and Engineering Vignan’s Foundation for Science Technology and Research Guntur India Department of Advanced Computer Science and Engineering Vignan’s Foundation for Science Technology and Research Guntur India
Online shopping platforms are experiencing rapid growth, necessitating effective product recommendation systems to enhance customer satisfaction by recommending visually similar products. Traditional statistical techn... 详细信息
来源: 评论
Dynamic-EC:an efficient dynamic erasure coding method for permissioned blockchain systems
收藏 引用
Frontiers of computer science 2025年 第1期19卷 15-28页
作者: Mizhipeng ZHANG Chentao WU Jie LI Minyi GUO Department of Computer Science and Engineering Shanghai Jiao Tong UniversityShanghai 200200China Yancheng Blockchain Research Institute Hengyang 421200China
Blockchain as a decentralized storage technology is widely used in many *** has extremely strict requirements for reliability because there are many potentially malicious ***,blockchain is a chain storage structure fo... 详细信息
来源: 评论
BrandCrafter AI, an AI-Based Brand Identity Generation Platform  15
BrandCrafter AI, an AI-Based Brand Identity Generation Platf...
收藏 引用
15th IEEE Annual Computing and Communication Workshop and Conference, CCWC 2025
作者: Gawad, Selim Kim, Mira College of Engineering and Computer Science California State University Department of Computer Science Fullerton United States
In today's dynamic and highly competitive market, brand differentiation has become both essential and complex. The growth of social media and enhanced digital accessibility have transformed brand promotion into a ... 详细信息
来源: 评论
An Ensemble Machine Learning-Based Approach for Detecting Malicious Websites Using URL Features  3rd
An Ensemble Machine Learning-Based Approach for Detecting Ma...
收藏 引用
3rd International Conference on Trends in Electronics and Health Informatics, TEHI 2023
作者: Uddin, Khandaker Mohammad Mohi Islam, Md. Ashraful Hasan, Md. Nahid Ahmad, Kawsar Haque, Mir Aminul Department of Computer Science andEngineering Southeast University Dhaka1208 Bangladesh Department of Computer Science and Engineering Dhaka International University Dhaka1205 Bangladesh Department of Computer Science and Engineering Jahangirnagar Univerisity Dhaka Bangladesh Department of Computer Science and Engineering Daffodil International University Dhaka1216 Bangladesh
The Internet has transformed into a hub for a wide array of illegal activities, ranging from annoying spam ads to financial scams, all thanks to advancements in modern technology. With the constant enhancements in net... 详细信息
来源: 评论
Enhancing Intrusion Detection by Using Machine Learning  1st
Enhancing Intrusion Detection by Using Machine Learning
收藏 引用
1st International Conference on Intelligent Systems, Blockchain, and Communication Technologies, ISBCom 2024
作者: Khan, Andleeb Nand, Parma Bhushan, Bharat Hameed, Alaa Ali Jamil, Akhtar Department of Computer Science and Engineering Sharda University Greater Noida India Department of Computer Engineering Istinye University Istanbul34396 Turkey Department of Computer Science National University of Computer and Emerging Sciences Islamabad44000 Pakistan
With the advancing technology, the increase in threats has been exponential. These technologies have led to the production of huge amounts of network traffic data. Therefore, it is of immense importance for the compan... 详细信息
来源: 评论
RRSC-128/64-V1: a two-variant simple, fast, and secure lightweight stream cipher
收藏 引用
International Journal of Information Technology (Singapore) 2025年 1-9页
作者: Chatterjee, Runa Chakraborty, Rajdeep Department of Computer Science and Engineering Netaji Subhash Engineering College West Bengal Kolkata 700152 India Department of Computer Science and Engineering Medi-Caps University Madhya Pradesh Indore India
Lightweight cryptography is now emerging as a new method for providing security to resource-constrained devices. Securing those devices from external hackers during data transmission is now becoming an important issue... 详细信息
来源: 评论