咨询与建议

限定检索结果

文献类型

  • 277,271 篇 会议
  • 113,218 篇 期刊文献
  • 2,826 册 图书
  • 3 篇 学位论文

馆藏范围

  • 393,317 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 227,307 篇 工学
    • 151,370 篇 计算机科学与技术...
    • 122,025 篇 软件工程
    • 55,483 篇 信息与通信工程
    • 36,924 篇 控制科学与工程
    • 32,135 篇 电气工程
    • 30,779 篇 电子科学与技术(可...
    • 26,098 篇 生物工程
    • 20,601 篇 生物医学工程(可授...
    • 17,954 篇 光学工程
    • 15,694 篇 机械工程
    • 13,176 篇 化学工程与技术
    • 12,413 篇 动力工程及工程热...
    • 12,385 篇 仪器科学与技术
    • 10,952 篇 材料科学与工程(可...
    • 8,631 篇 安全科学与工程
    • 8,280 篇 网络空间安全
  • 128,072 篇 理学
    • 63,580 篇 数学
    • 41,985 篇 物理学
    • 29,530 篇 生物学
    • 20,617 篇 统计学(可授理学、...
    • 14,897 篇 系统科学
    • 14,230 篇 化学
  • 56,896 篇 管理学
    • 34,449 篇 管理科学与工程(可...
    • 24,797 篇 图书情报与档案管...
    • 16,820 篇 工商管理
  • 19,776 篇 医学
    • 16,410 篇 临床医学
    • 14,672 篇 基础医学(可授医学...
    • 9,165 篇 药学(可授医学、理...
    • 8,087 篇 公共卫生与预防医...
  • 10,752 篇 法学
    • 8,817 篇 社会学
  • 6,523 篇 经济学
  • 5,138 篇 农学
  • 4,241 篇 教育学
  • 1,934 篇 文学
  • 877 篇 军事学
  • 511 篇 艺术学
  • 75 篇 哲学
  • 45 篇 历史学

主题

  • 19,993 篇 computer science
  • 9,451 篇 accuracy
  • 8,858 篇 computational mo...
  • 8,113 篇 feature extracti...
  • 7,988 篇 deep learning
  • 7,468 篇 machine learning
  • 6,623 篇 training
  • 5,288 篇 data mining
  • 5,190 篇 computer archite...
  • 5,149 篇 support vector m...
  • 5,016 篇 predictive model...
  • 4,934 篇 wireless sensor ...
  • 4,694 篇 costs
  • 4,645 篇 optimization
  • 4,544 篇 bandwidth
  • 4,474 篇 real-time system...
  • 4,463 篇 application soft...
  • 4,401 篇 testing
  • 4,400 篇 protocols
  • 4,344 篇 algorithm design...

机构

  • 1,723 篇 department of co...
  • 1,366 篇 department of co...
  • 1,346 篇 department of el...
  • 1,180 篇 department of el...
  • 1,063 篇 cavendish labora...
  • 975 篇 department of ph...
  • 877 篇 department of co...
  • 858 篇 physikalisches i...
  • 844 篇 oliver lodge lab...
  • 818 篇 department of el...
  • 752 篇 university of ch...
  • 646 篇 department of co...
  • 561 篇 department of co...
  • 559 篇 chitkara univers...
  • 542 篇 infn sezione di ...
  • 518 篇 infn laboratori ...
  • 510 篇 infn sezione di ...
  • 501 篇 horia hulubei na...
  • 498 篇 infn sezione di ...
  • 486 篇 h.h. wills physi...

作者

  • 258 篇 barter w.
  • 254 篇 s. chen
  • 253 篇 j. wang
  • 238 篇 a. gomes
  • 233 篇 blake t.
  • 223 篇 amato s.
  • 222 篇 bellee v.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 c. alexa
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 215 篇 j. m. izen
  • 214 篇 brundu d.
  • 209 篇 bencivenni g.
  • 203 篇 beiter a.
  • 202 篇 bay a.
  • 194 篇 niyato dusit
  • 193 篇 c. amelung
  • 192 篇 g. bella

语言

  • 332,445 篇 英文
  • 57,348 篇 其他
  • 4,021 篇 中文
  • 222 篇 日文
  • 79 篇 德文
  • 57 篇 法文
  • 53 篇 斯洛文尼亚文
  • 35 篇 朝鲜文
  • 15 篇 阿拉伯文
  • 14 篇 俄文
  • 12 篇 西班牙文
  • 4 篇 捷克文
  • 4 篇 意大利文
  • 3 篇 荷兰文
  • 3 篇 葡萄牙文
  • 3 篇 土耳其文
  • 1 篇 加泰罗尼亚文
  • 1 篇 芬兰文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Computer Engineering."
393318 条 记 录,以下是201-210 订阅
排序:
Cross-modal heterogeneous graph reasoning network for visual question answering
收藏 引用
Neural Computing and Applications 2025年 1-21页
作者: Zhang, Jing Teng, Jiong Ding, Weichao Wang, Zhe Department of Computer Science and Engineering East China University of Science and Technology Shanghai China
Most current Visual Question Answering (VQA) methods struggle to achieve effective cross-modal interaction between visual and semantic information, resulting in difficulties in accurately combining visual content with... 详细信息
来源: 评论
Hybrid DF and SIR Forwarding Strategy in Conventional and Distributed Alamouti Space-Time Coded Cooperative Networks
收藏 引用
computer Modeling in engineering.& sciences 2025年 第2期142卷 1933-1954页
作者: Slim Chaoui Omar Alruwaili Faeiz Alserhani Haifa Harrouch Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka72388Saudi Arabia Computer Science Department Applied CollegeUniversity of HailHail55424Saudi Arabia
In this paper,we propose a hybrid decode-and-forward and soft information relaying(HDFSIR)strategy to mitigate error propagation in coded cooperative *** the HDFSIR approach,the relay operates in decode-and-forward(DF... 详细信息
来源: 评论
IDBNWP: Improved deep belief network for workload prediction: Hybrid optimization for load balancing in cloud system
收藏 引用
Multimedia Tools and Applications 2025年 第16期84卷 15715-15733页
作者: Ajil, A. Kumar, E. Saravana Department of Computer Science and Engineering The Oxford College of Engineering Visvesvaraya Technological University Karnataka Belagavi India School of Computer Science and Engineering REVA University Karnataka Bengaluru India
The achievement of cloud environment is determined by the efficiency of its load balancing with proper allocation of resources. The proactive forecasting of future workload, accompanied by the allocation of resources,... 详细信息
来源: 评论
A feature selection-aided deep learning based deepfake video detection method
收藏 引用
Multimedia Tools and Applications 2025年 1-24页
作者: Mohiuddin, Sk Roy, Ayush Pani, Saptarshi Malakar, Samir Sarkar, Ram Department of Computer Science Asutosh College Kolkata700026 India Department of Electrical Engineering Jadavpur University Kolkata700032 India Department of Computer Science UiT The Arctic University of Norway Tromsø9019 Norway Department of Computer Science and Engineering Jadavpur University Kolkata700032 India
The rapid advancements in deepfake technology are imposing significant challenges in detecting manipulated media contents. In this work, we have introduced a deepfake detection method that utilizes three pre-trained c... 详细信息
来源: 评论
An AI-Enabled Framework for Transparency and Interpretability in Cardiovascular Disease Risk Prediction
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5057-5078页
作者: Isha Kiran Shahzad Ali Sajawal ur Rehman Khan Musaed Alhussein Sheraz Aslam Khursheed Aurangzeb Department of Computer Science University of Engineering and TechnologyLahore39161Pakistan Dipartimento di Farmacia e Biotecnologie Alma Mater Studiorum—Universita di BolognaBologna40126Italy Department of Information Sciences University of EducationLahore54770Pakistan Department of Computer Science National Textile UniversityKarachi CampusKarachi74900Pakistan Department of Computer Science National Textile UniversityFaisalabad37610Pakistan Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Department of Electrical Engineering Computer Engineeringand InformaticsCyprus University of TechnologyLimassol3036Cyprus Department of Computer Science CTL EurocollegeLimassol3077Cyprus
Cardiovascular disease(CVD)remains a leading global health challenge due to its high mortality rate and the complexity of early diagnosis,driven by risk factors such as hypertension,high cholesterol,and irregular puls... 详细信息
来源: 评论
Secure container Orchestration: A framework for detecting and mitigating Orchestrator - level vulnerabilities
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 18351-18371页
作者: Mahavaishnavi, V. Saminathan, R. Prithviraj, R. Department of Artificial Intelligence and Data Science Panimalar Engineering College Tamil Nadu Chennai600123 India Department of Computer Science and Engineering Annamalai University Chidambaram India Department of Computer Science and Engineering Annamalai University Chidambaram India
This paper presents Secure Orchestration, a novel framework meticulously planned to uphold rigorous security measures over the profound security concerns that lie within the container orchestration platforms, especial... 详细信息
来源: 评论
Dynamic Hand Gesture-Based Person Identification Using Leap Motion and Machine Learning Approaches
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1205-1222页
作者: Jungpil Shin Md.AlMehedi Hasan Md.Maniruzzaman Taiki Watanabe Issei Jozume School of Computer Science and Engineering The University of AizuAizuwakamatsuFukushima965-8580Japan Department of Computer Science&Engineering Rajshahi University of Engineering&TechnologyRajshahi6204Bangladesh
Person identification is one of the most vital tasks for network security. People are more concerned about theirsecurity due to traditional passwords becoming weaker or leaking in various attacks. In recent decades, f... 详细信息
来源: 评论
A New Method for Stealthy False Data Injection Attack Detection Using Advanced Feasibility Areas Considering Spatial Distribution
收藏 引用
IEEE Transactions on Smart Grid 2025年 第4期16卷 3346-3358页
作者: Elsayed, Ahmed Abd Elaziz Khani, Hadi Farag, Hany E. Z. Department Lassonde School of Engineering Engineering and Computer Science York University Toronto ON Canada
The Feasibility Area (FA) in power system applications defines the region within which Power System State Variables (PSSVs) typically exist under normal operating conditions. Accurate characterization of the FA helps ... 详细信息
来源: 评论
An Anomaly Detection Enhancement Method Using Interpretable Unsupervised Machine Learning in Industrial Information Systems at Multivariate Time Series Environment
收藏 引用
Journal of Institute of Control, Robotics and Systems 2024年 第3期30卷 245-252页
作者: Jeon, Janggun Kim, Namgi Department of Computer Science Kyonggi University Korea Republic of Department of AI Computer Engineering Kyonggi University Korea Republic of
Time series anomaly detection is a technology that finds outliers in observed data over time, and is a significant research field associated with many applications or platforms. In this paper, we propose a method call... 详细信息
来源: 评论
SAFED: secure and adaptive framework for edge-based data aggregation in IoT applications
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-28页
作者: Naaz, Zaineb Joshi, Gamini Sharma, Vidushi Department of Computer Science and Engineering School of ICT Gautam Buddha University Greater Noida India Department of Computer Science and Engineering PES University Electronic City Campus Bangalore India
The paper proposed a secured and efficient data aggregation mechanism leveraging the edge computing paradigm and homomorphic data encryption technique. The paper used a unique combination of Paillier cryptosystem and ... 详细信息
来源: 评论