咨询与建议

限定检索结果

文献类型

  • 277,271 篇 会议
  • 113,218 篇 期刊文献
  • 2,826 册 图书
  • 3 篇 学位论文

馆藏范围

  • 393,317 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 227,307 篇 工学
    • 151,370 篇 计算机科学与技术...
    • 122,025 篇 软件工程
    • 55,483 篇 信息与通信工程
    • 36,924 篇 控制科学与工程
    • 32,135 篇 电气工程
    • 30,779 篇 电子科学与技术(可...
    • 26,098 篇 生物工程
    • 20,601 篇 生物医学工程(可授...
    • 17,954 篇 光学工程
    • 15,694 篇 机械工程
    • 13,176 篇 化学工程与技术
    • 12,413 篇 动力工程及工程热...
    • 12,385 篇 仪器科学与技术
    • 10,952 篇 材料科学与工程(可...
    • 8,631 篇 安全科学与工程
    • 8,280 篇 网络空间安全
  • 128,072 篇 理学
    • 63,580 篇 数学
    • 41,985 篇 物理学
    • 29,530 篇 生物学
    • 20,617 篇 统计学(可授理学、...
    • 14,897 篇 系统科学
    • 14,230 篇 化学
  • 56,896 篇 管理学
    • 34,449 篇 管理科学与工程(可...
    • 24,797 篇 图书情报与档案管...
    • 16,820 篇 工商管理
  • 19,776 篇 医学
    • 16,410 篇 临床医学
    • 14,672 篇 基础医学(可授医学...
    • 9,165 篇 药学(可授医学、理...
    • 8,087 篇 公共卫生与预防医...
  • 10,752 篇 法学
    • 8,817 篇 社会学
  • 6,523 篇 经济学
  • 5,138 篇 农学
  • 4,241 篇 教育学
  • 1,934 篇 文学
  • 877 篇 军事学
  • 511 篇 艺术学
  • 75 篇 哲学
  • 45 篇 历史学

主题

  • 19,993 篇 computer science
  • 9,451 篇 accuracy
  • 8,858 篇 computational mo...
  • 8,113 篇 feature extracti...
  • 7,988 篇 deep learning
  • 7,468 篇 machine learning
  • 6,623 篇 training
  • 5,288 篇 data mining
  • 5,190 篇 computer archite...
  • 5,149 篇 support vector m...
  • 5,016 篇 predictive model...
  • 4,934 篇 wireless sensor ...
  • 4,694 篇 costs
  • 4,645 篇 optimization
  • 4,544 篇 bandwidth
  • 4,474 篇 real-time system...
  • 4,463 篇 application soft...
  • 4,401 篇 testing
  • 4,400 篇 protocols
  • 4,344 篇 algorithm design...

机构

  • 1,723 篇 department of co...
  • 1,366 篇 department of co...
  • 1,346 篇 department of el...
  • 1,180 篇 department of el...
  • 1,063 篇 cavendish labora...
  • 975 篇 department of ph...
  • 877 篇 department of co...
  • 858 篇 physikalisches i...
  • 844 篇 oliver lodge lab...
  • 818 篇 department of el...
  • 752 篇 university of ch...
  • 646 篇 department of co...
  • 561 篇 department of co...
  • 559 篇 chitkara univers...
  • 542 篇 infn sezione di ...
  • 518 篇 infn laboratori ...
  • 510 篇 infn sezione di ...
  • 501 篇 horia hulubei na...
  • 498 篇 infn sezione di ...
  • 486 篇 h.h. wills physi...

作者

  • 258 篇 barter w.
  • 254 篇 s. chen
  • 253 篇 j. wang
  • 238 篇 a. gomes
  • 233 篇 blake t.
  • 223 篇 amato s.
  • 222 篇 bellee v.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 c. alexa
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 215 篇 j. m. izen
  • 214 篇 brundu d.
  • 209 篇 bencivenni g.
  • 203 篇 beiter a.
  • 202 篇 bay a.
  • 194 篇 niyato dusit
  • 193 篇 c. amelung
  • 192 篇 g. bella

语言

  • 332,445 篇 英文
  • 57,348 篇 其他
  • 4,021 篇 中文
  • 222 篇 日文
  • 79 篇 德文
  • 57 篇 法文
  • 53 篇 斯洛文尼亚文
  • 35 篇 朝鲜文
  • 15 篇 阿拉伯文
  • 14 篇 俄文
  • 12 篇 西班牙文
  • 4 篇 捷克文
  • 4 篇 意大利文
  • 3 篇 荷兰文
  • 3 篇 葡萄牙文
  • 3 篇 土耳其文
  • 1 篇 加泰罗尼亚文
  • 1 篇 芬兰文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Computer Engineering."
393318 条 记 录,以下是4941-4950 订阅
排序:
Exploring the possibilities of integration of cyber-psychology for human behaviour in a smart city
收藏 引用
International Journal of Information and Communication Technology 2024年 第2期25卷 150-167页
作者: Wen, Liping Ting, Zhou Zheng, Huang Alfred Daniel, J. Antonidoss, A. Department of Psychology University of Chinese Academy of Sciences Beijing100101 China Institute of Psychology Chinese Academy of Sciences Beijing100101 China Department of Medical Psychology School of Health Humanities Peking University Beijing100191 China Department of Computer Science & Engineering SNS College of Technology India Department of Computer Science and Engineering Hindustan Institute of Technology and Science India
The smart city idea differs between cities and nations. In all meanings and characteristics of a smart city, public involvement is the only thing that remains common. Therefore, it is a very significant field to study... 详细信息
来源: 评论
Investigating the role of electroencephalogram based rhythmic bands: applications in imagined speech classification and epileptic seizure severity detection
收藏 引用
International Journal of Speech Technology 2024年 第4期27卷 1135-1147页
作者: Banerjee, Oindrila Govind, D. Speech Research Group Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Greenfields AP Vaddeswaram522302 India
The objective of this paper is to explore the significance of rhythmic bands for imagined speech classification and the severity detection of epileptic seizures from electroencephalogram (EEG) signals. Non-invasive de... 详细信息
来源: 评论
Provable Data Possession with Outsourced Tag Generation for AI-Driven E-Commerce
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2719-2734页
作者: Yi Li Wenying Zheng Yu-Sheng Su Meiqin Tang School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China School of Computer Science and Technology(School of Artificial Intelligence) Zhejiang Sci-Tech UniversityHangzhou310018China Department of Computer Science and Information Engineering National Chung Cheng UniversityChiayi621301TaiwanChina Advanced Institute of Manufacturing with High-tech Innovations National Chung Cheng UniversityChiayi621301TaiwanChina Department of Computer Science and Engineering Taiwan Ocean UniversityKeelung202301TaiwanChina School of Integrated Circuits Wuxi Vocational College of Science and TechnologyWuxi214028China
AI applications have become ubiquitous,bringing significant convenience to various *** e-commerce,AI can enhance product recommendations for individuals and provide businesses with more accurate predictions for market... 详细信息
来源: 评论
XGBoost-Liver:An Intelligent Integrated Features Approach for Classifying Liver Diseases Using Ensemble XGBoost Training Model
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1459-1474页
作者: Sumaiya Noor Salman A.AlQahtani Salman Khan Business and Management Sciences Department Purdue UniversityWest LafayetteIN 47907USA New Emerging Technologies and 5G Network and Beyond Research Chair Department of Computer EngineeringCollege of Computer and Information SciencesKing Saud UniversityRiyadh11564Saudi Arabia Department of Computer Science Abdul Wali Khan University MardanMardan23200KPKPakistan
The liver is a crucial gland and the second-largest organ in the human body and also essential in digestion,metabolism,detoxification,and *** diseases result from factors such as viral infections,obesity,alcohol consu... 详细信息
来源: 评论
Privacy preserving using joint 2 K-means clustering and coati optimization algorithm for online social networks
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第4期16卷 2715-2724页
作者: Gowda, Nithish Ranjan Venkatesh Venugopal, K.R. Department of Computer Science and Engineering University Visvesvaraya College of Engineering Bangalore University Bengaluru India Department Computer Science and Engineering University Visvesvaraya College of Engineering Bangalore University Bengaluru India University Visvesvaraya College of Engineering Bangalore University Bangalore India
Social networks, that have grown so prevalent nowadays, enable users to exchange information and save a significant amount of personal data about them. Although the information that is stored can be useful for enhanci... 详细信息
来源: 评论
SynchroLearn: Master Deadlock and Synchronization Through Interactive Learning  15
SynchroLearn: Master Deadlock and Synchronization Through In...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Bhavya, G. Bhanot, Shreya Srinidhi, M. Sidhu, Samreen Krishnan, Sajitha Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science and Engineering Bengaluru India Amrita Vishwa Vidyapeetham Amrita School of Engineering Department of Computer Science & Engineering Bengaluru India
Today, educational tools have become necessary for learners to learn well and improve their knowledge. These tools complement knowledge as they can make it more vivid and add some simulation or game into the learning ... 详细信息
来源: 评论
Learning-based joint UAV trajectory and power allocation optimization for secure IoT networks
收藏 引用
Digital Communications and Networks 2022年 第4期8卷 415-421页
作者: Dan Deng Xingwang Li Varun Menon Md Jalil Piran Hui Chen Mian Ahmad Jan School of Information Engineering Guangzhou Panyu PolytechnicGuangzhou410630China School of Physics and Electronic Information Engineering Henan Polytechnic UniversityJiaozuo454150China Department of Computer Science and Engineering SCMS School of Engineering and TechnologyIndia Department of Computer Science and Engineering Sejong UniversitySouth Korea Department of Computer Science Abdul Wali Khan University MardanPakistan
Non-Orthogonal Multiplex Access(NOMA)can be deployed in Unmanned Aerial Vehicle(UAV)networks to improve spectrum *** to the broadcasting feature of NOMA-UAV networks,it is essential to focus on the security of the wir... 详细信息
来源: 评论
A Motive Towards Enforcement of Attribute-Based Access Control Models in Dynamic Environments  2nd
A Motive Towards Enforcement of Attribute-Based Access Contr...
收藏 引用
Second International Conference on Security, Privacy and Data Analytics, ISPDA 2022
作者: Rao, Udai Pratap Choksy, Pooja Chaurasia, Akhil Computer Science and Engineering Department NIT Patna Patna India Computer Science and Engineering Department SVNIT Surat Surat India
Access control is one of the most basic information security requirements, which prevents unauthorized people from accessing the system or facilities. The access control process relies on specified policies and rules ... 详细信息
来源: 评论
Synthesis Rule-Based Classification Approach for Malicious Websites Identification
Synthesis Rule-Based Classification Approach for Malicious W...
收藏 引用
2023 International Conference on Green Energy, Computing and Intelligent Technology, GEn-CITy 2023
作者: Chodisetti, Mohit Venkata Krishna Goyal, Reema Rawat, Bhupendra Singh Department of Computer Science and Engineering Chandigarh University Mohali India Department of Computer Science and Engineering Uttaranchal University Dehradun India
A phishing attack is a form of cyber-attack where the attacker uses various social engineering.techniques to obtain personal or sensitive data from a common man or an organization. Moreover, with the introduction of w... 详细信息
来源: 评论
Enhancing Banking Transaction Security with a Hybrid Access Control Consensus Algorithm Through Blockchain-Enabled Checkpoint Model
收藏 引用
SN computer science 2024年 第6期5卷 776页
作者: Chorey, Priyanka A. Sahu, Neeraj Computer Science and Engineering Department G. H. Raisoni University Amravati
Nowadays, online secure payment systems are being used much more frequently. Advancement in online secure payment system is also enabled multiple threats that affected the privacy and security of the individuals espec... 详细信息
来源: 评论