咨询与建议

限定检索结果

文献类型

  • 25,003 篇 会议
  • 19,229 篇 期刊文献
  • 426 册 图书

馆藏范围

  • 44,658 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 26,046 篇 工学
    • 14,939 篇 计算机科学与技术...
    • 11,879 篇 软件工程
    • 5,695 篇 信息与通信工程
    • 4,472 篇 电子科学与技术(可...
    • 4,411 篇 电气工程
    • 3,643 篇 控制科学与工程
    • 3,049 篇 生物工程
    • 2,905 篇 光学工程
    • 2,679 篇 生物医学工程(可授...
    • 2,008 篇 化学工程与技术
    • 1,855 篇 材料科学与工程(可...
    • 1,727 篇 仪器科学与技术
    • 1,692 篇 机械工程
    • 1,465 篇 动力工程及工程热...
    • 837 篇 安全科学与工程
    • 774 篇 网络空间安全
  • 17,413 篇 理学
    • 7,793 篇 物理学
    • 6,705 篇 数学
    • 3,717 篇 生物学
    • 2,376 篇 化学
    • 2,248 篇 统计学(可授理学、...
    • 1,466 篇 系统科学
  • 5,905 篇 管理学
    • 3,733 篇 管理科学与工程(可...
    • 2,278 篇 图书情报与档案管...
    • 1,895 篇 工商管理
  • 2,932 篇 医学
    • 2,384 篇 临床医学
    • 2,015 篇 基础医学(可授医学...
    • 1,221 篇 药学(可授医学、理...
    • 1,077 篇 公共卫生与预防医...
  • 1,089 篇 法学
    • 920 篇 社会学
  • 698 篇 经济学
  • 651 篇 农学
  • 415 篇 教育学
  • 191 篇 文学
  • 106 篇 军事学
  • 57 篇 艺术学
  • 9 篇 哲学
  • 4 篇 历史学

主题

  • 1,211 篇 computer science
  • 892 篇 accuracy
  • 861 篇 deep learning
  • 771 篇 machine learning
  • 635 篇 computational mo...
  • 633 篇 feature extracti...
  • 574 篇 training
  • 515 篇 internet of thin...
  • 507 篇 artificial intel...
  • 431 篇 real-time system...
  • 411 篇 support vector m...
  • 405 篇 predictive model...
  • 385 篇 optimization
  • 327 篇 convolutional ne...
  • 288 篇 reliability
  • 285 篇 computer archite...
  • 284 篇 laboratories
  • 276 篇 neural networks
  • 274 篇 bandwidth
  • 274 篇 data mining

机构

  • 946 篇 cavendish labora...
  • 886 篇 department of ph...
  • 813 篇 physikalisches i...
  • 804 篇 oliver lodge lab...
  • 570 篇 school of physic...
  • 491 篇 infn laboratori ...
  • 461 篇 infn sezione di ...
  • 449 篇 university of ch...
  • 444 篇 fakultät physik ...
  • 443 篇 infn sezione di ...
  • 424 篇 infn sezione di ...
  • 406 篇 department of el...
  • 398 篇 horia hulubei na...
  • 394 篇 school of physic...
  • 387 篇 department of ph...
  • 384 篇 iccub universita...
  • 378 篇 imperial college...
  • 376 篇 nikhef national ...
  • 371 篇 center for high ...
  • 366 篇 stfc rutherford ...

作者

  • 270 篇 a. gomes
  • 259 篇 c. alexa
  • 256 篇 j. m. izen
  • 246 篇 c. amelung
  • 245 篇 g. bella
  • 244 篇 j. strandberg
  • 244 篇 d. calvet
  • 244 篇 s. chen
  • 238 篇 g. spigo
  • 233 篇 f. siegert
  • 227 篇 j. wang
  • 219 篇 y. tayalati
  • 216 篇 r. ströhmer
  • 210 篇 m. rijssenbeek
  • 205 篇 s. jin
  • 200 篇 g. gaudio
  • 198 篇 m. gandelman
  • 196 篇 t. gershon
  • 193 篇 r. mountain
  • 193 篇 d. golubkov

语言

  • 41,654 篇 英文
  • 2,557 篇 其他
  • 412 篇 中文
  • 28 篇 日文
  • 10 篇 德文
  • 5 篇 朝鲜文
  • 4 篇 法文
  • 2 篇 西班牙文
  • 2 篇 斯洛文尼亚文
  • 1 篇 意大利文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science and Engineering Research"
44658 条 记 录,以下是11-20 订阅
排序:
Embeddings Between State and Action Based Probabilistic Logics
收藏 引用
Formal Aspects of Computing 2025年 第2期37卷 1-58页
作者: Das, Susmoy Sharma, Arpit Department of Electrical Engineering and Computer Science Indian Institute of Science Education and Research Bhopal Madhya Pradesh Bhopal India
This article defines embeddings between state-based and action-based probabilistic logics which can be used to support probabilistic model checking. First, we slightly modify the model embeddings proposed in the liter... 详细信息
来源: 评论
Efficient Communication in Wireless Sensor Networks Using Optimized Energy Efficient Engroove Leach Clustering Protocol
收藏 引用
Tsinghua science and Technology 2024年 第4期29卷 985-1001页
作者: N.Meenakshi Sultan Ahmad A.V.Prabu J.Nageswara Rao Nashwan Adnan Othman Hikmat A.M.Abdeljaber R.Sekar Jabeen Nazeer SRM Institute of Science and Technology KattankulathurChennai 603203India Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharj 11942Saudi Arabia University Center for Research and Development(UCRD) Department of Computer Science and EngineeringChandigarh UniversityGharuanMohali 140413India Department of ECE Koneru Lakshmaiah Education FoundationVaddeswaramGuntur 522502India Department of Computer Science and Engineering Lakireddy Balireddy College of Engineering(A)NTR District 521230India Department of Computer Engineering College of EngineeringKnowledge UniversityErbil 44001Iraq Department of Computer Science Faculty of Information TechnologyApplied Science Private UniversityAmman 11937Jordan Department of Electronics and Communication Engineering(ECE) School of EngineeringPresidency UniversityBangalore 834001India
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental mo... 详细信息
来源: 评论
Data-driven output regulation control for constrained linear systems
收藏 引用
science China(Information sciences) 2025年 第3期68卷 338-353页
作者: Chaoyu XIA Yi DONG Chaoli WANG Shengyuan XU Shanghai Research Institute for Intelligent Autonomous Systems Tongji University College of Electronic and Information Engineering Shanghai Research Institute for Intelligent Autonomous SystemsTongji University Department of Control Science and Engineering School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and Technology Department of Automation Nanjing University of Science and Technology
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe... 详细信息
来源: 评论
DSANet: dilated spatial attention network for the detection of text, non-text and touching components in unconstrained handwritten documents
收藏 引用
Neural Computing and Applications 2024年 第27期36卷 16959-16976页
作者: Bhowmik, Showmik Risat, Shaikh Sarkar, Bhaskar Research Lab Department of Computer Science and Engineering Ghani Khan Choudhury Institute of Engineering and Technology Malda India
Handwritten documents generated in our day-to-day office work, class room and other sectors of society carry vital information. Automatic processing of these documents is a pipeline of many challenging steps. The very... 详细信息
来源: 评论
Arrhythmia Detection by Using Chaos Theory with Machine Learning Algorithms
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 3855-3875页
作者: Maie Aboghazalah Passent El-kafrawy Abdelmoty M.Ahmed Rasha Elnemr Belgacem Bouallegue Ayman El-sayed Math and Computer Science Department Faculty of ScienceMenoufia UniversityShebin El-komEgypt College of Engineering Computer Science DepartmentEffat UniversityJeddahKingdom of Saudi Arabia Department of Computer Engineering College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia Computer Science and Engineering Department Faculty of Electronic EngineeringMenoufia UniversityShebin El-komEgypt Climate Change Information Center and Expert Systems Agriculture Research CenterGizaEgypt
Heart monitoring improves life ***(ECGs or EKGs)detect heart *** learning algorithms can create a few ECG diagnosis processing *** first method uses raw ECG and time-series *** second method classifies the ECG by pati... 详细信息
来源: 评论
A Two-Stage Deep Learning Approach for Optimizing Fashion Product Recommendations
收藏 引用
SN computer science 2025年 第4期6卷 1-13页
作者: Buradagunta, Suvarna Balakrishna, Sivadi Department of Computer Science and Engineering Vignan’s Foundation for Science Technology and Research Guntur India Department of Advanced Computer Science and Engineering Vignan’s Foundation for Science Technology and Research Guntur India
Online shopping platforms are experiencing rapid growth, necessitating effective product recommendation systems to enhance customer satisfaction by recommending visually similar products. Traditional statistical techn... 详细信息
来源: 评论
Representing a Model for the Anonymization of Big Data Stream Using In-Memory Processing
收藏 引用
Annals of Data science 2025年 第1期12卷 223-252页
作者: Shamsinejad, Elham Banirostam, Touraj Pedram, Mir Mohsen Rahmani, Amir Masoud Department of Computer Engineering Central Tehran Branch Islamic Azad University Tehran Iran Department of Electrical and Computer Engineering Faculty of Engineering Kharazmi University Tehran Iran Department of Computer Engineering Science and Research Branch Islamic Azad University Tehran Iran
In light of the escalating privacy risks in the big data era, this paper introduces an innovative model for the anonymization of big data streams, leveraging in-memory processing within the Spark framework. The approa... 详细信息
来源: 评论
A Review of Anonymization Algorithms and Methods in Big Data
收藏 引用
Annals of Data science 2025年 第1期12卷 253-279页
作者: Shamsinejad, Elham Banirostam, Touraj Pedram, Mir Mohsen Rahmani, Amir Masoud Department of Computer Engineering Central Tehran Branch Islamic Azad University Tehran Iran Department of Electrical and Computer Engineering Faculty of Engineering Kharazmi University Tehran Iran Department of Computer Engineering Science and Research Branch Islamic Azad University Tehran Iran
In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of users. This study was conducted with the aim of finding a solution ... 详细信息
来源: 评论
Dynamic-EC:an efficient dynamic erasure coding method for permissioned blockchain systems
收藏 引用
Frontiers of computer science 2025年 第1期19卷 15-28页
作者: Mizhipeng ZHANG Chentao WU Jie LI Minyi GUO Department of Computer Science and Engineering Shanghai Jiao Tong UniversityShanghai 200200China Yancheng Blockchain Research Institute Hengyang 421200China
Blockchain as a decentralized storage technology is widely used in many *** has extremely strict requirements for reliability because there are many potentially malicious ***,blockchain is a chain storage structure fo... 详细信息
来源: 评论
Enriched cloud computing data security through a triple level encryption model for healthcare systems
收藏 引用
International Journal of Cloud Computing 2024年 第6期13卷 566-580页
作者: Kanagaraj, Hari Priya Christo, Brintha Nalsingh Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Tamil Nadu Krishnankovil India
Cloud computing (CC) stores and accesses data over the internet, posing security risks from within the cloud service provider (CSP) or outsiders, especially in medical systems. Cryptography is crucial for security, bu... 详细信息
来源: 评论