咨询与建议

限定检索结果

文献类型

  • 217,249 篇 会议
  • 155,504 篇 期刊文献
  • 2,494 册 图书

馆藏范围

  • 375,243 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 231,499 篇 工学
    • 122,112 篇 计算机科学与技术...
    • 98,350 篇 软件工程
    • 46,911 篇 信息与通信工程
    • 35,141 篇 电气工程
    • 34,266 篇 电子科学与技术(可...
    • 33,208 篇 控制科学与工程
    • 30,967 篇 化学工程与技术
    • 23,898 篇 材料科学与工程(可...
    • 23,652 篇 生物工程
    • 19,564 篇 生物医学工程(可授...
    • 19,303 篇 光学工程
    • 18,182 篇 机械工程
    • 16,343 篇 动力工程及工程热...
    • 13,752 篇 仪器科学与技术
    • 9,086 篇 冶金工程
    • 8,500 篇 力学(可授工学、理...
    • 8,081 篇 安全科学与工程
    • 7,927 篇 交通运输工程
  • 144,791 篇 理学
    • 59,189 篇 物理学
    • 57,491 篇 数学
    • 28,356 篇 化学
    • 28,199 篇 生物学
    • 19,134 篇 统计学(可授理学、...
    • 12,591 篇 系统科学
  • 50,285 篇 管理学
    • 32,514 篇 管理科学与工程(可...
    • 19,364 篇 图书情报与档案管...
    • 14,333 篇 工商管理
  • 20,699 篇 医学
    • 16,161 篇 临床医学
    • 13,691 篇 基础医学(可授医学...
    • 8,573 篇 药学(可授医学、理...
  • 8,639 篇 法学
  • 6,337 篇 经济学
  • 5,704 篇 农学
  • 3,208 篇 教育学
  • 1,570 篇 文学
  • 803 篇 军事学
  • 498 篇 艺术学
  • 60 篇 哲学
  • 45 篇 历史学

主题

  • 8,529 篇 accuracy
  • 7,797 篇 computer science
  • 7,265 篇 deep learning
  • 7,210 篇 feature extracti...
  • 6,426 篇 computational mo...
  • 6,109 篇 machine learning
  • 6,024 篇 training
  • 4,259 篇 optimization
  • 4,205 篇 predictive model...
  • 4,052 篇 support vector m...
  • 3,976 篇 real-time system...
  • 3,933 篇 convolutional ne...
  • 3,597 篇 internet of thin...
  • 3,445 篇 neural networks
  • 3,407 篇 data mining
  • 3,348 篇 artificial intel...
  • 3,326 篇 data models
  • 3,041 篇 wireless sensor ...
  • 2,827 篇 robustness
  • 2,777 篇 security

机构

  • 2,479 篇 school of comput...
  • 1,740 篇 cavendish labora...
  • 1,607 篇 university of ch...
  • 1,419 篇 school of comput...
  • 1,347 篇 institute of hig...
  • 1,285 篇 school of comput...
  • 1,013 篇 department of el...
  • 1,004 篇 physikalisches i...
  • 996 篇 school of physic...
  • 987 篇 chitkara univers...
  • 980 篇 department for p...
  • 943 篇 institute of phy...
  • 907 篇 department of ph...
  • 849 篇 institute of phy...
  • 834 篇 school of comput...
  • 822 篇 school of comput...
  • 800 篇 fakultät physik ...
  • 780 篇 department of ph...
  • 778 篇 oliver lodge lab...
  • 757 篇 department of co...

作者

  • 501 篇 bachacou h.
  • 497 篇 annovi a.
  • 475 篇 aloisio a.
  • 463 篇 aad g.
  • 462 篇 alonso f.
  • 459 篇 akimov a.v.
  • 457 篇 amidei d.
  • 453 篇 alexopoulos t.
  • 453 篇 arnaez o.
  • 452 篇 argyropoulos s.
  • 449 篇 azuelos g.
  • 449 篇 alimonti g.
  • 445 篇 alexa c.
  • 444 篇 anastopoulos c.
  • 438 篇 asai s.
  • 436 篇 augsten k.
  • 435 篇 amelung c.
  • 432 篇 adelman j.
  • 430 篇 arnold h.
  • 429 篇 arce a.t.h.

语言

  • 311,679 篇 英文
  • 56,361 篇 其他
  • 6,830 篇 中文
  • 1,122 篇 日文
  • 305 篇 德文
  • 304 篇 法文
  • 68 篇 朝鲜文
  • 44 篇 斯洛文尼亚文
  • 18 篇 阿拉伯文
  • 17 篇 俄文
  • 7 篇 西班牙文
  • 7 篇 土耳其文
  • 6 篇 荷兰文
  • 5 篇 意大利文
  • 3 篇 捷克文
  • 2 篇 葡萄牙文
  • 1 篇 爱沙尼亚文
  • 1 篇 芬兰文
  • 1 篇 克罗地亚文
  • 1 篇 波兰文
检索条件"机构=Department of Computer Science and Engineering School of Engineering and Technology"
375247 条 记 录,以下是1241-1250 订阅
排序:
Review the Deep Learning Strategies for Enhancing the Security of Body Area Networks Against Adversarial Attack
Review the Deep Learning Strategies for Enhancing the Securi...
收藏 引用
2024 International Conference on Advances in Computing Research on science engineering and technology, ACROSET 2024
作者: Nagdiya, Jagrati Goyal, Rajeev Amity School of Engineering and Technology Computer Science and Engineering Gwalior India
Thereis an urgent need for strong security measures to protect Body Area Networks (BANs) from malicious threats, as their use in health monitoring and telemedicine continues to grow. To improve BAN security, this rese... 详细信息
来源: 评论
Finite element model of a cable-stayed bridge updated with vibration measurements and its application to investigate the variation of modal frequencies in monitoring
收藏 引用
Structure and Infrastructure engineering 2024年 第5期20卷 760-770页
作者: Wu, Wen-Hwa Chen, Chien-Chou Kusbiantoro, Arief Lai, Gwolong Department of Civil and Construction Engineering National Yunlin University of Science and Technology Yunlin Taiwan Graduate School of Engineering Science and Technology National Yunlin University of Science and Technology Yunlin Taiwan
Ambient vibration measurements of a cable-stayed bridge in Taiwan were first conducted to identify its dominant modal parameters with a reliable stochastic subspace identification algorithm recently developed. A finit... 详细信息
来源: 评论
Container Based Nomadic Vehicular Cloud Using Cell Transmission Model
收藏 引用
computer Systems science & engineering 2023年 第1期44卷 423-440页
作者: Devakirubai Navulkumar Menakadevi Thangavelu Department of Computer Science and Engineering Jayam College of Engineering and TechnologyDharmapuri636813India Department of Electronics and Communication Engineering Adhiyaman College of EngineeringHosur635109India
Nomadic Vehicular Cloud(NVC)is envisaged in this *** predo-minant aspects of NVC is,it moves along with the vehicle that initiates it and functions only with the resources of moving vehicles on the heavy traffic road ... 详细信息
来源: 评论
Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats
收藏 引用
无人系统(英文) 2024年 第2期12卷 341-358页
作者: Ziqin Chen Guanpu Chen Yiguang Hong Department of Control Science and Engineering and Shanghai Research Institute for Intelligent Autonomous Systems Tongji UniversityShanghaiP.R.China School of Electrical Engineering and Computer Science KTH Royal Institute of TechnologyStockholmSweden
In this paper,we propose a game theory framework to solve advanced persistent threat problems,especially considering two types of insider threats:malicious and *** this framework,we establish a unified three-player ga... 详细信息
来源: 评论
CUET_Big_O@NLU of Devanagari Script Languages 2025: Identifying Script Language and Detecting Hate Speech Using Deep Learning and Transformer Model  1
CUET_Big_O@NLU of Devanagari Script Languages 2025: Identify...
收藏 引用
1st Workshop on Challenges in Processing South Asian Languages, CHiPSAL 2025, co-located with the 31st International Conference on Computational Linguistics, COLING 2025
作者: Hossan, Md. Refaj Sakib, Nazmus Hossain, Md. Alam Miah Jawad Hoque, Mohammed Moshiul Department of Computer Science and Engineering Chittagong University of Engineering and Technology Bangladesh
Text-based hate speech has been prevalent and is usually used to incite hostility and violence. Detecting this content becomes imperative, yet the task is challenging, particularly for low-resource languages in the De... 详细信息
来源: 评论
SmartEagleEye:A Cloud-Oriented Webshell Detection System Based on Dynamic Gray-Box and Deep Learning
收藏 引用
Tsinghua science and technology 2024年 第3期29卷 766-783页
作者: Xin Liu Yingli Zhang Qingchen Yu Jiajun Min Jun Shen Rui Zhou Qingguo Zhou School of Information Science and Engineering Lanzhou UniversityLanzhou 730000China College of Computer Science and Technology Zhejiang UniversityHangzhou 310058China School of Computing and Information Technology University of WollongongWollongong 2500Australia
Compared with traditional environments,the cloud environment exposes online services to additional vulnerabilities and threats of cyber attacks,and the cyber security of cloud platforms is becoming increasingly promin... 详细信息
来源: 评论
Illumination-Free Clustering Using Improved Slime Mould Algorithm for Acute Lymphoblastic Leukemia Image Segmentation
收藏 引用
Journal of Bionic engineering 2023年 第6期20卷 2916-2934页
作者: Krishna Gopal Dhal Swarnajit Ray Sudip Barik Arunita Das Department of Computer Science and Application Midnapore College(Autonomous)Paschim MedinipurMidnaporeWest BengalIndia Department of Computer Science and Engineering Maulana Abul Kalam Azad University of TechnologyKolkataWest BengalIndia Department of Computer Science and Engineering Kalyani Government Engineering CollegeKalyaniWest BengalIndia
Partitional clustering techniques such as K-Means(KM),Fuzzy C-Means(FCM),and Rough K-Means(RKM)are very simple and effective techniques for image ***,because their initial cluster centers are randomly determined,it is... 详细信息
来源: 评论
Machine Learning Based Intelligent Management System for Energy Storage Using Computing Application
EAI Endorsed Transactions on Energy Web
收藏 引用
EAI Endorsed Transactions on Energy Web 2024年 11卷 1-6页
作者: Panigrahi, Bhawani Sankar Kanna, R. Kishore Das, Pragyan Paramita Sahoo, Susanta Kumar Dutta, Tanusree Department of Computer Science & Engineering GITAM Institute of Technology GITAM University Vishakhapatnam India Chennai India Department of Computer Science & Engineering Silicon Institute of Technology Odisha Bhubaneswar India Odisha Sarang India Hyderabad India
INTRODUCTION: Cloud computing, a still emerging technology, allows customers to pay for services based on usage. It provides internet-based services, whilst virtualization optimizes a PC’s available resources. OBJECT... 详细信息
来源: 评论
Modeling contextual goals and detecting context conflicts from BDD-based user stories
收藏 引用
International Journal of computers and Applications 2024年 第12期46卷 1057-1068页
作者: Zheng, Liwei Wang, Yan Cui, Zhanqi Computer School Software Engineering Research Center Beijing Information Science and Technology University Beijing China
Behavior-Driven Development (BDD) user stories are widely used in agile methods for capturing user requirements and acceptance criteria due to their simplicity and clarity. However, the concise structure of BDD-based ... 详细信息
来源: 评论
Efficient Clustering Using Memetic Adaptive Hill Climbing Algorithm in WSN
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 3169-3185页
作者: M.Manikandan S.Sakthivel V.Vivekanandhan Department of Computer Science and Engineering Adhiyamaan College of EngineeringHosur635109TamilnaduIndia Department of Computer Science and Engineering Sona College of TechnologySalem636005TamilnaduIndia
Wireless Sensor Networks are composed of autonomous sensing devices which are interconnected to form a closed *** closed network is intended to share sensitive location-centric information from a source node to the ba... 详细信息
来源: 评论