咨询与建议

限定检索结果

文献类型

  • 214,998 篇 会议
  • 154,708 篇 期刊文献
  • 2,486 册 图书
  • 2 篇 科技报告

馆藏范围

  • 372,190 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 229,940 篇 工学
    • 120,907 篇 计算机科学与技术...
    • 97,685 篇 软件工程
    • 45,918 篇 信息与通信工程
    • 34,489 篇 电气工程
    • 33,944 篇 电子科学与技术(可...
    • 32,467 篇 控制科学与工程
    • 30,806 篇 化学工程与技术
    • 23,719 篇 材料科学与工程(可...
    • 23,614 篇 生物工程
    • 19,487 篇 生物医学工程(可授...
    • 19,221 篇 光学工程
    • 17,914 篇 机械工程
    • 16,141 篇 动力工程及工程热...
    • 13,558 篇 仪器科学与技术
    • 9,026 篇 冶金工程
    • 8,431 篇 力学(可授工学、理...
    • 7,777 篇 安全科学与工程
    • 7,613 篇 交通运输工程
  • 144,028 篇 理学
    • 58,891 篇 物理学
    • 57,117 篇 数学
    • 28,123 篇 生物学
    • 28,112 篇 化学
    • 18,980 篇 统计学(可授理学、...
    • 12,591 篇 系统科学
  • 49,484 篇 管理学
    • 31,890 篇 管理科学与工程(可...
    • 19,053 篇 图书情报与档案管...
    • 14,239 篇 工商管理
  • 20,318 篇 医学
    • 16,019 篇 临床医学
    • 13,630 篇 基础医学(可授医学...
    • 8,536 篇 药学(可授医学、理...
  • 8,467 篇 法学
  • 6,267 篇 经济学
  • 5,696 篇 农学
  • 3,150 篇 教育学
  • 1,513 篇 文学
  • 798 篇 军事学
  • 478 篇 艺术学
  • 55 篇 哲学
  • 45 篇 历史学

主题

  • 8,196 篇 accuracy
  • 7,799 篇 computer science
  • 7,060 篇 feature extracti...
  • 6,961 篇 deep learning
  • 6,304 篇 computational mo...
  • 5,962 篇 machine learning
  • 5,954 篇 training
  • 4,135 篇 optimization
  • 4,100 篇 predictive model...
  • 3,984 篇 support vector m...
  • 3,809 篇 convolutional ne...
  • 3,741 篇 real-time system...
  • 3,498 篇 internet of thin...
  • 3,409 篇 neural networks
  • 3,400 篇 data mining
  • 3,231 篇 data models
  • 3,221 篇 artificial intel...
  • 3,017 篇 wireless sensor ...
  • 2,760 篇 robustness
  • 2,702 篇 security

机构

  • 2,468 篇 school of comput...
  • 1,734 篇 cavendish labora...
  • 1,577 篇 university of ch...
  • 1,429 篇 school of comput...
  • 1,337 篇 institute of hig...
  • 1,279 篇 school of comput...
  • 1,000 篇 school of physic...
  • 992 篇 department of el...
  • 992 篇 physikalisches i...
  • 974 篇 department for p...
  • 936 篇 institute of phy...
  • 903 篇 chitkara univers...
  • 898 篇 department of ph...
  • 843 篇 institute of phy...
  • 823 篇 school of comput...
  • 812 篇 school of comput...
  • 787 篇 fakultät physik ...
  • 784 篇 oliver lodge lab...
  • 776 篇 department of ph...
  • 762 篇 department of co...

作者

  • 499 篇 bachacou h.
  • 497 篇 annovi a.
  • 471 篇 aloisio a.
  • 463 篇 akimov a.v.
  • 461 篇 aad g.
  • 460 篇 alonso f.
  • 455 篇 amidei d.
  • 451 篇 alexopoulos t.
  • 451 篇 arnaez o.
  • 450 篇 argyropoulos s.
  • 447 篇 azuelos g.
  • 447 篇 alimonti g.
  • 445 篇 alexa c.
  • 440 篇 anastopoulos c.
  • 434 篇 augsten k.
  • 434 篇 asai s.
  • 434 篇 amelung c.
  • 431 篇 adelman j.
  • 427 篇 arce a.t.h.
  • 424 篇 arnold h.

语言

  • 344,367 篇 英文
  • 20,356 篇 其他
  • 6,336 篇 中文
  • 1,102 篇 日文
  • 128 篇 德文
  • 126 篇 法文
  • 70 篇 朝鲜文
  • 20 篇 斯洛文尼亚文
  • 10 篇 俄文
  • 9 篇 荷兰文
  • 8 篇 阿拉伯文
  • 7 篇 西班牙文
  • 6 篇 土耳其文
  • 5 篇 意大利文
  • 2 篇 葡萄牙文
  • 1 篇 捷克文
  • 1 篇 爱沙尼亚文
  • 1 篇 克罗地亚文
检索条件"机构=Department of Computer Science and Engineering School of Engineering and Technology"
372194 条 记 录,以下是421-430 订阅
排序:
A privacy and compliance in regulated anonymous payment system based on blockchain
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第8期15卷 3141-3157页
作者: Elfadul, Issameldeen Wu, Lijun Elhabob, Rashad Elkhalil, Ahmed School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China School of Computer and Information Engineering Qilu Institute of Technology Shandong Jinan250200 China Faculty of Computer Science and Information Technology Karary University Khartoum Sudan
Decentralized Anonymous Payment Systems (DAP), often known as cryptocurrencies, stand out as some of the most innovative and successful applications on the blockchain. These systems have garnered significant attention... 详细信息
来源: 评论
Performance optimization in ddos prediction with ensemble based approach
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10631-10644页
作者: Dogra, Amit Taqdir Department of Computer Science and Engineering SoET BGSB University Rajouri India Department of Computer Science Engineering and Technology Guru Nanak Dev University Regional Campus Gurdaspur India
Distributed Denial of Service (DDoS) attacks pose a significant threat to network infrastructures, leading to service disruptions and potential financial losses. In this study, we propose an ensemble-based approach fo... 详细信息
来源: 评论
Rice spikelet’s disease detection using hybrid optimization model and optimized CNN
收藏 引用
Soft Computing 2024年 第21期28卷 12787-12806页
作者: Patel, Bharati Department of Computer Science and Engineering Faculty of Science and Technology ICFAI University Raipur India
Rice fields all across the world are affected by spikelet sterility, often known as rice spikelet's disease. It is characterized by the improper development of spikelet’s, which lowers grain output and quality. F... 详细信息
来源: 评论
Relay Type Link Fabrication Attack in SDN: A Review
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2025年 第1期7卷 51-55页
作者: Metaferia, Getahun Lemma, Frezewd Adama Science and Technology University Department of Computer Science and Engineering Adama1881 Ethiopia
Software-defined Networking (SDN) is an innovative network architecture tailored to address the modern demands of network virtualization and cloud computing, which require features such as programmability, flexibility... 详细信息
来源: 评论
Trust management in online computing environment: a complete review
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第1期15卷 491-545页
作者: Singh, Ashish Chatterjee, Kakali School of Computer Engineering KIIT Deemed to be University Odisha Bhubaneswar751024 India Department of Computer Science and Engineering National Institute of Technology Bihar Patna800005 India
Nowadays, trust management plays a significant role in different applications like commercial applications, Internet of Things (IoT) based applications, social networking applications, cloud computing-based applicatio... 详细信息
来源: 评论
A Local Differential Privacy Trajectory Protection Method Based on Temporal and Spatial Restrictions for Staying Detection
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 617-633页
作者: Weiqi Zhang Zhenzhen Xie Akshita Maradapu Vera Venkata Sai Qasim Zia Zaobo He Guisheng Yin College of Computer Science and Technology Harbin Engineering UniversityHarbin 150001China School of Computer Science and Technology Shandong UniversityQingdao 266237China Department of Computer Science Georgia State UniversityAtlantaGA 30303USA College of Information Science and Technology Jinan UniversityGuangzhou 510632China
The widespread availability of GPS has opened up a whole new market that provides a plethora of location-based ***-based social networks have become very popular as they provide end users like us with several such ser... 详细信息
来源: 评论
Insider Attack Prevention:LAPUP—Lightweight Authentication Protocol Using PUF
收藏 引用
Journal of Communications and Information Networks 2024年 第2期9卷 192-206页
作者: Siranjeevi Rajamanickam Satyanarayana Vollala N.Ramasubramanian Department of Computer Engineering Government Polytechnic CollegeTiruchirappalli 620022India Department of Computer Science and Engineering Dr.Shyama Prasad Mukherjee International Institute of Information Technology-Naya RaipurChhattisgarh 493661India Department of Computer Science and Engineering National Institute of TechnologyTiruchirappalli 620015India
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are ha... 详细信息
来源: 评论
Exploring Unbiased Activation Maps for Weakly Supervised Tissue Segmentation of Histopathological Images
收藏 引用
IEEE Transactions on Medical Imaging 2025年 第6期44卷 2631-2642页
作者: Kang, Yuxin Li, Hansheng Shi, Xiaoshuang Zhang, Xiao Xing, Yaqiong Wen, Yuting Wang, Yi Cui, Lei Feng, Jun Yang, Lin Yulin University Department of Information Engineering Shaanxi Yulin China The School of Information Science and Technology Northwest University Shaanxi Xi'an China Northwest University School of Information Science and Technology Shaanxi Xi'an China University of Electronic Science and Technology of China Department of Computer Science and Engineering Sichuan Chengdu China Xi'An Jiaotong University School of Computer Science and Technology Shaanxi Xi'an China
Tissue segmentation in histopathological images plays a crucial role in computational pathology, owing to its significant potential to indicate the prognosis of cancer patients. Presently, numerous Weakly Supervised S... 详细信息
来源: 评论
Energy saving analysis for CO_(2)–O_(2)mixed injection technology in converter steelmaking
收藏 引用
Journal of Iron and Steel Research International 2024年 第5期31卷 1095-1103页
作者: Bao-chen Han Chun-liang Gao Ya-qiang Li Dan Liu Guang-sheng Wei Rong Zhu Hebei Key Laboratory of Material Near-Net Forming Technology School of Material Science and EngineeringHebei University of Science and TechnologyShijiazhuang050018HebeiChina Department of Automotive Engineering Hebei Vocational University of Technology and EngineeringXingtai054000HebeiChina School of Metallurgical and Ecological Engineering University of Science and Technology BeijingBeijing100083China
Energy-saving in China's iron and steel industry still relies on the development and improvement of short-term energy saving ***,a special converter smelting technology incorporating energy saving was *** evaluate... 详细信息
来源: 评论
A decentralised asynchronous federated learning framework for autonomous driving
收藏 引用
International Journal of Vehicle Autonomous Systems 2024年 第3-4期17卷 133-149页
作者: Li, Xiaoli Cai, Ting Xiong, Wei Xu, Degang Computer School HuBei University of Arts and Science Xiangyang China School of Computer Science and Engineering Hubei University of Technology Wuhan China
Traditional autonomous driving usually requires a large number of vehicles to upload data to a central server for training. However, collecting data from vehicles may violate personal privacy as road environmental inf... 详细信息
来源: 评论