咨询与建议

限定检索结果

文献类型

  • 214,998 篇 会议
  • 154,708 篇 期刊文献
  • 2,486 册 图书
  • 2 篇 科技报告

馆藏范围

  • 372,190 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 229,940 篇 工学
    • 120,907 篇 计算机科学与技术...
    • 97,685 篇 软件工程
    • 45,918 篇 信息与通信工程
    • 34,489 篇 电气工程
    • 33,944 篇 电子科学与技术(可...
    • 32,467 篇 控制科学与工程
    • 30,806 篇 化学工程与技术
    • 23,719 篇 材料科学与工程(可...
    • 23,614 篇 生物工程
    • 19,487 篇 生物医学工程(可授...
    • 19,221 篇 光学工程
    • 17,914 篇 机械工程
    • 16,141 篇 动力工程及工程热...
    • 13,558 篇 仪器科学与技术
    • 9,026 篇 冶金工程
    • 8,431 篇 力学(可授工学、理...
    • 7,777 篇 安全科学与工程
    • 7,613 篇 交通运输工程
  • 144,028 篇 理学
    • 58,891 篇 物理学
    • 57,117 篇 数学
    • 28,123 篇 生物学
    • 28,112 篇 化学
    • 18,980 篇 统计学(可授理学、...
    • 12,591 篇 系统科学
  • 49,484 篇 管理学
    • 31,890 篇 管理科学与工程(可...
    • 19,053 篇 图书情报与档案管...
    • 14,239 篇 工商管理
  • 20,318 篇 医学
    • 16,019 篇 临床医学
    • 13,630 篇 基础医学(可授医学...
    • 8,536 篇 药学(可授医学、理...
  • 8,467 篇 法学
  • 6,267 篇 经济学
  • 5,696 篇 农学
  • 3,150 篇 教育学
  • 1,513 篇 文学
  • 798 篇 军事学
  • 478 篇 艺术学
  • 55 篇 哲学
  • 45 篇 历史学

主题

  • 8,196 篇 accuracy
  • 7,799 篇 computer science
  • 7,060 篇 feature extracti...
  • 6,961 篇 deep learning
  • 6,304 篇 computational mo...
  • 5,962 篇 machine learning
  • 5,954 篇 training
  • 4,135 篇 optimization
  • 4,100 篇 predictive model...
  • 3,984 篇 support vector m...
  • 3,809 篇 convolutional ne...
  • 3,741 篇 real-time system...
  • 3,498 篇 internet of thin...
  • 3,409 篇 neural networks
  • 3,400 篇 data mining
  • 3,231 篇 data models
  • 3,221 篇 artificial intel...
  • 3,017 篇 wireless sensor ...
  • 2,760 篇 robustness
  • 2,702 篇 security

机构

  • 2,468 篇 school of comput...
  • 1,734 篇 cavendish labora...
  • 1,577 篇 university of ch...
  • 1,429 篇 school of comput...
  • 1,337 篇 institute of hig...
  • 1,279 篇 school of comput...
  • 1,000 篇 school of physic...
  • 992 篇 department of el...
  • 992 篇 physikalisches i...
  • 974 篇 department for p...
  • 936 篇 institute of phy...
  • 903 篇 chitkara univers...
  • 898 篇 department of ph...
  • 843 篇 institute of phy...
  • 823 篇 school of comput...
  • 812 篇 school of comput...
  • 787 篇 fakultät physik ...
  • 784 篇 oliver lodge lab...
  • 776 篇 department of ph...
  • 762 篇 department of co...

作者

  • 499 篇 bachacou h.
  • 497 篇 annovi a.
  • 471 篇 aloisio a.
  • 463 篇 akimov a.v.
  • 461 篇 aad g.
  • 460 篇 alonso f.
  • 455 篇 amidei d.
  • 451 篇 alexopoulos t.
  • 451 篇 arnaez o.
  • 450 篇 argyropoulos s.
  • 447 篇 azuelos g.
  • 447 篇 alimonti g.
  • 445 篇 alexa c.
  • 440 篇 anastopoulos c.
  • 434 篇 augsten k.
  • 434 篇 asai s.
  • 434 篇 amelung c.
  • 431 篇 adelman j.
  • 427 篇 arce a.t.h.
  • 424 篇 arnold h.

语言

  • 344,367 篇 英文
  • 20,356 篇 其他
  • 6,336 篇 中文
  • 1,102 篇 日文
  • 128 篇 德文
  • 126 篇 法文
  • 70 篇 朝鲜文
  • 20 篇 斯洛文尼亚文
  • 10 篇 俄文
  • 9 篇 荷兰文
  • 8 篇 阿拉伯文
  • 7 篇 西班牙文
  • 6 篇 土耳其文
  • 5 篇 意大利文
  • 2 篇 葡萄牙文
  • 1 篇 捷克文
  • 1 篇 爱沙尼亚文
  • 1 篇 克罗地亚文
检索条件"机构=Department of Computer Science and Engineering School of Engineering and Technology"
372194 条 记 录,以下是791-800 订阅
排序:
Text steganography: enhanced character-level embedding algorithm using font attribute with increased resilience to statistical attacks
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9367-9392页
作者: KL, Shreya Narasimhan R, Bala Krishnan Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli Tamil Nadu Tiruchirappalli India
Text steganography, the science of hiding secret messages in innocent-looking text documents ensures the secrecy of the embedded secret. Cryptography, on the other hand, encrypts and converts the secret message into a... 详细信息
来源: 评论
A Lightweight Multiscale Feature Fusion Network for Solar Cell Defect Detection
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 521-542页
作者: Xiaoyun Chen Lanyao Zhang Xiaoling Chen Yigang Cen Linna Zhang Fugui Zhang School of Mechanical Engineering Guizhou UniversityGuiyang550025China School of Computer Science and Technology Beijing Jiaotong UniversityBeijing100044China
Solar cell defect detection is crucial for quality inspection in photovoltaic power generation *** the production process,defect samples occur infrequently and exhibit random shapes and sizes,which makes it challengin... 详细信息
来源: 评论
Eye-Tracking Based Autism Spectrum Disorder Diagnosis Using Chaotic Butterfly Optimization with Deep Learning Model
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 1995-2013页
作者: Tamilvizhi Thanarajan Youseef Alotaibi Surendran Rajendran Krishnaraj Nagappan Department of Computer Science and Engineering Panimalar Engineering CollegeChennai600123India Department of Computer Science University College of Al JamoumUmm Al-Qura UniversityMakkah21421Saudi Arabia Department of Computer Science and Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennai602105India School of Computing SRM Institute of Science and TechnologyKattankulathur603203India
Autism spectrum disorder(ASD)can be defined as a neurodevelopmental condition or illness that can disturb kids who have heterogeneous characteristics,like changes in behavior,social disabilities,and difficulty communi... 详细信息
来源: 评论
Complex preference analysis: a score-based evaluation strategy for ranking and comparison of the evolutionary algorithms
收藏 引用
Soft Computing 2025年 第4期29卷 1967-1980页
作者: Sarkar, Debojyoti Biswas, Anupam Department of Computer Science and Engineering National Institute of Technology Silchar Assam Silchar788010 India
In this paper, an evaluation strategy is proposed for evaluation of optimization algorithms, called the Complex Preference Analysis, that assesses the efficiency of different evolutionary algorithms by considering mul... 详细信息
来源: 评论
mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system
收藏 引用
Journal of Reliable Intelligent Environments 2023年 第3期9卷 333-347页
作者: Prabhakaran, Varun Kulandasamy, Ashokkumar Department of Computer Science and Engineering St.Joseph’s College of Engineering Chennai India Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India
Intrusion detection is a prominent factor in the cybersecurity domain that prevents the network from malicious attacks. Cloud security is not satisfactory for securing the user’s information because it is based on st... 详细信息
来源: 评论
Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr... 详细信息
来源: 评论
LARSI-TPE-XGB: Short-Term Load Forecasting by Load-Adaptive Relative Strength Index and Fusion of Tree-Structured Parzen Estimator and XGBoost
收藏 引用
IEEE Transactions on Power Delivery 2025年 第3期40卷 1318-1330页
作者: Liu, Jin-Xian Leu, Jenq-Shiou National Taiwan University of Science and Technology Department of Electronic and Computer Engineering Taipei106216 Taiwan
Power load forecasting is essential for optimizing power generation and distribution efficiency. This paper proposes a novel method for daily average load forecasting, referred to as LARSI-TPE-XGB, which integrates th... 详细信息
来源: 评论
Comparing HAProxy Scheduling Algorithms during the DDoS Attacks
IEEE Networking Letters
收藏 引用
IEEE Networking Letters 2024年 第2期6卷 139-142页
作者: Kumar, Anmol Somani, Gaurav Agarwal, Mayank Indian Institute of Technology Patna Department of Computer Science and Engineering Patna800013 India Central University of Rajasthan Department of Computer Science and Engineering Ajmer305817 India
Web-services have become most common IT enablers today. Cyber attacks such as the distributed denial of service (DDoS) attacks pose availability concerns which may result into service outages and consequently financia... 详细信息
来源: 评论
Smart automated highway lighting system using IoT: a survey
收藏 引用
Energy Informatics 2024年 第1期7卷 76页
作者: Achar, Tejaswini Eshwar Rekha, C. Shreyas, J. Department of Computer Science and Engineering Government Engineering College Koppal Talakal India Department of Information Science and Engineering Bapuji Institute of Engineering and Technology Davanagere India Department of Information Technology Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India
Efficient highway lighting is crucial for ensuring road safety and reducing energy consumption and costs. Traditional highway lighting systems rely on timers or simple photosensors, leading to inefficient operation by... 详细信息
来源: 评论
A brief review on Quantum Key Distribution Protocols
收藏 引用
Multimedia Tools and Applications 2025年 1-40页
作者: Kumar, Mandeep Mondal, Bhaskar Department of Computer Science & Engineering National Institute of Technology Patna Bihar Patna800005 India
Development in Quantum computing paves the path to Quantum key distribution (QKD) by using the principles of quantum physics. QKD enables two remote parties to produce and share secure keys while removing all computin... 详细信息
来源: 评论