咨询与建议

限定检索结果

文献类型

  • 214,954 篇 会议
  • 153,462 篇 期刊文献
  • 2,493 册 图书
  • 2 篇 科技报告

馆藏范围

  • 370,907 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 228,901 篇 工学
    • 120,501 篇 计算机科学与技术...
    • 97,746 篇 软件工程
    • 45,761 篇 信息与通信工程
    • 34,311 篇 电气工程
    • 33,825 篇 电子科学与技术(可...
    • 32,081 篇 控制科学与工程
    • 30,644 篇 化学工程与技术
    • 23,554 篇 生物工程
    • 23,488 篇 材料科学与工程(可...
    • 19,436 篇 生物医学工程(可授...
    • 19,259 篇 光学工程
    • 17,867 篇 机械工程
    • 16,038 篇 动力工程及工程热...
    • 13,540 篇 仪器科学与技术
    • 9,013 篇 冶金工程
    • 8,381 篇 力学(可授工学、理...
    • 7,756 篇 安全科学与工程
    • 7,578 篇 交通运输工程
  • 143,551 篇 理学
    • 58,707 篇 物理学
    • 57,089 篇 数学
    • 28,029 篇 生物学
    • 27,830 篇 化学
    • 18,997 篇 统计学(可授理学、...
    • 12,578 篇 系统科学
  • 49,441 篇 管理学
    • 31,866 篇 管理科学与工程(可...
    • 19,041 篇 图书情报与档案管...
    • 14,252 篇 工商管理
  • 20,184 篇 医学
    • 15,954 篇 临床医学
    • 13,613 篇 基础医学(可授医学...
    • 8,526 篇 药学(可授医学、理...
  • 8,482 篇 法学
  • 6,265 篇 经济学
  • 5,666 篇 农学
  • 3,169 篇 教育学
  • 1,509 篇 文学
  • 800 篇 军事学
  • 474 篇 艺术学
  • 54 篇 哲学
  • 45 篇 历史学

主题

  • 8,164 篇 accuracy
  • 7,798 篇 computer science
  • 7,034 篇 feature extracti...
  • 6,889 篇 deep learning
  • 6,296 篇 computational mo...
  • 5,930 篇 training
  • 5,896 篇 machine learning
  • 4,123 篇 optimization
  • 4,095 篇 predictive model...
  • 3,981 篇 support vector m...
  • 3,793 篇 convolutional ne...
  • 3,727 篇 real-time system...
  • 3,487 篇 internet of thin...
  • 3,400 篇 neural networks
  • 3,396 篇 data mining
  • 3,224 篇 data models
  • 3,189 篇 artificial intel...
  • 3,021 篇 wireless sensor ...
  • 2,744 篇 robustness
  • 2,697 篇 image segmentati...

机构

  • 2,468 篇 school of comput...
  • 1,735 篇 cavendish labora...
  • 1,578 篇 university of ch...
  • 1,423 篇 school of comput...
  • 1,340 篇 institute of hig...
  • 1,278 篇 school of comput...
  • 1,000 篇 school of physic...
  • 997 篇 department of el...
  • 992 篇 physikalisches i...
  • 974 篇 department for p...
  • 936 篇 institute of phy...
  • 902 篇 chitkara univers...
  • 898 篇 department of ph...
  • 843 篇 institute of phy...
  • 823 篇 school of comput...
  • 811 篇 school of comput...
  • 792 篇 fakultät physik ...
  • 784 篇 oliver lodge lab...
  • 778 篇 department of ph...
  • 762 篇 department of co...

作者

  • 499 篇 bachacou h.
  • 497 篇 annovi a.
  • 471 篇 aloisio a.
  • 463 篇 akimov a.v.
  • 461 篇 aad g.
  • 460 篇 alonso f.
  • 455 篇 amidei d.
  • 452 篇 argyropoulos s.
  • 451 篇 alexopoulos t.
  • 451 篇 arnaez o.
  • 449 篇 azuelos g.
  • 447 篇 alimonti g.
  • 445 篇 alexa c.
  • 442 篇 anastopoulos c.
  • 436 篇 asai s.
  • 434 篇 augsten k.
  • 434 篇 amelung c.
  • 431 篇 adelman j.
  • 427 篇 arce a.t.h.
  • 426 篇 arnold h.

语言

  • 343,287 篇 英文
  • 20,049 篇 其他
  • 6,346 篇 中文
  • 1,102 篇 日文
  • 128 篇 德文
  • 126 篇 法文
  • 69 篇 朝鲜文
  • 20 篇 斯洛文尼亚文
  • 10 篇 俄文
  • 8 篇 阿拉伯文
  • 8 篇 荷兰文
  • 7 篇 西班牙文
  • 6 篇 土耳其文
  • 5 篇 意大利文
  • 2 篇 葡萄牙文
  • 1 篇 捷克文
  • 1 篇 爱沙尼亚文
  • 1 篇 克罗地亚文
检索条件"机构=Department of Computer Science and Engineering School of Engineering and Technology"
370911 条 记 录,以下是801-810 订阅
排序:
Study on the mechanism and law of temperature,humidity and moisture content on the mechanical properties of molded fiber products
收藏 引用
Journal of Bioresources and Bioproducts 2024年 第3期9卷 351-368页
作者: Zhiqiang Fu Tong Zhao Hu Wang Jingyi Wei Haozhe Liu Liying Duan Yan Wang Ruixiang Yan School of Light Industry Science and Engineering Tianjin University of Science and TechnologyTianjin 300457China Department of Transportation and Vehicle Engineering Tangshan UniversityTangshan 063000HebeiChina College of Mechanical Engineering Tianjin University of Science and TechnologyTianjin 300457China
The change of temperature, humidity and moisture content (MC) will lead to the change of mechanical properties of molded fiber products (MFP). However, it is difficult to decouple the effects of temperature, humidity ... 详细信息
来源: 评论
Performance Analysis of a Novel Relay Selection Scheme for Wireless-Powered Cluster-Based Multi-Hop Cognitive Relay Networks
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2024年 第3期11卷 1551-1562页
作者: Sun, Hui Naraghi-Pour, Mort Qian, Yuwen Sheng, Weixing Han, Yubing Nanjing University of Science and Technology School of Electronic and Optical Engineering Nanjing210094 China Louisiana State University Division of Electrical and Computer Engineering School of Electrical Engineering and Computer Science Baton RougeLA70803 United States
In this paper, we study the performance of wireless-powered cluster-based multi-hop cognitive relay networks (MCRNs), where secondary nodes harvest energy from multiple dedicated power beacons (PBs) and share the spec... 详细信息
来源: 评论
DedupChain: A secure Blockchain-enabled Storage System with Deduplication for Zero-Trust Network
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2070-2086页
作者: Qi, Saiyu Wang, Qiuhao Wei, Wei Yang, Xu Zhao, Hongguang Liu, Yuhao Yang, Xu Qi, Yong Xi'an Jiaotong University School of Computer Science and Technology China Xi'an University of Technology School of Computer Science and Engineering China Alibaba Group China Northwestern Polytechnical University School of Electronics and Information China
Permissioned blockchain is a promising methodology to build zero-trust storage foundation with trusted data storage and sharing for the zero-trust network. However, the inherent full-backup feature of the permissioned... 详细信息
来源: 评论
A Lightweight Multiscale Feature Fusion Network for Solar Cell Defect Detection
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 521-542页
作者: Xiaoyun Chen Lanyao Zhang Xiaoling Chen Yigang Cen Linna Zhang Fugui Zhang School of Mechanical Engineering Guizhou UniversityGuiyang550025China School of Computer Science and Technology Beijing Jiaotong UniversityBeijing100044China
Solar cell defect detection is crucial for quality inspection in photovoltaic power generation *** the production process,defect samples occur infrequently and exhibit random shapes and sizes,which makes it challengin... 详细信息
来源: 评论
Risk-Averse Two-Stage Distributionally Robust Economic Dispatch Model Under Uncertain Renewable Energy
收藏 引用
CSEE Journal of Power and Energy Systems 2024年 第4期10卷 1514-1524页
作者: Ce Yang Weiqing Sun Jiannan Yang Dong Han Department of Control Science and Engineering University of Shanghai for Science and TechnologyShanghai 200093China Department of Electrical Engineering University of Shanghai for Science and TechnologyShanghai 200093China School of Economics and Business Administration Chongqing UniversityChongqing 400044China
With the participation of large quantities of renewable energy in power system operations,their volatility and intermittence increases the difficulties and challenges of power system economic *** the uncertainty of re... 详细信息
来源: 评论
Eye-Tracking Based Autism Spectrum Disorder Diagnosis Using Chaotic Butterfly Optimization with Deep Learning Model
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 1995-2013页
作者: Tamilvizhi Thanarajan Youseef Alotaibi Surendran Rajendran Krishnaraj Nagappan Department of Computer Science and Engineering Panimalar Engineering CollegeChennai600123India Department of Computer Science University College of Al JamoumUmm Al-Qura UniversityMakkah21421Saudi Arabia Department of Computer Science and Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennai602105India School of Computing SRM Institute of Science and TechnologyKattankulathur603203India
Autism spectrum disorder(ASD)can be defined as a neurodevelopmental condition or illness that can disturb kids who have heterogeneous characteristics,like changes in behavior,social disabilities,and difficulty communi... 详细信息
来源: 评论
Text steganography: enhanced character-level embedding algorithm using font attribute with increased resilience to statistical attacks
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9367-9392页
作者: KL, Shreya Narasimhan R, Bala Krishnan Department of Computer Science and Engineering National Institute of Technology Tiruchirappalli Tamil Nadu Tiruchirappalli India
Text steganography, the science of hiding secret messages in innocent-looking text documents ensures the secrecy of the embedded secret. Cryptography, on the other hand, encrypts and converts the secret message into a... 详细信息
来源: 评论
Complex preference analysis: a score-based evaluation strategy for ranking and comparison of the evolutionary algorithms
收藏 引用
Soft Computing 2025年 第4期29卷 1967-1980页
作者: Sarkar, Debojyoti Biswas, Anupam Department of Computer Science and Engineering National Institute of Technology Silchar Assam Silchar788010 India
In this paper, an evaluation strategy is proposed for evaluation of optimization algorithms, called the Complex Preference Analysis, that assesses the efficiency of different evolutionary algorithms by considering mul... 详细信息
来源: 评论
mLBOA-DML: modified butterfly optimized deep metric learning for enhancing accuracy in intrusion detection system
收藏 引用
Journal of Reliable Intelligent Environments 2023年 第3期9卷 333-347页
作者: Prabhakaran, Varun Kulandasamy, Ashokkumar Department of Computer Science and Engineering St.Joseph’s College of Engineering Chennai India Department of Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India
Intrusion detection is a prominent factor in the cybersecurity domain that prevents the network from malicious attacks. Cloud security is not satisfactory for securing the user’s information because it is based on st... 详细信息
来源: 评论
Method and Practice of Trusted Embedded Computing and Data Transmission Protection Architecture Based on Android
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 623-634页
作者: Yichuan WANG Wen GAO Xinhong HEI Yanning DU School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr... 详细信息
来源: 评论