咨询与建议

限定检索结果

文献类型

  • 113,817 篇 会议
  • 52,364 篇 期刊文献
  • 1,512 册 图书

馆藏范围

  • 167,693 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98,669 篇 工学
    • 65,670 篇 计算机科学与技术...
    • 53,180 篇 软件工程
    • 25,404 篇 信息与通信工程
    • 16,349 篇 控制科学与工程
    • 14,492 篇 电气工程
    • 13,814 篇 电子科学与技术(可...
    • 11,796 篇 生物工程
    • 9,390 篇 生物医学工程(可授...
    • 8,407 篇 光学工程
    • 6,948 篇 机械工程
    • 5,944 篇 化学工程与技术
    • 5,839 篇 动力工程及工程热...
    • 5,609 篇 仪器科学与技术
    • 4,932 篇 材料科学与工程(可...
    • 4,510 篇 网络空间安全
    • 4,161 篇 安全科学与工程
  • 56,726 篇 理学
    • 27,071 篇 数学
    • 19,452 篇 物理学
    • 13,389 篇 生物学
    • 8,828 篇 统计学(可授理学、...
    • 6,392 篇 化学
    • 6,322 篇 系统科学
  • 25,902 篇 管理学
    • 16,142 篇 管理科学与工程(可...
    • 10,795 篇 图书情报与档案管...
    • 7,588 篇 工商管理
  • 9,366 篇 医学
    • 7,800 篇 临床医学
    • 7,051 篇 基础医学(可授医学...
    • 4,365 篇 药学(可授医学、理...
    • 4,086 篇 公共卫生与预防医...
  • 4,910 篇 法学
    • 3,999 篇 社会学
  • 3,019 篇 经济学
  • 2,432 篇 农学
  • 1,609 篇 教育学
  • 864 篇 文学
  • 361 篇 军事学
  • 224 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,208 篇 computer science
  • 4,963 篇 accuracy
  • 4,245 篇 deep learning
  • 3,954 篇 feature extracti...
  • 3,595 篇 machine learning
  • 3,537 篇 computational mo...
  • 3,112 篇 training
  • 2,518 篇 support vector m...
  • 2,403 篇 convolutional ne...
  • 2,365 篇 internet of thin...
  • 2,301 篇 real-time system...
  • 2,299 篇 predictive model...
  • 2,138 篇 optimization
  • 1,960 篇 artificial intel...
  • 1,905 篇 data mining
  • 1,901 篇 wireless sensor ...
  • 1,690 篇 neural networks
  • 1,608 篇 computer archite...
  • 1,574 篇 security
  • 1,537 篇 data models

机构

  • 1,082 篇 cavendish labora...
  • 1,003 篇 department of ph...
  • 947 篇 physikalisches i...
  • 934 篇 oliver lodge lab...
  • 928 篇 department of co...
  • 840 篇 department of el...
  • 740 篇 university of ch...
  • 680 篇 department of el...
  • 676 篇 department of co...
  • 591 篇 infn sezione di ...
  • 581 篇 infn laboratori ...
  • 570 篇 infn sezione di ...
  • 557 篇 chitkara univers...
  • 544 篇 infn sezione di ...
  • 537 篇 school of physic...
  • 536 篇 horia hulubei na...
  • 527 篇 fakultät physik ...
  • 519 篇 department of ph...
  • 518 篇 school of physic...
  • 512 篇 h.h. wills physi...

作者

  • 252 篇 a. gomes
  • 250 篇 barter w.
  • 242 篇 s. chen
  • 241 篇 c. alexa
  • 239 篇 j. wang
  • 238 篇 j. m. izen
  • 231 篇 g. bella
  • 231 篇 j. strandberg
  • 231 篇 c. amelung
  • 229 篇 d. calvet
  • 227 篇 blake t.
  • 224 篇 beiter a.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 213 篇 brundu d.
  • 211 篇 g. spigo

语言

  • 155,811 篇 英文
  • 10,056 篇 其他
  • 1,867 篇 中文
  • 127 篇 日文
  • 20 篇 朝鲜文
  • 19 篇 法文
  • 18 篇 德文
  • 16 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 意大利文
  • 2 篇 土耳其文
  • 1 篇 捷克文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Science and Engineering Technology"
167693 条 记 录,以下是911-920 订阅
排序:
EAODroid: Android Malware Detection Based on Enhanced API Order
收藏 引用
Chinese Journal of Electronics 2023年 第5期32卷 1169-1178页
作者: HUANG Lu XUE Jingfeng WANG Yong QU Dacheng CHEN Junbao ZHANG Nan ZHANG Li School of Computer Science and Technology Beijing Institute of Technology Department of Media Engineering Communication University of Zhejiang
The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in ... 详细信息
来源: 评论
A privacy-preserving deep learning framework for highly authenticated blockchain secure storage system
收藏 引用
Multimedia Tools and Applications 2024年 第36期83卷 84299-84329页
作者: Haque, Sheikh Moeen Ul Sofi, Shabir Ahamd Sholla, Sahil Department of Information Technology NIT Srinagar Jammu and Kashmir Hazratbal190006 India Department of Computer Science and Engineering Islamic University of Science and Technology Jammu and Kashmir Awantipora192122 India
To ensure the privacy, integrity, and security of the user data and to prevent the unauthorized access of data by illegal users in the blockchain storage system is significant. Blockchain networks are widely used for ... 详细信息
来源: 评论
Smart Business with Intelligent Business Cards (SBIBC)
Smart Business with Intelligent Business Cards (SBIBC)
收藏 引用
2024 International Conference on System, Computation, Automation and Networking, ICSCAN 2024
作者: Kirubakaran, N. Preethi, S.T. Parijatham, R. Pramithi, R. Chennai Institute of Technology Department of Computer Science and Business Systems Chennai India S.A. Engineering College Department of Computer Science and Engineering Chennai India Madha Institute Engineering and Technology Department of Computer Science and Engineering Chennai India
The research emphasizes the creation of a powerful and efficient system for the automaticextraction of contact information from physical calling cards through computer vision and information extraction techniques. Thi... 详细信息
来源: 评论
CUET_sstm at ArAIEval Shared Task: Unimodal (Text) Propagandistic Technique Detection Using Transformer-Based Model  2
CUET_sstm at ArAIEval Shared Task: Unimodal (Text) Propagand...
收藏 引用
2nd Arabic Natural Language Processing Conference, ArabicNLP 2024
作者: Labib, Momtazul Arefin Rahman, Samia Murad, Hasan Das, Udoy Department of Computer Science and Engineering Chittagong University of Engineering and Technology Bangladesh
In recent days, propaganda has started to influence public opinion increasingly as social media usage continues to grow. Our research has been part of the first challenge, Unimodal (Text) Propagandistic Technique Dete... 详细信息
来源: 评论
Implementation and Development of Static Hand gesture recognition in a real time using Diagonal Sum algorithm for Gestural Language  2
Implementation and Development of Static Hand gesture recogn...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational science, ICERCS 2024
作者: Jemin, V.M. Sasikumar, R. RMK College of Engineering and Technology Department of Computer Science and Engineering Thiruvallur India RMD Engineering College Department of Computer Science and Engineering Thiruvallur India
This manuscript deems the proposal over utilization of computer digitized vision over the gesture recognition. Gesture language is a language that determines the requirement over combining the finger gesture, its orie... 详细信息
来源: 评论
From Past to Present: A Comprehensive Review of Antenna technology in Modern Wireless Communication
收藏 引用
Journal of engineering science and technology Review 2024年 第3期17卷 179-200页
作者: Mishra, Brijesh Singh, Aditya Kumar Satheesha, T.Y. Verma, Ramesh Kumar Singh, Vivek Department of Electronics and Communication Engineering School of Engineering and Technology CMR University Karnataka Bengaluru India Department of Electronics and Communication Engineering Noida Institute of Engineering and Technology U.P. Greater Noida India School of Computer Science Engineering REVA University Karnataka Bengaluru India Department of Computer Science and Engineering IMS Engineering College Uttar Pradesh Ghaziabad India Department of Electronics and Communication Engineering Nagarjuna College of Engineering and Technology Karnataka Bengaluru India
This research looks at microwave devices, specifically, patch antenna along with electromagnetic spectrum, shape, mechanism, analytical methods, simulation tools, and feeding procedures. Patch antennas are distinguish... 详细信息
来源: 评论
Smartphone based human activity recognition irrespective of usage behavior using deep learning technique
收藏 引用
International Journal of Information technology (Singapore) 2025年 第1期17卷 69-85页
作者: Kundu, Soumya Mallik, Manjarini Saha, Jayita Chowdhury, Chandreyee Department of Computer Science and Engineering Jadavpur University Kolkata India Department of Computer Science and Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India
Human activity recognition (HAR) from sensory data is a crucial task for a wide variety of applications. The in-built inertial sensor facilities of commercial smartphones have made the data collection process easier. ... 详细信息
来源: 评论
An approach to on-stream DDoS blitz detection using machine learning algorithms
收藏 引用
Materials Today: Proceedings 2023年 80卷 3492-3499页
作者: Manjula, H.T. Neha Mangla Atria Institute Of Technology Bengaluru India Department Of Computer Science & Engineering CMRIT Bengaluru India Department of Information Science & Engineering Atria Institute of Technology Bengaluru India
Distributed Denial of service (DDoS) attacks is an enormous threat to today's cyber world, cyber networks are compromised by the attackers to distribute attacks in a large volume by denying the service to legitima... 详细信息
来源: 评论
A comprehensive review on detection of depression through social media analysis  4th
A comprehensive review on detection of depression through so...
收藏 引用
4th International Conference on Computational Methods in science and technology, ICCMST 2024
作者: Dogra, Shriya Kaur, Parneet Sharma, Tejpal Kumari, Nisha Department of Computer Science and Engineering Chandigarh Engineering College-CGC Landran India Department of Computer Science and Engineering Chitkara University Institute of Engineering and Technology Punjab India
Social media platforms like Instagram, Twitter, and Facebook have completely changed our world. People today exhibit a kind of digital character and are more linked than ever. While social media undoubtedly offers man... 详细信息
来源: 评论
Enhancing User Trust and Interpretability in AI-Driven Feature Request Detection for Mobile App Reviews: An Explainable Approach
收藏 引用
IEEE Access 2024年 12卷 114023-114045页
作者: Gambo, Ishaya Massenon, Rhodes Lin, Chia-Chen Ogundokun, Roseline Oluwaseun Agarwal, Saurabh Pak, Wooguil Obafemi Awolowo University Department of Computer Science and Engineering Ile-Ife220282 Nigeria National Chin-Yi University of Technology Department of Information Computer Science and Information Engineering Taichung411 Taiwan Kaunas University of Technology Department of Centre of Real Time Computer Sciences Kaunas44249 Lithuania Landmark University Department of Computer Science Omu-Aran251103 Nigeria Yeungnam University Department of Information and Communication Engineering Gyeongsan38541 Korea Republic of
Mobile app developers struggle to prioritize updates by identifying feature requests within user reviews. While machine learning models can assist, their complexity often hinders transparency and trust. This paper pre... 详细信息
来源: 评论