咨询与建议

限定检索结果

文献类型

  • 113,817 篇 会议
  • 52,364 篇 期刊文献
  • 1,512 册 图书

馆藏范围

  • 167,693 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98,669 篇 工学
    • 65,670 篇 计算机科学与技术...
    • 53,180 篇 软件工程
    • 25,404 篇 信息与通信工程
    • 16,349 篇 控制科学与工程
    • 14,492 篇 电气工程
    • 13,814 篇 电子科学与技术(可...
    • 11,796 篇 生物工程
    • 9,390 篇 生物医学工程(可授...
    • 8,407 篇 光学工程
    • 6,948 篇 机械工程
    • 5,944 篇 化学工程与技术
    • 5,839 篇 动力工程及工程热...
    • 5,609 篇 仪器科学与技术
    • 4,932 篇 材料科学与工程(可...
    • 4,510 篇 网络空间安全
    • 4,161 篇 安全科学与工程
  • 56,726 篇 理学
    • 27,071 篇 数学
    • 19,452 篇 物理学
    • 13,389 篇 生物学
    • 8,828 篇 统计学(可授理学、...
    • 6,392 篇 化学
    • 6,322 篇 系统科学
  • 25,902 篇 管理学
    • 16,142 篇 管理科学与工程(可...
    • 10,795 篇 图书情报与档案管...
    • 7,588 篇 工商管理
  • 9,366 篇 医学
    • 7,800 篇 临床医学
    • 7,051 篇 基础医学(可授医学...
    • 4,365 篇 药学(可授医学、理...
    • 4,086 篇 公共卫生与预防医...
  • 4,910 篇 法学
    • 3,999 篇 社会学
  • 3,019 篇 经济学
  • 2,432 篇 农学
  • 1,609 篇 教育学
  • 864 篇 文学
  • 361 篇 军事学
  • 224 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,208 篇 computer science
  • 4,963 篇 accuracy
  • 4,245 篇 deep learning
  • 3,954 篇 feature extracti...
  • 3,595 篇 machine learning
  • 3,537 篇 computational mo...
  • 3,112 篇 training
  • 2,518 篇 support vector m...
  • 2,403 篇 convolutional ne...
  • 2,365 篇 internet of thin...
  • 2,301 篇 real-time system...
  • 2,299 篇 predictive model...
  • 2,138 篇 optimization
  • 1,960 篇 artificial intel...
  • 1,905 篇 data mining
  • 1,901 篇 wireless sensor ...
  • 1,690 篇 neural networks
  • 1,608 篇 computer archite...
  • 1,574 篇 security
  • 1,537 篇 data models

机构

  • 1,082 篇 cavendish labora...
  • 1,003 篇 department of ph...
  • 947 篇 physikalisches i...
  • 934 篇 oliver lodge lab...
  • 928 篇 department of co...
  • 840 篇 department of el...
  • 740 篇 university of ch...
  • 680 篇 department of el...
  • 676 篇 department of co...
  • 591 篇 infn sezione di ...
  • 581 篇 infn laboratori ...
  • 570 篇 infn sezione di ...
  • 557 篇 chitkara univers...
  • 544 篇 infn sezione di ...
  • 537 篇 school of physic...
  • 536 篇 horia hulubei na...
  • 527 篇 fakultät physik ...
  • 519 篇 department of ph...
  • 518 篇 school of physic...
  • 512 篇 h.h. wills physi...

作者

  • 252 篇 a. gomes
  • 250 篇 barter w.
  • 242 篇 s. chen
  • 241 篇 c. alexa
  • 239 篇 j. wang
  • 238 篇 j. m. izen
  • 231 篇 g. bella
  • 231 篇 j. strandberg
  • 231 篇 c. amelung
  • 229 篇 d. calvet
  • 227 篇 blake t.
  • 224 篇 beiter a.
  • 221 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 213 篇 brundu d.
  • 211 篇 g. spigo

语言

  • 155,811 篇 英文
  • 10,056 篇 其他
  • 1,867 篇 中文
  • 127 篇 日文
  • 20 篇 朝鲜文
  • 19 篇 法文
  • 18 篇 德文
  • 16 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 意大利文
  • 2 篇 土耳其文
  • 1 篇 捷克文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Science and Engineering Technology"
167693 条 记 录,以下是931-940 订阅
排序:
Enhanced Framework for Authentic and Anonymous Data Sharing Over Cloud Storage Service
Enhanced Framework for Authentic and Anonymous Data Sharing ...
收藏 引用
2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems, IACIS 2024
作者: Naik, Archana Anjali, M. Ushashree, P. Sooda, Kavitha Nitte Meenakshi Institute of Technology Department of Computer Science and Engineering Bangalore India Geethanjali College of Engineering and Technology Department of Computer Science and Engineering Hydrabad India B.M.S. College of Engineering Department of Computer Science and Engineering Bangalore India
This study introduces the concept of anonymous data exchange in banking applications using cloud computing. By intertwining innovative methodologies, the proposed framework bolsters security while introducing novel di... 详细信息
来源: 评论
Improper Implementation of Transport Layer Security: Impact on Android Applications and Man-in-the-Middle Attack  2
Improper Implementation of Transport Layer Security: Impact ...
收藏 引用
2nd International Conference on Power, Electrical, Electronics and Industrial Applications, PEEIACON 2024
作者: Moon, Iffath Tanjim Mimi, Afsana Rahman Mridha, Md. Musfiqur Pundra University of Science & Technology Department of Computer Science & Engineering Bogura Bangladesh Varendra University Department of Computer Science & Engineering Rajshahi Bangladesh
In this paper, we have analyzed the impact of improper implementation of Transport Layer Security (TLS) in Android applications. Communication security in Android applications is largely dependent on Transport Layer S... 详细信息
来源: 评论
Efficient resource allocation for D2D-enabled social IoT networks:A tripartite and time-scale optimization approach
收藏 引用
Intelligent and Converged Networks 2024年 第4期5卷 380-401页
作者: Saurabh Chandra Rajeev Arya Maheshwari Prasad Singh Department of Electronics&Communication Engineering National Institute of Technology PatnaPatna 800005India Department of Computer Science and Engineering National Institute of Technology PatnaPatna 800005India
In the densification of Device-to-Device(D2D)-enabled Social Internet of Things(SIoT)networks,improper allocation of resources can lead to high interference,increased signaling overhead,latency,and disruption of Chann... 详细信息
来源: 评论
Zero Trust Networks: Evolution and Application from Concept to Practice
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1593-1613页
作者: Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang School of Computer Science School of Cyber Science and EngineeringEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China Department of Computing Science University of AberdeenAberdeenAB243FXUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Sanya Institute of Hunan University of Science and Technology Sanya572024China
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address... 详细信息
来源: 评论
Disaster Management Based on Biodiversity Conservation Using Remote Sensing Data Analysis Using Machine Learning Model
收藏 引用
Remote Sensing in Earth Systems sciences 2025年 第1期8卷 191-199页
作者: Pokkuluri, Kiran Sree Mounika, Talla Devi, N. Durga Kishore, D. Ratna Balakiruthiga, B. Krishna, B. Murali Department of Computer Science and Engineering Shri Vishnu Engineering College for Women Telangana Bhimavaram India Department of CSE-DS Mallareddy College of Engineering Hyderabad India Department of Computer Science and Engineering Aditya University Andhra Pradesh Surampalem India Dept of Information Technology Lakireddy Balireddy College of Engineering Mylavram Vijayawada India Department of Networking and Communications College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad India
Artificial intelligence (AI) applications in forestry as well as wildlife domains have become more feasible due to the advancements in data science and digital and satellite technologies. However, there is a serious g... 详细信息
来源: 评论
An Automated Bird Species Classification Using Deep Learning  2
An Automated Bird Species Classification Using Deep Learning
收藏 引用
2nd IEEE International Conference on Advances in Information technology, ICAIT 2024
作者: Saritha, N. Shruthi Department of Computer Science and Engineering Adichuchanagiri Institute of Technology Chikkamagalur India Department of Computer Science and Engineering Navkis College of Engineering Hassan India
Birds are nice-looking from their aesthetic looks and life styles, around 50 billion of birds are living on the earth where some birds are in threat of extinction. For people, distinguishing and classification of bird... 详细信息
来源: 评论
BDPartNet: Feature Decoupling and Reconstruction Fusion Network for Infrared and Visible Image
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4621-4639页
作者: Xuejie Wang Jianxun Zhang Ye Tao Xiaoli Yuan Yifan Guo Department of Computer Science and Engineering Chongqing University of TechnologyChongqing400054China Liangjiang Institute of Artificial Intelligence Chongqing University of TechnologyChongqing400054China
While single-modal visible light images or infrared images provide limited information,infrared light captures significant thermal radiation data,whereas visible light excels in presenting detailed texture ***-bining ... 详细信息
来源: 评论
Enhancing Accuracy of Handwritten Character Segmentation Using Region-Based Convolutional Neural Networks (R-CNN)  1
Enhancing Accuracy of Handwritten Character Segmentation Usi...
收藏 引用
1st International Conference on AIML-Applications for engineering and technology, ICAET 2025
作者: Varpe, Kanchan Sakhare, Sachin Joshi, Rahul Vishwakarma Institute of Information Technology Department of Computer Engineering Pune India Department of Computer Science and Engineering Pune India
Handwritten character segmentation plays a pivotal role in the performance of Optical Character Recognition (OCR) systems. This paper introduces an innovative approach to enhancing segmentation accuracy using Region-B... 详细信息
来源: 评论
Violence Detection: A Multi-Model Approach Towards Automated Video Surveillance and Public Safety
Violence Detection: A Multi-Model Approach Towards Automated...
收藏 引用
2024 International Conference on Advances in Computing, Communication, Electrical, and Smart Systems, iCACCESS 2024
作者: Chakraborty, Sovon Zahir, Sabrina Orchi, Nabiha Tasnim Bin Hafiz, Md Ferdous Shamsuddoha, A.O.M. Dipto, Shakib Mahmud University of Liberal Arts Bangladesh Department of Computer Science and Engineering Dhaka Bangladesh Ahsanullah University of Science and Technology Department of Computer Science and Engineering Dhaka Bangladesh Department of Computer Science and Engineering Dhaka Bangladesh
Detection of violence at an earlier phase is crucial to intercepting potential criminal activities such as murders, rapes, and snatching. It is a critical aspect of public safety and security, involving the identifica... 详细信息
来源: 评论
Generative Adversarial Networks for Motor Imagery Classification using Wavelet Packet Decomposition and Complex Morlet Transform
收藏 引用
Multimedia Tools and Applications 2025年 1-24页
作者: Shirodkar, Vaishali Edla, Damodar Reddy Kumari, Annu Department of Computer Science and Engineering National Institute of Technology Goa Kottamoll Plateau Goa Cuncolim403703 India Information Technology Department Goa College of Engineering Farmagudi Goa Ponda403401 India
The area of brain-computer interface research is widely spreading as it has a diverse array of potential applications. Motor imagery classification is a boon to several people with motor impairment. Low accuracy and d... 详细信息
来源: 评论