咨询与建议

限定检索结果

文献类型

  • 82,729 篇 会议
  • 44,466 篇 期刊文献
  • 1,379 册 图书

馆藏范围

  • 128,574 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 76,782 篇 工学
    • 48,977 篇 计算机科学与技术...
    • 39,403 篇 软件工程
    • 19,296 篇 信息与通信工程
    • 12,762 篇 控制科学与工程
    • 11,758 篇 电气工程
    • 11,496 篇 电子科学与技术(可...
    • 8,782 篇 生物工程
    • 6,886 篇 生物医学工程(可授...
    • 6,469 篇 光学工程
    • 5,610 篇 机械工程
    • 4,878 篇 化学工程与技术
    • 4,608 篇 动力工程及工程热...
    • 4,422 篇 仪器科学与技术
    • 4,376 篇 材料科学与工程(可...
    • 3,279 篇 网络空间安全
    • 3,013 篇 安全科学与工程
  • 44,313 篇 理学
    • 21,369 篇 数学
    • 15,322 篇 物理学
    • 10,071 篇 生物学
    • 7,030 篇 统计学(可授理学、...
    • 5,276 篇 化学
    • 4,871 篇 系统科学
  • 19,743 篇 管理学
    • 12,637 篇 管理科学与工程(可...
    • 7,804 篇 图书情报与档案管...
    • 5,749 篇 工商管理
  • 6,977 篇 医学
    • 5,726 篇 临床医学
    • 5,121 篇 基础医学(可授医学...
    • 3,120 篇 药学(可授医学、理...
    • 2,984 篇 公共卫生与预防医...
  • 3,624 篇 法学
    • 2,994 篇 社会学
  • 2,285 篇 经济学
  • 1,620 篇 农学
  • 1,254 篇 教育学
  • 730 篇 文学
  • 271 篇 军事学
  • 191 篇 艺术学
  • 11 篇 哲学
  • 9 篇 历史学

主题

  • 3,850 篇 computer science
  • 3,387 篇 accuracy
  • 2,906 篇 deep learning
  • 2,719 篇 feature extracti...
  • 2,652 篇 machine learning
  • 2,484 篇 computational mo...
  • 2,241 篇 training
  • 1,694 篇 internet of thin...
  • 1,658 篇 support vector m...
  • 1,633 篇 artificial intel...
  • 1,631 篇 optimization
  • 1,515 篇 predictive model...
  • 1,461 篇 convolutional ne...
  • 1,409 篇 wireless sensor ...
  • 1,383 篇 real-time system...
  • 1,306 篇 data mining
  • 1,132 篇 neural networks
  • 1,094 篇 security
  • 1,090 篇 data models
  • 1,048 篇 computer archite...

机构

  • 1,088 篇 cavendish labora...
  • 1,016 篇 department of ph...
  • 954 篇 physikalisches i...
  • 942 篇 oliver lodge lab...
  • 909 篇 department of co...
  • 846 篇 department of el...
  • 732 篇 university of ch...
  • 693 篇 department of co...
  • 687 篇 department of el...
  • 605 篇 infn sezione di ...
  • 597 篇 infn laboratori ...
  • 584 篇 infn sezione di ...
  • 558 篇 chitkara univers...
  • 557 篇 infn sezione di ...
  • 548 篇 fakultät physik ...
  • 541 篇 horia hulubei na...
  • 539 篇 school of physic...
  • 524 篇 school of physic...
  • 520 篇 department of ph...
  • 517 篇 imperial college...

作者

  • 255 篇 a. gomes
  • 250 篇 barter w.
  • 243 篇 c. alexa
  • 243 篇 s. chen
  • 241 篇 j. m. izen
  • 238 篇 c. amelung
  • 237 篇 g. bella
  • 237 篇 j. strandberg
  • 237 篇 d. calvet
  • 233 篇 beiter a.
  • 230 篇 j. wang
  • 229 篇 blake t.
  • 225 篇 bellee v.
  • 221 篇 bowcock t.j.v.
  • 220 篇 amato s.
  • 219 篇 borsato m.
  • 219 篇 betancourt c.
  • 217 篇 g. spigo
  • 216 篇 boettcher t.
  • 215 篇 brundu d.

语言

  • 122,288 篇 英文
  • 4,810 篇 其他
  • 1,451 篇 中文
  • 79 篇 日文
  • 20 篇 法文
  • 18 篇 德文
  • 18 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 2 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 捷克文
检索条件"机构=Department of Computer Science and Engineering Toyohashi University of Technology"
128574 条 记 录,以下是41-50 订阅
排序:
Improved security with novel M-Log chaos steganography algorithm for huffman compressed english text
收藏 引用
Multimedia Tools and Applications 2025年 第2期84卷 665-688页
作者: Raghuvanshi, Devvrat Joshi, Kamaldeep Nandal, Rainu Sehrawat, Harkesh Singh, Surender Singh, Srishti Department of Computer Science and Engineering University Institute of Engineering and Technology Maharshi Dayanand University Rohtak Haryana India
This paper addresses the underexplored landscape of chaotic functions in steganography, existing literature when examined under PRISMA-ScR framework it was realized that most of the studies predominantly focuses on ut... 详细信息
来源: 评论
Wide field of view large aperture meta-doublet eyepiece
收藏 引用
Light(science & Applications) 2025年 第1期14卷 167-176页
作者: Anna Wirth-Singh Johannes E.Fröch Fan Yang Louis Martin Hanyu Zheng Hualiang Zhang Quentin T.Tanguy Zhihao Zhou Luocheng Huang Demis DJohn Biljana Stamenic Juejun Hu Tian Gu Arka Majumdar Department of Physics University of WashingtonSeattleWAUSA Department of Electrical and Computer Engineering University of WashingtonSeattleWAUSA Department of Materials Science and Engineering Massachusetts Institute of TechnologyCambridgeMAUSA Department of Electrical and Computer Engineering University of MassachusettsLowellMAUSA Department of Electrical and Computer Engineering University of CaliforniaSanta BarbaraCAUSA
Wide field of view and light weight optics are critical for advanced eyewear,with applications in augmented/virtual reality and night *** refractive lenses are often stacked to correct aberrations at a wide field of v... 详细信息
来源: 评论
Genetic Algorithm-optimized k-nearest Neighbors and Support Vector Machines for Breast Cancer Detection in Resource-constrained Environments
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第3期52卷 848-861页
作者: Alemu, Abebe Girma, Anteneh Abebe, Mesfin Srinivasagan, Ramasamy Adama Science and Technology University Adama Ethiopia Computer Science/Cyber-Security department University of the District of Columbia WashingtonDC United States Computer Science and Engineering department Adama Science and Technology University Adama Ethiopia Computer Engineering department CCSIT King Faisal University Al Hufuf Saudi Arabia
Breast cancer poses a significant global threat, highlighting the urgent need for early detection to reduce mortality rates. Researchers are working to minimize the occurrence of false positives and false negatives, t... 详细信息
来源: 评论
Silver Lining in the Fake News Cloud: Can Large Language Models Help Detect Misinformation?
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 14-24页
作者: Kumar, Raghvendra Goddu, Bhargav Saha, Sriparna Jatowt, Adam Indian Institute of Technology Department of Computer Science and Engineering Patna801106 India University of Innsbruck Department of Computer Science Innsbruck6020 Austria
In the times of advanced generative artificial intelligence, distinguishing truth from fallacy and deception has become a critical societal challenge. This research attempts to analyze the capabilities of large langua... 详细信息
来源: 评论
3-D AAV Deployment for Maximizing Harvested Energy in WRSNs: A Soft Actor-Critic Approach
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12083-12093页
作者: Bhalerao, Nilesh Vijaykumar Mothku, Sai Krishna Raju, Mekala Ratna National Institute of Technology Tiruchirappalli Department of Computer Science and Engineering Tiruchirappalli620015 India SRM University AP Department of Computer Science and Engineering Amaravati522240 India
Autonomous aerial vehicles (AAVs) with wireless power transfer (WPT) technology offer a promising solution to extend the lifetime of wireless rechargeable sensor networks (WRSNs) by swiftly recharging multiple sensor ... 详细信息
来源: 评论
SMART LAVATORY SOLUTION: INTEGRATING IOT AND DEEP LEARNING MODELS FOR ENHANCED HYGIENE
收藏 引用
Scalable Computing 2025年 第3期26卷 1057-1070页
作者: Patel, Jigna Shah, Aeshwi Rushali, Chaudhari Patel, Jitali Ukani, Vijay Department of Computer Science and Engineering Institute of Technology Nirma University Gujarat Ahmedabad India
In the current era of smart technology, integrating the Internet of Things (IoT) with Artificial Intelligence has revolutionized several fields, including public health and sanitation. The smart lavatory solution prop... 详细信息
来源: 评论
ResdenseNet: a lightweight dense ResNet enhanced with depthwise separable convolutions and its applications for early plant disease classification
收藏 引用
Neural Computing and Applications 2025年 第8期37卷 6305-6326页
作者: Nagpal, Jyoti Goel, Lavika Department of Computer Science & Engineering The NorthCap University Gurugram122017 India Department of Computer Science and Engineering Malaviya National Institute of Technology Rajasthan Jaipur302017 India
In recent years, artificial intelligence has undergone robust development, leading to the emergence of numerous autonomous AI applications. However, a crucial challenge lies in optimizing computational efficiency and ... 详细信息
来源: 评论
VoteDroid: a new ensemble voting classifier for malware detection based on fine-tuned deep learning models
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10923-10944页
作者: Bakır, Halit Faculty of Engineering and Natural Sciences Department of Computer Engineering Sivas University of Science and Technology Sivas Turkey
In this work, VoteDroid a novel fine-tuned deep learning models-based ensemble voting classifier has been proposed for detecting malicious behavior in Android applications. To this end, we proposed adopting the random... 详细信息
来源: 评论
Clustered Reinforcement Learning
收藏 引用
Frontiers of computer science 2025年 第4期19卷 43-57页
作者: Xiao MA Shen-Yi ZHAO Zhao-Heng YIN Wu-Jun LI National Key Laboratory for Novel Software Technology Department of Computer Science and TechnologyNanjing UniversityNanjing 210023China Department of Electrical Engineering and Computer Sciences University of CaliforniaBerkeleyCA 94720-1770USA
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)ar... 详细信息
来源: 评论
Enhancing cyber threat detection with an improved artificial neural network model
收藏 引用
Data science and Management 2025年 第1期8卷 107-115页
作者: Oyinloye, Toluwase Sunday Arowolo, Micheal Olaolu Prasad, Rajesh Department of Computer Science African University of Science and Technology Abuja900107 Nigeria Department of Electrical Engineering and Computer Science University of Missouri ColumbiaMO65201 United States
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). Data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i... 详细信息
来源: 评论