咨询与建议

限定检索结果

文献类型

  • 279,970 篇 会议
  • 114,871 篇 期刊文献
  • 2,860 册 图书

馆藏范围

  • 397,700 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 229,893 篇 工学
    • 153,103 篇 计算机科学与技术...
    • 123,818 篇 软件工程
    • 55,568 篇 信息与通信工程
    • 36,607 篇 控制科学与工程
    • 32,146 篇 电气工程
    • 30,987 篇 电子科学与技术(可...
    • 26,537 篇 生物工程
    • 20,932 篇 生物医学工程(可授...
    • 18,199 篇 光学工程
    • 15,636 篇 机械工程
    • 13,277 篇 化学工程与技术
    • 12,464 篇 仪器科学与技术
    • 12,402 篇 动力工程及工程热...
    • 11,031 篇 材料科学与工程(可...
    • 8,515 篇 安全科学与工程
    • 8,022 篇 网络空间安全
  • 130,065 篇 理学
    • 64,645 篇 数学
    • 42,634 篇 物理学
    • 30,002 篇 生物学
    • 20,930 篇 统计学(可授理学、...
    • 15,159 篇 系统科学
    • 14,293 篇 化学
  • 57,285 篇 管理学
    • 34,461 篇 管理科学与工程(可...
    • 25,062 篇 图书情报与档案管...
    • 17,057 篇 工商管理
  • 19,847 篇 医学
    • 16,650 篇 临床医学
    • 14,925 篇 基础医学(可授医学...
    • 9,342 篇 药学(可授医学、理...
    • 7,985 篇 公共卫生与预防医...
  • 10,770 篇 法学
    • 8,805 篇 社会学
  • 6,601 篇 经济学
  • 5,268 篇 农学
  • 4,258 篇 教育学
  • 1,896 篇 文学
  • 897 篇 军事学
  • 517 篇 艺术学
  • 77 篇 哲学
  • 46 篇 历史学

主题

  • 20,117 篇 computer science
  • 9,361 篇 accuracy
  • 8,910 篇 computational mo...
  • 8,162 篇 feature extracti...
  • 7,837 篇 deep learning
  • 7,450 篇 machine learning
  • 6,675 篇 training
  • 5,386 篇 data mining
  • 5,263 篇 support vector m...
  • 5,228 篇 computer archite...
  • 5,050 篇 predictive model...
  • 4,975 篇 wireless sensor ...
  • 4,721 篇 costs
  • 4,599 篇 optimization
  • 4,591 篇 application soft...
  • 4,558 篇 bandwidth
  • 4,422 篇 protocols
  • 4,412 篇 testing
  • 4,402 篇 algorithm design...
  • 4,385 篇 real-time system...

机构

  • 1,703 篇 department of co...
  • 1,354 篇 department of co...
  • 1,338 篇 department of el...
  • 1,174 篇 department of el...
  • 1,053 篇 cavendish labora...
  • 972 篇 department of ph...
  • 916 篇 department of co...
  • 843 篇 physikalisches i...
  • 837 篇 oliver lodge lab...
  • 822 篇 department of el...
  • 745 篇 university of ch...
  • 638 篇 department of co...
  • 553 篇 department of co...
  • 533 篇 chitkara univers...
  • 527 篇 infn sezione di ...
  • 512 篇 infn laboratori ...
  • 505 篇 infn sezione di ...
  • 497 篇 horia hulubei na...
  • 488 篇 department of co...
  • 486 篇 infn sezione di ...

作者

  • 250 篇 barter w.
  • 243 篇 j. wang
  • 243 篇 s. chen
  • 228 篇 a. gomes
  • 223 篇 blake t.
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 216 篇 amato s.
  • 215 篇 betancourt c.
  • 214 篇 c. alexa
  • 214 篇 boettcher t.
  • 213 篇 borsato m.
  • 209 篇 j. m. izen
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 202 篇 bencivenni g.
  • 193 篇 bay a.
  • 192 篇 c. amelung
  • 191 篇 niyato dusit
  • 190 篇 g. bella

语言

  • 373,574 篇 英文
  • 20,384 篇 其他
  • 3,798 篇 中文
  • 220 篇 日文
  • 56 篇 德文
  • 36 篇 法文
  • 35 篇 朝鲜文
  • 24 篇 斯洛文尼亚文
  • 14 篇 西班牙文
  • 7 篇 俄文
  • 5 篇 意大利文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 3 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering and Computer Applications"
397701 条 记 录,以下是161-170 订阅
排序:
Analysing the Identification Approaches of Deep Fake Images and Videos Encapsulated in Fake Contents Available on Social Platforms  3
Analysing the Identification Approaches of Deep Fake Images ...
收藏 引用
3rd International Conference on Communication, Control, and Intelligent Systems, CCIS 2024
作者: Jha, Saurabh Sanghi, Akash Upadhyay, Pragati Agarwal, Gaurav Invertis University Department of Computer Applications Bareilly India Psit College of Higher Education Department of Computer Applications Kanpur India Invertis University Department of Computer Science and Engineering Bareilly India
The 21st century is characterized by the emergence of AI tools, which have become essential in today's diverse application landscape. These tools find utility across various sectors such as research, customer serv... 详细信息
来源: 评论
Object Recognition Through Content Based Feature Extraction and Classification of Sounds in IoT Environment  2nd
Object Recognition Through Content Based Feature Extraction ...
收藏 引用
2nd International Conference on Computing, Communication, and Learning, CoCoLe 2023
作者: Sethi, Srinivas Rath, Manisa Kuanar, Sanjaya Kumar Sahoo, Ramesh Kumar Computer Science Engineering and Applications IGIT Sarang Dhenkanal India Computer Science Engineering GIET Gunupur India
The content-based order of urban sound classes is an important aspect of several emerging techniques and applications as a result, the research issue has gotten a lot of attention recently. The goal of this work is to... 详细信息
来源: 评论
Efficient Communication in Wireless Sensor Networks Using Optimized Energy Efficient Engroove Leach Clustering Protocol
收藏 引用
Tsinghua science and Technology 2024年 第4期29卷 985-1001页
作者: N.Meenakshi Sultan Ahmad A.V.Prabu J.Nageswara Rao Nashwan Adnan Othman Hikmat A.M.Abdeljaber R.Sekar Jabeen Nazeer SRM Institute of Science and Technology KattankulathurChennai 603203India Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharj 11942Saudi Arabia University Center for Research and Development(UCRD) Department of Computer Science and EngineeringChandigarh UniversityGharuanMohali 140413India Department of ECE Koneru Lakshmaiah Education FoundationVaddeswaramGuntur 522502India Department of Computer Science and Engineering Lakireddy Balireddy College of Engineering(A)NTR District 521230India Department of Computer Engineering College of EngineeringKnowledge UniversityErbil 44001Iraq Department of Computer Science Faculty of Information TechnologyApplied Science Private UniversityAmman 11937Jordan Department of Electronics and Communication Engineering(ECE) School of EngineeringPresidency UniversityBangalore 834001India
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental mo... 详细信息
来源: 评论
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1901-1918页
作者: Ahmad O.Aseeri Sajjad Hussain Chauhdary Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science Texas Tech UniversityLubbockUSA
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ... 详细信息
来源: 评论
Prostate Cancer Prediction Using Convolutional Neural Networks  3
Prostate Cancer Prediction Using Convolutional Neural Networ...
收藏 引用
3rd IEEE North Karnataka Subsection Flagship International Conference, NKCon 2024
作者: Sethi, Bijaya Kumar Singh, Debabrata Rout, Saroja Kumar Department of Computer Science and Engineering Bhubaneswar India Department of Computer Applications Bhubaneswar India Department of Information Technology Hyderabad India
Cancer-related mortality in men is highest among men who suffer from prostate cancer. The lack of clarity and consistency of early symptoms often makes diagnosis a challenge in the later stages (stages III and IV). Ex... 详细信息
来源: 评论
Image-based rice leaf disease detection using CNN and generative adversarial network
收藏 引用
Neural Computing and applications 2025年 第1期37卷 439-456页
作者: Ramadan, Syed Taha Yeasin Islam, Md Shafiqul Sakib, Tanjim Sharmin, Nusrat Rahman, Md. Mokhlesur Rahman, Md. Mahbubur Department of Computer Science and Engineering Military Institute of Science and Technology Dhaka Bangladesh
Rice is a major crop and staple food for more than half of the world’s population and plays a vital role in ensuring food security as well as the global economy pests and diseases pose a threat to the production of r... 详细信息
来源: 评论
Application of Generative Graph Models in Biological Network Regeneration: A Selective Review and Qualitative Analysis
Application of Generative Graph Models in Biological Network...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Teji, Binon Roy, Swarup Guzzi, Pietro Hiram Bhandari, Dinabandhu Lab Department of Computer Applications Gangtok India University of Catanzaro School of Computer Science and Biomedical Engineering Italy Heritage Institute of Technology Department of Computer Science and Engineering Kolkata India
Biological networks are essential for understanding the complex cellular mechanisms of living organisms. Simulating biological networks allows researchers to model and understand complex cellular processes without the... 详细信息
来源: 评论
A verifiable multi-secret image sharing scheme based on DNA encryption
收藏 引用
Multimedia Tools and applications 2025年 第4期84卷 1967-1983页
作者: Chattopadhyay, Arup Kumar Saha, Sanchita Nag, Amitava Singh, Jyoti Prakash Department of Computer Science and Engineering Central Institute of Technology Kokrajhar Kokrajhar India Department of Computer Science and Engineering National Institute of Technology Patna Bihar Patna India
A multi-secret image sharing (MSIS) scheme facilitates the secure distribution of multiple images among a group of participants. Several MSIS schemes have been proposed with a (n, n) structure that encodes secret... 详细信息
来源: 评论
Machine Learning Based Phishing Attacks Detection Using Multiple Datasets
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2023年 第5期17卷 71-83页
作者: Aljammal, Ashraf H. taamneh, Salah Qawasmeh, Ahmad Salameh, Hani Bani Department of Computer Science and Applications The Hashemite University Zarqa Jordan Department of Software Engineering The Hashemite University Zarqa Jordan
Nowadays, individuals and organizations are increasingly targeted by phishing attacks, so an accurate phishing detection system is required. Therefore, many phishing detection techniques have been proposed as well as ... 详细信息
来源: 评论
Apple Leaf Disease Detection Using Transfer Learning
收藏 引用
Annals of Data science 2025年 第1期12卷 213-222页
作者: Wani, Ozair Ahmad Zahoor, Umer Shah, Syed Zubair Ahmad Khan, Rijwan Department of Computer Science & Engineering Islamic University of Science and Technology Jammu & Kashmir Awantipora India Department of Computer Science and Engineering ABES Institute of Technology Uttar Pradesh Ghaziabad India
Automated detection of plant diseases is crucial as it simplifies the task of monitoring large farms and identifies diseases at their early stages to mitigate further plant degradation. Besides the decline in plant he... 详细信息
来源: 评论