咨询与建议

限定检索结果

文献类型

  • 280,398 篇 会议
  • 114,271 篇 期刊文献
  • 2,848 册 图书

馆藏范围

  • 397,516 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 229,996 篇 工学
    • 152,622 篇 计算机科学与技术...
    • 123,507 篇 软件工程
    • 55,336 篇 信息与通信工程
    • 36,250 篇 控制科学与工程
    • 32,512 篇 电气工程
    • 31,269 篇 电子科学与技术(可...
    • 26,475 篇 生物工程
    • 20,862 篇 生物医学工程(可授...
    • 17,934 篇 光学工程
    • 15,620 篇 机械工程
    • 13,264 篇 化学工程与技术
    • 12,390 篇 仪器科学与技术
    • 12,371 篇 动力工程及工程热...
    • 11,645 篇 材料科学与工程(可...
    • 8,485 篇 安全科学与工程
    • 7,959 篇 网络空间安全
  • 129,602 篇 理学
    • 64,641 篇 数学
    • 42,482 篇 物理学
    • 29,950 篇 生物学
    • 21,096 篇 统计学(可授理学、...
    • 15,138 篇 系统科学
    • 14,189 篇 化学
  • 57,159 篇 管理学
    • 34,404 篇 管理科学与工程(可...
    • 25,020 篇 图书情报与档案管...
    • 17,028 篇 工商管理
  • 19,690 篇 医学
    • 16,530 篇 临床医学
    • 14,882 篇 基础医学(可授医学...
    • 9,345 篇 药学(可授医学、理...
    • 7,956 篇 公共卫生与预防医...
  • 10,782 篇 法学
    • 8,823 篇 社会学
  • 6,584 篇 经济学
  • 5,219 篇 农学
  • 4,264 篇 教育学
  • 1,889 篇 文学
  • 898 篇 军事学
  • 518 篇 艺术学
  • 77 篇 哲学
  • 46 篇 历史学

主题

  • 20,126 篇 computer science
  • 9,527 篇 accuracy
  • 8,990 篇 computational mo...
  • 8,220 篇 feature extracti...
  • 7,858 篇 deep learning
  • 7,422 篇 machine learning
  • 6,711 篇 training
  • 5,410 篇 data mining
  • 5,276 篇 support vector m...
  • 5,242 篇 computer archite...
  • 5,101 篇 predictive model...
  • 4,977 篇 wireless sensor ...
  • 4,754 篇 costs
  • 4,644 篇 optimization
  • 4,611 篇 application soft...
  • 4,588 篇 bandwidth
  • 4,519 篇 real-time system...
  • 4,460 篇 testing
  • 4,445 篇 protocols
  • 4,432 篇 algorithm design...

机构

  • 1,726 篇 department of co...
  • 1,381 篇 department of el...
  • 1,377 篇 department of co...
  • 1,180 篇 department of el...
  • 1,048 篇 cavendish labora...
  • 973 篇 department of ph...
  • 895 篇 department of co...
  • 846 篇 physikalisches i...
  • 838 篇 oliver lodge lab...
  • 821 篇 department of el...
  • 745 篇 university of ch...
  • 644 篇 department of co...
  • 550 篇 department of co...
  • 537 篇 chitkara univers...
  • 529 篇 infn sezione di ...
  • 515 篇 infn laboratori ...
  • 508 篇 infn sezione di ...
  • 502 篇 department of co...
  • 497 篇 horia hulubei na...
  • 488 篇 infn sezione di ...

作者

  • 255 篇 barter w.
  • 244 篇 s. chen
  • 243 篇 j. wang
  • 228 篇 blake t.
  • 227 篇 a. gomes
  • 223 篇 bellee v.
  • 223 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 216 篇 amato s.
  • 215 篇 brundu d.
  • 215 篇 borsato m.
  • 212 篇 c. alexa
  • 212 篇 boettcher t.
  • 209 篇 beiter a.
  • 207 篇 j. m. izen
  • 206 篇 bencivenni g.
  • 197 篇 bay a.
  • 193 篇 g. bella
  • 192 篇 c. amelung
  • 191 篇 j. strandberg

语言

  • 351,129 篇 英文
  • 42,757 篇 其他
  • 3,868 篇 中文
  • 220 篇 日文
  • 71 篇 德文
  • 50 篇 法文
  • 43 篇 斯洛文尼亚文
  • 34 篇 朝鲜文
  • 13 篇 西班牙文
  • 11 篇 阿拉伯文
  • 9 篇 俄文
  • 5 篇 意大利文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 3 篇 捷克文
  • 3 篇 葡萄牙文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering and Computer Applications"
397517 条 记 录,以下是341-350 订阅
排序:
Monitoring COVID-19 environment: a real-time facial mask detection using YOLO models
收藏 引用
Research on Biomedical engineering 2025年 第1期41卷 1-18页
作者: Pandiyan, P. Thangaraj, Rajasekaran V, Balasubramanian V. K, Manavalasundaram S, Balakrishnan Department of Electrical and Electronics Engineering KPR Institute of Engineering and Technology Coimbatore India Department of Computer Science and Engineering Nandha Engineering College Erode India Department of Information Technology Velalar College of Engineering and Technology Erode India Department of Computer Science and Engineering Aarupadai Veedu Institute of Technology Chennai India Department of Computer Science and Engineering Sri Ramakrishna Institute of Technology Coimbatore India
Purpose: The rapid spread of COVID-19 has resulted in significant harm and impacted tens of millions of people globally. In order to prevent the transmission of the virus, individuals often wear masks as a protective ... 详细信息
来源: 评论
Deep Learning Model-Based Region Measurement Analysis for Breast Cancer Classification  1
Deep Learning Model-Based Region Measurement Analysis for Br...
收藏 引用
1st International Conference for Women in Computing, InCoWoCo 2024
作者: Meegada, Radhika Bhuyan, Hemanta Kumar Department of Computer Science Engineering Andhra Pradesh Guntur India Department of Information Technology and Computer Applications Andhra Pradesh Guntur India
The mortality of Breast cancer patients is issued based on lack of identification and treatment, and mammography is a useful tool for early screening. Deep learning-based computer-aided diagnosis (CAD) of mammography ... 详细信息
来源: 评论
Categorizing methods for integrating machine learning with executable specifications
收藏 引用
science China(Information sciences) 2024年 第1期67卷 5-19页
作者: David HAREL Raz YERUSHALMI Assaf MARRON Achiya ELYASAF Department of Computer Science and Applied Mathematics Weizmann Institute of Science Department of Software and Information Systems Engineering Ben-Gurion University of the Negev
Deep learning(DL),which includes deep reinforcement learning(DRL),holds great promise for carrying out real-world tasks that human minds seem to cope with quite *** promise is already delivering extremely impressive r... 详细信息
来源: 评论
A Color Image Encryption Scheme Based on Singular Values and Chaos
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 965-999页
作者: Adnan Malik Muhammad Ali Faisal S.Alsubaei Nisar Ahmed Harish Kumar Electrical Engineering Department University of Engineering and TechnologyLahore54000Pakistan Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21959Saudi Arabia Computer Engineering Department University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ... 详细信息
来源: 评论
A Novel Enhanced Approach for Security and Privacy Preserving in IoT Devices with Federal Learning Technique
收藏 引用
SN computer science 2024年 第6期5卷 1-17页
作者: Moeed, Syed Abdul Karnati, Ramesh Ashmitha, G. Mohammad, Gouse Baig Mohanty, Sachi Nandan Department of Computer Science and Engineering Kakatiya Institute of Technology and Science Department of Computer Science and Engineering Vardhaman College of Engineering School of Computer Science & amp Engineering (SCOPE) VIT-AP University
The Internet of Things (IoT) has revolutionized our lives, but it has also introduced significant security and privacy challenges. The vast amount of data collected by these devices, often containing sensitive informa... 详细信息
来源: 评论
Modified Bat Algorithm: a newly proposed approach for solving complex and real-world problems
收藏 引用
Soft Computing 2024年 第13-14期28卷 7983-7998页
作者: Umar, Shahla U. Rashid, Tarik A. Ahmed, Aram M. Hassan, Bryar A. Baker, Mohammed Rashad Department of Software College of Computer Science and Information Technology University of Kirkuk Kirkuk Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler KRI Erbil Iraq Department of Computer Science College of Science Charmo University Sulaimani Chamchamal46023 Iraq
Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of ... 详细信息
来源: 评论
An Efficient Encryption and Compression of Sensed IoT Medical Images Using Auto-Encoder
收藏 引用
computer Modeling in engineering & sciences 2023年 第2期134卷 909-926页
作者: Passent El-kafrawy Maie Aboghazalah Abdelmoty M.Ahmed Hanaa Torkey Ayman El-Sayed School of Information Technology and Computer Science Nile UniversityGiza12677Egypt Math and Computer Science Department Faculty of ScienceMenoufia UniversityMenoufia32511Egypt Department of Computer Engineering College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia Computer Science and Engineering Department Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common *** ofmedical images is very important to secure patient *** these images consumes a lot of time onedge computing;theref... 详细信息
来源: 评论
A comprehensive systematic review of machine learning in the retail industry: classifications, limitations, opportunities, and challenges
收藏 引用
Neural Computing and applications 2024年 第4期37卷 2035-2070页
作者: Hassan, Dler O. Hassan, Bryar A. Department of Computer Science College of Science Charmo University Kurdistan Region Chamchamal Sulaimani46023 Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler Erbil Iraq
Machine learning has profoundly transformed various industries, notably revolutionizing the retail sector through diverse applications that significantly enhance operational efficiency and performance. This comprehens... 详细信息
来源: 评论
Comparative Analysis of RL-Based Resource Allocation Methods for Optimization in 5G MMWave Network  5th
Comparative Analysis of RL-Based Resource Allocation Methods...
收藏 引用
5th EAI International Conference on Cognitive Computing and Cyber Physical Systems, IC4S 2024
作者: Shilpa, V. Ranjan, Rajeev School of Computer Science and Engineering REVA University Bangalore India School of Computer Science and Applications REVA University Bangalore India
In this study, resource allocation techniques based on reinforcement learning (RL) for 5G millimeter wave (mmWave) networks are compared and analyzed. The high bandwidth and large available spectrum in mmWave networks... 详细信息
来源: 评论
Transformer-Based Person Re-Identification: A Comprehensive Review
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第7期9卷 1-19页
作者: Sarker, Prodip Kumar Zhao, Qingjie Uddin, Md. Kamal School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science and Telecommunication Engineering Noakhali Science and Technology University Bangladesh
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc... 详细信息
来源: 评论