咨询与建议

限定检索结果

文献类型

  • 367,230 篇 会议
  • 162,359 篇 期刊文献
  • 3,670 册 图书
  • 1 篇 学位论文

馆藏范围

  • 533,259 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 312,629 篇 工学
    • 204,808 篇 计算机科学与技术...
    • 164,874 篇 软件工程
    • 73,715 篇 信息与通信工程
    • 48,006 篇 控制科学与工程
    • 41,977 篇 电子科学与技术(可...
    • 41,808 篇 电气工程
    • 33,751 篇 生物工程
    • 26,248 篇 生物医学工程(可授...
    • 24,551 篇 光学工程
    • 21,703 篇 机械工程
    • 18,770 篇 化学工程与技术
    • 17,291 篇 仪器科学与技术
    • 15,905 篇 动力工程及工程热...
    • 15,461 篇 材料科学与工程(可...
    • 10,607 篇 安全科学与工程
    • 9,827 篇 交通运输工程
    • 9,745 篇 网络空间安全
  • 177,300 篇 理学
    • 87,661 篇 数学
    • 59,846 篇 物理学
    • 38,277 篇 生物学
    • 27,916 篇 统计学(可授理学、...
    • 19,874 篇 系统科学
    • 19,721 篇 化学
  • 78,055 篇 管理学
    • 46,564 篇 管理科学与工程(可...
    • 34,540 篇 图书情报与档案管...
    • 22,492 篇 工商管理
  • 24,920 篇 医学
    • 20,845 篇 临床医学
    • 18,453 篇 基础医学(可授医学...
    • 11,535 篇 药学(可授医学、理...
  • 13,935 篇 法学
    • 11,418 篇 社会学
  • 8,729 篇 经济学
  • 7,003 篇 农学
  • 6,078 篇 教育学
  • 2,505 篇 文学
  • 1,252 篇 军事学
  • 766 篇 艺术学
  • 148 篇 哲学
  • 87 篇 历史学

主题

  • 23,944 篇 computer science
  • 11,166 篇 computational mo...
  • 11,090 篇 accuracy
  • 10,757 篇 feature extracti...
  • 9,346 篇 deep learning
  • 9,000 篇 machine learning
  • 8,594 篇 training
  • 7,395 篇 data mining
  • 6,379 篇 computer archite...
  • 6,352 篇 support vector m...
  • 6,188 篇 predictive model...
  • 6,130 篇 wireless sensor ...
  • 5,997 篇 optimization
  • 5,930 篇 costs
  • 5,885 篇 algorithm design...
  • 5,770 篇 bandwidth
  • 5,688 篇 protocols
  • 5,619 篇 application soft...
  • 5,613 篇 neural networks
  • 5,542 篇 testing

机构

  • 1,679 篇 department of co...
  • 1,673 篇 department of co...
  • 1,321 篇 department of co...
  • 1,295 篇 department of el...
  • 1,222 篇 university of ch...
  • 1,117 篇 department of el...
  • 1,015 篇 physikalisches i...
  • 994 篇 cavendish labora...
  • 968 篇 department of ph...
  • 899 篇 institute of inf...
  • 864 篇 department of el...
  • 834 篇 infn laboratori ...
  • 831 篇 oliver lodge lab...
  • 796 篇 department of el...
  • 761 篇 infn sezione di ...
  • 699 篇 school of comput...
  • 658 篇 department of co...
  • 576 篇 department of co...
  • 575 篇 infn sezione di ...
  • 524 篇 school of comput...

作者

  • 314 篇 niyato dusit
  • 259 篇 j. wang
  • 238 篇 barter w.
  • 219 篇 s. chen
  • 215 篇 yang yang
  • 214 篇 liu yang
  • 211 篇 bellee v.
  • 209 篇 bowcock t.j.v.
  • 209 篇 a. gomes
  • 208 篇 blake t.
  • 208 篇 y. zhang
  • 201 篇 borsato m.
  • 199 篇 beiter a.
  • 199 篇 brundu d.
  • 199 篇 betancourt c.
  • 196 篇 y. li
  • 186 篇 c. alexa
  • 186 篇 c. amelung
  • 185 篇 j. m. izen
  • 184 篇 g. bella

语言

  • 501,042 篇 英文
  • 25,435 篇 其他
  • 6,545 篇 中文
  • 511 篇 日文
  • 84 篇 德文
  • 71 篇 朝鲜文
  • 52 篇 法文
  • 35 篇 斯洛文尼亚文
  • 14 篇 西班牙文
  • 11 篇 俄文
  • 6 篇 土耳其文
  • 5 篇 阿拉伯文
  • 5 篇 意大利文
  • 5 篇 荷兰文
  • 5 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering and Information Science"
533260 条 记 录,以下是401-410 订阅
排序:
Implementation on the Price Prediction and Analysis of Chicken Breast with Deep Learning Techniques  14th
Implementation on the Price Prediction and Analysis of C...
收藏 引用
14th International Conference on Frontier Computing, FC 2024
作者: Liu, Chao-Hung Chan, Yu-Wei Lin, Po-Yen Chang, Chih-Hung Yang, Chao-Tung Department of Computer Science and Information Management Providence University Taichung Taiwan Department of Computer Science and Information Engineering Providence University Taichung Taiwan Department of Computer Science and Communication Engineering Providence University Taichung Taiwan Department of Computer Science Tunghai University Taichung City Taiwan
The Taiwanese livestock industry grapples with escalating costs and challenges such as labor shortages, environmental changes, pollution, and disease threats. Trade liberalization and cheaper imports further highlight... 详细信息
来源: 评论
A Survey of Edge Caching:Key Issues and Challenges
收藏 引用
Tsinghua science and Technology 2024年 第3期29卷 818-842页
作者: Hanwen Li Mingtao Sun Fan Xia Xiaolong Xu Muhammad Bilal School of Computer Science Nanjing University of Information Science and TechnologyNanjing 210044China Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyWeifang 262700China Reading Academy Nanjing University of Information Science and TechnologyNanjing 210044China School of Software Nanjing University of Information Science and TechnologyNanjing 210044China Department of Computer Engineering Hankuk University of Foreign StudiesYongin-si 17035Republic of Korea
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw... 详细信息
来源: 评论
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3867-3889页
作者: Dahyeon Kim Namgi Kim Junho Ahn Computer Information Technology Korea National University of TransportationChungju27469Korea Department of AI Computer Science and Engineering Kyonggi UniversitySuwon16227Korea
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world ***... 详细信息
来源: 评论
A multi-fused convolutional neural network model for fruit image classification
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 416-424页
作者: Sinha, Bam Bahadur Dhanalakshmi, R. Computer Science and Engineering National Institute of Technology Sikkim 737139 India Computer Science and Engineering Indian Institute of Information Technology Tiruchirappalli Tamil Nadu 620012 India
Fruit categorization presents a significant challenge due to the diverse range of fruit types and their similarities in color, shape, size, and structure. This challenge is addressed in this research by proposing a mu... 详细信息
来源: 评论
Predicting Age and Gender in Author Profiling: A Multi-Feature Exploration
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3333-3353页
作者: Aiman Muhammad Arshad Bilal Khan Sadique Ahmad Muhammad Asim Department of Computer Science City University of Science and Information TechnologyPeshawar25000Pakistan EIAS:Data Science and Blockchain Laboratory College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia School of Computer Science and Technology Guangdong University of TechnologyGuangzhou510006China
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g.... 详细信息
来源: 评论
Intrusion Detection System with Customized Machine Learning Techniques for NSL-KDD Dataset
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 4025-4054页
作者: Mohammed Zakariah Salman A.AlQahtani Abdulaziz M.Alawwad Abdullilah A.Alotaibi Department of Computer Science College of Computer and Information ScienceKing Saud UniversityRiyadh11495Saudi Arabia New Emerging Technologies and 5G Network and Beyond Research Chair Department of Computer EngineeringCollege of Computer and Information SciencesKing Saud UniversityRiyadh11495Saudi Arabia Department of Computer Engineering College of Computer and Information ScienceKing Saud UniversityRiyadh11495Saudi Arabia
Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based *** consuming time and resources,intrusive traffic hampers the efficient operation of network *** effective st... 详细信息
来源: 评论
Optimizing Service Stipulation Uncertainty with Deep Reinforcement Learning for Internet Vehicle Systems
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5705-5721页
作者: Zulqar Nain B.Shahana Shehzad Ashraf Chaudhry P.Viswanathan M.S.Mekala Sung Won Kim Department of Information and Communication Engineering Yeungnam UniversityGyeongsan-siKorea Department of Computer Science and Engineering KLEFIndia Department of Computer Engineering Faculty of Engineering and ArchitectureIstanbul Gelisim UniversityIstanbul34310Turkey School of Computer Science and Engineering VIT UniversityVelloreIndia
Fog computing brings computational services near the network edge to meet the latency constraints of cyber-physical System(CPS)*** devices enable limited computational capacity and energy availability that hamper end ... 详细信息
来源: 评论
Preventing 51% Attack by Using Consecutive Block Limits in Bitcoin
收藏 引用
IEEE Access 2024年 12卷 77852-77869页
作者: Mahmood Babur, Sohail Ur Rehman Khan, Shafiq Yang, Jing Chen, Yen-Lin Soon Ku, Chin Yee Por, Lip Government Murray College Department of Information Technology Sialkot51010 Pakistan Capital University of Science and Technology Department of Computer Science Islamabad44730 Pakistan Universiti Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
In permissionless blockchain systems, Proof of Work (PoW) is utilized to address the issues of double-spending and transaction starvation. When an attacker acquires more than 50% of the hash power of the entire networ... 详细信息
来源: 评论
HViTML: Hybrid vision transformer with machine learning-based classification model for glaucomatous eye
收藏 引用
Multimedia Tools and Applications 2025年 1-24页
作者: Singh, Piyush Bhushan Singh, Pawan Dev, Harsh Batra, Devanshu Chaurasia, Brijesh Kumar Department of Information Technology Pranveer Singh Institute of Technology Uttar Pradesh Kanpur India Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Uttar Pradesh Lucknow India Department of Computer Science and Engineering Babu Banarasi Das University Uttar Pradesh Lucknow India Department of Computer Science and Engineering Pranveer Singh Institute of Technology Uttar Pradesh Kanpur India
Glaucoma is currently one of the most significant causes of permanent blindness. Fundus imaging is the most popular glaucoma screening method because of the compromises it has to make in terms of portability, size, an... 详细信息
来源: 评论
An Improvement of A Mobile RFID Authentication Protocol Based on Self-assembling Cross-bit Algorithm  4
An Improvement of A Mobile RFID Authentication Protocol Base...
收藏 引用
4th International Conference on Artificial Intelligence, Robotics, and Communication, ICAIRC 2024
作者: Hwang, Min-Shiang Fatima, Kanza Yang, Cheng-Ying Wu, Chia-Chun Asia University Department of Computer Science & Information Engineering Taichung Taiwan University of Taipei Department of Computer Science Taipei Taiwan National Quemoy University Department of Computer Science & Information Engineering Kinmen Taiwan
Recently, Xu et al. proposed an ultra-lightweight mobile wireless two-way authentication protocol MAP-SKBO based on shared private keys and bit operations. This MAPSKBO is based on a bit operation scheme, using ultra-... 详细信息
来源: 评论