咨询与建议

限定检索结果

文献类型

  • 199,881 篇 会议
  • 97,048 篇 期刊文献
  • 2,364 册 图书

馆藏范围

  • 299,293 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 178,127 篇 工学
    • 115,669 篇 计算机科学与技术...
    • 93,494 篇 软件工程
    • 44,755 篇 信息与通信工程
    • 27,301 篇 控制科学与工程
    • 24,931 篇 电子科学与技术(可...
    • 24,297 篇 电气工程
    • 19,322 篇 生物工程
    • 15,026 篇 生物医学工程(可授...
    • 14,613 篇 光学工程
    • 12,927 篇 机械工程
    • 11,036 篇 化学工程与技术
    • 10,524 篇 仪器科学与技术
    • 9,569 篇 动力工程及工程热...
    • 8,790 篇 材料科学与工程(可...
    • 6,426 篇 网络空间安全
    • 6,369 篇 安全科学与工程
    • 5,985 篇 交通运输工程
  • 101,897 篇 理学
    • 49,295 篇 数学
    • 35,462 篇 物理学
    • 21,978 篇 生物学
    • 15,760 篇 统计学(可授理学、...
    • 11,436 篇 化学
    • 11,144 篇 系统科学
  • 45,676 篇 管理学
    • 28,106 篇 管理科学与工程(可...
    • 19,334 篇 图书情报与档案管...
    • 12,821 篇 工商管理
  • 14,592 篇 医学
    • 12,235 篇 临床医学
    • 10,792 篇 基础医学(可授医学...
    • 6,772 篇 药学(可授医学、理...
  • 7,958 篇 法学
    • 6,420 篇 社会学
  • 5,108 篇 经济学
  • 4,064 篇 农学
  • 3,225 篇 教育学
  • 1,415 篇 文学
  • 759 篇 军事学
  • 443 篇 艺术学
  • 50 篇 哲学
  • 31 篇 历史学

主题

  • 9,637 篇 computer science
  • 6,871 篇 accuracy
  • 6,647 篇 feature extracti...
  • 5,842 篇 deep learning
  • 5,748 篇 computational mo...
  • 5,246 篇 machine learning
  • 5,141 篇 training
  • 4,098 篇 data mining
  • 3,844 篇 support vector m...
  • 3,622 篇 optimization
  • 3,453 篇 wireless sensor ...
  • 3,439 篇 predictive model...
  • 3,382 篇 internet of thin...
  • 3,072 篇 artificial intel...
  • 3,046 篇 real-time system...
  • 3,011 篇 neural networks
  • 2,996 篇 convolutional ne...
  • 2,873 篇 bandwidth
  • 2,860 篇 algorithm design...
  • 2,858 篇 protocols

机构

  • 1,678 篇 department of co...
  • 1,345 篇 department of co...
  • 1,140 篇 university of ch...
  • 1,050 篇 physikalisches i...
  • 1,039 篇 cavendish labora...
  • 971 篇 department of ph...
  • 874 篇 infn laboratori ...
  • 860 篇 oliver lodge lab...
  • 813 篇 department of el...
  • 803 篇 department of el...
  • 791 篇 infn sezione di ...
  • 705 篇 school of comput...
  • 624 篇 department of el...
  • 617 篇 infn sezione di ...
  • 613 篇 department of co...
  • 545 篇 chitkara univers...
  • 535 篇 nikhef national ...
  • 517 篇 infn sezione di ...
  • 481 篇 department of co...
  • 481 篇 institute of hig...

作者

  • 248 篇 j. wang
  • 242 篇 barter w.
  • 235 篇 s. chen
  • 234 篇 niyato dusit
  • 224 篇 a. gomes
  • 213 篇 bellee v.
  • 212 篇 blake t.
  • 209 篇 bowcock t.j.v.
  • 209 篇 y. zhang
  • 203 篇 borsato m.
  • 203 篇 betancourt c.
  • 202 篇 c. alexa
  • 201 篇 beiter a.
  • 199 篇 j. m. izen
  • 199 篇 brundu d.
  • 194 篇 amato s.
  • 187 篇 c. amelung
  • 185 篇 g. bella
  • 185 篇 j. strandberg
  • 185 篇 d. calvet

语言

  • 285,243 篇 英文
  • 9,477 篇 其他
  • 4,380 篇 中文
  • 354 篇 日文
  • 52 篇 朝鲜文
  • 37 篇 德文
  • 33 篇 法文
  • 21 篇 斯洛文尼亚文
  • 9 篇 荷兰文
  • 7 篇 俄文
  • 5 篇 土耳其文
  • 3 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science and Engineering and Information Technology"
299293 条 记 录,以下是61-70 订阅
A Generative Model-Based Network Framework for Ecological Data Reconstruction
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 929-948页
作者: Shuqiao Liu Zhao Zhang Hongyan Zhou Xuebo Chen School of Electronic and Information Engineering University of Science and Technology LiaoningAnshan114051China School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan114051China
This study examines the effectiveness of artificial intelligence techniques in generating high-quality environmental data for species introductory site selection *** Strengths,Weaknesses,Opportunities,Threats(SWOT)ana... 详细信息
来源: 评论
Local Search-Based Anytime Algorithms for Continuous Distributed Constraint Optimization Problems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 288-290页
作者: Xin Liao Khoi Hoang Xin Luo the College of Computer and Information Science Southwest University the Department of Computer Science and Engineering Washington University in St.Louis IEEE
Dear Editor,The distributed constraint optimization problems(DCOPs) [1]-[3]provide an efficient model for solving the cooperative problems of multi-agent systems, which has been successfully applied to model the real-...
来源: 评论
A Software Defect Prediction Method Using a Multivariate Heterogeneous Hybrid Deep Learning Algorithm
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3251-3279页
作者: Qi Fei Haojun Hu Guisheng Yin Zhian Sun College of Computer Science and Technology Harbin Engineering UniversityHarbin150001China Information Technology Research Department Jiangsu Automation Research InstituteLianyungang222062China School of Computer Science and Technology Harbin Institute of TechnologyShenzhen518055China
Software defect prediction plays a critical role in software development and quality assurance processes. Effective defect prediction enables testers to accurately prioritize testing efforts and enhance defect detecti... 详细信息
来源: 评论
Design of a Multifactor Unidentified Remote End User Authentication Mechanism for IoT Network
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第10期49卷 191-204页
作者: Sharma, Neha Dhiman, Pankaj Department of Computer Science and Engineering Jaypee University of Information Technology Waknaghat H. P. Solan India
The rapid proliferation of Internet of Things (IoT) devices, coupled with the rollout of advanced 5G networks, has generated significant concerns regarding security breaches. These concerns stem from the expanded atta... 详细信息
来源: 评论
Classification and study of music genres with multimodal Spectro-Lyrical Embeddings for Music (SLEM)
收藏 引用
Multimedia Tools and Applications 2025年 第7期84卷 3701-3721页
作者: Mehra, Ashman Mehra, Aryan Narang, Pratik Department of Computer Science and Information Systems Birla Institute of Technology and Science Goa Pilani India Computer Science Department Carnegie Mellon University PittsburghPA United States Department of Computer Science and Information Systems Birla Institute of Technology and Science Pilani Rajasthan Pilani India
The essence of music is inherently multi-modal – with audio and lyrics going hand in hand. However, there is very less research done to study the intricacies of the multi-modal nature of music, and its relation with ... 详细信息
来源: 评论
FLAG: frequency-based local and global network for face forgery detection
收藏 引用
Multimedia Tools and Applications 2025年 第2期84卷 647-663页
作者: Zhou, Kai Sun, Guanglu Wang, Jun Wang, Jiahui Yu, Linsen School of Computer Science and Technology Harbin University of Science and Technology Harbin150080 China Department of Information Engineering and Mathematics University of Siena Siena53100 Italy
Deepfake detection aims to mitigate the threat of manipulated content by identifying and exposing forgeries. However, previous methods primarily tend to perform poorly when confronted with cross-dataset scenarios. To ... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Parkinson’s disease Severity Detection Based on Fused features with tuned Residual Deep Convolutional Neural Network
收藏 引用
Multimedia Tools and Applications 2025年 第14期84卷 13111-13131页
作者: Vishwakarma, Gagan Nandanwar, Amit Kumar Thakur, Ghanshyam Singh Computer Science & Engineering Indian Institute of Information Technology MP Bhopal India Computer Science & Engineering Maulana Azad National Institute of Technology MP Bhopal India Department of Computer Applications Maulana Azad National Institute of Technology MP Bhopal India
Parkinson's disease (PD) diagnosis involves the assessment of a variety of motor and non-motor symptoms. To accurately diagnose PD, it is necessary to differentiate its symptoms from those of other conditions. Dur... 详细信息
来源: 评论
A Latency-Aware and Fault-Tolerant Framework for Resource Scheduling and Data Management in Fog-Enabled Smart City Transportation Systems
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 1377-1399页
作者: Ibrar Afzal Noor ul Amin Zulfiqar Ahmad Abdulmohsen Algarni Department of Computer Science and Information Technology Hazara UniversityMansehra21300Pakistan Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia
Thedeployment of the Internet of Things(IoT)with smart sensors has facilitated the emergence of fog computing as an important technology for delivering services to smart environments such as campuses,smart cities,and ... 详细信息
来源: 评论
Application of adaptive guard channel reservation under hard handoff constraint in wireless cellular network
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第2期28卷 170-185页
作者: Sahu, Promod Kumar Pati, Hemanta Kumar Pradha, Sateesh Kumar Department of Computer Science and Application Utkal University Vani Vihar Odisha Bhubaneswar India Department of Computer Science and Engineering International Institute of Information Technology Bhubaneswar Odisha Bhubaneswar India
Voice is the king of communication in wireless cellular network (WCN). Again, WCNs provide two types of calls, i.e., new call (NC) and handoff call (HC). Generally, HCs have higher priority than NCs because call dropp... 详细信息
来源: 评论