咨询与建议

限定检索结果

文献类型

  • 115,134 篇 会议
  • 52,963 篇 期刊文献
  • 1,516 册 图书

馆藏范围

  • 169,613 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 99,827 篇 工学
    • 66,618 篇 计算机科学与技术...
    • 53,605 篇 软件工程
    • 26,059 篇 信息与通信工程
    • 16,987 篇 控制科学与工程
    • 14,884 篇 电气工程
    • 14,014 篇 电子科学与技术(可...
    • 11,851 篇 生物工程
    • 9,458 篇 生物医学工程(可授...
    • 8,433 篇 光学工程
    • 7,131 篇 机械工程
    • 6,049 篇 化学工程与技术
    • 5,988 篇 动力工程及工程热...
    • 5,718 篇 仪器科学与技术
    • 5,044 篇 材料科学与工程(可...
    • 4,862 篇 网络空间安全
    • 4,321 篇 安全科学与工程
  • 57,204 篇 理学
    • 27,271 篇 数学
    • 19,605 篇 物理学
    • 13,467 篇 生物学
    • 8,915 篇 统计学(可授理学、...
    • 6,568 篇 化学
    • 6,327 篇 系统科学
  • 26,388 篇 管理学
    • 16,508 篇 管理科学与工程(可...
    • 10,980 篇 图书情报与档案管...
    • 7,630 篇 工商管理
  • 9,596 篇 医学
    • 7,868 篇 临床医学
    • 7,086 篇 基础医学(可授医学...
    • 4,373 篇 药学(可授医学、理...
    • 4,256 篇 公共卫生与预防医...
  • 5,005 篇 法学
    • 4,087 篇 社会学
  • 3,055 篇 经济学
  • 2,447 篇 农学
  • 1,630 篇 教育学
  • 905 篇 文学
  • 363 篇 军事学
  • 226 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,206 篇 computer science
  • 5,200 篇 accuracy
  • 4,480 篇 deep learning
  • 4,051 篇 feature extracti...
  • 3,734 篇 machine learning
  • 3,612 篇 computational mo...
  • 3,167 篇 training
  • 2,564 篇 support vector m...
  • 2,478 篇 convolutional ne...
  • 2,473 篇 real-time system...
  • 2,439 篇 internet of thin...
  • 2,365 篇 predictive model...
  • 2,230 篇 optimization
  • 2,065 篇 artificial intel...
  • 1,903 篇 data mining
  • 1,903 篇 wireless sensor ...
  • 1,719 篇 neural networks
  • 1,660 篇 security
  • 1,626 篇 computer archite...
  • 1,609 篇 data models

机构

  • 1,085 篇 cavendish labora...
  • 1,004 篇 department of ph...
  • 956 篇 physikalisches i...
  • 933 篇 oliver lodge lab...
  • 912 篇 department of co...
  • 834 篇 department of el...
  • 739 篇 university of ch...
  • 692 篇 department of el...
  • 682 篇 department of co...
  • 600 篇 chitkara univers...
  • 594 篇 infn sezione di ...
  • 589 篇 infn laboratori ...
  • 569 篇 infn sezione di ...
  • 550 篇 infn sezione di ...
  • 538 篇 school of physic...
  • 534 篇 horia hulubei na...
  • 533 篇 fakultät physik ...
  • 517 篇 department of ph...
  • 516 篇 school of physic...
  • 513 篇 h.h. wills physi...

作者

  • 260 篇 barter w.
  • 252 篇 a. gomes
  • 242 篇 s. chen
  • 241 篇 c. alexa
  • 238 篇 j. m. izen
  • 237 篇 j. wang
  • 233 篇 blake t.
  • 231 篇 c. amelung
  • 230 篇 g. bella
  • 230 篇 j. strandberg
  • 229 篇 d. calvet
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 beiter a.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 213 篇 bencivenni g.

语言

  • 138,256 篇 英文
  • 29,632 篇 其他
  • 2,038 篇 中文
  • 129 篇 日文
  • 37 篇 斯洛文尼亚文
  • 32 篇 德文
  • 32 篇 法文
  • 20 篇 朝鲜文
  • 9 篇 俄文
  • 7 篇 阿拉伯文
  • 3 篇 捷克文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 波兰文
检索条件"机构=Department of Computer Science and Engineering and Infotmation Technology"
169613 条 记 录,以下是4371-4380 订阅
排序:
Seawater Channel Frequency for Data Transmission Through Water  6
Seawater Channel Frequency for Data Transmission Through Wat...
收藏 引用
6th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Sheeba, Adlin Swetha, P. Vetri Selvi, S. Subasini, C.A. Department of Computer Science and Engineering St. Joseph’s Institute of Technology Chennai India
Underwater data transmission forms a feasible method for underwater communication. However, laboratory experiments significantly differ from natural aquatic settings due to physical size constraints. During the last f... 详细信息
来源: 评论
A Comprehensive and Systematic Analysis of One-Way Hashing and Its Advancements  3
A Comprehensive and Systematic Analysis of One-Way Hashing a...
收藏 引用
3rd International Conference on Intelligent Systems, Advanced Computing, and Communication, ISACC 2025
作者: Chakraborty, Abhilash Biswas, Anupam National Institute of Technology Silchar Department of Computer Science and Engineering Assam Silchar788010 India
Cryptographic hash functions are fundamental to secure digital interactions. This paper surveys one-way hashing, covering theoretical foundations, historical developments, cryptanalytic challenges, and widely trusted ... 详细信息
来源: 评论
Classification of imbalanced datasets utilizing the synthetic minority oversampling method in conjunction with several machine learning techniques
收藏 引用
Iran Journal of computer science 2024年 第1期8卷 51-68页
作者: Datta, Shrayasi Ghosh, Chinmoy Choudhury, J. Pal Department of Information Technology Jalpaiguri Government Engineering College West Bengal Jalpaiguri 735102 India Department of Computer Science & amp Engineering Jalpaiguri Government Engineering College West Bengal Jalpaiguri 735102 India Department of Computer Science & amp Engineering Narula Institute of Technology West Bengal Agarpara 700109 India
Pharmacological datasets like Yeast and Escherichia coli (E. coli) have a massive impact on the healthcare industry for the production of human drugs. Yeast is well recognized as a significant constituent in the produ... 详细信息
来源: 评论
Enhanced Ransomware Detection using a Hybrid Quantum-Classical Convolutional Neural Network with Boosted Sooty Tern Optimization  4
Enhanced Ransomware Detection using a Hybrid Quantum-Classic...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Chaithanya, B.N. Patil, Renuka R. Gitam School of Technology Gitam University Department of Computer Science and Engineering Nagadenahalli Bengaluru India
Ransomware attacks threaten organizations by encrypting files or locking systems and keeping them inaccessible unless a ransom is paid. Early detection of ransomware attacks helps organizations avoid financial losses,... 详细信息
来源: 评论
A New Method for Image Tamper Detection Based on an Improved U-Net
收藏 引用
Intelligent Automation & Soft Computing 2023年 第9期37卷 2883-2895页
作者: Jie Zhang Jianxun Zhang Bowen Li Jie Cao Yifan Guo Department of Computer Science and Engineering Chongqing University of TechnologyChongqing40005China
With the improvement of image editing technology,the threshold of image tampering technology decreases,which leads to a decrease in the authenticity of image *** has also driven research on image forgery detection ***... 详细信息
来源: 评论
Detection of Deceptive Hotel Reviews Through the Application of Machine Learning Techniques  2nd
Detection of Deceptive Hotel Reviews Through the Application...
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Hossain, Md Jakir Chowdhury, Md Tanvir Rahman, Habibur Hossain, Md Shohrab Shara, Shabrina Akter Choudhury, Tashfia Chowdhury, Maleha Israt Synthia, Tasnim Israk Talha, Abu Department of Computer Science and Engineering East West University Dhaka Bangladesh Department of Textile Engineering Ahsanullah University of Science and Technology Dhaka Bangladesh
In the contemporary digital landscape, online reviews play a pivotal role in shaping tourists’ decisions, leveraging the pervasive influence of the internet. However, discerning the authenticity of reviews has become... 详细信息
来源: 评论
Analysis and Impact of Electromagnetic Field Leakage in WPT on Central Nervous System: A Neural Network Approach  4
Analysis and Impact of Electromagnetic Field Leakage in WPT ...
收藏 引用
4th IEEE International Conference on Sustainable Energy and Future Electric Transportation, SEFET 2024
作者: Shukla, Garima Awasthi, Vanshaj Goswami, Prafull Singh, Sofia Amity School of Engineering and Technology Amity University Department of Computer Science and Engineering Maharashtra Mumbai India Indian Institute of Information and Technology Department of Computer Science and Engineering Sonipat India Amity School of Engineering and Technology Amity University Department of Artificial Intelligence Uttar Pradesh Noida India
The potential for wireless power transfer (WPT) technologies to transform the charging capabilities of a wide range of applications, from consumer electronics to medical devices has attracted a lot of attention. But u... 详细信息
来源: 评论
MCANet: Multimodal Caption Aware Training-Free Video Anomaly Detection via Large Language Model  27th
MCANet: Multimodal Caption Aware Training-Free Video Anomaly...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Dev, Prabhu Prasad Hazari, Raju Das, Pranesh Machine Learning Laboratory Department of Computer Science and Engineering National Institute of Technology Calicut India
Towards Video Anomaly Detection (VAD), existing methods require labor-intensive data collection and model retraining, making them costly and domain-specific. The proposed method, termed as Multi-modal Caption Aware Ne... 详细信息
来源: 评论
Detection and Prognosis of Pulmonary Tuberculosis Using ML Classifiers with Soft Computing  5
Detection and Prognosis of Pulmonary Tuberculosis Using ML C...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Bisht, Girish Singh Ganesh, D. Kumar, Santosh Tula's Institute Department of Computer Science and Engineering Dehradun India Department of Computer Science and Information Technology Bangalore India Noida Institute of Engineering and Technology Department of Internet of Things Uttar Pradesh Greater Noida India
Several intriguing research works on soft computing techniques have recently been presented and for the creation of a pulmonary TB diagnosis system, researchers continue to build an accurate and trustworthy intelligen... 详细信息
来源: 评论
Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1871-1886页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala NerusMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyahKuwait Department of Computer Science Sharif College of Engineering&TechnologyLahore54000Pakistan
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,includi... 详细信息
来源: 评论