咨询与建议

限定检索结果

文献类型

  • 290,169 篇 会议
  • 119,090 篇 期刊文献
  • 2,929 册 图书

馆藏范围

  • 412,187 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 239,154 篇 工学
    • 160,282 篇 计算机科学与技术...
    • 129,739 篇 软件工程
    • 57,351 篇 信息与通信工程
    • 37,793 篇 控制科学与工程
    • 32,886 篇 电气工程
    • 31,546 篇 电子科学与技术(可...
    • 27,456 篇 生物工程
    • 21,375 篇 生物医学工程(可授...
    • 18,592 篇 光学工程
    • 16,271 篇 机械工程
    • 13,611 篇 化学工程与技术
    • 12,741 篇 仪器科学与技术
    • 12,625 篇 动力工程及工程热...
    • 11,302 篇 材料科学与工程(可...
    • 8,772 篇 安全科学与工程
    • 8,165 篇 网络空间安全
  • 133,609 篇 理学
    • 66,788 篇 数学
    • 43,191 篇 物理学
    • 30,949 篇 生物学
    • 21,485 篇 统计学(可授理学、...
    • 15,559 篇 系统科学
    • 14,599 篇 化学
  • 59,873 篇 管理学
    • 36,074 篇 管理科学与工程(可...
    • 26,178 篇 图书情报与档案管...
    • 17,726 篇 工商管理
  • 20,138 篇 医学
    • 16,927 篇 临床医学
    • 15,169 篇 基础医学(可授医学...
    • 9,512 篇 药学(可授医学、理...
    • 8,056 篇 公共卫生与预防医...
  • 11,127 篇 法学
    • 9,092 篇 社会学
  • 6,819 篇 经济学
  • 5,306 篇 农学
  • 4,513 篇 教育学
  • 1,924 篇 文学
  • 925 篇 军事学
  • 554 篇 艺术学
  • 85 篇 哲学
  • 50 篇 历史学

主题

  • 20,570 篇 computer science
  • 9,472 篇 accuracy
  • 9,257 篇 computational mo...
  • 8,516 篇 feature extracti...
  • 7,989 篇 deep learning
  • 7,558 篇 machine learning
  • 7,029 篇 training
  • 5,594 篇 data mining
  • 5,417 篇 computer archite...
  • 5,229 篇 support vector m...
  • 5,205 篇 predictive model...
  • 5,110 篇 wireless sensor ...
  • 4,909 篇 costs
  • 4,809 篇 optimization
  • 4,727 篇 application soft...
  • 4,645 篇 bandwidth
  • 4,616 篇 testing
  • 4,566 篇 algorithm design...
  • 4,564 篇 protocols
  • 4,461 篇 neural networks

机构

  • 1,699 篇 department of co...
  • 1,347 篇 department of co...
  • 1,336 篇 department of el...
  • 1,174 篇 college of compu...
  • 1,167 篇 department of el...
  • 1,056 篇 cavendish labora...
  • 974 篇 department of ph...
  • 891 篇 department of co...
  • 845 篇 university of ch...
  • 837 篇 physikalisches i...
  • 831 篇 oliver lodge lab...
  • 818 篇 department of el...
  • 640 篇 department of co...
  • 557 篇 department of co...
  • 527 篇 infn sezione di ...
  • 517 篇 chitkara univers...
  • 507 篇 infn laboratori ...
  • 501 篇 infn sezione di ...
  • 497 篇 horia hulubei na...
  • 488 篇 department of co...

作者

  • 255 篇 j. wang
  • 254 篇 s. chen
  • 250 篇 barter w.
  • 236 篇 a. gomes
  • 225 篇 blake t.
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 c. alexa
  • 216 篇 boettcher t.
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 206 篇 j. m. izen
  • 202 篇 bencivenni g.
  • 193 篇 bay a.
  • 191 篇 niyato dusit
  • 190 篇 c. amelung
  • 189 篇 g. bella

语言

  • 387,180 篇 英文
  • 20,939 篇 其他
  • 4,114 篇 中文
  • 227 篇 日文
  • 58 篇 德文
  • 40 篇 朝鲜文
  • 34 篇 法文
  • 24 篇 斯洛文尼亚文
  • 13 篇 西班牙文
  • 10 篇 土耳其文
  • 9 篇 俄文
  • 5 篇 阿拉伯文
  • 5 篇 荷兰文
  • 4 篇 意大利文
  • 3 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering and Software Engineering"
412188 条 记 录,以下是481-490 订阅
排序:
Finding broadcast 2-centers of a tree under the postal model
收藏 引用
Discrete Applied Mathematics 2024年 356卷 182-190页
作者: Tsou, Cheng-Hsiao Lin, Ching-Chi Hsu, Chan-Hung Department of Computer Science and Information Engineering National Taiwan University Taipei10617 Taiwan Department of Computer Science and Engineering National Taiwan Ocean University Keelung20224 Taiwan
In this paper, we delve into the investigation of locating broadcast 2-centers of a tree T under the postal model. The problem asks to deploy two broadcast centers so that the maximum communication time from the cente... 详细信息
来源: 评论
Cloud computing security: a taxonomy, threat detection and mitigation techniques
收藏 引用
International Journal of computers and Applications 2024年 第5期46卷 348-361页
作者: Rani, Pinki Singh, Sukhdip Singh, Karanbir Computer Science and Engineering Department Deenbandhu Chhotu Ram University of Science and Technology Sonipat India Computer Engineering Department Seth Jai Parkash Polytechnic Yamuna Nagar India
Cloud Computing is a rapidly growing emerging technology in the IT environment. Internet-based computing provides services like sharing resources e.g. network, storage, applications and software through the Internet. ... 详细信息
来源: 评论
Adaptive Marine Predator Optimization Algorithm(AOMA)-Deep Supervised Learning Classification(DSLC)based IDS framework for MANET security
收藏 引用
Intelligent and Converged Networks 2024年 第1期5卷 1-18页
作者: M.Sahaya Sheela A.Gnana Soundari Aditya Mudigonda C.Kalpana K.Suresh K.Somasundaram Yousef Farhaoui Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and TechnologyChennai 600069India Department of Computer Science and Engineering Saveetha School of EngineeringSIMATSChennai 602105India JNIAS School of Planning and Architecture Hyderabad 500034India Department of Computer Science and Engineering NPR College of Engineering and TechnologyNatham Dindigul 624401India Department of Computer Science and Engineering PSNA College of Engineering and TechnologyPoolangulathupatti 620009India Department of Computer Science and Engineering Sri Muthukumaran Institute of TechnologyChennai 600069India Department of Computer Science Moulay Ismail UniversityMeknes 5003Morocco
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i... 详细信息
来源: 评论
Drone Detection and Tracking using Deep Convolutional Neural Networks from Real-time CCTV Footage
收藏 引用
IEIE Transactions on Smart Processing and Computing 2024年 第4期13卷 313-321页
作者: Allmamun, Md Akter, Fahima Talukdar, Muhammad Borhan Uddin Chakraborty, Sovon Uddin, Jia Department of Computer Science and Engineering European University of Bangladesh Dhaka Bangladesh Department of Computer Science and Engineering Daffodil International University Dhaka Bangladesh Department of Computer Science and Engineering University of Liberal Arts Bangladesh Dhaka Bangladesh AI and Big Data Department Woosong University Daejeon Korea Republic of
Drones are flying objects that may be controlled remotely or programmed to do a wide range of tasks, including aerial photography, videography, surveys, crop and animal monitoring, search and rescue missions, package ... 详细信息
来源: 评论
Enhancing Human Action Recognition with Adaptive Hybrid Deep Attentive Networks and Archerfish Optimization
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4791-4812页
作者: Ahmad Yahiya Ahmad Bani Ahmad Jafar Alzubi Sophers James Vincent Omollo Nyangaresi Chanthirasekaran Kutralakani Anguraju Krishnan Department of Accounting and Finance Faculty of BusinessMiddle East UniversityAmman11831Jordan Faculty of Engineering Al-Balqa Applied UniversitySalt19117Jordan Department of Mathematics Kongunadu College of Engineering and Technology(Autonomous)TholurpattiTrichy621215India Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo210-40601Kenya Department of Electronics and Communication Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennai602105India Department of Electronics and Communication Engineering Saveetha Engineering College(Autonomous)Chennai602105India Department of Computer Science and Engineering Kongunadu College of Engineering and Technology(Autonomous)TholurpattiTrichy621215India
In recent years,wearable devices-based Human Activity Recognition(HAR)models have received significant *** developed HAR models use hand-crafted features to recognize human activities,leading to the extraction of basi... 详细信息
来源: 评论
Machine learning and data analytics driven model for income tax rebate estimation: A neoteric and benign approach  4th
Machine learning and data analytics driven model for income ...
收藏 引用
4th International Conference on Computational Methods in science and Technology, ICCMST 2024
作者: Sharma, Viney Kumar, Achal Singh, Archana Kumar, Manish Department of Computer Science & Engineering Sharda University Agra India Department of Computer Science & Engineering Anand Engineering College Agra India Department of Computer Science & Engineering Chandigarh Engineering College Landran India
The provision of rebate to needy/underprivileged sections of society has been in practice since long in government organizations. The efficacy of such provisions lies in the fact that whether this rebate reaches peopl... 详细信息
来源: 评论
Multi-feature Fusion Deep Network for Skin Disease Diagnosis
收藏 引用
Multimedia Tools and Applications 2025年 第1期84卷 419-444页
作者: Gairola, Ajay Krishan Kumar, Vidit Sahoo, Ashok Kumar Diwakar, Manoj Singh, Prabhishek Garg, Deepak Department of Computer Science and Engineering Graphic Era Hill University Dehradun India Department of Computer Science and Engineering Graphic Era deemed to be university Dehradun India School of Computer Science Engineering and Technology Bennett University Greater Noida India School of Computer Science and Artificial Intelligence SR University Warangal Telangana Warangal506371 India
The skin acts as an important barrier between the body and the external environment, playing a vital role as an organ. The application of deep learning in the medical field to solve various health problems has generat... 详细信息
来源: 评论
Beyond Agile: NLP-Driven Quality Attributes Retrieval Using ChatGPT in software Development Strategies
Beyond Agile: NLP-Driven Quality Attributes Retrieval Using ...
收藏 引用
2024 International Conference on engineering and Computing, ICECT 2024
作者: Aamana Ain, Qurat Ul Nisa, Sardar Un NUML Department of Software Engineering Rawalpindi Pakistan NUML Department of Computer Science Islamabad Pakistan
This study explores Agile software Development (ASD) methodologies' effectiveness in achieving quality software products. It investigates the underexplored application of ChatGPT as a Quality Attribute Extractor i... 详细信息
来源: 评论
Zero Trust Networks: Evolution and Application from Concept to Practice
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1593-1613页
作者: Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang School of Computer Science School of Cyber Science and EngineeringEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China Department of Computing Science University of AberdeenAberdeenAB243FXUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Sanya Institute of Hunan University of Science and Technology Sanya572024China
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address... 详细信息
来源: 评论
Dynamic Anomaly Detection Using Robust Random Cut Forests in Resource-Constrained IoT Environments
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第23期48卷 107-120页
作者: Vashisth, Sristi Goyal, Anjali Sharda University Department of Computer Science and Engineering Greater Noida India
This paper investigates dynamic anomaly detection in resource-constrained environments by leveraging Robust Random Cut Forests (RRCF). Anomaly detection is crucial for maintaining the integrity and security of data st... 详细信息
来源: 评论