咨询与建议

限定检索结果

文献类型

  • 290,169 篇 会议
  • 119,090 篇 期刊文献
  • 2,929 册 图书

馆藏范围

  • 412,187 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 239,154 篇 工学
    • 160,282 篇 计算机科学与技术...
    • 129,739 篇 软件工程
    • 57,351 篇 信息与通信工程
    • 37,793 篇 控制科学与工程
    • 32,886 篇 电气工程
    • 31,546 篇 电子科学与技术(可...
    • 27,456 篇 生物工程
    • 21,375 篇 生物医学工程(可授...
    • 18,592 篇 光学工程
    • 16,271 篇 机械工程
    • 13,611 篇 化学工程与技术
    • 12,741 篇 仪器科学与技术
    • 12,625 篇 动力工程及工程热...
    • 11,302 篇 材料科学与工程(可...
    • 8,772 篇 安全科学与工程
    • 8,165 篇 网络空间安全
  • 133,609 篇 理学
    • 66,788 篇 数学
    • 43,191 篇 物理学
    • 30,949 篇 生物学
    • 21,485 篇 统计学(可授理学、...
    • 15,559 篇 系统科学
    • 14,599 篇 化学
  • 59,873 篇 管理学
    • 36,074 篇 管理科学与工程(可...
    • 26,178 篇 图书情报与档案管...
    • 17,726 篇 工商管理
  • 20,138 篇 医学
    • 16,927 篇 临床医学
    • 15,169 篇 基础医学(可授医学...
    • 9,512 篇 药学(可授医学、理...
    • 8,056 篇 公共卫生与预防医...
  • 11,127 篇 法学
    • 9,092 篇 社会学
  • 6,819 篇 经济学
  • 5,306 篇 农学
  • 4,513 篇 教育学
  • 1,924 篇 文学
  • 925 篇 军事学
  • 554 篇 艺术学
  • 85 篇 哲学
  • 50 篇 历史学

主题

  • 20,570 篇 computer science
  • 9,472 篇 accuracy
  • 9,257 篇 computational mo...
  • 8,516 篇 feature extracti...
  • 7,989 篇 deep learning
  • 7,558 篇 machine learning
  • 7,029 篇 training
  • 5,594 篇 data mining
  • 5,417 篇 computer archite...
  • 5,229 篇 support vector m...
  • 5,205 篇 predictive model...
  • 5,110 篇 wireless sensor ...
  • 4,909 篇 costs
  • 4,809 篇 optimization
  • 4,727 篇 application soft...
  • 4,645 篇 bandwidth
  • 4,616 篇 testing
  • 4,566 篇 algorithm design...
  • 4,564 篇 protocols
  • 4,461 篇 neural networks

机构

  • 1,699 篇 department of co...
  • 1,347 篇 department of co...
  • 1,336 篇 department of el...
  • 1,174 篇 college of compu...
  • 1,167 篇 department of el...
  • 1,056 篇 cavendish labora...
  • 974 篇 department of ph...
  • 891 篇 department of co...
  • 845 篇 university of ch...
  • 837 篇 physikalisches i...
  • 831 篇 oliver lodge lab...
  • 818 篇 department of el...
  • 640 篇 department of co...
  • 557 篇 department of co...
  • 527 篇 infn sezione di ...
  • 517 篇 chitkara univers...
  • 507 篇 infn laboratori ...
  • 501 篇 infn sezione di ...
  • 497 篇 horia hulubei na...
  • 488 篇 department of co...

作者

  • 255 篇 j. wang
  • 254 篇 s. chen
  • 250 篇 barter w.
  • 236 篇 a. gomes
  • 225 篇 blake t.
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 c. alexa
  • 216 篇 boettcher t.
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 206 篇 j. m. izen
  • 202 篇 bencivenni g.
  • 193 篇 bay a.
  • 191 篇 niyato dusit
  • 190 篇 c. amelung
  • 189 篇 g. bella

语言

  • 387,180 篇 英文
  • 20,939 篇 其他
  • 4,114 篇 中文
  • 227 篇 日文
  • 58 篇 德文
  • 40 篇 朝鲜文
  • 34 篇 法文
  • 24 篇 斯洛文尼亚文
  • 13 篇 西班牙文
  • 10 篇 土耳其文
  • 9 篇 俄文
  • 5 篇 阿拉伯文
  • 5 篇 荷兰文
  • 4 篇 意大利文
  • 3 篇 葡萄牙文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering and Software Engineering"
412188 条 记 录,以下是721-730 订阅
排序:
Performance Optimization of SAC-OCDMA Network Based on 2-D CS Code Utilizing Two Light Sources  6
Performance Optimization of SAC-OCDMA Network Based on 2-D C...
收藏 引用
6th International Symposium on Advanced Electrical and Communication Technologies, ISAECT 2024
作者: Alayedi, Mohanad Jaradat, Ahmad M. Elgammal, Ziad Malkawi, Malek Haliç University Department of Software Engineering Istanbul Turkey University of Detroit Mercy Department of Electrical and Computer Engineering and Computer Science MI United States Istanbul Medipol University Department of Computer Engineering Istanbul Turkey
This study introduces a novel 2-dimensional (2D) spectral/temporal code, termed 2D-cyclic shift (2D-CS) code, optimized for non-coherent Spectral Amplitude Coding Optical Code Division Multiple Access (SAC-OCDMA) syst... 详细信息
来源: 评论
Computation of Graph Fourier Transform Centrality Using Graph Filter
IEEE Open Journal of Circuits and Systems
收藏 引用
IEEE Open Journal of Circuits and Systems 2024年 5卷 69-80页
作者: Tseng, Chien-Cheng Lee, Su-Ling National Kaohsiung University of Science and Technology Department of Computer and Communication Engineering Kaohsiung824005 Taiwan Chang Jung Christian University Department of Computer Science and Information Engineering Tainan711301 Taiwan
In this paper, the computation of graph Fourier transform centrality (GFTC) of complex network using graph filter is presented. For conventional computation method, it needs to use the non-sparse transform matrix of g... 详细信息
来源: 评论
Pentago SnW:An Improved Spray and Wait Protocol for Delay Tolerant Wireless Sensor Networks
收藏 引用
China Communications 2025年 第3期22卷 104-114页
作者: Idris Afzal Shah Mushtaq Ahmed Raghavendra Singh Department of Computer Science and Engineering Malaviya National Institute of TechnologyJaipur302017India
Delay tolerant wireless sensor networks(DTWSN)is a class of wireless network that finds its deployment in those application scenarios which demand for high packet delivery ratio while maintaining minimal overhead in o... 详细信息
来源: 评论
Application of VGIS Digital Twin Platform for Enhanced Oilfield Disaster Management and Environmental Protection
收藏 引用
Informatica (Slovenia) 2024年 第14期48卷 27-42页
作者: Alabbasi, Awab Aljabery, Maalim A. Bölük, Pınar Sarısaray Faculty of Engineering and Natural Sciences Electrical and Computer Engineering Dept. Bahcesehir University Istanbul34353 Turkey Faculty of Computer Science and Information Technology Computer Science Dept. University of Basrah Basrah61004 Iraq Faculty of Engineering and Natural Sciences Software Engineering Dept. Bahçeşehir University Istanbul34353 Turkey
VGIS (Virtual Geographic Information System) Platform is a unified oilfield operations management platform based on MaaS (Management as a Service) that integrates advanced technologies such as AIoT (Artificial Intelli... 详细信息
来源: 评论
Machine learning in crime prediction
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第3期14卷 2887-2913页
作者: Jenga, Karabo Catal, Cagatay Kar, Gorkem Department of Computer Engineering Bahcesehir University Istanbul Turkey Department of Computer Science and Engineering Qatar University Doha Qatar
Predicting crimes before they occur can save lives and losses of property. With the help of machine learning, many researchers have studied predicting crimes extensively. In this paper, we evaluate state-of-the-art cr... 详细信息
来源: 评论
MCM-Llama: A Fine-Tuned Large Language Model for Real-Time Threat Detection through Security Event Correlation  4
MCM-Llama: A Fine-Tuned Large Language Model for Real-Time T...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Diakhame, Mouhamadou Lamine Diallo, Cherif Mejri, Mohamed Gaston Berger University Department of Computer Science Saint Louis Senegal Laval University Department of Computer Science & Software Engineering Quebec Canada
The correlation of security alerts is crucial for effective threat detection and mitigation in modern cybersecurity landscapes. With the exponential growth in the volume of generated alerts, there arises an imperative... 详细信息
来源: 评论
Quick Hidden Layer Size Tuning in ELM for Classification Problems
Mendel
收藏 引用
Mendel 2024年 第1期30卷 1-14页
作者: Albtoush, Audi Fernandez-Delgado, Manuel Maarouf, Haitham Al Nawaiseh, Asmaa Jameel Faculty of Computer Science and Information Technology Jerash University Jordan Santiago De Compostela University Spain Software Engineering Department Mut’ah university Jordan
The extreme learning machine is a fast neural network with outstanding performance. However, the selection of an appropriate number of hidden nodes is time-consuming, because training must be run for several values, a... 详细信息
来源: 评论
Evolutionary recurrent neural network based on equilibrium optimization method for cloud-edge resource management in internet of things
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4957-4969页
作者: Ebrahimi Mood, Sepehr Rouhbakhsh, Adel Souri, Alireza Department of Computer Science Yazd University Yazd Iran Department of Computer Engineering Faculty of Engineering Haliç University Istanbul34060 Turkey School of Electrical and Electronic Engineering Shandong University of Technology Zibo255000 China
Cloud computing is an emerging field in information technology, enabling users to access a shared pool of computing resources. Despite its potential, cloud technology presents various challenges, with one of the most ... 详细信息
来源: 评论
Proactive Crowdsourced Monitoring and Sensing With Expansible Activity Recognition Based on Internet of Things Localization
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17674-17686页
作者: Chen, Lien-Wu Liao, Chun-Wei Liu, Jun-Xian Feng Chia University Department of Information Engineering and Computer Science Taichung407 Taiwan
This article proposes a proactive crowdsourced monitoring and sensing (PCMS) framework with the designed Smart iBeacon device to accurately recognize the activities of an equipped target, exclusively customize the rec... 详细信息
来源: 评论
Optimal feature with modified bi-directional long short-term memory for big data classification in healthcare application
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第7期16卷 4441-4450页
作者: Kamble, Subhash Arunalatha, J.S. Venugopal, K.R. Computer Science and Engineering Bangalore University Department of Computer Science and Engineering University Visvesvaraya College of Engineering Bangalore University Bangalore University
Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical data is available, yet the vast majority of it is wasted. It will b... 详细信息
来源: 评论