咨询与建议

限定检索结果

文献类型

  • 553,256 篇 会议
  • 192,150 篇 期刊文献
  • 7,378 册 图书
  • 78 篇 学位论文
  • 1 篇 专利

馆藏范围

  • 752,857 篇 电子文献
  • 19 种 纸本馆藏

日期分布

学科分类号

  • 452,781 篇 工学
    • 309,580 篇 计算机科学与技术...
    • 248,415 篇 软件工程
    • 93,258 篇 信息与通信工程
    • 66,750 篇 控制科学与工程
    • 62,251 篇 电气工程
    • 55,693 篇 电子科学与技术(可...
    • 41,545 篇 生物工程
    • 35,095 篇 生物医学工程(可授...
    • 34,489 篇 机械工程
    • 30,976 篇 光学工程
    • 26,122 篇 化学工程与技术
    • 24,607 篇 材料科学与工程(可...
    • 23,754 篇 动力工程及工程热...
    • 23,074 篇 仪器科学与技术
    • 15,615 篇 安全科学与工程
    • 14,681 篇 土木工程
    • 14,526 篇 建筑学
  • 233,663 篇 理学
    • 120,724 篇 数学
    • 74,755 篇 物理学
    • 47,328 篇 生物学
    • 35,071 篇 统计学(可授理学、...
    • 26,375 篇 化学
    • 25,442 篇 系统科学
  • 109,790 篇 管理学
    • 69,627 篇 管理科学与工程(可...
    • 44,740 篇 图书情报与档案管...
    • 34,332 篇 工商管理
  • 32,250 篇 医学
    • 26,928 篇 临床医学
    • 23,675 篇 基础医学(可授医学...
    • 14,789 篇 药学(可授医学、理...
  • 18,480 篇 法学
    • 15,200 篇 社会学
  • 13,864 篇 教育学
  • 13,421 篇 经济学
  • 9,164 篇 农学
  • 3,538 篇 文学
  • 1,733 篇 军事学
  • 1,191 篇 艺术学
  • 205 篇 哲学
  • 102 篇 历史学

主题

  • 38,840 篇 computer science
  • 23,566 篇 application soft...
  • 16,619 篇 computational mo...
  • 14,014 篇 computer archite...
  • 13,190 篇 software
  • 13,028 篇 accuracy
  • 12,123 篇 feature extracti...
  • 11,516 篇 hardware
  • 11,151 篇 software enginee...
  • 10,970 篇 deep learning
  • 10,884 篇 machine learning
  • 9,985 篇 training
  • 9,618 篇 costs
  • 9,580 篇 data mining
  • 9,508 篇 testing
  • 8,596 篇 artificial intel...
  • 7,941 篇 protocols
  • 7,857 篇 algorithm design...
  • 7,778 篇 educational inst...
  • 7,675 篇 predictive model...

机构

  • 1,899 篇 department of co...
  • 1,696 篇 department of co...
  • 1,638 篇 department of el...
  • 1,338 篇 department of co...
  • 1,300 篇 department of el...
  • 1,194 篇 college of compu...
  • 1,116 篇 university of ch...
  • 982 篇 cavendish labora...
  • 977 篇 department of ph...
  • 876 篇 department of co...
  • 835 篇 physikalisches i...
  • 821 篇 oliver lodge lab...
  • 805 篇 department of el...
  • 661 篇 ieee
  • 649 篇 school of comput...
  • 641 篇 department of el...
  • 618 篇 school of comput...
  • 586 篇 department of co...
  • 569 篇 chitkara univers...
  • 509 篇 state key labora...

作者

  • 284 篇 wang wei
  • 253 篇 barter w.
  • 242 篇 liu yang
  • 237 篇 s. chen
  • 232 篇 j. wang
  • 230 篇 blake t.
  • 223 篇 betancourt c.
  • 221 篇 borsato m.
  • 220 篇 bowcock t.j.v.
  • 218 篇 bellee v.
  • 215 篇 amato s.
  • 211 篇 brundu d.
  • 211 篇 boettcher t.
  • 204 篇 niyato dusit
  • 202 篇 a. gomes
  • 200 篇 yang yang
  • 197 篇 beiter a.
  • 190 篇 c. alexa
  • 190 篇 c. amelung
  • 189 篇 j. m. izen

语言

  • 691,756 篇 英文
  • 53,276 篇 其他
  • 8,797 篇 中文
  • 531 篇 日文
  • 319 篇 德文
  • 178 篇 法文
  • 110 篇 俄文
  • 71 篇 阿拉伯文
  • 68 篇 朝鲜文
  • 68 篇 罗马尼亚文
  • 62 篇 斯洛文尼亚文
  • 40 篇 土耳其文
  • 39 篇 西班牙文
  • 20 篇 葡萄牙文
  • 9 篇 意大利文
  • 7 篇 荷兰文
  • 4 篇 捷克文
  • 2 篇 加泰罗尼亚文
  • 2 篇 波兰文
  • 1 篇 丹麦文
检索条件"机构=Department of Computer Science and Engineering and Software Engineering"
752863 条 记 录,以下是811-820 订阅
Enhancing cyber threat detection with an improved artificial neural network model
收藏 引用
Data science and Management 2025年 第1期8卷 107-115页
作者: Toluwase Sunday Oyinloye Micheal Olaolu Arowolo Rajesh Prasad Department of Computer Science African University of Science and TechnologyAbuja900107Nigeria Department of Electrical Engineering and Computer Science University of MissouriColumbiaMO 65201USA
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems(IDS).Data labeling difficulties,incorrect conclusions,and vulnerability to malicious data injec... 详细信息
来源: 评论
Machine learning in crime prediction
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第3期14卷 2887-2913页
作者: Jenga, Karabo Catal, Cagatay Kar, Gorkem Department of Computer Engineering Bahcesehir University Istanbul Turkey Department of Computer Science and Engineering Qatar University Doha Qatar
Predicting crimes before they occur can save lives and losses of property. With the help of machine learning, many researchers have studied predicting crimes extensively. In this paper, we evaluate state-of-the-art cr... 详细信息
来源: 评论
Pentago SnW:An Improved Spray and Wait Protocol for Delay Tolerant Wireless Sensor Networks
收藏 引用
China Communications 2025年 第3期22卷 104-114页
作者: Idris Afzal Shah Mushtaq Ahmed Raghavendra Singh Department of Computer Science and Engineering Malaviya National Institute of TechnologyJaipur302017India
Delay tolerant wireless sensor networks(DTWSN)is a class of wireless network that finds its deployment in those application scenarios which demand for high packet delivery ratio while maintaining minimal overhead in o... 详细信息
来源: 评论
Generalized Simultaneous Perturbation-Based Gradient Search With Reduced Estimator Bias
收藏 引用
IEEE Transactions on Automatic Control 2025年 第7期70卷 4687-4702页
作者: Pachalyl, Soumen Bhatnagarz, Shalabh Prashanth, L.A. TCS Research Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai India Indian Institute of Science Department of Computer Science and Automation The Robert Bosch Centre for Cyber Physical Systems Bangalore India Indian Institute of Technology Madras Department of Computer Science and Engineering Chennai India
We present a family of generalized simultaneous perturbation-based gradient search (GSPGS) estimators that use noisy function measurements. The number of function measurements required by each estimator is guided by t... 详细信息
来源: 评论
Computation of Graph Fourier Transform Centrality Using Graph Filter
IEEE Open Journal of Circuits and Systems
收藏 引用
IEEE Open Journal of Circuits and Systems 2024年 5卷 69-80页
作者: Tseng, Chien-Cheng Lee, Su-Ling National Kaohsiung University of Science and Technology Department of Computer and Communication Engineering Kaohsiung824005 Taiwan Chang Jung Christian University Department of Computer Science and Information Engineering Tainan711301 Taiwan
In this paper, the computation of graph Fourier transform centrality (GFTC) of complex network using graph filter is presented. For conventional computation method, it needs to use the non-sparse transform matrix of g... 详细信息
来源: 评论
MCM-Llama: A Fine-Tuned Large Language Model for Real-Time Threat Detection through Security Event Correlation  4
MCM-Llama: A Fine-Tuned Large Language Model for Real-Time T...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Diakhame, Mouhamadou Lamine Diallo, Cherif Mejri, Mohamed Gaston Berger University Department of Computer Science Saint Louis Senegal Laval University Department of Computer Science & Software Engineering Quebec Canada
The correlation of security alerts is crucial for effective threat detection and mitigation in modern cybersecurity landscapes. With the exponential growth in the volume of generated alerts, there arises an imperative... 详细信息
来源: 评论
Evolutionary recurrent neural network based on equilibrium optimization method for cloud-edge resource management in internet of things
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4957-4969页
作者: Ebrahimi Mood, Sepehr Rouhbakhsh, Adel Souri, Alireza Department of Computer Science Yazd University Yazd Iran Department of Computer Engineering Faculty of Engineering Haliç University Istanbul34060 Turkey School of Electrical and Electronic Engineering Shandong University of Technology Zibo255000 China
Cloud computing is an emerging field in information technology, enabling users to access a shared pool of computing resources. Despite its potential, cloud technology presents various challenges, with one of the most ... 详细信息
来源: 评论
Quick Hidden Layer Size Tuning in ELM for Classification Problems
Mendel
收藏 引用
Mendel 2024年 第1期30卷 1-14页
作者: Albtoush, Audi Fernandez-Delgado, Manuel Maarouf, Haitham Al Nawaiseh, Asmaa Jameel Faculty of Computer Science and Information Technology Jerash University Jordan Santiago De Compostela University Spain Software Engineering Department Mut’ah university Jordan
The extreme learning machine is a fast neural network with outstanding performance. However, the selection of an appropriate number of hidden nodes is time-consuming, because training must be run for several values, a... 详细信息
来源: 评论
Optimal feature with modified bi-directional long short-term memory for big data classification in healthcare application
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第7期16卷 4441-4450页
作者: Kamble, Subhash Arunalatha, J.S. Venugopal, K.R. Computer Science and Engineering Bangalore University Department of Computer Science and Engineering University Visvesvaraya College of Engineering Bangalore University Bangalore University
Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical data is available, yet the vast majority of it is wasted. It will b... 详细信息
来源: 评论
software development processes in ocean system modeling
收藏 引用
International Journal of Modeling, Simulation, and Scientific Computing 2022年 第2期13卷 47-69页
作者: Reiner Jung Sven Gundlach Wilhelm Hasselbring Software Engineering Group Department of Computer Science Kiel UniversityKielGermany
Scientific modeling provides mathematical abstractions of real-world systems and builds software as implementations of these mathematical *** science is a multidisciplinary discipline developing scientific models and ... 详细信息
来源: 评论