咨询与建议

限定检索结果

文献类型

  • 282,604 篇 会议
  • 121,862 篇 期刊文献
  • 2,872 册 图书

馆藏范围

  • 407,337 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 236,182 篇 工学
    • 157,389 篇 计算机科学与技术...
    • 127,888 篇 软件工程
    • 56,656 篇 信息与通信工程
    • 37,019 篇 控制科学与工程
    • 32,687 篇 电气工程
    • 31,325 篇 电子科学与技术(可...
    • 27,896 篇 生物工程
    • 21,781 篇 生物医学工程(可授...
    • 18,818 篇 光学工程
    • 15,971 篇 机械工程
    • 13,868 篇 化学工程与技术
    • 12,669 篇 动力工程及工程热...
    • 12,661 篇 仪器科学与技术
    • 11,221 篇 材料科学与工程(可...
    • 8,763 篇 安全科学与工程
    • 8,065 篇 网络空间安全
  • 134,794 篇 理学
    • 67,115 篇 数学
    • 43,792 篇 物理学
    • 31,575 篇 生物学
    • 22,012 篇 统计学(可授理学、...
    • 15,718 篇 系统科学
    • 14,797 篇 化学
  • 59,162 篇 管理学
    • 35,410 篇 管理科学与工程(可...
    • 26,077 篇 图书情报与档案管...
    • 17,622 篇 工商管理
  • 20,735 篇 医学
    • 17,377 篇 临床医学
    • 15,579 篇 基础医学(可授医学...
    • 9,777 篇 药学(可授医学、理...
    • 8,290 篇 公共卫生与预防医...
  • 11,147 篇 法学
    • 9,153 篇 社会学
  • 6,846 篇 经济学
  • 5,374 篇 农学
  • 4,363 篇 教育学
  • 1,919 篇 文学
  • 903 篇 军事学
  • 519 篇 艺术学
  • 78 篇 哲学
  • 47 篇 历史学

主题

  • 20,105 篇 computer science
  • 9,386 篇 accuracy
  • 8,945 篇 computational mo...
  • 8,282 篇 feature extracti...
  • 7,939 篇 deep learning
  • 7,683 篇 machine learning
  • 6,881 篇 training
  • 5,478 篇 data mining
  • 5,251 篇 support vector m...
  • 5,219 篇 predictive model...
  • 5,198 篇 computer archite...
  • 4,952 篇 wireless sensor ...
  • 4,781 篇 costs
  • 4,699 篇 optimization
  • 4,556 篇 bandwidth
  • 4,467 篇 application soft...
  • 4,418 篇 neural networks
  • 4,411 篇 protocols
  • 4,393 篇 testing
  • 4,388 篇 real-time system...

机构

  • 1,684 篇 department of co...
  • 1,351 篇 department of co...
  • 1,344 篇 department of el...
  • 1,150 篇 department of el...
  • 1,057 篇 cavendish labora...
  • 973 篇 department of ph...
  • 930 篇 department of co...
  • 845 篇 physikalisches i...
  • 841 篇 university of ch...
  • 829 篇 oliver lodge lab...
  • 820 篇 department of el...
  • 634 篇 department of co...
  • 561 篇 department of co...
  • 541 篇 infn sezione di ...
  • 530 篇 chitkara univers...
  • 517 篇 infn laboratori ...
  • 511 篇 infn sezione di ...
  • 497 篇 infn sezione di ...
  • 495 篇 horia hulubei na...
  • 485 篇 department of co...

作者

  • 252 篇 j. wang
  • 252 篇 s. chen
  • 250 篇 barter w.
  • 238 篇 niyato dusit
  • 227 篇 a. gomes
  • 223 篇 blake t.
  • 217 篇 bellee v.
  • 217 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 amato s.
  • 210 篇 boettcher t.
  • 207 篇 c. alexa
  • 207 篇 brundu d.
  • 205 篇 beiter a.
  • 201 篇 j. m. izen
  • 196 篇 bencivenni g.
  • 192 篇 c. amelung
  • 191 篇 g. bella
  • 191 篇 j. strandberg

语言

  • 389,867 篇 英文
  • 13,674 篇 其他
  • 3,821 篇 中文
  • 220 篇 日文
  • 50 篇 德文
  • 36 篇 法文
  • 35 篇 朝鲜文
  • 19 篇 斯洛文尼亚文
  • 9 篇 西班牙文
  • 8 篇 荷兰文
  • 6 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 意大利文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Engineering with Data Science"
407338 条 记 录,以下是161-170 订阅
排序:
Leveraging Concise Concepts with Probabilistic Modeling for Interpretable Visual Recognition
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 3117-3131页
作者: Zhang, Yixuan Liu, Chuanbin Liu, Yizhi Gao, Yifan Lu, Zhiying Xie, Hongtao Zhang, Yongdong University of Science and Technology of China School of Information Science and Technology China Hunan University of Science and Technology Department of Computer Science and Engineering China
Interpretable visual recognition is essential for decision-making in high-stakes situations. Recent advancements have automated the construction of interpretable models by leveraging Visual Language Models (VLMs) and ... 详细信息
来源: 评论
AutoRhythmAI: A Hybrid Machine and Deep Learning Approach for Automated Diagnosis of Arrhythmias
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 2137-2158页
作者: S.Jayanthi S.Prasanna Devi Department of Computer Science and Engineering SRM Institute of Science and Technology-Vadapalani CampusChennaiTamil NaduIndia
In healthcare,the persistent challenge of arrhythmias,a leading cause of global mortality,has sparked extensive research into the automation of detection using machine learning(ML)***,traditional ML and AutoML approac... 详细信息
来源: 评论
Automatic Fetal Segmentation Designed on computer-Aided Detection with Ultrasound Images
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2967-2986页
作者: Mohana Priya Govindarajan Sangeetha Subramaniam Karuppaiya Bharathi Department of Computer Science and Engineering SRM Institute of Science and TechnologyVadapalaniChennaiTamil Nadu600026India
In the present research,we describe a computer-aided detection(CAD)method aimed at automatic fetal head circumference(HC)measurement in 2D ultrasonography pictures during all trimesters of *** HC might be utilized tow... 详细信息
来源: 评论
Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 3003-3031页
作者: Hira Akhtar Butt Khoula Said Al Harthy Mumtaz Ali Shah Mudassar Hussain Rashid Amin Mujeeb Ur Rehman Department of Computer Science University of Management and TechnologySialkot51040Pakistan Department of Computer Science and Creative Technologies Global College of Engineering and TechnologyMuscat2546Sultanate of Oman Department of Computer Science University of WahWah Cantt47040Pakistan Department of Computer Science and IT University of ChakwalChakwal48800Pakistan
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in convention... 详细信息
来源: 评论
Toward Human-centered XAIin Practice:A survey
收藏 引用
Machine Intelligence Research 2024年 第4期21卷 740-770页
作者: Xiangwei Kong Shujie Liu Luhao Zhu Department of Data Science and Management Engineering School of ManagementZhejiang UniversityHangzhou 310058China
Human adoption of artificial intelligence(AI)technique is largely hampered because of the increasing complexity and opacity of AI *** AI(XAI)techniques with various methods and tools have been developed to bridge this... 详细信息
来源: 评论
Comparative research on block design-based protocol and blowfish for secured key generation and data sharing on cloud
收藏 引用
Soft Computing 2024年 第23期28卷 13701-13713页
作者: Hombal, Uma Rangapura Basavaraju, Dayananda Shinde, Ashwini S. Department of Computer Science and Engineering KSIT Bengaluru India Department of Computer Science and Engineering MSRIT Bengaluru India Department of CSE-AI Nutan College of Engineering and Research Pune India
Confidentiality of maintaining the Electronic Health Records of patients is a major concern to both the patient and Doctor. Sharing the data on cloud is one of the most efficient technology infrastructures with extens... 详细信息
来源: 评论
Transformer-Based Person Re-Identification: A Comprehensive Review
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第7期9卷 1-19页
作者: Sarker, Prodip Kumar Zhao, Qingjie Uddin, Md. Kamal School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science and Telecommunication Engineering Noakhali Science and Technology University Bangladesh
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc... 详细信息
来源: 评论
Robust Image Forgery Localization Using Hybrid CNN-Transformer Synergy Based Framework
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4691-4708页
作者: Sachin Sharma Brajesh Kumar Singh Hitendra Garg Department of Computer Science Abdul Kalam Technical UniversityLucknow226031India Department of Computer Engineering & Applications GLA UniversityMathura281406India Department of Computer Science Raja Balwant Singh Engineering Technical CampusAgra283105India
Image tampering detection and localization have emerged as a critical domain in combating the pervasive issue of image manipulation due to the advancement of the large-scale availability of sophisticated image editing... 详细信息
来源: 评论
A Novel Certificateless Signature-based Access Control Scheme for Named In-network Computing Service
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第1期52卷 38-45页
作者: Li, Wanji Liu, Qiangbin Zhu, Yi School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China School of Computer Science and Communication Engineering the Dean of Department of Communication Engineering Jiangsu University Zhenjiang China
Named in-network computing service (NICS) is a potential computing paradigm emerged recently. Benefitted from the characteristics of named addressing and routing, NICS can be flexibly deployed on NDN router side and p... 详细信息
来源: 评论
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1901-1918页
作者: Ahmad O.Aseeri Sajjad Hussain Chauhdary Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science Texas Tech UniversityLubbockUSA
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ... 详细信息
来源: 评论