咨询与建议

限定检索结果

文献类型

  • 201,413 篇 会议
  • 98,228 篇 期刊文献
  • 2,370 册 图书

馆藏范围

  • 302,011 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 179,921 篇 工学
    • 116,802 篇 计算机科学与技术...
    • 94,063 篇 软件工程
    • 45,139 篇 信息与通信工程
    • 27,880 篇 控制科学与工程
    • 25,144 篇 电子科学与技术(可...
    • 24,576 篇 电气工程
    • 19,385 篇 生物工程
    • 15,128 篇 生物医学工程(可授...
    • 14,728 篇 光学工程
    • 13,010 篇 机械工程
    • 11,113 篇 化学工程与技术
    • 10,583 篇 仪器科学与技术
    • 9,642 篇 动力工程及工程热...
    • 8,960 篇 材料科学与工程(可...
    • 6,543 篇 网络空间安全
    • 6,412 篇 安全科学与工程
    • 6,035 篇 交通运输工程
  • 102,585 篇 理学
    • 49,523 篇 数学
    • 35,733 篇 物理学
    • 22,068 篇 生物学
    • 15,830 篇 统计学(可授理学、...
    • 11,564 篇 化学
    • 11,153 篇 系统科学
  • 45,941 篇 管理学
    • 28,262 篇 管理科学与工程(可...
    • 19,438 篇 图书情报与档案管...
    • 12,900 篇 工商管理
  • 14,792 篇 医学
    • 12,382 篇 临床医学
    • 10,878 篇 基础医学(可授医学...
    • 6,776 篇 药学(可授医学、理...
  • 7,981 篇 法学
    • 6,437 篇 社会学
  • 5,121 篇 经济学
  • 4,114 篇 农学
  • 3,261 篇 教育学
  • 1,413 篇 文学
  • 761 篇 军事学
  • 445 篇 艺术学
  • 50 篇 哲学
  • 30 篇 历史学

主题

  • 9,644 篇 computer science
  • 7,102 篇 accuracy
  • 6,762 篇 feature extracti...
  • 6,039 篇 deep learning
  • 5,865 篇 computational mo...
  • 5,334 篇 machine learning
  • 5,244 篇 training
  • 4,119 篇 data mining
  • 3,880 篇 support vector m...
  • 3,681 篇 optimization
  • 3,533 篇 predictive model...
  • 3,441 篇 wireless sensor ...
  • 3,405 篇 internet of thin...
  • 3,151 篇 real-time system...
  • 3,146 篇 artificial intel...
  • 3,130 篇 convolutional ne...
  • 3,029 篇 neural networks
  • 2,875 篇 bandwidth
  • 2,868 篇 computer archite...
  • 2,861 篇 protocols

机构

  • 1,703 篇 department of co...
  • 1,346 篇 department of co...
  • 1,157 篇 university of ch...
  • 1,050 篇 physikalisches i...
  • 1,041 篇 cavendish labora...
  • 973 篇 department of ph...
  • 869 篇 infn laboratori ...
  • 862 篇 oliver lodge lab...
  • 821 篇 department of el...
  • 810 篇 department of el...
  • 783 篇 infn sezione di ...
  • 715 篇 school of comput...
  • 629 篇 department of el...
  • 617 篇 department of co...
  • 612 篇 infn sezione di ...
  • 552 篇 chitkara univers...
  • 533 篇 nikhef national ...
  • 515 篇 infn sezione di ...
  • 503 篇 school of comput...
  • 488 篇 university of sc...

作者

  • 247 篇 j. wang
  • 244 篇 niyato dusit
  • 242 篇 barter w.
  • 228 篇 s. chen
  • 225 篇 a. gomes
  • 213 篇 bellee v.
  • 212 篇 blake t.
  • 209 篇 bowcock t.j.v.
  • 209 篇 y. zhang
  • 203 篇 borsato m.
  • 203 篇 betancourt c.
  • 201 篇 beiter a.
  • 200 篇 c. alexa
  • 199 篇 brundu d.
  • 197 篇 j. m. izen
  • 194 篇 amato s.
  • 186 篇 c. amelung
  • 184 篇 g. bella
  • 184 篇 j. strandberg
  • 184 篇 d. calvet

语言

  • 282,019 篇 英文
  • 15,344 篇 其他
  • 4,490 篇 中文
  • 355 篇 日文
  • 52 篇 朝鲜文
  • 46 篇 德文
  • 39 篇 法文
  • 28 篇 斯洛文尼亚文
  • 10 篇 俄文
  • 5 篇 土耳其文
  • 4 篇 阿拉伯文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 2 篇 意大利文
  • 1 篇 加泰罗尼亚文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science and Information Technology Engineering"
302011 条 记 录,以下是101-110 订阅
排序:
Exploring Personalized Internet of Things(PIoT),social connectivity,and Artificial Social Intelligence(ASI):A survey
收藏 引用
High-Confidence Computing 2024年 第3期4卷 136-162页
作者: Bisma Gulzar Shabir Ahmad Sofi Sahil Sholla Department of Information Technology National Institute of TechnologySrinagar 190001India Department of Computer Science and Engineering Islamic University of Science and TechnologyGazipur 1700India
Pervasive Computing has become more personal with the widespread adoption of the Internet of Things(IoT)in our day-to-day *** emerging domain that encompasses devices,sensors,storage,and computing of personal use and ... 详细信息
来源: 评论
MLRT-UNet:An Efficient Multi-Level Relation Transformer Based U-Net for Thyroid Nodule Segmentation
收藏 引用
computer Modeling in engineering & sciences 2025年 第4期143卷 413-448页
作者: Kaku Haribabu Prasath R Praveen Joe IR Department of Computer Science and Engineering RMK College of Engineering and TechnologyTiruvallur601206India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India
Thyroid nodules,a common disorder in the endocrine system,require accurate segmentation in ultrasound images for effective diagnosis and ***,achieving precise segmentation remains a challenge due to various factors,in... 详细信息
来源: 评论
Video forgery localization using inter-frame denoising and intra-frame segmentation
收藏 引用
Multimedia Tools and Applications 2025年 1-17页
作者: Banerjee, Debanik Chittaragi, Nagaratna B. Koolagudi, Shashidhar G. Department of Computer Science and Engineering National Institute of Technology Karnataka Karnataka Surathkal575025 India Department of Information Science and Engineering Siddaganaga Institute of Technology Karnataka Tumkur572103 India
Video forgery detection has been necessary with recent spurt in fake videos like Deepfakes and doctored videos from multiple video capturing devices. In this paper, we provide a novel technique of detecting fake video... 详细信息
来源: 评论
A fast and highly scalable frequent pattern mining algorithm
收藏 引用
Future Generation computer Systems 2024年 160卷 854-868页
作者: Cheng, Wan-Shu Lin, Yi-Ting Huang, Peng-Yu Chen, Ju-Chin Lin, Kawuu W. Department of Computer Science and Information Management Providence University Taichung Taiwan Department of Computer Science and Information Engineering National Kaohsiung University of Science and Technology Kaohsiung Taiwan
As the use of big data and its potential benefits become more widespread, public and private organizations around the world have realized the imperative of incorporating comprehensive and robust technologies into thei... 详细信息
来源: 评论
Per-user network access control kernel module with secure multifactor authentication
收藏 引用
Journal of Supercomputing 2024年 第1期80卷 970-1008页
作者: Cheng, Sheng-Tzong Horng, Gwo-Jiun Hsu, Chih-Wei Su, Z.-Yu Department of Computer Science and Information Engineering National Cheng Kung University Tainan701 Taiwan Department of Computer Science and Information Engineering Southern Taiwan University of Science and Technology Tainan Taiwan
Network attacks, such as botnets stealing sensitive data, constitute a critical concern for administrators in the Internet area. Such attacks can be prevented using a network access control (NAC) scheme. However, exis... 详细信息
来源: 评论
An ensembled-deep-learning paradigm trained with a self-improved coyote optimization algorithm (SI-COA) for crop disease detection
收藏 引用
Multimedia Tools and Applications 2025年 第4期84卷 1697-1724页
作者: Shukla, Preeti Chandanan, Amit Kumar Department of Computer Science and Information Technology Guru Ghasidas Vishwavidyalaya CG Bilaspur India Department of Computer Science & Engineering Guru Ghasidas Vishwavidyalaya CG Bilaspur India
In recent times, drastic climate changes have caused a substantial increase in the growth of crop diseases. This causes large-scale demolition of crops, decreases cultivation, and eventually leads to the financial los... 详细信息
来源: 评论
MOHSQO: Multi objective harmony search algorithm based QoS optimization in delay tolerant networks
收藏 引用
Multimedia Tools and Applications 2025年 1-26页
作者: Sonkar, Nidhi Pandey, Sudhakar Kumar, Sanjay Department of Computer Science and Engineering National Institute of Technology Warangal Hanamkonda India Department of Information Technology National Institute of Technology Raipur Raipur India
Delay Tolerant Networks (DTNs) have the ability to make communication possible without end-to-end connectivity using store-carry-forward technique. Efficient data dissemination in DTNs is very challenging problem due ... 详细信息
来源: 评论
Multi-label, Classification-based Prediction of Breast Cancer Metastasis Directions
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第1期52卷 1-10页
作者: Wang, Tingting Fan, Qi Tan, Liang Zhang, Beier School of Computer and Software Engineering Anhui Institute of Information Technology China School of Computer Science and Technology Huaibei Normal University China School of Computer and Software Engineering Anhui Institute of Information Technology China School of Computer Science and Technology Huaibei Normal University China
Predicting the metastatic direction of primary breast cancer (BC), thus assisting physicians in precise treatment, strict follow-up, and effectively improving the prognosis. The clinical data of 293,946 patients with ... 详细信息
来源: 评论
Cloud Computing Security: Assured Deletion
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第3期48卷 485-496页
作者: Ahmed, Sarmad Mahmood Mahmood, Baban Ahmed Department of Computer Science College of Computer Science and Information Technology Kirkuk University Kirkuk Iraq
With the advent of cloud computing, many organizations, institutions, and individuals have chosen to store their data in the cloud as a way to compensate for limited local storage capabilities and reduce expenses. How... 详细信息
来源: 评论
Stock Indexes Community Identification Using BAT-Modified Optimization Algorithm
收藏 引用
SN computer science 2024年 第8期5卷 1-14页
作者: Aggarwal, Kirti Arora, Anuja Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Noida India
Stock price accelerates interest and preference of the young generation to explore the stock market with elicit interest. An autopilot system is needed where users choose beneficial stocks of their choice without payi... 详细信息
来源: 评论