咨询与建议

限定检索结果

文献类型

  • 65,833 篇 会议
  • 31,802 篇 期刊文献
  • 1,095 册 图书

馆藏范围

  • 98,730 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 59,568 篇 工学
    • 43,084 篇 计算机科学与技术...
    • 34,458 篇 软件工程
    • 16,569 篇 信息与通信工程
    • 9,268 篇 控制科学与工程
    • 7,104 篇 电气工程
    • 7,069 篇 电子科学与技术(可...
    • 6,765 篇 生物工程
    • 5,131 篇 生物医学工程(可授...
    • 4,240 篇 光学工程
    • 4,027 篇 机械工程
    • 3,231 篇 仪器科学与技术
    • 2,958 篇 动力工程及工程热...
    • 2,741 篇 网络空间安全
    • 2,625 篇 化学工程与技术
    • 2,533 篇 安全科学与工程
    • 2,156 篇 交通运输工程
  • 31,835 篇 理学
    • 16,612 篇 数学
    • 9,476 篇 物理学
    • 7,647 篇 生物学
    • 5,308 篇 统计学(可授理学、...
    • 3,595 篇 系统科学
    • 2,868 篇 化学
  • 17,162 篇 管理学
    • 10,478 篇 管理科学与工程(可...
    • 7,392 篇 图书情报与档案管...
    • 4,836 篇 工商管理
  • 5,422 篇 医学
    • 4,510 篇 临床医学
    • 3,977 篇 基础医学(可授医学...
    • 2,447 篇 公共卫生与预防医...
    • 2,360 篇 药学(可授医学、理...
  • 3,001 篇 法学
    • 2,420 篇 社会学
  • 1,782 篇 经济学
  • 1,363 篇 农学
  • 1,281 篇 教育学
  • 557 篇 文学
  • 276 篇 军事学
  • 179 篇 艺术学
  • 34 篇 哲学
  • 21 篇 历史学

主题

  • 3,072 篇 computer science
  • 2,428 篇 accuracy
  • 2,281 篇 feature extracti...
  • 2,278 篇 deep learning
  • 2,033 篇 machine learning
  • 1,871 篇 computational mo...
  • 1,582 篇 training
  • 1,543 篇 internet of thin...
  • 1,387 篇 data mining
  • 1,316 篇 support vector m...
  • 1,247 篇 artificial intel...
  • 1,165 篇 information tech...
  • 1,150 篇 optimization
  • 1,123 篇 predictive model...
  • 1,085 篇 real-time system...
  • 1,077 篇 wireless sensor ...
  • 1,005 篇 convolutional ne...
  • 904 篇 educational inst...
  • 891 篇 security
  • 847 篇 computer archite...

机构

  • 1,009 篇 department of co...
  • 513 篇 maharishi school...
  • 352 篇 department of co...
  • 274 篇 department of ph...
  • 257 篇 faculté des scie...
  • 254 篇 department of ph...
  • 252 篇 department of co...
  • 226 篇 faculty of scien...
  • 220 篇 department of ph...
  • 216 篇 physics division...
  • 209 篇 school of comput...
  • 198 篇 department of ph...
  • 198 篇 department of co...
  • 197 篇 department of ph...
  • 181 篇 departamento de ...
  • 175 篇 school of inform...
  • 167 篇 maharishi school...
  • 158 篇 department of ph...
  • 158 篇 department of ph...
  • 157 篇 school of comput...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 264 篇 g. spigo
  • 263 篇 f. siegert
  • 262 篇 a. c. könig
  • 259 篇 h. a. gordon
  • 259 篇 m. klein
  • 254 篇 r. ströhmer
  • 246 篇 h. sakamoto
  • 242 篇 y. tayalati
  • 232 篇 m. rijssenbeek
  • 203 篇 d. guest
  • 201 篇 n. orlando
  • 200 篇 f. pastore
  • 199 篇 s. jin
  • 185 篇 niyato dusit

语言

  • 94,171 篇 英文
  • 3,324 篇 其他
  • 1,185 篇 中文
  • 120 篇 日文
  • 16 篇 斯洛文尼亚文
  • 12 篇 德文
  • 11 篇 法文
  • 8 篇 朝鲜文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Information and Communication Technology"
98730 条 记 录,以下是201-210 订阅
排序:
EarLock: Personal Authentication System for Hearables Using Sound Leakage Signals
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6183-6196页
作者: Amesaka, Takashi Watanabe, Hiroki Sugiura, Yuta Sugimoto, Masanori Shizuki, Buntarou Keio University Department of Information and Computer Science Kanagawa Japan Future University Hakodate Department of Media Architecture Hokkaido Japan Hokkaido University Graduate School of Information Science and Technology Hokkaido Japan the University of Tsukuba Department of Computer Science Ibaraki Japan
Earphone-type wearable devices, also known as "hearables,"will have many functions in the future. Some of those functions will require authentication of the wearer for access to the user's privacy inform... 详细信息
来源: 评论
PointBi-FPN: An Extention to Pointpillars for LiDAR 3D Object Detection in Autonomous Vehicles Using Bi-Directional Feature Pyramid Network
PointBi-FPN: An Extention to Pointpillars for LiDAR 3D Objec...
收藏 引用
2024 IEEE Region 10 Conference, TENCON 2024
作者: Soumya, A. Krishna Mohan, C. Cenkeramaddi, Linga Reddy Babu, Sobhan Indian Institute of Technology Department of Computer Science and Engineering Hyderabad India University of Agder Department of Information and Communication Technology Grimstad Norway
Autonomous vehicles increasingly rely on accurate three-dimensional (3D) object detection for safe navigation. While two-dimensional (2D) methods offer computational efficiency, the shift to 3D detection enhances prec... 详细信息
来源: 评论
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG College of Information Science and Engineering Hunan Normal University School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Computer Science Department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 评论
A Survey of Edge Caching:Key Issues and Challenges
收藏 引用
Tsinghua science and technology 2024年 第3期29卷 818-842页
作者: Hanwen Li Mingtao Sun Fan Xia Xiaolong Xu Muhammad Bilal School of Computer Science Nanjing University of Information Science and TechnologyNanjing 210044China Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyWeifang 262700China Reading Academy Nanjing University of Information Science and TechnologyNanjing 210044China School of Software Nanjing University of Information Science and TechnologyNanjing 210044China Department of Computer Engineering Hankuk University of Foreign StudiesYongin-si 17035Republic of Korea
With the rapid development of mobile communication technology and intelligent applications,the quantity of mobile devices and data traffic in networks have been growing exponentially,which poses a great burden to netw... 详细信息
来源: 评论
A Proposal of the Gamification of Programming Learning Assistant System
A Proposal of the Gamification of Programming Learning Assis...
收藏 引用
2024 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2024
作者: Kyaw, Htoo Htoo Sandi Kaneko, Keiichi Fuanbiki, Nobuo Tokyo University of Agriculture and Technology Department of Computer and Information Science Tokyo Japan Okayama University Department of Information and Communication Systems Okayama Japan
Despite the rapid expansion of the ICT sector, there's a disconnect with STEM subjects, leading to high dropout rates in computer science and engineering programs. This contributes to many unfilled positions in th... 详细信息
来源: 评论
Analysis of Code Writing Problem Solution Results in C Programming Course
Analysis of Code Writing Problem Solution Results in C Progr...
收藏 引用
2024 IEEE International Conference on Consumer Electronics, ICCE 2024
作者: Kyaw, Htoo Htoo Sandi Kaneko, Keiichi Funabiki, Nobuo Tokyo University of Agriculture and Technology Department of Computer and Information Science Tokyo Japan Okayama University Department of Information and Communication Systems Okayama Japan
To advance the educational quality of C programming, we have proposed and implemented the C Programming Learning Assistant System (CPLAS) as a Web application system. CPLAS offers a Code Writing Problem (CWP) that req... 详细信息
来源: 评论
Transfer Learning Empowered Skin Diseases Detection in Children
收藏 引用
computer Modeling in Engineering & sciences 2024年 第12期141卷 2609-2623页
作者: Meena N.Alnuaimi Nourah S.Alqahtani Mohammed Gollapalli Atta Rahman Alaa Alahmadi Aghiad Bakry Mustafa Youldash Dania Alkhulaifi Rashad Ahmed Hesham Al-Musallam Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Information Systems College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Engineering College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia ICS Department King Fahd University of Petroleum and MineralsDhahran31261Saudi Arabia
Human beings are often affected by a wide range of skin diseases,which can be attributed to genetic factors and environmental influences,such as exposure to sunshine with ultraviolet(UV)*** left untreated,these diseas... 详细信息
来源: 评论
Improving Prediction of Chronic Kidney Disease Using KNN Imputed SMOTE Features and TrioNet Model
收藏 引用
computer Modeling in Engineering & sciences 2024年 第6期139卷 3513-3534页
作者: Nazik Alturki Abdulaziz Altamimi Muhammad Umer Oumaima Saidani Amal Alshardan Shtwai Alsubai Marwan Omar Imran Ashraf Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department College of Computer Science and Engineering University of Hafr Al-BatinHafarAl-Batin39524Saudi Arabia Department of Computer Science&Information Technology The Islamia University of BahawalpurP.O.Box 63100BahawalpurPakistan Department of Computer Science College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityP.O.Box 151Al-Kharj11942Saudi Arabia Information Technology and Management Illinois Institute of TechnologyChicagoIL 60616-3793USA Information and Communication Engineering Yeungnam UniversityGyeongsan38541Korea
Chronic kidney disease(CKD)is a major health concern today,requiring early and accurate *** learning has emerged as a powerful tool for disease detection,and medical professionals are increasingly using ML classifier ... 详细信息
来源: 评论
Split-n-Swap: A New Modification of the Twofish Block Cipher Algorithm
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1723-1734页
作者: Awny Sayed Maha Mahrous Enas Elgeldawi Computer Science Department Faculty of ScienceMinia UniversityMinia61519Egypt Faculty of Computing and Information Technology Information Technology DepartmentKing Abdulaziz UniversityJeddah21589Saudi Arabia Computer Science Department Faculty of Computers and InformationMinia UniversityMinia61519Egypt
Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern.A robust data security system should protect the information assets of any organization against cybercr... 详细信息
来源: 评论
A fully flexible key delegation mechanism with efficient fine-grained access control in CP-ABE
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第9期14卷 12837-12856页
作者: Porwal, Shardha Mittal, Sangeeta Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida India
Ciphertext Policy-Attribute Based Encryption (CP-ABE) is a secure one-to-many asymmetric encryption schemes where access control of a shared resource is defined in terms of a set of attributes possessed by a user. Key... 详细信息
来源: 评论