咨询与建议

限定检索结果

文献类型

  • 66,227 篇 会议
  • 32,069 篇 期刊文献
  • 1,100 册 图书

馆藏范围

  • 99,396 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 60,121 篇 工学
    • 43,455 篇 计算机科学与技术...
    • 34,757 篇 软件工程
    • 16,693 篇 信息与通信工程
    • 9,397 篇 控制科学与工程
    • 7,186 篇 电气工程
    • 7,110 篇 电子科学与技术(可...
    • 6,783 篇 生物工程
    • 5,173 篇 生物医学工程(可授...
    • 4,298 篇 光学工程
    • 4,063 篇 机械工程
    • 3,255 篇 仪器科学与技术
    • 2,969 篇 动力工程及工程热...
    • 2,773 篇 网络空间安全
    • 2,637 篇 化学工程与技术
    • 2,556 篇 安全科学与工程
    • 2,171 篇 交通运输工程
  • 32,037 篇 理学
    • 16,726 篇 数学
    • 9,534 篇 物理学
    • 7,674 篇 生物学
    • 5,354 篇 统计学(可授理学、...
    • 3,596 篇 系统科学
    • 2,876 篇 化学
  • 17,282 篇 管理学
    • 10,555 篇 管理科学与工程(可...
    • 7,436 篇 图书情报与档案管...
    • 4,889 篇 工商管理
  • 5,476 篇 医学
    • 4,558 篇 临床医学
    • 4,025 篇 基础医学(可授医学...
    • 2,501 篇 公共卫生与预防医...
    • 2,362 篇 药学(可授医学、理...
  • 3,024 篇 法学
    • 2,441 篇 社会学
  • 1,793 篇 经济学
  • 1,371 篇 农学
  • 1,313 篇 教育学
  • 556 篇 文学
  • 278 篇 军事学
  • 180 篇 艺术学
  • 34 篇 哲学
  • 21 篇 历史学

主题

  • 3,073 篇 computer science
  • 2,470 篇 accuracy
  • 2,322 篇 deep learning
  • 2,303 篇 feature extracti...
  • 2,047 篇 machine learning
  • 1,886 篇 computational mo...
  • 1,592 篇 training
  • 1,548 篇 internet of thin...
  • 1,394 篇 data mining
  • 1,324 篇 support vector m...
  • 1,255 篇 artificial intel...
  • 1,176 篇 information tech...
  • 1,154 篇 optimization
  • 1,143 篇 predictive model...
  • 1,108 篇 real-time system...
  • 1,080 篇 wireless sensor ...
  • 1,035 篇 convolutional ne...
  • 904 篇 educational inst...
  • 887 篇 security
  • 847 篇 computer archite...

机构

  • 1,018 篇 department of co...
  • 513 篇 maharishi school...
  • 352 篇 department of co...
  • 274 篇 department of ph...
  • 257 篇 faculté des scie...
  • 254 篇 department of ph...
  • 251 篇 department of co...
  • 228 篇 faculty of scien...
  • 220 篇 department of ph...
  • 216 篇 physics division...
  • 212 篇 school of comput...
  • 198 篇 department of co...
  • 197 篇 department of ph...
  • 197 篇 department of ph...
  • 178 篇 departamento de ...
  • 174 篇 school of inform...
  • 167 篇 maharishi school...
  • 158 篇 department of ph...
  • 157 篇 school of comput...
  • 157 篇 department for p...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 264 篇 g. spigo
  • 263 篇 f. siegert
  • 262 篇 a. c. könig
  • 259 篇 h. a. gordon
  • 259 篇 m. klein
  • 255 篇 r. ströhmer
  • 245 篇 h. sakamoto
  • 242 篇 y. tayalati
  • 231 篇 m. rijssenbeek
  • 204 篇 d. guest
  • 201 篇 n. orlando
  • 200 篇 f. pastore
  • 199 篇 s. jin
  • 189 篇 niyato dusit

语言

  • 92,715 篇 英文
  • 5,417 篇 其他
  • 1,212 篇 中文
  • 120 篇 日文
  • 20 篇 斯洛文尼亚文
  • 12 篇 德文
  • 9 篇 法文
  • 8 篇 朝鲜文
  • 3 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Information and Communication Technology"
99396 条 记 录,以下是261-270 订阅
排序:
EAODroid: Android Malware Detection Based on Enhanced API Order
收藏 引用
Chinese Journal of Electronics 2023年 第5期32卷 1169-1178页
作者: HUANG Lu XUE Jingfeng WANG Yong QU Dacheng CHEN Junbao ZHANG Nan ZHANG Li School of Computer Science and Technology Beijing Institute of Technology Department of Media Engineering Communication University of Zhejiang
The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in ... 详细信息
来源: 评论
Knowledge Discovery of the Internet of Things (IoT) Using Large Language Model
收藏 引用
International Journal of Advanced computer science and Applications 2025年 第4期16卷 993-998页
作者: Alsulami, Bassma Saleh Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Internet of Things (IoT) technology quickly transformed traditional management and engagement techniques in several sectors. This work explores the trends and applications of the Internet of Things in industries, incl... 详细信息
来源: 评论
A bilateral assessment of human activity recognition using grid search based nonlinear multi-task least squares twin support vector machine
收藏 引用
Multimedia Tools and Applications 2024年 第36期83卷 84121-84140页
作者: Thakur, Ujwala Prajapati, Amarjeet Vidyarthi, Ankit Department of Computer Science Engineering & amp Information Technology Jaypee Institute of Information Technology Noida Sector-62 Uttar Pradesh Noida201309 India
The recognition of individual activity has proven its importance in many application areas. Even after the pandemic crisis worldwide, the remote monitoring of human actions and their activities has increased a lot. In... 详细信息
来源: 评论
Fitness Sharing Chaotic Particle Swarm Optimization (FSCPSO): A Metaheuristic Approach for Allocating Dynamic Virtual Machine (VM) in Fog Computing Architecture
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2557-2578页
作者: Prasanna Kumar Kannughatta Ranganna Siddesh Gaddadevara Matt Chin-Ling Chen Ananda Babu Jayachandra Yong-Yuan Deng Department of Computer Science&Engineering Ramaiah Institute of TechnologyBangalore560054India Department of Artificial Intelligence&Data Science Ramaiah Institute of TechnologyBangalore560054India School of Information Engineering Changchun Sci-Tech UniversityChangchun130600China Department of Computer Science and Information Engineering Chaoyang University of TechnologyTaichung41349Taiwan Department of Information Science and Engineering Malnad College of EngineeringHassan573202India
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow *** cloud data centers,fog computing takes more time to run workflow ***,it is essenti... 详细信息
来源: 评论
A Coherent Analytical Model to Strengthen Vehicular communication in VANET Using Droptail Priority Queue
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 1-12页
作者: Kumar, Satyam Sinha, Bam Bahadur Khare, Priyank Electronics and Communication Engineering Indian Institute of Information Technology Ranchi Jharkhand Ranchi834004 India Computer Science and Engineering National Institute of Technology Sikkim Sikkim Ravangla737139 India
People’s demand for vehicles has been increasing day by day over the last few decades. A survey tells us that over 50,000 vehicles run on the roads per day. Such a large number of vehicles causes traffic. A survey te... 详细信息
来源: 评论
Healthcare Privacy-Preserving Federated Transfer Learning using CKKS-Based Homomorphic Encryption and PYHFEL Tool
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer science and Mathematics 2024年 第3期5卷 473-488页
作者: Al-Janabi, Anmar A. Al-Janabi, Sufyan Al-Khateeb, Belal Computer Science Department University of Technology – Iraq Baghdad10066 Iraq University of Anbar Ramadi Iraq College of Computer Science & Information Technology Anbar Ramadi31001 Iraq
Digitization of healthcare data has shown an urgent necessity to deal with privacy concerns within the field of deep learning for healthcare organizations. A promising approach is federated transfer learning, enabling... 详细信息
来源: 评论
Pyram: a robust and attack-resistant perceptual image hashing using pyramid histogram of gradients
收藏 引用
International Journal of information technology (Singapore) 2024年 第8期16卷 5331-5349页
作者: Neog, Prabhakar Sharma Roy, Moumita Sangale, Tejas Jain, Nandita Dahal, Aditi Patgiri, Ripon Thounaojam, Dalton Meitei Department of Computer Science and Engineering National Institute of Technology Silchar Department of Computer Science and Information Technology Siksha ‘O’ Anusandhan University
Perceptual image hashing is a significant and time-effective method for recognizing images within extensive databases, focusing on achieving two key objectives: robustness and discrimination. The right balance between... 详细信息
来源: 评论
Application of adaptive guard channel reservation under hard handoff constraint in wireless cellular network
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第2期28卷 170-185页
作者: Sahu, Promod Kumar Pati, Hemanta Kumar Pradha, Sateesh Kumar Department of Computer Science and Application Utkal University Vani Vihar Odisha Bhubaneswar India Department of Computer Science and Engineering International Institute of Information Technology Bhubaneswar Odisha Bhubaneswar India
Voice is the king of communication in wireless cellular network (WCN). Again, WCNs provide two types of calls, i.e., new call (NC) and handoff call (HC). Generally, HCs have higher priority than NCs because call dropp... 详细信息
来源: 评论
Topology Knapsack Problem for Geometry Optimization
收藏 引用
IEEE Access 2025年 13卷 90626-90636页
作者: Li, Hsiao-Hui Chang, Po-Chun Liao, Yuan-Hsun National Kaohsiung University of Science and Technology Cijin Campus Department of Maritime Information and Technology Kaohsiung805301 Taiwan Tunghai University Department of Computer Science Taichung407224 Taiwan
The knapsack problem is a classic NP-Hard optimization challenge with wide-ranging applications in computer science, such as resource allocation. While several variants have been developed, including the 0/1, fraction... 详细信息
来源: 评论
Shear Let Transform Residual Learning Approach for Single-Image Super-Resolution
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3193-3209页
作者: Israa Ismail Ghada Eltaweel Mohamed Meselhy Eltoukhy Department of Computer Science Faculty of Computers and InformaticsSuez Canal UniversityIsmailia51422Egypt Department of Information Technology College of Computing and Information Technology at KhulaisUniversity of JeddahJeddahSaudi Arabia
Super-resolution techniques are employed to enhance image resolution by reconstructing high-resolution images from one or more low-resolution ***-resolution is of paramount importance in the context of remote sensing,... 详细信息
来源: 评论