咨询与建议

限定检索结果

文献类型

  • 134,402 篇 会议
  • 71,459 篇 期刊文献
  • 2,142 册 图书

馆藏范围

  • 208,002 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 123,336 篇 工学
    • 82,332 篇 计算机科学与技术...
    • 65,958 篇 软件工程
    • 28,359 篇 信息与通信工程
    • 18,800 篇 控制科学与工程
    • 15,289 篇 电子科学与技术(可...
    • 15,270 篇 电气工程
    • 13,149 篇 生物工程
    • 10,062 篇 生物医学工程(可授...
    • 9,085 篇 光学工程
    • 8,618 篇 机械工程
    • 7,542 篇 化学工程与技术
    • 6,301 篇 仪器科学与技术
    • 6,139 篇 动力工程及工程热...
    • 5,961 篇 材料科学与工程(可...
    • 4,399 篇 网络空间安全
    • 4,159 篇 安全科学与工程
  • 70,816 篇 理学
    • 36,573 篇 数学
    • 22,427 篇 物理学
    • 15,085 篇 生物学
    • 11,446 篇 统计学(可授理学、...
    • 7,852 篇 化学
    • 7,586 篇 系统科学
  • 32,721 篇 管理学
    • 20,038 篇 管理科学与工程(可...
    • 13,896 篇 图书情报与档案管...
    • 8,952 篇 工商管理
  • 10,097 篇 医学
    • 8,383 篇 临床医学
    • 7,195 篇 基础医学(可授医学...
    • 4,424 篇 药学(可授医学、理...
    • 3,967 篇 公共卫生与预防医...
  • 5,668 篇 法学
    • 4,705 篇 社会学
  • 3,423 篇 经济学
  • 2,557 篇 农学
  • 2,376 篇 教育学
  • 1,116 篇 文学
  • 424 篇 军事学
  • 370 篇 艺术学
  • 60 篇 哲学
  • 38 篇 历史学

主题

  • 9,212 篇 computer science
  • 4,763 篇 accuracy
  • 4,275 篇 feature extracti...
  • 4,181 篇 computational mo...
  • 3,893 篇 deep learning
  • 3,833 篇 machine learning
  • 3,426 篇 training
  • 2,900 篇 data mining
  • 2,631 篇 artificial intel...
  • 2,460 篇 support vector m...
  • 2,434 篇 optimization
  • 2,286 篇 predictive model...
  • 2,142 篇 algorithm design...
  • 2,141 篇 internet of thin...
  • 2,126 篇 wireless sensor ...
  • 2,113 篇 computer archite...
  • 2,030 篇 educational inst...
  • 1,996 篇 protocols
  • 1,901 篇 semantics
  • 1,888 篇 data models

机构

  • 4,993 篇 department of co...
  • 2,105 篇 college of compu...
  • 1,136 篇 university of ch...
  • 1,083 篇 cavendish labora...
  • 987 篇 department of ph...
  • 913 篇 oliver lodge lab...
  • 912 篇 physikalisches i...
  • 816 篇 department of el...
  • 669 篇 department of el...
  • 653 篇 department of co...
  • 577 篇 infn sezione di ...
  • 556 篇 infn laboratori ...
  • 550 篇 infn sezione di ...
  • 549 篇 department of co...
  • 547 篇 chitkara univers...
  • 527 篇 infn sezione di ...
  • 521 篇 horia hulubei na...
  • 510 篇 department of ph...
  • 509 篇 fakultät physik ...
  • 502 篇 school of physic...

作者

  • 258 篇 barter w.
  • 247 篇 j. wang
  • 243 篇 cai h.
  • 232 篇 a. gomes
  • 231 篇 s. chen
  • 230 篇 blake t.
  • 226 篇 c. alexa
  • 224 篇 bellee v.
  • 223 篇 j. m. izen
  • 222 篇 betancourt c.
  • 222 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 220 篇 borsato m.
  • 218 篇 brundu d.
  • 216 篇 boettcher t.
  • 213 篇 beiter a.
  • 211 篇 c. amelung
  • 210 篇 g. bella
  • 210 篇 j. strandberg
  • 210 篇 d. calvet

语言

  • 183,399 篇 英文
  • 21,723 篇 其他
  • 2,957 篇 中文
  • 100 篇 日文
  • 49 篇 德文
  • 40 篇 斯洛文尼亚文
  • 33 篇 法文
  • 18 篇 朝鲜文
  • 12 篇 俄文
  • 5 篇 西班牙文
  • 4 篇 阿拉伯文
  • 2 篇 捷克文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 土耳其文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer Science and Technology Changchun University of Science and Technology"
208003 条 记 录,以下是631-640 订阅
排序:
Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3397-3416页
作者: Umi Salma Basha Shashi Kant Gupta Wedad Alawad SeongKi Kim Salil Bharany Computer Science and Information Technology Jazan UniversityJazanSaudi Arabia CSE Eudoxia Research UniversityNew CastleUSA Department of Information Technology College of Computer ScienceQassim UniversityBuraydahSaudi Arabia National Center of Excellence in Software Sangmyung UniversitySeoulKorea Department of Computer Science and Engineering Lovely Professional UniversityPhagwaraPunjabIndia
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconc... 详细信息
来源: 评论
Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1311-1328页
作者: Arslan Akram Imran Khan Javed Rashid Mubbashar Saddique Muhammad Idrees Yazeed Yasin Ghadi Abdulmohsen Algarni Faculty of Computer Science and Information Technology Department of Computer ScienceSuperior UniversityLahore54000Pakistan Machine Learning Code(MLC)Lab Meharban HouseHouse Number 209Zafar ColonyOkara56300Pakistan Information Technology Services University of OkaraOkara56310Pakistan Department of Computer Science&Engineering University of Engineering&Technology LahoreNarowal CampusNarowal51601Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain11671Abu Dhabi Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information... 详细信息
来源: 评论
A Neural Computing-Based Access Control Protocol for AI-Driven Intelligent Flying Vehicles in Industry 5.0-Assisted Consumer Electronics
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 3573-3581页
作者: Mahmood, Khalid Tariq, Tayyaba Sangaiah, Arun Kumar Ghaffar, Zahid Saleem, Muhammad Asad Shamshad, Salman National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan National Yunlin University of Science and Technology International Graduate School of AI Douliu64002 Taiwan Lebanese American University Department of Electrical and Computer Engineering Byblos1102 2801 Lebanon University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China The University of Lahore Department of Software Engineering Lahore54590 Pakistan
The continuous revolution in Artificial Intelligence (AI) has played a significant role in the development of key consumer applications, including Industry 5.0, autonomous decision-making, fault diagnosis, etc. In pra... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
A fast and highly scalable frequent pattern mining algorithm
收藏 引用
Future Generation computer Systems 2024年 160卷 854-868页
作者: Cheng, Wan-Shu Lin, Yi-Ting Huang, Peng-Yu Chen, Ju-Chin Lin, Kawuu W. Department of Computer Science and Information Management Providence University Taichung Taiwan Department of Computer Science and Information Engineering National Kaohsiung University of Science and Technology Kaohsiung Taiwan
As the use of big data and its potential benefits become more widespread, public and private organizations around the world have realized the imperative of incorporating comprehensive and robust technologies into thei... 详细信息
来源: 评论
A Correlated Data-Driven Collaborative Beamforming Approach for Energy-Efficient IoT Data Transmission
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 22443-22462页
作者: Li, Yangning Kang, Hui Li, Jiahui Sun, Geng Sun, Zemin Wang, Jiacheng Zhao, Changyuan Niyato, Dusit Jilin University College of Computer Science and Technology Changchun130012 China Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Changchun130012 China Nanyang Technological University College of Computing and Data Science 639798 Singapore
An expansion of Internet of Things (IoTs) has led to significant challenges in wireless data harvesting, dissemination, and energy management due to the massive volumes of data generated by IoT devices. These challeng... 详细信息
来源: 评论
The use of knapsack 0/1 in prioritizing software requirements and Markov chain to predict software success
收藏 引用
International Journal of Information technology (Singapore) 2024年 第3期16卷 1967-1979页
作者: Armah, Isaac Aduhene Hayfron-Acquah, James Ben Takyi, Kate Gyening, Rose-Mary Owusuaa Mensah Eshun, Michael Department of Computer Science Kwame Nkrumah University of Science and Technology Kumasi Ghana
Requirements prioritization is one of the most valuable aspects of software engineering. This is primarily due to the fact that resources, be it time, skillset, or budget, are limited. Existing complex methodologies, ... 详细信息
来源: 评论
Score Calculation with Local and Global Features for Visual Place Recognition
Score Calculation with Local and Global Features for Visual ...
收藏 引用
2024 IEEE Region 10 Conference, TENCON 2024
作者: Ikeda, Iori Adachi, Miho Miyamoto, Ryusuke Graduate School of Science and Technology Department of Computer Science Japan School of Science and Technology Meiji University Department of Computer Science Kawasaki Japan
Visual place recognition (VPR) seems effective for the localization process in visual navigation of a robot because a robot can recognize locations and poses using only visual information if the accuracy of VPR is suf... 详细信息
来源: 评论
Lifetime Maximization Using Grey Wolf Optimization Routing Protocol with Statistical Technique in WSNs
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2023年 第5期47卷 75-82页
作者: Khudor, Baida'a Abdul Qader Hussein, Dheyaa Mezaal Kheerallah, Yousif Abdulwahab Alkenani, Jawad Alshawi, Imad S. Department of Computer Science College of Computer Science and Information Technology University of Basrah Basrah Iraq University of Technology Office of the President of the University Basra Iraq Department of Computer Science Shatt Al-Arab University College Basra Iraq
The main challenge in Wireless Sensor Networks (WSNs) is to maximize the lifespan of sensor nodes powered by low-cost batteries with limited power. Energy conservation is crucial, and routing mechanisms play a vital r... 详细信息
来源: 评论
Improving Robustness of Time-Aware Shaper in Time-Sensitive Networking
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 25211-25223页
作者: Ma, Yanying Zhang, Tong Feng, XiaoQin Liu, Ping Yang, Hao Ren, Fengyuan Lanzhou University School of Information Science and Engineering Lanzhou730000 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing211106 China School of Information Science and Engineering Lanzhou China Tsinghua University Department of Computer Science and Technology Lanzhou Beijing730000 and 100084 China
Deterministic delivery of scheduled traffic (ST) is critical in time-sensitive networking (TSN). The time-aware shaper (TAS) defined by IEEE 802.1Qbv is the enabler to ensure deterministic end-to-end delays of ST flow... 详细信息
来源: 评论