咨询与建议

限定检索结果

文献类型

  • 157,141 篇 会议
  • 65,116 篇 期刊文献
  • 1,738 册 图书
  • 2 篇 科技报告

馆藏范围

  • 223,997 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 128,730 篇 工学
    • 81,680 篇 计算机科学与技术...
    • 65,719 篇 软件工程
    • 33,336 篇 信息与通信工程
    • 21,569 篇 控制科学与工程
    • 20,950 篇 电气工程
    • 20,296 篇 电子科学与技术(可...
    • 14,289 篇 生物工程
    • 11,574 篇 生物医学工程(可授...
    • 10,818 篇 光学工程
    • 9,299 篇 机械工程
    • 7,981 篇 动力工程及工程热...
    • 7,803 篇 化学工程与技术
    • 7,748 篇 仪器科学与技术
    • 6,730 篇 材料科学与工程(可...
    • 5,157 篇 网络空间安全
    • 5,071 篇 安全科学与工程
  • 73,192 篇 理学
    • 34,806 篇 数学
    • 25,953 篇 物理学
    • 16,156 篇 生物学
    • 11,215 篇 统计学(可授理学、...
    • 8,559 篇 系统科学
    • 8,301 篇 化学
  • 31,826 篇 管理学
    • 20,134 篇 管理科学与工程(可...
    • 12,942 篇 图书情报与档案管...
    • 9,576 篇 工商管理
  • 11,295 篇 医学
    • 9,431 篇 临床医学
    • 8,456 篇 基础医学(可授医学...
    • 5,296 篇 药学(可授医学、理...
    • 4,717 篇 公共卫生与预防医...
  • 5,943 篇 法学
    • 4,828 篇 社会学
  • 3,902 篇 经济学
  • 2,894 篇 农学
  • 2,208 篇 教育学
  • 1,109 篇 文学
  • 511 篇 军事学
  • 277 篇 艺术学
  • 17 篇 哲学
  • 12 篇 历史学

主题

  • 5,896 篇 accuracy
  • 5,293 篇 computer science
  • 4,987 篇 feature extracti...
  • 4,813 篇 deep learning
  • 4,707 篇 computational mo...
  • 4,273 篇 machine learning
  • 3,892 篇 training
  • 3,055 篇 support vector m...
  • 2,851 篇 predictive model...
  • 2,839 篇 optimization
  • 2,798 篇 internet of thin...
  • 2,714 篇 convolutional ne...
  • 2,713 篇 real-time system...
  • 2,650 篇 wireless sensor ...
  • 2,492 篇 data mining
  • 2,473 篇 neural networks
  • 2,413 篇 bandwidth
  • 2,334 篇 computer archite...
  • 2,332 篇 artificial intel...
  • 2,061 篇 robustness

机构

  • 1,146 篇 department of el...
  • 1,080 篇 cavendish labora...
  • 979 篇 department of ph...
  • 926 篇 physikalisches i...
  • 924 篇 department of co...
  • 914 篇 oliver lodge lab...
  • 836 篇 department of el...
  • 771 篇 university of ch...
  • 743 篇 department of co...
  • 667 篇 department of co...
  • 622 篇 chitkara univers...
  • 587 篇 infn sezione di ...
  • 564 篇 infn sezione di ...
  • 561 篇 infn laboratori ...
  • 532 篇 horia hulubei na...
  • 531 篇 infn sezione di ...
  • 523 篇 school of physic...
  • 516 篇 school of physic...
  • 512 篇 department of ph...
  • 510 篇 h.h. wills physi...

作者

  • 250 篇 barter w.
  • 250 篇 a. gomes
  • 247 篇 j. wang
  • 240 篇 c. alexa
  • 240 篇 s. chen
  • 238 篇 j. m. izen
  • 227 篇 blake t.
  • 223 篇 g. bella
  • 221 篇 j. strandberg
  • 221 篇 c. amelung
  • 221 篇 bellee v.
  • 220 篇 d. calvet
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 beiter a.
  • 217 篇 borsato m.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 211 篇 brundu d.
  • 208 篇 bencivenni g.

语言

  • 209,340 篇 英文
  • 11,990 篇 其他
  • 2,663 篇 中文
  • 170 篇 日文
  • 25 篇 法文
  • 24 篇 德文
  • 24 篇 朝鲜文
  • 21 篇 斯洛文尼亚文
  • 17 篇 土耳其文
  • 6 篇 阿拉伯文
  • 5 篇 俄文
  • 4 篇 荷兰文
  • 3 篇 爱沙尼亚文
  • 3 篇 意大利文
  • 2 篇 西班牙文
  • 1 篇 捷克文
  • 1 篇 葡萄牙文
  • 1 篇 泰文
检索条件"机构=Department of Computer and Technology Engineering"
223997 条 记 录,以下是561-570 订阅
排序:
A Framework for Privacy-Preserving Multiparty Computation with Homomorphic Encryption and Zero-Knowledge Proofs
收藏 引用
Informatica (Slovenia) 2024年 第21期48卷 1-13页
作者: Dhokrat, Janak Pulgam, Namita Maktum, Tabassum Mane, Vanita Department of Computer Engineering Ramrao Adik Institute of Technology D Y Patil Deemed to be University Maharashtra Navi Mumbai India Department of Computer Engineering School of Engineering & Technology Anjuman I Islam’s Kalsekar Technical Campus Maharashtra New Panvel India
In digital landscape of today’s ongoing world the imperative for enhanced security in cloud-based data processing is paramount. This paper introduces an innovative framework that seamlessly integrates Homomorphic Enc... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
Science China(Information Sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
Multi-Scale Time Series Segmentation Network Based on Eddy Current Testing for Detecting Surface Metal Defects
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第3期12卷 528-538页
作者: Xiaorui Li Xiaojuan Ban Haoran Qiao Zhaolin Yuan Hong-Ning Dai Chao Yao Yu Guo Mohammad S.Obaidat George Q.Huang the School of Intelligence Science and Technology University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering the Key Laboratory of Intelligent Bionic Unmanned Systems and the Institute of Materials Intelligent Technology Liaoning Academy of Materials IEEE the Department of Computer Science Hong Kong Baptist University the School of Computer and Communication Engineering Key Laboratory of Advanced Materials and Devices for Post-Moore Chips Ministry of Education University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering University of Science and Technology Beijing the School of Computer and Communication Engineering University of Science and Technology Beijing the King Abdullah Ⅱ School of Information Technology The University of Jordan the Department of Computational Intelligence the School of Computing SRM University the School of Engineering The Amity University The Hong Kong Polytechnic University
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh env... 详细信息
来源: 评论
Medical Image Classification Using DL-based Feature Extraction in IoMT
收藏 引用
Recent Patents on engineering 2024年 第9期18卷 e220223213881-e220223213881页
作者: Thimmapuram, Madhuri Salvadi, Shoba Rani Pallati, Narsimhulu Aluvalu, Rajanikanth Department of Information Technology Chaitanya Bharathi Institute of Technology Telangana Hyderabad India Department of Computer Science & Engineering Chaitanya Bharathi Institute of Technology Telangana Hyderabad India
Aim: Recent advances in Artificial Intelligence (AI) and the addition of Deep Learning (DL) have made it possible to analyse both real-time and historical data from the Internet of Things (IoT). Recently, IoT technolo... 详细信息
来源: 评论
A Novel Enhanced Approach for Security and Privacy Preserving in IoT Devices with Federal Learning Technique
收藏 引用
SN computer Science 2024年 第6期5卷 750页
作者: Moeed, Syed Abdul Karnati, Ramesh Ashmitha, G. Mohammad, Gouse Baig Mohanty, Sachi Nandan Department of Computer Science and Engineering Kakatiya Institute of Technology and Science Department of Computer Science and Engineering Vardhaman College of Engineering School of Computer Science & amp Engineering (SCOPE) VIT-AP University
The Internet of Things (IoT) has revolutionized our lives, but it has also introduced significant security and privacy challenges. The vast amount of data collected by these devices, often containing sensitive informa... 详细信息
来源: 评论
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3867-3889页
作者: Dahyeon Kim Namgi Kim Junho Ahn Computer Information Technology Korea National University of TransportationChungju27469Korea Department of AI Computer Science and Engineering Kyonggi UniversitySuwon16227Korea
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world ***... 详细信息
来源: 评论
REGAC: Multi-Class Offensive Content Identification Using Graphical Approach
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer Science 2025年 第4期52卷 931-952页
作者: Chinivar, Sneha Roopa, M.S. Arunalatha, J.S. Venugopal, K.R. Department of Computer Science and Engineering Bangalore University K R Circle Karnataka Bengaluru India Department of Computer Science and Engineering Nitte Meenakshi Institute of Technology Karnataka Bengaluru India Department of Computer Science and Engineering Bangalore University K R Circle Karnataka Bengaluru India Karnataka Bengaluru India
Online offensive behaviour continues to rise with the increasing popularity and use of social media. Various techniques have been used to address this issue. However, most existing studies consider offensive content i... 详细信息
来源: 评论
Deep-BERT:Transfer Learning for Classifying Multilingual Offensive Texts on Social Media
收藏 引用
computer Systems Science & engineering 2023年 第2期44卷 1775-1791页
作者: Md.Anwar Hussen Wadud M.F.Mridha Jungpil Shin Kamruddin Nur Aloke Kumar Saha Department of Computer Science and Engineering Bangladesh University of Business and TechnologyDhakaBangladesh School of Computer Science and Engineering University of AizuAizuwakamatsuJapan Department of Computer Science American International University-BangladeshDhakaBangladesh Department of Computer Science and Engineering University of Asia PacificDhakaBangladesh
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a uni... 详细信息
来源: 评论
DeepVNE: Deep Reinforcement and Graph Convolution Fusion for Virtual Network Embedding  16
DeepVNE: Deep Reinforcement and Graph Convolution Fusion for...
收藏 引用
16th International Conference on COMmunication Systems and NETworkS, COMSNETS 2024
作者: Keerthan Kumar, T.G. Kb, Aneesh Siddheshwar, Anagha Marali, Amulya Kamath, Anupama Koolagudi, S.G. Addya, Sourav Kanti National Institute of Technology Department of Computer Science and Engineering Karnataka India Siddaganga Institute of Technology Department of Computer Science and Engineering India Pes University Department of Computer Science and Engineering India
Network virtualization (NV) plays a crucial role in modern network management. One of the fundamental challenges in NV is allocating physical network (PN) resources to the demands of the virtual network requests (VNRs... 详细信息
来源: 评论
An Efficient Framework for Utilizing Underloaded Servers in Compute Cloud
收藏 引用
computer Systems Science & engineering 2023年 第1期44卷 143-156页
作者: M.Hema S.Kanaga Suba Raja Department of Information Technology Easwari Engineering CollegeChennai600089India Department of Computer Science and Engineering Easwari Engineering CollegeChennai600089India
In cloud data centers,the consolidation of workload is one of the phases during which the available hosts are allocated *** phenomenon ensures that the least possible number of hosts is used without compromise in meet... 详细信息
来源: 评论