咨询与建议

限定检索结果

文献类型

  • 203,211 篇 会议
  • 98,712 篇 期刊文献
  • 2,379 册 图书

馆藏范围

  • 304,302 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 181,183 篇 工学
    • 117,774 篇 计算机科学与技术...
    • 94,561 篇 软件工程
    • 45,948 篇 信息与通信工程
    • 28,488 篇 控制科学与工程
    • 25,424 篇 电子科学与技术(可...
    • 25,122 篇 电气工程
    • 19,428 篇 生物工程
    • 15,187 篇 生物医学工程(可授...
    • 14,820 篇 光学工程
    • 13,249 篇 机械工程
    • 11,236 篇 化学工程与技术
    • 10,770 篇 仪器科学与技术
    • 9,810 篇 动力工程及工程热...
    • 9,044 篇 材料科学与工程(可...
    • 7,012 篇 网络空间安全
    • 6,625 篇 安全科学与工程
    • 6,258 篇 交通运输工程
  • 103,161 篇 理学
    • 49,779 篇 数学
    • 35,958 篇 物理学
    • 22,136 篇 生物学
    • 15,950 篇 统计学(可授理学、...
    • 11,763 篇 化学
    • 11,156 篇 系统科学
  • 46,563 篇 管理学
    • 28,753 篇 管理科学与工程(可...
    • 19,678 篇 图书情报与档案管...
    • 12,975 篇 工商管理
  • 15,058 篇 医学
    • 12,452 篇 临床医学
    • 10,914 篇 基础医学(可授医学...
    • 6,785 篇 药学(可授医学、理...
  • 8,130 篇 法学
    • 6,574 篇 社会学
  • 5,187 篇 经济学
  • 4,142 篇 农学
  • 3,317 篇 教育学
  • 1,454 篇 文学
  • 764 篇 军事学
  • 449 篇 艺术学
  • 51 篇 哲学
  • 30 篇 历史学

主题

  • 9,643 篇 computer science
  • 7,387 篇 accuracy
  • 6,892 篇 feature extracti...
  • 6,304 篇 deep learning
  • 5,976 篇 computational mo...
  • 5,476 篇 machine learning
  • 5,306 篇 training
  • 4,131 篇 data mining
  • 3,948 篇 support vector m...
  • 3,787 篇 optimization
  • 3,603 篇 predictive model...
  • 3,506 篇 internet of thin...
  • 3,463 篇 wireless sensor ...
  • 3,370 篇 real-time system...
  • 3,244 篇 convolutional ne...
  • 3,232 篇 artificial intel...
  • 3,066 篇 neural networks
  • 2,900 篇 bandwidth
  • 2,893 篇 computer archite...
  • 2,892 篇 protocols

机构

  • 1,705 篇 department of co...
  • 1,354 篇 department of co...
  • 1,179 篇 university of ch...
  • 1,055 篇 physikalisches i...
  • 1,044 篇 cavendish labora...
  • 976 篇 department of ph...
  • 874 篇 infn laboratori ...
  • 858 篇 oliver lodge lab...
  • 836 篇 department of el...
  • 802 篇 department of el...
  • 795 篇 infn sezione di ...
  • 723 篇 school of comput...
  • 631 篇 department of el...
  • 617 篇 infn sezione di ...
  • 615 篇 department of co...
  • 586 篇 chitkara univers...
  • 536 篇 nikhef national ...
  • 516 篇 infn sezione di ...
  • 510 篇 school of comput...
  • 493 篇 university of sc...

作者

  • 253 篇 niyato dusit
  • 247 篇 j. wang
  • 244 篇 barter w.
  • 229 篇 s. chen
  • 227 篇 a. gomes
  • 217 篇 blake t.
  • 212 篇 bellee v.
  • 210 篇 y. zhang
  • 205 篇 bowcock t.j.v.
  • 204 篇 borsato m.
  • 204 篇 betancourt c.
  • 200 篇 brundu d.
  • 199 篇 c. alexa
  • 197 篇 j. m. izen
  • 195 篇 amato s.
  • 193 篇 beiter a.
  • 187 篇 c. amelung
  • 185 篇 g. bella
  • 185 篇 j. strandberg
  • 185 篇 d. calvet

语言

  • 255,420 篇 英文
  • 44,346 篇 其他
  • 4,798 篇 中文
  • 358 篇 日文
  • 74 篇 德文
  • 65 篇 斯洛文尼亚文
  • 63 篇 法文
  • 55 篇 朝鲜文
  • 16 篇 俄文
  • 10 篇 阿拉伯文
  • 4 篇 土耳其文
  • 3 篇 捷克文
  • 2 篇 西班牙文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 波兰文
  • 1 篇 加泰罗尼亚文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Information Technology and Computer Science and Engineering"
304302 条 记 录,以下是811-820 订阅
排序:
Performance optimization in ddos prediction with ensemble based approach
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10631-10644页
作者: Dogra, Amit Taqdir Department of Computer Science and Engineering SoET BGSB University Rajouri India Department of Computer Science Engineering and Technology Guru Nanak Dev University Regional Campus Gurdaspur India
Distributed Denial of Service (DDoS) attacks pose a significant threat to network infrastructures, leading to service disruptions and potential financial losses. In this study, we propose an ensemble-based approach fo... 详细信息
来源: 评论
Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 2727-2740页
作者: Maryam Alhassan Abdul Raouf Khan Department of Computer Science College of Computer Science and Information TechnologyKing Faisal UniversityAlahssa31982Kingdom of Saudi Arabia
Preserving privacy is imperative in the new unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)architecture to ensure that sensitive information is protected and kept secure throughout the ***,efficiency ... 详细信息
来源: 评论
A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 2741-2757页
作者: Muhammad Usman Sana Zhanli Li Tayybah Kiren Hannan Bin Liaqat Shahid Naseem Atif Saeed College of Computer Science and Technology Xi’an University of Science and TechnologyXi’anShaanxi710054China Department of Computer Science(RCET Campus) University of Engineering and TechnologyLahore39161Pakistan Department of Information Sciences Division of Science&TechnologyUniversity of EducationLahore54700Pakistan Department of Computer Science COMSATS UniversityIslamabadLahore54700Pakistan
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt... 详细信息
来源: 评论
Predicting early ASD traits of adults and toddlers using machine learning and deep learning with explainable AI and optimization
收藏 引用
Neural Computing and Applications 2025年 1-28页
作者: Rahman, Md. Ashiqur Hossain, Md. Mamun Singh, Sondip Poul Sharmin, Nusrat Dhaka1216 Bangladesh Department of Computer Science and Engineering Military Institute of Science and Technology Dhaka Bangladesh
Autism spectrum disorder (ASD) is a complex neurodevelopmental condition characterized by challenges in social interaction, communication difficulties, repetitive behaviors, and a range of strengths and differences in... 详细信息
来源: 评论
An efficient multi-objective task scheduling in edge computing using adaptive honey badger optimisation
收藏 引用
International Journal of Web engineering and technology 2024年 第2期19卷 110-126页
作者: Nagalakshmi, Bantupalli Subramanian, Sumathy School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore632014 India
Task scheduling, which is important in cloud computing, is one of the most challenging issues in this area. Hence, an efficient and reliable task scheduling approach is needed to produce more efficient resource employ... 详细信息
来源: 评论
Infrared Action Recognition Model Based on Improved ST-GCN
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2025年 第6期52卷 1664-1671页
作者: Zhu, Xiaoliang Zhou, Ziwei School of Electronic Information University of Science and Technology Liaoning Anshan114051 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan114051 China
Infrared imaging technology is capable of capturing the thermal radiation emitted by the human body in conditions with insufficient visible light. Consequently, infrared behavior recognition leverages this capability ... 详细信息
来源: 评论
Analysis of Watermarked Video Optimization and Training Based on Classification Using Deep Learning Techniques
收藏 引用
SN computer science 2024年 第2期5卷 220页
作者: Muthulakshmi, K. Valarmathi, K. Department of Information Technology Panimalar Engineering College Chennai India Department of Computer Science and Engineering Panimalar Engineering College Chennai India
The exchange of multimedia data is secured using watermarking. Typically, embedding a watermark involves optimising scheme parameters, frequently by using meta-heuristic optimization methods. Despite the fact that DNN... 详细信息
来源: 评论
AnyComputing: A Novel Architecture for Orchestrating Various Computing Paradigms for Adaptive Workload Management  21
AnyComputing: A Novel Architecture for Orchestrating Various...
收藏 引用
21st International Conference on Electrical engineering, Computing science and Automatic Control, CCE 2024
作者: Taghizadeh, Seyedreza Yousefi, Sara Engineering and Information Technology Shiraz University Department of Computer Science Shiraz Iran
The proliferation of physical objects and intelligent systems, along with their inherent differences, such as levels of device mobility, generated data volume, required storage memory, and complexity in data processin... 详细信息
来源: 评论
A Transfer Learning Framework for Deep Multi-Agent Reinforcement Learning
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2346-2348页
作者: Yi Liu Xiang Wu Yuming Bo Jiacun Wang Lifeng Ma the School of Automation Nanjing University of Science and Technology the Department of Computer Science and Software Engineering Monmouth University
Dear Editor,This letter presents a new transfer learning framework for the deep multi-agent reinforcement learning(DMARL) to reduce the convergence difficulty and training time when applying DMARL to a new scenario [1... 详细信息
来源: 评论
Hybrid Deep Learning Based Attack Detection for Imbalanced Data Classification
收藏 引用
Intelligent Automation & Soft Computing 2023年 第1期35卷 297-320页
作者: Rasha Almarshdi Laila Nassef Etimad Fadel Nahed Alowidi Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science Faculty of Computer Science and EngineeringUniversity of HailHailSaudi Arabia
Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designe... 详细信息
来源: 评论