咨询与建议

限定检索结果

文献类型

  • 200,118 篇 会议
  • 97,543 篇 期刊文献
  • 2,366 册 图书

馆藏范围

  • 300,027 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 178,357 篇 工学
    • 115,762 篇 计算机科学与技术...
    • 93,500 篇 软件工程
    • 44,758 篇 信息与通信工程
    • 27,310 篇 控制科学与工程
    • 24,942 篇 电子科学与技术(可...
    • 24,354 篇 电气工程
    • 19,322 篇 生物工程
    • 15,029 篇 生物医学工程(可授...
    • 14,621 篇 光学工程
    • 12,937 篇 机械工程
    • 11,046 篇 化学工程与技术
    • 10,527 篇 仪器科学与技术
    • 9,584 篇 动力工程及工程热...
    • 8,804 篇 材料科学与工程(可...
    • 6,427 篇 网络空间安全
    • 6,371 篇 安全科学与工程
    • 5,988 篇 交通运输工程
  • 101,976 篇 理学
    • 49,305 篇 数学
    • 35,487 篇 物理学
    • 21,996 篇 生物学
    • 15,763 篇 统计学(可授理学、...
    • 11,444 篇 化学
    • 11,145 篇 系统科学
  • 45,705 篇 管理学
    • 28,127 篇 管理科学与工程(可...
    • 19,335 篇 图书情报与档案管...
    • 12,823 篇 工商管理
  • 14,631 篇 医学
    • 12,258 篇 临床医学
    • 10,798 篇 基础医学(可授医学...
    • 6,773 篇 药学(可授医学、理...
  • 7,959 篇 法学
    • 6,421 篇 社会学
  • 5,111 篇 经济学
  • 4,078 篇 农学
  • 3,229 篇 教育学
  • 1,415 篇 文学
  • 758 篇 军事学
  • 444 篇 艺术学
  • 50 篇 哲学
  • 31 篇 历史学

主题

  • 9,641 篇 computer science
  • 6,933 篇 accuracy
  • 6,693 篇 feature extracti...
  • 5,884 篇 deep learning
  • 5,771 篇 computational mo...
  • 5,280 篇 machine learning
  • 5,194 篇 training
  • 4,103 篇 data mining
  • 3,855 篇 support vector m...
  • 3,648 篇 optimization
  • 3,466 篇 predictive model...
  • 3,459 篇 wireless sensor ...
  • 3,388 篇 internet of thin...
  • 3,110 篇 artificial intel...
  • 3,069 篇 real-time system...
  • 3,013 篇 neural networks
  • 3,013 篇 convolutional ne...
  • 2,876 篇 bandwidth
  • 2,861 篇 protocols
  • 2,855 篇 algorithm design...

机构

  • 1,689 篇 department of co...
  • 1,346 篇 department of co...
  • 1,142 篇 university of ch...
  • 1,050 篇 physikalisches i...
  • 1,039 篇 cavendish labora...
  • 971 篇 department of ph...
  • 871 篇 infn laboratori ...
  • 860 篇 oliver lodge lab...
  • 813 篇 department of el...
  • 809 篇 department of el...
  • 786 篇 infn sezione di ...
  • 709 篇 school of comput...
  • 628 篇 department of el...
  • 617 篇 department of co...
  • 615 篇 infn sezione di ...
  • 546 篇 chitkara univers...
  • 533 篇 nikhef national ...
  • 517 篇 infn sezione di ...
  • 485 篇 department of co...
  • 484 篇 university of sc...

作者

  • 247 篇 j. wang
  • 242 篇 barter w.
  • 234 篇 niyato dusit
  • 230 篇 s. chen
  • 223 篇 a. gomes
  • 213 篇 bellee v.
  • 212 篇 blake t.
  • 209 篇 bowcock t.j.v.
  • 209 篇 y. zhang
  • 203 篇 borsato m.
  • 203 篇 betancourt c.
  • 201 篇 beiter a.
  • 199 篇 c. alexa
  • 199 篇 brundu d.
  • 197 篇 j. m. izen
  • 194 篇 amato s.
  • 186 篇 c. amelung
  • 185 篇 g. bella
  • 185 篇 j. strandberg
  • 184 篇 d. calvet

语言

  • 285,978 篇 英文
  • 9,477 篇 其他
  • 4,379 篇 中文
  • 354 篇 日文
  • 52 篇 朝鲜文
  • 37 篇 德文
  • 33 篇 法文
  • 21 篇 斯洛文尼亚文
  • 9 篇 荷兰文
  • 7 篇 俄文
  • 5 篇 土耳其文
  • 3 篇 阿拉伯文
  • 1 篇 加泰罗尼亚文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Information Technology and Computer Science and Engineering"
300027 条 记 录,以下是81-90 订阅
排序:
Biometrics 2.0 for the Security of Smart Cities
收藏 引用
Machine Intelligence Research 2024年 第6期21卷 1121-1144页
作者: Wei Jia Zhecheng Zhang Yang Zhao Hai Min Shujie Li School of Computer Science and Information Engineering Hefei University of TechnologyHefei230009China
In modern society,an increasing number of occasions need to effectively verify people's *** is the most ef-fective technology for personal *** research on automated biometrics recognition mainly started in the 196... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
CVTD: A Robust Car-Mounted Video Text Detector
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1821-1842页
作者: Di Zhou Jianxun Zhang Chao Li Yifan Guo Bowen Li Department of Computer Science and Engineering Chongqing University of TechnologyChongqingChina College of Information and Engineering Jingdezhen Ceramic UniversityJingdezhenChina
Text perception is crucial for understanding the semantics of outdoor scenes,making it a key requirement for building intelligent systems for driver assistance or autonomous *** information in car-mounted videos can a... 详细信息
来源: 评论
A learning automata based edge resource allocation approach for IoT-enabled smart cities
收藏 引用
Digital Communications and Networks 2024年 第5期10卷 1258-1266页
作者: Sampa Sahoo Kshira Sagar Sahoo Bibhudatta Sahoo Amir H.Gandomi Department of Computer Science and Engineering C.V.Raman Global UniversityBhubaneswarIndia Department of Computer Science and Engineering SRM UniversityAmaravatiIndia Department of Computing Science Umea UniversityUmea90187Sweden Department of Computer Science and Engineering NIT RourkelaIndia Faculty of Engineering and Information Technology University of Technology SydneyAustralia University Research and Innovation Center(EKIK) Obuda University1034 BudapestHungary
The development of the Internet of Things(IoT)technology is leading to a new era of smart applications such as smart transportation,buildings,and smart ***,these applications act as the building blocks of IoT-enabled ... 详细信息
来源: 评论
Exploring Personalized Internet of Things(PIoT),social connectivity,and Artificial Social Intelligence(ASI):A survey
收藏 引用
High-Confidence Computing 2024年 第3期4卷 136-162页
作者: Bisma Gulzar Shabir Ahmad Sofi Sahil Sholla Department of Information Technology National Institute of TechnologySrinagar 190001India Department of Computer Science and Engineering Islamic University of Science and TechnologyGazipur 1700India
Pervasive Computing has become more personal with the widespread adoption of the Internet of Things(IoT)in our day-to-day *** emerging domain that encompasses devices,sensors,storage,and computing of personal use and ... 详细信息
来源: 评论
MLRT-UNet:An Efficient Multi-Level Relation Transformer Based U-Net for Thyroid Nodule Segmentation
收藏 引用
computer Modeling in engineering & sciences 2025年 第4期143卷 413-448页
作者: Kaku Haribabu Prasath R Praveen Joe IR Department of Computer Science and Engineering RMK College of Engineering and TechnologyTiruvallur601206India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India
Thyroid nodules,a common disorder in the endocrine system,require accurate segmentation in ultrasound images for effective diagnosis and ***,achieving precise segmentation remains a challenge due to various factors,in... 详细信息
来源: 评论
Video forgery localization using inter-frame denoising and intra-frame segmentation
收藏 引用
Multimedia Tools and Applications 2025年 1-17页
作者: Banerjee, Debanik Chittaragi, Nagaratna B. Koolagudi, Shashidhar G. Department of Computer Science and Engineering National Institute of Technology Karnataka Karnataka Surathkal575025 India Department of Information Science and Engineering Siddaganaga Institute of Technology Karnataka Tumkur572103 India
Video forgery detection has been necessary with recent spurt in fake videos like Deepfakes and doctored videos from multiple video capturing devices. In this paper, we provide a novel technique of detecting fake video... 详细信息
来源: 评论
Per-user network access control kernel module with secure multifactor authentication
收藏 引用
Journal of Supercomputing 2024年 第1期80卷 970-1008页
作者: Cheng, Sheng-Tzong Horng, Gwo-Jiun Hsu, Chih-Wei Su, Z.-Yu Department of Computer Science and Information Engineering National Cheng Kung University Tainan701 Taiwan Department of Computer Science and Information Engineering Southern Taiwan University of Science and Technology Tainan Taiwan
Network attacks, such as botnets stealing sensitive data, constitute a critical concern for administrators in the Internet area. Such attacks can be prevented using a network access control (NAC) scheme. However, exis... 详细信息
来源: 评论
An ensembled-deep-learning paradigm trained with a self-improved coyote optimization algorithm (SI-COA) for crop disease detection
收藏 引用
Multimedia Tools and Applications 2025年 第4期84卷 1697-1724页
作者: Shukla, Preeti Chandanan, Amit Kumar Department of Computer Science and Information Technology Guru Ghasidas Vishwavidyalaya CG Bilaspur India Department of Computer Science & Engineering Guru Ghasidas Vishwavidyalaya CG Bilaspur India
In recent times, drastic climate changes have caused a substantial increase in the growth of crop diseases. This causes large-scale demolition of crops, decreases cultivation, and eventually leads to the financial los... 详细信息
来源: 评论
MOHSQO: Multi objective harmony search algorithm based QoS optimization in delay tolerant networks
收藏 引用
Multimedia Tools and Applications 2025年 1-26页
作者: Sonkar, Nidhi Pandey, Sudhakar Kumar, Sanjay Department of Computer Science and Engineering National Institute of Technology Warangal Hanamkonda India Department of Information Technology National Institute of Technology Raipur Raipur India
Delay Tolerant Networks (DTNs) have the ability to make communication possible without end-to-end connectivity using store-carry-forward technique. Efficient data dissemination in DTNs is very challenging problem due ... 详细信息
来源: 评论