咨询与建议

限定检索结果

文献类型

  • 30,355 篇 会议
  • 18,622 篇 期刊文献
  • 635 册 图书

馆藏范围

  • 49,612 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28,395 篇 工学
    • 17,856 篇 计算机科学与技术...
    • 14,502 篇 软件工程
    • 6,056 篇 信息与通信工程
    • 4,655 篇 控制科学与工程
    • 4,201 篇 电气工程
    • 3,711 篇 电子科学与技术(可...
    • 3,210 篇 生物工程
    • 2,813 篇 生物医学工程(可授...
    • 2,240 篇 机械工程
    • 2,085 篇 光学工程
    • 1,963 篇 化学工程与技术
    • 1,800 篇 仪器科学与技术
    • 1,737 篇 动力工程及工程热...
    • 1,335 篇 材料科学与工程(可...
    • 961 篇 安全科学与工程
    • 944 篇 交通运输工程
  • 18,204 篇 理学
    • 8,501 篇 数学
    • 6,821 篇 物理学
    • 3,787 篇 生物学
    • 2,678 篇 统计学(可授理学、...
    • 2,061 篇 化学
    • 2,000 篇 系统科学
  • 7,202 篇 管理学
    • 4,472 篇 管理科学与工程(可...
    • 2,986 篇 图书情报与档案管...
    • 2,265 篇 工商管理
  • 2,790 篇 医学
    • 2,375 篇 临床医学
    • 2,055 篇 基础医学(可授医学...
    • 1,296 篇 药学(可授医学、理...
    • 1,000 篇 公共卫生与预防医...
  • 1,188 篇 法学
    • 996 篇 社会学
  • 879 篇 经济学
  • 662 篇 农学
  • 633 篇 教育学
  • 145 篇 文学
  • 91 篇 军事学
  • 65 篇 艺术学
  • 9 篇 哲学
  • 6 篇 历史学

主题

  • 1,290 篇 computer science
  • 938 篇 accuracy
  • 935 篇 deep learning
  • 841 篇 machine learning
  • 771 篇 computational mo...
  • 754 篇 feature extracti...
  • 716 篇 training
  • 624 篇 artificial intel...
  • 581 篇 internet of thin...
  • 524 篇 optimization
  • 513 篇 support vector m...
  • 415 篇 predictive model...
  • 402 篇 neural networks
  • 388 篇 data mining
  • 371 篇 data models
  • 354 篇 mathematical mod...
  • 325 篇 convolutional ne...
  • 313 篇 testing
  • 300 篇 monitoring
  • 300 篇 real-time system...

机构

  • 1,094 篇 cavendish labora...
  • 1,024 篇 department of ph...
  • 981 篇 physikalisches i...
  • 972 篇 oliver lodge lab...
  • 647 篇 infn laboratori ...
  • 624 篇 infn sezione di ...
  • 604 篇 infn sezione di ...
  • 604 篇 infn sezione di ...
  • 601 篇 fakultät physik ...
  • 567 篇 university of ch...
  • 555 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 538 篇 department of ph...
  • 535 篇 school of physic...
  • 530 篇 iccub universita...
  • 522 篇 imperial college...
  • 518 篇 nikhef national ...
  • 516 篇 h.h. wills physi...
  • 512 篇 stfc rutherford ...
  • 509 篇 school of physic...

作者

  • 264 篇 barter w.
  • 261 篇 a. gomes
  • 250 篇 beiter a.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 243 篇 g. bella
  • 242 篇 j. strandberg
  • 240 篇 c. amelung
  • 238 篇 d. calvet
  • 237 篇 bellee v.
  • 236 篇 g. spigo
  • 236 篇 s. chen
  • 231 篇 bowcock t.j.v.
  • 230 篇 f. siegert
  • 228 篇 brundu d.
  • 227 篇 blake t.
  • 218 篇 y. tayalati
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 r. ströhmer

语言

  • 47,518 篇 英文
  • 1,628 篇 其他
  • 345 篇 中文
  • 109 篇 日文
  • 14 篇 德文
  • 11 篇 法文
  • 3 篇 荷兰文
  • 3 篇 俄文
  • 3 篇 斯洛文尼亚文
  • 2 篇 葡萄牙文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 泰文
检索条件"机构=Faculty of Computer Science and Computer Engineering"
49612 条 记 录,以下是271-280 订阅
排序:
Secure and Optimized Cloud Storage with Privacy Preservation using Improved SHA - 256  2
Secure and Optimized Cloud Storage with Privacy Preservation...
收藏 引用
2nd International Conference on Computational Intelligence, Communication Technology and Networking, CICTN 2025
作者: Joshi, Aditi Devarajan, Ganesh Gopal Karuppiah, Marimuthu Sharma, Yogesh Kumar Department of Computer Science and Engineering SRM Institute of Science and Technology Delhi NCR Campus Uttar Pradesh Ghaziabad201204 India Department of Computer Science and Engineering Faculty of Engineering and Technology SRM Institute of Science and Technology Delhi NCR Campus Uttar Pradesh Ghaziabad201204 India Presidency School of Computer Science and Engineering Presidency University Karnataka Bengaluru560064 India Department of CSE Dewan V S Institute of Technology U.P Meerut India
With the increased reliance of enterprises on cloud storage solutions for data management, maintaining safe and efficient storage while emphasizing privacy protection is crucial. With an emphasis on user privacy, this... 详细信息
来源: 评论
SPUFChain: Permissioned Blockchain Lightweight Authentication Scheme for Supply Chain Management Using PUF of IoT
收藏 引用
IEEE Access 2025年 13卷 88662-88682页
作者: Assaqty, Mohammad Iqbal Saryuddin Gao, Ying Alqarni, Abeer D. Khan, Siraj Chakraborty, Mohuya Siddiqi, Hafied Nur Ahmad, Sadique South China University of Technology School of Computer Science and Engineering Guangzhou510006 China Universitas Nahdlatul Ulama Indonesia Faculty of Engineering and Computer Science Jakarta10320 Indonesia College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Department of Information Technology PO Box 84428 Riyadh11671 Saudi Arabia Shenzhen University College of Computer Science & Software Engineering Shenzhen518060 China University of Engineering and Management Cybersecurity Centre of Excellence Kolkata700160 India Prince Sultan University EIAS Data Science and Blockchain Laboratory CCIS Riyadh12435 Saudi Arabia
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in ... 详细信息
来源: 评论
Feature Selection in Socio-Economic Analysis: A Multi-Method Approach for Accurate Predictive Outcomes
收藏 引用
International Journal of Crowd science 2025年 第1期9卷 64-78页
作者: Al-Qerem, Ahmad Ali, Ali Mohd Jebreen, Issam Nabot, Ahmad Rajab, Mohammed Alauthman, Mohammad Aldweesh, Amjad Aburub, Faisal Alangari, Someah Alzgol, Musab Computer Science Department Faculty of Information Technology Zarqa University Zarqa13110 Jordan Communications and Computer Engineering Department Faculty of Engineering Al-Ahliyya Amman University Amman19328 Jordan University Headquarter University of Anbar Ramadi31001 Iraq Department of Information Security University of Petra Amman11196 Jordan College of Computing and Information Technology Shaqra University Shaqra11911 Saudi Arabia Department of Business Intelligence and Data Analytics University of Petra Amman11196 Jordan Computer Information Systems Department Faculty of Information Technology Isra University Amman11622 Jordan
Feature selection is a cornerstone in advancing the accuracy and efficiency of predictive models, particularly in nuanced domains like socio-economic analysis. This study explores nine distinct feature selection metho... 详细信息
来源: 评论
Blockchain-Based Revocable Key-Aggregate Searchable Encryption for Group Data Sharing in Cloud-Assisted Industrial IoT
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16899-16911页
作者: Zhang, Kai Hu, Xinyi Zhao, Jian Wei, Lifei Ning, Jianting Shanghai University of Electric Power College of Computer Science and Technology Shanghai China Shanghai University of Electric Power College of Electrical Engineering Shanghai China Shanghai Maritime University College of Information Engineering Shanghai China Wuhan University School of Cyber Science and Engineering Wuhan430072 China City University of Macau Faculty of Data Science China
In the cloud-assisted Industrial Internet of Things (IIoT), flexible and secure data sharing promotes industry processes optimization and new products-making. To enable selective data retrieval over categorized data c... 详细信息
来源: 评论
Topology, Size, and Shape Optimization in Civil engineering Structures: A Review
收藏 引用
computer Modeling in engineering & sciences 2025年 第2期142卷 933-971页
作者: Ahmed Manguri Hogr Hassan Najmadeen Saeed Robert Jankowski Faculty of Civil and Environmental Engineering Gdansk University of TechnologyGdansk80-223Poland Department of Computer Science ModelingElectronics and Systems EngineeringUniversity of CalabriaCosenza87036Italy Civil Engineering Department University of RaparinRania46012Iraq Civil Engineering Department Tishk International UniversityErbil44001Iraq
The optimization of civil engineering structures is critical for enhancing structural performance and material efficiency in engineering *** optimization approaches seek to determine the optimal design,by considering ... 详细信息
来源: 评论
Effective Node Deployment in Wireless Sensor Networks Using Reinforcement Learning  14
Effective Node Deployment in Wireless Sensor Networks Using ...
收藏 引用
14th IEEE International Conference on Communication Systems and Network Technologies, CSNT 2025
作者: Priyadarshi, Rahul Teja, Panduranga Ravi Vishwakarma, Anish Kumar Ranjan, Rakesh Faculty of Engineering and Technology ITER SOA Bhubaneswar India School of Computer Science UPES Uttarakhand Dehradun India
Wireless Sensor Networks (WSNs) are vital for applications like environmental monitoring and smart cities, but effective node deployment remains challenging. Traditional methods often fail in dynamic scenarios. This p... 详细信息
来源: 评论
Physics-Informed Deep Neural Network for Low Sidelobe Time-Modulated Antenna Array Synthesis with Harmonic Suppression
收藏 引用
IEEE Access 2025年 13卷 84803-84810页
作者: Sallam, Tarek Wang, Qun Attiya, Ahmed M. Shandong Xiehe University School of Computer Science and Technology Shandong Jinan250109 China Benha University Faculty of Engineering at Shoubra Cairo Egypt Microwave Engineering Dept Cairo Egypt
This paper introduces an innovative approach utilizing a deep neural network (DNN) to optimize the modulation scheme for time-modulated antenna array to verify specific side lobe and maximum harmonics levels. The prop... 详细信息
来源: 评论
The impact of backbone selection in YOLOv8 models on brain tumor localization
收藏 引用
Iran Journal of computer science 2025年 1-23页
作者: Ranjbarzadeh, Ramin Crane, Martin Bendechache, Malika School of Computing Faculty of Engineering and Computing Dublin City University Dublin Ireland ADAPT Research Centre School of Computer Science University of Galway Galway Ireland
This study investigates the utilization of the You Only Look Once (YOLOv8) deep learning framework for accurately identifying the location of brain tumors in medical imaging. We investigate the effects of model size a... 详细信息
来源: 评论
Translator Chatbot in Cloud Environment Using Amazon Translate and Amazon Lex  8th
Translator Chatbot in Cloud Environment Using Amazon Transla...
收藏 引用
8th International Conference on Intelligent Technologies, ICIT 2023
作者: Prakash, Vijay Sachdeva, Vasu Bhatia, Sunpreet Garg, Lalit Faculty of ICT University of Malta Msida Malta Department of Computer Science and Engineering Graphic Era Hill University Dehradun India School of Computer Sciences University of Petroleum and Energy Studies Dehradun India
In today’s globalized world, people from different parts of the world often communicate with each other for various reasons, such as business, travel, or personal interactions. However, language differences can creat... 详细信息
来源: 评论
AI-driven intrusion prevention system: leveraging mathematical foundations for advanced threats detection
收藏 引用
International Journal of Information Technology (Singapore) 2025年 1-6页
作者: Vashistha, Avneesh Alghamdi, Tami Abdulrahman Almalki, Sultan Ahmed Ead, Waleed M. Kaur, Gaganpreet Department of Computer Science and Engineering SRM Institute of Science and Technology Delhi-NCR Campus Modinagar Ghaziabad India Computer Science Department Faculty of Computing and Information Al-Baha University Al-Baha Saudi Arabia Computer Department Applied College Najran University Najran Saudi Arabia Faculty of Computing and Information Al-Baha University Al-Baha Saudi Arabia Faculty of Computers and Artificial Intelligence Beni-Suef University Beni-Suef Egypt Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura India
The given paper introduces a multi-staged AI-driven intrusion prevention system (IPS) that utilizes mathematical foundations like statistical analysis, probabilistic models, and optimization techniques to design strat... 详细信息
来源: 评论