咨询与建议

限定检索结果

文献类型

  • 30,363 篇 会议
  • 18,983 篇 期刊文献
  • 631 册 图书

馆藏范围

  • 49,977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28,692 篇 工学
    • 18,023 篇 计算机科学与技术...
    • 14,584 篇 软件工程
    • 6,165 篇 信息与通信工程
    • 4,715 篇 控制科学与工程
    • 4,336 篇 电气工程
    • 3,773 篇 电子科学与技术(可...
    • 3,220 篇 生物工程
    • 2,826 篇 生物医学工程(可授...
    • 2,281 篇 机械工程
    • 2,110 篇 光学工程
    • 1,998 篇 化学工程与技术
    • 1,824 篇 仪器科学与技术
    • 1,762 篇 动力工程及工程热...
    • 1,399 篇 材料科学与工程(可...
    • 972 篇 安全科学与工程
    • 955 篇 交通运输工程
  • 18,397 篇 理学
    • 8,558 篇 数学
    • 6,922 篇 物理学
    • 3,822 篇 生物学
    • 2,697 篇 统计学(可授理学、...
    • 2,108 篇 化学
    • 2,006 篇 系统科学
  • 7,250 篇 管理学
    • 4,498 篇 管理科学与工程(可...
    • 3,008 篇 图书情报与档案管...
    • 2,269 篇 工商管理
  • 2,834 篇 医学
    • 2,396 篇 临床医学
    • 2,075 篇 基础医学(可授医学...
    • 1,298 篇 药学(可授医学、理...
    • 1,012 篇 公共卫生与预防医...
  • 1,197 篇 法学
    • 1,003 篇 社会学
  • 884 篇 经济学
  • 667 篇 农学
  • 642 篇 教育学
  • 147 篇 文学
  • 91 篇 军事学
  • 66 篇 艺术学
  • 9 篇 哲学
  • 6 篇 历史学

主题

  • 1,291 篇 computer science
  • 956 篇 deep learning
  • 940 篇 accuracy
  • 858 篇 machine learning
  • 775 篇 computational mo...
  • 760 篇 feature extracti...
  • 722 篇 training
  • 640 篇 artificial intel...
  • 584 篇 internet of thin...
  • 527 篇 optimization
  • 512 篇 support vector m...
  • 420 篇 predictive model...
  • 405 篇 neural networks
  • 390 篇 data mining
  • 373 篇 data models
  • 354 篇 mathematical mod...
  • 324 篇 convolutional ne...
  • 313 篇 testing
  • 300 篇 monitoring
  • 300 篇 real-time system...

机构

  • 1,097 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 986 篇 physikalisches i...
  • 975 篇 oliver lodge lab...
  • 646 篇 infn laboratori ...
  • 630 篇 infn sezione di ...
  • 611 篇 infn sezione di ...
  • 609 篇 infn sezione di ...
  • 603 篇 fakultät physik ...
  • 569 篇 university of ch...
  • 557 篇 school of physic...
  • 543 篇 horia hulubei na...
  • 541 篇 department of ph...
  • 535 篇 school of physic...
  • 530 篇 iccub universita...
  • 525 篇 imperial college...
  • 520 篇 nikhef national ...
  • 517 篇 h.h. wills physi...
  • 515 篇 stfc rutherford ...
  • 510 篇 school of physic...

作者

  • 264 篇 barter w.
  • 261 篇 a. gomes
  • 250 篇 beiter a.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 243 篇 g. bella
  • 242 篇 j. strandberg
  • 240 篇 c. amelung
  • 238 篇 d. calvet
  • 237 篇 bellee v.
  • 236 篇 g. spigo
  • 236 篇 s. chen
  • 231 篇 bowcock t.j.v.
  • 230 篇 f. siegert
  • 228 篇 brundu d.
  • 227 篇 blake t.
  • 218 篇 y. tayalati
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 r. ströhmer

语言

  • 47,809 篇 英文
  • 1,696 篇 其他
  • 347 篇 中文
  • 109 篇 日文
  • 14 篇 德文
  • 11 篇 法文
  • 3 篇 荷兰文
  • 3 篇 俄文
  • 3 篇 斯洛文尼亚文
  • 2 篇 葡萄牙文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 泰文
检索条件"机构=Faculty of Computer Science and Engineering Science"
49977 条 记 录,以下是361-370 订阅
排序:
A Review on the Role of Blockchain Technology for Decentralized Identity Management: A Future Without Passwords  4
A Review on the Role of Blockchain Technology for Decentrali...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Raut, Rohini Gourshettiwar, Palash Thakre, Gayatri Datta Meghe Institute of Higher Education and Research Faculty of Engineering and Technology Department of Artificial Intelligence and Data Science Maharashtra Wardha442001 India Datta Meghe Institute of Higher Education and Research Faculty of Engineering and Technology Department of Computer Science and Medical Engineering Maharashtra Wardha442001 India
Advanced identity mechanisms are essential for secure client-identifiable proof in the unambiguously computerized world. Because the board frameworks rely on aggregated databases, fraud, data breaches, and unauthorize... 详细信息
来源: 评论
Federated Knowledge Distillation With 3D Transformer Adaptation for Weakly Labeled Multi-Organ Medical Image Segmentation
收藏 引用
IEEE Access 2025年 13卷 83619-83642页
作者: AlZubi, Tareq Mahmod Mukhtar, Hamza Al-Balqa Applied University Prince Abdullah bin Ghazi Faculty of Information and Communication Technology Department of Computer Science As-Salt 19117 Jordan Department of Computer Science University of Engineering and Technology Lahore (UET Lahore) Lahore 39161 Pakistan Al-Khawarizmi Institute of Computer Science UET Lahore Intelligent Criminology Laboratory National Center of Artificial Intelligence Lahore 39161 Pakistan
The increasing reliance on medical image segmentation for disease diagnosis, treatment planning, and therapeutic assessment has highlighted the need for robust and generalized deep learning (DL)-based segmentation fra... 详细信息
来源: 评论
An integrated strategy of AEF attribute evaluation for reliable thunderstorm detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 234-245页
作者: Xu Yang Hongyan Xing Xinyuan Ji Xin Su Witold Pedrycz School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing 210044China Department of Electrical and Computer Engineering University of AlbertaEdmonton AB T6G 2R3Canada College of Internet of Things Engineering Hohai UniversityChangzhou 213022China Systems Research Institute Polish Academy of Sciences00-901 WarsawPoland Department of Computer Engineering Faculty of Engineering and Natural SciencesIstinye UniversitySariyer/IstanbulTurkey
Thunderstorm detection based on the Atmospheric Electric Field(AEF)has evolved from time-domain models to space-domain *** is especially important to evaluate and determine the particularly Weather Attribute(WA),which... 详细信息
来源: 评论
A novel forecasting model for time series using optimized interval division and fuzzy relationships
收藏 引用
Neural Computing and Applications 2025年 第5期37卷 3869-3885页
作者: PhamToan, Dinh Vo-Van, Tai Faculty of Mechanical - Electrical and Computer Engineering School of Technology Van Lang University Ho Chi Minh City Viet Nam College of Natural Science Can Tho University Can Tho City Viet Nam
This study builds an effective forecasting model for time series based on significant improvements of the fuzzy clustering algorithm. Firstly, we use the universal set, which is the percentage change between two conse... 详细信息
来源: 评论
Uncertainty and Stochasticity in Modelling of Microstructure Evolution During Hot Rolling of Steels
收藏 引用
Archives of Metallurgy and Materials 2025年 第1期70卷 405-414页
作者: Szeliga, D. Foryś, J. Kusiak, J. Kuziak, R. Nadolski, R. Pietrzyk, M. Rauch, L. AGH University of Science and Technology Faculty of Metals Engineering and Industrial Computer Science Al . Mickiewicza 30 Kraków30-059 Poland Research Group Processes Simulation Upper-Silesian Institute of Technology ul. K. Miarki 12-14 Gliwice44-100 Poland
Advanced numerical models, which predict heterogeneity of microstructural features, are needed to design modern steels with heterogeneous microstructures. Models based on stochastic internal variables meet this requir... 详细信息
来源: 评论
A Survey of Artificial Hummingbird Algorithm and Its Variants: Statistical Analysis, Performance Evaluation, and Structural Reviewing
收藏 引用
Archives of Computational Methods in engineering 2025年 第1期32卷 269-310页
作者: Hosseinzadeh, Mehdi Rahmani, Amir Masoud Husari, Fatimatelbatoul Mahmoud Alsalami, Omar Mutab Marzougui, Mehrez Nguyen, Gia Nhu Lee, Sang-Woong Institute of Research and Development Duy Tan University Da Nang Viet Nam School of Medicine and Pharmacy Duy Tan University Da Nang Viet Nam Future Technology Research Center National Yunlin University of Science and Technology Yunlin Taiwan Department of Communication and Computer Engineering Faculty of Engineering Cihan University-Erbil Kurdistan Region Iraq Department of Electrical Engineering College of Engineering Taif University Taif21944 Saudi Arabia Department of Computer Engineering College of Computer Science King Khalid University Abha61413 Saudi Arabia School of Computer Science Duy Tan University Da Nang Viet Nam Pattern Recognition and Machine Learning Lab Gachon University 1342 Seongnamdaero Sujeonggu Seongnam13120 Korea Republic of
In the last few decades, metaheuristic algorithms that use the laws of nature have been used dramatically in numerous and complex optimization problems. The artificial hummingbird algorithm (AHA) is one of the metaheu... 详细信息
来源: 评论
Neutrosophic Sets and Systems: A Decade of Scientific Contribution and Growth
收藏 引用
Neutrosophic Sets and Systems 2025年 81卷 438-465页
作者: Saqlain, Muhammad Merigó, José M. Kumam, Poom Department of Mathematics King Mongkut’s University of Technology Thonburi Bangkok10140 Thailand School of Computer Science Faculty of Engineering and Information Technology University of Technology Sydney 81 Broadway UltimoNSW2007 Australia
Neutrosophic Sets and Systems (NSS) has become an important Journal for neutrosophic theory and its applications in uncertainty modeling and decision sciences. In 2023, NSS celebrated its 10th anniversary, marking a d... 详细信息
来源: 评论
Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第3期19卷 170-190页
作者: Al-Nawashi, Malek M. Al-Hazaimeh, Obaida M. Tahat, Nedal M. Gharaibeh, Nasr Abu-Ain, Waleed A. Abu-Ain, Tarik Al-Huson University College Al-Balqa Applied University Irbid Jordan Faculty of Information Technology Department of Information Security and Cybersecurity Philadelphia University Amman Jordan Faculty of Science The Hashemite University Zarqa Jordan College of Science and Computer Engineering Taibah University Yanbu Saudi Arabia College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia
The detection of cyberattacks has been increasingly emphasized in recent years, focusing on both infrastructure and people. Conventional security measures such as intrusion detection, firewalls, and encryption are ins... 详细信息
来源: 评论
A comprehensive survey on 6G-security: physical connection and service layers
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-30页
作者: Saeed, Mamoon M. Saeed, Rashid A. Hasan, Mohammad Kamrul Ali, Elmustafa Sayed Mazha, Tehseen Shahzad, Tariq Khan, Sunawar Hamam, Habib Sana00967 Yemen Department of Computer Engineering College of Computers and Information Technology Taif University P.O. Box 11099 Taif21944 Saudi Arabia Department of Electronics Engineering College of Electronics Engineering Sudan University of Science and Technology Omdurman Sudan Bangi43600 Malaysia Department of Electrical and Electronic Engineering Faculty of Engineering Red Sea University Port Sudan33312 Sudan School of Computer Science National College of Business Administration and Economics Lahore54000 Pakistan Faculty of Engineering Uni de Moncton MonctonNBE1A3E9 Canada Department of Computer Engineering COMSATS University Islamabad Sahiwal Campus Sahiwal57000 Pakistan Department of Computer Science and Software Engineering International Islamic University Islamabad44000 Pakistan School of Electrical Engineering University of Johannesburg Johannesburg2006 South Africa BP 1989 Av. Grandes Ecoles Libreville Gabon Bridges for Academic Excellence-Spectrum Tunis Tunisia Department of Computer Science School Education Department Government of Punjab Layyah31200 Pakistan Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura140401 India
After adopting 5G technology, businesses and academia have started working on sixth-generation wireless networking (6G) technologies. Mobile communications options are expected to expand in areas where previous genera... 详细信息
来源: 评论
SQUMUTH squirrel search based algorithm for high order mutant generation in mutation testing
收藏 引用
Discover Computing 2025年 第1期28卷 1-17页
作者: Mohanty, Subhasish Mishra, Jyotirmaya Mohapatra, Sudhir Kumar Bejo, Seifu Detso Deferisha, Aliazar Deneke Computer Science and Engineering GIET University Odisha Gunupur India Faculty of Engineering and Technology Sri Sri University Cuttack India Department of Software Engineering CCI Wolkite University Wolkite Ethiopia Faculty of Computing and Software Engineering Arba Minch University Arba Minch Ethiopia
In today's software testing community, quality assessment remains critical, with mutation testing standing as a cornerstone technique for evaluating the effectiveness of test cases. This method involves introducin... 详细信息
来源: 评论