咨询与建议

限定检索结果

文献类型

  • 30,099 篇 会议
  • 15,249 篇 期刊文献
  • 424 册 图书

馆藏范围

  • 45,772 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 27,053 篇 工学
    • 19,677 篇 计算机科学与技术...
    • 15,871 篇 软件工程
    • 6,594 篇 信息与通信工程
    • 4,787 篇 控制科学与工程
    • 3,258 篇 电气工程
    • 3,079 篇 生物工程
    • 2,875 篇 电子科学与技术(可...
    • 2,528 篇 生物医学工程(可授...
    • 2,125 篇 机械工程
    • 1,597 篇 仪器科学与技术
    • 1,560 篇 光学工程
    • 1,439 篇 动力工程及工程热...
    • 1,288 篇 安全科学与工程
    • 1,183 篇 化学工程与技术
    • 1,139 篇 网络空间安全
    • 1,102 篇 交通运输工程
  • 14,867 篇 理学
    • 7,110 篇 数学
    • 4,649 篇 物理学
    • 3,544 篇 生物学
    • 2,302 篇 统计学(可授理学、...
    • 2,011 篇 系统科学
    • 1,307 篇 化学
  • 8,421 篇 管理学
    • 5,250 篇 管理科学与工程(可...
    • 3,604 篇 图书情报与档案管...
    • 2,645 篇 工商管理
  • 2,862 篇 医学
    • 2,427 篇 临床医学
    • 2,137 篇 基础医学(可授医学...
    • 1,276 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,439 篇 法学
    • 1,154 篇 社会学
  • 954 篇 经济学
  • 722 篇 农学
  • 712 篇 教育学
  • 226 篇 文学
  • 118 篇 军事学
  • 88 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,374 篇 computer science
  • 1,088 篇 deep learning
  • 1,042 篇 accuracy
  • 928 篇 machine learning
  • 888 篇 feature extracti...
  • 844 篇 internet of thin...
  • 795 篇 computational mo...
  • 667 篇 training
  • 564 篇 information tech...
  • 560 篇 artificial intel...
  • 535 篇 support vector m...
  • 524 篇 real-time system...
  • 497 篇 data mining
  • 479 篇 security
  • 444 篇 predictive model...
  • 402 篇 monitoring
  • 379 篇 cloud computing
  • 352 篇 optimization
  • 340 篇 data models
  • 339 篇 databases

机构

  • 297 篇 faculty of scien...
  • 287 篇 department for p...
  • 284 篇 department of ph...
  • 282 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 271 篇 department of ph...
  • 266 篇 department of ph...
  • 256 篇 faculté des scie...
  • 232 篇 department of ph...
  • 229 篇 department of co...
  • 228 篇 department of ph...
  • 216 篇 physics division...
  • 192 篇 cavendish labora...
  • 174 篇 yerevan physics ...
  • 169 篇 institute of phy...
  • 169 篇 institute of phy...
  • 168 篇 school of physic...
  • 164 篇 department of ph...
  • 163 篇 kirchhoff-instit...

作者

  • 275 篇 c. alexa
  • 273 篇 j. m. izen
  • 273 篇 c. amelung
  • 271 篇 g. bella
  • 271 篇 j. strandberg
  • 271 篇 d. calvet
  • 270 篇 g. spigo
  • 268 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 259 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 253 篇 h. a. gordon
  • 253 篇 g. gaudio
  • 251 篇 a. c. könig
  • 247 篇 y. tayalati
  • 243 篇 h. sakamoto
  • 241 篇 s. mohapatra
  • 236 篇 d. guest
  • 214 篇 y. nagasaka

语言

  • 43,894 篇 英文
  • 1,399 篇 其他
  • 452 篇 中文
  • 61 篇 日文
  • 11 篇 法文
  • 8 篇 德文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 2 篇 朝鲜文
  • 2 篇 俄文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45772 条 记 录,以下是201-210 订阅
排序:
A Customizable Virtual Assistant Enhanced with Vision and Speech Capabilities  12th
A Customizable Virtual Assistant Enhanced with Vision and Sp...
收藏 引用
12th International Conference on Recent Trends in Computing, ICRTC 2024
作者: Christy Jeba Malar, A. Deva Priya, M. Naveen Kumaran, R. Sanjay Abhishek, J. Bhuvana, S. Karthick, S. Department of Information Technology Sri Krishna College of Technology Tamilnadu Coimbatore India Department of Computer Science and Engineering Karpagam College of Engineering Tamilnadu Coimbatore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India Department of Computer Science and Engineering SRM Institute of Science and Technology Uttar Pradesh Delhi–NCR Campus Ghaziabad India
Recent advancements in Smart Assistants (SAs) as well as home automation have captured the attention of both researchers and consumers. Virtual Assistants (VAs) that are speech-enabled are commonly referred to as smar... 详细信息
来源: 评论
SESDP:A Sentiment Analysis-Driven Approach for Enhancing Software Product Security by Identifying Defects through Social Media Reviews
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1327-1345页
作者: Farah Mohammad Saad Al-Ahmadi Jalal Al-Muhtadi Center of Excellence in Information Assurance(CoEIA) King Saud UniversityRiyadh11543Saudi Arabia Department of Computer Science and TechnologyArab East CollegesRiyadh11583Saudi Arabia College of Computer&Information Sciences King Saud UniversityRiyadh11543Saudi Arabia
Software defect prediction is a critical component in maintaining software quality,enabling early identification and resolution of issues that could lead to system failures and significant financial *** the increasing... 详细信息
来源: 评论
Advancing Healthcare Through Internet of Things: A Comprehensive Review of Smart Healthcare systems and Their Applications  2
Advancing Healthcare Through Internet of Things: A Comprehen...
收藏 引用
2nd International Conference on Machine Learning and Autonomous systems, ICMLAS 2025
作者: Raushan, Rahul Chaudhri, Shiv Nath Suman, Saurabh Kumar, Dhiraj Kumar, Gulshan Kumar, Abhishek Faculty of Engineering and - Technology Department of Computer Science & Design Maharashtra Wardha442001 India
The Internet of Things (IoT) has turned the healthcare domain in a better direction due to more interconnected and smarter systems that enhance care delivery. Certainly, the IoT-accessible applications in these fields... 详细信息
来源: 评论
Location Privacy Preservation Crowdsensing With Federated Reinforcement Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 1877-1894页
作者: You, Zhichao Dong, Xuewen Liu, Ximeng Gao, Sheng Wang, Yongzhi Shen, Yulong Xidian University School of Computer Science and Technology The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi'an710071 China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an710071 China Fuzhou University College of Computer and Data Science Fuzhou350025 China Central University of Finance and Economics School of Information Beijing102206 China California State Polytechnic University Pomona Department of Computer Information Systems PomonaCA91768 United States Xidian University School of Computer Science and Technology Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xi'an710071 China
Crowdsensing has become a popular method of sensing data collection while facing the problem of protecting participants' location privacy. Existing location-privacy crowdsensing mechanisms focus on static tasks an... 详细信息
来源: 评论
Privacy Protection in Learning Management systems’ Mobile technology-Based Learning Analytics
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第6期19卷 197-208页
作者: Rawat, Manoj Kumar Jha, Suresh Kumar Sree Lakshmi, A. Venkata Ramana, J. Gonge, Sudhanshu S. De, Arunava Department of Computer Science and Engineering Medi-Caps University Madhya Pradesh Indore India Manipal University Rajasthan Jaipur India Geetanjali College of Engineering and Technology Telangana Hyderabad India Department of MBA KL Business School Koneru Lakshmaiah Education Foundation Vaddeswaram Campus Guntur District Andhra Pradesh India Department of Computer Science & Information Technology Symbiosis Institute of Technology Lavale A Constituent of Symbiosis International University Maharashtra Pune India Faculty of Information Technology Gopal Narayan Singh University Bihar Jamuhar India
Mobile technology use in education is changing, much like in the business and health sectors. Research is now conducted on designing user-centric platforms that allow people to engage in teaching and learning activiti... 详细信息
来源: 评论
A mathematical multi-objective optimization model and metaheuristic algorithm for effective advertising in the social internet of things
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4797-4821页
作者: Molaei, Reza Rahsepar Fard, Kheirollah Bouyer, Asgarali Department of Computer Engineering and Information Technology University of Qom Qom Iran Department of Software Engineering Azarbaijan Shahid Madani University Tabriz Iran Department of Software Engineering Faculty of Engineering and Natural Science Istinye University Istanbul Turkey
The integration of social networks with the Internet of Things (IoT) has been explored in recent research, giving rise to the Social Internet of Things (SIoT). One promising application of SIoT is viral marketing, whi... 详细信息
来源: 评论
Behaviour-diverse automatic penetration testing:a coverage-based deep reinforcement learning approach
收藏 引用
Frontiers of computer science 2025年 第3期19卷 15-24页
作者: Yizhou YANG Longde CHEN Sha LIU Lanning WANG Haohuan FU Xin LIU Zuoning CHEN Zhongguancun Laboratory Beijing 100081China Zhejiang Lab Hangzhou 311121China National Research Centre of Parallel Computer Engineering and Technology Wuxi 214000China Faculty of Geographical Science Beijing Normal UniversityBeijing 100875China Department of Earth System Science Tsinghua UniversityBeijing 100084China
Reinforcement Learning(RL)is gaining importance in automating penetration testing as it reduces human effort and increases ***,given the rapidly expanding scale of modern network infrastructure,the limited testing sca... 详细信息
来源: 评论
Security to text (S2T): multi-layered based security approaches for secret text content
收藏 引用
Multimedia Tools and Applications 2025年 第15期84卷 15151-15171页
作者: Kashid, Shamal Awasthi, Lalit K. Berwal, Krishan Department of Computer Science and Engineering National Institute of Technology Uttarakhand IN Srinagar India Faculty of Communication Engineering Military College of Telecommunication Engineering IN Mhow India
In the digital world, text data is produced in an unstructured manner across various communication channels. Extracting valuable information from such data with security is crucial and requires the development of tech... 详细信息
来源: 评论
Comparative Analysis and Evaluation of Well-being Activity-Infused Fine-Tuned Language Models with Benchmark Models
Comparative Analysis and Evaluation of Well-being Activity-I...
收藏 引用
2025 IEEE Symposium on Computational Intelligence in Health and Medicine, CIHM 2025
作者: Mohammed, Hamza Haruna Kiss, Gabriel Serrano, J. Artur Lindseth, Frank Department of Computer Science Faculty of Information Technology and Electrical Engineering Norwegian University of Science and Technology Trondheim Norway Department of Neuromedicine and Movement Science Faculty of Medicine and Health Sciences Norwegian University of Science and Technology Trondheim Norway
Large language models (LLMs) have significantly impacted natural language processing (NLP), healthcare, and beyond fields. LLMs have demonstrated unprecedented abilities to understand and generate human-like text, mak... 详细信息
来源: 评论
Enhancing real time object detection for autonomous driving using YOLO-NAS algorithm with CLEO optimizer
收藏 引用
International Journal of information technology (Singapore) 2025年 第3期17卷 1321-1328页
作者: Nandal, Priyanka Pahal, Sudesh Malik, Sunesh Sehrawat, Neetu Mamta Department of Computer Science and Engineering Maharaja Surajmal Institute of Technology New Delhi India Department of Electronics and Communication Engineering Maharaja Surajmal Institute of Technology New Delhi India Department of Information Technology Maharaja Surajmal Institute of Technology New Delhi India Department of Computer Science and Engineering Panipat Institute of Engineering & Technology New Delhi India
For autonomous driving to operate in a safe and effective manner, efficient and precise object detection is essential. The efficacy of the network model is heavily challenged because of the high-speed movement of vehi... 详细信息
来源: 评论