咨询与建议

限定检索结果

文献类型

  • 140,010 篇 会议
  • 69,660 篇 期刊文献
  • 1,421 册 图书
  • 1 篇 学位论文

馆藏范围

  • 211,091 篇 电子文献
  • 4 种 纸本馆藏

日期分布

学科分类号

  • 128,066 篇 工学
    • 85,304 篇 计算机科学与技术...
    • 70,008 篇 软件工程
    • 30,856 篇 信息与通信工程
    • 20,207 篇 控制科学与工程
    • 16,046 篇 电气工程
    • 15,846 篇 电子科学与技术(可...
    • 14,778 篇 生物工程
    • 10,375 篇 生物医学工程(可授...
    • 10,329 篇 光学工程
    • 9,618 篇 机械工程
    • 7,032 篇 化学工程与技术
    • 6,894 篇 仪器科学与技术
    • 6,359 篇 动力工程及工程热...
    • 4,914 篇 材料科学与工程(可...
    • 4,574 篇 交通运输工程
    • 4,503 篇 安全科学与工程
    • 4,335 篇 网络空间安全
  • 70,287 篇 理学
    • 35,717 篇 数学
    • 21,424 篇 物理学
    • 16,543 篇 生物学
    • 11,764 篇 统计学(可授理学、...
    • 7,737 篇 系统科学
    • 7,500 篇 化学
  • 33,152 篇 管理学
    • 20,621 篇 管理科学与工程(可...
    • 13,774 篇 图书情报与档案管...
    • 9,059 篇 工商管理
  • 9,794 篇 医学
    • 8,041 篇 临床医学
    • 7,215 篇 基础医学(可授医学...
    • 4,429 篇 药学(可授医学、理...
  • 5,635 篇 法学
    • 4,686 篇 社会学
  • 3,461 篇 经济学
  • 2,501 篇 农学
  • 2,190 篇 教育学
  • 950 篇 文学
  • 460 篇 军事学
  • 350 篇 艺术学
  • 32 篇 哲学
  • 22 篇 历史学

主题

  • 6,147 篇 computer science
  • 5,226 篇 accuracy
  • 5,112 篇 feature extracti...
  • 4,618 篇 computational mo...
  • 4,591 篇 training
  • 4,583 篇 deep learning
  • 3,713 篇 machine learning
  • 2,933 篇 optimization
  • 2,877 篇 predictive model...
  • 2,816 篇 semantics
  • 2,566 篇 data models
  • 2,353 篇 real-time system...
  • 2,328 篇 neural networks
  • 2,317 篇 support vector m...
  • 2,304 篇 data mining
  • 2,228 篇 convolutional ne...
  • 2,046 篇 internet of thin...
  • 1,960 篇 artificial intel...
  • 1,893 篇 educational inst...
  • 1,868 篇 image segmentati...

机构

  • 2,477 篇 school of comput...
  • 2,218 篇 school of comput...
  • 2,075 篇 school of comput...
  • 1,813 篇 school of comput...
  • 1,528 篇 school of comput...
  • 1,506 篇 school of comput...
  • 1,364 篇 school of comput...
  • 1,364 篇 school of electr...
  • 1,240 篇 school of comput...
  • 1,074 篇 cavendish labora...
  • 1,017 篇 school of comput...
  • 971 篇 department of ph...
  • 960 篇 school of comput...
  • 910 篇 school of comput...
  • 876 篇 university of ch...
  • 875 篇 oliver lodge lab...
  • 872 篇 physikalisches i...
  • 537 篇 school of comput...
  • 534 篇 school of comput...
  • 530 篇 school of electr...

作者

  • 399 篇 niyato dusit
  • 268 篇 a. gomes
  • 256 篇 barter w.
  • 241 篇 c. alexa
  • 235 篇 j. m. izen
  • 233 篇 s. chen
  • 227 篇 blake t.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 bellee v.
  • 220 篇 amato s.
  • 218 篇 boettcher t.
  • 217 篇 borsato m.
  • 215 篇 brundu d.
  • 212 篇 g. bella
  • 212 篇 beiter a.
  • 210 篇 j. strandberg
  • 210 篇 bencivenni g.
  • 208 篇 c. amelung
  • 208 篇 bay a.

语言

  • 195,315 篇 英文
  • 12,562 篇 其他
  • 3,185 篇 中文
  • 182 篇 日文
  • 38 篇 朝鲜文
  • 21 篇 德文
  • 15 篇 法文
  • 7 篇 斯洛文尼亚文
  • 5 篇 西班牙文
  • 3 篇 荷兰文
  • 2 篇 捷克文
  • 2 篇 俄文
  • 2 篇 土耳其文
检索条件"机构=School of Computer Science and Engineering Engineering"
211092 条 记 录,以下是561-570 订阅
排序:
Deep Learning Based Signal Detection for Quadrature Spatial Modulation System
收藏 引用
China Communications 2024年 第10期21卷 78-85页
作者: Shu Dingyun Peng Yuyang Yue Ming Fawaz AL-Hazemi Mohammad Meraj Mirza School of Computer Science and Engineering Macao University of Science and TechnologyMacaoChina Department of Computer and Network Engineering University of JeddahSaudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia
With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. ... 详细信息
来源: 评论
Secure Speculation via Speculative Secret Flow Tracking
收藏 引用
Journal of computer science & Technology 2023年 第2期38卷 422-438页
作者: 崔宏伟 杨春 程旭 School of Computer Science Engineering Research Center of Microprocessor and System Peking UniversityBeijing 100871China
Speculative execution attacks can leak arbitrary program data under malicious speculation,presenting a severe security *** on two key observations,this paper presents a software-transparent defense mechanism called sp... 详细信息
来源: 评论
An ensemble deep learning model for cyber threat hunting in industrial internet of things
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 101-110页
作者: Abbas Yazdinejad Mostafa Kazemi Reza M.Parizi Ali Dehghantanha Hadis Karimipour Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Electrical Engineering Faculty of EngineeringShahed UniversityTehranIran College of Computing and Software Engineering Kennesaw State UniversityGAUSA School of Engineering University of GuelphOntarioCanada
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the... 详细信息
来源: 评论
Photonic generation of multi-format and reconfigurable microwave signals based on cascaded external modulation
收藏 引用
Optical and Quantum Electronics 2025年 第3期57卷 1-14页
作者: Chen, Mo Chen, Hongyao Zhang, HongYu Li, ZhuoYang Wang, Jianping Feng, LiFang Lu, HuiMin School of Computer and Communication Engineering University of Science and Technology Beijing Beijing10083 China
This paper presents a photonic scheme for generating multi-format, multi-band, and reconfigurable microwave photonic signals through cascaded external modulation. The proposed system utilize dual-parallel Mach–Zehnde... 详细信息
来源: 评论
Blockchain Approaches for Privacy Preservation: A Review  1
Blockchain Approaches for Privacy Preservation: A Review
收藏 引用
1st International Conference on Cognitive, Green and Ubiquitous Computing, IC-CGU 2024
作者: Solunke, Hiralal Bhaladhare, Pawan Computer Science & Engineering School of Computer Sciences and Engineering Sandip University Nashik India
A Blockchain is a trustworthy, immutable, decentralized database system that functions in different nodes. During the age of decentralized networks and large datasets, the confluence of Blockchain with Intelligent Mac... 详细信息
来源: 评论
A Construction of Object Detection Model for Acute Myeloid Leukemia
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 543-560页
作者: K.Venkatesh S.Pasupathy S.P.Raja Department of Computer Science and Engineering Annamalai UniversityChidambaram608002India School of Computer Science and Engineering Vellore Institute of TechnologyVellore632014India
The evolution of bone marrow morphology is necessary in Acute Mye-loid Leukemia(AML)*** takes an enormous number of times to ana-lyze with the standardization and inter-observer ***,we proposed a novel AML detection m... 详细信息
来源: 评论
Smart Fraud Detection in E-Transactions Using Synthetic Minority Oversampling and Binary Harris Hawks Optimization
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3171-3187页
作者: Chandana Gouri Tekkali Karthika Natarajan School of Computer Science and Engineering VIT-AP University522237Andhra PradeshIndia
Fraud Transactions are haunting the economy of many individuals with several factors across the *** research focuses on developing a mechanism by integrating various optimized machine-learning algorithms to ensure the... 详细信息
来源: 评论
Dynamic Behavior-Based Churn Forecasts in the Insurance Sector
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 977-997页
作者: Nagaraju Jajam Nagendra Panini Challa School of Computer Science and Engineering(SCOPE) VIT-AP UniversityAmaravati522237India
In the insurance sector, a massive volume of data is being generatedon a daily basis due to a vast client base. Decision makers and businessanalysts emphasized that attaining new customers is costlier than retainingex... 详细信息
来源: 评论
Explainable Business Process Remaining Time Prediction Using Reachability Graph
收藏 引用
Chinese Journal of Electronics 2023年 第3期32卷 625-639页
作者: CAO Rui ZENG Qingtian NI Weijian LU Faming LIU Cong DUAN Hua College of Computer Science and Engineering Shandong University of Science and Technology School of Computer Science and Technology Shandong University of Technology
With the recent advances in the field of deep learning, an increasing number of deep neural networks have been applied to business process prediction tasks, remaining time prediction, to obtain more accurate predictiv... 详细信息
来源: 评论
Liver Tumor Prediction with Advanced Attention Mechanisms Integrated into a Depth-Based Variant Search Algorithm
收藏 引用
computers, Materials & Continua 2023年 第10期77卷 1209-1226页
作者: P.Kalaiselvi S.Anusuya Department of Computer Science and Engineering Saveetha School of EngineeringChennaiTamil Nadu602117India Information Technology Saveetha School of EngineeringChennaiTamil Nadu602117India
In recent days,Deep Learning(DL)techniques have become an emerging transformation in the field of machine learning,artificial intelligence,computer vision,and so ***,researchers and industries have been highly endorse... 详细信息
来源: 评论