咨询与建议

限定检索结果

文献类型

  • 96,471 篇 会议
  • 56,344 篇 期刊文献
  • 1,463 册 图书

馆藏范围

  • 154,276 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 91,343 篇 工学
    • 55,586 篇 计算机科学与技术...
    • 44,812 篇 软件工程
    • 22,245 篇 信息与通信工程
    • 15,642 篇 控制科学与工程
    • 14,558 篇 电气工程
    • 14,143 篇 电子科学与技术(可...
    • 10,816 篇 生物工程
    • 9,559 篇 生物医学工程(可授...
    • 8,569 篇 光学工程
    • 6,711 篇 机械工程
    • 5,819 篇 化学工程与技术
    • 5,622 篇 动力工程及工程热...
    • 5,588 篇 仪器科学与技术
    • 4,869 篇 材料科学与工程(可...
    • 3,512 篇 安全科学与工程
    • 3,383 篇 网络空间安全
  • 56,153 篇 理学
    • 26,244 篇 数学
    • 20,426 篇 物理学
    • 12,568 篇 生物学
    • 8,915 篇 统计学(可授理学、...
    • 6,569 篇 化学
    • 6,363 篇 系统科学
  • 22,129 篇 管理学
    • 14,254 篇 管理科学与工程(可...
    • 8,629 篇 图书情报与档案管...
    • 6,827 篇 工商管理
  • 9,991 篇 医学
    • 8,026 篇 临床医学
    • 7,013 篇 基础医学(可授医学...
    • 4,223 篇 药学(可授医学、理...
    • 3,900 篇 公共卫生与预防医...
  • 4,170 篇 法学
    • 3,577 篇 社会学
  • 2,766 篇 经济学
  • 1,982 篇 农学
  • 1,661 篇 教育学
  • 767 篇 文学
  • 311 篇 军事学
  • 182 篇 艺术学
  • 29 篇 哲学
  • 18 篇 历史学

主题

  • 3,800 篇 accuracy
  • 3,131 篇 deep learning
  • 2,910 篇 machine learning
  • 2,898 篇 computational mo...
  • 2,752 篇 feature extracti...
  • 2,698 篇 computer science
  • 2,518 篇 training
  • 2,002 篇 optimization
  • 1,869 篇 predictive model...
  • 1,800 篇 artificial intel...
  • 1,724 篇 real-time system...
  • 1,696 篇 internet of thin...
  • 1,626 篇 support vector m...
  • 1,468 篇 convolutional ne...
  • 1,449 篇 neural networks
  • 1,385 篇 wireless sensor ...
  • 1,332 篇 data models
  • 1,299 篇 data mining
  • 1,221 篇 educational inst...
  • 1,192 篇 computer archite...

机构

  • 1,758 篇 cavendish labora...
  • 1,104 篇 school of physic...
  • 1,053 篇 physikalisches i...
  • 1,037 篇 department of el...
  • 1,021 篇 department for p...
  • 1,011 篇 institute of phy...
  • 949 篇 department of ph...
  • 919 篇 institute of phy...
  • 896 篇 fakultät physik ...
  • 867 篇 physics departme...
  • 849 篇 department of ph...
  • 840 篇 department of ph...
  • 833 篇 niels bohr insti...
  • 827 篇 institute of hig...
  • 824 篇 oliver lodge lab...
  • 804 篇 cern geneva
  • 799 篇 horia hulubei na...
  • 781 篇 dipartimento di ...
  • 768 篇 department of ph...
  • 733 篇 west university ...

作者

  • 562 篇 bachacou h.
  • 551 篇 annovi a.
  • 518 篇 akimov a.v.
  • 508 篇 aad g.
  • 504 篇 alonso f.
  • 500 篇 alexopoulos t.
  • 499 篇 amidei d.
  • 498 篇 argyropoulos s.
  • 497 篇 anastopoulos c.
  • 497 篇 adelman j.
  • 496 篇 arnaez o.
  • 496 篇 alimonti g.
  • 494 篇 alexa c.
  • 494 篇 abulaiti y.
  • 491 篇 amelung c.
  • 488 篇 azuelos g.
  • 488 篇 arnold h.
  • 487 篇 aloisio a.
  • 487 篇 ahmadov f.
  • 487 篇 adye t.

语言

  • 126,361 篇 英文
  • 26,203 篇 其他
  • 1,710 篇 中文
  • 206 篇 日文
  • 58 篇 德文
  • 39 篇 法文
  • 18 篇 斯洛文尼亚文
  • 15 篇 朝鲜文
  • 9 篇 土耳其文
  • 7 篇 阿拉伯文
  • 6 篇 葡萄牙文
  • 6 篇 俄文
  • 5 篇 西班牙文
  • 2 篇 捷克文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 1 篇 爱沙尼亚文
检索条件"机构=School of Engineering Department of Computer Engineering and Informatics"
154278 条 记 录,以下是1571-1580 订阅
排序:
Teacher Probability Reconstruction based knowledge distillation within intelligent network compression
International Journal of Intelligent Networks
收藏 引用
International Journal of Intelligent Networks 2025年 6卷 47-56页
作者: Chen, Han Teng, Xuyang Su, Jiajie Li, Chunhao Hu, Chang Han, Meng School of Communication Engineering Hangzhou Dianzi University Hangzhou China Department of Computer Science National University of Singapore Singapore College of Computer Science and Technology Zhejiang University Hangzhou China
In the optimization of intelligent network architecture, limited resources at each node, including edge computing devices, have posed challenges for deploying large models in performance-demanding scenarios. Knowledge... 详细信息
来源: 评论
Advanced and Secure Data Sharing Scheme with Blockchain and IPFS: A Brief Review  15
Advanced and Secure Data Sharing Scheme with Blockchain and ...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Mukhedkar, Moresh Kote, Prajwal Zonde, Mounesha Jadhav, Om Bhasme, Vaibhav Dawande, Nitin A. D Y Patil University School of Engineering and Technology E&tc Engineering Department Pune India D Y Patil University School of Engineering and Technology Computer Engineering Department Pune India
In the ever-evolving information age, the challenges posed by the exponential growth of data have led to innovative solutions that leverage the power of technology. This paper introduces a comprehensive data sharing p... 详细信息
来源: 评论
Dielectric Response Analysis Characteristic of Service-Aged XLPE Cables  14
Dielectric Response Analysis Characteristic of Service-Aged ...
收藏 引用
14th International Conference on the Properties and Applications of Dielectric Materials, ICPADM 2024
作者: Thongkong, Patchara Promphanich, Wiboon Udomluksananon, Patt Jeenmuang, Siwakorn Wiangtong, Theerayod Pattanadech, Norasage School of Engineering King Mongkut's Institute of Technology Ladkrabang Department of Electrical Engineering Bangkok Thailand School of Engineering King Mongkut's Institute of Technology Ladkrabang Department of Computer Engineering Bangkok Thailand
The main insulation used in plastic underground cables is cross-linked polyethylene (XLPE). The XLPE underground cable which has been utilized in service for a long time, has experienced various stresses, or so-called... 详细信息
来源: 评论
A Vulnerability Detection Method for Smart Contracts Based on Dynamic Meta Optimizer
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 24904-24915页
作者: He, Daojing Gong, Wei Chan, Sammy Harbin Institute of Technology School of Computer Science and Technology Shenzhen China Jiangxi University of Science and Technology School of Information Engineering Jiangxi Ganzhou China City University of Hong Kong Department of Electrical Engineering Hong Kong Hong Kong
With the increasingly complex blockchain technology environment and emerging security threats, the detection and prevention of vulnerabilities in blockchain smart contracts have become crucial for ensuring the healthy... 详细信息
来源: 评论
Forensic Eye: Convolutional Neural Network-based Crime Scene Object Detection System  2
Forensic Eye: Convolutional Neural Network-based Crime Scene...
收藏 引用
2nd International Conference Computational and Characterization Techniques in engineering and Sciences, IC3TES 2024
作者: Sudha, I. Vadivel, M. Lakshmiramana, P. Kalpana, N. Kumar, Nellore Manoj Vinoth, R. Saveethe University Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science Tamilnadu Chennai India Excel Engineering College Department of Information Technology Komarapalayam Namakkal India Madanapalle Institute of Technology & Science Department of Computer Science & Technology Andhra Pradesh India Psna College of Engineering and Technology Department of Computer Science and Engineering India Saveetha School of Engineering Department of Mathematics Tamilnadu Chennai India Rmk College of Engineering and Technology Department of Computer Science and Engineering Puduvoyal India
Forensic investigations rely heavily on the accurate detection and analysis of crime related objects present at crime scenes. Traditional methods of object detection often involve manual labor and are error prone proc... 详细信息
来源: 评论
A Hybrid Approach to Dynamic Thread Allocation Driven by Workload and Task Prioritization
收藏 引用
SN computer Science 2025年 第3期6卷 1-19页
作者: Abirami, K. Harini, N. Department of Computer Science and Engineering Amrita School of Computing Coimbatore Amrita Vishwa Vidyapeetham Coimbatore India
In today’s rapidly changing world, cloud service providers face numerous challenges in managing resources and meeting customer demands. To address these challenges, cloud service providers should prioritize the tasks... 详细信息
来源: 评论
A Yet Powerful Routing Protocol for Vehicular Ad-hoc Networks (VANETs) Utilizing Software Defined Network (SDN) and Fog Computing  8
A Yet Powerful Routing Protocol for Vehicular Ad-hoc Network...
收藏 引用
8th International Conference on Information Technology, Information Systems and Electrical engineering, ICITISEE 2024
作者: Darabkh, Khalid A. Al-Mistarihi, Mamoun F. Al-Maaitah, Mera Ismail School of Engineering The University of Jordan Computer Engineering Department Amman11942 Jordan Jordan University of Science and Technology Faculty of Engineering Electrical Engineering Department Irbid22110 Jordan
In this article, we propose a novel protocol that employs different technologies together, such as Software Defined Network (SDN) for the purpose of offering scalability, programmability, and global network informatio... 详细信息
来源: 评论
N-Gram Based Sarcasm Detection for News and Social Media Text Using Hybrid Deep Learning Models
收藏 引用
SN computer Science 2024年 第1期5卷 163页
作者: Thaokar, Chetana Rout, Jitendra Kumar Rout, Minakhi Ray, Niranjan Kumar School of Computer Engineering KIIT Deemed to be University Odisha Bhubaneshwar India Ramdeobaba College of Engineering and Management Maharashtra Nagpur India Department of Computer Science and Engineering National Institute of Technology Chattisgarh Raipur India
Sarcasm is a type of communication that involves using words with meanings opposite to their literal definition to create humor or mock someone. This form of communication can be confusing as it often uses positive wo... 详细信息
来源: 评论
Analyzing Cross-Layer Design Approaches for Quality of Service in Wireless Networks  15
Analyzing Cross-Layer Design Approaches for Quality of Servi...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Shreenidhi, H.S. Acharjya, Kalyan Saraswat, Nidhi Jain School of Engineering and Technology Department of Computer Science and Engineering Karnataka Bangalore India Maharishi University of Information Technology Maharishi School of Engineering & technology Uttar Pradesh India Sanskriti University Department of Computer Science Engineering Uttar Pradesh Mathura India
Analyzing move-Layer layout procedures for satisfactory of provider (Qu 's) in Wi-Fi networks is of widespread importance to enhance network overall performance. Go-Layer optimization integrates distinct layers co... 详细信息
来源: 评论
Intelligent Deep Learning Based Cybersecurity Phishing Email Detection and Classification
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5901-5914页
作者: R.Brindha S.Nandagopal H.Azath V.Sathana Gyanendra Prasad Joshi Sung Won Kim Department of Computing Technologies SRM Institute of Science and TechnologyKattankulathur603203India Department of Computing Science and Engineering Nandha College of TechnologyErode638052India School of Computing Science and Engineering VIT Bhopal UniversityBhopal466114India Department of Computer Science and Engineering K.Ramakrishnan College of EngineeringTiruchirappalli621112India Department of Computer Science and Engineering Sejong UniversitySeoul05006Korea Department of Information and Communication Engineering Yeungnam UniversityGyeongsan-si38541Gyeongbuk-doKorea
Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’sensitive data.E-mails,instant messages and phone calls are some of the common modes us... 详细信息
来源: 评论