咨询与建议

限定检索结果

文献类型

  • 275,253 篇 会议
  • 112,435 篇 期刊文献
  • 2,825 册 图书

馆藏范围

  • 390,512 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 225,730 篇 工学
    • 149,582 篇 计算机科学与技术...
    • 120,996 篇 软件工程
    • 54,342 篇 信息与通信工程
    • 35,728 篇 控制科学与工程
    • 31,928 篇 电气工程
    • 30,747 篇 电子科学与技术(可...
    • 25,989 篇 生物工程
    • 20,462 篇 生物医学工程(可授...
    • 17,657 篇 光学工程
    • 15,393 篇 机械工程
    • 13,037 篇 化学工程与技术
    • 12,145 篇 仪器科学与技术
    • 12,134 篇 动力工程及工程热...
    • 11,396 篇 材料科学与工程(可...
    • 8,308 篇 安全科学与工程
    • 7,753 篇 网络空间安全
  • 126,925 篇 理学
    • 63,184 篇 数学
    • 41,671 篇 物理学
    • 29,381 篇 生物学
    • 20,546 篇 统计学(可授理学、...
    • 14,865 篇 系统科学
    • 13,949 篇 化学
  • 55,947 篇 管理学
    • 33,719 篇 管理科学与工程(可...
    • 24,438 篇 图书情报与档案管...
    • 16,701 篇 工商管理
  • 19,298 篇 医学
    • 16,209 篇 临床医学
    • 14,572 篇 基础医学(可授医学...
    • 9,155 篇 药学(可授医学、理...
    • 7,767 篇 公共卫生与预防医...
  • 10,564 篇 法学
    • 8,647 篇 社会学
  • 6,447 篇 经济学
  • 5,079 篇 农学
  • 4,194 篇 教育学
  • 1,853 篇 文学
  • 874 篇 军事学
  • 509 篇 艺术学
  • 75 篇 哲学
  • 45 篇 历史学

主题

  • 20,001 篇 computer science
  • 9,234 篇 accuracy
  • 8,812 篇 computational mo...
  • 8,018 篇 feature extracti...
  • 7,655 篇 deep learning
  • 7,248 篇 machine learning
  • 6,556 篇 training
  • 5,282 篇 data mining
  • 5,183 篇 computer archite...
  • 5,093 篇 support vector m...
  • 4,972 篇 predictive model...
  • 4,930 篇 wireless sensor ...
  • 4,683 篇 costs
  • 4,560 篇 optimization
  • 4,547 篇 bandwidth
  • 4,479 篇 application soft...
  • 4,394 篇 protocols
  • 4,388 篇 testing
  • 4,361 篇 real-time system...
  • 4,360 篇 algorithm design...

机构

  • 1,721 篇 department of co...
  • 1,374 篇 department of el...
  • 1,372 篇 department of co...
  • 1,174 篇 department of el...
  • 1,063 篇 cavendish labora...
  • 977 篇 department of ph...
  • 877 篇 department of co...
  • 857 篇 physikalisches i...
  • 846 篇 oliver lodge lab...
  • 814 篇 department of el...
  • 753 篇 university of ch...
  • 641 篇 department of co...
  • 553 篇 department of co...
  • 546 篇 infn sezione di ...
  • 521 篇 chitkara univers...
  • 518 篇 infn laboratori ...
  • 514 篇 infn sezione di ...
  • 501 篇 horia hulubei na...
  • 498 篇 infn sezione di ...
  • 489 篇 department of co...

作者

  • 258 篇 barter w.
  • 254 篇 s. chen
  • 253 篇 j. wang
  • 240 篇 a. gomes
  • 233 篇 blake t.
  • 223 篇 amato s.
  • 222 篇 bellee v.
  • 222 篇 betancourt c.
  • 221 篇 c. alexa
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 216 篇 j. m. izen
  • 214 篇 brundu d.
  • 209 篇 bencivenni g.
  • 207 篇 beiter a.
  • 200 篇 bay a.
  • 193 篇 c. amelung
  • 192 篇 g. bella
  • 191 篇 j. strandberg

语言

  • 345,194 篇 英文
  • 41,695 篇 其他
  • 3,849 篇 中文
  • 220 篇 日文
  • 70 篇 德文
  • 48 篇 法文
  • 42 篇 斯洛文尼亚文
  • 34 篇 朝鲜文
  • 12 篇 西班牙文
  • 11 篇 阿拉伯文
  • 9 篇 俄文
  • 5 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 意大利文
  • 3 篇 捷克文
  • 3 篇 葡萄牙文
  • 1 篇 加泰罗尼亚文
  • 1 篇 波兰文
  • 1 篇 泰文
检索条件"机构=The Department of Computer Science and Computer Engineering"
390513 条 记 录,以下是361-370 订阅
排序:
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
An Integrated Framework with Enhanced Primitives for Post-Quantum Cryptography: HEDT and ECSIDH for Cloud Data Security and Key Exchange
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第11期49卷 165-176页
作者: Ilias, Shaik Mohammad Sharmila, V. Ceronmani Durga, V. Sathya Dept. of Computer Science and Engineering Hindustan Institute of Technology and Science Chennai India Department of Information Technology Hindustan Institute of Technology and Science Chennai India Department of Computer Science&Engineering Hindustan Institute of Technology and Science Chennai India
If adversaries were to obtain quantum computers in the future, their massive computing power would likely break existing security schemes. Since security is a continuous process, more substantial security schemes must... 详细信息
来源: 评论
Design of real time intelligent system for women safety
收藏 引用
Recent Patents on engineering 2024年 第3期18卷 77-83页
作者: Kohli, Priyanka Singh, Kawaljeet Sidhu, Brahmaleen Kaur Department of Computer Science & Engineering Punjabi University Patiala India University Computer Centre Punjabi University Patiala India
Background: Even the technology has advanced a lot in these modern times, women's safety is still a massive issue. Women are not safe anywhere. Their safety is an essential and decisive issue in today’s world. Th... 详细信息
来源: 评论
Deep reinforcement learning for online scheduling of photovoltaic systems with battery energy storage systems
收藏 引用
Intelligent and Converged Networks 2024年 第1期5卷 28-41页
作者: Yaze Li Jingxian Wu Yanjun Pan the Department of Electrical Engineering University of ArkansasFayettevilleAR 72701USA the Department of Computer Science and Computer Engineering University of ArkansasFayettevilleAR 72701USA
A new online scheduling algorithm is proposed for photovoltaic(PV)systems with battery-assisted energy storage systems(BESS).The stochastic nature of renewable energy sources necessitates the employment of BESS to bal... 详细信息
来源: 评论
Improving Prediction Efficiency of Machine Learning Models for Cardiovascular Disease in IoST-Based Systems through Hyperparameter Optimization
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 3485-3506页
作者: Tajim Md.Niamat Ullah Akhund Waleed M.Al-Nuwaiser Department of Computer Science and Engineering(CSE) Daffodil International UniversityDhaka1216Bangladesh Graduate School of Science and Engineering Saga UniversitySaga8408502Japan Computer Science Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11623Saudi Arabia
This study explores the impact of hyperparameter optimization on machine learning models for predicting cardiovascular disease using data from an IoST(Internet of Sensing Things)*** distinct machine learning approache... 详细信息
来源: 评论
IRS-enabled NOMA communication systems:A network architecture primer with future trends and challenges
收藏 引用
Digital Communications and Networks 2024年 第5期10卷 1503-1528页
作者: Haleema Sadia Ahmad Kamal Hassan Ziaul Haq Abbas Ghulam Abbas Muhammad Waqas Zhu Han Faculty of Electrical Engineering and Telecommunications and Networking(TeleCoN)Research Center Ghulam Ishaq Khan Institute of Engineering and Technology(GIKI)Topi 23640Pakistan Faculty of Computer Science and Engineering GIKITopi 23640Pakistan Department of Computer Engineering College of Information TechnologyUniversity of Bahrain32028Bahrain School of Engineering Edith Cowan UniversityPerth WA6027Australia Department of Electrical and Computer Engineering University of HoustonHoustonTX 77004USA Department of Computer Science and Engineering Kyung Hee UniversitySeoul 446-701South Korea
Non-Orthogonal Multiple Access(NOMA)has already proven to be an effective multiple access scheme for5th Generation(5G)wireless *** provides improved performance in terms of system throughput,spectral efficiency,fairne... 详细信息
来源: 评论
A Deep Learning Approach to Industrial Corrosion Detection
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2587-2605页
作者: Mehwash Farooqui Atta Rahman Latifa Alsuliman Zainab Alsaif Fatimah Albaik Cadi Alshammari Razan Sharaf Sunday Olatunji Sara Waslallah Althubaiti Hina Gull Department of Computer Engineering(CE) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Science(CS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Information Systems(CIS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have... 详细信息
来源: 评论
MmHand: Towards Pixel-Level-Accuracy Hand Localization Using A Single Commodity mmWave Device
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20800-20814页
作者: Zhang, Xiaoyu Li, Zhengxiong Xu, Chenhan Song, Luchuan Li, Huining Xue, Hongfei Wu, Yingxiao Xu, Wenyao State University of New York at Buffalo Department of Computer Science and Engineering AmherstNY14068 United States University of Colorado Denver Department of Computer Science and Engineering DenverCO80204 United States North Carolina State University Department of Computer Science RaleighNC27695 United States University of Rochester Department of Computer Science RochesterNY14627 United States University of North Carolina at Charlotte Department of Computer Science CharlotteNC28223 United States Hangzhou Dianzi University College of Computer Science and Technology Hangzhou Zhejiang310018 China
The hand localization problem has been a longstanding focus due to its many applications. The task involves modeling the hand as a singular point and determining its position within a defined coordinate system. Howeve... 详细信息
来源: 评论
A Similarity-Based Positional Attention-Aided Deep Learning Model for Copy-Move Forgery Detection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第9期5卷 4354-4363页
作者: Roy, Ayush Mohiuddin, S.K. Sarkar, Ram Jadavpur University Department of Electrical Engineering Kolkata700032 India Asutosh College Department of Computer Science Kolkata700026 India Jadavpur University Department of Computer Science and Engineering Kolkata700032 India
The process of modifying digital images has been made significantly easier by the availability of several image editing software. However, in a variety of contexts, including journalism, judicial processes, and histor... 详细信息
来源: 评论
Adversarial-Learning-Based Taguchi Convolutional Fuzzy Neural Classifier for Images of Lung Cancer
收藏 引用
IEEE Access 2024年 12卷 72766-72776页
作者: Lin, Cheng-Jian Lin, Xue-Qian Jhang, Jyun-Yu National Chin-Yi University of Technology Department of Computer Science and Information Engineering Taichung41170 Taiwan National Taichung University of Science and Technology Department of Computer Science and Information Engineering Taichung40401 Taiwan
Deep learning technology has extensive application in the classification and recognition of medical images. However, several challenges persist in such application, such as the need for acquiring large-scale labeled d... 详细信息
来源: 评论