咨询与建议

限定检索结果

文献类型

  • 273,345 篇 会议
  • 111,993 篇 期刊文献
  • 2,804 册 图书

馆藏范围

  • 388,141 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 224,037 篇 工学
    • 148,948 篇 计算机科学与技术...
    • 120,663 篇 软件工程
    • 54,160 篇 信息与通信工程
    • 35,483 篇 控制科学与工程
    • 31,399 篇 电气工程
    • 30,358 篇 电子科学与技术(可...
    • 25,956 篇 生物工程
    • 20,386 篇 生物医学工程(可授...
    • 17,751 篇 光学工程
    • 15,345 篇 机械工程
    • 12,974 篇 化学工程与技术
    • 12,146 篇 仪器科学与技术
    • 12,098 篇 动力工程及工程热...
    • 10,733 篇 材料科学与工程(可...
    • 8,280 篇 安全科学与工程
    • 7,670 篇 网络空间安全
  • 126,674 篇 理学
    • 62,964 篇 数学
    • 41,550 篇 物理学
    • 29,361 篇 生物学
    • 20,317 篇 统计学(可授理学、...
    • 14,868 篇 系统科学
    • 13,897 篇 化学
  • 55,790 篇 管理学
    • 33,608 篇 管理科学与工程(可...
    • 24,364 篇 图书情报与档案管...
    • 16,634 篇 工商管理
  • 19,250 篇 医学
    • 16,141 篇 临床医学
    • 14,501 篇 基础医学(可授医学...
    • 9,147 篇 药学(可授医学、理...
    • 7,681 篇 公共卫生与预防医...
  • 10,508 篇 法学
    • 8,599 篇 社会学
  • 6,434 篇 经济学
  • 5,081 篇 农学
  • 4,151 篇 教育学
  • 1,861 篇 文学
  • 871 篇 军事学
  • 506 篇 艺术学
  • 75 篇 哲学
  • 46 篇 历史学

主题

  • 19,988 篇 computer science
  • 8,855 篇 accuracy
  • 8,624 篇 computational mo...
  • 7,891 篇 feature extracti...
  • 7,409 篇 deep learning
  • 7,201 篇 machine learning
  • 6,467 篇 training
  • 5,256 篇 data mining
  • 5,119 篇 computer archite...
  • 5,022 篇 support vector m...
  • 4,926 篇 wireless sensor ...
  • 4,825 篇 predictive model...
  • 4,653 篇 costs
  • 4,535 篇 bandwidth
  • 4,489 篇 optimization
  • 4,478 篇 application soft...
  • 4,365 篇 protocols
  • 4,351 篇 algorithm design...
  • 4,328 篇 testing
  • 4,245 篇 neural networks

机构

  • 1,696 篇 department of co...
  • 1,362 篇 department of co...
  • 1,346 篇 department of el...
  • 1,158 篇 department of el...
  • 1,060 篇 cavendish labora...
  • 970 篇 department of ph...
  • 891 篇 department of co...
  • 851 篇 physikalisches i...
  • 841 篇 oliver lodge lab...
  • 821 篇 department of el...
  • 742 篇 university of ch...
  • 638 篇 department of co...
  • 548 篇 department of co...
  • 543 篇 infn sezione di ...
  • 515 篇 chitkara univers...
  • 513 篇 infn sezione di ...
  • 513 篇 infn laboratori ...
  • 501 篇 horia hulubei na...
  • 492 篇 infn sezione di ...
  • 489 篇 department of co...

作者

  • 255 篇 j. wang
  • 255 篇 s. chen
  • 250 篇 barter w.
  • 240 篇 a. gomes
  • 225 篇 blake t.
  • 221 篇 c. alexa
  • 219 篇 bellee v.
  • 219 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.
  • 215 篇 j. m. izen
  • 215 篇 borsato m.
  • 209 篇 brundu d.
  • 207 篇 beiter a.
  • 204 篇 bencivenni g.
  • 195 篇 bay a.
  • 192 篇 g. bella
  • 192 篇 c. amelung
  • 190 篇 j. strandberg

语言

  • 372,071 篇 英文
  • 12,408 篇 其他
  • 3,669 篇 中文
  • 220 篇 日文
  • 48 篇 德文
  • 34 篇 朝鲜文
  • 32 篇 法文
  • 17 篇 斯洛文尼亚文
  • 8 篇 西班牙文
  • 8 篇 荷兰文
  • 5 篇 土耳其文
  • 4 篇 俄文
  • 3 篇 葡萄牙文
  • 2 篇 阿拉伯文
  • 2 篇 捷克文
  • 1 篇 加泰罗尼亚文
  • 1 篇 泰文
检索条件"机构=the Department of Computer Science and Computer Engineering"
388142 条 记 录,以下是191-200 订阅
排序:
Enhancing English accent identification in automatic speech recognition using spectral features and hybrid CNN-BiLSTM model
收藏 引用
Multimedia Tools and Applications 2025年 1-28页
作者: Ahmed, Ghayas Lawaye, Aadil Ahmad Jain, Vishal Chatterjee, Jyotir Moy Mahajan, Shubham Department of Computer Sciences Baba Ghulam Shah Badshah University J&K Rajouri India Department of Computer Science & Engineering Sharda University Noida India Dehradun India Department of Computer Science & Engineering Amity University Haryana India
Automatic Speech Recognition (ASR) has been the regnant research area in the domain of Natural Language Processing for the last few decades. Past years’ advancement provides progress in this area of research. The acc... 详细信息
来源: 评论
Insider Attack Prevention:LAPUP—Lightweight Authentication Protocol Using PUF
收藏 引用
Journal of Communications and Information Networks 2024年 第2期9卷 192-206页
作者: Siranjeevi Rajamanickam Satyanarayana Vollala N.Ramasubramanian Department of Computer Engineering Government Polytechnic CollegeTiruchirappalli 620022India Department of Computer Science and Engineering Dr.Shyama Prasad Mukherjee International Institute of Information Technology-Naya RaipurChhattisgarh 493661India Department of Computer Science and Engineering National Institute of TechnologyTiruchirappalli 620015India
The incredible progress in technologies has drastically increased the usage of Web *** share their credentials like userid and password or use their smart cards to get authenticated by the application *** cards are ha... 详细信息
来源: 评论
A Study on the Explainability of Thyroid Cancer Prediction:SHAP Values and Association-Rule Based Feature Integration Framework
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3111-3138页
作者: Sujithra Sankar S.Sathyalakshmi Department of Computer Applications Hindustan Institute of Technology and ScienceChennaiTamil NaduIndia Department of Computer Engineering Hindustan Institute of Technology and ScienceChennaiTamil NaduIndia
In the era of advanced machine learning techniques,the development of accurate predictive models for complex medical conditions,such as thyroid cancer,has shown remarkable *** predictivemodels for thyroid cancer enhan... 详细信息
来源: 评论
A Color Image Encryption Scheme Based on Singular Values and Chaos
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 965-999页
作者: Adnan Malik Muhammad Ali Faisal S.Alsubaei Nisar Ahmed Harish Kumar Electrical Engineering Department University of Engineering and TechnologyLahore54000Pakistan Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21959Saudi Arabia Computer Engineering Department University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ... 详细信息
来源: 评论
Modified Bat Algorithm: a newly proposed approach for solving complex and real-world problems
收藏 引用
Soft Computing 2024年 第13-14期28卷 7983-7998页
作者: Umar, Shahla U. Rashid, Tarik A. Ahmed, Aram M. Hassan, Bryar A. Baker, Mohammed Rashad Department of Software College of Computer Science and Information Technology University of Kirkuk Kirkuk Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler KRI Erbil Iraq Department of Computer Science College of Science Charmo University Sulaimani Chamchamal46023 Iraq
Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of ... 详细信息
来源: 评论
A Novel Enhanced Approach for Security and Privacy Preserving in IoT Devices with Federal Learning Technique
收藏 引用
SN computer science 2024年 第6期5卷 750页
作者: Moeed, Syed Abdul Karnati, Ramesh Ashmitha, G. Mohammad, Gouse Baig Mohanty, Sachi Nandan Department of Computer Science and Engineering Kakatiya Institute of Technology and Science Department of Computer Science and Engineering Vardhaman College of Engineering School of Computer Science & amp Engineering (SCOPE) VIT-AP University
The Internet of Things (IoT) has revolutionized our lives, but it has also introduced significant security and privacy challenges. The vast amount of data collected by these devices, often containing sensitive informa... 详细信息
来源: 评论
Monitoring COVID-19 environment: a real-time facial mask detection using YOLO models
收藏 引用
Research on Biomedical engineering 2025年 第1期41卷 1-18页
作者: Pandiyan, P. Thangaraj, Rajasekaran V, Balasubramanian V. K, Manavalasundaram S, Balakrishnan Department of Electrical and Electronics Engineering KPR Institute of Engineering and Technology Coimbatore India Department of Computer Science and Engineering Nandha Engineering College Erode India Department of Information Technology Velalar College of Engineering and Technology Erode India Department of Computer Science and Engineering Aarupadai Veedu Institute of Technology Chennai India Department of Computer Science and Engineering Sri Ramakrishna Institute of Technology Coimbatore India
Purpose: The rapid spread of COVID-19 has resulted in significant harm and impacted tens of millions of people globally. In order to prevent the transmission of the virus, individuals often wear masks as a protective ... 详细信息
来源: 评论
A comprehensive systematic review of machine learning in the retail industry: classifications, limitations, opportunities, and challenges
收藏 引用
Neural Computing and Applications 2024年 第4期37卷 2035-2070页
作者: Hassan, Dler O. Hassan, Bryar A. Department of Computer Science College of Science Charmo University Kurdistan Region Chamchamal Sulaimani46023 Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler Erbil Iraq
Machine learning has profoundly transformed various industries, notably revolutionizing the retail sector through diverse applications that significantly enhance operational efficiency and performance. This comprehens... 详细信息
来源: 评论
An Efficient Encryption and Compression of Sensed IoT Medical Images Using Auto-Encoder
收藏 引用
computer Modeling in engineering & sciences 2023年 第2期134卷 909-926页
作者: Passent El-kafrawy Maie Aboghazalah Abdelmoty M.Ahmed Hanaa Torkey Ayman El-Sayed School of Information Technology and Computer Science Nile UniversityGiza12677Egypt Math and Computer Science Department Faculty of ScienceMenoufia UniversityMenoufia32511Egypt Department of Computer Engineering College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia Computer Science and Engineering Department Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common *** ofmedical images is very important to secure patient *** these images consumes a lot of time onedge computing;theref... 详细信息
来源: 评论
Transformer-Based Person Re-Identification: A Comprehensive Review
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第7期9卷 1-19页
作者: Sarker, Prodip Kumar Zhao, Qingjie Uddin, Md. Kamal School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science and Telecommunication Engineering Noakhali Science and Technology University Bangladesh
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc... 详细信息
来源: 评论