咨询与建议

限定检索结果

文献类型

  • 15,677 篇 会议
  • 9,971 篇 期刊文献
  • 447 册 图书

馆藏范围

  • 26,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,259 篇 工学
    • 9,638 篇 计算机科学与技术...
    • 7,742 篇 软件工程
    • 3,231 篇 信息与通信工程
    • 3,053 篇 控制科学与工程
    • 2,081 篇 电气工程
    • 1,820 篇 电子科学与技术(可...
    • 1,658 篇 生物工程
    • 1,310 篇 机械工程
    • 1,303 篇 生物医学工程(可授...
    • 995 篇 光学工程
    • 810 篇 动力工程及工程热...
    • 798 篇 仪器科学与技术
    • 705 篇 化学工程与技术
    • 610 篇 材料科学与工程(可...
    • 557 篇 安全科学与工程
    • 542 篇 交通运输工程
  • 8,748 篇 理学
    • 4,511 篇 数学
    • 2,311 篇 物理学
    • 1,977 篇 生物学
    • 1,541 篇 统计学(可授理学、...
    • 1,463 篇 系统科学
    • 814 篇 化学
  • 3,828 篇 管理学
    • 2,532 篇 管理科学与工程(可...
    • 1,423 篇 图书情报与档案管...
    • 1,296 篇 工商管理
  • 1,384 篇 医学
    • 1,158 篇 临床医学
    • 979 篇 基础医学(可授医学...
    • 565 篇 药学(可授医学、理...
    • 518 篇 公共卫生与预防医...
  • 709 篇 法学
    • 584 篇 社会学
  • 459 篇 经济学
  • 316 篇 教育学
  • 276 篇 农学
  • 70 篇 文学
  • 54 篇 军事学
  • 40 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,114 篇 computer science
  • 482 篇 deep learning
  • 356 篇 systems engineer...
  • 341 篇 computational mo...
  • 331 篇 machine learning
  • 318 篇 application soft...
  • 318 篇 artificial intel...
  • 290 篇 computer archite...
  • 264 篇 control systems
  • 260 篇 internet of thin...
  • 235 篇 support vector m...
  • 232 篇 feature extracti...
  • 224 篇 accuracy
  • 217 篇 optimization
  • 209 篇 neural networks
  • 208 篇 software enginee...
  • 198 篇 information syst...
  • 194 篇 training
  • 193 篇 laboratories
  • 184 篇 routing

机构

  • 55 篇 shanghai key lab...
  • 46 篇 department of la...
  • 46 篇 department of el...
  • 44 篇 department of co...
  • 44 篇 department of sy...
  • 42 篇 department of el...
  • 42 篇 department of sy...
  • 42 篇 department of el...
  • 39 篇 department of co...
  • 39 篇 department of in...
  • 37 篇 department of co...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 33 篇 department of co...
  • 33 篇 school of comput...
  • 32 篇 department of co...
  • 31 篇 academy of mathe...
  • 30 篇 department of co...
  • 27 篇 department of co...
  • 27 篇 department of co...

作者

  • 93 篇 niyato dusit
  • 55 篇 rajkumar buyya
  • 52 篇 hisao ishibuchi
  • 43 篇 m. zahn
  • 41 篇 e. rogers
  • 40 篇 bernhard schölko...
  • 34 篇 abdelwahed motwa...
  • 33 篇 sofotasios pasch...
  • 28 篇 hong choong seon
  • 26 篇 jiang liu
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 shen xuemin
  • 24 篇 liu jiaming
  • 23 篇 tao yang
  • 23 篇 j.h. lang
  • 22 篇 soni mukesh
  • 20 篇 liu xin
  • 20 篇 lin iuon-chang
  • 19 篇 ferrara antonell...
  • 19 篇 lindemann lars

语言

  • 24,565 篇 英文
  • 1,274 篇 其他
  • 224 篇 中文
  • 32 篇 日文
  • 7 篇 德文
  • 3 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=†Department of Computer Science and Systems Engineering"
26095 条 记 录,以下是501-510 订阅
排序:
Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3183-3198页
作者: Doaa Sami Khafaga Faten Khalid Karim Abdelaziz A.Abdelhamid El-Sayed M.El-kenawy Hend K.Alkahtani Nima Khodadadi Mohammed Hadwan Abdelhameed Ibrahim Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt The Department of Civil and Environmental Engineering Florida International UniversityMiamiFLUSA Department of Information Technology College of ComputerQassim UniversityBuraydah51452Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t... 详细信息
来源: 评论
Coupling Mobile Brain Imaging and Virtual Reality Omnidirectional Treadmill to Explore Attenuated Situational Awareness during Distracted Walking
收藏 引用
IEEE Transactions on Cognitive and Developmental systems 2024年 第3期16卷 1063-1076页
作者: Chuang, Chun-Hsiang Chiu, Tsai-Feng Hsu, Hao-Che Lin, Shih-Syun National Tsing Hua University Research Center for Education and Mind Sciences College of Education The Institute of Information Systems and Applications College of Electrical Engineering and Computer Science Hsinchu300 Taiwan National Tsing Hua University Research Center for Education and Mind Sciences Hsinchu300 Taiwan National Yang Ming Chiao Tung University Department of Computer Science Hsinchu300193 Taiwan National Taiwan Ocean University Department of Computer Science and Engineering Keelung20224 Taiwan
Walking while engaging in distracting activities affects our perception of changes happening on the road, leading to exposure to hazardous conditions. This study aimed to evidence that pedestrians who become distracte... 详细信息
来源: 评论
Security model to identify block withholding attack in blockchain
Security model to identify block withholding attack in block...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Keshta, Ismail Reegu, Faheem Ahmad Ahmad, Adeel Saxena, Archana Chandan, Radha Raman Mahalakshmi, V. Computer Science and Information Systems Department College of Applied Sciences AlMaarefa University Riyadh Saudi Arabia College of Computer Science and Information Technology Jazan University Jazan Saudi Arabia Department of Computer Applications Invertis University UP Bareilly India Department of Computer Science and Engineering Shambhunath Institute of Engineering and Technology College Jhalwa Prayagraj India Department of Computer Science College of Computer Science and Information Technology Jazan University Jazan Saudi Arabia
Block interception attack, also known as block withholding attack, is an attack method in the blockchain. The attacker penetrates the target mining pool for passive mining to destroy the target mining pool. This paper... 详细信息
来源: 评论
A Novel Parallel Computing Confidentiality Scheme Based on Hindmarsh-Rose Model
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 1325-1341页
作者: Jawad Ahmad Mimonah Al Qathrady Mohammed SAlshehri Yazeed Yasin Ghadi Mujeeb Ur Rehman Syed Aziz Shah School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghEH105DTUK Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Computer Science Al Ain UniversityAbu Dhabi112612United Arab Emirates School of Science Technology and HealthYork St John UniversityYorkYO317EXUK Research Centre for Intelligent Healthcare Coventry UniversityCoventryCV15FBUK
Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this ***,given the limitations of computers,it becomes evenmore important to employ efficient and ... 详细信息
来源: 评论
Robust Authentication: Leveraging Hardware Fingerprints and AI to Enhance Security Against Spoofing
收藏 引用
IEEE Access 2025年 13卷 86912-86926页
作者: Nimmy, K. Jain, Kurunandan Sachin, S.M. Abekaesh, P.A. Venkitasubramaniam, Parv Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri690525 India Center for Cybersecurity Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri Campus Kerala Amritapuri690525 India Lehigh University Department of Electrical and Computer Engineering BethlehemPA18015 United States
Fingerprint authentication blends biometric precision with user convenience, leveraging unique ridge patterns for fast, reliable, and tamper-resistant identity verification. However, it remains vulnerable to spoofing ... 详细信息
来源: 评论
Binary Stochastic Flip Optimization for Training Binary Neural Networks
Binary Stochastic Flip Optimization for Training Binary Neur...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Shibuya, Tatsukichi Inoue, Nakamasa Kawakami, Rei Sato, Ikuro Department of Computer Science Institute of Science Tokyo Tokyo Japan Department of Systems and Control Engineering Institute of Science Tokyo Tokyo Japan Denso IT Laboratory Tokyo Japan
For deploying deep neural networks on edge devices with limited resources, binary neural networks (BNNs) have attracted significant attention, due to their computational and memory efficiency. However, once a neural n...
来源: 评论
Optimization of Electrocardiogram Classification Using Dipper Throated Algorithm and Differential Evolution
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2379-2395页
作者: Doaa Sami Khafaga El-Sayed M.El-kenawy Faten Khalid Karim Sameer Alshetewi Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt General Information Technology Department Ministry of DefenseThe Executive AffairsExcellence Services DirectorateRiyadh11564Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Science Faculty of Specific EducationMansoura UniversityEgypt
Electrocardiogram(ECG)signal is a measure of the heart’s electrical ***,ECG detection and classification have benefited from the use of computer-aided systems by *** goal of this paper is to improve the accuracy of E... 详细信息
来源: 评论
Extracting Facial Features to Detect Deepfake Videos Using Machine Learning
收藏 引用
International Journal of Advanced computer science and Applications 2025年 第4期16卷 834-842页
作者: Aslam, Ayesha Mir, Jamaluddin Zaman, Gohar Rahman, Atta Salam, Asiya Abdus Ali, Farhan Alhiyafi, Jamal Bakry, Aghiad Gul, Mustafa Jamal Gollapalli, Mohammed Mahmud, Maqsood Department of Computer Science Abbottabad University of Science and Technology Havelian Pakistan Department of Computer Science College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University P.O. Box 1982 Dammam31441 Saudi Arabia Department of Computer Information Systems College of Computer Science and Information Technology Imam Abdulrahman Bin Faisal University P.O. Box 1982 Dammam31441 Saudi Arabia College of Electronics and Information Engineering Shenzhen University Shenzhen China Department of Computer Science Kettering University FlintMI United States Department of Business Administration University of York York YO10 5DD Heslington United Kingdom Department of Information Technology & Engineering Sydney Met SydneyNSW2000 Australia School of Computing Ulster University Northern Ireland Belfast United Kingdom
Generative adversarial networks (GANs) have gained popularity for their ability to synthesize images from random inputs in deep learning models. One of the notable applications of this technology is the creation of re... 详细信息
来源: 评论
Monitoring of Individual Household Electrical Appliances and Prediction of Energy Consumption Using Machine Learning  5
Monitoring of Individual Household Electrical Appliances and...
收藏 引用
5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Selvam, N. Seenivasan, D. Naveen, G. Sudahar, R. Janagan, P. Dhanushmathi, S. M.Kumarasamy College of Engineering Department of Electrical and Electronics Engineering Karur India M.Kumarasamy College of Engineering Department of Computer Science and Business Systems Karur India
The study suggests a scalable method for estimating residential power usage. To increase the forecasting accuracy, an SVM (support vector machine) based technique combines many machine learning models, such as random ... 详细信息
来源: 评论
Building an Adaptive Cooperative Transmission Mechanism for Multimedia Convergence System
收藏 引用
Wireless Personal Communications 2023年 第4期133卷 2227-2266页
作者: Su, Ming-Kai Lin, Jia-Yi Horng, Gwo-Jiun Aripriharta, Aripriharta Chen, Chao-Chun Department of Computer Science and Information Engineering Southern Taiwan University of Science and Technology Tainan Taiwan Institute of Manufacturing Information and Systems National Cheng Kung University Tainan Taiwan Malang Indonesia
In people's daily lives, electronic mail, audio-visual media platforms, and communication software all have the need for file transmission. This article proposes a digital aggregation system with an adaptive colla... 详细信息
来源: 评论