咨询与建议

限定检索结果

文献类型

  • 15,738 篇 会议
  • 10,416 篇 期刊文献
  • 445 册 图书

馆藏范围

  • 26,599 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,370 篇 工学
    • 9,649 篇 计算机科学与技术...
    • 7,766 篇 软件工程
    • 3,222 篇 信息与通信工程
    • 3,033 篇 控制科学与工程
    • 2,078 篇 电气工程
    • 1,817 篇 电子科学与技术(可...
    • 1,656 篇 生物工程
    • 1,307 篇 机械工程
    • 1,293 篇 生物医学工程(可授...
    • 983 篇 光学工程
    • 806 篇 动力工程及工程热...
    • 796 篇 仪器科学与技术
    • 695 篇 化学工程与技术
    • 602 篇 材料科学与工程(可...
    • 554 篇 安全科学与工程
    • 538 篇 交通运输工程
  • 9,212 篇 理学
    • 4,525 篇 数学
    • 2,783 篇 物理学
    • 1,972 篇 生物学
    • 1,547 篇 统计学(可授理学、...
    • 1,467 篇 系统科学
    • 810 篇 化学
  • 3,838 篇 管理学
    • 2,538 篇 管理科学与工程(可...
    • 1,435 篇 图书情报与档案管...
    • 1,301 篇 工商管理
  • 1,369 篇 医学
    • 1,145 篇 临床医学
    • 969 篇 基础医学(可授医学...
    • 564 篇 药学(可授医学、理...
    • 505 篇 公共卫生与预防医...
  • 709 篇 法学
    • 585 篇 社会学
  • 459 篇 经济学
  • 315 篇 教育学
  • 276 篇 农学
  • 71 篇 文学
  • 54 篇 军事学
  • 42 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,146 篇 computer science
  • 465 篇 deep learning
  • 366 篇 systems engineer...
  • 339 篇 computational mo...
  • 335 篇 machine learning
  • 326 篇 application soft...
  • 322 篇 artificial intel...
  • 296 篇 computer archite...
  • 267 篇 control systems
  • 260 篇 internet of thin...
  • 234 篇 support vector m...
  • 234 篇 feature extracti...
  • 212 篇 optimization
  • 208 篇 neural networks
  • 208 篇 accuracy
  • 205 篇 software enginee...
  • 199 篇 information syst...
  • 197 篇 training
  • 193 篇 laboratories
  • 184 篇 routing

机构

  • 471 篇 department for p...
  • 400 篇 faculty of scien...
  • 379 篇 department of ph...
  • 378 篇 department of ph...
  • 367 篇 institute of phy...
  • 366 篇 department of ph...
  • 357 篇 institute of phy...
  • 355 篇 department of ph...
  • 353 篇 kirchhoff-instit...
  • 337 篇 universidade fed...
  • 333 篇 department of ph...
  • 308 篇 fakultät für phy...
  • 296 篇 department of ph...
  • 293 篇 cavendish labora...
  • 276 篇 departamento de ...
  • 269 篇 instituto de fís...
  • 258 篇 departamento de ...
  • 256 篇 ictp trieste
  • 252 篇 nikhef national ...
  • 245 篇 high energy phys...

作者

  • 337 篇 c. alexa
  • 337 篇 c. amelung
  • 335 篇 g. bella
  • 335 篇 d. calvet
  • 333 篇 j. m. izen
  • 333 篇 j. strandberg
  • 333 篇 g. spigo
  • 332 篇 f. siegert
  • 328 篇 r. ströhmer
  • 328 篇 m. rijssenbeek
  • 327 篇 s. jin
  • 327 篇 g. gaudio
  • 322 篇 s. mohapatra
  • 305 篇 y. tayalati
  • 294 篇 m. klein
  • 294 篇 s. guindon
  • 275 篇 a. kaczmarska
  • 262 篇 f. pastore
  • 258 篇 n. orlando
  • 252 篇 j. schaarschmidt

语言

  • 25,505 篇 英文
  • 843 篇 其他
  • 220 篇 中文
  • 32 篇 日文
  • 6 篇 德文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=COPPE-Systems Engineering and Computer Science Department"
26599 条 记 录,以下是91-100 订阅
排序:
Encryption and decryption framework using elliptic curve cryptography  1st
Encryption and decryption framework using elliptic curve cry...
收藏 引用
1st International Conference on Applications of AI in 5G and IOT, ICAAI5GI 2024
作者: Prakash, Vijay Dudeja, Deepak Chhabra, Gunjan Garg, Lalit Department of Computer Information Systems University of Malta Msida Malta Department of Computer Science and Engineering MMEC MMDU Haryana Mullana India Department of Computer Science and Engineering Graphic Era Hill University Dehradun India Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India
Secure file encryption has become increasingly important in various disciplines, including finance, healthcare, and government, where protecting sensitive data is paramount. The proposed framework aims to meet this re... 详细信息
来源: 评论
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 383-392页
作者: Bello Musa Yakubu Majid Iqbal Khan Abid Khan Farhana Jabeen Gwanggil Jeon Department of Mathematics and Computer Science Chulalongkorn UniversityBangkok10330Thailand Department of Computer Science COMSATS University Islamabad(CUI)Islamabad45550Pakistan College of Science and Engineering University of DerbyDerbyDE221GBUnited Kingdom Department of Embedded Systems Engineering Incheon National UniversityIncheon22012South Korea
Smart home devices are vulnerable to a variety of *** matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart hom... 详细信息
来源: 评论
Effectiveness of Deep Learning Models for Brain Tumor Classification and Segmentation
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 711-729页
作者: Muhammad Irfan Ahmad Shaf Tariq Ali Umar Farooq Saifur Rahman Salim Nasar Faraj Mursal Mohammed Jalalah Samar M.Alqhtani Omar AlShorman Electrical Engineering Department College of EngineeringNajran UniversityNajran61441Saudi Arabia Department of Computer Science COMSATS University IslamabadSahiwal CampusSahiwal57000Pakistan Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia College of Engineering Najran UniversityNajran61441Saudi Arabia
A brain tumor is a mass or growth of abnormal cells in the *** children and adults,brain tumor is considered one of the leading causes of *** are several types of brain tumors,including benign(non-cancerous)and malign... 详细信息
来源: 评论
FinSecure: Utilizing IoT Sensors for Formaldehyde Detection and Fish Freshness Detection for Enhancing Safety in Fish Consumption Using Machine Learning and Deep Learning
FinSecure: Utilizing IoT Sensors for Formaldehyde Detection ...
收藏 引用
2024 International Conference on Signal Processing, Computation, Electronics, Power and Telecommunication, IConSCEPT 2024
作者: Harish, S. Somesh, K. Suntharavadivelan Venkatesan, M. Prabhavathy, P. National Institute of Technology Puducherry Department of Computer Science and Engineering Karaikal India Vellore Institute of Technology Department of Computer Science and Engineering and Information Systems Vellore India
The global food supply heavily relies on fisheries, highlighting the crucial importance of ensuring the safety of fish products. However, the widespread application of antibiotics and the existence of compounds such a... 详细信息
来源: 评论
An Intelligent Privacy Protection Scheme for Efficient Edge Computation Offloading in IoV
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 910-919页
作者: Liang YAO Xiaolong XU Wanchun DOU Muhammad Bilal School of Software Nanjing University of Information Science and Technology State Key Laboratory for Novel Software Technology Nanjing University Department of Computer and Electronics Systems Engineering Hankuk University of Foreign Studies
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive... 详细信息
来源: 评论
Contrast Normalization Strategies in Brain Tumor Imaging:From Preprocessing to Classification
收藏 引用
computer Modeling in engineering & sciences 2024年 第8期140卷 1539-1562页
作者: Samar M.Alqhtani Toufique A.Soomro Faisal Bin Ubaid Ahmed Ali Muhammad Irfan Abdullah A.Asiri Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Electronic Engineering The University of LarkanoLarkanaSindh75660Pakistan Computer Science Department Sukkur IBA UniversitySukkurSindh65200Pakistan Eletrical Engineering Department Sukkur IBA UniversitySukkurSindh65200Pakistan Electrical Engineering Department College of EngineeringNajran UniversityNajran61441Saudi Arabia Radiological Sciences Department College of Applied Medical SciencesNajran UniversityNajran61441Saudi Arabia
Cancer-related to the nervous system and brain tumors is a leading cause of mortality in various *** resonance imaging(MRI)and computed tomography(CT)are utilized to capture brain *** plays a crucial role in the diagn... 详细信息
来源: 评论
Robust Human Interaction Recognition Using Extended Kalman Filter
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2987-3002页
作者: Tanvir Fatima Naik Bukht Abdulwahab Alazeb Naif Al Mudawi Bayan Alabdullah Khaled Alnowaiser Ahmad Jalal Hui Liu Faculty of Computing&Artificial Intelligence Air UniversityIslamabad44000Pakistan Department of Computer Science College of Computer Science and Information SystemNajran UniversityNajran55461Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Engineering College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Cognitive Systems Lab University of BremenBremen28359Germany
In the field of computer vision and pattern recognition,knowledge based on images of human activity has gained popularity as a research *** recognition is the process of determining human behavior based on an *** impl... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
Human Gait Recognition for Biometrics Application Based on Deep Learning Fusion Assisted Framework
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 357-374页
作者: Ch Avais Hanif Muhammad Ali Mughal Muhammad Attique Khan Nouf Abdullah Almujally Taerang Kim Jae-Hyuk Cha Department of Electrical Engineering HITEC UniversityTaxila47080Pakistan Department of Computer Science and Mathematics Lebanese American UniversityBeirutLebanon Department of Computer Science HITEC UniversityTaxila47080Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Hanyang UniversitySeoul04763Korea
The demand for a non-contact biometric approach for candidate identification has grown over the past ten *** on the most important biometric application,human gait analysis is a significant research topic in computer ... 详细信息
来源: 评论
A novel deep dual self-attention and Bi-LSTM fusion framework for Parkinson’s disease prediction using freezing of gait: a biometric application
收藏 引用
Multimedia Tools and Applications 2024年 第33期83卷 80179-80200页
作者: Habib, Zeeshan Mughal, Muhammad Ali Khan, Muhammad Attique Hamza, Ameer Alturki, Nazik Jamel, Leila Department of Electrical Engineering HITEC University Taxila Pakistan Department of Computer Science HITEC University Taxila Pakistan Department of Computer Science and Mathematics Lebanese American University Beirut Lebanon Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh Saudi Arabia
Parkinson’s disease (PD) disorder is caused by the imbalance of inhibitory dopamine and excitatory acetylcholine neurotransmitters, which causes hindrance in locomotion. Freezing of gait (FOG), tremors, and bradykine... 详细信息
来源: 评论