咨询与建议

限定检索结果

文献类型

  • 15,725 篇 会议
  • 10,395 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 26,133 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,348 篇 工学
    • 9,639 篇 计算机科学与技术...
    • 7,762 篇 软件工程
    • 3,222 篇 信息与通信工程
    • 3,033 篇 控制科学与工程
    • 2,070 篇 电气工程
    • 1,806 篇 电子科学与技术(可...
    • 1,656 篇 生物工程
    • 1,304 篇 机械工程
    • 1,292 篇 生物医学工程(可授...
    • 983 篇 光学工程
    • 804 篇 动力工程及工程热...
    • 795 篇 仪器科学与技术
    • 694 篇 化学工程与技术
    • 601 篇 材料科学与工程(可...
    • 554 篇 安全科学与工程
    • 536 篇 交通运输工程
  • 9,200 篇 理学
    • 4,517 篇 数学
    • 2,775 篇 物理学
    • 1,971 篇 生物学
    • 1,546 篇 统计学(可授理学、...
    • 1,465 篇 系统科学
    • 809 篇 化学
  • 3,836 篇 管理学
    • 2,537 篇 管理科学与工程(可...
    • 1,434 篇 图书情报与档案管...
    • 1,300 篇 工商管理
  • 1,368 篇 医学
    • 1,144 篇 临床医学
    • 968 篇 基础医学(可授医学...
    • 563 篇 药学(可授医学、理...
    • 505 篇 公共卫生与预防医...
  • 709 篇 法学
    • 585 篇 社会学
  • 458 篇 经济学
  • 315 篇 教育学
  • 276 篇 农学
  • 71 篇 文学
  • 54 篇 军事学
  • 42 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,146 篇 computer science
  • 463 篇 deep learning
  • 371 篇 systems engineer...
  • 339 篇 computational mo...
  • 326 篇 application soft...
  • 319 篇 machine learning
  • 298 篇 computer archite...
  • 267 篇 control systems
  • 260 篇 internet of thin...
  • 234 篇 support vector m...
  • 234 篇 feature extracti...
  • 214 篇 neural networks
  • 208 篇 optimization
  • 208 篇 accuracy
  • 199 篇 information syst...
  • 197 篇 training
  • 196 篇 laboratories
  • 184 篇 routing
  • 181 篇 data mining
  • 166 篇 image segmentati...

机构

  • 472 篇 department for p...
  • 400 篇 faculty of scien...
  • 379 篇 department of ph...
  • 378 篇 department of ph...
  • 368 篇 institute of phy...
  • 367 篇 department of ph...
  • 357 篇 institute of phy...
  • 355 篇 department of ph...
  • 353 篇 kirchhoff-instit...
  • 337 篇 universidade fed...
  • 333 篇 department of ph...
  • 309 篇 fakultät für phy...
  • 296 篇 department of ph...
  • 293 篇 cavendish labora...
  • 276 篇 departamento de ...
  • 269 篇 instituto de fís...
  • 258 篇 departamento de ...
  • 256 篇 ictp trieste
  • 252 篇 nikhef national ...
  • 245 篇 high energy phys...

作者

  • 337 篇 c. alexa
  • 337 篇 c. amelung
  • 335 篇 g. bella
  • 335 篇 d. calvet
  • 333 篇 j. m. izen
  • 333 篇 j. strandberg
  • 333 篇 g. spigo
  • 332 篇 f. siegert
  • 328 篇 r. ströhmer
  • 328 篇 m. rijssenbeek
  • 327 篇 s. jin
  • 327 篇 g. gaudio
  • 322 篇 s. mohapatra
  • 305 篇 y. tayalati
  • 295 篇 s. guindon
  • 294 篇 m. klein
  • 275 篇 a. kaczmarska
  • 262 篇 f. pastore
  • 258 篇 n. orlando
  • 255 篇 j. schaarschmidt

语言

  • 25,039 篇 英文
  • 843 篇 其他
  • 220 篇 中文
  • 32 篇 日文
  • 6 篇 德文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=COPPE-Systems Engineering and Computer Science Department"
26133 条 记 录,以下是11-20 订阅
排序:
A State-Migration Particle Swarm Optimizer for Adaptive Latent Factor Analysis of High-Dimensional and Incomplete Data
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2220-2235页
作者: Jiufang Chen Kechen Liu Xin Luo Ye Yuan Khaled Sedraoui Yusuf Al-Turki MengChu Zhou IEEE the College of Computer Science and Technology Chongqing University of Posts and Telecommunications the Department of Computer Science Columbia University the College of Computer and Information Science Southwest University the Department of Electrical and Computer Engineering Faculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Center of Research Excellence in Renewable Energy and Power Systems the Department of Electrical and Computer EngineeringFaculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Department of Electrical and Computer Engineering New Jersey Institute of Technology
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation lear... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
A New Approach to Determine Feasible Operating Region of Unbalanced Distribution Networks with Distributed Photovoltaics
收藏 引用
IEEE Transactions on Power Delivery 2025年 第3期40卷 1493-1504页
作者: Prasad, Manorath Rather, Zakir Hussain Razzaghi, Reza Doolla, Suryanarayana Indian Institute of Technology Bombay Department of Energy Science and Engineering Mumbai India Monash University Department of Electrical and Computer Systems Engineering Melbourne Australia
Amidst rising distributed generation and its potential role in grid management, this article presents a new realistic approach to determine the operational space and flexibility potential of an unbalanced active distr... 详细信息
来源: 评论
IMPROVEMENT OF THE ACO ALGORITHM FOR INTELLIGENT TASK SCHEDULING IN CLOUD systems
收藏 引用
Scalable Computing 2025年 第2期26卷 531-539页
作者: DJEBBAR, ESMA INSAF BELALEM, GHALEM Department of Computer Science Systems Engineering National Polytechnic School of Oran-Maurie Audin Oran Algeria Department of Computer Science University of Oran1-Ahmed Ben Bella Algeria
Cloud computing involves accessing and using computing resources, such as servers, storage, and software applications, over the Internet, enabling scalable access on demand. Cloud computing systems are becoming an ess... 详细信息
来源: 评论
Analysis, Trends, and Utilization of Security Information and Event Management (SIEM) in Critical Infrastructures  10
Analysis, Trends, and Utilization of Security Information an...
收藏 引用
10th International Conference on Advanced Computing and Communication systems, ICACCS 2024
作者: Sashwin, K. Nithika, K.S. Priyadharshini, S. Maduvant, S.P. Saranya Sri Eshwar College of Engineering Department of Computer Science and Business Systems Computer Science and Business Systems Coimbatore India Sri Eshwar College of Engineering Department of Computer Science and Business Systems Coimbatore India
Security Information and Event Management (SIEM) systems have become essential assets in the realm of cybersecurity. They fulfill a central role in the prevention, detection, and response to cyber threats. Over time, ... 详细信息
来源: 评论
Hybrid TCN-transformer model for predicting sustainable food supply and ensuring resilience
收藏 引用
Alexandria engineering Journal 2025年 127卷 380-391页
作者: Alrashdi, Ibrahim Abd El-Aziz, Rasha M. Taloba, Ahmed I. Farsi, Mohammed Department of Computer Science College of Computer and Information Sciences Jouf University Al-Jouf Sakaka73211 Saudi Arabia Department of Information Systems College of Computer Science and Engineering Taibah University Yanbu966144 Saudi Arabia
Major concerns occur in maintaining a sustainable food supply due to population expansion, supply chain interruptions, and climate-related changes. Traditional forecasting models, such as ARIMA, LSTM, and GRU, fail to... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
SACNN-IDS: A self-attention convolutional neural network for intrusion detection in industrial internet of things
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第6期9卷 1398-1411页
作者: Mimonah Al Qathrady Safi Ullah Mohammed S.Alshehri Jawad Ahmad Sultan Almakdi Samar M.Alqhtani Muazzam A.Khan Baraq Ghaleb Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Computer Science Quaid-i-Azam UniversityIslamabadPakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghUK ICESCO Chair Big Data Analytics and Edge Computing Quaid-i-Azam UniversityIslamabadPakistan
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,tr... 详细信息
来源: 评论
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论
Sentiment analysis in social internet of things using contextual representations and dilated convolution neural network
收藏 引用
Neural Computing and Applications 2024年 第20期36卷 12357-12370页
作者: Abid, Fazeel Rasheed, Jawad Hamdi, Mohammed Alshahrani, Hani Al Reshan, Mana Saleh Shaikh, Asadullah Department of Information Systems Dr. Hassan Murad School of Management University of Management and Technology Lahore Pakistan Department of Computer Engineering Istanbul Sabahattin Zaim University Istanbul34303 Turkey Department of Software Engineering Istanbul Nisantasi University Istanbul34394 Turkey Department Computer Science College of Computer Science and Information Systems Najran University Najran61441 Saudi Arabia Department Information Systems College of Computer Science and Information Systems Najran University Najran61441 Saudi Arabia
The methodologies based on neural networks are substantial to accomplish sentiment analysis in the Social Internet of Things (SIoT). With social media sentiment analysis, significant insights can produce efficient and... 详细信息
来源: 评论