咨询与建议

限定检索结果

文献类型

  • 6,629 篇 会议
  • 6,506 篇 期刊文献
  • 263 册 图书

馆藏范围

  • 13,398 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,107 篇 工学
    • 5,690 篇 计算机科学与技术...
    • 4,448 篇 软件工程
    • 1,635 篇 信息与通信工程
    • 1,379 篇 控制科学与工程
    • 1,049 篇 生物工程
    • 928 篇 生物医学工程(可授...
    • 869 篇 电气工程
    • 681 篇 电子科学与技术(可...
    • 582 篇 光学工程
    • 574 篇 机械工程
    • 400 篇 仪器科学与技术
    • 349 篇 动力工程及工程热...
    • 346 篇 化学工程与技术
    • 280 篇 安全科学与工程
    • 265 篇 网络空间安全
  • 4,887 篇 理学
    • 2,231 篇 数学
    • 1,545 篇 物理学
    • 1,266 篇 生物学
    • 763 篇 统计学(可授理学、...
    • 528 篇 系统科学
    • 408 篇 化学
  • 2,380 篇 管理学
    • 1,483 篇 管理科学与工程(可...
    • 984 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 1,163 篇 医学
    • 964 篇 临床医学
    • 801 篇 基础医学(可授医学...
    • 459 篇 公共卫生与预防医...
    • 452 篇 药学(可授医学、理...
  • 423 篇 法学
    • 353 篇 社会学
  • 272 篇 经济学
    • 272 篇 应用经济学
  • 260 篇 教育学
  • 223 篇 农学
  • 47 篇 文学
  • 35 篇 艺术学
  • 25 篇 军事学
  • 16 篇 哲学
  • 10 篇 历史学

主题

  • 398 篇 deep learning
  • 324 篇 machine learning
  • 322 篇 computer science
  • 284 篇 educational inst...
  • 198 篇 internet of thin...
  • 190 篇 artificial intel...
  • 187 篇 computational mo...
  • 160 篇 feature extracti...
  • 140 篇 optimization
  • 138 篇 predictive model...
  • 135 篇 accuracy
  • 131 篇 support vector m...
  • 120 篇 wireless sensor ...
  • 119 篇 real-time system...
  • 115 篇 neural networks
  • 112 篇 computer archite...
  • 111 篇 security
  • 110 篇 data mining
  • 105 篇 covid-19
  • 104 篇 semantics

机构

  • 404 篇 faculty of scien...
  • 403 篇 department for p...
  • 391 篇 department of ph...
  • 383 篇 department of ph...
  • 383 篇 department of ph...
  • 381 篇 kirchhoff-instit...
  • 345 篇 fakultät für phy...
  • 324 篇 institute of phy...
  • 303 篇 department of ph...
  • 300 篇 institute of phy...
  • 277 篇 department of ph...
  • 272 篇 instituto de fís...
  • 269 篇 department of ph...
  • 264 篇 universidade fed...
  • 260 篇 graduate school ...
  • 257 篇 yerevan physics ...
  • 257 篇 ictp trieste
  • 251 篇 department of ph...
  • 246 篇 nikhef national ...
  • 244 篇 department of ph...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 331 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 325 篇 g. spigo
  • 323 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 315 篇 s. mohapatra
  • 299 篇 s. guindon
  • 298 篇 y. tayalati
  • 293 篇 a. kaczmarska
  • 287 篇 m. klein
  • 278 篇 j. schaarschmidt
  • 263 篇 a. d. pilkington
  • 259 篇 f. pastore

语言

  • 12,800 篇 英文
  • 520 篇 其他
  • 81 篇 中文
  • 9 篇 日文
  • 3 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=College of Computer Science Informatics and Computer Systems Department"
13398 条 记 录,以下是371-380 订阅
排序:
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4059-4079页
作者: Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi Department of Computing Abasyn UniversityIslamabadPakistan Department of Computer Science National University of TechnologyIslamabadPakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Kingdom of Saudi Arabia Department of Management Information Systems Business Administration CollegeKing Saud UniversityRiyadh11451Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure *** cryptography is a data encryption mechanism that consists of different steps and prevents the... 详细信息
来源: 评论
WanderGenie: A Smart Guide for Immersive Tourism through Generative AI  2
WanderGenie: A Smart Guide for Immersive Tourism through Gen...
收藏 引用
2nd International Conference on Computational Intelligence and Network systems, CINS 2024
作者: Barvin, D.S. Rajan, Anitha Amaithi Rajan, Arun Amaithi Department of Computer Science Business Systems Francis Xavier Engineering College Tamil Nadu Tirunelveli627011 India Department of Computer Science and Engineering College of Engineering Guindy Anna University Tamil Nadu Chennai600025 India
Tourism encourages cultural interaction, economic growth, and global connectivity, improving both travelers and host communities. Due to the shortage of accessible and competent guides, travelers often miss out on the... 详细信息
来源: 评论
IoT-Cloud Assisted Botnet Detection Using Rat Swarm Optimizer with Deep Learning
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3085-3100页
作者: Saeed Masoud Alshahrani Fatma S.Alrayes Hamed Alqahtani Jaber S.Alzahrani Mohammed Maray Sana Alazwari Mohamed A.Shamseldin Mesfer Al Duhayyim Department of Computer Science College of Computing and Information TechnologyShaqra UniversityShaqraSaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Information Systems College of Computer ScienceCenter of Artificial IntelligenceUnit of CybersecurityKing Khalid UniversityAbhaSaudi Arabia Department of Industrial Engineering College of Engineering at AlqunfudahUmm Al-Qura UniversitySaudi Arabia Department of Information Systems College of Computer ScienceKing Khalid UniversityAbhaSaudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif P.O.Box 11099Taif21944Saudi Arabia Department of Mechanical Engineering Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11835Egypt Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia
Nowadays,Internet of Things(IoT)has penetrated all facets of human life while on the other hand,IoT devices are heavily prone to *** has become important to develop an accurate system that can detect malicious attacks... 详细信息
来源: 评论
When Computing Power Network Meets Distributed Machine Learning: An Efficient Federated Split Learning Framework  31
When Computing Power Network Meets Distributed Machine Learn...
收藏 引用
31st IEEE/ACM International Symposium on Quality of Service, IWQoS 2023
作者: Yuan, Xinjing Pu, Lingjun Jiao, Lei Wang, Xiaofei Yang, Meijuan Xu, Jingdong Institute of Systems and Networks College of Computer Science Nankai University China University of Oregon Department of Computer Science United States School of Computer Science and Technology Tianjin University China
In this paper, we advocate CPN-FedSL, a novel and flexible Federated Split Learning (FedSL) framework over Computing Power Network (CPN). We build a dedicated model to capture the basic settings and learning character... 详细信息
来源: 评论
A Three-Dimensional Real-Time Gait-Based Age Detection System Using Machine Learning
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 165-182页
作者: Muhammad Azhar Sehat Ullah Khalil Ullah Habib Shah Abdallah Namoun Khaliq Ur Rahman Department of Computer Science&IT University of MalakandChakdara18800Pakistan Department of Software Engineering University of MalakandChakdara18800Pakistan College of Computer Science King Khalid UniversityAbha62529Saudi Arabia Faculty of Computer and Information Systems Islamic University of MadinahMadinah42351Saudi Arabia Department of Statistics Abdul Wali Khan UniversityMardan23200Pakistan
Human biometric analysis has gotten much attention due to itswidespread use in different research areas, such as security, surveillance,health, human identification, and classification. Human gait is one of the keyhum... 详细信息
来源: 评论
Optimization of Electrocardiogram Classification Using Dipper Throated Algorithm and Differential Evolution
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2379-2395页
作者: Doaa Sami Khafaga El-Sayed M.El-kenawy Faten Khalid Karim Sameer Alshetewi Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt General Information Technology Department Ministry of DefenseThe Executive AffairsExcellence Services DirectorateRiyadh11564Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Science Faculty of Specific EducationMansoura UniversityEgypt
Electrocardiogram(ECG)signal is a measure of the heart’s electrical ***,ECG detection and classification have benefited from the use of computer-aided systems by *** goal of this paper is to improve the accuracy of E... 详细信息
来源: 评论
Forecasting Price Prediction for Vegetables and Fruits Using Recurrent Neural Network  5
Forecasting Price Prediction for Vegetables and Fruits Using...
收藏 引用
5th International Conference on Electronics and Sustainable Communication systems, ICESC 2024
作者: Gothai, E. Rajalaxmi, R.R. Thamilselvan, R. Harshath, S.M. Kongu Engineering College Department of Computer Technology Tamilnadu Perundurai India Kongu Engineering College Department of Computer Science and Engineering Tamilnadu Perundurai India Kongu Engineering College MSc Software Systems Erode India
Unpredictable fruit and vegetable prices create significant challenges for farmer livelihoods. This research proposes an innovative approach using recurrent neural networks (RNNs) to predict both minimum and maximum p... 详细信息
来源: 评论
Enhancing Cybersecurity in IIoT Smart Grids: Leveraging HGAMPO for PMU Data Manipulation Detection
Enhancing Cybersecurity in IIoT Smart Grids: Leveraging HGAM...
收藏 引用
2024 International Conference on Knowledge Engineering and Communication systems, ICKECS 2024
作者: Janani, B. Keerthana, S.D. Subathra, S. Subiksha, N. K. S. Rangasamy College of Technology Department of Computer Science and Engineering Tiruchengode637 215 India Sri Sai Ram Engineering College Department of Computer Science and Business Systems Chennai600044 India
The integration of Industrial Internet of Things (IIoT) technology into smart grid systems has resulted in unprecedented advantages in terms of effectiveness and dependability. Nevertheless, this interconnectivity als... 详细信息
来源: 评论
Hybrid Dipper Throated and Grey Wolf Optimization for Feature Selection Applied to Life Benchmark Datasets
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4531-4545页
作者: Doaa Sami Khafaga El-Sayed M.El-kenawy Faten Khalid Karim Mostafa Abotaleb Abdelhameed Ibrahim Abdelaziz A.Abdelhamid D.L.Elsheweikh Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Computer Science Faculty of Specific EducationMansoura UniversityEgypt
Selecting the most relevant subset of features from a dataset is a vital step in data mining and machine *** feature in a dataset has 2n possible subsets,making it challenging to select the optimum collection of featu... 详细信息
来源: 评论
An Intelligent Secure Adversarial Examples Detection Scheme in Heterogeneous Complex Environments
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3859-3876页
作者: Weizheng Wang Xiangqi Wang Xianmin Pan Xingxing Gong Jian Liang Pradip Kumar Sharma Osama Alfarraj Wael Said College of Information Science and Engineering HunanWomen’s UniversityChangsha410138China School of Mathematics and Statistics Hunan First Normal UniversityChangsha410138China School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410114China Department of Computing Science University of AberdeenAberdeenAB243FXUK Department of Computer Science Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Department of Computer Science Faculty of Computers and InformaticsZagazig UniversityZagazig44511Egypt
Image-denoising techniques are widely used to defend against Adversarial Examples(AEs).However,denoising alone cannot completely eliminate adversarial *** remaining perturbations tend to amplify as they propagate thro... 详细信息
来源: 评论