咨询与建议

限定检索结果

文献类型

  • 5,938 篇 会议
  • 5,683 篇 期刊文献
  • 157 册 图书

馆藏范围

  • 11,778 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,303 篇 工学
    • 5,304 篇 计算机科学与技术...
    • 4,311 篇 软件工程
    • 1,757 篇 信息与通信工程
    • 1,172 篇 控制科学与工程
    • 1,090 篇 生物工程
    • 995 篇 生物医学工程(可授...
    • 920 篇 电气工程
    • 712 篇 电子科学与技术(可...
    • 706 篇 光学工程
    • 465 篇 机械工程
    • 349 篇 动力工程及工程热...
    • 344 篇 仪器科学与技术
    • 330 篇 网络空间安全
    • 311 篇 安全科学与工程
    • 293 篇 交通运输工程
    • 277 篇 化学工程与技术
  • 4,387 篇 理学
    • 1,934 篇 数学
    • 1,561 篇 物理学
    • 1,268 篇 生物学
    • 651 篇 统计学(可授理学、...
    • 401 篇 系统科学
    • 335 篇 化学
  • 2,042 篇 管理学
    • 1,271 篇 管理科学与工程(可...
    • 826 篇 图书情报与档案管...
    • 612 篇 工商管理
  • 1,158 篇 医学
    • 984 篇 临床医学
    • 844 篇 基础医学(可授医学...
    • 506 篇 药学(可授医学、理...
    • 481 篇 公共卫生与预防医...
  • 368 篇 法学
    • 292 篇 社会学
  • 233 篇 农学
  • 216 篇 经济学
  • 189 篇 教育学
  • 36 篇 文学
  • 31 篇 艺术学
  • 20 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 454 篇 deep learning
  • 372 篇 machine learning
  • 262 篇 internet of thin...
  • 261 篇 accuracy
  • 224 篇 feature extracti...
  • 219 篇 computational mo...
  • 197 篇 artificial intel...
  • 189 篇 real-time system...
  • 182 篇 predictive model...
  • 144 篇 support vector m...
  • 141 篇 educational inst...
  • 141 篇 optimization
  • 136 篇 security
  • 134 篇 training
  • 118 篇 neural networks
  • 114 篇 convolutional ne...
  • 107 篇 medical services
  • 106 篇 covid-19
  • 104 篇 cloud computing
  • 103 篇 computer science

机构

  • 405 篇 department for p...
  • 403 篇 faculty of scien...
  • 396 篇 department of ph...
  • 386 篇 kirchhoff-instit...
  • 385 篇 department of ph...
  • 383 篇 department of ph...
  • 352 篇 fakultät für phy...
  • 330 篇 institute of phy...
  • 321 篇 institute of phy...
  • 306 篇 department of ph...
  • 279 篇 department of ph...
  • 274 篇 instituto de fís...
  • 269 篇 department of ph...
  • 268 篇 universidade fed...
  • 264 篇 graduate school ...
  • 264 篇 ictp trieste
  • 255 篇 yerevan physics ...
  • 251 篇 department of ph...
  • 248 篇 nikhef national ...
  • 248 篇 department of ph...

作者

  • 338 篇 c. alexa
  • 336 篇 j. m. izen
  • 333 篇 g. bella
  • 333 篇 d. calvet
  • 333 篇 c. amelung
  • 331 篇 j. strandberg
  • 328 篇 g. spigo
  • 327 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 318 篇 s. mohapatra
  • 301 篇 y. tayalati
  • 299 篇 s. guindon
  • 291 篇 a. kaczmarska
  • 286 篇 m. klein
  • 279 篇 j. schaarschmidt
  • 270 篇 a. d. pilkington
  • 260 篇 f. pastore

语言

  • 10,745 篇 英文
  • 983 篇 其他
  • 53 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 3 篇 斯洛文尼亚文
  • 2 篇 法文
检索条件"机构=College of Computing and Informatics Computer Engineering Department"
11778 条 记 录,以下是341-350 订阅
排序:
DDoS Cyber-Attacks Detection-Based Hybrid CNN-LSTM  3rd
DDoS Cyber-Attacks Detection-Based Hybrid CNN-LSTM
收藏 引用
3rd International Conference on computing and Communication Networks, ICCCN 2023
作者: Khaleel, Thura Jabbar Shiltagh, Nadia Adnan Iraqi Commission for Computers and Information/Informatics Institute for Postgraduate Studies Baghdad Iraq Computer Engineering Department College of Engineering University of Baghdad Baghdad Iraq
Protecting software-defined networking (SDN) against cyber-attacks has become crucial in an expanding digital threat environment. Distributed Denial-of-Service (DDoS) attacks are risky since they may seriously interru... 详细信息
来源: 评论
IoT Based Designing of Secure Data Storage System in Distributed Cloud System with Big Data using Cryptography Algorithm  11
IoT Based Designing of Secure Data Storage System in Distrib...
收藏 引用
11th International Conference on System Modeling and Advancement in Research Trends, SMART 2022
作者: Shukla, Ravi Shankar College of Computing and Informatics Saudi Electronic University Department of Computer Science Saudi Arabia
The cloud system plays a versatile role in the storage of vast data for future references. This includes the delivery of the computing sources that includes the servers with storage, various databases, networking syst... 详细信息
来源: 评论
Diversified and compatible web APIs recommendation based on game theory in IoT
收藏 引用
Digital Communications and Networks 2024年 第4期10卷 1198-1209页
作者: Wenwen Gong Huiping Wu Xiaokang Wang Xuyun Zhang Yawei Wang Yifei Chen Mohammad R.Khosravi College of Information and Electrical Engineering China Agricultural UniversityBeijing100000China Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyShouguang262700China Department of Computer Science St.Francis Xavier UniversityAntigonishNSCanada Department of Computing Macquarie UniversitySydneyNSW2122Australia Department of Computer Engineering Persian Gulf UniversityBushehr***Iran Department of Electrical and Electronic Engineering Shiraz University of TechnologyShiraz71557-13876Iran
With the ever-increasing popularity of Internet of Things(IoT),massive enterprises are attempting to encapsulate their developed outcomes into various lightweight Web Application Programming Interfaces(APIs)that can b... 详细信息
来源: 评论
On the Performance Evaluation of Mobility Model-Based GPSR Routing Protocol in Flying Ad hoc Networks  6
On the Performance Evaluation of Mobility Model-Based GPSR R...
收藏 引用
6th International Conference on Pattern Analysis and Intelligent Systems, PAIS 2024
作者: Bezziane, Mohamed Ben Sahraoui, Yesin Brik, Bouziane Mekkas, Lina Bougeurra, Sara Khaldi, Anouar University Kasdi Merbah Computer Science And Information Technologies Department Ouargla Algeria National Higher School of Artificial Intelligence Computer Science Algiers Algeria University of Sharjah College of Computing And Informatics Computer Science Department Sharjah United Arab Emirates
In recent times, we have witnessed the rapid and remarkable evolution of communication technologies, particularly in the domain of Flying Ad Hoc Networks (FANETs). This evolution has necessitated a thorough evaluation... 详细信息
来源: 评论
Wireless Sensor Networks: Revolutionizing Explosive Detection  5
Wireless Sensor Networks: Revolutionizing Explosive Detectio...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Sujith Kumar, P.S. Anand, C. Vasuki, N. Ramesh, V. Santhoshkumar, S.P. Sree Buddha College of Engineering Department of Computer Science and Engineering Kerala Alappuzha India Nandha College of Technology Department of Information Technology Erode India Government College of Engineering Department of Computer Science and Engineering Erode India School of Computing Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai Avadi India
One of the important technologies for protecting civilian life from terrorist attacks is explosive detection techniques. The global incidence of terrorist activities has been considerably reduced by the development of... 详细信息
来源: 评论
Multi-Controller Architecture Design and Features in Software - Defined Networking (SDN)  6
Multi-Controller Architecture Design and Features in Softwar...
收藏 引用
6th International Conference on Mobile computing and Sustainable informatics, ICMCSI 2025
作者: Prabhu, V. Balamurugan, P. Department of Computer Science and Engineering School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamilnadu Chengalpattu603 203 India Department of Networking and Communications School of Computing College of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamilnadu Chengalpattu603 203 India
Networking paradigm known as "Software-Defined Networking" (SDN) offers more flexibility with network management and is fast gaining popularity. Separating the control plane from the data plane is largely re... 详细信息
来源: 评论
Conditional selection with CNN augmented transformer for multimodal affective analysis
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第4期9卷 917-931页
作者: Jianwen Wang Shiping Wang Shunxin Xiao Renjie Lin Mianxiong Dong Wenzhong Guo College of Computer and Data Science Fuzhou UniversityFuzhouChina College of Computer and Cyber Security Fujian Normal UniversityFuzhouChina Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhouChina Digital Fujian Institute of Big Data Security Technology Fujian Normal UniversityFuzhouChina Department of Sciences and Informatics Muroran Institute of TechnologyMuroranJapan
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information.... 详细信息
来源: 评论
Generative Adversarial Networks (GANs) for Artistic Style Transfer in Images
Generative Adversarial Networks (GANs) for Artistic Style Tr...
收藏 引用
2024 International Conference on Distributed Systems, computer Networks and Cybersecurity, ICDSCNC 2024
作者: Jamalpur, Bhavana Kiruthiga, S. Ranjitha, B. Lefty Joyson, J. Jayaram, K. Soundar, K. Ruba S R University Department of Computer Science and Artificial Intelligence India School of Computing Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science & Engineering Chennai India Mohan Babu University Department of Mathematics India Jp College of Engineering Department of Computer Science and Engineering Ayikudi India College of Engineering Adoor Department of Computer Science and Engineering Pathanamthitta India Department of Computer Science and Engineering Sivakasi India
Many in computer vision and computational imaging consider Generative Adversarial Networks (GANs) a big advance. Style transfer converts semantic visual content into creative styles. Recently, GANs for style transfer ... 详细信息
来源: 评论
Cutting-edge approaches in intrusion detection systems: a systematic review of deep learning, reinforcement learning, and ensemble techniques
收藏 引用
Iran Journal of computer Science 2025年 第2期8卷 303-333页
作者: Kalpani, Nethma Rodrigo, Nureka Seneviratne, Dilmi Ariyadasa, Subhash Senanayake, Janaka Department of Computer Science and Informatics Uva Wellassa University Badulla Sri Lanka School of Computing Engineering and Technology Robert Gordon University Aberdeen AB10 7GJ United Kingdom
The growing number of networked devices and complex network infrastructures necessitates robust network security measures. Network intrusion detection systems are crucial for identifying and mitigating malicious activ... 详细信息
来源: 评论
Exploring Network Dynamics: Community Detection and Influencer Analysis in Multidimensional Social Networks
Exploring Network Dynamics: Community Detection and Influenc...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Kanavos, Andreas Vonitsanos, Gerasimos Karamitsos, Ioannis Al-Hussaeni, Khalil Ionian University Department of Informatics Corfu Greece University of Patras Computer Engineering and Informatics Department Patras Greece Rochester Institution of Technology Dubai United Arab Emirates Rochester Institute of Technology Computing Sciences Department Dubai United Arab Emirates
In the digital era, multidimensional social networks have become integral to daily communication, catering to diverse relational needs, from interpersonal to professional and commercial. This study utilizes two compre... 详细信息
来源: 评论