咨询与建议

限定检索结果

文献类型

  • 12,987 篇 会议
  • 6,915 篇 期刊文献
  • 348 册 图书

馆藏范围

  • 20,250 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,551 篇 工学
    • 8,067 篇 计算机科学与技术...
    • 6,616 篇 软件工程
    • 2,713 篇 信息与通信工程
    • 1,652 篇 控制科学与工程
    • 1,534 篇 生物工程
    • 1,479 篇 生物医学工程(可授...
    • 1,251 篇 电气工程
    • 1,127 篇 电子科学与技术(可...
    • 972 篇 光学工程
    • 767 篇 机械工程
    • 627 篇 仪器科学与技术
    • 516 篇 化学工程与技术
    • 470 篇 动力工程及工程热...
    • 399 篇 安全科学与工程
    • 370 篇 交通运输工程
    • 351 篇 建筑学
  • 7,055 篇 理学
    • 3,393 篇 数学
    • 2,351 篇 物理学
    • 1,742 篇 生物学
    • 1,111 篇 统计学(可授理学、...
    • 794 篇 系统科学
    • 556 篇 化学
  • 3,141 篇 管理学
    • 1,792 篇 管理科学与工程(可...
    • 1,496 篇 图书情报与档案管...
    • 969 篇 工商管理
  • 1,409 篇 医学
    • 1,211 篇 临床医学
    • 1,102 篇 基础医学(可授医学...
    • 717 篇 药学(可授医学、理...
    • 507 篇 公共卫生与预防医...
  • 534 篇 法学
    • 446 篇 社会学
  • 320 篇 经济学
  • 282 篇 教育学
  • 261 篇 农学
  • 62 篇 文学
  • 30 篇 军事学
  • 28 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 589 篇 informatics
  • 297 篇 computational mo...
  • 275 篇 computer archite...
  • 268 篇 deep learning
  • 253 篇 computer science
  • 229 篇 machine learning
  • 218 篇 data mining
  • 203 篇 image segmentati...
  • 203 篇 training
  • 194 篇 internet of thin...
  • 192 篇 feature extracti...
  • 183 篇 optimization
  • 181 篇 support vector m...
  • 180 篇 artificial intel...
  • 175 篇 accuracy
  • 158 篇 neural networks
  • 157 篇 quality of servi...
  • 151 篇 bandwidth
  • 148 篇 monitoring
  • 135 篇 application soft...

机构

  • 409 篇 department for p...
  • 405 篇 faculty of scien...
  • 398 篇 department of ph...
  • 385 篇 department of ph...
  • 384 篇 kirchhoff-instit...
  • 383 篇 department of ph...
  • 346 篇 fakultät für phy...
  • 320 篇 institute of phy...
  • 303 篇 department of ph...
  • 301 篇 institute of phy...
  • 278 篇 department of ph...
  • 267 篇 instituto de fís...
  • 267 篇 department of ph...
  • 264 篇 universidade fed...
  • 260 篇 graduate school ...
  • 260 篇 ictp trieste
  • 254 篇 yerevan physics ...
  • 251 篇 department of ph...
  • 245 篇 nikhef national ...
  • 244 篇 department of ph...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 331 篇 g. bella
  • 330 篇 d. calvet
  • 330 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 324 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 317 篇 g. gaudio
  • 317 篇 s. mohapatra
  • 300 篇 s. guindon
  • 299 篇 y. tayalati
  • 289 篇 a. kaczmarska
  • 283 篇 m. klein
  • 267 篇 j. schaarschmidt
  • 259 篇 f. pastore
  • 253 篇 a. d. pilkington

语言

  • 19,598 篇 英文
  • 502 篇 其他
  • 134 篇 中文
  • 18 篇 日文
  • 2 篇 土耳其文
  • 1 篇 德文
  • 1 篇 爱沙尼亚文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Engineering and Informatics"
20250 条 记 录,以下是331-340 订阅
排序:
Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1871-1886页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala NerusMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyahKuwait Department of Computer Science Sharif College of Engineering&TechnologyLahore54000Pakistan
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,includi... 详细信息
来源: 评论
Decentralized control in active distribution grids via supervised and reinforcement learning
收藏 引用
Energy and AI 2024年 第2期16卷 137-149页
作者: Stavros Karagiannopoulos Petros Aristidou Gabriela Hug Audun Botterud Laboratory for Information and Decision Systems(LIDS) Massachusetts Institute of TechnologyCambridgeUSA EEH-Power Systems Laboratory ETH Zurichhysikstrasse 38092 ZurichSwitzerland Department of Electrical Engineering Computer Engineering&InformaticsCyprus
While moving towards a low-carbon, sustainable electricity system, distribution networks are expected to host a large share of distributed generators, such as photovoltaic units and wind turbines. These inverter-based... 详细信息
来源: 评论
DDoS Cyber-Attacks Detection-Based Hybrid CNN-LSTM  3rd
DDoS Cyber-Attacks Detection-Based Hybrid CNN-LSTM
收藏 引用
3rd International Conference on Computing and Communication Networks, ICCCN 2023
作者: Khaleel, Thura Jabbar Shiltagh, Nadia Adnan Iraqi Commission for Computers and Information/Informatics Institute for Postgraduate Studies Baghdad Iraq Computer Engineering Department College of Engineering University of Baghdad Baghdad Iraq
Protecting software-defined networking (SDN) against cyber-attacks has become crucial in an expanding digital threat environment. Distributed Denial-of-Service (DDoS) attacks are risky since they may seriously interru... 详细信息
来源: 评论
Hand Sign Detection and Voice Conversion for the Hearing and Speech Impaired Using Convolutional Neural Networks  4th
Hand Sign Detection and Voice Conversion for the Hearing and...
收藏 引用
4th International Conference on Recent Trends in Machine Learning, IoT, Smart Cities, and Applications, ICMISC 2023
作者: Belgaum, Mohammad Riyaz Sowmya, Kurni Sireesha, Kuruva Priyanka, Tatagari Tony Vyshnavi, Uppara Uravakonda Department of Computer Science and Engineering G. Pullaiah College of Engineering and Technology Kurnool India Faculty of Computing and Informatics Multimedia University Cyberjaya Malaysia
Sign Language Recognition (SLR) tries to convert sign language into written or spoken form to enable communication between a deaf-mute person and a normal person. The task of communicating with disabled and impaired p... 详细信息
来源: 评论
Selection of Outsource Security Guard using Multi-Objective Optimization Ratio Analysis Method  7
Selection of Outsource Security Guard using Multi-Objective ...
收藏 引用
7th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2023
作者: Aditya Firmansyah, Mochamad Rafly Ismail, Iklima Ermis Hidayati, Anita Politeknik Negeri Jakarta Dept. of Computer and Informatics Engineering Jawa Barat Depok Indonesia
The security guard profession is no longer a profession that only relies on the physical but also other aspects, such as attitude, leadership, language, and others. There are several problems faced by companies provid... 详细信息
来源: 评论
RGB-D Video Mirror Detection
RGB-D Video Mirror Detection
收藏 引用
2025 IEEE/CVF Winter Conference on Applications of computer Vision, WACV 2025
作者: Xu, Mingchen Herbert, Peter Lai, Yu-Kun Ji, Ze Wu, Jing School of Computer Science and Informatics Cardiff University United Kingdom School of Engineering Cardiff University United Kingdom
Mirror detection aims to identify mirror areas in a scene, with recent methods either integrating depth information (RGB-D) or making use of temporal information (video). However, utilizing both data is still under-ex... 详细信息
来源: 评论
Malware incident response(IR) informed by cyber threat intelligence(CTI)
收藏 引用
Science China(Information Sciences) 2022年 第7期65卷 256-258页
作者: Ying HE Ellis INGLUT Cunjin LUO School of Computer Science and Informatics De Montfort University Key Lab of Medical Electrophysiology Ministry of Education The Health Informatics Group Institute of Cardiovascular Research Southwest Medical University School of Computer Science and Engineering Northeastern University
Dear editor, Security experts have been fighting against cybercriminals for many years and existing research shows that this battle will continue. Malicious software has no remorse when it targets different organizati... 详细信息
来源: 评论
An intrusion detection system using ranked feature bagging
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第2期16卷 1213-1219页
作者: Azhagiri, M. Rajesh, A. Karthik, S. Raja, K. Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India Department of Computer Science and Engineering Jain University Bangalore India Department of IT College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India
An Intrusion Detection System monitors the network for any malicious attacks. It is an ideal tool for protecting extensive business networks from any kind of attack. In this paper, an Intrusion Detection System using ... 详细信息
来源: 评论
IDCE:Integrated Data Compression and Encryption for Enhanced Security and Efficiency
收藏 引用
computer Modeling in engineering & Sciences 2025年 第4期143卷 1029-1048页
作者: Muhammad Usama Arshad Aziz Suliman A.Alsuhibany Imtiaz Hassan Farrukh Yuldashev Department of Cyber Security Pakistan Navy Engineering CollegeNational University of Sciences and TechnologyKarachi75350Pakistan Department of Computer Science Main CampusIqra UniversityKarachi75500Pakistan Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Informatics and Its Teaching Methods Tashkent State Pedagogical UniversityTashkent100170Uzbekistan
Data compression plays a vital role in datamanagement and information theory by reducing ***,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable t... 详细信息
来源: 评论
A Load-Fairness Prioritization-Based Matching Technique for Cloud Task Scheduling and Resource Allocation
收藏 引用
computer Systems Science & engineering 2023年 第6期45卷 2461-2481页
作者: Abdulaziz Alhubaishy Abdulmajeed Aljuhani College of Computing and Informatics Saudi Electronic UniversityRiyadh11673Saudi Arabia College of Computer Science and Engineering Taibah UniversityMedina41411Saudi Arabia
In a cloud environment,consumers search for the best service provider that accomplishes the required tasks based on a set of criteria such as completion time and *** the other hand,Cloud Service Providers(CSPs)seek to... 详细信息
来源: 评论