咨询与建议

限定检索结果

文献类型

  • 17,984 篇 会议
  • 11,838 篇 期刊文献
  • 460 册 图书

馆藏范围

  • 30,282 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17,734 篇 工学
    • 10,923 篇 计算机科学与技术...
    • 8,778 篇 软件工程
    • 3,636 篇 信息与通信工程
    • 3,316 篇 控制科学与工程
    • 2,527 篇 电气工程
    • 2,306 篇 电子科学与技术(可...
    • 1,994 篇 生物工程
    • 1,666 篇 生物医学工程(可授...
    • 1,439 篇 机械工程
    • 1,286 篇 光学工程
    • 1,014 篇 化学工程与技术
    • 964 篇 仪器科学与技术
    • 962 篇 动力工程及工程热...
    • 924 篇 材料科学与工程(可...
    • 612 篇 安全科学与工程
    • 589 篇 交通运输工程
  • 10,619 篇 理学
    • 5,079 篇 数学
    • 3,235 篇 物理学
    • 2,429 篇 生物学
    • 1,765 篇 统计学(可授理学、...
    • 1,566 篇 系统科学
    • 1,186 篇 化学
  • 4,385 篇 管理学
    • 2,857 篇 管理科学与工程(可...
    • 1,672 篇 图书情报与档案管...
    • 1,489 篇 工商管理
  • 1,734 篇 医学
    • 1,438 篇 临床医学
    • 1,224 篇 基础医学(可授医学...
    • 709 篇 药学(可授医学、理...
    • 604 篇 公共卫生与预防医...
  • 807 篇 法学
    • 670 篇 社会学
  • 535 篇 经济学
  • 461 篇 教育学
  • 341 篇 农学
  • 83 篇 文学
  • 57 篇 军事学
  • 42 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,203 篇 computer science
  • 521 篇 deep learning
  • 397 篇 computational mo...
  • 391 篇 machine learning
  • 352 篇 artificial intel...
  • 345 篇 systems engineer...
  • 301 篇 application soft...
  • 298 篇 computer archite...
  • 291 篇 internet of thin...
  • 286 篇 control systems
  • 274 篇 feature extracti...
  • 270 篇 accuracy
  • 266 篇 training
  • 261 篇 support vector m...
  • 233 篇 neural networks
  • 227 篇 optimization
  • 214 篇 information syst...
  • 195 篇 software enginee...
  • 194 篇 routing
  • 190 篇 laboratories

机构

  • 52 篇 shanghai key lab...
  • 44 篇 department of co...
  • 44 篇 department of la...
  • 43 篇 department of el...
  • 42 篇 department of el...
  • 42 篇 department of sy...
  • 41 篇 department of co...
  • 38 篇 department of co...
  • 36 篇 renewable and su...
  • 35 篇 department of in...
  • 34 篇 department of co...
  • 32 篇 department of el...
  • 32 篇 department of ph...
  • 31 篇 department of ph...
  • 31 篇 department of sy...
  • 30 篇 academy of mathe...
  • 30 篇 school of comput...
  • 30 篇 department of el...
  • 29 篇 computer science...
  • 29 篇 department of co...

作者

  • 98 篇 niyato dusit
  • 52 篇 hisao ishibuchi
  • 42 篇 m. zahn
  • 41 篇 bernhard schölko...
  • 34 篇 e. rogers
  • 33 篇 sofotasios pasch...
  • 31 篇 prabowo harjanto
  • 31 篇 abdelwahed motwa...
  • 30 篇 kono junichiro
  • 27 篇 jiang liu
  • 26 篇 hong choong seon
  • 26 篇 rajkumar buyya
  • 25 篇 el-sayed m.el-ke...
  • 24 篇 liu jiaming
  • 24 篇 shen xuemin
  • 24 篇 andrea alù
  • 23 篇 tao yang
  • 21 篇 soni mukesh
  • 20 篇 j.h. lang
  • 19 篇 ferrara antonell...

语言

  • 29,035 篇 英文
  • 960 篇 其他
  • 248 篇 中文
  • 38 篇 日文
  • 6 篇 德文
  • 2 篇 西班牙文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
检索条件"机构=Computer Science Department and Systems and Computer Engineering Program"
30282 条 记 录,以下是271-280 订阅
排序:
Automatic extraction of lightweight and efficient neural network architecture of heavy convolutional architectures to predict microsatellite instability from hematoxylin and eosin histology in gastric cancer
收藏 引用
Neural Computing and Applications 2024年 第25期36卷 15295-15321页
作者: Rostami, Habib Ashkpour, Maryam Behzadi-Khormouji, Hamed Mokhtari, Maral Khayati, Armin Keshavarz, Ahmad Talatian Azad, Saeed Tabesh, Yahya Computer Engineering Department Faculty of Intelligent Systems Engineering and Data Science Persian Gulf University Bushehr75168 Iran Artificial Intelligence and Intelligent Healthcare Lab Artificial Intelligence and Data Mining Research Group Faculty of Intelligent Systems Engineering and Data Science ICT Research Institute Persian Gulf University Bushehr75168 Iran Faculty of New Science and Technologies University of Tehran Tehran Iran Department of Computer Science Imec-IDLab University of Antwerp Sint-Pietersvliet 7 Antwerp2000 Belgium Shahid Faghihi Hospital Shiraz University of Medical Sciences Shiraz Iran Department of Computer Science Engineering and IT School of Electrical and Computer Engineering Shiraz University Shiraz Iran Electrical Engineering Department Faculty of Intelligent Systems Engineering and Data Science Persian Gulf University Bushehr75168 Iran IoT and Signal Processing Research Group Faculty of Intelligent Systems Engineering and Data Science ICT Research Institute Persian Gulf University Bushehr75168 Iran Department of Mathematical Sciences Sharif University of Technology Tehran Iran
Cancers have emerged as a significant concern due to their impact on public health and society. The examination and interpretation of tissue sections stained with Hematoxylin and Eosin (H&E) play a crucial role in... 详细信息
来源: 评论
Smart Sanitation Management: Integrating IoT, AI-Driven Analytics, and Automated Sensing for Efficient Public Toilet Maintenance  2
Smart Sanitation Management: Integrating IoT, AI-Driven Anal...
收藏 引用
2nd International Conference on Machine Learning and Autonomous systems, ICMLAS 2025
作者: Haripriya, K. Preethi, C. Hammed, S.Shahul Pavalarajan, S. Sharon, S. Akhil Suryakumar, S. PSNA College of Engineering and Technology Department of Computer Science and Business Systems Dindigul India
An IoT-based self-sustained public toilet maintenance system aims to improve hygiene, efficiency, and resource management. It integrates smart sensors, microcontrollers, and cloud connectivity to monitor parameters su... 详细信息
来源: 评论
Segmentation of Water Bodies from Satellite Images Using Spatial-Channel Attention UNet
Segmentation of Water Bodies from Satellite Images Using Spa...
收藏 引用
2024 International Conference on Smart systems for Electrical, Electronics, Communication and computer engineering, ICSSEEC 2024
作者: Anitha, M. Chitra, P. Meenaragavi, P. Thiagarajar College of Engineering Department of Computer Applications Madurai625 015 India Thiagarajar College of Engineering Department of Computer Science and Business Systems Madurai625 015 India
Precise division of aquatic areas is essential for efficient environmental supervision and administration. It enables the precise delineation and tracking of aquatic ecosystems, facilitating the assessment of water qu... 详细信息
来源: 评论
Physician Scheduling using Constraint Satisfaction programming  11
Physician Scheduling using Constraint Satisfaction Programmi...
收藏 引用
11th International Japan-Africa Conference on Electronics, Communications, and Computations, JAC-ECC 2023
作者: Bakr, Hend A. Salama, Ahmed M. Fares, Ahmed Zaky, Ahmed B. Cairo University Biomedical Engineering Program Faculty of Engineering Giza Egypt Benha University Computer Systems Engineering Program Faculty of Engineering at Shoubra Banha Egypt Computer science and information technology Programs Alexandria Egypt Benha University On leave from Computer Systems Engineering Program Faculty of Engineering at Shoubra Egypt
Physician scheduling is a critical task that impacts the quality of patient care, staff satisfaction, and operational efficiency in healthcare institutions. The traditional approach to physician scheduling is manual a... 详细信息
来源: 评论
Weber Law Based Approach for Multi-Class Image Forgery Detection
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 145-166页
作者: Arslan Akram Javed Rashid Arfan Jaffar Fahima Hajjej Waseem Iqbal Nadeem Sarwar Department of Computer Science Superior UniversityLahore54000Pakistan Information Technology Services University of OkaraOkara56300Pakistan Departmet of Computer Science MLC LabOkara56300Pakistan Department of CS&SE International Islamic UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science Bahria UniversityLahore CampusLahore54600Pakistan
Today’s forensic science introduces a new research area for digital image analysis formultimedia ***,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegi... 详细信息
来源: 评论
Decision Tree-Based IoT Botnet Attack Detection  2
Decision Tree-Based IoT Botnet Attack Detection
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Najjar, Hazem Al-Rousan, Nadia College Of Information Technology University Of Petra Department Of Computer Science Amman Jordan German Jordanian University Faculty Of Electrical Engineering And Information Systems Department Of Computer Engineering Jordan
This paper investigated the predictive capabilities of three decision tree models for IoT botnet attack prediction using packet information while minimizing the number of predictors. The study employed three decision ... 详细信息
来源: 评论
Lightweight and Roubust Key Agreement for Securing IIoT-Driven Flexible Manufacturing systems
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17197-17209页
作者: Hammad, Muhammad Badshah, Akhtar Almeer, Mohammed A. Waqas, Muhammad Song, Houbing Chen, Sheng Han, Zhu GIK Institute of Engineering Sciences and Technology Faculty of Mechanical Engineering Topi23640 Pakistan University of Malakand Department of Software Engineering Dir Lower18800 Pakistan University of Bahrain Computer Engineering Department College of Information Technology 32038 Bahrain University of Greenwich Faculty of Engineering and Science Centre for Sustainable Cybersecurity United Kingdom Edith Cowan University School of Engineering PerthWA6027 Australia Department of Information Systems BaltimoreMD United States University of Southampton School of Electronics and Computer Science SouthamptonSO17 1BJ United Kingdom University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The ever-evolving Internet of Things (IoT) has ushered in a new era of intelligent manufacturing across multiple industries. However, the security and privacy of real-time data transmitted over the public channel of t... 详细信息
来源: 评论
Enhancing Image Security with Rossler Attractor-Based Encryption  2
Enhancing Image Security with Rossler Attractor-Based Encryp...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Najjar, Hazem Al-Rousan, Nadia University Of Petra Faculty Of Information Technology Department Of Computer Science Amman Jordan German Jordanian University Faculty Of Electrical Engineering And Information Systems Department Of Computer Engineering Jordan
we introduced image encryption algorithms with high sensitivity, such that even a single alteration in a plain-text image would result in a complete transformation of the ciphered image. The first algorithm employed p... 详细信息
来源: 评论
Improving the Efficiency of Smart Grid Scheduling: A Linear Regression Model with Meta Job Information  2
Improving the Efficiency of Smart Grid Scheduling: A Linear ...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Najjar, Hazem Al-Rousan, Nadia College Of Information Technology University Of Petra Department Of Computer Science Amman Jordan German Jordianian University Faculty Of Electrical Engineering And Information Systems Department Of Computer Engineering Jordan
In order to forecast the run time of the jobs that were submitted, this research provides two linear regression prediction models that include continuous and categorical factors. A continuous predictor is built using ... 详细信息
来源: 评论
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论