咨询与建议

限定检索结果

文献类型

  • 18,006 篇 会议
  • 11,831 篇 期刊文献
  • 462 册 图书

馆藏范围

  • 30,299 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17,714 篇 工学
    • 10,906 篇 计算机科学与技术...
    • 8,761 篇 软件工程
    • 3,625 篇 信息与通信工程
    • 3,312 篇 控制科学与工程
    • 2,513 篇 电气工程
    • 2,300 篇 电子科学与技术(可...
    • 1,993 篇 生物工程
    • 1,663 篇 生物医学工程(可授...
    • 1,438 篇 机械工程
    • 1,283 篇 光学工程
    • 1,014 篇 化学工程与技术
    • 965 篇 仪器科学与技术
    • 963 篇 动力工程及工程热...
    • 921 篇 材料科学与工程(可...
    • 608 篇 安全科学与工程
    • 588 篇 交通运输工程
  • 10,604 篇 理学
    • 5,069 篇 数学
    • 3,227 篇 物理学
    • 2,430 篇 生物学
    • 1,759 篇 统计学(可授理学、...
    • 1,565 篇 系统科学
    • 1,183 篇 化学
  • 4,382 篇 管理学
    • 2,855 篇 管理科学与工程(可...
    • 1,671 篇 图书情报与档案管...
    • 1,484 篇 工商管理
  • 1,730 篇 医学
    • 1,433 篇 临床医学
    • 1,219 篇 基础医学(可授医学...
    • 709 篇 药学(可授医学、理...
    • 601 篇 公共卫生与预防医...
  • 802 篇 法学
    • 666 篇 社会学
  • 533 篇 经济学
  • 457 篇 教育学
  • 344 篇 农学
  • 82 篇 文学
  • 57 篇 军事学
  • 42 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,203 篇 computer science
  • 524 篇 deep learning
  • 401 篇 computational mo...
  • 395 篇 machine learning
  • 353 篇 artificial intel...
  • 345 篇 systems engineer...
  • 301 篇 application soft...
  • 299 篇 computer archite...
  • 291 篇 internet of thin...
  • 288 篇 control systems
  • 275 篇 feature extracti...
  • 272 篇 accuracy
  • 266 篇 training
  • 261 篇 support vector m...
  • 233 篇 neural networks
  • 228 篇 optimization
  • 214 篇 information syst...
  • 193 篇 routing
  • 192 篇 software enginee...
  • 190 篇 laboratories

机构

  • 51 篇 shanghai key lab...
  • 44 篇 department of co...
  • 44 篇 department of la...
  • 43 篇 department of el...
  • 42 篇 department of el...
  • 42 篇 department of sy...
  • 41 篇 department of co...
  • 38 篇 department of co...
  • 36 篇 department of in...
  • 36 篇 renewable and su...
  • 34 篇 department of co...
  • 33 篇 department of ph...
  • 32 篇 department of el...
  • 31 篇 department of ph...
  • 31 篇 department of sy...
  • 31 篇 department of el...
  • 30 篇 academy of mathe...
  • 30 篇 school of comput...
  • 29 篇 computer science...
  • 29 篇 department of co...

作者

  • 98 篇 niyato dusit
  • 52 篇 hisao ishibuchi
  • 42 篇 m. zahn
  • 41 篇 bernhard schölko...
  • 34 篇 e. rogers
  • 33 篇 sofotasios pasch...
  • 31 篇 prabowo harjanto
  • 31 篇 abdelwahed motwa...
  • 30 篇 kono junichiro
  • 26 篇 hong choong seon
  • 26 篇 jiang liu
  • 26 篇 rajkumar buyya
  • 25 篇 el-sayed m.el-ke...
  • 24 篇 liu jiaming
  • 24 篇 shen xuemin
  • 24 篇 andrea alù
  • 23 篇 tao yang
  • 21 篇 soni mukesh
  • 20 篇 j.h. lang
  • 19 篇 ferrara antonell...

语言

  • 29,062 篇 英文
  • 949 篇 其他
  • 249 篇 中文
  • 38 篇 日文
  • 6 篇 德文
  • 2 篇 西班牙文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
检索条件"机构=Computer Science Department and Systems and Computer Engineering Program"
30299 条 记 录,以下是561-570 订阅
排序:
Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2497-2513页
作者: Mohammad Alamgeer Fahd N.Al-Wesabi Huda G.Iskandar Imran Khan Nadhem Nemri Mohammad Medani Mohammed Abdullah Al-Hagery Ali Mohammed Al-Sharafi Department of Information Systems King Khalid UniversityMuhayel AseerKingdom of Saudi Arabia Department of Computer Science King Khalid UniversityMuhayel AseerKingdom of Saudi Arabia Faculty of Computer and IT Sana’a UniversitySana’aYemen School of Computing Faculty of EngineeringUniversiti Teknologi MalaysiaMalaysia Department of Electrical Engineering University of Engineering and Technology PeshawarPakistan Department of Computer Science College of ComputerQassim UniversitySaudi Arabia Department of Computer Science College of Computers and Information TechnologyUniversity of BishaKSA
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication *** this paper,a text zero... 详细信息
来源: 评论
PrivShape: Extracting Shapes in Time Series under User-Level Local Differential Privacy  40
PrivShape: Extracting Shapes in Time Series under User-Level...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Mao, Yulian Ye, Qingqing Hu, Haibo Wang, Qi Huang, Kai Southern University of Science and Technology Department of Computer Science and Engineering China The Hong Kong Polytechnic University Department of Electrical and Electronic Engineering Hong Kong Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology China School of Computer Science and Engineering Macau University of Science and Technology China
Time series have numerous applications in finance, healthcare, IoT, and smart city. In many of these applications, time series typically contain personal data, so privacy infringement may occur if they are released di... 详细信息
来源: 评论
Secure-by-Construction Synthesis for Control systems
收藏 引用
IEEE Transactions on Automatic Control 2025年 第6期70卷 4170-4177页
作者: Zhong, Bingzhuo Liu, Siyuan Caccamo, Marco Zamani, Majid Thrust of Artificial Intelligence Information Hub The Thrust of Intelligent Transportation System Hub China KTH Royal Institute of Technology Division of Decision and Control Systems Stockholm Sweden Technical University of Munich TUM School of Engineering and Design Germany University of Colorado Boulder Department of Computer Science United States Ludwig Maximilian University Department of Computer Science Munich Germany
In this note, we present the synthesis of secure-by-construction controllers that address safety and security properties simultaneously in cyber-physical systems. Our focus is on studying a specific security property ... 详细信息
来源: 评论
Computational Investigation of Multiband EMNZ Metamaterial Absorber for Terahertz Applications
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 3905-3920页
作者: Ismail Hossain Md Samsuzzaman Mohd Hafiz Baharuddin Norsuzlin Binti Mohd Sahar Mandeep Singh Jit Singh Mohammad Tariqul Islam Space Science Center Universiti Kebangsaan Malaysia43600UKM BangiSelangorMalaysia Department of Computer and Communication Engineering Faculty of Computer Science and EngineeringPatuakhali Science and Technology UniversityBangladesh Department of Electrical Electronic and Systems EngineeringFaculty of Engineering and Built EnvironmentUniversiti Kebangsaan MalaysiaMalaysia
This study presents an Epsilon Mu near-zero(EMNZ)nanostructured metamaterial absorber(NMMA)for visible regime *** resonator and dielectric layers are made of tungsten(W)and quartz(fused),where the working band is expa... 详细信息
来源: 评论
Machine Learning-based Tamil Sign Language Recognition Tool for the Deaf and Hard-of-Hearing Community.
Machine Learning-based Tamil Sign Language Recognition Tool ...
收藏 引用
2023 International Conference on Data science, Agents and Artificial Intelligence, ICDSAAI 2023
作者: Prabhu, D. Dhivyadharshini, K. Lokeswari, S. Pavithra Devi, T. Harithaa, S. Preethi, S. Sri Sairam Engineering College Department of Computer Science and Business Systems Chennai India Sri Sairam Institute of Technology Department of Computer and Communication Engineering Chennai India
This paper proposes a machine learning-based Tamil sign language recognition tool for the deaf and hard-of-hearing community. The tool uses computer vision techniques to capture the hand gestures of sign language user... 详细信息
来源: 评论
Fuzzy Risk Model for Research and Development department in Clinical Laboratory  9
Fuzzy Risk Model for Research and Development Department in ...
收藏 引用
9th IEEE International Conference on Computing, engineering and Design, ICCED 2023
作者: Legowo, Nilo Sarjdono, Wahyu Susanto, Eddy Utama, Ditdit Nugeraha Bina Nusantara University BINUS Graduate Program Master of Information Systems Management Information Systems Management Department Jakarta11480 Indonesia Bina Nusantara University BINUS Graduate Program Master of Computer Science Computer Science Department Jakarta11480 Indonesia
Information security risk is of utmost importance and a crucial concern, particularly within a clinical laboratory responsible for managing sensitive public health information. Various endeavors have been undertaken b... 详细信息
来源: 评论
Advanced Air Mobility: Innovations, Applications, Challenges, and Future Potential
收藏 引用
Journal of Air Transportation 2025年 第2期33卷 169-187页
作者: Raza, Waleed Renkhoff, Justus Ogirimah, Olayemi Bawa, Gurvir Kaur Stansbury, Richard S. Department of Electrical Engineering and Computer Science Embry-Riddle Aeronautical University Daytona BeachFL32114 United States Department of Information Systems University of Maryland BaltimoreMD21250 United States
来源: 评论
Guardians of Truth: Exploring Techniques for Veracity Identification in social media during an Infodemic  3
Guardians of Truth: Exploring Techniques for Veracity Identi...
收藏 引用
3rd International Conference on Artificial Intelligence For Internet of Things, AIIoT 2024
作者: Suthanthiradevi, P. Revathy, G. Sathish Kumar, P. Karthikeyan, B. Muthu, Lakshmi.V SRM institute of Science and Technology Data Science and Business Systems School of Computing India Vels Institute of science Technology and Advanced studies Department of Computer science and engineering India Rajalakshmi institute of technology Computer and Communication Engineering India SASTRA Deemed University School of Computing India St. Joseph's Institute of Technology Department of Computer Science and Engineering India
With the recent advent of technology, social networks are accessible 24/7 using mobile devices. During covid-19 pandemic the propagation of misinformation are mostly related to the disease, its cures and prevention. W... 详细信息
来源: 评论
Design of an RF-CMOS Switched-Capacitor Power Amplifier for NB-IoT RF Transceivers
Design of an RF-CMOS Switched-Capacitor Power Amplifier for ...
收藏 引用
2023 International Young Engineers Forum in Electrical and computer engineering, YEF-ECE 2023
作者: Santos, Ana Isabel Pedro Oliveira, Joao NOVA School of Science and Technology Department of Electrical and Computer Engineering Caparica Portugal Centre of Technology and Systems CTS-UNINOVA Department of Electrical and Computer Engineering Caparica Portugal
The paper presents the implementation of a Switched Capacitor Power Amplifier (SCPA) to be integrated into a Narrowband Internet of Things (NB-IoT) Transceiver. The SCPA is designed to operate at a frequency of 0.9GHz... 详细信息
来源: 评论
An Extended Euclidean Algorithm Implementation over Ciphertext Space  2nd
An Extended Euclidean Algorithm Implementation over Ciphert...
收藏 引用
2nd International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications, SITAIBA 2023
作者: Chi, Po-Wen Lin, Yuan-Pang Wang, Ming-Hung Chuang, Yun-Hsin Department of Computer Science and Information Engineering National Taiwan Normal University Taiwan Taipei Taiwan Department of Computer Science and Information Engineering National Chung Cheng University Taiwan Chiayi Taiwan Engineering Management Graduate Program College of Engineering National Cheng Kung University Taiwan Tainan Taiwan
Fully homomorphic encryption (FHE) is a useful cryptographic primitive. It makes a third-party manipulate data in the ciphertext space and therefore is a key technology for privacy-preserving outsourcing services. The... 详细信息
来源: 评论