咨询与建议

限定检索结果

文献类型

  • 238,197 篇 会议
  • 111,078 篇 期刊文献
  • 2,831 册 图书
  • 1 篇 学位论文

馆藏范围

  • 352,106 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 211,180 篇 工学
    • 146,392 篇 计算机科学与技术...
    • 117,932 篇 软件工程
    • 48,987 篇 信息与通信工程
    • 31,968 篇 控制科学与工程
    • 24,023 篇 电气工程
    • 23,646 篇 电子科学与技术(可...
    • 22,011 篇 生物工程
    • 15,876 篇 机械工程
    • 15,268 篇 生物医学工程(可授...
    • 14,666 篇 光学工程
    • 11,356 篇 化学工程与技术
    • 10,613 篇 仪器科学与技术
    • 9,715 篇 动力工程及工程热...
    • 7,778 篇 材料科学与工程(可...
    • 7,526 篇 网络空间安全
    • 6,881 篇 交通运输工程
    • 6,875 篇 安全科学与工程
  • 115,310 篇 理学
    • 61,799 篇 数学
    • 33,772 篇 物理学
    • 24,613 篇 生物学
    • 18,965 篇 统计学(可授理学、...
    • 12,145 篇 系统科学
    • 12,043 篇 化学
  • 58,398 篇 管理学
    • 35,287 篇 管理科学与工程(可...
    • 25,642 篇 图书情报与档案管...
    • 14,479 篇 工商管理
  • 14,097 篇 医学
    • 11,598 篇 临床医学
    • 10,194 篇 基础医学(可授医学...
    • 6,352 篇 药学(可授医学、理...
  • 9,106 篇 法学
    • 7,447 篇 社会学
  • 5,524 篇 经济学
  • 4,240 篇 农学
  • 4,116 篇 教育学
  • 1,790 篇 文学
  • 766 篇 军事学
  • 713 篇 艺术学
  • 84 篇 哲学
  • 63 篇 历史学

主题

  • 13,527 篇 computer science
  • 8,812 篇 feature extracti...
  • 8,066 篇 accuracy
  • 7,894 篇 computational mo...
  • 7,131 篇 training
  • 6,849 篇 deep learning
  • 5,897 篇 machine learning
  • 5,348 篇 data mining
  • 5,008 篇 semantics
  • 4,573 篇 optimization
  • 4,337 篇 predictive model...
  • 4,282 篇 educational inst...
  • 4,198 篇 data models
  • 4,095 篇 support vector m...
  • 3,892 篇 algorithm design...
  • 3,852 篇 neural networks
  • 3,756 篇 artificial intel...
  • 3,550 篇 computer archite...
  • 3,331 篇 protocols
  • 3,330 篇 wireless sensor ...

机构

  • 4,981 篇 department of co...
  • 2,504 篇 college of compu...
  • 2,488 篇 school of comput...
  • 2,448 篇 college of compu...
  • 2,225 篇 chitkara univers...
  • 1,557 篇 school of comput...
  • 1,472 篇 university of ch...
  • 1,466 篇 school of comput...
  • 1,335 篇 school of comput...
  • 1,286 篇 school of comput...
  • 1,221 篇 school of comput...
  • 1,075 篇 school of comput...
  • 1,061 篇 school of comput...
  • 1,051 篇 college of compu...
  • 984 篇 cavendish labora...
  • 978 篇 department of ph...
  • 962 篇 college of compu...
  • 922 篇 school of comput...
  • 837 篇 oliver lodge lab...
  • 828 篇 physikalisches i...

作者

  • 303 篇 liu yang
  • 288 篇 niyato dusit
  • 278 篇 wang wei
  • 256 篇 barter w.
  • 229 篇 blake t.
  • 222 篇 betancourt c.
  • 220 篇 bellee v.
  • 220 篇 borsato m.
  • 218 篇 bowcock t.j.v.
  • 214 篇 amato s.
  • 212 篇 brundu d.
  • 212 篇 s. chen
  • 210 篇 boettcher t.
  • 209 篇 a. gomes
  • 197 篇 c. alexa
  • 197 篇 beiter a.
  • 197 篇 j. wang
  • 194 篇 j. m. izen
  • 191 篇 c. amelung
  • 189 篇 g. bella

语言

  • 298,095 篇 英文
  • 48,298 篇 其他
  • 6,260 篇 中文
  • 167 篇 日文
  • 76 篇 斯洛文尼亚文
  • 67 篇 德文
  • 43 篇 法文
  • 35 篇 朝鲜文
  • 18 篇 俄文
  • 9 篇 西班牙文
  • 7 篇 阿拉伯文
  • 3 篇 捷克文
  • 3 篇 波兰文
  • 2 篇 意大利文
  • 2 篇 葡萄牙文
  • 2 篇 土耳其文
  • 1 篇 荷兰文
检索条件"机构=Computer Science Namibia University of Science and Technology"
352107 条 记 录,以下是1-10 订阅
排序:
Social Media Gender-Based Violence: Definition, Classification and Taxonomy from a Systematic Review  4
Social Media Gender-Based Violence: Definition, Classificati...
收藏 引用
4th International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2024
作者: Iyawa, Gloria Shava, Fungai Bhunu Hamunyela, Suama Nhinda, Gabriel Chisala, Edward Mutelo, Sinte Namibia University of Science and Technology Department of Informatics Windhoek Namibia Namibia University of Science and Technology Department of Computer Science Windhoek Namibia
Social media gender-based violence is a major problem affecting vulnerable people in the digital space. This current trend has affected the way people interact on social media. Studies have examined the dangers of soc... 详细信息
来源: 评论
Investigation of Machine Learning-Inspired Security Controls Used in Protecting Health Critical Infrastructure from Advanced Persistent Threat Attacks: Review  4
Investigation of Machine Learning-Inspired Security Controls...
收藏 引用
4th International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2024
作者: Morolong, Mamoqenelo Gamundani, Attlee Shava, Fungai Bhunu Namibia University of Science and Technology Department of Computer Science Windhoek Namibia
The cybersecurity of National Critical Health Infrastructure is of utmost importance. If its security is not prioritized, it can directly impact the safety and well-being of patients, healthcare professionals, the gen... 详细信息
来源: 评论
Towards Reliable Configuration Management in Clouds: A Lightweight Consistency Validation Mechanism for Virtual Private Clouds
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 49-63页
作者: Yuhang Qiu Gongming Zhao Hongli Xu Long Li He Huang Liusheng Huang School of Computer Science and Technology University of Science and Technology of China Suzhou Institute for Advanced Research University of Science and Technology of China School of Computer Science and Technology Soochow University
The virtual private cloud service currently lacks a real-time end-to-end consistency validation mechanism, which prevents tenants from receiving immediate feedback on their requests. Existing solutions consume excessi... 详细信息
来源: 评论
Leveraging Machine Learning to Detect and Predict Diabetes in Polycystic Ovary Syndrome Patients: A Review  7
Leveraging Machine Learning to Detect and Predict Diabetes i...
收藏 引用
7th International Conference on Artificial Intelligence, Big Data, Computing and Data Communication Systems, icABCD 2024
作者: Ndjene, Julia Gamundani, Attlee M. Kanyama, Maria N. Namibia University of Science and Technology Department of Informatics Windhoek Namibia Security Namibia University of Science and Technology Department of Cyber Windhoek Namibia Namibia University of Science and Technology Department of Computer Science Windhoek Namibia
Polycystic ovary syndrome (PCOS) is a prevailing hormonal disorder affecting women in their childbearing years, often associated with hormonal imbalances and metabolic disturbances. PCOS is closely linked to various h... 详细信息
来源: 评论
A recover-then-discriminate framework for robust anomaly detection
收藏 引用
science China(Information sciences) 2025年 第4期68卷 300-318页
作者: Peng XING Dong ZHANG Jinhui TANG Zechao LI School of Computer Science and Engineering Nanjing University of Science and Technology Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical... 详细信息
来源: 评论
Witness encryption with updatable ciphertexts
收藏 引用
science China(Information sciences) 2025年 第3期68卷 181-196页
作者: Yuzhu WANG Mingwu ZHANG School of Computer Science and Information Security Guilin University of Electronic Technology School of Computer Science Hubei University of Technology
Witness encryption(WE) is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance. Anyone who possesses a solution to this instance(i.e., a witness) can then recover the messa... 详细信息
来源: 评论
An Efficient Multihop Edge Enabled Architecture for Time Constraint Application
An Efficient Multihop Edge Enabled Architecture for Time Con...
收藏 引用
2023 International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2023
作者: Jain, Arpit Jat, Dharm Singh Namibia University of Science and Technology Computer Science Windhoek Namibia
Due to the increasing use of Internet of Things (IoT) devices and data-driven platforms, a huge volume of data has been transacted between the cloud and the end user. The automated tools such as Artificial Intelligenc... 详细信息
来源: 评论
PriChain: Efficient Privacy-Preserving Fine-Grained Redactable Blockchains in Decentralized Settings
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 82-97页
作者: Hongchen Guo Weilin Gan Mingyang Zhao Chuan Zhang Tong Wu Liehuang Zhu Jingfeng Xue School of Computer Science and Technology Beijing Institute of Technology School of Cyberspace Science and Technology Beijing Institute of Technology School of Computer and Communication Engineering University of Science and Technology Beijing
Recently, redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization, traceability, and transparency while ensuring controllable on-chain data r... 详细信息
来源: 评论
Simulation and Prediction of Machine Learning-Based Storm Surge Forecasting Model  4
Simulation and Prediction of Machine Learning-Based Storm Su...
收藏 引用
4th International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2024
作者: Kamagata, Abubakar Hamisu Jat, Dharm Singh Paramasivam, Saravanakumar Gamundani, Attlee M. Ramli, Muhammad Zahir Namibia University of Science and Technology Department of Computer Science Windhoek Namibia NAMDEB Namibia Windhoek Namibia Namibia university of science and Technology Department of Cybersecurity Windhoek Namibia International Islamic University Malaysia Department of Marine science Kuala Lumpur Malaysia
Forecasts of storm surges are essential to mitigate the damage of extreme events such as land shift, wave height and wave periods. Numerical models that simulate nearshore hydrodynamics and morphodynamics, such as XBe... 详细信息
来源: 评论
Measuring discrete sensing capability for ISAC via task mutual information
收藏 引用
science China(Information sciences) 2025年 第5期68卷 287-288页
作者: Fei SHANG Haohua DU Panlong YANG Xin HE Jingjing WANG Xiang-Yang LI School of Computer Science and Technology University of Science and Technology of China School of Cyber Science and Technology Beihang University School of Computer Science Nanjing University of Information Science and Technology School of Computer and Information Anhui Normal University
Thanks to its ubiquity,using radio frequency (RF) signals for sensing has found widespread *** traditional integrated sensing and communication systems,such as joint radar-communication systems,common sensing tasks in...
来源: 评论