咨询与建议

限定检索结果

文献类型

  • 1,960 篇 会议
  • 1,868 篇 期刊文献

馆藏范围

  • 3,828 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,112 篇 工学
    • 1,300 篇 计算机科学与技术...
    • 1,056 篇 软件工程
    • 498 篇 信息与通信工程
    • 283 篇 生物医学工程(可授...
    • 272 篇 生物工程
    • 251 篇 控制科学与工程
    • 227 篇 电气工程
    • 223 篇 光学工程
    • 213 篇 电子科学与技术(可...
    • 168 篇 核科学与技术
    • 142 篇 仪器科学与技术
    • 138 篇 机械工程
    • 88 篇 化学工程与技术
    • 80 篇 动力工程及工程热...
    • 64 篇 材料科学与工程(可...
  • 1,654 篇 理学
    • 843 篇 物理学
    • 570 篇 数学
    • 328 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 128 篇 系统科学
    • 100 篇 化学
  • 524 篇 管理学
    • 319 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 170 篇 工商管理
  • 287 篇 医学
    • 243 篇 临床医学
    • 222 篇 基础医学(可授医学...
    • 148 篇 药学(可授医学、理...
    • 98 篇 公共卫生与预防医...
  • 82 篇 法学
    • 68 篇 社会学
  • 68 篇 经济学
    • 68 篇 应用经济学
  • 50 篇 教育学
  • 44 篇 农学
  • 11 篇 文学
  • 6 篇 艺术学
  • 3 篇 军事学

主题

  • 142 篇 informatics
  • 90 篇 hadron colliders
  • 74 篇 computer network...
  • 64 篇 machine learning
  • 63 篇 higgs bosons
  • 58 篇 wireless sensor ...
  • 55 篇 quality of servi...
  • 55 篇 computational mo...
  • 53 篇 deep learning
  • 53 篇 computer archite...
  • 50 篇 protocols
  • 47 篇 proton-proton in...
  • 45 篇 bandwidth
  • 45 篇 costs
  • 45 篇 mobile communica...
  • 42 篇 electronic mail
  • 41 篇 routing
  • 41 篇 image segmentati...
  • 40 篇 resource managem...
  • 40 篇 accuracy

机构

  • 412 篇 department for p...
  • 407 篇 faculty of scien...
  • 404 篇 kirchhoff-instit...
  • 395 篇 department of ph...
  • 389 篇 department of ph...
  • 386 篇 institute of phy...
  • 382 篇 department of ph...
  • 373 篇 institute of phy...
  • 367 篇 fakultät für phy...
  • 350 篇 instituto de fís...
  • 306 篇 department of ph...
  • 292 篇 dipartimento di ...
  • 289 篇 nikhef national ...
  • 288 篇 graduate school ...
  • 288 篇 department of ph...
  • 282 篇 department of ph...
  • 270 篇 department of ph...
  • 269 篇 universidade fed...
  • 262 篇 yerevan physics ...
  • 262 篇 ictp trieste

作者

  • 337 篇 c. alexa
  • 335 篇 j. m. izen
  • 333 篇 g. bella
  • 332 篇 d. calvet
  • 332 篇 c. amelung
  • 330 篇 j. strandberg
  • 327 篇 g. spigo
  • 326 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 319 篇 s. mohapatra
  • 312 篇 s. guindon
  • 308 篇 a. kaczmarska
  • 305 篇 j. schaarschmidt
  • 300 篇 y. tayalati
  • 296 篇 a. d. pilkington
  • 293 篇 l. chevalier
  • 285 篇 m. klein

语言

  • 3,686 篇 英文
  • 108 篇 其他
  • 33 篇 中文
  • 5 篇 日文
检索条件"机构=Computer Technology Institute CTI and Department of Computer Engineering and Informatics"
3828 条 记 录,以下是111-120 订阅
排序:
Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2641-2659页
作者: Muhammad Nadeem Ali Arshad Saman Riaz SyedaWajiha Zahra Muhammad Rashid Shahab S.Band Amir Mosavi Department of Computer Science Abasyn UniversityIslamabad44000Pakistan Department of Computer Science National University of TechnologyIslamabad44000Pakistan Future Technology Research Center National Yunlin University of Science and TechnologyDouliuYunlin64002Taiwan Institute of Information Society University of Public ServiceBudapest1083Hungary John von Neumann Faculty of Informatics Obuda UniversityBudapestHungary Institute of Information Engineering Automation and MathematicsSlovak University of Technology in BratislavaSlovakia
Cloud computing is one of the most attractive and cost-saving models,which provides online services to *** computing allows the user to access data directly from any *** nowadays,cloud security is one of the biggest i... 详细信息
来源: 评论
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2625-2640页
作者: Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi Department of Computer Science Abasyn UniversityIslamabad44000Pakistan Department of Computer Science National University of TechnologyIslamabad44000Pakistan Future Technology Research Center National Yunlin University of Science and TechnologyDouliuYunlin64002Taiwan Institute of Information Society University of Public ServiceBudapest1083Hungary John Von Neumann Faculty of Informatics Obuda UniversityBudapestHungary Institute of Information Engineering Automation and MathilticsSlovak University of Technology in BratislavaSlovakia
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from a... 详细信息
来源: 评论
AI-based Models to Predict the Heart Rate Using PPG and Accelerometer Signals During Physical Exercise
AI-based Models to Predict the Heart Rate Using PPG and Acce...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Ribeiro, Lucas Oliveira, Helder P. Hu, Xiao Pereira, Tania University of Porto Inesc Tec Inesc Tec - Institute for Systems and Computer Engineering Technology and Science Feup - Faculty of Engineering Porto Portugal University of Porto Inesc Tec - Institute for Systems and Computer Engineering Technology and Science Fcup - Faculty of Science Porto Portugal Emory University Nell Hodgson Woodruff School of Nursing Department of Biomedical Informatics School of Medicine Department of Computer Science College of Arts and Sciences Atlanta United States Technology and Science Inesc Tec - Institute for Systems and Computer Engineering Porto Portugal
PPG signal is a valuable resource for continuous heart rate monitoring;however, this signal suffers from artifact movements, which is particularly relevant during physical exercise and makes this biomedical signal dif... 详细信息
来源: 评论
Blockchain-based cross-domain authorization system for user-centric resource sharing
收藏 引用
Blockchain(Research and Applications) 2023年 第2期4卷 67-81页
作者: Yuki Ezawa Shohei Kakei Yoshiaki Shiraishi Masami Mohri Masakatu Morii Department of Electrical and Electronic Engineering Kobe UniversityKobeHyogo657-8501Japan Department of Computer Science Nagoya Institute of TechnologyNagoyaAichi466-8555Japan Faculty of Informatics Kindai UniversityHigashi-OsakaOsaka577-8502Japan
User-centric data sharing is essential to encourage citizens'active participation in the digital *** key to smart cities,a form of the digital economy,is the promotion of public use of citizen ***,it is not easy t... 详细信息
来源: 评论
Accidental Face Recognition and Detection Using Machine Learning  1
Accidental Face Recognition and Detection Using Machine Lear...
收藏 引用
1st International Conference in Advanced Innovation on Smart City, ICAISC 2023
作者: Sharma, Ashish Agrawal, Piyansh Krishan Sharma, Bhisham Dhaou, Imed Ben GLA University Department of Computer Engineering & Applications UP Mathura India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Dar Al-Hekma University Hekma School of Engineering Computing and Informatics Department of Computer Science Jeddah Saudi Arabia
The data collected from all the States and Union Territories has been compiled in the Publication, according to the ministry of road transport and roads transport research wing. The total number of accident-related de... 详细信息
来源: 评论
SAR Images Change Detection Based on Attention Mechanism-Convolutional Wavelet Neural Network
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12133-12149页
作者: Jiahui, E. Wang, Lu Zhao, Chunhui Mathiopoulos, P. Takis Ohtsuki, Tomoaki Adachi, Fumiyuki Harbin Engineering University College of Information and Communication Engineering Harbin150001 China Ministry of Industry and Information Technology Key Laboratory of Advanced Marine Communication and Information Technology Harbin150001 China National and Kapodistrian University of Athens Department of Informatics and Telecommunications Greece Keio University Department of Information and Computer Science Kanagawa223852 Japan Tohoku University International Research Institute of Disaster Science Sendai Japan
As Synthetic Aperture Radar (SAR) image change detection can continuously acquire target information under all weather conditions, it has been used in the past for various applications. However, it is very challenging... 详细信息
来源: 评论
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第12期8卷 1877-1890页
作者: Mamta Brij B.Gupta Kuan-Ching Li Victor C.M.Leun Kostas E.Psannis Shingo Yamaguchi IEEE the Department of Computer Engineering National Institute of Technology the Asia University the Macquarie University the Department of Computer Science and Information Engineering Providence University the Computer Science and Software Engineering Shenzhen University the University of British Columbia the Department of Applied Informatics University of Macedonia the Graduate School of Sciences and Technology for Innovation Yamaguchi University
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access *** privacy of health data can only be preserved by keep... 详细信息
来源: 评论
DUCK: A Drone-Urban Cyber-Defense Framework Based on Pareto-Optimal Deontic Logic Agents  37
DUCK: A Drone-Urban Cyber-Defense Framework Based on Pareto-...
收藏 引用
37th AAAI Conference on Artificial Intelligence, AAAI 2023
作者: Deb, Tonmoay Dix, Jürgen Jeong, Mingi Molinaro, Cristian Pugliese, Andrea Li, Alberto Quattrini Santos, Eugene Subrahmanian, V.S. Yang, Shanchieh Zhang, Youzhi Department of Computer Science Northwestern University EvanstonIL United States Department of Computer Science Dartmouth College HanoverNH United States Department of Informatics Modeling Electronics and System Engineering University of Calabria Rende Italy Department of Informatics Technical University of Clausthal Clausthal Germany Department of Computer Engineering Rochester Institute of Technology RochesterNY United States CAIR Hong Kong Institute of Science and Innovation Hong Kong
Drone based terrorist attacks are increasing daily. It is not expected to be long before drones are used to carry out terror attacks in urban areas. We have developed the DUCK multiagent testbed that security agencies... 详细信息
来源: 评论
Password Manager with Multi-Factor Authentication  1
Password Manager with Multi-Factor Authentication
收藏 引用
1st IEEE International Conference on Networking and Communications, ICNWC 2023
作者: Dhanalakshmi, R. Vijayaraghavan, N. Narasimhan, S. Basha, Saleem Vellore Institute of Technology School of Computer Science and Engineering Chennai India KCG College of Technology Department of Mathematics Chennai India Mazoon University College Computing and Informatics Department muscat Oman
Data breach is a serious issue as it leaks the personal information of more than billions of users and their privacy is compromised. More than 77% of organizations do not have a Cyber Security Incident Response plan. ... 详细信息
来源: 评论
A Logical Investigation of Stock Market Prediction and Analysis using Supervised Machine Learning Algorithm  1
A Logical Investigation of Stock Market Prediction and Analy...
收藏 引用
1st IEEE International Conference on Networking and Communications, ICNWC 2023
作者: Dhanalakshmi, R. Kumar, V. Vasantha Basha, Saleem Vijayaraghavan, N. Vellore Institute of Technology School of Computer Science and Engineering Chennai India Mazoon University College Computing and Informatics Department Muscat Oman KCG College of Technology Department of CSE Chennai India
In the Field of computer science, artificial intelligence (AI) is a broad field, which is concerned with structuring smart products and machines able to perform tasks which require the intellectual capability of human... 详细信息
来源: 评论