咨询与建议

限定检索结果

文献类型

  • 10,167 篇 会议
  • 5,922 篇 期刊文献
  • 252 册 图书

馆藏范围

  • 16,341 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,776 篇 工学
    • 7,105 篇 计算机科学与技术...
    • 5,703 篇 软件工程
    • 2,272 篇 信息与通信工程
    • 1,622 篇 控制科学与工程
    • 1,110 篇 电气工程
    • 1,042 篇 生物工程
    • 960 篇 电子科学与技术(可...
    • 745 篇 机械工程
    • 727 篇 生物医学工程(可授...
    • 548 篇 光学工程
    • 447 篇 仪器科学与技术
    • 413 篇 动力工程及工程热...
    • 350 篇 化学工程与技术
    • 350 篇 安全科学与工程
    • 323 篇 交通运输工程
  • 4,876 篇 理学
    • 2,577 篇 数学
    • 1,242 篇 物理学
    • 1,167 篇 生物学
    • 860 篇 统计学(可授理学、...
    • 692 篇 系统科学
    • 376 篇 化学
  • 2,987 篇 管理学
    • 1,890 篇 管理科学与工程(可...
    • 1,240 篇 图书情报与档案管...
    • 1,015 篇 工商管理
  • 870 篇 医学
    • 743 篇 临床医学
    • 606 篇 基础医学(可授医学...
    • 370 篇 公共卫生与预防医...
    • 336 篇 药学(可授医学、理...
  • 520 篇 法学
    • 417 篇 社会学
  • 348 篇 经济学
    • 346 篇 应用经济学
  • 295 篇 教育学
  • 190 篇 农学
  • 79 篇 文学
  • 36 篇 军事学
  • 35 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 393 篇 computer science
  • 386 篇 deep learning
  • 291 篇 information syst...
  • 261 篇 information tech...
  • 255 篇 computational mo...
  • 238 篇 machine learning
  • 219 篇 internet of thin...
  • 206 篇 data mining
  • 204 篇 feature extracti...
  • 184 篇 optimization
  • 183 篇 computer archite...
  • 174 篇 artificial intel...
  • 164 篇 laboratories
  • 156 篇 support vector m...
  • 148 篇 neural networks
  • 148 篇 educational inst...
  • 140 篇 routing
  • 137 篇 application soft...
  • 136 篇 predictive model...
  • 136 篇 accuracy

机构

  • 100 篇 school of comput...
  • 77 篇 information syst...
  • 71 篇 school of comput...
  • 53 篇 department of co...
  • 48 篇 pillar of inform...
  • 45 篇 department of la...
  • 44 篇 department of co...
  • 43 篇 department of in...
  • 42 篇 ieee
  • 42 篇 school of inform...
  • 40 篇 department of sy...
  • 38 篇 department of el...
  • 33 篇 department of sy...
  • 33 篇 school of comput...
  • 32 篇 the school of co...
  • 31 篇 school of comput...
  • 31 篇 department of in...
  • 31 篇 department of co...
  • 29 篇 school of electr...
  • 27 篇 graduate school ...

作者

  • 113 篇 niyato dusit
  • 43 篇 xiong zehui
  • 41 篇 sun maosong
  • 40 篇 david lo
  • 39 篇 guo hong
  • 35 篇 huang minlie
  • 31 篇 arjan durresi
  • 30 篇 abdelwahed motwa...
  • 30 篇 shen xuemin
  • 27 篇 xiaohong jiang
  • 24 篇 soni mukesh
  • 24 篇 liu yang
  • 23 篇 el-sayed m.el-ke...
  • 23 篇 kang jiawen
  • 22 篇 gyongyosi laszlo
  • 22 篇 tao dacheng
  • 21 篇 xu minrui
  • 20 篇 quek tony q.s.
  • 19 篇 tao yang
  • 19 篇 hannu tenhunen

语言

  • 15,396 篇 英文
  • 800 篇 其他
  • 151 篇 中文
  • 16 篇 日文
  • 6 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computer Technology and Information Systems"
16341 条 记 录,以下是51-60 订阅
排序:
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, Sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
One Dimensional Conv-BiLSTM Network with Attention Mechanism for IoT Intrusion Detection
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3765-3781页
作者: Bauyrzhan Omarov Zhuldyz Sailaukyzy Alfiya Bigaliyeva Adilzhan Kereyev Lyazat Naizabayeva Aigul Dautbayeva Department of Information Systems Al-Farabi Kazakh National UniversityAlmatyKazakhstan Department of Information Technology and Security Abylkas Saginov Karaganda Technical UniversityKaragandaKazakhstan Department of Computer Science and Information Technology K.Zhubanov Aktobe Regional UniversityAktobeKazakhstan Department of Information Systems International Information Technology UniversityAlmatyKazakhstan Department of Computer Science Korkyt Ata Kyzylorda State UniversityKyzylordaKazakhstan
In the face of escalating intricacy and heterogeneity within Internet of Things(IoT)network landscapes,the imperative for adept intrusion detection techniques has never been more *** paper delineates a pioneering deep... 详细信息
来源: 评论
An Improved Method for Extractive Based Opinion Summarization Using Opinion Mining
收藏 引用
computer systems Science & Engineering 2022年 第8期42卷 779-794页
作者: Surbhi Bhatia Mohammed AlOjail Department of Information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversitySaudi Arabia
Opinion summarization recapitulates the opinions about a common topic *** primary motive of summarization is to preserve the properties of the text and is shortened in a way with no loss in the semantics of the *** ne... 详细信息
来源: 评论
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3065-3089页
作者: Ali Arshad Muhammad Nadeem Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi Department of Computer Science National University of TechnologyIslamabadPakistan Department of Computing Abasyn UniversityIslamabadPakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic university of MadinahMedinah42351Saudi Arabia Department of Information Systems Faculty of Computer and Information Sciences CollegeMajmaah University11952Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah 11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an *** cryptography is th... 详细信息
来源: 评论
Analysis of community question-answering issues via machine learning and deep learning:State-of-the-art review
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第1期8卷 95-117页
作者: Pradeep Kumar Roy Sunil Saumya Jyoti Prakash Singh Snehasish Banerjee Adnan Gutub Department of Computer Science and Engineering Indian Institute of Information TechnologySuratIndia Indian Institute of Information Technology DharwadIndia Department of Computer Science and Engineering National Institute of TechnologyPatnaIndia The York Management School University of YorkYorkUK Computer Engineering Department College of Computer&Information SystemsUmm Al-Qura UniversityMakkahSaudi Arabia
Over the last couple of decades,community question-answering sites(CQAs)have been a topic of much academic *** have often leveraged traditional machine learning(ML)and deep learning(DL)to explore the ever-growing volu... 详细信息
来源: 评论
Deep Learning-Based Enhanced Object Detection for Humanoid Robots  1
Deep Learning-Based Enhanced Object Detection for Humanoid R...
收藏 引用
1st International Conference on Sustainable Energy Technologies and Computational Intelligence, SETCOM 2025
作者: Negi, Akshit Patel, Harshita Vellore Institute of Technology School of Computer Science Engineering & Information Systems Vellore India
In the contemporary world, humanoid robots are likely to play a key role in various fields, including health care, domestic service, hospitality, business, and military and security activities. The robots are employed... 详细信息
来源: 评论
Recommendation System using Emotion Detection  3
Recommendation System using Emotion Detection
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Susindra, S. Sweta, B. Keerthikha Shri, R. Brindha, K. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
The need for a personalized user experience brought recommendation systems to the forefront of digital innovation. However, traditional approaches tend to often forget human emotions, which represent a critical driver... 详细信息
来源: 评论
An efficient multi-objective task scheduling in edge computing using adaptive honey badger optimisation
收藏 引用
International Journal of Web Engineering and technology 2024年 第2期19卷 110-126页
作者: Nagalakshmi, Bantupalli Subramanian, Sumathy School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore632014 India
Task scheduling, which is important in cloud computing, is one of the most challenging issues in this area. Hence, an efficient and reliable task scheduling approach is needed to produce more efficient resource employ... 详细信息
来源: 评论
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论
Revolutionizing Shopping Experiences with Smart Carts  1
Revolutionizing Shopping Experiences with Smart Carts
收藏 引用
1st IEEE International Conference on Computing and Data Science, ICCDS 2024
作者: Garlapati, Sasrika Reddy Dugad, Aastha Sachinkumar Agarwal, Shreya Gupta, Arul Seetha, R. School of Computer Science and Information Systems Vellore Institute of Technology Vellore India
The IoT -based smart shopping cart system revolutionizes the retail experience by integrating RFID technology, image processing cameras, and weight sensors along with bill generation and payment checkout. RFID scanner... 详细信息
来源: 评论