咨询与建议

限定检索结果

文献类型

  • 4,132 篇 会议
  • 2,674 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,932 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,351 篇 工学
    • 3,323 篇 计算机科学与技术...
    • 2,683 篇 软件工程
    • 855 篇 信息与通信工程
    • 677 篇 控制科学与工程
    • 467 篇 生物工程
    • 421 篇 电气工程
    • 313 篇 机械工程
    • 302 篇 生物医学工程(可授...
    • 280 篇 电子科学与技术(可...
    • 219 篇 光学工程
    • 166 篇 仪器科学与技术
    • 160 篇 动力工程及工程热...
    • 150 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 133 篇 建筑学
  • 1,972 篇 理学
    • 1,017 篇 数学
    • 530 篇 生物学
    • 496 篇 物理学
    • 315 篇 统计学(可授理学、...
    • 262 篇 系统科学
    • 155 篇 化学
  • 1,468 篇 管理学
    • 906 篇 管理科学与工程(可...
    • 666 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 352 篇 医学
    • 303 篇 临床医学
    • 252 篇 基础医学(可授医学...
    • 160 篇 公共卫生与预防医...
  • 246 篇 法学
    • 207 篇 社会学
  • 188 篇 经济学
    • 187 篇 应用经济学
  • 158 篇 教育学
    • 149 篇 教育学
  • 81 篇 农学
  • 26 篇 文学
  • 21 篇 艺术学
  • 18 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 190 篇 deep learning
  • 181 篇 machine learning
  • 140 篇 computational mo...
  • 125 篇 artificial intel...
  • 123 篇 information syst...
  • 105 篇 training
  • 104 篇 software enginee...
  • 99 篇 accuracy
  • 95 篇 cloud computing
  • 94 篇 internet of thin...
  • 94 篇 semantics
  • 91 篇 feature extracti...
  • 91 篇 software
  • 86 篇 data mining
  • 84 篇 information tech...
  • 83 篇 predictive model...
  • 79 篇 security
  • 77 篇 data models
  • 75 篇 educational inst...
  • 73 篇 optimization

机构

  • 163 篇 school of comput...
  • 51 篇 school of comput...
  • 42 篇 department of in...
  • 41 篇 state key labora...
  • 39 篇 school of comput...
  • 38 篇 information syst...
  • 38 篇 university of ch...
  • 37 篇 department of in...
  • 36 篇 school of inform...
  • 32 篇 department of co...
  • 30 篇 faculty of infor...
  • 28 篇 college of compu...
  • 27 篇 department of in...
  • 27 篇 school of comput...
  • 26 篇 school of softwa...
  • 26 篇 department of co...
  • 25 篇 college of intel...
  • 24 篇 faculty of infor...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 36 篇 buyya rajkumar
  • 28 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 25 篇 xiong zehui
  • 23 篇 john grundy
  • 23 篇 grundy john
  • 21 篇 el-sayed m.el-ke...
  • 21 篇 zidong wang
  • 20 篇 bailey james
  • 18 篇 abdelwahed motwa...
  • 18 篇 choo kim-kwang r...
  • 18 篇 lo david
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao

语言

  • 6,503 篇 英文
  • 377 篇 其他
  • 53 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 西班牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6932 条 记 录,以下是341-350 订阅
排序:
A Method for Reducing Speech Distortion in Minimum Variance Distortionless Response Beamformer
A Method for Reducing Speech Distortion in Minimum Variance ...
收藏 引用
2023 Seminar on Signal Processing, SoSP 2023
作者: The, Quan Trong Huy, Nguyen Ba Anh, Pham Tuan Ha Noi University of Science and Technology Falculty of Information Technology Ha Noi Viet Nam University ITMO Falculty of Control Systems and Robotics Saint-Petersburg Russia University ITMO Falculty of Software Engineering and Computer Systems Saint-Petersburg Russia
Speech processing devices such as mobile telephone, hearing aid, cochlear implant is commonly equipped with a designed microphone array (MA) to capture the acoustic environment. The MA signals often contain a mixture ... 详细信息
来源: 评论
Artificial Intelligence Techniques Based Learner Authentication in Cybersecurity Higher Education Institutions
收藏 引用
Computers, Materials & Continua 2022年 第8期72卷 3131-3144页
作者: Abdullah Saad AL-Malaise AL-Ghamdi Mahmoud Ragab Information Systems Department Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Saudi Arabia Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Centre of Artificial Intelligence for Precision Medicines King Abdulaziz UniversityJeddah21589Saudi Arabia Mathematics Department Faculty of ScienceAl-Azhar UniversityNaser City11884CairoEgypt
Education 4.0 is being authorized more and more by the design of artificial intelligence(AI)*** education institutions(HEI)have started to utilize Internet technologies to improve the quality of the service and boost ... 详细信息
来源: 评论
Optimal Deep Belief Network Enabled Cybersecurity Phishing Email Classification
收藏 引用
Computer systems Science & Engineering 2023年 第3期44卷 2701-2713页
作者: Ashit Kumar Dutta T.Meyyappan Basit Qureshi Majed Alsanea Anas Waleed Abulfaraj Manal M.Al Faraj Abdul Rahaman Wahab Sait Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityAd DiriyahRiyadh13713Kingdom of Saudi Arabia Department of Computer Science Alagappa UniversityKaraikudi630003India Department of Computer Science Prince Sultan UniversityRiyadh11586Kingdom of Saudi Arabia Department of Computing Arabeast CollegesRiyadh11583Kingdom of Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah23613Kingdom of Saudi Arabia Department of Archives and Communication King Faisal UniversityAl AhsaHofuf31982Kingdom of Saudi Arabia
Recently,developments of Internet and cloud technologies have resulted in a considerable rise in utilization of online media for day to day *** results in illegal access to users’private data and compromises *** is a... 详细信息
来源: 评论
A new hybrid teaching learning based Optimization -Extreme learning Machine model based Intrusion-Detection system
收藏 引用
Materials Today: Proceedings 2023年 80卷 2701-2705页
作者: Qahatan Alsudani, Mustafa Abbdal Reflish, Salah H. Moorthy, Kohbalan Mundher Adnan, Myasar Computer Techniques Engineering Department Faculty of Information Technology Imam Ja'afar Al-sadiq University Najaf Iraq Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia Islamic University Najaf Iraq Faculty of Engineering School of Computing Universiti Teknologi Malaysia Johor Bahru81310 Malaysia
Currently, effective Intrusion-detection systems (IDS) still represent one of the important security tools. However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a s... 详细信息
来源: 评论
An Effective Post - Filtering for Minimum Variance Distortionless Response Beamformer
An Effective Post - Filtering for Minimum Variance Distortio...
收藏 引用
2023 Seminar on Signal Processing, SoSP 2023
作者: The, Quan Trong Huy, Nguyen Ba Anh, Pham Tuan Ha Noi University of Science and Technology Falculty of Information Technology Ha Noi Viet Nam University ITMO Falculty of Control Systems and Robotics Saint-Petersburg Russia University ITMO Falculty of Software Engineering and Computer Systems Saint-Petersburg Russia
An effective hands-free speech interface with an appropriate digital signal processing is essential for teleconference systems and control systems. Beamforming technique, which use a microphone array (MA) is an ideal ... 详细信息
来源: 评论
A scalable framework for secure and reliable wireless-based fog cloud communication
收藏 引用
Measurement: Sensors 2025年 37卷
作者: Khairosheva, Kymbat Razaque, Abdul Bektemyssova, Gulnara Yoo, Joon Department of Intelligent Systems and Cybersecurity Astana IT University Kazakhstan School of Computing Gachon University Korea Republic of Department of Computer Engineering and Information Systems International Information Technology University Almaty Kazakhstan
—Wireless telecommunication systems are essential in transferring data through fog cloud servers. However, the fog cloud servers suffer from unreliable and non-secure routing and limited power resources when mobile u... 详细信息
来源: 评论
Security Perspectives in Integrity Verification for Shared Data in Cloud—A Survey  1
收藏 引用
9th International Conference on Cyber Security, Privacy in Communication Networks, ICCS 2023
作者: Pailkar, Harsh Murugan, Thangavel School of Computing Science and Engineering VIT Bhopal University Madhya Pradesh Bhopal India Department of Information Systems and Security College of Information Technology United Arab Emirates University Al Ain Abu Dhabi United Arab Emirates
As businesses move their data and services to cloud computing environments, it is crucial to ensure the security and integrity of that shared data. In order to study the new security perspectives in the context of int... 详细信息
来源: 评论
Blockchain-Enabled Quality Assurance and Traceability in the Indian Confectionery Market
Blockchain-Enabled Quality Assurance and Traceability in the...
收藏 引用
2024 International Conference on Innovative computing, Intelligent Communication and Smart Electrical systems, ICSES 2024
作者: Subashini, B. Shanthi, P. Venkatesh, K. School of Computing Srm Institute of Science and Technology Department of Data Science and Business Systems Tamilnadu kattankulathur India St. Joseph's Institute of Technology Department of Information Technology OMR Chennai119 India School of Computing Srm Institute of Science and Technology Department of Networking and Communications Tamilnadu kattankulathur India
India, whose population growth is its greatest asset cannot afford to let its people eat confectionery that is either tainted or somehow polluted, since this would lead to extensive malnutrition. Traditional food supp... 详细信息
来源: 评论
Arithmetic Optimization with Deep Learning Enabled Anomaly Detection in Smart City
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 381-395页
作者: Mahmoud Ragab Maha Farouk S.Sabir Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Centre of Artificial Intelligence for Precision Medicines King Abdulaziz UniversityJeddah21589Saudi Arabia Mathematics Department Faculty of ScienceAl-Azhar UniversityNaser City11884CairoEgypt Information Systems Department Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Saudi Arabia
In recent years,Smart City Infrastructures(SCI)have become familiar whereas intelligent models have been designed to improve the quality of living in smart ***,anomaly detection in SCI has become a hot research topic ... 详细信息
来源: 评论
GENSIMO - A Generic Framework for Modelling Social Insurance systems  25th
GENSIMO - A Generic Framework for Modelling Social Insuranc...
收藏 引用
25th International Workshop on Multi-Agent-Based Simulation, MABS 2024
作者: de Haan, Fjalar J. Thompson, Jason School of Computing and Information Systems Faculty of Engineering and Information Technology The University of Melbourne Parkville Australia Melbourne Centre for Data Science The University of Melbourne Parkville Australia Department of Psychiatry Faculty of Medicine Dentistry and Health Sciences The University of Melbourne Parkville Australia
We report on the design, development and prototype testing of gensimo (GENeric Social Insurance MOdeling), a free and open-source software framework for modelling and simulation of social insurance systems. We discuss... 详细信息
来源: 评论