咨询与建议

限定检索结果

文献类型

  • 4,731 篇 会议
  • 3,579 篇 期刊文献
  • 198 册 图书

馆藏范围

  • 8,508 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,937 篇 工学
    • 3,077 篇 计算机科学与技术...
    • 2,488 篇 软件工程
    • 1,148 篇 信息与通信工程
    • 669 篇 控制科学与工程
    • 583 篇 电气工程
    • 570 篇 生物工程
    • 526 篇 电子科学与技术(可...
    • 511 篇 生物医学工程(可授...
    • 395 篇 光学工程
    • 386 篇 核科学与技术
    • 323 篇 机械工程
    • 260 篇 仪器科学与技术
    • 254 篇 动力工程及工程热...
    • 218 篇 化学工程与技术
    • 161 篇 交通运输工程
  • 3,301 篇 理学
    • 1,427 篇 物理学
    • 1,397 篇 数学
    • 668 篇 生物学
    • 479 篇 统计学(可授理学、...
    • 313 篇 系统科学
    • 251 篇 化学
  • 1,262 篇 管理学
    • 778 篇 管理科学与工程(可...
    • 521 篇 图书情报与档案管...
    • 404 篇 工商管理
  • 525 篇 医学
    • 448 篇 临床医学
    • 397 篇 基础医学(可授医学...
    • 265 篇 药学(可授医学、理...
    • 186 篇 公共卫生与预防医...
  • 208 篇 法学
    • 170 篇 社会学
  • 161 篇 经济学
    • 161 篇 应用经济学
  • 94 篇 农学
  • 85 篇 教育学
  • 18 篇 文学
  • 15 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 195 篇 informatics
  • 164 篇 hadron colliders
  • 161 篇 machine learning
  • 151 篇 artificial intel...
  • 126 篇 deep learning
  • 121 篇 computational mo...
  • 113 篇 computer archite...
  • 110 篇 quality of servi...
  • 103 篇 feature extracti...
  • 97 篇 predictive model...
  • 94 篇 accuracy
  • 93 篇 optimization
  • 92 篇 wireless sensor ...
  • 90 篇 bandwidth
  • 87 篇 monitoring
  • 85 篇 routing
  • 84 篇 resource managem...
  • 83 篇 data mining
  • 79 篇 wireless communi...
  • 79 篇 costs

机构

  • 495 篇 yerevan physics ...
  • 397 篇 department for p...
  • 388 篇 faculty of scien...
  • 383 篇 department of ph...
  • 380 篇 kirchhoff-instit...
  • 371 篇 department of ph...
  • 367 篇 department of ph...
  • 340 篇 fakultät für phy...
  • 340 篇 institute of phy...
  • 334 篇 institute of phy...
  • 311 篇 irfu cea univers...
  • 299 篇 department of ph...
  • 295 篇 instituto de fís...
  • 267 篇 department of ph...
  • 266 篇 department of ph...
  • 261 篇 universidade fed...
  • 259 篇 graduate school ...
  • 251 篇 ictp trieste
  • 249 篇 nikhef national ...
  • 247 篇 department of ph...

作者

  • 330 篇 c. alexa
  • 327 篇 j. m. izen
  • 321 篇 g. bella
  • 318 篇 j. strandberg
  • 315 篇 d. calvet
  • 314 篇 c. amelung
  • 294 篇 g. spigo
  • 289 篇 f. siegert
  • 286 篇 r. ströhmer
  • 283 篇 m. rijssenbeek
  • 281 篇 s. jin
  • 281 篇 g. gaudio
  • 281 篇 s. mohapatra
  • 272 篇 y. tayalati
  • 272 篇 s. guindon
  • 266 篇 a. kaczmarska
  • 255 篇 j. schaarschmidt
  • 251 篇 m. klein
  • 248 篇 a. d. pilkington
  • 244 篇 l. chevalier

语言

  • 7,558 篇 英文
  • 879 篇 其他
  • 74 篇 中文
  • 6 篇 德文
  • 3 篇 日文
  • 3 篇 俄文
  • 2 篇 法文
  • 1 篇 爱沙尼亚文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Cyprus University of Technology Computer Engineering and Informatics"
8508 条 记 录,以下是481-490 订阅
排序:
Mammogram Breast Cancer Classification Based on Deep-Convolutional Neural Network
Mammogram Breast Cancer Classification Based on Deep-Convolu...
收藏 引用
2023 International Seminar on Application for technology of Information and Communication, iSemantic 2023
作者: Amadea, Avissa Aurellia Sari, Christy Atika Rachmawanto, Eko Hari Sari, Wellia Shinta Noori, Mohammed S. Alkhafaji, Mohamed Ayad University of Dian Nuswantoro Study Program in Informatics Engineering Semarang Indonesia University of Dian Nuswantoro Study Program in Information Systems Semarang Indonesia Northern Technical University Department of Computer Engineering Technology Mosul Iraq National University of Science and Technology Department of Computer Science DhiQar Iraq
Based on WHO's data, breast cancer is one of the most deadly diseases that has claimed many victims, especially women. This disease begins with the presence of an undetected and eventually turns into malignant (ca... 详细信息
来源: 评论
Social engineering Attacks Detection Approach  13
Social Engineering Attacks Detection Approach
收藏 引用
13th International Conference on Dependable Systems, Services and Technologies, DESSERT 2023
作者: Lysenko, Sergii Vorobiov, Volodymyr Bokhonko, Oleksandr Gaj, Piotr Savenko, Oleg Woloszyn, Jacek Khmelnitsky National University Department of Computer Engineering and Information Systems Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Khmelnitsky National University Department of Computer Engineering and System Programming Khmelnitsky Ukraine Kazimierz Pulaski University of Technology and Humanities in Radom Department of Informatics and Teleinformatics Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq... 详细信息
来源: 评论
Insights into Household Energy Consumption: Disaggregating Cooling and Heating Profiles using Principal Component Analysis
Insights into Household Energy Consumption: Disaggregating C...
收藏 引用
International Conference on Energy Transition in the Mediterranean Area (SyNERGY MED)
作者: Stylianos Loizidis Fanourios Kourougianni Andreas V. Olympios Andreas Kyprianou George E. Georghiou Department of Electrical and Computer Engineering PV Technology Laboratory University of Cyprus Nicosia Cyprus PHAETHON Centre of Excellence for Intelligent Efficient and Sustainable Energy Solutions Nicosia Cyprus Department of Mechanical and Manufacturing Engineering University of Cyprus Nicosia Cyprus
This paper develops a methodology based on Principal Component Analysis (PCA) to disaggregate distinct baseline electricity, heating and cooling components from the daily total electricity consumption data of 68 house... 详细信息
来源: 评论
Medical Image Watermarking Using Slantlet Transform and Particle Swarm Optimization  6th
Medical Image Watermarking Using Slantlet Transform and Part...
收藏 引用
6th International Conference on Innovative Computing and Communication, ICICC 2023
作者: Rachmawanto, Eko Hari Dawd, Lahib Nidhal Sari, Christy Atika Ali, Rabei Raad Al-Dayyeni, Wisam Subhi Jubair, Mohammed Ahmed Informatics Engineering Computer Science Faculty Dian Nuswantoro University Semarang50131 Indonesia Department of Computer Techniques Engineering Dijlah University College Baghdad Iraq National University of Science and Technology Thi-Qar Iraq Department of Computer Technical Engineering College of Information Technology Imam Ja’afar Al-Sadiq University Al-Muthanna66002 Iraq
Image quality can be increased to achieve the best imperceptibility without losing its robustness which is one of the benefits of using optimal schema as the process of embedding secret messages originating from PSO. ... 详细信息
来源: 评论
IT-Security Risk Based Approach for Secure Operation of Distributed Data Platforms in Supply Chains
IT-Security Risk Based Approach for Secure Operation of Dist...
收藏 引用
2024 IEEE International Conference on Industrial engineering and engineering Management, IEEM 2024
作者: Voß, Marvin Kallisch, Jonas Runge, Maxim Theus, Tobias Niemann, Karl-Heinz Wunck, Christoph Faculty I - Electrical Engineering and Information Technology University of Applied Sciences and Arts Hannover Germany Department of Engineering Section Electrical Engineering and Computer Science University of Applied Sciences Leer Emden Germany Faculty of Mathematics Informatics and Statistics Ludwig Maximilian University Munich Germany
This paper presents the development of a secure data platform designed to enhance operational efficiency and to facilitate cross-company collaboration within the manufacturing supply chain. The platform is designed to... 详细信息
来源: 评论
Selection of a Simple 5G Handover Algorithm: Preparation for Named Data Networking  10
Selection of a Simple 5G Handover Algorithm: Preparation for...
收藏 引用
10th International Conference on Wireless and Telematics, ICWT 2024
作者: Nurhayati, Ade Ahdan, Syaiful Juhana, Tutun Syambas, Nana Rachmana Bandung Institute of Technology School of Electrical Engineering and Informatics Bandung40132 Indonesia Telkom University Faculty of Applied Science Jakarta11710 Indonesia Universitas Teknokrat Indonesia Faculty of Engineering & Computer Science 35132 Indonesia
Named Data Networking as an alternative network for 5G network traffic is required to be able to provide better performance compared to other networks such as internet protocol networks. In NDN wireless, it is known t... 详细信息
来源: 评论
M3GNAS: Multi-modal Multi-view Graph Neural Architecture Search for Medical Outcome Predictions
M3GNAS: Multi-modal Multi-view Graph Neural Architecture Sea...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Al-Sabri, Raeed Gao, Jianliang Chen, Jiamin Oloulade, Babatounde Moctard Wu, Zhenpeng Abdullah, Monir Hu, Xiaohua Central South University School of Computer Science and Engineering Changsha China College of Science and Engineering Hamad Bin Khlifa University Division of Information and Computing Technology Doha Qatar College of Computing and Information Technology University of Bisha Saudi Arabia College of Computing & Informatics Drexel University United States
Multi-modal multi-view graph learning models have achieved significant success in medical outcome prediction, combining various modalities to enhance the performance of various medical tasks. However, current architec... 详细信息
来源: 评论
Optimal Planning Framework for Mitigating Cyber-Induced Cascading Failures in Power Grids
Optimal Planning Framework for Mitigating Cyber-Induced Casc...
收藏 引用
2024 IEEE Power and Energy Society General Meeting, PESGM 2024
作者: Venkatasubramanian, Balaji V. Hashemi, Sina Wells, Linton Laskey, Kathryn Blackmond van de Lindt, John W. Amir, Yair Babay, Amy Chiu, Imes Panteli, Mathaios Department of Electrical and Computer Engineering University of Cyprus Cyprus School of Technology Woxsen University Telangana India Center for Resilient and Sustainable Communities George Mason University FairfaxVA22030 United States Department of Civil and Environmental Engineering Colorado State University Fort CollinsCO80523 United States Department of Computer Science Johns Hopkins University BaltimoreMD21218 United States School of Computer and Information University of Pittsburgh PittsburghPA15213 United States Fort Belvoir22060 United States
The growing digitization of power grids has increased their vulnerability to cyberattacks, potentially leading to widespread power outages. While many studies address cyber-induced outages, resulting cascading failure... 详细信息
来源: 评论
The Correlation Between Architecture Smells, Package Stability and Reusability: A Case Study  4
The Correlation Between Architecture Smells, Package Stabili...
收藏 引用
4th IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and computer engineering, MI-STA 2024
作者: Benidris, Mrwan Elfallah, Ehab A. Omar Cheema, Marwa Aslam Alsma, Mohammed Salah Addin Kadiki, Tareq Ziad Elbarsha, Abdelfattah University of Benghazi Faculty of Information Technology Dep. of Computer Science Libya Libyan International Medical University Faculty of Information Technology Dept. of Software Engineering Libya University of Benghazi Faculty of Public Health Health Informatics Department Libya
the design decisions made in the architecture of a software system are essential to its maintainability, and thus its quality is of great importance. Architecture smells (ASs) can be used to identify any quality issue... 详细信息
来源: 评论
Neutrosophic Model for Evaluation Healthcare Security Criteria for Powerful and Lightweight Secure Storage System in Cloud-Based E-Healthcare Services
收藏 引用
Neutrosophic Sets and Systems 2023年 58卷 367-378页
作者: El-Douh, Ahmed A. Lu, SongFeng Abdelhafeez, Ahmed Ali, Ahmed M. Aziz, Alber S. School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Faculty of Information Systems and Computer Science October 6th University Giza12585 Egypt Faculty of Computers and Informatics Zagazig University Sharqiyah Zagazig44519 Egypt
Large data volumes make manually keeping and preserving health records for future reference problematic. Most unusual is the coronavirus epidemic's overcrowding of hospitals. The Secure Pattern Electronic Healthca... 详细信息
来源: 评论