咨询与建议

限定检索结果

文献类型

  • 67,361 篇 会议
  • 37,123 篇 期刊文献
  • 1,275 册 图书

馆藏范围

  • 105,759 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 63,153 篇 工学
    • 45,322 篇 计算机科学与技术...
    • 36,250 篇 软件工程
    • 15,561 篇 信息与通信工程
    • 9,746 篇 控制科学与工程
    • 7,318 篇 电气工程
    • 7,130 篇 生物工程
    • 6,605 篇 电子科学与技术(可...
    • 5,609 篇 生物医学工程(可授...
    • 4,261 篇 机械工程
    • 4,182 篇 光学工程
    • 3,247 篇 仪器科学与技术
    • 3,135 篇 化学工程与技术
    • 3,029 篇 动力工程及工程热...
    • 2,576 篇 网络空间安全
    • 2,534 篇 安全科学与工程
    • 2,179 篇 交通运输工程
  • 35,863 篇 理学
    • 18,182 篇 数学
    • 11,281 篇 物理学
    • 8,177 篇 生物学
    • 5,783 篇 统计学(可授理学、...
    • 4,043 篇 系统科学
    • 3,412 篇 化学
  • 18,639 篇 管理学
    • 11,138 篇 管理科学与工程(可...
    • 8,279 篇 图书情报与档案管...
    • 5,348 篇 工商管理
  • 5,908 篇 医学
    • 4,940 篇 临床医学
    • 4,331 篇 基础医学(可授医学...
    • 2,600 篇 药学(可授医学、理...
    • 2,520 篇 公共卫生与预防医...
  • 3,150 篇 法学
    • 2,563 篇 社会学
  • 2,003 篇 经济学
  • 1,521 篇 农学
  • 1,461 篇 教育学
  • 569 篇 文学
  • 249 篇 军事学
  • 191 篇 艺术学
  • 31 篇 哲学
  • 21 篇 历史学

主题

  • 3,373 篇 computer science
  • 2,461 篇 accuracy
  • 2,357 篇 deep learning
  • 2,296 篇 feature extracti...
  • 2,144 篇 machine learning
  • 1,982 篇 computational mo...
  • 1,675 篇 training
  • 1,589 篇 data mining
  • 1,415 篇 artificial intel...
  • 1,404 篇 support vector m...
  • 1,385 篇 internet of thin...
  • 1,318 篇 information tech...
  • 1,143 篇 optimization
  • 1,136 篇 predictive model...
  • 919 篇 security
  • 910 篇 neural networks
  • 897 篇 educational inst...
  • 893 篇 convolutional ne...
  • 887 篇 wireless sensor ...
  • 875 篇 computer archite...

机构

  • 1,100 篇 cavendish labora...
  • 1,025 篇 department of ph...
  • 967 篇 physikalisches i...
  • 966 篇 oliver lodge lab...
  • 910 篇 department of co...
  • 700 篇 university of ch...
  • 621 篇 infn laboratori ...
  • 611 篇 infn sezione di ...
  • 592 篇 infn sezione di ...
  • 578 篇 fakultät physik ...
  • 564 篇 infn sezione di ...
  • 553 篇 school of physic...
  • 549 篇 department of ph...
  • 540 篇 horia hulubei na...
  • 530 篇 school of physic...
  • 516 篇 imperial college...
  • 515 篇 h.h. wills physi...
  • 515 篇 school of physic...
  • 513 篇 nikhef national ...
  • 503 篇 stfc rutherford ...

作者

  • 255 篇 barter w.
  • 248 篇 a. gomes
  • 238 篇 c. alexa
  • 237 篇 beiter a.
  • 235 篇 j. m. izen
  • 231 篇 g. bella
  • 231 篇 j. strandberg
  • 230 篇 c. amelung
  • 228 篇 d. calvet
  • 227 篇 blake t.
  • 225 篇 s. chen
  • 224 篇 bellee v.
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 219 篇 boettcher t.
  • 217 篇 brundu d.
  • 217 篇 betancourt c.
  • 216 篇 g. spigo
  • 215 篇 borsato m.
  • 212 篇 bencivenni g.

语言

  • 99,083 篇 英文
  • 5,550 篇 其他
  • 1,086 篇 中文
  • 102 篇 日文
  • 24 篇 斯洛文尼亚文
  • 20 篇 德文
  • 15 篇 法文
  • 7 篇 俄文
  • 3 篇 朝鲜文
  • 2 篇 阿拉伯文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department Of Computer Science Faculty of Computer Science and Information Technology"
105759 条 记 录,以下是11-20 订阅
排序:
AES-Based Steganography Using Blockchain: A Novel Approach for Secure Text Hiding in Encrypted Images
收藏 引用
Informatica (Slovenia) 2024年 第21期48卷 67-78页
作者: Salim, Batool Arif Aljabery, Maalim A. Younis, Hameed Abdulkareem Faculty of Computer Science and Information Technology Computer Science Dept. University of Basrah Basrah Iraq
Steganography is a technique used to hide data within other data, emerging from the realization that information is valuable and must be concealed. By considering the potential of blockchain technology, which produces... 详细信息
来源: 评论
A Review Of Text Mining Techniques: Trends, and Applications In Various Domains
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer science and Mathematics 2024年 第1期5卷 125-141页
作者: Aleqabie, Hiba J. Sfoq, Mais Saad Albeer, Rand Abdulwahid Abd, Enaam Hadi Computer Science Department Collage of Computer Science and Information Technology University of Kerbala Karbala Iraq Information Technology Department Collage of Computer Science and Information Technology University of Kerbala. Karbala Iraq
Text mining, a subfield of natural language processing (NLP), has received considerable attention in recent years due to its ability to extract valuable insights from large volumes of unstructured textual data. This r... 详细信息
来源: 评论
Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4663-4686页
作者: Aljuaid Turkea Ayedh M Ainuddin Wahid Abdul Wahab Mohd Yamani Idna Idris Faculty of Computer Science and Information Technology Universiti MalayaKuala Lumpur50603Malaysia Faculty of Computer Science and Information Technology Shaqra UniversityShaqra11961Saudi Arabia Center for Mobile Cloud Computing Faculty of Computer Science and Information TechnologyUniversiti MalayaKuala Lumpur50603Malaysia
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce ***,this trend introduces security challenges,such as unauthorized *** access control systems,such as Attribute-Base... 详细信息
来源: 评论
A Package Level Regression Test Selection Approach for Java Software Systems
收藏 引用
IEEE Access 2025年 13卷 87848-87861页
作者: Al-Refai, Mohammed Hammad, Mahmoud M. Jordan University of Science and Technology Faculty of Computer and Information Technology Computer Science Department Irbid22110 Jordan Faculty of Engineering and Information Technology Ajman United Arab Emirates Jordan University of Science and Technology Faculty of Computer and Information Technology Software Engineering Department Irbid22110 Jordan
Regression testing of software systems is an important and critical activity yet expensive and resource-intensive. An approach to enhance its efficiency is Regression Test Selection (RTS), which selectively re-execute... 详细信息
来源: 评论
Segmentation and Classification of Skin Cancer Diseases Based on Deep Learning: Challenges and Future Directions
收藏 引用
IEEE Access 2025年 13卷 90163-90184页
作者: Khalaf, Abdulrahman Dira Hamdan, Hazlina Abdul Halin, Alfian Manshor, Noridayu Serdang Faculty of Computer Science and Information Technology Department of Computer Science Selangor 43400 Malaysia University of Fallujah Al-Fallujah Department of Computer Centre Anbar31002 Iraq Faculty of Computer Science and Information Technology Department of Multimedia Serdang43400 Malaysia
Deep Learning (DL) techniques have significantly improved the diagnostic accuracy in healthcare, particularly for detecting and classifying skin cancer. Such technological advancements will assist healthcare professio... 详细信息
来源: 评论
Optimizing Performance in Wireless Sensor Networks through a Multi-Objective Rendezvous Points Selection Algorithm
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第18期18卷 167-183页
作者: Samara, Ghassan Alzyoud, Wafaa Aljaidi, Mohammad Alazaidah, Raed Qasem, Mais Haj Al Daoud, Essam Faculty of Information Technology Computer Science Department Zarqa University Zarqa Jordan
Wireless sensor networks (WSNs) play a vital role in modern research and applications due to their potential to gather data from various environments. Because sensor nodes (SNs) within WSNs have limited battery life, ... 详细信息
来源: 评论
Metaheuristic task offloading approaches for minimization of energy consumption on edge computing: a systematic review
收藏 引用
Discover Internet of Things 2024年 第1期4卷 1-30页
作者: Latip, Rohaya Aminu, Jafar Hanafi, Zurina Mohd Kamarudin, Shafinah Gabi, Danlami Faculty of Computer Science and Information Technology Universiti Putra Serdang Malaysia Department of Computer Science Kebbi State University of Science and Technology Aleiro Aleiro Nigeria
A systematic review of metaheuristic Algorithms for energy-efficient task offloading in edge computing is provided. The Grey Wolf Optimizer (GWO) is explored as a promising approach for reducing energy consumption. Fu... 详细信息
来源: 评论
Gender and age-evolution detection based on audio forensic analysis using light deep neural network
收藏 引用
International Journal of Speech technology 2023年 第4期26卷 1091-1098页
作者: AL-Shakarchy, Noor D. Rageb, Huda Safoq, Mais Saad Department of Computer Science Faculty of Computer Science and Information Technology Kerbala University Kerbala Iraq
Forensic audio analysis is a foundation stone of many crime investigations. In forensic evidence;the audio file of the human voice is analyzed to extract much information in addition to the content of the speech, such... 详细信息
来源: 评论
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG College of Information Science and Engineering Hunan Normal University School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Computer Science Department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 评论
Cloud Computing Security: Assured Deletion
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第3期48卷 485-496页
作者: Ahmed, Sarmad Mahmood Mahmood, Baban Ahmed Department of Computer Science College of Computer Science and Information Technology Kirkuk University Kirkuk Iraq
With the advent of cloud computing, many organizations, institutions, and individuals have chosen to store their data in the cloud as a way to compensate for limited local storage capabilities and reduce expenses. How... 详细信息
来源: 评论