咨询与建议

限定检索结果

文献类型

  • 2,343 篇 会议
  • 1,575 篇 期刊文献
  • 73 册 图书

馆藏范围

  • 3,991 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,360 篇 工学
    • 1,591 篇 计算机科学与技术...
    • 1,270 篇 软件工程
    • 660 篇 信息与通信工程
    • 437 篇 控制科学与工程
    • 368 篇 电子科学与技术(可...
    • 339 篇 电气工程
    • 309 篇 生物工程
    • 240 篇 生物医学工程(可授...
    • 196 篇 机械工程
    • 196 篇 光学工程
    • 173 篇 仪器科学与技术
    • 142 篇 动力工程及工程热...
    • 130 篇 网络空间安全
    • 120 篇 安全科学与工程
    • 113 篇 化学工程与技术
    • 98 篇 交通运输工程
  • 1,309 篇 理学
    • 522 篇 数学
    • 438 篇 物理学
    • 353 篇 生物学
    • 167 篇 统计学(可授理学、...
    • 146 篇 化学
    • 134 篇 系统科学
  • 679 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 238 篇 图书情报与档案管...
    • 213 篇 工商管理
  • 332 篇 医学
    • 264 篇 临床医学
    • 219 篇 基础医学(可授医学...
    • 153 篇 公共卫生与预防医...
    • 125 篇 药学(可授医学、理...
  • 118 篇 法学
    • 97 篇 社会学
  • 83 篇 经济学
  • 56 篇 教育学
  • 49 篇 农学
  • 21 篇 文学
  • 8 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 151 篇 deep learning
  • 108 篇 accuracy
  • 98 篇 machine learning
  • 91 篇 artificial intel...
  • 87 篇 internet of thin...
  • 77 篇 computer science
  • 73 篇 feature extracti...
  • 66 篇 real-time system...
  • 56 篇 computational mo...
  • 55 篇 convolutional ne...
  • 53 篇 optimization
  • 53 篇 security
  • 52 篇 training
  • 50 篇 control systems
  • 47 篇 neural networks
  • 46 篇 support vector m...
  • 45 篇 predictive model...
  • 42 篇 monitoring
  • 41 篇 computational in...
  • 41 篇 wireless sensor ...

机构

  • 63 篇 maharishi school...
  • 57 篇 department of co...
  • 46 篇 centre of interd...
  • 38 篇 university of ph...
  • 35 篇 maharishi school...
  • 33 篇 king mongkut's u...
  • 28 篇 department of co...
  • 26 篇 department of el...
  • 26 篇 department of el...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 22 篇 school of inform...
  • 21 篇 prince shri venk...
  • 21 篇 faculty of engin...
  • 20 篇 faculty of infor...
  • 19 篇 presidency unive...
  • 18 篇 department of co...
  • 17 篇 department of ma...
  • 17 篇 department of co...
  • 17 篇 department of co...

作者

  • 91 篇 mekruksavanich s...
  • 87 篇 jitpattanakul an...
  • 66 篇 sakorn mekruksav...
  • 63 篇 anuchit jitpatta...
  • 39 篇 jantawong ponnip...
  • 32 篇 hnoohom narit
  • 26 篇 awotunde joseph ...
  • 25 篇 leonard barolli
  • 24 篇 ponnipa jantawon...
  • 23 篇 ramesh kumar ayy...
  • 21 篇 imoize agbotinam...
  • 18 篇 wikanda phaphan
  • 14 篇 abdelwahed motwa...
  • 14 篇 yuvaraj s.
  • 14 篇 xin xin
  • 13 篇 moni mohammad al...
  • 13 篇 ayyasamy ramesh ...
  • 12 篇 yang yang
  • 11 篇 eldar yonina c.
  • 11 篇 anwer mustafa hi...

语言

  • 3,715 篇 英文
  • 234 篇 其他
  • 28 篇 中文
  • 13 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Department of Communication Engineering Faculty of Computer Science and System Engineering"
3991 条 记 录,以下是251-260 订阅
排序:
CNN-Based Deep Learning Model for Early Identification and Categorization of Melanoma Skin Cancer Using Medical Imaging
收藏 引用
SN computer science 2024年 第7期5卷 911页
作者: Pandimurugan, V. Ahmad, Sultan Prabu, A.V. Rahmani, Mohammad Khalid Imam Abdeljaber, Hikmat A. M. Eswaran, Malathi Nazeer, Jabeen Computer Science and Engineering Acharya Institute of Technology Bangalore India Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Alkharj 11942 Saudi Arabia University Center for Research and Development (UCRD) Department of Computer Science and Engineering Chandigarh University Gharuan Punjab Mohali 140413 India Department of Electronics and Communication Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram AP Guntur 522502 India College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia Department of Computer Science Faculty of Information Technology Applied Science Private University Amman Jordan MEU Research Unit Middle East University Amman 11831 Jordan Department of Computer Technology Kongu Engineering College Perundurai Tamil Nadu Erode India
In human life, skin cancer is a curse. If not appropriately diagnosed, it spreads around all body parts in the earlier stage. The melanoma skin cancer death rate is 75% all over the world. There is an urgent need for ... 详细信息
来源: 评论
Dipper Throated Optimization for Detecting Black-Hole Attacks inMANETs
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1905-1921页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc... 详细信息
来源: 评论
Exploring Low Rate Dos Attack Detection Methods: A Bibliometric Analysis and Roadmap for Further Research
Exploring Low Rate Dos Attack Detection Methods: A Bibliomet...
收藏 引用
2023 IEEE International Conference on Data and Software engineering, ICoDSE 2023
作者: Widodo, Anteng Rochim, Adian Fatchur Warsito, Budi School of Postgraduated Studies Diponegoro University Doctoral Program of Information System Semarang Indonesia Muria Kudus University Faculty of Engineering Department of Information System Kudus Indonesia Diponegoro University Faculty of Engineering Department of Computer Engineering Semarang Indonesia Diponegoro University Faculty of Science and Mathematics Department of Statistics Semarang Indonesia
Low-Rate Denial of Service (LDoS) attacks, an emerging breed of DoS attacks, present a formidable challenge in terms of their detectability. Within the realm of network security, these attacks cast a substantial shado... 详细信息
来源: 评论
Analog parallel processor for broadband multifunctional integrated system based on silicon photonic platform
收藏 引用
Light(science & Applications) 2025年 第3期14卷 746-756页
作者: Na Qian Defu Zhou Haowen Shu Ming Zhang Xingjun Wang Daoxin Dai Xiao Deng Weiwen Zou State Key Laboratory of Advanced Optical Communication Systems and Networks Intelligent Microwave Lightwave Integration Innovation Center(imLic)Department of Electronic EngineeringShanghai Jiao Tong UniversityShanghaiChina State Key Laboratory of Advanced Optical Communications System and Networks Department of ElectronicsSchool of Electronics Engineering and Computer SciencePeking UniversityBejingChina State Key Laboratory of Extreme Photonics and Instrumentation College of Optical Science and EngineeringInternational Research Center for Advanced PhotonicsZhejiang UniversityHangzhouChina
Sharing the hardware platform between diverse information systems to establish full cooperation among different functionalities has attracted substantial ***,broadband multifunctional integrated systems with large ope... 详细信息
来源: 评论
Enhanced 5G Device-to-Device (D2D) Security in Spectrum Sharing system  32
Enhanced 5G Device-to-Device (D2D) Security in Spectrum Shar...
收藏 引用
32nd International Conference on Software, Telecommunications and computer Networks, SoftCOM 2024
作者: Alrjoob, Ayat M. Ababnah, Ahmad A. Al-Mistarihi, Mamoun F. Darabkh, Khalid A. German-Jordanian University School of Electrical Engineering and Information Technology Electrical and Communication Engineering Department Amman11180 Jordan Jordan University of Science and Technology Faculty of Engineering Electrical Engineering Department P.o. Box 3030 Irbid22110 Jordan The University of Jordan School of Engineering Computer Engineering Department Amman11942 Jordan
This paper presents a six-node system comprising two transmitter-receiver pairs, an eavesdropper, and a relay. It evaluates the security of the primary pair while the secondary uses jamming to protect against eavesdro... 详细信息
来源: 评论
Spoofing Face Detection Using Novel Edge-Net Autoencoder for Security
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 2773-2787页
作者: Amal H.Alharbi S.Karthick K.Venkatachalam Mohamed Abouhawwash Doaa Sami Khafaga Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh 11671Saudi Arabia Department of Electrical Electronics and Communication Engineering GITAM School of TechnologyGITAM Deemed to be UniversityBengaluru CampusKarnataka560065India Department of Computer Science and Engineering CHRIST(Deemed to be University)Bangalore560074India Department of Mathematics Faculty of ScienceMansoura UniversityMansoura 35516Egypt Department of Computational Mathematics Scienceand Engineering(CMSE)Michigan State UniversityEast LansingMI48824USA
Recent security applications in mobile technologies and computer sys-tems use face recognition for high-end *** numerous security tech-niques,face recognition is considered a high-security *** fuse and carry out face ... 详细信息
来源: 评论
Securing Primary Users in IoT 5G Cognitive Radio Networks  32
Securing Primary Users in IoT 5G Cognitive Radio Networks
收藏 引用
32nd International Conference on Software, Telecommunications and computer Networks, SoftCOM 2024
作者: Alrjoob, Ayat M. Ababnah, Ahmad A. Al-Mistarihi, Mamoun F. Darabkh, Khalid A. German-Jordanian University School of Electrical Engineering and Information Technology Electrical and Communication Engineering Department Amman11180 Jordan Jordan University of Science and Technology Faculty of Engineering Electrical Engineering Department P.o.Box 3030 Irbid22110 Jordan The University of Jordan School of Engineering Computer Engineering Department Amman11942 Jordan
The Internet of Things (IoT) has transformed device communication, necessitating reliable information security, especially physical layer security (PLS). Protecting data confidentiality in wireless transfers is critic... 详细信息
来源: 评论
Utilization of ECC in Smart Grids: A Review
Utilization of ECC in Smart Grids: A Review
收藏 引用
2023 International Conference on Power Energy, Environment and Intelligent Control, PEEIC 2023
作者: Gopala Krishna, K. Shekhawat, Jyoti Agarwal, Trapty Faculty of Engineering and Technology Department of Electronics and Communication Engineering Bangalore India Vivekananda Global University Department of Computer Science & Application Jaipur India Maharishi University of Information Technology Engineering Department Uttar Pradesh India
Within the realm of smart grids, a power service provider plays a crucial function in coordinating predicted power production with actual power demand in order to support power system stability. Insufficient protectio... 详细信息
来源: 评论
Real-Time Road Damage Detection and Infrastructure Evaluation Leveraging Unmanned Aerial Vehicles and Tiny Machine Learning
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 21347-21358页
作者: Khan, Muhammad Waseem Obaidat, Mohammad S. Mahmood, Khalid Batool, Dania Badar, Hafiz Muhammad Sanaullah Aamir, Muhammad Gao, Wu Comsats University Islamabad Sahiwal Campus Department Of Computer Science Sahiwal57000 Pakistan Superior University Department Of Computer Science Lahore54000 Pakistan The University Of Jordan King Abdullah Ii School Of Information Technology Amman11942 Jordan University Of Science And Technology Beijing School Of Communication And Computing Engineering Beijing100083 China Amity University Amity School Of Engineering And Technology Uttar Pradesh Noida201301 India National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan University Of Palermo Department Of Engineering Palermo90133 Italy Emerson University Department Of Emerging Computing Technologies Multan60000 Pakistan Northwestern Polytechnical University Center For Bio-Inspired System-on-Chip School Of Computer Science Xi'an710060 China
Road damage detection (RDD) through computer vision and deep learning techniques can ensure the safety of vehicles and humans on the roads. Integrating unmanned aerial vehicles (UAVs) in RDD and infrastructure evaluat... 详细信息
来源: 评论
Secure Encryption of Satellite Images Using S-Box-Based Two-Fish Algorithm and A Novel Chaotic Map  3rd
Secure Encryption of Satellite Images Using S-Box-Based Two-...
收藏 引用
3rd International Conference on Signal and Data Processing, ICSDP 2023
作者: Jansi, R. Ashwini, K. Aishwarya, N. Muthulakshmi, M. Logeshwari, M. Kanna, Mukesh Department of Electronics and Communication Engineering Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nadu Kattankulathur603203 India Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India Department of Electronics and Communication Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Chennai India Department of Mathematics Sathyabama Institute of Science and Technology Semmancheri Tamil Nadu Chennai600119 India
In recent days, encryption of satellite imagery has attracted a wide range of researchers since these images contain confidential information. Thereby, it is necessary to preserve the privacy of this data to avoid una... 详细信息
来源: 评论