咨询与建议

限定检索结果

文献类型

  • 2,343 篇 会议
  • 1,561 篇 期刊文献
  • 73 册 图书

馆藏范围

  • 3,977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,349 篇 工学
    • 1,583 篇 计算机科学与技术...
    • 1,267 篇 软件工程
    • 656 篇 信息与通信工程
    • 434 篇 控制科学与工程
    • 363 篇 电子科学与技术(可...
    • 336 篇 电气工程
    • 308 篇 生物工程
    • 237 篇 生物医学工程(可授...
    • 196 篇 光学工程
    • 195 篇 机械工程
    • 173 篇 仪器科学与技术
    • 143 篇 动力工程及工程热...
    • 129 篇 网络空间安全
    • 120 篇 安全科学与工程
    • 111 篇 化学工程与技术
    • 98 篇 交通运输工程
  • 1,306 篇 理学
    • 520 篇 数学
    • 437 篇 物理学
    • 353 篇 生物学
    • 167 篇 统计学(可授理学、...
    • 144 篇 化学
    • 133 篇 系统科学
  • 675 篇 管理学
    • 454 篇 管理科学与工程(可...
    • 236 篇 图书情报与档案管...
    • 213 篇 工商管理
  • 331 篇 医学
    • 264 篇 临床医学
    • 218 篇 基础医学(可授医学...
    • 153 篇 公共卫生与预防医...
    • 125 篇 药学(可授医学、理...
  • 118 篇 法学
    • 97 篇 社会学
  • 83 篇 经济学
  • 56 篇 教育学
  • 50 篇 农学
  • 21 篇 文学
  • 8 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 150 篇 deep learning
  • 108 篇 accuracy
  • 99 篇 machine learning
  • 90 篇 artificial intel...
  • 87 篇 internet of thin...
  • 77 篇 computer science
  • 72 篇 feature extracti...
  • 65 篇 real-time system...
  • 56 篇 computational mo...
  • 55 篇 convolutional ne...
  • 53 篇 security
  • 52 篇 training
  • 51 篇 optimization
  • 50 篇 control systems
  • 47 篇 neural networks
  • 46 篇 support vector m...
  • 45 篇 predictive model...
  • 41 篇 computational in...
  • 41 篇 monitoring
  • 41 篇 wireless sensor ...

机构

  • 63 篇 maharishi school...
  • 57 篇 department of co...
  • 46 篇 centre of interd...
  • 38 篇 university of ph...
  • 35 篇 maharishi school...
  • 32 篇 king mongkut's u...
  • 28 篇 department of co...
  • 26 篇 department of el...
  • 26 篇 department of el...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 22 篇 school of inform...
  • 21 篇 prince shri venk...
  • 21 篇 faculty of engin...
  • 20 篇 faculty of infor...
  • 19 篇 presidency unive...
  • 18 篇 department of co...
  • 18 篇 department of co...
  • 17 篇 department of ma...
  • 17 篇 department of co...

作者

  • 90 篇 mekruksavanich s...
  • 88 篇 jitpattanakul an...
  • 66 篇 sakorn mekruksav...
  • 63 篇 anuchit jitpatta...
  • 39 篇 jantawong ponnip...
  • 32 篇 hnoohom narit
  • 26 篇 awotunde joseph ...
  • 25 篇 leonard barolli
  • 24 篇 ponnipa jantawon...
  • 22 篇 ramesh kumar ayy...
  • 21 篇 imoize agbotinam...
  • 18 篇 wikanda phaphan
  • 14 篇 moni mohammad al...
  • 14 篇 abdelwahed motwa...
  • 14 篇 yuvaraj s.
  • 14 篇 xin xin
  • 14 篇 ayyasamy ramesh ...
  • 12 篇 yang yang
  • 11 篇 eldar yonina c.
  • 11 篇 anwer mustafa hi...

语言

  • 3,698 篇 英文
  • 235 篇 其他
  • 28 篇 中文
  • 13 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Department of Communication Engineering Faculty of Computer Science and System Engineering"
3977 条 记 录,以下是441-450 订阅
排序:
An Optimal Text Watermarking Method for Sensitive Detecting of Illegal Tampering Attacks
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 5583-5600页
作者: Anwer Mustafa Hilal Fahd N.Al-Wesabi Mohammed Alamgeer Manar Ahmed Hamza Mohammad Mahzari Murad A.Almekhlafi Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam Bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Computer Science King Khalid UniversityMuhayel AseerKingdom of Saudi Arabia Faculty of Computer and IT Sana’a UniversitySana’aYemen Department of Information Systems King Khalid UniversityMuhayel AseerKingdom of Saudi Arabia Department of English College of Science&HumanitiesPrince Sattam Bin Abdulaziz UniversityAlKharjSaudi Arabia Faculty of Engineering Department of Electrical EngineeringCommunication EngineeringSana’a UniversityYemen
Due to the rapid increase in the exchange of text information via internet networks,the security and authenticity of digital content have become a major research *** main challenges faced by researchers are how to hid... 详细信息
来源: 评论
Robust Transmission Design in Multiobjective RIS-Aided SWIPT IoT communications
收藏 引用
IEEE Internet of Things Journal 2024年 第10期11卷 18605-18618页
作者: Sharma, Vaibhav Allu, Raviteja Singh, Sandeep Kumar Singh, Keshav Duong, Trung Q. Tsiftsis, Theodoros A. Institute of Communications Engineering National Sun Yat-sen University Kaohsiung804 Taiwan Motilal Nehru National Institute of Technology Allahabad Electronics and Communication Engineering Department Prayagraj211004 India Memorial University of Newfoundland Faculty of Engineering and Applied Science St. John'sNLA1B 3X5 Canada Queen's University Belfast School of Electronics Electrical Engineering and Computer Science BelfastBT7 1NN United Kingdom University of Thessaly Department of Informatics and Telecommunications Lamia35100 Greece
This work investigates the performance of simultaneous wireless information and power transfer (SWIPT) in a reconfigurable intelligent surface (RIS)-aided Internet of Things (IoT) communications under imperfect channe... 详细信息
来源: 评论
Resilience of Federated Learning Against False Data Injection Attacks in Energy Forecasting
Resilience of Federated Learning Against False Data Injectio...
收藏 引用
2024 International Conference on Green Energy, Computing and Sustainable Technology, GECOST 2024
作者: Shabbir, Attia Manzoor, Habib Ullah Ahmed, Ridha Alaa Halim, Zahid Gik Institute of Engg. Sciences & Tech. Faculty of Computer Science & Engg. Topi23640 Pakistan James Watt School of Engineering University of Glasgow United Kingdom University of Kufa Department of Electronics and Communication Engineering Najaf Iraq
Federated learning (FL) has established itself as a communication-efficient, privacy-aware, and cost-effective technique for training machine learning models in energy forecasting. This approach enables simultaneous m... 详细信息
来源: 评论
The Influence of Human Factors in Ensuring Cybersecurity in Organizations: Effectiveness of PDPA and GDPR Implementation  3
The Influence of Human Factors in Ensuring Cybersecurity in ...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Sharifi, Ahmad Zia Walid, Md. Abul Ala Momand, Mohammad Dawood Safi, Ihsan Ul Haq Safi, Hamidullah Khanzai Hossain, Sadia Nangarhar University Faculty of Computer Science Department of Networking and Communication Afghanistan Bangabandhu Sheikh Mujibur Rahman Digital University Department of Data Science and Engineering Gazipur Bangladesh Lautsprecher Teufel GMbH Berlin Germany Bangabandhu Sheikh Mujibur Rahman Digital University Department of Internet of Things and Robotics Engineering Gazipur Bangladesh
Modern organizations face rising levels of cyber risks, making cybersecurity a top priority for safeguarding sensitive data and maintaining operational continuity. Recent studies find human factors as the most critica... 详细信息
来源: 评论
An Efficient Intrusion Detection Framework in Software-Defined Networking for Cybersecurity Applications
收藏 引用
computers, Materials & Continua 2022年 第8期72卷 3529-3548页
作者: Ghalib H.Alshammri Amani K.Samha Ezz El-Din Hemdan Mohammed Amoon Walid El-Shafai Department of Computer Science Community CollegeKing Saud UniversityRiyadh28095Saudi Arabia Deanship of Scientific Research Saudi Electronic UniversityRiyadhSaudi Arabia Management Information System Department College of Business AdministrationKing Saud UniversityRiyadh28095Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Electronics and Electrical Communications Eng.Depart. Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Network management and multimedia data mining techniques have a great interest in analyzing and improving the network traffic *** recent times,the most complex task in Software Defined Network(SDN)is security,which is... 详细信息
来源: 评论
Trust-Based Blockchain for Improving Supply Chain communication in Internet of Vehicles  1
Trust-Based Blockchain for Improving Supply Chain Communicat...
收藏 引用
1st IEEE International Interdisciplinary Humanitarian Conference for Sustainability, IIHC 2022
作者: Shaheen, H. MohanRaj, A. Shobha Rani, Meesala Sreeraj, S. Amutha, M. Kannadhasan, S. UWL-RAK Faculty of Computing and Engineering United Arab Emirates Sri Eshwar College of Engineering Department of Computer Science and Engineering Coimbatore India MVJ College of Engineering Department of Computer Science and Engineering Bangalore India Sri Krishna College of Engineering and Technology Department of Computer Science and Engineering Coimbatore India Hindusthan College of Engineering Technical Campus Department of Computer Science and Engineering Coimbatore India Study World Collge of Engineering Department of Electronics and Communication Engineering Coimbatore India
The motto behind the keenness of urban areas has become unmistakable in current cities because of the rise of installed and associated shrewd gadgets, frameworks, and innovations. It is possible to connect every objec... 详细信息
来源: 评论
A Deep Convolution Network-Based Pneumonia Identification from Thoracic X-Ray Imagery Scans  6th
A Deep Convolution Network-Based Pneumonia Identification fr...
收藏 引用
6th World Conference on Smart Trends in systems, Security and Sustainability, WS4 2022
作者: Upreti, Kamal Mishra, Prateet Maheshwari, Manish Vats, Prashant Dhankar, Aisha Batra, Reenu Yadav, Saneh Lata Chawla, Tanvi Bhardwaj, Jayant Department of Computer Science and Engineering Dr. Akhilesh Das Gupta Institute of Technology and Management Delhi New Delhi India Department of Computer Science and Information Technology Symbiosis University of Applied Sciences MP Indore India Department of Computer Science and Applications Makhanlal Chaturvedi National University of Journalism and Communication MCNUJC Madhya Pradesh Bhopal India Department of Computer Science and Engineering Faculty of Engineering and Technology SGT University Haryana Gurugram India Department of Electronics and Communication Bhagwan Parshuram Institute of Technology GGSIPU New Delhi India
Pneumonia is an infectious ailment which affects the respiratory system and is caused by microbes that infect the human by affecting their lung air sacs and fill them with fluid. Using chest X-ray is the most popular ... 详细信息
来源: 评论
Fingerprint Liveness Detection with Voting Ensemble Classifier  6
Fingerprint Liveness Detection with Voting Ensemble Classifi...
收藏 引用
6th International Conference on Information Technology, InCIT 2022
作者: Sittirit, Napahatai Mongkolwat, Pattanasak Thaipisutikul, Tipajin Supratak, Akara Chen, Zhi-Sheng Wang, Jia-Ching Mahidol University Faculty of Information and Communication Technology Thailand Providence University Department of Computer Science and Information Engineering Taiwan National Central University Department of Computer Science and Information Engineering Taiwan
Detecting a user's fingerprint is a common verification process in many daily products such as smartphones and laptops. The convenience makes it popular, but this method is vulnerable to a presentation attack. Any... 详细信息
来源: 评论
Optimization Techniques in University Timetabling Problem:Constraints,Methodologies,Benchmarks,and Open Issues
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6461-6484页
作者: Abeer Bashab Ashraf Osman Ibrahim Ibrahim Abakar Tarigo Hashem Karan Aggarwal Fadhil Mukhlif Fuad A.Ghaleb Abdelzahir Abdelmaboud Faculty of Computer Science&Information Technology Alzaiem Alazhari University13311KhartoumSudan Faculty Computing and Informatics Universiti Malaysia SabahKota Kinabalu88400SabahMalaysia Department of Computer Science University of SharjahSharjah27272United Arab Emirates Electronic and Communication Engineering Department Maharishi Markandeshwar Deemed to be UniversityMullanaAmbala133207HaryanaIndia Information Assurance and Security Research Group(IASRG) School of ComputingFaculty of EngineeringUniversiti Teknologi Malaysia81310JohorMalaysia Department of Information Systems King Khaled UniversityMuhayel61913AseerSaudi Arabia
University timetabling problems are a yearly challenging task and are faced repeatedly each *** problems are considered nonpolynomial time(NP)and combinatorial optimization problems(COP),which means that they can be s... 详细信息
来源: 评论
K-Banhatti Sombor Invariants of Certain computer Networks
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 15-31页
作者: Khalid Hamid Muhammad Waseem Iqbal Abaid Ur Rehman Virk Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Mathematics University of SialkotSialkot51013Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Any number that can be uniquely determined by a graph is called a graph *** the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation ***,no reliable examinati... 详细信息
来源: 评论