咨询与建议

限定检索结果

文献类型

  • 42,507 篇 会议
  • 21,002 篇 期刊文献
  • 695 册 图书

馆藏范围

  • 64,204 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 39,083 篇 工学
    • 27,810 篇 计算机科学与技术...
    • 22,249 篇 软件工程
    • 11,164 篇 信息与通信工程
    • 6,711 篇 控制科学与工程
    • 5,049 篇 电气工程
    • 4,814 篇 电子科学与技术(可...
    • 4,578 篇 生物工程
    • 3,511 篇 生物医学工程(可授...
    • 2,824 篇 光学工程
    • 2,787 篇 机械工程
    • 2,205 篇 仪器科学与技术
    • 2,106 篇 动力工程及工程热...
    • 1,947 篇 网络空间安全
    • 1,831 篇 安全科学与工程
    • 1,750 篇 化学工程与技术
    • 1,543 篇 交通运输工程
  • 20,733 篇 理学
    • 10,844 篇 数学
    • 6,000 篇 物理学
    • 5,152 篇 生物学
    • 3,526 篇 统计学(可授理学、...
    • 2,511 篇 系统科学
    • 1,945 篇 化学
  • 11,045 篇 管理学
    • 7,016 篇 管理科学与工程(可...
    • 4,473 篇 图书情报与档案管...
    • 3,179 篇 工商管理
  • 3,749 篇 医学
    • 3,120 篇 临床医学
    • 2,748 篇 基础医学(可授医学...
    • 1,690 篇 公共卫生与预防医...
    • 1,649 篇 药学(可授医学、理...
  • 1,905 篇 法学
    • 1,513 篇 社会学
  • 1,178 篇 经济学
  • 934 篇 农学
  • 764 篇 教育学
  • 352 篇 文学
  • 175 篇 军事学
  • 116 篇 艺术学
  • 4 篇 哲学
  • 2 篇 历史学

主题

  • 1,662 篇 accuracy
  • 1,605 篇 computer science
  • 1,600 篇 deep learning
  • 1,481 篇 feature extracti...
  • 1,437 篇 machine learning
  • 1,240 篇 computational mo...
  • 1,062 篇 training
  • 974 篇 internet of thin...
  • 869 篇 information tech...
  • 865 篇 data mining
  • 846 篇 artificial intel...
  • 837 篇 support vector m...
  • 776 篇 optimization
  • 761 篇 wireless sensor ...
  • 752 篇 predictive model...
  • 697 篇 real-time system...
  • 650 篇 convolutional ne...
  • 648 篇 security
  • 593 篇 protocols
  • 590 篇 cloud computing

机构

  • 476 篇 maharishi school...
  • 354 篇 department of co...
  • 279 篇 faculty of scien...
  • 275 篇 department of ph...
  • 264 篇 department of ph...
  • 263 篇 departamento de ...
  • 261 篇 department of co...
  • 259 篇 faculté des scie...
  • 240 篇 department of ph...
  • 222 篇 department for p...
  • 221 篇 department of ph...
  • 219 篇 department of ph...
  • 217 篇 department of ph...
  • 216 篇 physics division...
  • 197 篇 department of ph...
  • 164 篇 maharishi school...
  • 162 篇 department of co...
  • 161 篇 department of co...
  • 159 篇 department of co...
  • 154 篇 institute of phy...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 260 篇 m. rijssenbeek
  • 252 篇 s. jin
  • 251 篇 g. gaudio
  • 244 篇 d. guest
  • 243 篇 y. tayalati
  • 217 篇 s. mohapatra
  • 207 篇 f. marroquim

语言

  • 59,730 篇 英文
  • 3,656 篇 其他
  • 814 篇 中文
  • 51 篇 日文
  • 13 篇 斯洛文尼亚文
  • 8 篇 德文
  • 8 篇 法文
  • 4 篇 朝鲜文
  • 2 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 荷兰文
检索条件"机构=Department of Computer Engineering and Information Technology"
64204 条 记 录,以下是451-460 订阅
排序:
Deep Transfer Learning Models for Mobile-Based Ocular Disorder Identification on Retinal Images
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 139-161页
作者: Roseline Oluwaseun Ogundokun Joseph Bamidele Awotunde Hakeem Babalola Akande Cheng-Chi Lee Agbotiname Lucky Imoize Department of Multimedia Engineering Kaunas University of TechnologyKaunas44249Lithuania Department of Computer Science Landmark UniversityOmu Aran251103Nigeria Department of Computer Science Faculty of Information and Communication SciencesUniversity of IlorinIlorin240003Nigeria Department of Telecommunication Science University of IlorinIlorin230003Nigeria Department of Library and Information Science Fu Jen Catholic UniversityNew Taipei City24205TaiwanChina Department of Computer Science and Information Engineering Fintech and Blockchain Research CenterAsia UniversityTaichung City41354TaiwanChina Department of Electrical and Electronics Engineering Faculty of EngineeringUniversity of LagosAkokaLagos100213Nigeria Department of Electrical Engineering and Information Technology Institute of Digital CommunicationRuhr UniversityBochum44801Germany
Mobile technology is developing *** phone technologies have been integrated into the healthcare industry to help medical ***,computer vision models focus on image detection and classification ***2 is a computer vision... 详细信息
来源: 评论
A comprehensive tool for rapid and accurate prediction of disease using DNA sequence classifier
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第10期14卷 13869-13885页
作者: Mathur, Garima Pandey, Anjana Goyal, Sachin Department of Computer Science and Engineering UIT RGPV Bhopal India Department of Information Technology UIT RGPV Bhopal India
In the current pandemic situation where the coronavirus is spreading very fast that can jump from one human to another. Along with this, there are millions of viruses for example Ebola, SARS, etc. that can spread as f... 详细信息
来源: 评论
Genetic Algorithm Based Deterministic Workflow Scheduling with Load Balancing  2
Genetic Algorithm Based Deterministic Workflow Scheduling wi...
收藏 引用
2nd International Conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Mittal, Punit Kumar, Satender Sharma, Swati Department of Computer Science and Engineering Quantum University Roorkee India Department of Information Technology Meerut Institute of Engineering and Technology Meerut India
A crucial problem in cloud computing is load balancing, which makes it challenging to guarantee that services operate as intended in accordance with quality of service (QoS), performance reviews, and service contracts... 详细信息
来源: 评论
FeAdaBoost: EnhancingFederated Learning Accuracy by Ensemble Techniques  29
FeAdaBoost: EnhancingFederated Learning Accuracy by Ensemble...
收藏 引用
29th International computer Conference, computer Society of Iran, CSICC 2025
作者: Fotoohabadi, Vida Afzali, Afsaneh Shamsinejadbabaki, Pirooz Department of Computer Engineering and Information Technology Shiraz University of Technology Shiraz Iran
Federated Learning (FL), an advanced technique in machine learning (ML), allows for model training without transferring data to a central server. This method is particularly valuable in sensitive applications, such as... 详细信息
来源: 评论
Speech cryptography algorithms: utilizing frequency and time domain techniques merging
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第10期15卷 3617-3649页
作者: Faragallah, Osama S. Farouk, M. El-sayed, Hala S. El-bendary, Mohsen A. M. Department of Information Technology College of Computers and Information Technology Taif University Al- Hawiya21974 Saudi Arabia Department of Computer Science and Engineering Menoufia University Menouf32952 Egypt Department of Electrical Engineering Menoufia University Shebin El-kom32511 Egypt Department of Electronics Technology Faculty of Technology and Education Helwan University Cairo Egypt
Due to the importance security of sensitive speech and audio signals such as the countries president’s call phone, this research work presents an efficient audio cryptosystem. Audio speech communications play main an... 详细信息
来源: 评论
E3C: a tool for evaluating communication and computation costs in authentication and key exchange protocol
收藏 引用
Iran Journal of computer Science 2024年 第2期7卷 325-335页
作者: Salami, Yashar Khajehvand, Vahid Zeinali, Esmaeil Department of Computer and Information Technology Engineering Qazvin Branch Islamic Azad University Qazvin Iran
Today, with the advancement of blockchain and Internet of Things (IoT) technologies, there is a growing need for authentication protocols and key exchanges to facilitate communication between these diverse technologie... 详细信息
来源: 评论
Software design and FPGA implementation of optimized medical image fusion techniques
收藏 引用
Multimedia Tools and Applications 2025年 1-31页
作者: Elshazly, E.A. El-Shafai, Walid El-Hoseny, Heba El-Rabaie, El-Sayed M Zahran, O. Abdelwahab, Safey A. S. El-Halawany, M.M. Fikry, R.M. Elaraby, S.M. Faragallah, Osama S. Mohamed, Wael A. Mahmoud, Korany R. Abd El-Samie, Fathi E. Cairo Egypt Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Faculty of Computer Studies Arab Open University 11681 Riyadh Saudi Arabia Department of Information Technology College of Computers and Information Technology Taif University 11099 Taif21944 Saudi Arabia Department of Electrical Engineering Faculty of Engineering Benha University Benha Egypt Electronics and Communications Engineering Department Faculty of Engineering Helwan University Helwan Egypt Giza Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Nowadays, medical image fusion plays a crucial role in enhancing the diagnosis accuracy and the clinical decision-making process in various healthcare applications. This research work presents a comprehensive stu... 详细信息
来源: 评论
The Claim-based Priority-Discriminated Channel Access (CPDCA) Method using the Registered Backoff Time Mechanism for IEEE 802.11ah
收藏 引用
Mobile Networks and Applications 2023年 第3期28卷 1096-1115页
作者: Huang, Chung-Ming Cheng, Rung-Shiang Pan, Yan-Jia Department of Computer Science and Information Engineering National Cheng Kung University Tainan Taiwan Department of Information Technology Overseas Chinese University Taichung Taiwan
IEEE 802.11ah is a protocol that adopts the CSMA/CA-based channel access way for Internet of Thing (IOT). This work proposed a newly devised Restricted Access Window (RAW) called the Claiming RAW to let those spontane... 详细信息
来源: 评论
Semantic Tree Based PPDP Technique for Multiple Sensitive Attributes in Inter Cloud
收藏 引用
SN computer Science 2024年 第6期5卷 722页
作者: Gadad, Veena Sowmyarani, C.N. Dayananda, P. Department of Computer Science and Engineering R V College of Engineering Department of Information Technology Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education
Digital devices and information systems have made data privacy essential. The collected data contains sensitive attributes such as salary, marital status and health history that need to be protected. Such data is exch... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, Sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论