咨询与建议

限定检索结果

文献类型

  • 15,677 篇 会议
  • 9,971 篇 期刊文献
  • 447 册 图书

馆藏范围

  • 26,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,259 篇 工学
    • 9,638 篇 计算机科学与技术...
    • 7,742 篇 软件工程
    • 3,231 篇 信息与通信工程
    • 3,053 篇 控制科学与工程
    • 2,081 篇 电气工程
    • 1,820 篇 电子科学与技术(可...
    • 1,658 篇 生物工程
    • 1,310 篇 机械工程
    • 1,303 篇 生物医学工程(可授...
    • 995 篇 光学工程
    • 810 篇 动力工程及工程热...
    • 798 篇 仪器科学与技术
    • 705 篇 化学工程与技术
    • 610 篇 材料科学与工程(可...
    • 557 篇 安全科学与工程
    • 542 篇 交通运输工程
  • 8,748 篇 理学
    • 4,511 篇 数学
    • 2,311 篇 物理学
    • 1,977 篇 生物学
    • 1,541 篇 统计学(可授理学、...
    • 1,463 篇 系统科学
    • 814 篇 化学
  • 3,828 篇 管理学
    • 2,532 篇 管理科学与工程(可...
    • 1,423 篇 图书情报与档案管...
    • 1,296 篇 工商管理
  • 1,384 篇 医学
    • 1,158 篇 临床医学
    • 979 篇 基础医学(可授医学...
    • 565 篇 药学(可授医学、理...
    • 518 篇 公共卫生与预防医...
  • 709 篇 法学
    • 584 篇 社会学
  • 459 篇 经济学
  • 316 篇 教育学
  • 276 篇 农学
  • 70 篇 文学
  • 54 篇 军事学
  • 40 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,114 篇 computer science
  • 482 篇 deep learning
  • 356 篇 systems engineer...
  • 341 篇 computational mo...
  • 331 篇 machine learning
  • 318 篇 application soft...
  • 318 篇 artificial intel...
  • 290 篇 computer archite...
  • 264 篇 control systems
  • 260 篇 internet of thin...
  • 235 篇 support vector m...
  • 232 篇 feature extracti...
  • 224 篇 accuracy
  • 217 篇 optimization
  • 209 篇 neural networks
  • 208 篇 software enginee...
  • 198 篇 information syst...
  • 194 篇 training
  • 193 篇 laboratories
  • 184 篇 routing

机构

  • 55 篇 shanghai key lab...
  • 46 篇 department of la...
  • 46 篇 department of el...
  • 44 篇 department of co...
  • 44 篇 department of sy...
  • 42 篇 department of el...
  • 42 篇 department of sy...
  • 42 篇 department of el...
  • 39 篇 department of co...
  • 39 篇 department of in...
  • 37 篇 department of co...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 33 篇 department of co...
  • 33 篇 school of comput...
  • 32 篇 department of co...
  • 31 篇 academy of mathe...
  • 30 篇 department of co...
  • 27 篇 department of co...
  • 27 篇 department of co...

作者

  • 93 篇 niyato dusit
  • 55 篇 rajkumar buyya
  • 52 篇 hisao ishibuchi
  • 43 篇 m. zahn
  • 41 篇 e. rogers
  • 40 篇 bernhard schölko...
  • 34 篇 abdelwahed motwa...
  • 33 篇 sofotasios pasch...
  • 28 篇 hong choong seon
  • 26 篇 jiang liu
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 shen xuemin
  • 24 篇 liu jiaming
  • 23 篇 tao yang
  • 23 篇 j.h. lang
  • 22 篇 soni mukesh
  • 20 篇 liu xin
  • 20 篇 lin iuon-chang
  • 19 篇 ferrara antonell...
  • 19 篇 lindemann lars

语言

  • 24,565 篇 英文
  • 1,274 篇 其他
  • 224 篇 中文
  • 32 篇 日文
  • 7 篇 德文
  • 3 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Department of Computer Engineering and Systems Science"
26095 条 记 录,以下是661-670 订阅
排序:
Secure and fast mobility handover scheme for IoMT in 5 G and future 6 G networks
收藏 引用
Alexandria engineering Journal 2025年 128卷 127-143页
作者: Islam, Shayla Topazal, S.M. Hasan, Mohammad Kamrul Kolandaisamy, Raenu AL Abbas, Huda Saleh Vo, Nguyen Thakkar, Rahul Khan, Muhammad Attique Gupta, Deepak AlHammadi, Dina Abdulaziz Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia Center for Cyber Security Faculty of Information Science and Technology the National University of Malaysia Selangor Bangi43600 Malaysia Department of computer science College of Computer Science and Engineering Taibah University Madina Saudi Arabia Victorian Institute of Technology Melbourne Australia Center of AI College of Computer Engineering and Science Prince Mohammad Bin Fahd University Al-Khobar Saudi Arabia Maharaja Agrasen Institute of Technology Delhi India Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O.Box 84428 Riyadh11671 Saudi Arabia
The emergence of 5 G and 6 G networks promises significant advancements in the Internet of Medical Things (IoMT) by enabling real-time medical data transmission and continuous connectivity for mobile healthcare device... 详细信息
来源: 评论
Deep-Net:Fine-Tuned Deep Neural Network Multi-Features Fusion for Brain Tumor Recognition
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3029-3047页
作者: Muhammad Attique Khan Reham R.Mostafa Yu-Dong Zhang Jamel Baili Majed Alhaisoni Usman Tariq Junaid Ali Khan Ye Jin Kim Jaehyuk Cha Department of Computer Science HITEC UniversityTaxila47080Pakistan Department of Informatics University of LeicesterLeicesterUK Information Systems Department Faculty of Computers and Information SciencesMansoura UniversityMansouraEgypt Department of Computer Engineering College of Computer ScienceKing Khalid UniversityAbha61413Saudi Arabia Computer Sciences Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Management Information System Department College of Business AdministrationPrince Sattam Bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia Department of Computer Science Hanyang UniversitySeoul04763Korea
Manual diagnosis of brain tumors usingmagnetic resonance images(MRI)is a hectic process and ***,it always requires an expert person for the ***,many computer-controlled methods for diagnosing and classifying brain tum... 详细信息
来源: 评论
Machine Learning Approaches in Cybersecurity to Enhance Security in Future Network Technologies
收藏 引用
SN computer science 2025年 第4期6卷 1-18页
作者: Ahmad, Sultan Haque, Md. Alimul Abdeljaber, Hikmat A. M. Eljialy, A.E.M. Nazeer, Jabeen Mishra, B.K. Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Alkharj 11942 Saudi Arabia University Center for Research and Development (UCRD) Department of Computer Science and Engineering Chandigarh University Mohali Punjab Gharuan 140413 India Department of Computer Science Veer Kunwar Singh University Bihar Ara India Department of Computer Science Faculty of Information Technology Applied Science Private University Amman Jordan MEU Research Unit Middle East University Amman 11831 Jordan Department of Information Systems College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Alkharj 11942 Saudi Arabia Department of Physics Veer Kunwar Singh University Ara 802301 India
As technology continues to evolve rapidly, cybersecurity has become a critical global concern. The increasing sophistication of cyber threats poses significant risks to individuals, businesses, and governments. To com... 详细信息
来源: 评论
Blockchain and Quantum-based Collaborative Communication Framework for Telehealth
Blockchain and Quantum-based Collaborative Communication Fra...
收藏 引用
2024 IEEE International Conference on E-Health Networking, Application and Services, HealthCom 2024
作者: Gajjar, Harshal Jivani, Dirgha Trivedi, Chinmay Gupta, Rajesh Jadav, Nilesh Kumar Tanwar, Sudeep Dutta, Ashit Kumar Rodrigues, Joel J.P.C. Department of Computer Science and Engineering Institute of Technology Nirma University Gujarat India Department of Computer Science and Information Systems College of Applied Sciences AlMaarefa University Saudi Arabia Amazonas State University AM Manaus Brazil
This paper introduces a novel telehealth communication system, designed to enhance the security and integrity of medical data exchange. In the rapidly evolving digital healthcare landscape, the protection of sensitive... 详细信息
来源: 评论
Algorithms for the Collaborative Delivery Problem with Monitored Constraints  19th
Algorithms for the Collaborative Delivery Problem with Mo...
收藏 引用
19th International Conference and Workshops on Algorithms and Computation, WALCOM 2025
作者: Blank, Lotte Huynh, Kien C. Luo, Kelin Naredla, Anurag Murty Institute of Computer Science University of Bonn Bonn Germany Communications and Transport Systems ITN Linköping University Linköping Sweden Department of Computer Science and Engineering University at Buffalo GetzvilleNY United States
We provide efficient algorithms to solve package delivery problems in which a sequence of drones work together to ‘optimally’ deliver a package from a source s to a target t. The package may be transferred from... 详细信息
来源: 评论
Optimal Deep Learning Based Intruder Identification in Industrial Internet of Things Environment
收藏 引用
computer systems science & engineering 2023年 第9期46卷 3121-3139页
作者: Khaled M.Alalayah Fatma S.Alrayes Jaber S.Alzahrani Khadija M.Alaidarous Ibrahim M.Alwayle Heba Mohsen Ibrahim Abdulrab Ahmed Mesfer Al Duhayyim Department of Computer Science College of Science and ArtsSharurahNajran UniversitySaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Industrial Engineering College of Engineering at AlqunfudahUmm Al-Qura UniversitySaudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Computer Department Applied CollegeNajran UniversityNajran66462Saudi Arabia Department of Computer Science College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj16273Saudi Arabia
With the increased advancements of smart industries,cybersecurity has become a vital growth factor in the success of industrial *** Industrial Internet of Things(IIoT)or Industry 4.0 has revolutionized the concepts of... 详细信息
来源: 评论
An Improved Reversible Data Hiding Scheme Based on Referred Frequencies for a VQ Compressed Index  2
An Improved Reversible Data Hiding Scheme Based on Referred ...
收藏 引用
2nd International Conference on Machine Vision, Image Processing and Imaging Technology, MVIPIT 2024
作者: Hwang, Min-Shiang Fatima, Kanza Wang, Yu-Lun Chan, Chi-Shiang Wu, Chia-Chun Department of Computer Science & Information Engineering Fintech and Blockchain Research Center Asia University Taichung Taiwan Department of Computer Science & Information Engineering Asia University Taichung Taiwan Department of Management Information Systems National Chung Hsing University Taichung Taiwan Department of M-Commerce and Multimedia Applications Asia University Taichung Taiwan Department of Computer Science and Information Engineering National Quemoy University Kinmen Taiwan
Nowadays, we usually compress images before uploading them to social media. However, images on social media can easily be copied, so embedding secret messages in compressed images has become increasingly popular. Ther... 详细信息
来源: 评论
Fractal Measurement of Images Human Brain from MRI
Fractal Measurement of Images Human Brain from MRI
收藏 引用
2024 Cognitive Models and Artificial Intelligence Conference, AICCONF 2024
作者: Anarova, Shahzoda Jabbarov, Jamoliddin Uralova, Iroda Tashkent University of Information Technologies Department of Convergence of digital technologies Computer Engineering Faculty Tashkent Uzbekistan Department of Computer science and technology Intelligent systems and computer technologies Faculty Samarkand State University Samarkand Uzbekistan
This article is devoted to the determination of the fractal size of the damaged part of the human brain on the basis of images obtained from MRI (magnetic resonance imaging). There are various mathematical methods for... 详细信息
来源: 评论
Performance Enhancement of IoT LoRa Network for Mobile Devices based on Improved AMILCC Technique  1
Performance Enhancement of IoT LoRa Network for Mobile Devic...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Venkatesan, C. Thamaraimanalan, T. Mohammed Ibrahim, M. Vinoly, G. Ramkumar, M. Saranya, K. HKBK College of Engineering Department of Electronics and Communication Engineering Karnataka Bengaluru India Sri Eshwar College of Engineering Department of Electronics and Communication Engineering Tamilnadu Coimbatore India Sona College of Technology Department of Computer Science and Engineering Tamilnadu Salem India Tamilnadu Thiruchengode India Knowledge Institute of Technology Department of Computer Science and Business Systems Tamilnadu Salem India
In Internet of Things (IoT) networks, long-range (LoRa) technology is well-known for its wide communication range, but using it with mobile devices presents unique difficulties. Frequently occurring channel attenuatio... 详细信息
来源: 评论
Covid-19 CT Lung Image Segmentation Using Adaptive Donkey and Smuggler Optimization Algorithm
收藏 引用
computers, Materials & Continua 2022年 第4期71卷 1133-1152页
作者: P.Prabu K.Venkatachalam Ala Saleh Alluhaidan Radwa Marzouk Myriam Hadjouni Sahar A.El_Rahman Department of Computer Science CHRIST(Deemed to be University)BengaluruIndia Department of Computer Science and Engineering CHRIST(Deemed to be University)BengaluruIndia Information Systems Department College of Computer and Information SciencePrincess Nourah Bint Abdulrahman UniversityRiyadhKSA 84428Saudi Arabia Department of Mathematics Faculty of ScienceCairo UniversityGiza12613Egypt Computer Sciences Department College of Computer and Information SciencePrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia Department of Electrical Engineering Faculty of Engineering-ShoubraBenha UniversityCairoEgypt
COVID’19 has caused the entire universe to be in existential healthcrisis by spreading globally in the year 2020. The lungs infection is detected inComputed Tomography (CT) images which provide the best way to increa... 详细信息
来源: 评论