咨询与建议

限定检索结果

文献类型

  • 20,181 篇 会议
  • 13,148 篇 期刊文献
  • 289 册 图书

馆藏范围

  • 33,618 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20,812 篇 工学
    • 15,508 篇 计算机科学与技术...
    • 12,391 篇 软件工程
    • 5,442 篇 信息与通信工程
    • 3,595 篇 控制科学与工程
    • 2,617 篇 生物工程
    • 2,357 篇 电气工程
    • 2,091 篇 生物医学工程(可授...
    • 1,989 篇 电子科学与技术(可...
    • 1,544 篇 光学工程
    • 1,423 篇 机械工程
    • 1,341 篇 网络空间安全
    • 1,043 篇 安全科学与工程
    • 1,039 篇 仪器科学与技术
    • 1,014 篇 动力工程及工程热...
    • 880 篇 交通运输工程
    • 866 篇 化学工程与技术
  • 11,332 篇 理学
    • 5,682 篇 数学
    • 3,424 篇 物理学
    • 2,992 篇 生物学
    • 1,765 篇 统计学(可授理学、...
    • 1,215 篇 系统科学
    • 1,030 篇 化学
  • 6,461 篇 管理学
    • 4,045 篇 管理科学与工程(可...
    • 2,654 篇 图书情报与档案管...
    • 1,748 篇 工商管理
  • 2,548 篇 医学
    • 2,100 篇 临床医学
    • 1,800 篇 基础医学(可授医学...
    • 1,231 篇 公共卫生与预防医...
    • 1,023 篇 药学(可授医学、理...
  • 1,126 篇 法学
    • 896 篇 社会学
  • 661 篇 经济学
  • 578 篇 农学
  • 420 篇 教育学
  • 178 篇 文学
  • 106 篇 军事学
  • 79 篇 艺术学
  • 10 篇 哲学
  • 5 篇 历史学

主题

  • 1,301 篇 deep learning
  • 1,092 篇 accuracy
  • 960 篇 machine learning
  • 819 篇 feature extracti...
  • 726 篇 internet of thin...
  • 632 篇 computer science
  • 586 篇 computational mo...
  • 578 篇 training
  • 556 篇 support vector m...
  • 523 篇 educational inst...
  • 473 篇 convolutional ne...
  • 445 篇 real-time system...
  • 437 篇 predictive model...
  • 429 篇 artificial intel...
  • 372 篇 cloud computing
  • 354 篇 optimization
  • 347 篇 data mining
  • 329 篇 security
  • 282 篇 data models
  • 278 篇 reliability

机构

  • 283 篇 faculty of scien...
  • 276 篇 department of ph...
  • 272 篇 departamento de ...
  • 268 篇 department of ph...
  • 264 篇 department of ph...
  • 262 篇 department for p...
  • 259 篇 faculté des scie...
  • 258 篇 department of ph...
  • 223 篇 department of ph...
  • 223 篇 department of ph...
  • 218 篇 physics division...
  • 199 篇 department of ph...
  • 179 篇 yerevan physics ...
  • 168 篇 department of ph...
  • 163 篇 centre de calcul...
  • 161 篇 kirchhoff-instit...
  • 155 篇 nikhef national ...
  • 154 篇 maharishi school...
  • 152 篇 institute of phy...
  • 152 篇 institute of phy...

作者

  • 269 篇 c. alexa
  • 269 篇 j. m. izen
  • 269 篇 g. bella
  • 269 篇 j. strandberg
  • 269 篇 d. calvet
  • 269 篇 c. amelung
  • 269 篇 g. spigo
  • 268 篇 f. siegert
  • 266 篇 a. c. könig
  • 265 篇 m. klein
  • 263 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 257 篇 s. jin
  • 256 篇 h. sakamoto
  • 255 篇 g. gaudio
  • 248 篇 s. mohapatra
  • 246 篇 y. tayalati
  • 245 篇 d. guest
  • 236 篇 y. nagasaka

语言

  • 28,267 篇 英文
  • 5,073 篇 其他
  • 326 篇 中文
  • 23 篇 斯洛文尼亚文
  • 14 篇 德文
  • 10 篇 日文
  • 9 篇 法文
  • 1 篇 阿拉伯文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science College of Computing and Information Technology"
33618 条 记 录,以下是91-100 订阅
排序:
Solving the subset sum problem by the quantum Ising model with variational quantum optimization based on conditional values at risk
收藏 引用
science China(Physics,Mechanics & Astronomy) 2024年 第8期67卷 43-55页
作者: Qilin Zheng Miaomiao Yu Pingyu Zhu Yan Wang Weihong Luo Ping Xu Institute for Quantum Information and State Key Laboratory of High Performance Computing College of Computer Science and TechnologyNational University of Defense TechnologyChangsha 410073China Hefei National Laboratory Hefei 230088China
The subset sum problem is a combinatorial optimization problem,and its complexity belongs to the nondeterministic polynomial time complete(NP-Complete)*** problem is widely used in encryption,planning or scheduling,an... 详细信息
来源: 评论
TRS Scheduling for Improved QoS Performance in Cloud System
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1547-1559页
作者: G.John Samuel Babu M.Baskar Department of Computer Science and Engineering School of ComputingCollege of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathurChengalpattuTamilnadu603203India Department of Computing Technologies School of ComputingCollege of Engineering andTechnologySRM Institute of Science and TechnologyKattankulathurChengalpattuTamilnadu603203India
Numerous methods are analysed in detail to improve task schedulingand data security performance in the cloud environment. The methodsinvolve scheduling according to the factors like makespan, waiting time,cost, deadli... 详细信息
来源: 评论
Enhancing intrusion detection in IIoT: optimized CNN model with multi-class SMOTE balancing
收藏 引用
Neural computing and Applications 2024年 第24期36卷 14643-14659页
作者: Eid, Abdulrahman Mahmoud Soudan, Bassel Nassif, Ali Bou Injadat, MohammadNoor Department of Computer Engineering College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates Department of Data Science and AI Faculty of Information Technology Zarqa University Zarqa Jordan
This work introduces an intrusion detection system (IDS) tailored for industrial internet of things (IIoT) environments based on an optimized convolutional neural network (CNN) model. The model is trained on a dataset... 详细信息
来源: 评论
Analysis and Classification of Fake News Using Sequential Pattern Mining
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 942-963页
作者: M.Zohaib Nawaz M.Saqib Nawaz Philippe Fournier-Viger Yulin He College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518060 Guangdong Laboratory of Artificial Intelligence and Digital Economy(SZ) Shenzhen 518107China Department of Computer Science Faculty of Computing and Information TechnologyUnivesity of SargodhaSargodha 40100Pakistan
Disinformation,often known as fake news,is a major issue that has received a lot of attention *** researchers have proposed effective means of detecting and addressing *** machine and deep learning based methodologies... 详细信息
来源: 评论
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3065-3089页
作者: Ali Arshad Muhammad Nadeem Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi Department of Computer Science National University of TechnologyIslamabadPakistan Department of Computing Abasyn UniversityIslamabadPakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic university of MadinahMedinah42351Saudi Arabia Department of Information Systems Faculty of Computer and Information Sciences CollegeMajmaah University11952Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah 11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an *** cryptography is th... 详细信息
来源: 评论
Efficient Authentication Scheme for UAV-Assisted Mobile Edge computing
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 2727-2740页
作者: Maryam Alhassan Abdul Raouf Khan Department of Computer Science College of Computer Science and Information TechnologyKing Faisal UniversityAlahssa31982Kingdom of Saudi Arabia
Preserving privacy is imperative in the new unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)architecture to ensure that sensitive information is protected and kept secure throughout the ***,efficiency ... 详细信息
来源: 评论
Split-n-Swap: A New Modification of the Twofish Block Cipher Algorithm
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1723-1734页
作者: Awny Sayed Maha Mahrous Enas Elgeldawi Computer Science Department Faculty of ScienceMinia UniversityMinia61519Egypt Faculty of Computing and Information Technology Information Technology DepartmentKing Abdulaziz UniversityJeddah21589Saudi Arabia Computer Science Department Faculty of Computers and InformationMinia UniversityMinia61519Egypt
Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern.A robust data security system should protect the information assets of any organization against cybercr... 详细信息
来源: 评论
Optimizing Connections:Applied Shortest Path Algorithms for MANETs
收藏 引用
computer Modeling in Engineering & sciences 2024年 第10期141卷 787-807页
作者: Ibrahim Alameri Jitka Komarkova Tawfik Al-Hadhrami Abdulsamad Ebrahim Yahya Atef Gharbi Faculty of Medical Sciences Jabir Ibn Hayyan Medical UniversityAlkufaNajaf54001Iraq Faculty of Economics and Administration University of PardubiceStudentskaPardubice53210Czech Republic Computer Science Department School of Science and TechnologyNottingham Trent UniversityNottinghamNG118NSUK Department of Information Technology College of Computing and Information TechnologyNorthern Border UniversityArar91431Saudi Arabia Department of Information System College of Computing and Information TechnologyNorthern Border UniversityArar91431Saudi Arabia
This study is trying to address the critical need for efficient routing in Mobile Ad Hoc Networks(MANETs)from dynamic topologies that pose great challenges because of the mobility of *** objective was to delve into an... 详细信息
来源: 评论
A Systematic Literature Review of Machine Learning and Deep Learning Approaches for Spectral Image Classification in Agricultural Applications Using Aerial Photography
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 2967-3000页
作者: Usman Khan Muhammad Khalid Khan Muhammad Ayub Latif Muhammad Naveed Muhammad Mansoor Alam Salman A.Khan Mazliham Mohd Su’ud College of Computing and Information Sciences Karachi Institute of Economics and TechnologyKarachi75190Pakistan Faculty of Computing and Informatics(FCI) Multimedia UniversityCyberjaya63100Malaysia Faculty of Computing Riphah International UniversityIslamabad46000Pakistan Faculty of Engineering and Information Technology School of Computer ScienceUniversity of Technology SydneySydneyAustralia
Recently,there has been a notable surge of interest in scientific research regarding spectral *** potential of these images to revolutionize the digital photography industry,like aerial photography through Unmanned Ae... 详细信息
来源: 评论
Multi-Task Learning Model with Data Augmentation for Arabic Aspect-Based Sentiment Analysis
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4419-4444页
作者: Arwa Saif Fadel Osama Ahmed Abulnaja Mostafa Elsayed Saleh Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Faculty of Computer Sciences and EngineeringHodeidah UniversityYemen
Aspect-based sentiment analysis(ABSA)is a fine-grained *** fundamental subtasks are aspect termextraction(ATE)and aspect polarity classification(APC),and these subtasks are dependent and closely ***,most existing work... 详细信息
来源: 评论