咨询与建议

限定检索结果

文献类型

  • 65,833 篇 会议
  • 31,802 篇 期刊文献
  • 1,095 册 图书

馆藏范围

  • 98,730 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 59,568 篇 工学
    • 43,084 篇 计算机科学与技术...
    • 34,458 篇 软件工程
    • 16,569 篇 信息与通信工程
    • 9,268 篇 控制科学与工程
    • 7,104 篇 电气工程
    • 7,069 篇 电子科学与技术(可...
    • 6,765 篇 生物工程
    • 5,131 篇 生物医学工程(可授...
    • 4,240 篇 光学工程
    • 4,027 篇 机械工程
    • 3,231 篇 仪器科学与技术
    • 2,958 篇 动力工程及工程热...
    • 2,741 篇 网络空间安全
    • 2,625 篇 化学工程与技术
    • 2,533 篇 安全科学与工程
    • 2,156 篇 交通运输工程
  • 31,835 篇 理学
    • 16,612 篇 数学
    • 9,476 篇 物理学
    • 7,647 篇 生物学
    • 5,308 篇 统计学(可授理学、...
    • 3,595 篇 系统科学
    • 2,868 篇 化学
  • 17,162 篇 管理学
    • 10,478 篇 管理科学与工程(可...
    • 7,392 篇 图书情报与档案管...
    • 4,836 篇 工商管理
  • 5,422 篇 医学
    • 4,510 篇 临床医学
    • 3,977 篇 基础医学(可授医学...
    • 2,447 篇 公共卫生与预防医...
    • 2,360 篇 药学(可授医学、理...
  • 3,001 篇 法学
    • 2,420 篇 社会学
  • 1,782 篇 经济学
  • 1,363 篇 农学
  • 1,281 篇 教育学
  • 557 篇 文学
  • 276 篇 军事学
  • 179 篇 艺术学
  • 34 篇 哲学
  • 21 篇 历史学

主题

  • 3,072 篇 computer science
  • 2,428 篇 accuracy
  • 2,281 篇 feature extracti...
  • 2,278 篇 deep learning
  • 2,033 篇 machine learning
  • 1,871 篇 computational mo...
  • 1,582 篇 training
  • 1,543 篇 internet of thin...
  • 1,387 篇 data mining
  • 1,316 篇 support vector m...
  • 1,247 篇 artificial intel...
  • 1,165 篇 information tech...
  • 1,150 篇 optimization
  • 1,123 篇 predictive model...
  • 1,085 篇 real-time system...
  • 1,077 篇 wireless sensor ...
  • 1,005 篇 convolutional ne...
  • 904 篇 educational inst...
  • 891 篇 security
  • 847 篇 computer archite...

机构

  • 1,009 篇 department of co...
  • 513 篇 maharishi school...
  • 352 篇 department of co...
  • 274 篇 department of ph...
  • 257 篇 faculté des scie...
  • 254 篇 department of ph...
  • 252 篇 department of co...
  • 226 篇 faculty of scien...
  • 220 篇 department of ph...
  • 216 篇 physics division...
  • 209 篇 school of comput...
  • 198 篇 department of ph...
  • 198 篇 department of co...
  • 197 篇 department of ph...
  • 181 篇 departamento de ...
  • 175 篇 school of inform...
  • 167 篇 maharishi school...
  • 158 篇 department of ph...
  • 158 篇 department of ph...
  • 157 篇 school of comput...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 264 篇 g. spigo
  • 263 篇 f. siegert
  • 262 篇 a. c. könig
  • 259 篇 h. a. gordon
  • 259 篇 m. klein
  • 254 篇 r. ströhmer
  • 246 篇 h. sakamoto
  • 242 篇 y. tayalati
  • 232 篇 m. rijssenbeek
  • 203 篇 d. guest
  • 201 篇 n. orlando
  • 200 篇 f. pastore
  • 199 篇 s. jin
  • 185 篇 niyato dusit

语言

  • 94,171 篇 英文
  • 3,324 篇 其他
  • 1,185 篇 中文
  • 120 篇 日文
  • 16 篇 斯洛文尼亚文
  • 12 篇 德文
  • 11 篇 法文
  • 8 篇 朝鲜文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Information and Communication Technology"
98730 条 记 录,以下是131-140 订阅
排序:
Preventing 51% Attack by Using Consecutive Block Limits in Bitcoin
收藏 引用
IEEE Access 2024年 12卷 77852-77869页
作者: Mahmood Babur, Sohail Ur Rehman Khan, Shafiq Yang, Jing Chen, Yen-Lin Soon Ku, Chin Yee Por, Lip Government Murray College Department of Information Technology Sialkot51010 Pakistan Capital University of Science and Technology Department of Computer Science Islamabad44730 Pakistan Universiti Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
In permissionless blockchain systems, Proof of Work (PoW) is utilized to address the issues of double-spending and transaction starvation. When an attacker acquires more than 50% of the hash power of the entire networ... 详细信息
来源: 评论
The use of bigdata in the management of library resources: Nigeria university expriences
收藏 引用
Business information Review 2024年 第3期41卷 134-140页
作者: Akanbi, M.L. Sulaiman, Kabir Alabi Omolola, Maliq Hammed Nallah, Bilqees Jumia Department Library and Information Science Faculty of Communication and Information Science University of Ilorin Department Library and Information Science Faculty of Information and Communication Technology Kwara State University Library Kwara State University Malete
Services of libraries have to be accessible to all members of the community;this requires well situated library infrastructure, facilities and information resources as well as relevant technologies. Therefore, this st... 详细信息
来源: 评论
An enhanced AMBTC for color image compression using color palette
收藏 引用
Multimedia Tools and Applications 2024年 第11期83卷 31783-31803页
作者: Xiong, Lizhi Zhang, Mengtao Yang, Ching-Nung Kim, Cheonshik School of Computer Science Nanjing University of Information Science and Technology Nanjing China Department of Computer Science and Information Engineering National Dong Hwa University Hualien Taiwan Department of Computer Engineering Sejong University Seoul Korea Republic of
Digital image has been used in various fields as an essential carrier. Many color images have been constantly produced since their more realistic description, which takes up much storage space and network bandwidth. T... 详细信息
来源: 评论
Enhancing aviation safety: Machine learning for real-time ADS-B injection detection through advanced data analysis
收藏 引用
Alexandria Engineering Journal 2025年 126卷 262-276页
作者: Rahman, Md. Atiqur Bhuiyan, Touhid Ali, M. Ameer Department of Computer Science and Engineering East West university Dhaka Bangladesh School of Information Technology Washington University of Science and Technology Alexandria United States Department of Computer Science and Engineering Bangladesh University of Business and Technology Dhaka Bangladesh
Airplanes play a critical role in global transportation, ensuring the efficient movement of people and goods. Although generally safe, aviation systems occasionally encounter incidents and accidents that underscore th... 详细信息
来源: 评论
PSO-CHS Routing Protocol for Energy Consumption Enhancement in Wireless Sensor Networks  4
PSO-CHS Routing Protocol for Energy Consumption Enhancement ...
收藏 引用
4th IEEE International Conference on Mobile Networks and Wireless communications, ICMNWC 2024
作者: Fakhri, Israa Sabri Marhoon, Haydar Abdulameer Hussein, Mohsin Hasan College of Computer Science and Information Technology University of Kerbala Department of Computer Science Karbala Iraq Scientific Research Center Al-Ayen University Department of Computer Science Information and Communication Technology Research Group Thi-Qar Iraq
A region's Wireless sensor networks consist of sensors distributed over a region that collect and send environmental data to a central station. It measures humidity and temperature. The formation is based on many ... 详细信息
来源: 评论
Colored Edge Detection Using Thresholding Techniques
收藏 引用
Recent Advances in computer science and communications 2023年 第4期16卷 33-41页
作者: Fenyi, Adolf Fenyi, Isaac Asante, Michael Department of Computer Science and Information Technology Kwame Nkrumah University of Science and Technology Kumasi Ghana
Background: In this research, a novel algorithm is formulated through the combination of gradient and adaptive thresholding. A set of 5 X 5 convolution kernels were generated to determine the gradients in the four mai... 详细信息
来源: 评论
Visual quality-enhanced reversible data hiding scheme based on interpolation and variant Sudoku matrics
收藏 引用
Multimedia Tools and Applications 2024年 第18期84卷 1-29页
作者: Yuan, Longfei Lin, Chia-Chen Chang, Chin-Chen Department of Computer Science National Tsing Hua University Hsinchu Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung Taiwan Department of Information Engineering and Computer Science Feng Chia University Taichung Taiwan
Utilizing interpolation techniques (IT) within reversible data hiding (RDH) algorithms presents the advantage of a substantial embedding capacity. Nevertheless, prevalent algorithms often straightforwardly embed confi... 详细信息
来源: 评论
Multiclass Classification for Cyber Threats Detection on Twitter
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3853-3866页
作者: Adnan Hussein Abdulwahab Ali Almazroi College of Computer Science and Engineering Department of Computer ScienceAL-Ahgaff UniversityMukallaYemen College of Computing and Information Technology at Khulais Department of Information TechnologyUniversity of JeddahJeddahSaudi Arabia
The advances in technology increase the number of internet systems *** a result,cybersecurity issues have become more *** threats are one of the main problems in the area of ***,detecting cybersecurity threats is not ... 详细信息
来源: 评论
A Support Vector Machine(SVM)Model for Privacy Recommending Data Processing Model(PRDPM)in Internet of Vehicles
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 389-406页
作者: Ali Alqarni Department of Computer Science and Artificial Intelligence College of Computing and Information TechnologyUniversity of BishaBisha61922Saudi Arabia
Open networks and heterogeneous services in the Internet of Vehicles(IoV)can lead to security and privacy *** key requirement for such systems is the preservation of user privacy,ensuring a seamless experience in driv... 详细信息
来源: 评论
Enhancing Hybrid Classification for Plant Diseases with Deep Feature Selection Based on Analytical Entropy and Statistical Method
收藏 引用
IEEE Access 2025年 13卷 86781-86798页
作者: Phiphatkamtorn, Phanthawat Jitanan, Sutasinee Faculty of Science Naresuan University Department of Computer Science and Information Technology Thailand
The purpose of much research in the hybrid classification area is to reduce the number of deep features. However, many approaches overlook the relation between deep features and specific classes or diseases. This stud... 详细信息
来源: 评论