咨询与建议

限定检索结果

文献类型

  • 66,239 篇 会议
  • 32,235 篇 期刊文献
  • 1,095 册 图书

馆藏范围

  • 99,569 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 60,282 篇 工学
    • 43,583 篇 计算机科学与技术...
    • 34,764 篇 软件工程
    • 16,754 篇 信息与通信工程
    • 9,501 篇 控制科学与工程
    • 7,240 篇 电气工程
    • 7,154 篇 电子科学与技术(可...
    • 6,789 篇 生物工程
    • 5,169 篇 生物医学工程(可授...
    • 4,288 篇 光学工程
    • 4,062 篇 机械工程
    • 3,255 篇 仪器科学与技术
    • 2,983 篇 动力工程及工程热...
    • 2,790 篇 网络空间安全
    • 2,649 篇 化学工程与技术
    • 2,560 篇 安全科学与工程
    • 2,178 篇 交通运输工程
  • 32,095 篇 理学
    • 16,734 篇 数学
    • 9,558 篇 物理学
    • 7,683 篇 生物学
    • 5,351 篇 统计学(可授理学、...
    • 3,597 篇 系统科学
    • 2,900 篇 化学
  • 17,286 篇 管理学
    • 10,552 篇 管理科学与工程(可...
    • 7,441 篇 图书情报与档案管...
    • 4,880 篇 工商管理
  • 5,488 篇 医学
    • 4,562 篇 临床医学
    • 4,022 篇 基础医学(可授医学...
    • 2,494 篇 公共卫生与预防医...
    • 2,363 篇 药学(可授医学、理...
  • 3,017 篇 法学
    • 2,433 篇 社会学
  • 1,794 篇 经济学
  • 1,372 篇 农学
  • 1,304 篇 教育学
  • 557 篇 文学
  • 278 篇 军事学
  • 179 篇 艺术学
  • 34 篇 哲学
  • 21 篇 历史学

主题

  • 3,073 篇 computer science
  • 2,476 篇 accuracy
  • 2,347 篇 deep learning
  • 2,311 篇 feature extracti...
  • 2,057 篇 machine learning
  • 1,890 篇 computational mo...
  • 1,596 篇 training
  • 1,551 篇 internet of thin...
  • 1,392 篇 data mining
  • 1,326 篇 support vector m...
  • 1,266 篇 artificial intel...
  • 1,178 篇 information tech...
  • 1,155 篇 optimization
  • 1,141 篇 predictive model...
  • 1,112 篇 real-time system...
  • 1,081 篇 wireless sensor ...
  • 1,041 篇 convolutional ne...
  • 902 篇 educational inst...
  • 899 篇 security
  • 851 篇 computer archite...

机构

  • 1,019 篇 department of co...
  • 513 篇 maharishi school...
  • 352 篇 department of co...
  • 274 篇 department of ph...
  • 257 篇 faculté des scie...
  • 253 篇 department of ph...
  • 251 篇 department of co...
  • 227 篇 faculty of scien...
  • 220 篇 department of ph...
  • 216 篇 physics division...
  • 211 篇 school of comput...
  • 198 篇 department of co...
  • 197 篇 department of ph...
  • 194 篇 department of ph...
  • 178 篇 departamento de ...
  • 174 篇 school of inform...
  • 167 篇 maharishi school...
  • 158 篇 department of ph...
  • 157 篇 department of ph...
  • 157 篇 department for p...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 264 篇 g. spigo
  • 263 篇 f. siegert
  • 262 篇 a. c. könig
  • 259 篇 h. a. gordon
  • 259 篇 m. klein
  • 254 篇 r. ströhmer
  • 245 篇 h. sakamoto
  • 242 篇 y. tayalati
  • 232 篇 m. rijssenbeek
  • 202 篇 d. guest
  • 201 篇 n. orlando
  • 200 篇 f. pastore
  • 196 篇 s. jin
  • 189 篇 niyato dusit

语言

  • 92,825 篇 英文
  • 5,485 篇 其他
  • 1,213 篇 中文
  • 120 篇 日文
  • 20 篇 斯洛文尼亚文
  • 12 篇 德文
  • 9 篇 法文
  • 8 篇 朝鲜文
  • 3 篇 俄文
  • 2 篇 阿拉伯文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Information and Communication Technology"
99569 条 记 录,以下是241-250 订阅
排序:
A fully flexible key delegation mechanism with efficient fine-grained access control in CP-ABE
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第9期14卷 12837-12856页
作者: Porwal, Shardha Mittal, Sangeeta Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida India
Ciphertext Policy-Attribute Based Encryption (CP-ABE) is a secure one-to-many asymmetric encryption schemes where access control of a shared resource is defined in terms of a set of attributes possessed by a user. Key... 详细信息
来源: 评论
Design and analysis of series and parallel circuits based on plasmonic waveguides for high-performance computing devices
收藏 引用
Journal of Optical communications 2025年 第1期46卷 193-200页
作者: Jain, Satyendra Choudhary, Kuldeep Kumar, Santosh Department of Electrical and Electronics & Communication Engineering DIT University Dehradun248009 India Shandong Key Laboratory of Optical Communication Science and Technology School of Physics Science and Information Technology Liaocheng University Shandong Liaocheng252059 China
Nowadays, mental-insulator-metal (MIM) waveguides are widely used in the design of optical plasmonic waveguides due to their superior ability to confine surface plasmons up to sub wavelength scale. This research propo... 详细信息
来源: 评论
A Game-Theoretic Approach to Safe Crowd Evacuation in Emergencies
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1631-1657页
作者: Maria Gul Imran Ali Khan Gohar Zaman Atta Rahman Jamaluddin Mir Sardar Asad Ali Biabani May IssaAldossary Mustafa Youldash Ashraf Saadeldeen Maqsood Mahmud Asiya Abdus Salam Dania Alkhulaifi Abdullah AlTurkey31Department of Computer Science COMSATS University IslamabadAbbottabad CampusAbbottabad22010Pakistan Department of Computer Science Abbottabad University of Science and TechnologyAbbottabad22010Pakistan Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Science and Technology Unit Umm Al-Qura UniversityMakkah21955Saudi Arabia Deanship of Scientific Research Umm Al-Qura UniversityMakkah21955Saudi Arabia Department of Computer Information Systems College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Engineering College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Science Faculty of Computer Science and Information TechnologyOmdurman Islamic UniversityOmdurman14415Sudan Business Analytic Program Department of Management and MarketingCollege of Business AdministrationUniversity of BahrainSakhir32038Bahrain
Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoret... 详细信息
来源: 评论
Explainable AI-Based DDoS Attacks Classification Using Deep Transfer Learning
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 3785-3802页
作者: Ahmad Alzu’bi Amjad Albashayreh Abdelrahman Abuarqoub Mai A.M.Alfawair Department of Computer Science Jordan University of Science and TechnologyIrbid22110Jordan Department of Computer Science The University of JordanAmman11942Jordan Cardiff School of Technologies Cardiff Metropolitan UniversityCardiffCF52YBUK Prince Abdullah bin Ghazi Faculty of Information and Communication Technology Al-Balqa Applied UniversitySalt19117Jordan
In the era of the Internet of Things(IoT),the proliferation of connected devices has raised security concerns,increasing the risk of intrusions into diverse *** the convenience and efficiency offered by IoT technology... 详细信息
来源: 评论
Deep learning-based software engineering: progress,challenges, and opportunities
收藏 引用
science China(information sciences) 2025年 第1期68卷 57-144页
作者: Xiangping CHEN Xing HU Yuan HUANG He JIANG Weixing JI Yanjie JIANG Yanyan JIANG Bo LIU Hui LIU Xiaochen LI Xiaoli LIAN Guozhu MENG Xin PENG Hailong SUN Lin SHI Bo WANG Chong WANG Jiayi WANG Tiantian WANG Jifeng XUAN Xin XIA Yibiao YANG Yixin YANG Li ZHANG Yuming ZHOU Lu ZHANG School of Journalism and Communication Sun Yat-sen University School of Software Technology Zhejiang University School of Software Engineering Sun Yat-sen University School of Software Dalian University of Technology School of Computer Science and Technology Beijing Institute of Technology Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of EducationSchool of Computer Science Peking University State Key Laboratory for Novel Software Technology Nanjing University School of Computer Science and Engineering Beihang University Institute of Information Engineering Chinese Academy of Sciences School of Computer Science Fudan University State Key Laboratory of Complex & Critical Software Environment (CCSE) School of Software Beihang University School of Computer and Information Technology Beijing Jiaotong University School of Computer Science and Technology Harbin Institute of Technology School of Computer Science Wuhan University Huawei Technologies
Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech r... 详细信息
来源: 评论
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
收藏 引用
computer Modeling in Engineering & sciences 2024年 第5期139卷 1613-1633页
作者: Jingyu Zhang Pian Zhou Jin Wang Osama Alfarraj Saurabh Singh Min Zhu School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410015China Science and Technology on Information Systems Engineering Laboratory School of Systems EngineeringNational University of Defense TechnologyChangsha410073China Computer Science Department King Saud UniversityRiyadh11437Saudi Arabia Department of Artificial Intelligence and Big Data Woosong UniversityDaejeon34606South Korea College of Information Science and Technology Zhejiang Shuren UniversityHangzhou310015China
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the *** technology has been widely used and has developed rapidly in big data systems across ... 详细信息
来源: 评论
Enhancing Plant Leaf Disease Prediction Through Advanced Deep Feature Representations: A Transfer Learning Approach
收藏 引用
Journal of The Institution of Engineers (India): Series B 2024年 第3期105卷 469-482页
作者: Naralasetti, Veeranjaneyulu Bodapati, Jyostna Devi Department of Information Technology Vignan’s Foundation for Science Technology and Research Guntur India Department of Advanced Computer Science and Engineering Vignan’s Foundation for Science Technology and Research Guntur India
Plant diseases present a considerable threat to the farming industry, causing significant economic losses by reducing crop yields. The emergence of deep neural network models in the realm of computer vision has brough... 详细信息
来源: 评论
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论
Improved Dynamic Johnson Sequencing Algorithm(DJS)in Cloud Computing Environment for Efficient Resource Scheduling for Distributed Overloading
收藏 引用
Journal of Systems science and Systems Engineering 2024年 第4期33卷 391-424页
作者: Anurag Sinha Pallab Banerjee Sharmistha Roy Nitasha Rathore Narendra Pratap Singh Mueen Uddin Maha Abdelhaq Raed Alsaqour Department of Computer Science Engineering ICFAI Tech SchoolICFAI UniversityJharkhandRanchi834004India Department of Computer Science Engineering Amity UniversityJharkhandRanchi835303India Department of Computing and Information Technology Usha Martin UniversityRanchi835103India Department of Information Technology Bharti Vidyapeeth’s College of EngineeringPaschim ViharNew DelhiIndia Department of CSE Delhi UniversityNew DelhiIndia College of Computing and Information Technology University of Doha for Science and TechnologyDoha24449Qatar Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdurrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Information Technology College of Computing and InformaticsSaudi Electronic University93499RiyadhSaudi Arabia
This study introduces an innovative approach to optimize cloud computing job distribution using the Improved Dynamic Johnson Sequencing Algorithm(DJS).Emphasizing on-demand resource sharing,typical to Cloud Service Pr... 详细信息
来源: 评论