咨询与建议

限定检索结果

文献类型

  • 34,929 篇 会议
  • 25,769 篇 期刊文献
  • 902 册 图书

馆藏范围

  • 61,600 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35,920 篇 工学
    • 21,441 篇 计算机科学与技术...
    • 17,170 篇 软件工程
    • 7,492 篇 信息与通信工程
    • 6,380 篇 控制科学与工程
    • 5,327 篇 电气工程
    • 4,736 篇 电子科学与技术(可...
    • 3,853 篇 生物工程
    • 3,438 篇 生物医学工程(可授...
    • 3,041 篇 机械工程
    • 2,606 篇 化学工程与技术
    • 2,568 篇 光学工程
    • 2,297 篇 动力工程及工程热...
    • 2,280 篇 仪器科学与技术
    • 1,996 篇 材料科学与工程(可...
    • 1,259 篇 安全科学与工程
    • 1,217 篇 交通运输工程
  • 23,108 篇 理学
    • 10,518 篇 数学
    • 8,319 篇 物理学
    • 4,720 篇 生物学
    • 3,458 篇 统计学(可授理学、...
    • 2,845 篇 系统科学
    • 2,823 篇 化学
  • 8,714 篇 管理学
    • 5,586 篇 管理科学与工程(可...
    • 3,376 篇 图书情报与档案管...
    • 2,855 篇 工商管理
  • 3,633 篇 医学
    • 2,999 篇 临床医学
    • 2,527 篇 基础医学(可授医学...
    • 1,504 篇 药学(可授医学、理...
    • 1,309 篇 公共卫生与预防医...
  • 1,528 篇 法学
    • 1,290 篇 社会学
  • 1,130 篇 经济学
  • 852 篇 农学
  • 744 篇 教育学
  • 175 篇 文学
  • 127 篇 军事学
  • 82 篇 艺术学
  • 9 篇 哲学
  • 6 篇 历史学

主题

  • 1,745 篇 computer science
  • 1,083 篇 deep learning
  • 1,034 篇 machine learning
  • 1,034 篇 accuracy
  • 938 篇 artificial intel...
  • 919 篇 computational mo...
  • 760 篇 feature extracti...
  • 662 篇 internet of thin...
  • 654 篇 training
  • 610 篇 control systems
  • 607 篇 optimization
  • 562 篇 neural networks
  • 493 篇 data mining
  • 485 篇 predictive model...
  • 465 篇 support vector m...
  • 451 篇 systems engineer...
  • 434 篇 testing
  • 419 篇 real-time system...
  • 405 篇 computer archite...
  • 404 篇 robustness

机构

  • 1,098 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 984 篇 physikalisches i...
  • 973 篇 oliver lodge lab...
  • 669 篇 infn laboratori ...
  • 638 篇 infn sezione di ...
  • 623 篇 infn sezione di ...
  • 617 篇 infn sezione di ...
  • 603 篇 fakultät physik ...
  • 598 篇 university of ch...
  • 555 篇 school of physic...
  • 544 篇 horia hulubei na...
  • 539 篇 department of ph...
  • 535 篇 school of physic...
  • 523 篇 imperial college...
  • 520 篇 nikhef national ...
  • 518 篇 iccub universita...
  • 518 篇 h.h. wills physi...
  • 511 篇 stfc rutherford ...
  • 510 篇 school of physic...

作者

  • 263 篇 barter w.
  • 257 篇 a. gomes
  • 248 篇 c. alexa
  • 243 篇 j. m. izen
  • 243 篇 beiter a.
  • 240 篇 g. bella
  • 240 篇 j. strandberg
  • 237 篇 c. amelung
  • 236 篇 d. calvet
  • 234 篇 bellee v.
  • 231 篇 j. wang
  • 230 篇 g. spigo
  • 230 篇 s. chen
  • 227 篇 blake t.
  • 225 篇 brundu d.
  • 224 篇 bowcock t.j.v.
  • 220 篇 f. siegert
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.

语言

  • 58,765 篇 英文
  • 2,142 篇 其他
  • 450 篇 中文
  • 202 篇 日文
  • 17 篇 德文
  • 14 篇 法文
  • 4 篇 荷兰文
  • 4 篇 葡萄牙文
  • 4 篇 俄文
  • 4 篇 斯洛文尼亚文
  • 3 篇 朝鲜文
  • 2 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Systems Engineering Faculty of Engineering"
61600 条 记 录,以下是4921-4930 订阅
排序:
Survey on recent advances in IoT application layer protocols and machine learning scope for research directions
收藏 引用
Digital Communications and Networks 2022年 第5期8卷 727-744页
作者: Praveen Kumar Donta Satish Narayana Srirama Tarachand Amgoth Chandra Sekhara Rao Annavarapu Department of Computer Science and Engineering Indian Institute of Technology(Indian School of Mines)Dhanbad826004India School of Computer and Information Sciences University of HyderabadHyderabad500046India Mobile&Cloud Lab Institute of Computer ScienceFaculty of Science and TechnologyUniversity of Tartu50090Estonia
The Internet of Things(IoT)has been growing over the past few years due to its flexibility and ease of use in real-time *** IoT's foremost task is ensuring that there is proper communication among different types ... 详细信息
来源: 评论
A maximum neural network approach for N-queens problems
收藏 引用
BIOLOGICAL CYBERNETICS 1997年 第4期76卷 251-255页
作者: Funabiki, N Takenaka, Y Nishikawa, S [A1]Department of Information and Computer Sciences Faculty of Engineering Science Osaka University Toyonaka Osaka 560 Japan
A novel neural network approach using the maximum neuron model is presented for N-queens problems. The goal of the N-queens problem is to find a set of locations of N queens on an N x N chessboard such that no pair of... 详细信息
来源: 评论
Multicast network security using quantum key distribution (QKD)
Multicast network security using quantum key distribution (Q...
收藏 引用
2012 International Conference on computer and Communication engineering, ICCCE 2012
作者: Ali, Sellami Mahmoud, Omer Hasan, Aisha A. Department of Science in Engineering Faculty of Engineering International Islamic University Malaysia Malaysia Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Malaysia
We reviewed the confidentiality and authentication for multi-party applications. A conceptual model of a secure multicast network has been presented by adding a quantum key distribution (QKD) network to its architectu... 详细信息
来源: 评论
A lightweight incremental analysis and profiling framework for embedded devices  14
A lightweight incremental analysis and profiling framework f...
收藏 引用
17th International Workshop on Software and Compilers for Embedded systems, SCOPES 2014
作者: Elshobaky, Sara El-Mahdy, Ahmed Rohou, Erven El-Sayed, Layla A. A. ElDerini, Mohamed Nazih Computer and Systems Engineering Department Faculty of Engineering Alexandria University Alexandria Egypt CSE Department EJUST Alexandria University Alexandria Egypt Inria Egypt Computer and Systems Engineering Department Faculty of Engineering Alexandria University Alexandria Egypt Pharos University-Alexandria Alexandria Egypt
Embedded systems such as mobile devices are currently ubiquitous. The performance potential of these devices is rapidly improving by incorporating multi-core and GPU technologies, and is rapidly catching up with the w... 详细信息
来源: 评论
Detection of Man-in-the-Middle Attacks by Using the TCP Retransmission Timeout: Key Compromise Impersonation Attack as Study Case
Detection of Man-in-the-Middle Attacks by Using the TCP Retr...
收藏 引用
2018 International Conference on computer, Control, Electrical, and Electronics engineering, ICCCEEE 2018
作者: Albashear, Ayman Mohammed Muzzamail Ali, Hamid Abbas Ali, Abeer M. Electrical and Electronic Engineering Department Faculty of Engineering University of Khartoum Sudan Faculty of Computer Science Sudan University of Science Technology Sudan
A Retransmission Timeout or RTO plays an important role in TCP protocol, mainly to achieve reliable transmission. In TCP, if the sender sent a segment and no acknowledgement has been received and the RTO timer expired... 详细信息
来源: 评论
Implementation of learning vector quantization (lvq) algorithm for durian fruit classification using gray level co-occurrence matrix (glcm) parameters
Implementation of learning vector quantization (lvq) algorit...
收藏 引用
International Conference on Information System, computer science and engineering 2018, ICONISCSE 2018
作者: Sutarno Putri Fauliah, Sara Department of Computer Engineering Faculty of Computer Science Sriwijaya University Indralaya Palembang Indonesia
Diversity on durian varieties makes it difficult to distinguish between durian varieties. In addition, some durian varieties also have similarities which further complicate the classification process, and are known as... 详细信息
来源: 评论
Monitoring of single wire earth return systems using power line communication
Monitoring of single wire earth return systems using power l...
收藏 引用
19th Australasian Universities Power engineering Conference: Sustainable Energy Technologies and systems, AUPEC'09
作者: Gay, D. Thompson, A. Amanulla, M.T.O. Wolfs, P. Faculty of Sciences Engineering and Health CQUniversity Australia Department of Electrical and Computer Engineering Faculty of Science and Engineering Curtin University of Technology Australia
As demand for power increases in rural areas serviced by Single Wire Earth Return (SWER) networks, distribution issues are becoming increasingly evident. Voltage regulation and system capacity concerns are driving uti... 详细信息
来源: 评论
Novel Universal Windowing Multicarrier Waveform for 5G systems
收藏 引用
computers, Materials & Continua 2021年 第5期67卷 1523-1536页
作者: Ahmed Hammoodi Lukman Audah Montadar Abas Taher Mazin Abed Mohammed Mustafa S.Aljumaily Adeeb Salh Shipun A.Hamzah Wireless and Radio Science Centre Faculty of Electrical and Electronic EngineeringUniversiti Tun Hussein Onn MalaysiaParit Raja86400Malaysia Department Communications Engineering University of DiyalaBaqubah32001Iraq College of Computer Science and Information Technology University of AnbarAnbar31001Iraq Department of Electrical Engineering and Computer Science University of TennesseeKnoxvilleTN37901USA
Fifth Generation(5G)systems aim to improve flexibility,coexistence and diverse service in several aspects to achieve the emerging applications *** and filtering of the traditional multicarrier waveforms are now consid... 详细信息
来源: 评论
Smart irrigation system using IoT and machine learning methods  5
Smart irrigation system using IoT and machine learning metho...
收藏 引用
5th International IEEE Novel Intelligent and Leading Emerging sciences Conference, NILES 2023
作者: Esmail, Ahmed A. Ibrahim, Manar A. Abdallah, Sayed M. Radwan, Ahmed E. Elsonbaty, Haya K. Elsayed, Mohamed A. Elnakeib, Noure A. Dawoud, Merit Samir El-Ghamry, Amir Fouad, Khaled M. Moawad, Ibrahim F. New Mansoura University Artificial Intelligence Science Faculty of Computer Science and Engineering Dakhlia Egypt Mansoura University Faculty of Computer Science and Engineering New Mansoura University Information Technology Faculty of Computer and Information Sciences Egypt Mansoura University Faculty of Computer Science and Engineering New Mansoura University Faculty of Computer and Information Sciences Egypt University of Hertfordshire Hosted by Global Academic Foundation School of Engineering and Computer Science Egypt Benha University Information Systems Faculty of Computers and Artificial Intelligence Egypt New Mansoura University Faculty of Computer Science and Engineering Dakhlia Egypt Ain Shams University Cairo Information Systems Faculty of Computer and Information Sciences Egypt
Water loss and improper scheduling are problems with traditional irrigation techniques, making it difficult to meet the growing demand for food production while also preserving precious water resources. To address the... 详细信息
来源: 评论
Data Secure Storage Mechanism of Sensor Networks Based on Blockchain
收藏 引用
computers, Materials & Continua 2020年 第12期65卷 2365-2384页
作者: Jin Wang Wencheng Chen Lei Wang R.Simon Sherratt Osama Alfarraj Amr Tolba School of Information Science and Engineering Fujian University of TechnologyFuzhou350118China School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China School of Civil Engineering Changsha University of Science&TechnologyChangsha410000China Department Biomedical Engineering University of ReadingReadingRG66AYUK Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Mathematics and Computer Science Department Faculty of ScienceMenoufia UniversityShebin-El-Kom32511Egypt
As the number of sensor network application scenarios continues to grow,the security problems inherent in this approach have become obstacles that hinder its wide ***,it has attracted increasing attention from industr... 详细信息
来源: 评论