咨询与建议

限定检索结果

文献类型

  • 3,807 篇 会议
  • 2,349 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 6,186 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,701 篇 工学
    • 2,281 篇 计算机科学与技术...
    • 1,808 篇 软件工程
    • 730 篇 信息与通信工程
    • 664 篇 控制科学与工程
    • 548 篇 电气工程
    • 477 篇 电子科学与技术(可...
    • 351 篇 生物工程
    • 311 篇 机械工程
    • 269 篇 生物医学工程(可授...
    • 247 篇 光学工程
    • 232 篇 仪器科学与技术
    • 226 篇 动力工程及工程热...
    • 178 篇 化学工程与技术
    • 133 篇 交通运输工程
    • 127 篇 材料科学与工程(可...
    • 118 篇 土木工程
  • 2,052 篇 理学
    • 1,007 篇 数学
    • 613 篇 物理学
    • 401 篇 生物学
    • 298 篇 统计学(可授理学、...
    • 261 篇 系统科学
    • 182 篇 化学
  • 986 篇 管理学
    • 667 篇 管理科学与工程(可...
    • 345 篇 图书情报与档案管...
    • 282 篇 工商管理
  • 303 篇 医学
    • 258 篇 临床医学
    • 203 篇 基础医学(可授医学...
    • 123 篇 药学(可授医学、理...
  • 156 篇 法学
    • 123 篇 社会学
  • 123 篇 经济学
    • 122 篇 应用经济学
  • 72 篇 农学
  • 58 篇 教育学
  • 27 篇 文学
  • 19 篇 军事学
  • 12 篇 艺术学
  • 2 篇 哲学

主题

  • 159 篇 computer science
  • 117 篇 deep learning
  • 98 篇 computer archite...
  • 97 篇 feature extracti...
  • 95 篇 computational mo...
  • 95 篇 machine learning
  • 88 篇 accuracy
  • 85 篇 laboratories
  • 78 篇 optimization
  • 74 篇 data mining
  • 74 篇 training
  • 73 篇 hardware
  • 67 篇 control systems
  • 64 篇 artificial intel...
  • 61 篇 testing
  • 60 篇 educational inst...
  • 60 篇 wireless sensor ...
  • 59 篇 algorithm design...
  • 56 篇 costs
  • 55 篇 application soft...

机构

  • 172 篇 department of co...
  • 87 篇 department of co...
  • 53 篇 key laboratory o...
  • 47 篇 school of softwa...
  • 40 篇 department of co...
  • 38 篇 tsinghua nationa...
  • 37 篇 department of co...
  • 37 篇 national enginee...
  • 35 篇 key laboratory o...
  • 28 篇 college of compu...
  • 26 篇 school of system...
  • 25 篇 university of ch...
  • 25 篇 vlsi and system ...
  • 24 篇 department of co...
  • 23 篇 key laboratory f...
  • 22 篇 department of co...
  • 22 篇 department of el...
  • 22 篇 the key laborato...
  • 20 篇 ieee
  • 19 篇 department of co...

作者

  • 33 篇 hai jin
  • 27 篇 zhou mengchu
  • 22 篇 guangwen yang
  • 21 篇 abdelwahed motwa...
  • 21 篇 dutta paramartha
  • 20 篇 mengchu zhou
  • 20 篇 liuchen chang
  • 18 篇 mohamed k.nour
  • 18 篇 jiang changjun
  • 17 篇 haohuan fu
  • 17 篇 ligang hou
  • 17 篇 changjun jiang
  • 17 篇 jin hai
  • 16 篇 han zhu
  • 16 篇 ishfaq yaseen
  • 15 篇 robbi rahim
  • 15 篇 gaol ford lumban
  • 15 篇 wang jinhui
  • 15 篇 hou ligang
  • 14 篇 xiang-yang li

语言

  • 5,889 篇 英文
  • 151 篇 其他
  • 139 篇 中文
  • 12 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 意大利文
  • 1 篇 荷兰文
检索条件"机构=Department of Computer System and Technology"
6186 条 记 录,以下是21-30 订阅
排序:
Enhanced Neutrosophic Set and Machine Learning Approach for Kidney Disease Prediction
收藏 引用
Neutrosophic Sets and systems 2025年 80卷 465-477页
作者: Al-Doori, Humam M. Alkellezli, Tareef S. Abdelhafeez, Ahmed Eassaa, Mohamed Sawah, Mohamed S. El-Douh, Ahmed A. Cybersecurity Sciences Department College of Science Ashur University Baghdad Iraq Cybersecurity Engineering Department College of Engineering Ashur University Baghdad Iraq Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan Cybersecurity Technology Engineering Department College of Engineering Technology Ashur University Baghdad Iraq
Kidney disease (KD) is a gradually increasing global health concern. It is a chronic illness linked to higher rates of morbidity and mortality, a higher risk of cardiovascular disease and numerous other illnesses, and... 详细信息
来源: 评论
A novel U-net model for brain tumor segmentation from MRI images
收藏 引用
Alexandria Engineering Journal 2025年 126卷 220-230页
作者: Obayya, Marwa Alshuhail, Asma Mahmood, Khalid Alanazi, Meshari H. Alqahtani, Mohammed Aljehane, Nojood O. Almansour, Hamad Al-Hagery, Mohammed Abdullah Department of Biomedical Engineering College of Engineering Princess Nourah bint Abdulrahman University PO Box 84428 Riyadh11671 Saudi Arabia Department of Information Systems College of Computer Sciences & Information Technology King Faisal university Saudi Arabia Department of Information Systems Applied College at Mahayil King Khalid University Saudi Arabia Department of Computer Science College of Sciences Northern Border University Arar Saudi Arabia Department of Information System and Cyber Security College of Computing and Information Technology University of Bisha Bisha61922 Saudi Arabia Department of Computer Science Faculty of Computers and Information Technology University of Tabuk Tabuk Saudi Arabia Applied Collage Najran University Najran Saudi Arabia Department of Computer Science College of Computer Qassim University Saudi Arabia
Segmentation of brain tumors aids in diagnosing the disease early, planning treatment, and monitoring its progression in medical image analysis. Automation is necessary to eliminate the time and variability associated... 详细信息
来源: 评论
OHMiner: An Overlap-centric system for Efficient Hypergraph Pattern Mining  25
OHMiner: An Overlap-centric System for Efficient Hypergraph ...
收藏 引用
20th European Conference on computer systems, EuroSys 2025, co-located 30th ACM International Conference on Architectural Support for Programming Languages and Operating systems, ASPLOS 2025
作者: Qi, Hao Luo, Kang He, Ligang Zhang, Yu Cai, Minzhi Dai, Jingxin He, Bingsheng Jin, Hai Zhang, Zhan Zhao, Jin Yue, Hengshan Yu, Hui Liao, Xiaofei National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computer Science University of Warwick United Kingdom National University of Singapore Singapore Zhejiang Lab China Jilin University China
Hypergraph Pattern Mining (HPM) aims to identify all the instances of user-interested subhypergraphs (patterns) in hypergraphs, which has been widely used in various applications. However, existing solutions either ne... 详细信息
来源: 评论
Blockchain-Driven Secure Data Sharing Framework for Edge Computing Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 978-997页
作者: Fuad A.M.Al-Yarimi Ramzi Salah Khaled Mohamoud Department of Computer Science King Khalid UniversityMuhayel Aseer 62529Saudi Arabia Faculty of Information Science and Technology University Kebangassan MalaysiaBangi 43600Malaysia Department of Information System King Khalid UniversityMuhayel Aseer 62529Saudi Arabia
This study examines secure and effective data sharing methods for edge computing *** methods of sharing data at the edge have issues with security,speed,and *** goal is to develop a Blockchain-based Secure Data Sharin... 详细信息
来源: 评论
A Multi-Agent Garage Service Search and Recommendation with Hybrid MLs and LLMs
A Multi-Agent Garage Service Search and Recommendation with ...
收藏 引用
2025 International Conference on computer, Electrical and Communication Engineering, ICCECE 2025
作者: Shuvo, Mahfuzur Rahman Rahman, Ashifur Akuthota, Vishwanath Paul, Tanay Islam, Mahfujul Ashraf, Md Sadi Roy, Prosenjit Reza, Md Tanzim International American University Department of Management Information System United States Chittagong University of Engineering and Technology Department of Computer Science and Engineering Bangladesh TechOptima Hyderabad India Brac University Department of Computer Science and Engineering Bangladesh Prairie View A & M University Department of Computer Science TX United States
The automobile service industry's explosive growth highlights the need for creative approaches to boost operational effectiveness and user experience. This study introduces a Hybrid Garage Assistance system, integ... 详细信息
来源: 评论
FDDSGCN: Fractional Decoupling Dynamic Spatiotemporal Graph Convolutional Network for Traffic Forecasting
FDDSGCN: Fractional Decoupling Dynamic Spatiotemporal Graph ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Xu, Jinpeng Zhao, Chunna Yang, Jing Huang, Yaqun Yang, Yaoyuan Yee, Por Lip School of Information Science & Engineering Yunnan University Kunming China Department of Computer System and Technology Universiti Malaya Kuala Lumpur Malaysia
Urban traffic flow management faces increasing challenges due to accelerating urbanization. Traffic data collected from roadside sensors contain complex temporal and spatial dependencies that interact simultaneously. ... 详细信息
来源: 评论
Behaviour-diverse automatic penetration testing:a coverage-based deep reinforcement learning approach
收藏 引用
Frontiers of computer Science 2025年 第3期19卷 15-24页
作者: Yizhou YANG Longde CHEN Sha LIU Lanning WANG Haohuan FU Xin LIU Zuoning CHEN Zhongguancun Laboratory Beijing 100081China Zhejiang Lab Hangzhou 311121China National Research Centre of Parallel Computer Engineering and Technology Wuxi 214000China Faculty of Geographical Science Beijing Normal UniversityBeijing 100875China Department of Earth System Science Tsinghua UniversityBeijing 100084China
Reinforcement Learning(RL)is gaining importance in automating penetration testing as it reduces human effort and increases ***,given the rapidly expanding scale of modern network infrastructure,the limited testing sca... 详细信息
来源: 评论
Real-Time Myanmar Hand Gestures Recognition Using Deep Learning Models  8th
Real-Time Myanmar Hand Gestures Recognition Using Deep Learn...
收藏 引用
8th International Conference on Intelligent Technologies, ICIT 2023
作者: Kyaw, Nwe Ni Mitra, Pabitra Sinha, G.R. Department of Computer Science and Engineering Indian Institute of Technology Kharagpur West Bengal721302 India Indian Knowledge System Lab International Institute of Information Technology Bangalore Karnataka Bengaluru560100 India
The proposed system for recognizing Myanmar sign language between individuals who are deaf. The aim of this study is to develop deep learning models for the purpose of accurately identifying dynamic hand gesture image... 详细信息
来源: 评论
Ethiopic Cryptography: An Efficient Hybrid Encryption Algorithm for Reducing Cybersecurity Attack  11th
Ethiopic Cryptography: An Efficient Hybrid Encryption Algori...
收藏 引用
11th EAI International Conference on Advancement of Science and technology, ICAST 2023
作者: Akele, Tadesse Birara Bahiru, Tadesse Kebede Molla, Tibebu Legesse Fentie, Shambel Dessale Belay, Tadesse Destaw Marye, Almaz Yemataw Getaneh, Mersha Derese Department of Information System Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Department of Information Technology Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Deparment of Software Engineering Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Department of Computer Science Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia
Cryptography is an essential tool in ensuring the security of data during network communication. Network and service providers prioritize data security to ensure secure data exchanges. Ethiopic cryptography is a uniqu... 详细信息
来源: 评论
Enhancing IoT Resilience: Machine Learning Techniques for Autonomous Anomaly Detection and Threat Mitigation
收藏 引用
Procedia computer Science 2025年 254卷 68-77页
作者: Shashika Lokuliyana A.G.A. Kalupahanage H.M.S.D. Herath Deemantha Siriwardana D.N. Bulathsinhala H.M.T.M. Herath Department of Computer System Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
The explosive growth of the Internet of Things (IoT) has had a substantial impact on daily life and businesses, allowing for real-time monitoring and decision-making. However, increased connectivity also brings higher... 详细信息
来源: 评论