咨询与建议

限定检索结果

文献类型

  • 61,273 篇 会议
  • 27,543 篇 期刊文献
  • 969 册 图书
  • 1 篇 学位论文

馆藏范围

  • 89,786 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 53,827 篇 工学
    • 36,905 篇 计算机科学与技术...
    • 29,246 篇 软件工程
    • 16,556 篇 信息与通信工程
    • 9,146 篇 控制科学与工程
    • 8,254 篇 电子科学与技术(可...
    • 8,016 篇 电气工程
    • 5,987 篇 生物工程
    • 4,811 篇 生物医学工程(可授...
    • 4,171 篇 光学工程
    • 3,873 篇 机械工程
    • 3,430 篇 仪器科学与技术
    • 3,203 篇 动力工程及工程热...
    • 2,802 篇 网络空间安全
    • 2,551 篇 化学工程与技术
    • 2,509 篇 安全科学与工程
    • 2,129 篇 交通运输工程
    • 2,094 篇 材料科学与工程(可...
  • 28,686 篇 理学
    • 14,499 篇 数学
    • 9,191 篇 物理学
    • 6,760 篇 生物学
    • 4,713 篇 统计学(可授理学、...
    • 3,206 篇 系统科学
    • 2,861 篇 化学
  • 14,384 篇 管理学
    • 9,300 篇 管理科学与工程(可...
    • 5,716 篇 图书情报与档案管...
    • 4,183 篇 工商管理
  • 5,108 篇 医学
    • 4,191 篇 临床医学
    • 3,692 篇 基础医学(可授医学...
    • 2,346 篇 公共卫生与预防医...
    • 2,188 篇 药学(可授医学、理...
  • 2,544 篇 法学
  • 1,592 篇 经济学
  • 1,238 篇 农学
  • 989 篇 教育学
  • 483 篇 文学
  • 256 篇 军事学
  • 142 篇 艺术学
  • 9 篇 哲学
  • 4 篇 历史学

主题

  • 2,481 篇 accuracy
  • 2,198 篇 deep learning
  • 2,051 篇 feature extracti...
  • 1,854 篇 machine learning
  • 1,844 篇 computer science
  • 1,694 篇 computational mo...
  • 1,531 篇 internet of thin...
  • 1,448 篇 training
  • 1,255 篇 real-time system...
  • 1,186 篇 support vector m...
  • 1,171 篇 optimization
  • 1,163 篇 wireless sensor ...
  • 1,133 篇 artificial intel...
  • 1,085 篇 predictive model...
  • 1,023 篇 wireless communi...
  • 1,021 篇 data mining
  • 985 篇 convolutional ne...
  • 980 篇 information tech...
  • 886 篇 security
  • 867 篇 bandwidth

机构

  • 616 篇 maharishi school...
  • 353 篇 department of co...
  • 277 篇 department of ph...
  • 260 篇 faculté des scie...
  • 259 篇 department of ph...
  • 251 篇 faculty of scien...
  • 250 篇 department of in...
  • 220 篇 department of ph...
  • 216 篇 physics division...
  • 204 篇 department of ph...
  • 204 篇 department of co...
  • 197 篇 department of ph...
  • 196 篇 maharishi school...
  • 195 篇 departamento de ...
  • 186 篇 department of el...
  • 186 篇 department of co...
  • 163 篇 department of ph...
  • 160 篇 department of co...
  • 160 篇 department of co...
  • 159 篇 department of ph...

作者

  • 299 篇 leonard barolli
  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 262 篇 m. klein
  • 261 篇 h. a. gordon
  • 260 篇 r. ströhmer
  • 255 篇 h. sakamoto
  • 244 篇 y. tayalati
  • 243 篇 m. rijssenbeek
  • 221 篇 d. guest
  • 221 篇 s. jin
  • 202 篇 f. pastore
  • 202 篇 n. orlando

语言

  • 73,754 篇 英文
  • 14,869 篇 其他
  • 1,213 篇 中文
  • 119 篇 日文
  • 30 篇 斯洛文尼亚文
  • 20 篇 德文
  • 18 篇 法文
  • 13 篇 朝鲜文
  • 6 篇 俄文
  • 4 篇 阿拉伯文
  • 3 篇 土耳其文
  • 2 篇 捷克文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer and Communication Engineering and Department of Information Technology"
89786 条 记 录,以下是701-710 订阅
排序:
A Software Defect Prediction Method Using a Multivariate Heterogeneous Hybrid Deep Learning Algorithm
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3251-3279页
作者: Qi Fei Haojun Hu Guisheng Yin Zhian Sun College of Computer Science and Technology Harbin Engineering UniversityHarbin150001China Information Technology Research Department Jiangsu Automation Research InstituteLianyungang222062China School of Computer Science and Technology Harbin Institute of TechnologyShenzhen518055China
Software defect prediction plays a critical role in software development and quality assurance processes. Effective defect prediction enables testers to accurately prioritize testing efforts and enhance defect detecti... 详细信息
来源: 评论
Security Threats to xApps Access Control and E2 Interface in O-RAN
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the communications Society 2024年 5卷 1197-1203页
作者: Hung, Cheng-Feng Chen, You-Run Tseng, Chi-Heng Cheng, Shin-Ming National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei106335 Taiwan
Open Radio Access Networks (O-RANs) represent a novel wireless access network architecture that decomposes traditional RAN functions and makes them openly accessible. O-RANs enable real-time coordination, RAN performa... 详细信息
来源: 评论
A dual hashing-based authentication and secure data transmission scheme for vehicular cloud environment using MECC with optimal resource allocation mechanism
收藏 引用
Soft Computing 2024年 第17-18期28卷 10423-10437页
作者: Varalakshmi, J. Dhanasekaran, S. Department of Computer Science and Engineering Kalasalingam Academy of Research and Education Krishnankoil India Department of Information Technology Kalasalingam Academy of Research and Education Krishnankoil India
Vehicle cloud computing (VCC) is a recent area of study that blends vehicular networks with cloud computing, offering networking and sensor capabilities to vehicles for interaction with other vehicles and roadside inf... 详细信息
来源: 评论
Fuzzy clustering for electric field characterization and its application to thunderstorm interpretability
收藏 引用
Digital communications and Networks 2025年 第2期11卷 299-307页
作者: Xu Yang Hongyan Xing Xinyuan Ji Wei Xu Witold Pedrycz School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing 210044China Department of Electrical and Computer Engineering University of AlbertaEdmonton AB T6G 2R3Canada Systems Research Institute Polish Academy of Sciences00-901 WarsawPoland Department of Computer Engineering Faculty of Engineering and Natural SciencesIstinye University34010 IstanbulTurkey
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS **... 详细信息
来源: 评论
Blockchain-Enabled Mitigation Strategies for Distributed Denial of Service Attacks in IoT Sensor Networks:An Experimental Approach
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 3679-3705页
作者: Kithmini Godewatte Arachchige Mohsin Murtaza Chi-Tsun Cheng Bader M.Albahlal Cheng-Chi Lee Department of Engineering Technologies School of ScienceComputing and Engineering TechnologiesSwinburne UniversityMelbourne3122Australia School of Engineering Science Technology Engineering and Mathematics CollegeRMIT UniversityMelbourneVIC 3001Australia Department of Information Technology College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia Department of Library and Information Science Fu Jen Catholic UniversityNew Taipei City24205TaiwanChina Department of Computer Science and Information Engineering Asia UniversityTaichung City41354TaiwanChina
information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data commu... 详细信息
来源: 评论
Review of Steganography and Cryptography: Tools for Covert communications
收藏 引用
International Journal of Network Security 2025年 第2期27卷 431-438页
作者: Fatima, Kanza Wu, Nan-I Chan, Chi-Shiang Hwang, Min-Shiang Department of Computer Science and Information Engineering Asia University Taichung41354 Taiwan Department of Information Management Lunghwa University of Science and Technology Taiwan Department of Artificial intelligence Asia University Taiwan
In today’s rapidly evolving digital media landscape, safeguarding content privacy and preventing unauthorized access to copyrighted material are major challenges. Cryptography plays a crucial role in modern digital m... 详细信息
来源: 评论
TokenLink: a secure loyalty point exchange system powered by smart contracts
收藏 引用
International Journal of computers and Applications 2024年 第3期46卷 152-166页
作者: Suhagiya, Hartik Mistry, Hrithik Trivedi, Aryan Mangrulkar, Ramchandra Chavan, Pallavi Department of Computer Engineering Dwarkadas J. Sanghvi College of Engineering Maharashtra Mumbai India Department of Information Technology DY Patil's Ramrao Adik Institute of Technology Navi Mumbai India
Loyalty initiatives refer to the rewards offered by a business to customers who make recurring purchases. Traditional loyalty programmes, on the other hand, have numerous disadvantages, including low redemption rates,... 详细信息
来源: 评论
An efficient Manuka honey purity classification technique with FSVM
An efficient Manuka honey purity classification technique wi...
收藏 引用
2024 IEEE International Conference on Computing, Applications and Systems, COMPAS 2024
作者: Huma, Shafia Nur Akter, Sabrina Akter, Subrina Nafisa, Nuren Patwary, M. Jamshed Alam International Islamic University Chittagong Department of Computer Science and Engineering Chittagong Bangladesh Chittagong University of Engineering and Technology Institute of Information and Communication Technology Chittagong Bangladesh
Manuka honey is renowned for its exceptional medicinal properties in healing wound infections and other conditions. Due to its high cost, this honey is a common target for fraud. Several machine-learning techniques ar... 详细信息
来源: 评论
Exploring Large Scale Docker Image Vulnerability and Storage Performance Analysis Using High Performance Container-Based Docker Environment
Exploring Large Scale Docker Image Vulnerability and Storage...
收藏 引用
2024 International Conference on System, Computation, Automation and Networking, ICSCAN 2024
作者: Kavya Sri, B. Mahalakshmi, K. Anna University Faculty of Information and Communication Engineering Chennai India Kit - Kalaignarkarunanidhi Institute of Technology Department of Computer Science and Engineering Coimbatore India
In modern cloud environments, Docker containers have become a cornerstone for efficient application deployment, enabling microservices architectures and seamless scalability. However, large-scale Docker environments p... 详细信息
来源: 评论
Abnormal Activity Detection and Classification of Bus Passengers with In-Vehicle Image Sensing
收藏 引用
IEEE Access 2024年 12卷 23057-23065页
作者: Lin, Huei-Yung Tseng, Chun-Han National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106 Taiwan National Chung Cheng University Department of Electrical Engineering Chiayi621 Taiwan
As the self-driving technology is getting mature for public transportation applications, the safety concern of onboard passengers has become an important issue. It is essential to identify inappropriate or hazardous b... 详细信息
来源: 评论