咨询与建议

限定检索结果

文献类型

  • 3,163 篇 会议
  • 2,857 篇 期刊文献
  • 87 册 图书

馆藏范围

  • 6,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,743 篇 工学
    • 2,379 篇 计算机科学与技术...
    • 1,929 篇 软件工程
    • 845 篇 控制科学与工程
    • 750 篇 信息与通信工程
    • 539 篇 电气工程
    • 466 篇 生物工程
    • 451 篇 电子科学与技术(可...
    • 423 篇 生物医学工程(可授...
    • 342 篇 机械工程
    • 321 篇 光学工程
    • 284 篇 仪器科学与技术
    • 163 篇 动力工程及工程热...
    • 154 篇 化学工程与技术
    • 140 篇 交通运输工程
    • 123 篇 安全科学与工程
    • 119 篇 网络空间安全
  • 2,124 篇 理学
    • 955 篇 数学
    • 716 篇 物理学
    • 537 篇 生物学
    • 305 篇 系统科学
    • 295 篇 统计学(可授理学、...
    • 194 篇 化学
  • 924 篇 管理学
    • 616 篇 管理科学与工程(可...
    • 332 篇 图书情报与档案管...
    • 266 篇 工商管理
  • 471 篇 医学
    • 392 篇 临床医学
    • 318 篇 基础医学(可授医学...
    • 204 篇 药学(可授医学、理...
    • 170 篇 公共卫生与预防医...
  • 136 篇 法学
    • 113 篇 社会学
  • 96 篇 经济学
  • 83 篇 教育学
  • 80 篇 农学
  • 16 篇 艺术学
  • 14 篇 文学
  • 11 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 199 篇 deep learning
  • 188 篇 machine learning
  • 124 篇 control systems
  • 123 篇 accuracy
  • 121 篇 artificial intel...
  • 105 篇 feature extracti...
  • 101 篇 computational mo...
  • 86 篇 internet of thin...
  • 77 篇 optimization
  • 73 篇 training
  • 72 篇 real-time system...
  • 64 篇 predictive model...
  • 63 篇 neural networks
  • 58 篇 support vector m...
  • 56 篇 convolutional ne...
  • 55 篇 computer science
  • 54 篇 genetic algorith...
  • 54 篇 robustness
  • 53 篇 image segmentati...
  • 51 篇 security

机构

  • 97 篇 institut univers...
  • 96 篇 north-west unive...
  • 92 篇 tno technical sc...
  • 91 篇 national centre ...
  • 90 篇 infn sezione di ...
  • 89 篇 université de st...
  • 83 篇 nikhef national ...
  • 82 篇 ncsr demokritos ...
  • 79 篇 infn sezione di ...
  • 79 篇 university of jo...
  • 78 篇 infn sezione di ...
  • 75 篇 infn sezione di ...
  • 73 篇 university moham...
  • 70 篇 university würzb...
  • 67 篇 infn sezione di ...
  • 66 篇 università di ca...
  • 59 篇 university moham...
  • 59 篇 western sydney u...
  • 57 篇 university of am...
  • 55 篇 leiden universit...

作者

  • 99 篇 ferrara g.
  • 99 篇 ardid m.
  • 98 篇 calvo d.
  • 96 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 87 篇 coleiro a.
  • 87 篇 gozzini s.r.
  • 87 篇 dallier r.
  • 87 篇 enzenhöfer a.
  • 85 篇 celli s.
  • 84 篇 boettcher m.
  • 82 篇 carretero v.
  • 81 篇 dornic d.
  • 79 篇 bendahman m.
  • 78 篇 brunner j.
  • 77 篇 cherubini s.
  • 76 篇 di palma i.

语言

  • 5,112 篇 英文
  • 955 篇 其他
  • 34 篇 中文
  • 9 篇 日文
  • 8 篇 德文
  • 5 篇 法文
  • 3 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Control and Computer Engineering Faculty of Engineering and Computing"
6107 条 记 录,以下是361-370 订阅
排序:
Traffic Management in Internet of Vehicles Using Improved Ant Colony Optimization
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5379-5393页
作者: Abida Sharif Imran Sharif Muhammad Asim Saleem Muhammad Attique Khan Majed Alhaisoni Marriam Nawaz Abdullah Alqahtani Ye Jin Kim Byoungchol Chang Department of Computer Science COMSATS University IslamabadPakistan Faculty of Computing Riphah International UniversityFaisalabadPakistan Department of Computer Science HITEC UniversityTaxilaPakistan Computer Sciences Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Science UET TaxilaTaxilaPakistan Department of Software Engineering UET TaxilaTaxilaPakistan Software Engineering Department College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityP.O.Box 151Al-Kharj11942KSA Department of Computer Science Hanyang UniversitySeoul04763Korea Center for Computational Social Science Hanyang UniversitySeoul04763Korea
The Internet of Vehicles(IoV)is a networking paradigm related to the intercommunication of vehicles using a *** a dynamic network,one of the key challenges in IoV is traffic management under increasing vehicles to avo... 详细信息
来源: 评论
Optimization Techniques in University Timetabling Problem:Constraints,Methodologies,Benchmarks,and Open Issues
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6461-6484页
作者: Abeer Bashab Ashraf Osman Ibrahim Ibrahim Abakar Tarigo Hashem Karan Aggarwal Fadhil Mukhlif Fuad A.Ghaleb Abdelzahir Abdelmaboud Faculty of Computer Science&Information Technology Alzaiem Alazhari University13311KhartoumSudan Faculty Computing and Informatics Universiti Malaysia SabahKota Kinabalu88400SabahMalaysia Department of Computer Science University of SharjahSharjah27272United Arab Emirates Electronic and Communication Engineering Department Maharishi Markandeshwar Deemed to be UniversityMullanaAmbala133207HaryanaIndia Information Assurance and Security Research Group(IASRG) School of ComputingFaculty of EngineeringUniversiti Teknologi Malaysia81310JohorMalaysia Department of Information Systems King Khaled UniversityMuhayel61913AseerSaudi Arabia
University timetabling problems are a yearly challenging task and are faced repeatedly each *** problems are considered nonpolynomial time(NP)and combinatorial optimization problems(COP),which means that they can be s... 详细信息
来源: 评论
Secure Image Communication Using Galois Field,Hyper 3D Logistic Map,and B92 Quantum Protocol
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 4435-4463页
作者: De Rosal Ignatius Moses Setiadi Nova Rijati Ahmad Rofiqul Muslikh Bonifacius Vicky Indriyono Aceng Sambas Faculty of Computer Science Universitas Dian NuswantoroSemarang50131Central JavaIndonesia Research Center for Quantum Computing and Materials Informatics Faculty of Computer ScienceUniversitas Dian NuswantoroSemarang50131Central JavaIndonesia Faculty of Information Technology Universitas MerdekaMalang65146East JavaIndonesia Faculty of Economics and Business Universitas STRADA IndonesiaKediri64133East JavaIndonesia Faculty of Informatics and Computing Universiti Sultan Zainal AbidinCampus BesutBesut22200TerengganuMalaysia Department of Mechanical Engineering Universitas Muhammadiyah TasikmalayaTamansari GobrasTasikmalaya46196Indonesia
In this paper,we propose a novel secure image communication system that integrates quantum key distribution and hyperchaotic encryption techniques to ensure enhanced security for both key distribution and plaintext **... 详细信息
来源: 评论
A Deep and Systematic Review of the Intrusion Detection Systems Based on Machine Learning and Deep Learning Techniques  10
A Deep and Systematic Review of the Intrusion Detection Syst...
收藏 引用
10th International Conference on Advanced computing and Communication Systems, ICACCS 2024
作者: Guhan, N.K. Ravindran, Sindhu Ramachandran, M. Vijean, Vikneswaran Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Chennai India Universiti Malaysia Perlis Kampus Alam UniMAP Faculty of Electronic Engineering & Technology Arau Pauh Putra Perlis Malaysia
Intrusion detection systems are the primitive elements in safeguarding vital infrastructures, which are able to identify malicious activity on hosts or networks. The efficient IDS must be able to handle a variety of t... 详细信息
来源: 评论
Improving the review classification of Google apps using combined feature embedding and deep convolutional neural network model
收藏 引用
Journal of Ambient Intelligence and Humanized computing 2023年 第4期14卷 4257-4272页
作者: Aslam, Naila Alzamzami, Ohoud Xia, Kewen Sadiq, Saima Umer, Muhammad Bisogni, Carmen Ashraf, Imran School of Electronics and Information Engineering Hebei University of Technology Tianjin China Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia Department of Computer Science Khwaja Fareed University of Engineering and Information Technology Rahim Yar Khan Pakistan Department of Computer Science Information Technology The Islamia University of Bahawalpur Bahawalpur Pakistan Department of Computer Science University of Salerno Fisciano Italy Information and Communication Engineering Yeungnam University Gyeongsan Korea Republic of
Online reviews play an integral part in making mobile applications stand out from the large number of applications available on the Google Play store. Predominantly, users consider posted reviews for appropriate app s... 详细信息
来源: 评论
High-performance and Multi-functional control of Transformerless Single-phase Smart Inverter for Grid-connected PV System
收藏 引用
Journal of Modern Power Systems and Clean Energy 2021年 第6期9卷 1386-1394页
作者: Kamran Zeb Saif Ul Islam Waqar Uddin Imran Khan Muhammad Ishfaq Tiago Davi Curi Busarello H.J.Kim Department of Electrical Engineering Pusan National University School of Electrical Engineering and Computer Science National University of Sciences and Technology Department of Control Automation and Computing EngineeringFederal University of Santa Catarina Blumenau
Highly reliable and flexible control is required for distributed generation(DG) to efficiently connect to the *** inverters play a key role in the control and integration of DG into the power grid and provide advanced... 详细信息
来源: 评论
RubberMate - Integrated Platform for Rubber Crop Harvest and Production  5
RubberMate - Integrated Platform for Rubber Crop Harvest and...
收藏 引用
5th International Conference on Advancements in computing, ICAC 2023
作者: Perera, K.A.Y. Mandawela, M.K.C.N. Nilumika, H.L.G. Rasanjana, A.H.P. Mahaadikara, M.M.D.J.T. Hettiarachchi, Sathira Sri Lanka Institute of Information Technology Faculty of Computing Department of Computer Systems Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Computing Department of Information Technology Malabe Sri Lanka
Rubber cultivation plays a vital role in the global economy as a primary natural rubber source necessitates efficient plantation management for sustainability and latex quality. This paper introduces an integrated mob... 详细信息
来源: 评论
Optimizing Thermo-Electric Generation with Quasi-Z-Source Converter in Energy Harvesting for Wearable Devices  3
Optimizing Thermo-Electric Generation with Quasi-Z-Source Co...
收藏 引用
3rd International Conference on Mechatronics and Automation Technology, ICMAT 2024
作者: Lotfy, Mostafa Wageh Hussein, Aziza I. Dept. of Process Control Technology Faculty of Technology and Education Beni-Suef University Beni-Suef Egypt Electrical and Computer Engineering Department College of Engineering Effat University Jeddah Saudi Arabia
Recent advances in semiconductors industry and microelectronics have created new opportunities for integrating various technologies in energy harvesting projects. These advancements have simplified the process of capt... 详细信息
来源: 评论
Collaborative learning-based inter-dependent task dispatching and co-location in an integrated edge computing system
收藏 引用
Digital Communications and Networks 2024年 第6期10卷 1837-1850页
作者: Uchechukwu Awada Jiankang Zhang Sheng Chen Shuangzhi Li Shouyi Yang School of Software Henan Institute of Science and TechnologyXinxiang 453003China School of Electrical and Information Engineering Zhengzhou UniversityZhengzhou 450001China Department of Computing and Informatics Bournemouth UniversityPoole BH125BBUK School of Electronics and Computer Science University of SouthamptonSouthampton SO171BJUK Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266100China
Recently,several edge deployment types,such as on-premise edge clusters,Unmanned Aerial Vehicles(UAV)-attached edge devices,telecommunication base stations installed with edge clusters,etc.,are being deployed to enabl... 详细信息
来源: 评论
Fortifying Database Security: Integrating Advanced Honeypot Technology for Resilient SQL Injection Defense
Fortifying Database Security: Integrating Advanced Honeypot ...
收藏 引用
2024 International Conference on Communication, computer Sciences and engineering, IC3SE 2024
作者: Kumaran, U. Swetha, Thammisetty Reddy, G. S. N. Santhosh Ala, Harini Nagarajan, Senthil Murugan Umah, B. Amrita School Of Computing Department Of Computer Science & Engineering Amrita Vishwa Vidyapeetham Bengaluru India Andhra Pradesh Madanapalle India Amrita School Of Engineering Amrita Vishwa Vidyapeetham Department Of Electronics And Communication Engineering Karnataka Bengaluru India University Of Luxembourg Department Of Mathematics Faculty Of Science Technology And Medicine L-4365 Luxembourg Amrita School Of Engineering Amrita Vishwa Vidyapeetham Department Of Computer Science & Engineering Karnataka Bengaluru India
The dynamic nature of cyber threats necessitates the development of novel approaches to strengthen database system security. The novel method for fortifying defenses against SQL injection attacks - a pervasive and ong... 详细信息
来源: 评论