咨询与建议

限定检索结果

文献类型

  • 4,285 篇 会议
  • 3,552 篇 期刊文献
  • 134 册 图书

馆藏范围

  • 7,971 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,728 篇 工学
    • 3,193 篇 计算机科学与技术...
    • 2,578 篇 软件工程
    • 1,173 篇 信息与通信工程
    • 902 篇 控制科学与工程
    • 642 篇 电气工程
    • 578 篇 电子科学与技术(可...
    • 541 篇 生物工程
    • 411 篇 生物医学工程(可授...
    • 409 篇 机械工程
    • 294 篇 光学工程
    • 255 篇 仪器科学与技术
    • 254 篇 动力工程及工程热...
    • 197 篇 化学工程与技术
    • 180 篇 安全科学与工程
    • 168 篇 网络空间安全
    • 157 篇 交通运输工程
  • 2,741 篇 理学
    • 1,321 篇 数学
    • 868 篇 物理学
    • 634 篇 生物学
    • 456 篇 统计学(可授理学、...
    • 356 篇 系统科学
    • 209 篇 化学
  • 1,320 篇 管理学
    • 898 篇 管理科学与工程(可...
    • 463 篇 图书情报与档案管...
    • 441 篇 工商管理
  • 532 篇 医学
    • 453 篇 临床医学
    • 352 篇 基础医学(可授医学...
    • 210 篇 公共卫生与预防医...
    • 194 篇 药学(可授医学、理...
  • 234 篇 法学
    • 187 篇 社会学
  • 149 篇 经济学
  • 107 篇 农学
  • 99 篇 教育学
  • 33 篇 文学
  • 22 篇 艺术学
  • 12 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 244 篇 deep learning
  • 206 篇 machine learning
  • 144 篇 computer science
  • 143 篇 feature extracti...
  • 142 篇 artificial intel...
  • 133 篇 computational mo...
  • 127 篇 internet of thin...
  • 116 篇 accuracy
  • 113 篇 information tech...
  • 104 篇 optimization
  • 100 篇 wireless sensor ...
  • 97 篇 predictive model...
  • 89 篇 information syst...
  • 88 篇 data mining
  • 85 篇 support vector m...
  • 84 篇 laboratories
  • 82 篇 real-time system...
  • 77 篇 neural networks
  • 77 篇 protocols
  • 76 篇 training

机构

  • 166 篇 faculty of scien...
  • 166 篇 departamento de ...
  • 165 篇 department for p...
  • 165 篇 department of ph...
  • 164 篇 department of ph...
  • 161 篇 faculté des scie...
  • 159 篇 yerevan physics ...
  • 157 篇 department of ph...
  • 157 篇 kirchhoff-instit...
  • 156 篇 department of ph...
  • 153 篇 department of ph...
  • 153 篇 institute of phy...
  • 147 篇 fakultät für phy...
  • 144 篇 national scienti...
  • 144 篇 institute of phy...
  • 140 篇 institut für ast...
  • 137 篇 department of ph...
  • 137 篇 dsm/irfu cea sac...
  • 136 篇 department of ph...
  • 136 篇 physics division...

作者

  • 162 篇 c. alexa
  • 162 篇 j. m. izen
  • 162 篇 k. bos
  • 162 篇 g. bella
  • 162 篇 j. strandberg
  • 162 篇 d. calvet
  • 162 篇 c. amelung
  • 162 篇 h. a. gordon
  • 162 篇 g. spigo
  • 162 篇 e. hines
  • 162 篇 a. c. könig
  • 161 篇 f. siegert
  • 158 篇 m. klein
  • 158 篇 r. ströhmer
  • 158 篇 h. sakamoto
  • 158 篇 s. nektarijevic
  • 158 篇 m. rijssenbeek
  • 158 篇 f. marroquim
  • 158 篇 s. jin
  • 158 篇 g. gaudio

语言

  • 7,600 篇 英文
  • 296 篇 其他
  • 75 篇 中文
  • 9 篇 日文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Department of Information Technology and Systems Section Computer Engineering"
7971 条 记 录,以下是21-30 订阅
排序:
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 93-115页
作者: Shafi Ullah Sibghat Ullah Bazai Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed Department of Computer Engineering Balochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Department of Information Technology Balochistan University of Information TechnologyEngineeringand Management SciencesQuetta87300Pakistan Department of Information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Software Engineering College of ComputingRiphah International UniversityFaisalabad44000Pakistan Department of Electrical Engineering Balochistan University of Information Technology Engineeringand Management SciencesQuetta87300Pakistan Department of Mathematics College of Science Al-ZulfiMajmaah UniversityAl-Majmaah11952Saudi Arabia
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... 详细信息
来源: 评论
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5035-5048页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis... 详细信息
来源: 评论
Fault tolerance challenges in wearable computing for vital applications: a survey
收藏 引用
Journal of Medical engineering and technology 2024年 第2期48卷 48-63页
作者: Sepahvand, Majid Meqdad, Maytham N. Abdali-Mohammadi, Fardin Department of Computer Engineering and Information Technology Razi University Kermanshah Iran Department of Intelligent Medical Systems Al-Mustaqbal University Babil Hillah Iraq
Wearable computers can be used in different domains including healthcare. However, due to suffering from challenges such as faults their applications may be limited in real practice. So, in designing wearable devices,... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, Sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
Spatial Correlation Module for Classification of Multi-Label Ocular Diseases Using Color Fundus Images
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 133-150页
作者: Ali Haider Khan Hassaan Malik Wajeeha Khalil Sayyid Kamran Hussain Tayyaba Anees Muzammil Hussain Department of Software Engineering Faculty of Computer SciencesLahore Garrison UniversityLahorePakistan Department of Computer Science School of Systems and TechnologyUniversity of Management and TechnologyLahore54000Pakistan Department of Computer Science&Information Technology University of Engineering and Technology(UET)PeshawarPakistan Department of Computer Science TIMES InstituteMultan60000Pakistan Department of Software Engineering School of Systems and TechnologyUniversity of Management and TechnologyLahore54000Pakistan
To prevent irreversible damage to one’s eyesight,ocular diseases(ODs)need to be recognized and treated *** fundus imaging(CFI)is a screening technology that is both effective and *** to CFIs,the early stages of the d... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
Science China(information Sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
A Comparison of Deep Learning and Machine Learning Methods for Water Quality Prediction  3
A Comparison of Deep Learning and Machine Learning Methods f...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Srinivasa Gupta, N. Valarmathi, B. Hiwanj, Ishaan Department of Manufacturing Engineering School of Mechanical Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Department of Information Technology School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India
Predicting water quality is essential to preserving human health and environmental sustainability. Traditional water quality assessment methods often face scalability and real-time monitoring limitations. With accurac... 详细信息
来源: 评论