咨询与建议

限定检索结果

文献类型

  • 4,286 篇 会议
  • 3,580 篇 期刊文献
  • 134 册 图书

馆藏范围

  • 8,000 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,749 篇 工学
    • 3,207 篇 计算机科学与技术...
    • 2,586 篇 软件工程
    • 1,177 篇 信息与通信工程
    • 907 篇 控制科学与工程
    • 650 篇 电气工程
    • 580 篇 电子科学与技术(可...
    • 541 篇 生物工程
    • 413 篇 生物医学工程(可授...
    • 410 篇 机械工程
    • 296 篇 光学工程
    • 255 篇 仪器科学与技术
    • 255 篇 动力工程及工程热...
    • 197 篇 化学工程与技术
    • 182 篇 安全科学与工程
    • 168 篇 网络空间安全
    • 157 篇 交通运输工程
  • 2,753 篇 理学
    • 1,326 篇 数学
    • 872 篇 物理学
    • 637 篇 生物学
    • 460 篇 统计学(可授理学、...
    • 356 篇 系统科学
    • 210 篇 化学
  • 1,327 篇 管理学
    • 902 篇 管理科学与工程(可...
    • 464 篇 图书情报与档案管...
    • 444 篇 工商管理
  • 540 篇 医学
    • 460 篇 临床医学
    • 360 篇 基础医学(可授医学...
    • 215 篇 公共卫生与预防医...
    • 194 篇 药学(可授医学、理...
  • 239 篇 法学
    • 191 篇 社会学
  • 150 篇 经济学
  • 107 篇 农学
  • 102 篇 教育学
  • 33 篇 文学
  • 22 篇 艺术学
  • 12 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 245 篇 deep learning
  • 207 篇 machine learning
  • 144 篇 computer science
  • 144 篇 feature extracti...
  • 144 篇 artificial intel...
  • 133 篇 computational mo...
  • 128 篇 internet of thin...
  • 116 篇 accuracy
  • 113 篇 information tech...
  • 105 篇 optimization
  • 100 篇 wireless sensor ...
  • 97 篇 predictive model...
  • 89 篇 information syst...
  • 88 篇 data mining
  • 85 篇 support vector m...
  • 84 篇 laboratories
  • 82 篇 real-time system...
  • 77 篇 neural networks
  • 77 篇 protocols
  • 76 篇 training

机构

  • 166 篇 faculty of scien...
  • 166 篇 departamento de ...
  • 165 篇 department for p...
  • 165 篇 department of ph...
  • 164 篇 department of ph...
  • 161 篇 faculté des scie...
  • 159 篇 yerevan physics ...
  • 157 篇 department of ph...
  • 157 篇 kirchhoff-instit...
  • 156 篇 department of ph...
  • 153 篇 department of ph...
  • 153 篇 institute of phy...
  • 147 篇 fakultät für phy...
  • 144 篇 national scienti...
  • 143 篇 institute of phy...
  • 140 篇 institut für ast...
  • 137 篇 department of ph...
  • 136 篇 department of ph...
  • 136 篇 physics division...
  • 136 篇 dsm/irfu cea sac...

作者

  • 162 篇 c. alexa
  • 162 篇 j. m. izen
  • 162 篇 k. bos
  • 162 篇 g. bella
  • 162 篇 j. strandberg
  • 162 篇 d. calvet
  • 162 篇 c. amelung
  • 162 篇 h. a. gordon
  • 162 篇 g. spigo
  • 162 篇 e. hines
  • 162 篇 a. c. könig
  • 161 篇 f. siegert
  • 158 篇 m. klein
  • 158 篇 r. ströhmer
  • 158 篇 h. sakamoto
  • 158 篇 s. nektarijevic
  • 158 篇 m. rijssenbeek
  • 158 篇 f. marroquim
  • 158 篇 s. jin
  • 158 篇 g. gaudio

语言

  • 7,619 篇 英文
  • 306 篇 其他
  • 75 篇 中文
  • 9 篇 日文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Department of Information Technology and Systems Section Computer Engineering"
8000 条 记 录,以下是31-40 订阅
排序:
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
A Comparison of Deep Learning and Machine Learning Methods for Water Quality Prediction  3
A Comparison of Deep Learning and Machine Learning Methods f...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Srinivasa Gupta, N. Valarmathi, B. Hiwanj, Ishaan Department of Manufacturing Engineering School of Mechanical Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Department of Information Technology School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India
Predicting water quality is essential to preserving human health and environmental sustainability. Traditional water quality assessment methods often face scalability and real-time monitoring limitations. With accurac... 详细信息
来源: 评论
Accurate Phase Detection for ZigBee Using Artificial Neural Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 2505-2518页
作者: Ali Alqahtani Abdulaziz A.Alsulami Saeed Alahmari Mesfer Alrizq Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia
The IEEE802.15.4 standard has been widely used in modern industry due to its several benefits for stability,scalability,and enhancement of wireless mesh *** standard uses a physical layer of binary phase-shift keying(... 详细信息
来源: 评论
Enhancing Automated Android Application Security through Hybrid Static and Dynamic Analysis Techniques  6
Enhancing Automated Android Application Security through Hyb...
收藏 引用
6th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2024
作者: Manukulasooriya, G.E. Munasingha, R.S.I. Fernando, Harinda Uthpali, H.K.I. Yeshani, A.V.S.H. Siriwardana, Deemantha Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
The rapid growth of mobile applications has led to serious security challenges, resulting in vulnerabilities. Automation in security testing methods is becoming popular, with the Automated Vulnerability Detection meth... 详细信息
来源: 评论
Fuzzy clustering for electric field characterization and its application to thunderstorm interpretability
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 299-307页
作者: Xu Yang Hongyan Xing Xinyuan Ji Wei Xu Witold Pedrycz School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing 210044China Department of Electrical and Computer Engineering University of AlbertaEdmonton AB T6G 2R3Canada Systems Research Institute Polish Academy of Sciences00-901 WarsawPoland Department of Computer Engineering Faculty of Engineering and Natural SciencesIstinye University34010 IstanbulTurkey
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS **... 详细信息
来源: 评论
Drone-Based Public Surveillance Using 3D Point Clouds and Neuro-Fuzzy Classifier
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4759-4776页
作者: Yawar Abbas Aisha Ahmed Alarfaj Ebtisam Abdullah Alabdulqader Asaad Algarni Ahmad Jalal Hui Liu Faculty of Computing and AI Air UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Information Technology College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Department of Computer Sciences Faculty of Computing and Information TechnologyNorthern Border UniversityRafha91911Saudi Arabia Department of Computer Science and Engineering College of InformaticsKorea UniversitySeoul02841Republic of Korea Cognitive Systems Lab University of BremenBremen28359Germany
Human Activity Recognition(HAR)in drone-captured videos has become popular because of the interest in various fields such as video surveillance,sports analysis,and human-robot ***,recognizing actions from such videos ... 详细信息
来源: 评论
A New Hybrid Model for Segmentation of the Skin Lesion Based on Residual Attention U-Net
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5177-5192页
作者: Saleh Naif Almuayqil Reham Arnous Noha Sakr Magdy M.Fadel Department of Information Systems College of Computer and Information SciencesJouf UniversitySakakaSaudi Arabia Department of Communications and Electronics Delta Higher Institute for Engineering and Technology(DHIET)MansouraEgypt Computers Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansouraEgypt
Skin segmentation participates significantly in various biomedical applications,such as skin cancer identification and skin lesion *** paper presents a novel framework for segmenting the *** framework contains two mai... 详细信息
来源: 评论
A State-Migration Particle Swarm Optimizer for Adaptive Latent Factor Analysis of High-Dimensional and Incomplete Data
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2220-2235页
作者: Jiufang Chen Kechen Liu Xin Luo Ye Yuan Khaled Sedraoui Yusuf Al-Turki MengChu Zhou IEEE the College of Computer Science and Technology Chongqing University of Posts and Telecommunications the Department of Computer Science Columbia University the College of Computer and Information Science Southwest University the Department of Electrical and Computer Engineering Faculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Center of Research Excellence in Renewable Energy and Power Systems the Department of Electrical and Computer EngineeringFaculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Department of Electrical and Computer Engineering New Jersey Institute of Technology
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation lear... 详细信息
来源: 评论
End-To-End Encryption Enabled Lightweight Mutual Authentication Scheme for Resource Constrained IoT Network
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 3223-3249页
作者: Shafi Ullah Haidawati Muhammad Nasir Kushsairy Kadir Akbar Khan Ahsanullah Memon Shanila Azhar Ilyas Khan Muhammad Ashraf Department of Computer Engineering Balochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Computer Engineering Section Malaysian Institute of Technology Universiti Kuala LumpurKuala Lumpur50250Malaysia Electrical Engineering Section Universiti Kuala LumpurBritish Malaysian InstituteSalengor53100Malaysia Electrical Engineering Department Mehran UniversityKhairpur-Mirs76062Pakistan Department of Mathematics College of Science Al-ZulfiMajmaah UniversityAl-Majmaah11952Saudi Arabia
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb... 详细信息
来源: 评论
A novel U-net model for brain tumor segmentation from MRI images
收藏 引用
Alexandria engineering Journal 2025年 126卷 220-230页
作者: Obayya, Marwa Alshuhail, Asma Mahmood, Khalid Alanazi, Meshari H. Alqahtani, Mohammed Aljehane, Nojood O. Almansour, Hamad Al-Hagery, Mohammed Abdullah Department of Biomedical Engineering College of Engineering Princess Nourah bint Abdulrahman University PO Box 84428 Riyadh11671 Saudi Arabia Department of Information Systems College of Computer Sciences & Information Technology King Faisal university Saudi Arabia Department of Information Systems Applied College at Mahayil King Khalid University Saudi Arabia Department of Computer Science College of Sciences Northern Border University Arar Saudi Arabia Department of Information System and Cyber Security College of Computing and Information Technology University of Bisha Bisha61922 Saudi Arabia Department of Computer Science Faculty of Computers and Information Technology University of Tabuk Tabuk Saudi Arabia Applied Collage Najran University Najran Saudi Arabia Department of Computer Science College of Computer Qassim University Saudi Arabia
Segmentation of brain tumors aids in diagnosing the disease early, planning treatment, and monitoring its progression in medical image analysis. Automation is necessary to eliminate the time and variability associated... 详细信息
来源: 评论