咨询与建议

限定检索结果

文献类型

  • 4,319 篇 会议
  • 3,583 篇 期刊文献
  • 134 册 图书

馆藏范围

  • 8,036 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,786 篇 工学
    • 3,232 篇 计算机科学与技术...
    • 2,612 篇 软件工程
    • 1,183 篇 信息与通信工程
    • 913 篇 控制科学与工程
    • 650 篇 电气工程
    • 585 篇 电子科学与技术(可...
    • 544 篇 生物工程
    • 416 篇 生物医学工程(可授...
    • 414 篇 机械工程
    • 302 篇 光学工程
    • 255 篇 仪器科学与技术
    • 253 篇 动力工程及工程热...
    • 200 篇 化学工程与技术
    • 183 篇 安全科学与工程
    • 170 篇 网络空间安全
    • 158 篇 交通运输工程
  • 2,759 篇 理学
    • 1,329 篇 数学
    • 872 篇 物理学
    • 638 篇 生物学
    • 461 篇 统计学(可授理学、...
    • 356 篇 系统科学
    • 213 篇 化学
  • 1,329 篇 管理学
    • 907 篇 管理科学与工程(可...
    • 465 篇 图书情报与档案管...
    • 451 篇 工商管理
  • 539 篇 医学
    • 462 篇 临床医学
    • 358 篇 基础医学(可授医学...
    • 217 篇 公共卫生与预防医...
    • 194 篇 药学(可授医学、理...
  • 237 篇 法学
    • 190 篇 社会学
  • 150 篇 经济学
  • 107 篇 教育学
  • 107 篇 农学
  • 32 篇 文学
  • 22 篇 艺术学
  • 12 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 251 篇 deep learning
  • 206 篇 machine learning
  • 143 篇 computer science
  • 142 篇 feature extracti...
  • 138 篇 artificial intel...
  • 132 篇 computational mo...
  • 129 篇 internet of thin...
  • 123 篇 accuracy
  • 113 篇 information tech...
  • 105 篇 optimization
  • 102 篇 wireless sensor ...
  • 100 篇 predictive model...
  • 89 篇 information syst...
  • 88 篇 data mining
  • 86 篇 support vector m...
  • 83 篇 laboratories
  • 82 篇 real-time system...
  • 78 篇 neural networks
  • 75 篇 security
  • 75 篇 protocols

机构

  • 166 篇 faculty of scien...
  • 166 篇 departamento de ...
  • 166 篇 department for p...
  • 166 篇 department of ph...
  • 164 篇 department of ph...
  • 161 篇 faculté des scie...
  • 159 篇 yerevan physics ...
  • 157 篇 department of ph...
  • 157 篇 department of ph...
  • 157 篇 kirchhoff-instit...
  • 153 篇 department of ph...
  • 153 篇 institute of phy...
  • 147 篇 fakultät für phy...
  • 144 篇 national scienti...
  • 143 篇 institute of phy...
  • 140 篇 institut für ast...
  • 137 篇 department of ph...
  • 136 篇 department of ph...
  • 136 篇 physics division...
  • 136 篇 physikalisches i...

作者

  • 162 篇 c. alexa
  • 162 篇 j. m. izen
  • 162 篇 k. bos
  • 162 篇 g. bella
  • 162 篇 j. strandberg
  • 162 篇 d. calvet
  • 162 篇 c. amelung
  • 162 篇 h. a. gordon
  • 162 篇 g. spigo
  • 162 篇 e. hines
  • 162 篇 a. c. könig
  • 161 篇 f. siegert
  • 158 篇 m. klein
  • 158 篇 r. ströhmer
  • 158 篇 h. sakamoto
  • 158 篇 s. nektarijevic
  • 158 篇 m. rijssenbeek
  • 158 篇 f. marroquim
  • 158 篇 s. jin
  • 158 篇 g. gaudio

语言

  • 7,500 篇 英文
  • 460 篇 其他
  • 76 篇 中文
  • 9 篇 日文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Department of Information Technology and Systems Section Computer Engineering"
8036 条 记 录,以下是501-510 订阅
排序:
Yolo Based License Plate Detection of Triple Riders and Violators
Yolo Based License Plate Detection of Triple Riders and Viol...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Nandhakumar, R.G. Devi, K. Nirmala Krishnamoorthy, N. Shanthi, S. Pranesh, V.R. Nikhalyaa, S. Kongu Enginering College Perundurai Department of Computer Science and Engineering Tamilnadu Erode India Vellore Institutte of Technology School of Information and Engineering Department of Software Systems and Engineering Vellore India
Road safety is of prime importance as road accidents are among the biggest causes of deaths in the country. Road Accidents are majorly due to violators and lawbreakers of road safety rules like not wearing helmets, tr... 详细信息
来源: 评论
Advancements in Fake News Detection: A Comprehensive Machine Learning Approach Across Varied Datasets
收藏 引用
SN computer Science 2024年 第5期5卷 583页
作者: Aslam, Adeel Abid, Fazeel Rasheed, Jawad Shabbir, Anza Murtaza, Manahil Alsubai, Shtwai Elkiran, Harun National College of Business Administration and Economics Lahore Pakistan Department of Information Systems University of Management and Technology Lahore Pakistan Department of Computer Engineering Istanbul Sabahattin Zaim University Istanbul Turkey Department of Computer Science College of Computer Engineering and Sciences in Al-Kharj Prince Sattam Bin Abdulaziz University Al-Kharj 11942 Saudi Arabia
Fake news has become a major social problem in the current period, controlled by modern technology and the unrestricted flow of information across digital platforms. The deliberate spread of inaccurate or misleading i... 详细信息
来源: 评论
An Automated Real-Time Face Mask Detection System Using Transfer Learning with Faster-RCNN in the Era of the COVID-19 Pandemic
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 4151-4166页
作者: Maha Farouk S.Sabir Irfan Mehmood Wafaa Adnan Alsaggaf Enas Fawai Khairullah Samar Alhuraiji Ahmed S.Alghamdi Ahmed A.Abd El-Latif Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversitySaudi Arabia Centre for Visual Computing Faculty of Engineering and InformaticsUniversity of BradfordBradfordU.K Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahP.O.Box 23713Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahSaudi Arabia Department of Mathematics and Computer Science Faculty of ScienceMenoufia University32511Egypt
Today,due to the pandemic of COVID-19 the entire world is facing a serious health *** to the World Health Organization(WHO),people in public places should wear a face mask to control the rapid transmission of *** gove... 详细信息
来源: 评论
Enhancing Data Security and Privacy in Cloud Computing: A Survey of Modern Techniques  3
Enhancing Data Security and Privacy in Cloud Computing: A Su...
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Suganya, N. Gouthami, P. Sathiya, R. Sivaranjani, S. Murugesan, M. Department of Computer Science and Business Systems Dr. N.G.P. Institute of Technology Coimbatore India Department of Information Technology Thangavelu Engineering College Chennai India Departement of Electrical and Electronics Engineering Sri Krishna College of Engineering and Technology Coimbatore India Departement of Electrical and Electronics Engineering Karpagam Institute of Technology Coimbatore India
A computing system that is based on the internet and offers users all resources as on-demand services. Servers, storage, databases, software, and networking are among these on-demand services. Usually, the user must p... 详细信息
来源: 评论
Teamwork Optimization with Deep Learning Based Fall Detection for IoT-Enabled Smart Healthcare System
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1353-1369页
作者: Sarah B.Basahel Saleh Bajaba Mohammad Yamin Sachi Nandan Mohanty E.Laxmi Lydia Department of Management Information Systems Faculty of Economics and AdministrationKing Abdulaziz UniversityJeddahSaudi Arabia Department of business Administration Faculty of Economics and AdministrationKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Management Information Systems Faculty of Economics and AdministrationKing Abdulaziz UniversityJeddah21589Saudi Arabia School of Computer Science&Engineering(SCOPE) VIT-AP UniversityAmaravatiAndhra PradeshIndia Department of Computer Science and Engineering GMR Institute of TechnologyAndhra PradeshRajam 532127India
The current advancement in cloud computing,Artificial Intelligence(AI),and the Internet of Things(IoT)transformed the traditional healthcare system into smart *** services could be enhanced by incorporating key techni... 详细信息
来源: 评论
Securing Multi-Tenant Cloud Environments with Fully Homomorphically Encrypted Secure Multiparty Computation
Securing Multi-Tenant Cloud Environments with Fully Homomorp...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering technology, ICRASET 2024
作者: Ponmalar, A. Pandiarajan, Rajkumar Sudha, I. Ramesh, P.S. Jagannathan, J. R.M.K. Engineering College Tamilnadu Chennai India School of Computing Kalasalingam Academy Of Research and Education Department of Information and Technology Krishnankoil Virudhunagar India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India
The aim of this work is to examine the application of FHE-SMPC as a viable security model for protecting the tenant isolation in multi-tenant cloud model. In multi-tenant environments, where various customers use the ... 详细信息
来源: 评论
Optimizing User Data Privacy and Confidentiality in Cloud Storage systems Through Advanced Obfuscrypt Encryption Methods for Enhanced Security and Efficient Data Protection
Optimizing User Data Privacy and Confidentiality in Cloud St...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering technology, ICRASET 2024
作者: Ramesh, P.S. Sudha, I. Jagannathan, J. Pandiarajan, Rajkumar Ponmalar, A. Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India Kalasalingam Academy Of Research and Education School of Computing Department of Information and Technology Krishnankoil Virudhunagar India R.M.K. Engineering College Tamilnadu Chennai India
With a steady increase in the adoption of cloud storage systems, the client's data are at risk of being leaked. There are several methods of encrypting data which are quite useful but they lack some of the feature... 详细信息
来源: 评论
A Novel Parallel Computing Confidentiality Scheme Based on Hindmarsh-Rose Model
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 1325-1341页
作者: Jawad Ahmad Mimonah Al Qathrady Mohammed SAlshehri Yazeed Yasin Ghadi Mujeeb Ur Rehman Syed Aziz Shah School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghEH105DTUK Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Computer Science Al Ain UniversityAbu Dhabi112612United Arab Emirates School of Science Technology and HealthYork St John UniversityYorkYO317EXUK Research Centre for Intelligent Healthcare Coventry UniversityCoventryCV15FBUK
Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this ***,given the limitations of computers,it becomes evenmore important to employ efficient and ... 详细信息
来源: 评论
Enhancing Healthcare Data Security in Cloud Computing systems through Advanced Homomorphic Encryption Techniques Integrated with Cuckoo Search Optimization Algorithm
Enhancing Healthcare Data Security in Cloud Computing System...
收藏 引用
2024 IEEE International Conference on Recent Advances in Science and engineering technology, ICRASET 2024
作者: Sudha, I. Ramesh, P.S. Ponmalar, A. Jagannathan, J. Pandiarajan, Rajkumar Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India R.M.K. Engineering College Tamilnadu Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India Kalasalingam Academy of Research and Education School of Computing Department of Information and Technology Krishnankoil Virudhunagar India
The studies in this research are focused on the mix of homomorphic encryption mechanisms and the Cuckoo Search Optimization Algorithm to promote the security of the healthcare data in the cloud computing system. I hav... 详细信息
来源: 评论
Secure and resilient improved image steganography using hybrid fuzzy neural network with fuzzy logic
收藏 引用
Journal of Safety Science and Resilience 2024年 第1期5卷 91-101页
作者: Sachin Dhawan Hemanta Kumar Bhuyan Subhendu Kumar Pani Vinayakumar Ravi Rashmi Gupta Arun Rana Alanoud Al Mazroa Dorset College King George BlvdSurreyBritish ColumbiaCanada Department of Information Technology Vignan’s Foundation for ScienceTechnology and Research(Deemed to be University)Andhra PradeshIndia Krupajal Computer Academy Biju Patnaik University of Technology(BPUT)Rourkela 751002India Center for Artificial Intelligence Prince Mohammad Bin Fahd UniversityKhobarSaudi Arabia NSUT East Campus(Formerly AIACTRDelhi 110031India(Affiliated to Guru Gobind Singh Inderaprastha University))Dwarka 110078India Department of Computer Science and Engineering Galgotias College of Engineering and Technology Greater Noida 201310Uttar PradeshIndia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman University(PNU)P.O.Box 84428Riyadh 11671Saudi Arabia
The exponential growth in communication networks,data technology,advanced libraries,and mainly World Wide Web services has played a pivotal role in facilitating the retrieval of various types of information as ***,thi... 详细信息
来源: 评论