咨询与建议

限定检索结果

文献类型

  • 909 篇 会议
  • 559 篇 期刊文献
  • 59 册 图书

馆藏范围

  • 1,527 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 968 篇 工学
    • 783 篇 计算机科学与技术...
    • 648 篇 软件工程
    • 194 篇 信息与通信工程
    • 134 篇 控制科学与工程
    • 107 篇 生物工程
    • 103 篇 电气工程
    • 83 篇 生物医学工程(可授...
    • 69 篇 电子科学与技术(可...
    • 64 篇 光学工程
    • 63 篇 化学工程与技术
    • 51 篇 机械工程
    • 44 篇 动力工程及工程热...
    • 43 篇 建筑学
    • 37 篇 土木工程
    • 32 篇 交通运输工程
    • 31 篇 材料科学与工程(可...
  • 501 篇 理学
    • 292 篇 数学
    • 122 篇 生物学
    • 92 篇 物理学
    • 86 篇 统计学(可授理学、...
    • 59 篇 化学
    • 55 篇 系统科学
  • 339 篇 管理学
    • 194 篇 图书情报与档案管...
    • 157 篇 管理科学与工程(可...
    • 69 篇 工商管理
  • 104 篇 医学
    • 84 篇 临床医学
    • 65 篇 基础医学(可授医学...
    • 44 篇 药学(可授医学、理...
    • 34 篇 公共卫生与预防医...
  • 35 篇 法学
    • 30 篇 社会学
  • 20 篇 教育学
  • 20 篇 农学
  • 17 篇 经济学
  • 7 篇 文学
  • 3 篇 哲学
  • 2 篇 历史学
  • 1 篇 军事学

主题

  • 67 篇 artificial intel...
  • 60 篇 computer science
  • 59 篇 knowledge engine...
  • 43 篇 data mining
  • 42 篇 semantics
  • 33 篇 deep learning
  • 32 篇 machine learning
  • 29 篇 computational mo...
  • 29 篇 accuracy
  • 27 篇 ontologies
  • 27 篇 training
  • 25 篇 information stor...
  • 23 篇 feature extracti...
  • 21 篇 information syst...
  • 21 篇 knowledge manage...
  • 21 篇 technological in...
  • 20 篇 support vector m...
  • 20 篇 educational inst...
  • 19 篇 image segmentati...
  • 19 篇 computational in...

机构

  • 87 篇 college of compu...
  • 73 篇 lovely professio...
  • 45 篇 key laboratory o...
  • 30 篇 institute of aer...
  • 26 篇 beijing key labo...
  • 25 篇 lloyd institute ...
  • 22 篇 institute of aer...
  • 21 篇 school of comput...
  • 17 篇 department of co...
  • 16 篇 school of comput...
  • 16 篇 global knowledge...
  • 15 篇 department of da...
  • 14 篇 lloyd institute ...
  • 14 篇 school of artifi...
  • 13 篇 school of inform...
  • 13 篇 department of co...
  • 12 篇 key laboratory o...
  • 12 篇 lloyd law colleg...
  • 12 篇 department of ma...
  • 11 篇 knowledge park i...

作者

  • 22 篇 sun geng
  • 20 篇 niyato dusit
  • 18 篇 nürnberger andre...
  • 17 篇 olfa nasraoui
  • 16 篇 li jiahui
  • 16 篇 nasraoui olfa
  • 15 篇 amit joshi
  • 15 篇 praveen
  • 14 篇 chang yi
  • 14 篇 wang jiacheng
  • 13 篇 wu xindong
  • 13 篇 liang yanchun
  • 13 篇 chatterjee soumi...
  • 11 篇 he jun
  • 11 篇 nijhawan ginni
  • 11 篇 du xiaoyong
  • 11 篇 asha v.
  • 11 篇 nilanjan dey
  • 11 篇 fürnkranz johann...
  • 10 篇 liu hongyan

语言

  • 1,459 篇 英文
  • 53 篇 其他
  • 14 篇 中文
  • 1 篇 日文
检索条件"机构=Department of Knowledge Engineering and Computer Science"
1527 条 记 录,以下是11-20 订阅
排序:
Enhancing Kidney Stone Detection in CT scans with Image Processing and the DCNN-RELM Model  3
Enhancing Kidney Stone Detection in CT scans with Image Proc...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Prabakaran, Manjula Zakaria, Jesmin Kannan, S. Santhiya, P. Rajasekar, P. Rathnamma, M.V. Andhra Pradesh India NSHM Knowledge Campus West Bengal Durgapur India Dhanalakshmi Srinivasan University School of Engineering and Technology Department of Computer Science and Engineering Tamilnadu Trichy India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India Klm College of Engineering for Women Department of Cse Andhra Pradesh Kadapa India
CT of the urinary system, abdomen, and kidneys appears to improve kidney stone screening and identification. Segmentation and categorization are essential for kidney stone identification and management. This work deve... 详细信息
来源: 评论
Dual-level Mixup for Graph Few-shot Learning with Fewer Tasks  34
Dual-level Mixup for Graph Few-shot Learning with Fewer Task...
收藏 引用
34th ACM Web Conference, WWW 2025
作者: Liu, Yonghao Li, Mengyu Giunchiglia, Fausto Huang, Lan Li, Ximing Feng, Xiaoyue Guan, Renchu College of Computer Science and Technology Jilin University Changchun China Department of Information Engineering and Computer Science University of Trento Trento Italy Key Laboratory of Symbolic Computation and Knowledge Engineering of the Ministry of Education China
Graph neural networks have been demonstrated as a powerful paradigm for effectively learning graph-structured data on the web and mining content from it. Current leading graph models require a large number of labeled ... 详细信息
来源: 评论
Chaos-Based Novel Watermarked Satellite Image Encryption Scheme
收藏 引用
computer Modeling in engineering & sciences 2025年 第4期143卷 1049-1070页
作者: Mohamed Medani Yahia Said Nashwan Adnan Othman Farrukh Yuldashev Mohamed Kchaou Faisal Khaled Aldawood Bacha Rehman Applied College of Muhayil Aseer King Khalid UniversityAbha62529Saudi Arabia Center for Scientific Research and Entrepreneurship Northern Border UniversityArar73213Saudi Arabia Department of Computer Engineering College of EngineeringKnowledge UniversityErbil44001Iraq Department of Computer Engineering Al-Kitab UniversityAltun Kupri36001Iraq Department of Informatics and Its Teaching Methods Tashkent State Pedagogical UniversityTashkent100070Uzbekistan Department of Industrial Engineering College of EngineeringUniversity of BishaBishaP.O.Box 001Saudi Arabia Department of Computer Science Solent UniversitySouthamptonSO140YNUK
Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of *** ensure the security and privacy of these images,theymust be watermarked and encrypted before **... 详细信息
来源: 评论
Gupacker: Generalized Unpacking Framework for Android Malware
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4338-4352页
作者: Zheng, Tao Hou, Qiyu Chen, Xingshu Ren, Hao Li, Meng Li, Hongwei Shen, Changxiang Sichuan University School of Cyber Science and Engineering Chengdu610065 China Sichuan University School of Cyber Science and Engineering Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Intelligent Interconnected Systems Laboratory of Anhui Province School of Computer Science and Information Engineering Hefei230002 China University of Padua Department of Mathematics HIT Center Padua35131 Italy University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Sichuan University Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China
Android malware authors often use packers to evade analysis. Although many unpacking tools have been proposed, they face two significant challenges: 1) They are easily impeded by anti-analysis techniques employed by p... 详细信息
来源: 评论
Blockchain-Based IoMT Security: BSHS-EODL Method for Secure Data Storage and Analysis  3
Blockchain-Based IoMT Security: BSHS-EODL Method for Secure ...
收藏 引用
3rd International Conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Rajak, Biru Shailaja, M. Al-Dabagh, Mustafa Zuhaer Nayef Mohammed, Ali Ali Saber Alazzam, Malik Bader Ponni Valavan, M. Asansol Girls' College Kazi Nazrul University Department of Computer Science Asansol India Hyderabad India College of Science Knowledge University Department of Computer Science Erbil Iraq Al Kitab University Department of Computer Engineering Kirkuk Iraq Jadara University Faculty of Information Technology Irbid Jordan K. Ramakrishnan College of Engineering Department of Ai & Ds Trichy India
The integration of the Internet of Medical Things (IoMT) has revolutionized healthcare by improving patient care and system efficiency. However, this progress introduces significant concerns about data security and pr... 详细信息
来源: 评论
Real-Time Myanmar Hand Gestures Recognition Using Deep Learning Models  8th
Real-Time Myanmar Hand Gestures Recognition Using Deep Learn...
收藏 引用
8th International Conference on Intelligent Technologies, ICIT 2023
作者: Kyaw, Nwe Ni Mitra, Pabitra Sinha, G.R. Department of Computer Science and Engineering Indian Institute of Technology Kharagpur West Bengal721302 India Indian Knowledge System Lab International Institute of Information Technology Bangalore Karnataka Bengaluru560100 India
The proposed system for recognizing Myanmar sign language between individuals who are deaf. The aim of this study is to develop deep learning models for the purpose of accurately identifying dynamic hand gesture image... 详细信息
来源: 评论
Improving Multi-Factor Authentication Security with Deep Learning-Based User Behaviour Analysis  3
Improving Multi-Factor Authentication Security with Deep Lea...
收藏 引用
3rd International Conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Alnafea, Fahad Sulaiman Mohammed Sengar, Alok Singh Hamid, Noor Kaylan Selladurai, Kuttimarks Muthu Hassan, Sharmeen Izzat Saravanakumar, R. College of Business and Economics Qassim University Department of Accounting Buraydah Saudi Arabia Haridwar University Department of Computer Science & Engineering Roorkee India Al Kitab University Department of Computer Education Kirkuk Iraq Shivajirao S. Jondhle College of Engineering and Technology Asangaon India College of Engineering Knowledge University Department of Computer Engineering Erbil Iraq Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Department of Ece Chennai India
With growing frequency and sophistication of cyber threats, there is an urgent need for more adaptive, secure multi-factor authentication systems. Traditional approaches often tend to make static factor-based authenti... 详细信息
来源: 评论
Accurate, Secure, and Efficient Semi-Constrained Navigation Over Encrypted City Maps
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2642-2658页
作者: Li, Meng Chen, Yifei Gao, Jianbo Wu, Jingyu Zhang, Zijian He, Jialing Zhu, Liehuang Conti, Mauro Lin, Xiaodong Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Hefei230002 China Hefei University of Technology School of Computer Science and Information Engineering Hefei230002 China Hefei University of Technology Anhui Province Key Laboratory of Industry Safety and Emergency Technology Intelligent Interconnected Systems Laboratory of Anhui Province Hefei230002 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100811 China University of Science and Technology of China School of Computer Science and Technology Hefei230026 China Beijing Institute of Technology Southeast Institute of Information Technology Fujian Putian351100 China Chongqing University College of Computer Science Chongqing400044 China University of Padua Department of Mathematics HIT Center Padua35131 Italy Delft University of Technology Faculty of Electrical Engineering Mathematics and Computer Science Delft2628 CD Netherlands University of Guelph School of Computer Science GuelphONN1G 2W1 Canada
Navigation services enable users to find the shortest path from a starting point S to a destination D, reducing time, gas, and traffic congestion. Still, navigation users risk the exposure of their sensitive location ... 详细信息
来源: 评论
Hybrid Classification Model Development for Enhancement the Data Driven Based Human Falling Detection Performance  3rd
Hybrid Classification Model Development for Enhancement the ...
收藏 引用
3rd International Conference on Machine Learning, Cloud Computing and Intelligent Mining, MLCCIM 2024
作者: Ahmed, Saadaldeen Rashid Fadel, Hala Adnan. Ismael, Omar Ayad Sulaiman, Sazan Kamal Mahdi, Nidhal Raoof Ahmed, NoorUlhuda S. Abubaker, Brwa Abdulrahman Hussain, Abadal-Salam T. Artificial Intelligence Engineering Department College of Engineering Alayan University Nasiriyah Iraq Department of Laser Optoelectronic Engineering/Al-Ma’moon University College/Al-Washash Baghdad Iraq Department of Computer Science College of Sciences University of Diyala Diyala Iraq Department of Computer Engineering College of Engineering Knowledge University Erbil44001 Iraq Medical Laboratories Techniques Al Hikma University College Baghdad Iraq College of Medicine University of Al-Ameed PO Box 198 Karbala Iraq Computer Science Department Bayan University Kurdistan Erbil Iraq Department of Medical Instrumentation Techniques Engineering Technical Engineering College Al-Kitab University Altun Kupri Kirkuk Iraq
It is thus important to identify the cause of a fall in order to be able to protect the lives of people, especially the elderly and hospitalized patients who are most likely to fall. Three fall detection models are co... 详细信息
来源: 评论
Innovative Approaches to the Use of Multifunctional Materials in Building Envelopes  7th
Innovative Approaches to the Use of Multifunctional Material...
收藏 引用
7th International Conference on Construction, Real Estate, Infrastructure, and Project Management, ICCRIP 2023
作者: Kumari, Soni Suresh Kumar, R. Abhishek, Kumar Pathak, B.N. Nijhawan, Ginni Khayoon, Ali Talib Rajalakshmi, B. Kalra, Ravi Department of Mechanical Engineering GLA University UP Mathura India Department of Civil Engineering Institute of Aeronautical Engineering Hyderabad500043 India Gujarat Ahmedabad380026 India Department of Mechanical Engineering IMS Engineering College Ghaziabad India Lovely Professional University Panjab Phagwara India College of Engineering Technology National University of Science and Technology Dhi Qar Iraq Department of Computer Science New Horizon College of Engineering Bangalore India Lloyd Institute of Engineering and Technology Knowledge Park II Uttar Pradesh Greater Noida201306 India
Multifunctional materials have become a hot topic in building envelope design due to their ability to simultaneously perform several functions such as structural support, insulation, energy harvesting, and storage. Th... 详细信息
来源: 评论