咨询与建议

限定检索结果

文献类型

  • 6,682 篇 会议
  • 5,650 篇 期刊文献
  • 226 册 图书

馆藏范围

  • 12,558 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,796 篇 工学
    • 5,706 篇 计算机科学与技术...
    • 4,635 篇 软件工程
    • 1,866 篇 信息与通信工程
    • 1,266 篇 控制科学与工程
    • 1,007 篇 生物工程
    • 942 篇 电气工程
    • 793 篇 电子科学与技术(可...
    • 751 篇 生物医学工程(可授...
    • 640 篇 机械工程
    • 550 篇 光学工程
    • 436 篇 仪器科学与技术
    • 410 篇 动力工程及工程热...
    • 372 篇 网络空间安全
    • 315 篇 安全科学与工程
    • 313 篇 化学工程与技术
  • 4,391 篇 理学
    • 2,058 篇 数学
    • 1,494 篇 物理学
    • 1,145 篇 生物学
    • 666 篇 统计学(可授理学、...
    • 484 篇 系统科学
    • 384 篇 化学
  • 2,367 篇 管理学
    • 1,475 篇 管理科学与工程(可...
    • 951 篇 图书情报与档案管...
    • 692 篇 工商管理
  • 899 篇 医学
    • 748 篇 临床医学
    • 623 篇 基础医学(可授医学...
    • 395 篇 公共卫生与预防医...
    • 347 篇 药学(可授医学、理...
  • 395 篇 法学
    • 310 篇 社会学
  • 265 篇 经济学
    • 264 篇 应用经济学
  • 198 篇 教育学
  • 184 篇 农学
  • 60 篇 文学
  • 43 篇 军事学
  • 33 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 450 篇 deep learning
  • 338 篇 machine learning
  • 231 篇 computer science
  • 220 篇 computational mo...
  • 218 篇 accuracy
  • 209 篇 internet of thin...
  • 206 篇 artificial intel...
  • 198 篇 feature extracti...
  • 170 篇 predictive model...
  • 163 篇 support vector m...
  • 160 篇 optimization
  • 153 篇 data mining
  • 150 篇 information tech...
  • 139 篇 software enginee...
  • 124 篇 real-time system...
  • 111 篇 computational in...
  • 111 篇 security
  • 107 篇 neural networks
  • 100 篇 covid-19
  • 98 篇 wireless sensor ...

机构

  • 287 篇 department for p...
  • 286 篇 department of ph...
  • 285 篇 faculty of scien...
  • 280 篇 departamento de ...
  • 275 篇 department of ph...
  • 271 篇 kirchhoff-instit...
  • 269 篇 department of ph...
  • 266 篇 department of ph...
  • 259 篇 faculté des scie...
  • 248 篇 fakultät für phy...
  • 246 篇 institute of phy...
  • 231 篇 yerevan physics ...
  • 231 篇 institut für ast...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 215 篇 department of ph...
  • 210 篇 department of ph...
  • 200 篇 institute of phy...
  • 197 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 263 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 257 篇 s. guindon
  • 250 篇 d. guest

语言

  • 11,756 篇 英文
  • 705 篇 其他
  • 93 篇 中文
  • 16 篇 日文
  • 4 篇 德文
  • 3 篇 法文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Department of Software Engineering Faculty of Computer Science and Information Technology"
12558 条 记 录,以下是821-830 订阅
排序:
Malicious URL Classification Using Artificial Fish Swarm Optimization and Deep Learning
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 607-621页
作者: Anwer Mustafa Hilal Aisha Hassan Abdalla Hashim Heba G.Mohamed Mohamed K.Nour Mashael M.Asiri Ali M.Al-Sharafi Mahmoud Othman Abdelwahed Motwakel Department of Electrical and Computer Engineering International Islamic University Malaysia 53100 Kuala LumpurMalaysia Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Electrical Engineering College of EngineeringPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Department of Computer Science College of Computers and Information TechnologyUniversity of BishaSaudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt
Cybersecurity-related solutions have become familiar since it ensures security and privacy against cyberattacks in this digital *** Uniform Resource Locators(URLs)can be embedded in email or Twitter and used to lure v... 详细信息
来源: 评论
Enhancing Soft Skills in Autistic Children: The Next Generation of Mind Champ's Technological Approach
Enhancing Soft Skills in Autistic Children: The Next Generat...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: Kalna Peiris Ruchira Nelaka Kalpani Manathunga Department of Computer Systems Engineering Department of Information Technology Department of Computer Science and Software Engineering
Autism Spectrum Disorder (ASD) significantly impacts a child's ability to navigate social interactions, regulate emotions, and develop adaptive skills crucial for daily functioning. While various interventions exi... 详细信息
来源: 评论
Cloud Security Service for Identifying Unauthorized User Behaviour
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 2581-2600页
作者: D.Stalin David Mamoona Anam Chandraprabha Kaliappan S.Arun Mozhi Selvi Dilip Kumar Sharma Pankaj Dadheech Sudhakar Sengan Department of Computer Science and Engineering IFET College of EngineeringVillupuram605108Tamil NaduIndia Department of Computer Sciences and Software Engineering Faculty of Basic and Applied SciencesInternational Islamic UniversityIslamabadPakistan Department of Information Technology Bannari Amman Institute of TechnologySathyamangalam638401Tamil NaduIndia Department of Computer Science Engineering DMI St.John the Baptist UniversityMangochiLilongweMalawi Department of Mathematics Jaypee University of Engineering and TechnologyGuna473226Madhya PradeshIndia Department of Computer Science and Engineering Swami Keshvanand Institute of TechnologyManagement and Gramothan(SKIT)Jaipur302017RajasthanIndia Department of Computer Science and Engineering PSN College of Engineering and TechnologyTirunelveli627152Tamil NaduIndia
Recently,an innovative trend like cloud computing has progressed quickly in *** a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing number of service providers... 详细信息
来源: 评论
Boosting white shark optimizer for global optimization and cloud scheduling problem
收藏 引用
Neural Computing and Applications 2024年 第18期36卷 10853-10879页
作者: Mostafa, Reham R. Chhabra, Amit Khedr, Ahmed M. Hashim, Fatma A. University of Sharjah Sharjah27272 United Arab Emirates Information Systems Department Faculty of Computers and Information Sciences Mansoura University Mansoura35516 Egypt Department of Computer Engineering and Technology Guru Nanak Dev University Amritsar143005 India Computer Science Department University of Sharjah Sharjah27272 United Arab Emirates Faculty of Engineering Helwan University Helwan Egypt MEU Research Unit Middle East University Amman11831 Jordan
With the growing adoption of cloud computing in both public and private sector enterprises, the industry has experienced rapid expansion. To fully unlock the potential of cloud computing, efficient task scheduling bec... 详细信息
来源: 评论
ML Based Intrusion Detection Scheme for various types of attacks in a WSN using C4.5 and CART classifiers
收藏 引用
Materials Today: Proceedings 2023年 80卷 3769-3776页
作者: Gite, Pratik Chouhan, Kuldeep Murali Krishna, K. Kumar Nayak, Chinmaya Soni, Mukesh Shrivastava, Amit Department of Computer Science and Engineering IPSA-IES Indore AB Road MP Indore India Department of Computer Science and Engineering I.T.S Engineering College Greater Noida India Department of Electronics and Communication Engineering Vignan's Institute of Information Technology Duvvada Andhra Pradesh Visakhapatnam India Faculty of Emerging Technology Sri Sri University Odisha751001 India Department of Computer Science & Engineering Jagran Lakecity University Bhopal India Department of Computer Science Engineering Swami Vivekanand College of Engineering Khandwa Road Near Tolnaka Vivekanand Knowledge City Indore India
A key component for preserving a WSN's integrity is designing an intrusion detection system (IDS). This article covers several sorts of security threats that may occur in a WSN. It proposes a detection of maliciou... 详细信息
来源: 评论
Harvesting Insights: Predicting Vegetable Prices with Hybrid CLA-Conv BiGRU Techniques  3
Harvesting Insights: Predicting Vegetable Prices with Hybrid...
收藏 引用
3rd International Conference for Innovation in technology, INOCON 2024
作者: Lal Ambashtha, Kanahaiya Praveen Kumar, Chatakunta Pandey, Vivekanand Sakthivel Padaiyatchi, S. Bharathi, A. Navaz, K. Gnsu Faculty of Information Technology Bihar Sasaram India Institute of Aeronautical Engineering Department of Computer Science and Engineering Hyderabad India Amity University Bihar Patna India Nehru Institute of Engineering and Technology Department of Electrical and Electronics Engineering TN Coimbatore India Vels Institute of Science Technology and Advanced Studies Department of Information Technology Chennai India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India
The system delves into the important topic of agricultural market pricing, with a specific emphasis on the ever-changing realm of vegetable supply and prices. Stabilizing the supply and prices of vegetables becomes an... 详细信息
来源: 评论
Medical Image Analysis of Lung Tumor Diagnosis Based on Generalized Fuzzy C-Means Clustering Algorithm
Medical Image Analysis of Lung Tumor Diagnosis Based on Gene...
收藏 引用
International Conference on Emerging Electronic and Automation technology 2022, ICEEAT 2022
作者: Zwaid, Jassim Mohammed Ahmed Murad, Masrah Azrifah Azmi Khalid, Fatimah Binti Manshor, Noridayu Al-Jumaily, Abdulmajeed Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Affiliated to University of Anbar Ramadi Iraq Department of Software Engineering and Information System Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Multimedia Department Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Department of Signal Theory and Communications Universidad Carlos III de Madrid Leganés Madrid28911 Spain
In recent years, the rapid development of medical imaging technology has brought medical image analysis into the era of big data. CT imaging technology is one of the most common imaging methods for disease screening. ... 详细信息
来源: 评论
Reseed Skipping of Linear Congruential Generator for Multi-level Image Steganography Security of Financial Data
收藏 引用
SN computer science 2023年 第2期4卷 124页
作者: Danso, Juliana Mantebea Missah, Yaw Marfo Gyamfi, Enoch Opanin Dankwa, Stephen Kwabena, Sarpong Department of Computer Science Kwame Nkrumah University of Science and Technology (KNUST) Kumasi Ghana School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Department of Cyber Security and Computer Engineering Technology School of Computing and Information Sciences C.K. Tedam University of Technology and Applied Sciences Upper East Region Navrongo Ghana School of Automation Engineering University of Electronic Science and Technology of China Chengdu China
This paper proposed a multi-level image steganography model that integrates with image and plaintext encryption schemes. The model starts by partitioning the cover-image pixel positions into two regions of respective ... 详细信息
来源: 评论
Revolutionizing Medical Diagnostics: Exploring Creativity in AI for Biomedical Image Analysis
Revolutionizing Medical Diagnostics: Exploring Creativity in...
收藏 引用
2024 International Conference on Signal Processing, Computation, Electronics, Power and Telecommunication, IConSCEPT 2024
作者: Krishnamoorthy, P. Swetha, Devulapally Geetha, Pamidimukkala Sai Karunambiga, K. Ayyasamy, Ramesh Kumar Kiran, Ajmeera Thiruthangal Nadar College PG Department of Computer Science Tamil Nadu Chennai India Vaagdevi Engineering College Department of Computer Science and Engineering Telangana Bolli Kunta India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Andhra Pradesh Vaddeswaram India Karpagam Institute of Technology Department of CSE Tamil Nadu Coimbatore India Faculty of Information and Communication Technology Kampar Malaysia MLR Institute of Technology Department of Computer Science and Engineering Hyderabad India
Biomedical image analysis plays a crucial role in the early and accurate diagnosis of diseases, significantly impacting patient outcomes. This study presents an innovative approach to biomedical image analysis by inte... 详细信息
来源: 评论
Collaborative Multi-Agent Proximal Policy Based Resource Allocation in Clustered IoV Networks  10
Collaborative Multi-Agent Proximal Policy Based Resource All...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Raza, Arif Xiang, Junfan Khan, Salabat Shrivastava, Shivanshu Ashraf, M. Wasim Abbas Wang, Lu Shenzhen University College of Computer Science and Software Engineering Shenzhen China Shenzhen University College of Electronics and Information Engineering Shenzhen China Qilu Institute of Technology College of Computer and Information Engineering Jinan China Rajiv Gandhi Institute of Petroleum Technology Department of Electrical and Electronics Engineering Amethi India Hanjiang Normal University School of Mathematics and Computer Science Shiyan China
The Internet of Vehicles (IoV) necessitates efficient resource management to meet the growing demands for high data rates, low latency, and real-time communication in Intelligent Transportation Systems (ITS). This pap... 详细信息
来源: 评论