咨询与建议

限定检索结果

文献类型

  • 2,417 篇 会议
  • 993 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 3,482 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,011 篇 工学
    • 1,569 篇 计算机科学与技术...
    • 1,287 篇 软件工程
    • 399 篇 信息与通信工程
    • 338 篇 控制科学与工程
    • 182 篇 生物工程
    • 181 篇 电气工程
    • 142 篇 电子科学与技术(可...
    • 129 篇 机械工程
    • 129 篇 生物医学工程(可授...
    • 89 篇 安全科学与工程
    • 86 篇 动力工程及工程热...
    • 84 篇 光学工程
    • 73 篇 化学工程与技术
    • 71 篇 仪器科学与技术
    • 71 篇 建筑学
    • 67 篇 土木工程
  • 882 篇 理学
    • 482 篇 数学
    • 208 篇 生物学
    • 165 篇 系统科学
    • 161 篇 物理学
    • 141 篇 统计学(可授理学、...
    • 73 篇 化学
  • 592 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 234 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 133 篇 医学
    • 122 篇 临床医学
    • 103 篇 基础医学(可授医学...
  • 94 篇 法学
    • 69 篇 社会学
  • 70 篇 经济学
    • 70 篇 应用经济学
  • 69 篇 教育学
    • 68 篇 教育学
  • 27 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 193 篇 software enginee...
  • 166 篇 computer science
  • 97 篇 application soft...
  • 93 篇 computational mo...
  • 87 篇 laboratories
  • 75 篇 computer archite...
  • 75 篇 machine learning
  • 74 篇 software systems
  • 74 篇 software
  • 72 篇 artificial intel...
  • 71 篇 deep learning
  • 69 篇 distributed comp...
  • 68 篇 accuracy
  • 66 篇 wireless sensor ...
  • 63 篇 quality of servi...
  • 61 篇 resource managem...
  • 59 篇 training
  • 57 篇 grid computing
  • 56 篇 cloud computing
  • 54 篇 systems engineer...

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 department of co...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of softwa...
  • 10 篇 school of intell...

作者

  • 66 篇 rajkumar buyya
  • 37 篇 buyya rajkumar
  • 36 篇 junping du
  • 31 篇 yingmin jia
  • 24 篇 ismail leila
  • 21 篇 fashan yu
  • 18 篇 xenofon koutsouk...
  • 16 篇 m. parashar
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 biswas gautam
  • 13 篇 choo kim-kwang r...
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 dustdar schahram
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol

语言

  • 3,362 篇 英文
  • 93 篇 其他
  • 22 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Software Engineering for Distributed Computer Systems"
3482 条 记 录,以下是171-180 订阅
排序:
A Patient Specific Algorithm for Plasmodium Malaria Detection on Cell Images
A Patient Specific Algorithm for Plasmodium Malaria Detectio...
收藏 引用
2023 IEEE National Aerospace and Electronics Conference, NAECON 2023
作者: Narayanan, Barath Narayanan De Silva, Manawaduge Supun Hardie, Russell C. University of Dayton Research Institute Sensor and Software Systems Division Dayton United States University of Dayton Department of Electrical and Computer Engineering Dayton United States
computer-aided detection of plasmodium malaria on cell images from digital microscopy provides an invaluable second opinion to medical experts. Traditionally, well-established deep learning algorithms are widely used ... 详细信息
来源: 评论
Five-layer IoT and Fog Computing Framework Towards Digital Twinning of Battery Management systems for e-Transportation
Five-layer IoT and Fog Computing Framework Towards Digital T...
收藏 引用
Workshop on Smart Grid and Renewable Energy (SGRE)
作者: Dominic Karnehm Akash Samanta Antje Neve Sheldon Williamson Institute of Intelligent Distributed Systems University of the Bundeswehr Munich Neubiberg Germany Electrical Computer and Software Engineering Ontario Tech University Oshawa Canada
It is needless to mention that the proven capability of cloud computing and digital twin-based monitoring and control systems will play a major role in the implementation of digital twin-based lithium-ion battery mana...
来源: 评论
Facial Surface Anthropometric Features and Measurements With an Emphasis on Rhinoplasty (vol 42, pg 133, 2022)
收藏 引用
AESTHETIC SURGERY JOURNAL 2022年 第2期42卷 230-230页
作者: Celikoyar, M. Mazhar Perez, Michael F. Akbas, M. Ilhan Topsakal, Oguzhan Department of Otolaryngology Istanbul Florence Nightingale Hospital Istanbul Turkey Computer Science Department Florida Polytechnic University Lakeland FL USA Electrical Computer Software and Systems Engineering Department Embry-Riddle Aeronautical University Daytona Beach FL USA
Background Facial features and measurements are utilized to analyze patients’ faces for various reasons, including surgical planning, scientific communications, patient-surgeon communications, and post-surgery evalua... 详细信息
来源: 评论
Optimal Resource Allocation Method for Device-to-Device Communication in 5G Networks
收藏 引用
computers, Materials & Continua 2022年 第4期71卷 1-15页
作者: Fahd N.Al-Wesabi Imran Khan Saleem Latteef Mohammed Huda Farooq Jameel Mohammad Alamgeer Ali M.Al-Sharafi Byung Seo Kim Department of Computer Science King Khalid UniversityMuhayel AseerKSA Faculty of Computer and IT Sana’a UniversityYemen Department of Electrical Engineering University of Engineering and TechnologyPeshawarPakistan Department of Medical Instrumentation Techniques Engineering Electrical Engineering Technical CollegeMiddle Technical UniversityBaghdad10013Iraq Department of Information Systems King Khalid UniversityMayahel AseerKSA Department of Computer Science College of Computers and Information TechnologyUniversity of BishaKSA Department of Software and Communications Engineering Hongik UniversityKorea
With the rapid development of the next-generation mobile network,the number of terminal devices and applications is growing ***,how to obtain a higher data rate,wider network coverage and higher resource utilization i... 详细信息
来源: 评论
IOT Based Smart Parking System Using Ensemble Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3637-3656页
作者: Walaa H.Elashmawi Ahmad Akram Mohammed Yasser Menna Hisham Manar Mohammed Noha Ihab Ahmed Ali Department of Computer Science Faculty of Computers and InformaticsSuez Canal University4.5 Km the Ring RoadIsmailiaIsmailia41522Egypt Department of Computer Engineering and Software Systems Faculty of EngineeringAin Shams UniversityAl-Abbaseya4543070Egypt Department of Computer Science Faculty of Computer ScienceMisr International University28 KM Cairo–Ismailia RoadCairo44971Egypt College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Higher Future Institute for Specialized Technological Studies Cairo3044Egypt
Parking space is usually very limited in major cities,especially Cairo,leading to traffic congestion,air pollution,and driver *** car parking systems tend to tackle parking issues in a non-digitized *** systems requir... 详细信息
来源: 评论
Efficient Fingerprint Database Organization for Optimized Recognition
Efficient Fingerprint Database Organization for Optimized Re...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Jeffrey Jeeva Dhas Adhip Koshy Nishit Dua D. Ajitha Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore Tamil Nadu India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore Vellore India
A popular biometric identification method, renowned for its dependability and individuality in personal identification, is fingerprint recognition. This article presents an efficient fingerprint identification system ... 详细信息
来源: 评论
Reliability analysis in ARM *** heterogeneous multi-core processor for IoT
Reliability analysis in ARM *** heterogeneous multi-core pro...
收藏 引用
International Conference on Internet of Things and Applications (IoT)
作者: Mahin Moradiyan Yaser Sedaghat Computer Engineering Department Dependable Distributed Embedded Systems (DDEmS) Laboratory Ferdowsi University of Mashhad Mashhad Iran
This study navigates the landscape of the Internet of Things (IoT), spotlighting the escalating demand for robust processing solutions, thereby propelling the pervasive adoption of heterogeneous multi-core processors.... 详细信息
来源: 评论
A Novel Scheme for Malicious Nodes Detection in Cloud Markets Based on Fuzzy Logic Technique
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2022年 第3期16卷 136-150页
作者: Alsarhan, Ayoub Al-Ghuwairi, Abdel-Rahman Alshdaifat, Esra’a Idhaim, Hasan alkhawaldeh, Omar Department of Information Technology Hashemite University Zarqa Jordan Software Engineering Department Hashemite University Zarqa Jordan Computer Information Systems Department Hashemite University Zarqa Jordan Hashemite University Zarqa Jordan
Cloud security vulnerabilities have recently become more prevalent around the world, posing a threat to cloud service providers’ (CSPs) ability to respond to client demands. In cloud market, the requests are announce... 详细信息
来源: 评论
Proposed intelligence systems based on digital Forensics: Review paper
收藏 引用
Materials Today: Proceedings 2023年 80卷 2647-2651页
作者: Ismael Sahib, Hussein Qahatan AlSudani, Mustafa Hasan Ali, Mohammed Qassim Abbas, Haydar Moorthy, Kohbalan Mundher Adnan, Myasar Faculty of Computer Science and Information Technology UniversitiTun Hussein Onn Malaysia Computer Techniques Engineering Department Faculty of Information Technology Imam Ja'afar Al-sadiq University Najaf Iraq Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia Islamic University Najaf Iraq Faculty of Engineering School of Computing Universiti Teknologi Malaysia 81310 Johor Bahru Malaysia
The field of information security, in general, has seen shifts a traditional approach to an intelligence system. Moreover, an increasing of researchers to focus on propose intelligence systems and framework based on t... 详细信息
来源: 评论
Fusion of speech and handwritten signatures biometrics for person identification
收藏 引用
International Journal of Speech Technology 2023年 第4期26卷 833-850页
作者: Abushariah, Ahmad A. M. Abushariah, Mohammad A. M. Gunawan, Teddy Surya Chebil, J. Alqudah, Assal A. M. Ting, Hua-Nong Mustafa, Mumtaz Begum Peer Faculty of Engineering University of Malaya Kuala Lumpur50603 Malaysia Department of Computer Information Systems King Abdullah II School of Information Technology The University of Jordan Amman Jordan ECE Department Faculty of Engineering International Islamic University Malaysia Kuala Lumpur53100 Malaysia Department of Computer Science Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan Department of Biomedical Engineering Faculty of Engineering University of Malaya Kuala Lumpur50603 Malaysia Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur50603 Malaysia
Automatic person identification (API) using human biometrics is essential and highly demanded compared to traditional API methods, where a person is automatically identified using his/her distinct characteristics incl... 详细信息
来源: 评论