咨询与建议

限定检索结果

文献类型

  • 8,656 篇 会议
  • 5,830 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 14,715 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,859 篇 工学
    • 6,116 篇 计算机科学与技术...
    • 4,955 篇 软件工程
    • 2,210 篇 信息与通信工程
    • 1,429 篇 控制科学与工程
    • 1,142 篇 电气工程
    • 1,119 篇 生物工程
    • 1,057 篇 电子科学与技术(可...
    • 874 篇 生物医学工程(可授...
    • 735 篇 机械工程
    • 622 篇 光学工程
    • 558 篇 仪器科学与技术
    • 448 篇 动力工程及工程热...
    • 419 篇 化学工程与技术
    • 388 篇 网络空间安全
    • 328 篇 安全科学与工程
    • 294 篇 交通运输工程
  • 5,078 篇 理学
    • 2,430 篇 数学
    • 1,764 篇 物理学
    • 1,247 篇 生物学
    • 817 篇 统计学(可授理学、...
    • 561 篇 系统科学
    • 473 篇 化学
  • 2,550 篇 管理学
    • 1,576 篇 管理科学与工程(可...
    • 1,049 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 931 篇 医学
    • 786 篇 临床医学
    • 671 篇 基础医学(可授医学...
    • 410 篇 药学(可授医学、理...
    • 382 篇 公共卫生与预防医...
  • 401 篇 法学
    • 328 篇 社会学
  • 281 篇 经济学
  • 213 篇 农学
  • 204 篇 教育学
  • 63 篇 文学
  • 37 篇 军事学
  • 34 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 451 篇 deep learning
  • 294 篇 machine learning
  • 265 篇 feature extracti...
  • 254 篇 accuracy
  • 246 篇 computational mo...
  • 215 篇 information tech...
  • 213 篇 internet of thin...
  • 208 篇 optimization
  • 199 篇 artificial intel...
  • 188 篇 support vector m...
  • 182 篇 computer science
  • 178 篇 predictive model...
  • 171 篇 data mining
  • 151 篇 training
  • 134 篇 neural networks
  • 130 篇 real-time system...
  • 122 篇 covid-19
  • 116 篇 computational in...
  • 116 篇 security
  • 114 篇 wireless communi...

机构

  • 285 篇 faculty of scien...
  • 285 篇 department for p...
  • 284 篇 department of ph...
  • 280 篇 departamento de ...
  • 275 篇 department of ph...
  • 270 篇 department of ph...
  • 269 篇 kirchhoff-instit...
  • 266 篇 department of ph...
  • 258 篇 faculté des scie...
  • 243 篇 fakultät für phy...
  • 240 篇 institute of phy...
  • 229 篇 yerevan physics ...
  • 229 篇 institut für ast...
  • 224 篇 department of ph...
  • 223 篇 department of ph...
  • 219 篇 physics division...
  • 215 篇 department of ph...
  • 209 篇 department of ph...
  • 198 篇 department of ph...
  • 197 篇 institute of phy...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 263 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 254 篇 s. guindon
  • 251 篇 d. guest

语言

  • 12,812 篇 英文
  • 1,791 篇 其他
  • 108 篇 中文
  • 23 篇 日文
  • 9 篇 德文
  • 7 篇 法文
  • 4 篇 俄文
  • 3 篇 斯洛文尼亚文
  • 1 篇 波兰文
检索条件"机构=Faculty of Computer Information and Engineering Technology"
14715 条 记 录,以下是1-10 订阅
排序:
Privacy-preserving explainable AI: a survey
收藏 引用
Science China(information Sciences) 2025年 第1期68卷 23-56页
作者: Thanh Tam NGUYEN Thanh Trung HUYNH Zhao REN Thanh Toan NGUYEN Phi Le NGUYEN Hongzhi YIN Quoc Viet Hung NGUYEN School of Information and Communication Technology Griffith University School of Computer and Communication Sciences Ecole Polytechnique Federale de Lausanne Faculty of Mathematics and Computer Science University of Bremen Faculty of Information Technology HUTECH University Department of Computer Science Hanoi University of Science and Technology School of Electrical Engineering and Computer Science The University of Queensland
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention... 详细信息
来源: 评论
AMAD:Adaptive Mapping Approach for Datacenter Networks,an Energy-Friend Resource Allocation Framework via Repeated Leader Follower Game
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4577-4601页
作者: Ahmad Nahar Quttoum Muteb Alshammari Department of Computer Engineering Faculty of EngineeringThe Hashemite UniversityZarqa13133Jordan Department of Information Technology Faculty of Computing and Information TechnologyNorthern Border UniversityArar91431Saudi Arabia
Cloud Datacenter Network(CDN)providers usually have the option to scale their network structures to allow for far more resource capacities,though such scaling options may come with exponential costs that contradict th... 详细信息
来源: 评论
Research Progress in Solar Flare Prediction Methods
收藏 引用
Research in Astronomy and Astrophysics 2025年 第3期25卷 280-309页
作者: Ke Han Zhen Liu Xian-Yi Zhao Yi-Fei Li De-Quan Zheng Jie Wan School of Computer and Information Engineering Harbin University of Commerce Faculty of Computing Harbin Institute of Technology School of Energy Science and Engineering Harbin Institute of Technology
Solar flares are one of the strongest outbursts of solar activity,posing a serious threat to Earth’s critical infrastructure,such as communications,navigation,power,and ***,it is essential to accurately predict solar... 详细信息
来源: 评论
VSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain
收藏 引用
ACM Transactions on Sensor Networks 2024年 第2期20卷 1-22页
作者: Tian, Siben Bai, Fenhua Shen, Tao Zhang, Chi Gong, Bei Faculty of Information Engineering and Automation Kunming University of Science and Technology Yunnan Key Laboratory of Computer Technology Applications China Faculty of Information Technology Beijing University of Technology China
To solve the problems of vote forgery and malicious election of candidate nodes in the Raft consensus algorithm, we combine zero trust with the Raft consensus algorithm and propose a secure and efficient consensus alg... 详细信息
来源: 评论
A Fast Algorithm for Computing the Deficiency Number of a Mahjong Hand
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1383-1398页
作者: Xueqing YAN Yongming LI Sanjiang LI School of Computer Science Shaanxi Normal University School of Mathematics and Statistics Shaanxi Normal University Centre for Quantum Software and Information Faculty of Engineering and Information TechnologyUniversity of Technology Sydney
The tile-based multiplayer game Mahjong is widely played in Asia and has also become increasingly popular worldwide. Face-to-face or online, each player begins with a hand of 13 tiles and players draw and discard tile... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论
Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
收藏 引用
Multimedia Tools and Applications 2024年 1-20页
作者: Bouke, Mohamed Aly El Atigh, Hayate Abdullah, Azizol Department of Communication Technology and Network Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang43400 Malaysia Departement of Computer Engineering Faculty of Computer Engineering Bandirma Onyedi Eylul University Balikesir10200 Turkey
The Internet of Medical Things (IoMT) brings advanced patient monitoring and predictive analytics to healthcare but also raises cybersecurity and data privacy issues. This paper introduces a deep-learning model for Io... 详细信息
来源: 评论
An Adaptive Framework for Classification and Detection of Android Malware
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第21期18卷 59-73页
作者: Al Sharah, Ashraf Alrub, Yousef Abu Owida, Hamza Abu Elsoud, Esraa Abu Alshdaifat, Nawaf Khtatnaha, Hamzah Department of Electrical Engineering College of Engineering Technology Al-Balqa Applied University Amman Jordan Department of Computer Information Systems Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Medical Engineering Faculty of Engineering Al-Ahliyya Amman University Amman Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa Jordan Faculty of Information Technology Applied Science Private University Amman Jordan
The hardware and software of a computer are controlled by its operating system (OS), which performs essential tasks such as input and output processing, file and memory management, and the management of peripheral dev... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
Optimized digital watermarking: Harnessing the synergies of Schur matrix factorization, DCT, and DWT for superior image ownership proofing
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 19817-19852页
作者: Al-Aiash, Issa Alquran, Rabee AlJamal, Mahmoud Alsarhan, Ayoub Aljaidi, Mohammad Al-Fraihat, Dimah Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa13110 Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman11622 Jordan
The contemporary context of abundant digital dissemination inherently gives rise to the need for media protection and the clear identification of ownership rights. This paper responded to this nagging issue of unautho... 详细信息
来源: 评论