咨询与建议

限定检索结果

文献类型

  • 13,265 篇 会议
  • 10,576 篇 期刊文献
  • 378 册 图书

馆藏范围

  • 24,219 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,988 篇 工学
    • 8,396 篇 计算机科学与技术...
    • 6,672 篇 软件工程
    • 3,274 篇 信息与通信工程
    • 2,379 篇 电气工程
    • 2,348 篇 控制科学与工程
    • 2,128 篇 电子科学与技术(可...
    • 1,627 篇 生物工程
    • 1,482 篇 生物医学工程(可授...
    • 1,151 篇 机械工程
    • 1,122 篇 光学工程
    • 1,037 篇 化学工程与技术
    • 1,001 篇 仪器科学与技术
    • 971 篇 动力工程及工程热...
    • 719 篇 材料科学与工程(可...
    • 540 篇 网络空间安全
    • 499 篇 安全科学与工程
  • 9,482 篇 理学
    • 4,185 篇 物理学
    • 3,853 篇 数学
    • 1,953 篇 生物学
    • 1,252 篇 统计学(可授理学、...
    • 1,172 篇 化学
    • 934 篇 系统科学
  • 3,488 篇 管理学
    • 2,220 篇 管理科学与工程(可...
    • 1,359 篇 图书情报与档案管...
    • 1,090 篇 工商管理
  • 1,612 篇 医学
    • 1,338 篇 临床医学
    • 1,123 篇 基础医学(可授医学...
    • 697 篇 药学(可授医学、理...
    • 587 篇 公共卫生与预防医...
  • 593 篇 法学
    • 498 篇 社会学
  • 461 篇 经济学
  • 361 篇 农学
  • 279 篇 教育学
  • 82 篇 文学
  • 53 篇 军事学
  • 31 篇 艺术学
  • 4 篇 历史学
  • 2 篇 哲学

主题

  • 635 篇 deep learning
  • 510 篇 accuracy
  • 405 篇 machine learning
  • 354 篇 internet of thin...
  • 315 篇 artificial intel...
  • 277 篇 support vector m...
  • 270 篇 computer science
  • 239 篇 feature extracti...
  • 222 篇 computational mo...
  • 221 篇 training
  • 220 篇 optimization
  • 188 篇 neural networks
  • 171 篇 image segmentati...
  • 171 篇 predictive model...
  • 161 篇 reliability
  • 159 篇 covid-19
  • 158 篇 computational in...
  • 147 篇 real-time system...
  • 145 篇 computer archite...
  • 137 篇 wireless communi...

机构

  • 1,094 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 979 篇 physikalisches i...
  • 972 篇 oliver lodge lab...
  • 645 篇 infn laboratori ...
  • 625 篇 infn sezione di ...
  • 607 篇 fakultät physik ...
  • 606 篇 infn sezione di ...
  • 602 篇 infn sezione di ...
  • 558 篇 school of physic...
  • 549 篇 horia hulubei na...
  • 546 篇 university of ch...
  • 539 篇 iccub universita...
  • 538 篇 department of ph...
  • 535 篇 school of physic...
  • 523 篇 h.h. wills physi...
  • 521 篇 imperial college...
  • 518 篇 nikhef national ...
  • 512 篇 stfc rutherford ...
  • 509 篇 school of physic...

作者

  • 266 篇 barter w.
  • 260 篇 a. gomes
  • 252 篇 beiter a.
  • 248 篇 c. alexa
  • 246 篇 j. m. izen
  • 242 篇 g. bella
  • 242 篇 j. strandberg
  • 239 篇 c. amelung
  • 238 篇 d. calvet
  • 238 篇 bellee v.
  • 237 篇 blake t.
  • 234 篇 g. spigo
  • 233 篇 s. chen
  • 232 篇 f. siegert
  • 232 篇 bowcock t.j.v.
  • 230 篇 brundu d.
  • 225 篇 betancourt c.
  • 223 篇 borsato m.
  • 218 篇 amato s.
  • 217 篇 r. ströhmer

语言

  • 23,120 篇 英文
  • 857 篇 其他
  • 180 篇 中文
  • 46 篇 日文
  • 8 篇 德文
  • 8 篇 法文
  • 4 篇 土耳其文
  • 3 篇 荷兰文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
  • 1 篇 泰文
检索条件"机构=Faculty of Computer Technology and Infonnation Department of Computer Engineering"
24219 条 记 录,以下是41-50 订阅
排序:
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
Science China(Information Sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 3655-3683页
作者: Abdullah Alabdulatif Navod Neranjan Thilakarathne Mohamed Aashiq Department of Cybersecurity College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of ICT Faculty of TechnologyUniversity of ColomboColombo00700Sri Lanka Department of Computer Science and Engineering Faculty of EngineeringSouth Eastern University of Sri LankaOluvil32360Sri Lanka
The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber *** the myriad of potential attacks,D... 详细信息
来源: 评论
Impact of Different Integration Times on Distributions of Rain Rates for Predictions of Rain Attenuation
收藏 引用
Progress in Electromagnetics Research C 2025年 154卷 229-238页
作者: Hassan, Mohammad Rofiqul Rafiqul, Islam Md. Habaebi, Mohamed Hadi Suriza, Ahmad Zabidi Badron, Khairayu Budalal, Asma Ali Mahfuz, Md. Mahmudul Hasan Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Jalan Gombak Kuala Lumpur53100 Malaysia College of Electrical and Electronics Technology Benghazi Libya Department of Electrical and Computer Engineering Concordia University Canada
All wireless communication systems are moving towards higher and higher frequencies day by day which are severely attenuated by rains in outdoor environment. To design a reliable RF system, an accurate prediction meth...
来源: 评论
A Review of Evaluation Metrics Algorithmic Used in Scholarly Research Recommender System  4
A Review of Evaluation Metrics Algorithmic Used in Scholarly...
收藏 引用
4th International Multidisciplinary Information technology and engineering Conference, IMITEC 2024
作者: Ovono, Gerald Zuva, Travos Otunniyi, Temidayo Faculty of Applied and Computer Sciences Department of Computer South Africa VaalUniversity of Technology Faculty of Engineering and Technology Department of Process Control and Computer Systems South Africa
The exponential growth of academic publications has made scholarly research recommender systems indispensable tools for researchers. These systems rely on diverse evaluation metrics to assess their effectiveness and r... 详细信息
来源: 评论
An Efficient Encryption and Compression of Sensed IoT Medical Images Using Auto-Encoder
收藏 引用
computer Modeling in engineering & Sciences 2023年 第2期134卷 909-926页
作者: Passent El-kafrawy Maie Aboghazalah Abdelmoty M.Ahmed Hanaa Torkey Ayman El-Sayed School of Information Technology and Computer Science Nile UniversityGiza12677Egypt Math and Computer Science Department Faculty of ScienceMenoufia UniversityMenoufia32511Egypt Department of Computer Engineering College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia Computer Science and Engineering Department Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common *** ofmedical images is very important to secure patient *** these images consumes a lot of time onedge computing;theref... 详细信息
来源: 评论
A Secure and Efficient Information Authentication Scheme for E-Healthcare System
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3877-3896页
作者: Naveed Khan Jianbiao Zhang Ghulam Ali Mallah Shehzad Ashraf Chaudhry Faculty of Information Technology Beijing University of TechnologyBeijing100124China Department of Computer Science Shah Abdul Latif UniversityKhairpur66111Pakistan Department of Computer Engineering Faculty of Engineering ArchitectureNisantasi UniversityIstanbul34398Turkey
The mobile cellular network provides internet connectivity for heterogeneous Internet of Things(IoT)*** cellular network consists of several towers installed at appropriate locations within a smart *** cellular towers... 详细信息
来源: 评论
Joint V2V Group Association and Transmission Power Control in Federated Vehicular Networks
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 18167-18182页
作者: Liu, Su Guan, Peiyuan Li, Yushuai Li, Tianyi Zolfagharian, Zolaikha Yu, Jiong Huang, Tingwen Xinjiang University School of Computer Science and Technology Urumqi830046 China University of Oslo Department of Informatics Oslo0316 Norway Aalborg University Department of Computer Science Aalborg9220 Denmark University of Tehran School of Electrical and Computer Engineering Iran Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518055 China
With growing awareness of privacy protection, Federated Learning (FL) in vehicular network scenarios effectively addresses privacy concerns, leading to the development of Federated Vehicular Networks (FVN). In FVN, ve... 详细信息
来源: 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 评论
Security to text (S2T): multi-layered based security approaches for secret text content
收藏 引用
Multimedia Tools and Applications 2025年 第15期84卷 15151-15171页
作者: Kashid, Shamal Awasthi, Lalit K. Berwal, Krishan Department of Computer Science and Engineering National Institute of Technology Uttarakhand IN Srinagar India Faculty of Communication Engineering Military College of Telecommunication Engineering IN Mhow India
In the digital world, text data is produced in an unstructured manner across various communication channels. Extracting valuable information from such data with security is crucial and requires the development of tech... 详细信息
来源: 评论
A Deep Learning Approach for Landmines Detection Based on Airborne Magnetometry Imaging and Edge Computing
收藏 引用
computer Modeling in engineering & Sciences 2024年 第5期139卷 2117-2137页
作者: Ahmed Barnawi Krishan Kumar Neeraj Kumar Bander Alzahrani Amal Almansour Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyDeemed to be UniversityPatialaIndia
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported w... 详细信息
来源: 评论