咨询与建议

限定检索结果

文献类型

  • 8,580 篇 会议
  • 5,973 篇 期刊文献
  • 230 册 图书

馆藏范围

  • 14,783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,790 篇 工学
    • 6,171 篇 计算机科学与技术...
    • 4,979 篇 软件工程
    • 2,245 篇 信息与通信工程
    • 1,437 篇 控制科学与工程
    • 1,202 篇 电气工程
    • 1,121 篇 生物工程
    • 1,075 篇 电子科学与技术(可...
    • 876 篇 生物医学工程(可授...
    • 748 篇 机械工程
    • 633 篇 光学工程
    • 559 篇 仪器科学与技术
    • 452 篇 动力工程及工程热...
    • 429 篇 化学工程与技术
    • 397 篇 网络空间安全
    • 336 篇 安全科学与工程
    • 301 篇 交通运输工程
  • 5,141 篇 理学
    • 2,435 篇 数学
    • 1,793 篇 物理学
    • 1,260 篇 生物学
    • 808 篇 统计学(可授理学、...
    • 568 篇 系统科学
    • 479 篇 化学
  • 2,562 篇 管理学
    • 1,587 篇 管理科学与工程(可...
    • 1,050 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 945 篇 医学
    • 792 篇 临床医学
    • 677 篇 基础医学(可授医学...
    • 411 篇 药学(可授医学、理...
    • 384 篇 公共卫生与预防医...
  • 402 篇 法学
    • 328 篇 社会学
  • 281 篇 经济学
  • 215 篇 农学
  • 200 篇 教育学
  • 64 篇 文学
  • 38 篇 军事学
  • 34 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 451 篇 deep learning
  • 292 篇 machine learning
  • 261 篇 feature extracti...
  • 239 篇 accuracy
  • 233 篇 computational mo...
  • 216 篇 internet of thin...
  • 214 篇 information tech...
  • 211 篇 optimization
  • 186 篇 support vector m...
  • 184 篇 artificial intel...
  • 181 篇 computer science
  • 173 篇 predictive model...
  • 170 篇 data mining
  • 149 篇 training
  • 135 篇 neural networks
  • 123 篇 real-time system...
  • 122 篇 covid-19
  • 116 篇 computational in...
  • 110 篇 image segmentati...
  • 110 篇 wireless communi...

机构

  • 287 篇 faculty of scien...
  • 287 篇 department for p...
  • 285 篇 department of ph...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 273 篇 kirchhoff-instit...
  • 266 篇 department of ph...
  • 265 篇 department of ph...
  • 260 篇 faculté des scie...
  • 242 篇 fakultät für phy...
  • 241 篇 institute of phy...
  • 231 篇 yerevan physics ...
  • 228 篇 institut für ast...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 212 篇 department of ph...
  • 209 篇 department of ph...
  • 197 篇 department of ph...
  • 197 篇 institute of phy...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 253 篇 s. guindon
  • 251 篇 d. guest

语言

  • 14,170 篇 英文
  • 507 篇 其他
  • 96 篇 中文
  • 23 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Faculty of Computer and Information Technology Engineering"
14783 条 记 录,以下是131-140 订阅
排序:
Secure Channel Estimation Using Norm Estimation Model for 5G Next Generation Wireless Networks
收藏 引用
computers, Materials & Continua 2025年 第1期82卷 1151-1169页
作者: Khalil Ullah Song Jian Muhammad Naeem Ul Hassan Suliman Khan Mohammad Babar Arshad Ahmad Shafiq Ahmad Faculty of Information Engineering and Automation Kunming University of Science and TechnologyKunming650500China Department of Computer Science Abbottabad University of Science and TechnologyHavelianAbbottabad22500Pakistan Department of Computing and Electronics Engineering Middle East CollegeMuscat124Oman Department of CS&IT Pak-Austria Fachhochschule Institute of Applied Sciences and Technology MangHaripur22621Pakistan Industrial Engineering Department College of EngineeringKing Saud UniversityRiyadh11421Saudi Arabia
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile *** networks are sufficiently scaled to interconnect billions of users and *** i... 详细信息
来源: 评论
Evaluating marginal likelihood approximations of dose–response relationship models in Bayesian benchmark dose methods for risk assessment
收藏 引用
Computational Toxicology 2025年 34卷
作者: Minewaki, Sota Ohigashi, Tomohiro Sozu, Takashi Department of Information and Computer Technology Tokyo University of Science of Engineering Japan Department of Information and Computer Technology Faculty of Engineering Tokyo University of Science Japan
Benchmark dose (BMD;a dose associated with a specified change in response) is used to determine the point of departure for the acceptable daily intake of substances for humans. Multiple dose–response relationship mod... 详细信息
来源: 评论
Optimal scheduling of graph states via path decompositions
收藏 引用
Physical Review A 2025年 第1期111卷 012627-012627页
作者: Samuel J. Elman Jason Gavriel Ryan L. Mann Centre for Quantum Software and Information School of Computer Science Faculty of Engineering and Information Technology University of Technology Sydney NSW 2007 Australia Centre for Quantum Computation and Communication Technology Faculty of Engineering and Information Technology University of Technology Sydney NSW 2007 Australia
We study the optimal scheduling of graph states in measurement-based quantum computation, establishing an equivalence between measurement schedules and path decompositions of graphs. We define the spatial cost of a me... 详细信息
来源: 评论
Machine learning for Internet of Things (IoT) device identification: a comparative study
收藏 引用
PeerJ computer Science 2025年 11卷 1-34页
作者: Tahaei, Hamid Liu, Anqi Forooghikian, Hamid Gheisari, Mehdi Zaki, Faiz Anuar, Nor Badrul Fang, Zhaoxi Huang, Longjun Institute of Artificial Intelligence Shaoxing University Shaoxing China School of Computing and Data Science Xiamen University Malaysia Selangor Malaysia Department of Management Islamic Azad University of Kish Kish Iran Department of Computer System and Technology Faculty of Computer Science and Information Technology Universiti Malaya Selangor Kuala Lumpur Malaysia Department of Computer Science and Engineering Shaoxing University Shaoxing China
The rapid deployment of millions of connected devices brings significant security challenges to the Internet of Things (IoT). IoT devices are typically resource-constrained and designed for specific tasks, from which ... 详细信息
来源: 评论
Selfish-Free Influential Nodes Detection in Mobile Social Networks  2
Selfish-Free Influential Nodes Detection in Mobile Social Ne...
收藏 引用
2nd International Conference on Advanced Innovations in Smart Cities, ICAISC 2025
作者: Abdelmohsen, Doaa Abdelkader, Tamer Hamdy, Mohamed Elbahnasy, Khaled Ain Shams University Faculty of Computer and Information Sciences Cairo Egypt Galala Unversity Faculty of Computer Science and Engineering Suez Egypt King Abdul Aziz University Faculty of Computing and Information Technology Saudi Arabia Jeddah International College Saudi Arabia
Mobile networks where users group in communities based on their interests, and disseminate data mainly to their community using their mobile devices, are called Mobile Social Networks (MSN). However, the efficiency of... 详细信息
来源: 评论
YOLOv8 for Personal Device Screen Detection to Preserve Data Privacy: Enhancing Security Measures in Real-Time Monitoring Systems  10
YOLOv8 for Personal Device Screen Detection to Preserve Data...
收藏 引用
10th International Conference on Digital Arts, Media and technology and 8th ECTI Northern Section Conference on Electrical, Electronics, computer and Telecommunications engineering, ECTI DAMT and NCON 2025
作者: Nimkoompai, Apichaya Nilsiam, Yuenyong Nuchitprasitchai, Siranee Sirikongtham, Puwadol Thai-Nichi Institute of Technology Bangkok Thailand King Mongkut's University of Technology North Bangkok Faculty of Engineering Department of Electrical and Computer Engineering Bangkok Thailand King Mongkut's University of Technology North Bangkok Faculty of Information Technology and Digital Innovation Department of Information Technology Bangkok Thailand
In public and semi-public environments, personal device usage often exposes sensitive information, presenting a challenge to user privacy when such data is captured by surveillance systems. This study investigates the... 详细信息
来源: 评论
Privacy Protection in Learning Management Systems’ Mobile technology-Based Learning Analytics
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第6期19卷 197-208页
作者: Rawat, Manoj Kumar Jha, Suresh Kumar Sree Lakshmi, A. Venkata Ramana, J. Gonge, Sudhanshu S. De, Arunava Department of Computer Science and Engineering Medi-Caps University Madhya Pradesh Indore India Manipal University Rajasthan Jaipur India Geetanjali College of Engineering and Technology Telangana Hyderabad India Department of MBA KL Business School Koneru Lakshmaiah Education Foundation Vaddeswaram Campus Guntur District Andhra Pradesh India Department of Computer Science & Information Technology Symbiosis Institute of Technology Lavale A Constituent of Symbiosis International University Maharashtra Pune India Faculty of Information Technology Gopal Narayan Singh University Bihar Jamuhar India
Mobile technology use in education is changing, much like in the business and health sectors. Research is now conducted on designing user-centric platforms that allow people to engage in teaching and learning activiti... 详细信息
来源: 评论
Rethinking Transferable Adversarial Attacks With Double Adversarial Neuron Attribution
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第2期6卷 354-364页
作者: Zhu, Zhiyu Jin, Zhibo Wang, Xinyi Zhang, Jiayu Chen, Huaming Choo, Kim-Kwang Raymond University of Sydney School of Electrical and Computer Engineering DarlingtonNSW2008 Australia University of Malaya Faculty of Computer Science and Information Technology KualaLumpur50603 Malaysia SuZhou Yierqi Jiangsu Suzhou215000 China The University of Texas at San Antonio San AntonioTX78249 United States
Transferable adversarial attacks are a threat to deep neural networks, in particular, for black-box scenarios where access to model information is limited. One can, for example, exploit the intermediate layer neurons ... 详细信息
来源: 评论
Automatic speaker identification system based on MLP network and deep learning in the presence of severe interference
收藏 引用
Multimedia Tools and Applications 2025年 1-42页
作者: Shafik, Amira Sedik, Ahmed El-Shafai, Walid Khalaf, Ashraf A. M. El-Rabaie, El-Sayed M. El-Samie, Fathi E. Abd Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Electrical Engineering Faculty of Engineering Minia University Minia61519 Egypt Smart Systems Engineering Laboratory College of Engineering Prince Sultan University Riyadh11586 Saudi Arabia Department of the Robotics and Intelligent Machines Faculty of Artificial Intelligence Kafr Elsheikh University Kafr El‑Shaikh Egypt Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Automatic Speaker Identification (ASI) is so crucial for security. Current ASI systems perform well in quiet and clean surroundings. However, in noisy situations, the robustness of an ASI system against additive noise... 详细信息
来源: 评论
A Novel Hybrid Approach-Based on Heartbeat and Accelerometer Signals for Enhanced Security in WBSNs
收藏 引用
IEEE Sensors Journal 2025年 第6期25卷 10295-10308页
作者: Yan, Guixiang Zhang, Guanghe Liu, Fanghua Williams Samuel, Oluwarotimi Aborokbah, Majed Guo, Jiquan Zhu, Liqing Wei, Sikang Jiangxi Normal University School of Computer and Information Engineering Nanchang330022 China University of Derby School of Computing and Data Science Research Centre DerbyDE22 3AW United Kingdom INTI International University Faculty of Data Science and Information Technology Nilai71800 Malaysia University of Tabuk Faculty of Computers and Information Technology Tabuk71491 Saudi Arabia Jiangxi Normal University School of Digital Industry Shangrao334000 China
In wireless body sensor networks (WBSNs), ensuring secure and efficient key distribution is critical, particularly given the limited computational and energy resources of the sensors. Existing methods often struggle t... 详细信息
来源: 评论