咨询与建议

限定检索结果

文献类型

  • 12,487 篇 会议
  • 6,371 篇 期刊文献
  • 211 册 图书
  • 4 篇 专利

馆藏范围

  • 19,072 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 10,608 篇 工学
    • 6,212 篇 计算机科学与技术...
    • 5,134 篇 软件工程
    • 2,102 篇 信息与通信工程
    • 1,630 篇 电气工程
    • 1,629 篇 控制科学与工程
    • 1,342 篇 电子科学与技术(可...
    • 1,119 篇 生物工程
    • 952 篇 生物医学工程(可授...
    • 942 篇 机械工程
    • 799 篇 光学工程
    • 799 篇 化学工程与技术
    • 787 篇 仪器科学与技术
    • 774 篇 动力工程及工程热...
    • 637 篇 材料科学与工程(可...
    • 442 篇 建筑学
    • 401 篇 土木工程
    • 400 篇 安全科学与工程
    • 390 篇 力学(可授工学、理...
  • 6,374 篇 理学
    • 2,659 篇 数学
    • 2,610 篇 物理学
    • 1,293 篇 生物学
    • 834 篇 统计学(可授理学、...
    • 802 篇 化学
    • 630 篇 系统科学
  • 2,584 篇 管理学
    • 1,699 篇 管理科学与工程(可...
    • 962 篇 图书情报与档案管...
    • 867 篇 工商管理
  • 976 篇 医学
    • 844 篇 临床医学
    • 695 篇 基础医学(可授医学...
    • 433 篇 药学(可授医学、理...
  • 428 篇 法学
  • 391 篇 经济学
  • 338 篇 教育学
  • 250 篇 农学
  • 62 篇 文学
  • 46 篇 艺术学
  • 38 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 321 篇 deep learning
  • 288 篇 computational mo...
  • 230 篇 machine learning
  • 220 篇 internet of thin...
  • 202 篇 accuracy
  • 190 篇 feature extracti...
  • 188 篇 optimization
  • 174 篇 training
  • 171 篇 neural networks
  • 166 篇 computer archite...
  • 153 篇 support vector m...
  • 151 篇 monitoring
  • 139 篇 image segmentati...
  • 133 篇 real-time system...
  • 129 篇 predictive model...
  • 126 篇 wireless communi...
  • 123 篇 reliability
  • 121 篇 cameras
  • 121 篇 bandwidth
  • 117 篇 artificial intel...

机构

  • 1,476 篇 faculty of elect...
  • 384 篇 university of za...
  • 238 篇 faculty of elect...
  • 188 篇 faculty of elect...
  • 136 篇 university of za...
  • 106 篇 university of sc...
  • 95 篇 faculty of elect...
  • 94 篇 north-west unive...
  • 92 篇 institut univers...
  • 90 篇 tianfu cosmic ra...
  • 89 篇 department of ph...
  • 89 篇 national centre ...
  • 88 篇 infn sezione di ...
  • 86 篇 faculty of compu...
  • 83 篇 faculty of elect...
  • 81 篇 hebei normal uni...
  • 80 篇 infn sezione di ...
  • 79 篇 state key labora...
  • 76 篇 faculty of elect...
  • 76 篇 tno technical sc...

作者

  • 108 篇 bastieri d.
  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 chen a.
  • 95 篇 calvo d.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 82 篇 díaz a.f.
  • 79 篇 boumaaza j.
  • 78 篇 coleiro a.
  • 77 篇 gozzini s.r.
  • 73 篇 fang j.
  • 73 篇 dallier r.
  • 72 篇 feng c.f.
  • 68 篇 kalekin o.
  • 67 篇 li xin
  • 66 篇 jiang k.
  • 65 篇 axikegu
  • 64 篇 kuleshov d.
  • 63 篇 li cheng

语言

  • 18,379 篇 英文
  • 539 篇 其他
  • 148 篇 中文
  • 5 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 西班牙文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 塞尔维亚文
检索条件"机构=Faculty of Engineering and Computing"
19073 条 记 录,以下是481-490 订阅
排序:
Designing an Automatic Sentence based Parsing for Ge'ez Sentences
Designing an Automatic Sentence based Parsing for Ge'ez Sent...
收藏 引用
2024 International Conference on Information and Communication Technology for Development for Africa, ICT4DA 2024
作者: Getahun, Mebit Kefale Yayeh Munaye, Yirga Admass, Wasyihun Asmare, Habtamu Shiferaw Faculty of Computing Mekdela Amba University Mekdela Ethiopia College of Computing Injibara University Injibara Ethiopia School of Software Engineering University of Science and Technology of China Hefei China College of Computing Mekdela Amba University Mekdela Ethiopia
This study addresses the need for parsing tools in Ge'ez natural language processing (NLP) systems. Parsing breaks down sentences into their component parts (words and phrases) and assigns grammatical roles. This ... 详细信息
来源: 评论
PhishGuard: Machine Learning-Powered Phishing URL Detection
PhishGuard: Machine Learning-Powered Phishing URL Detection
收藏 引用
2023 Congress in Computer Science, Computer engineering, and Applied computing, CSCE 2023
作者: Murad, Saydul Akbar Rahimi, Nick Md Muzahid, Abu Jafar School of Computing Sciences & Computer Engineering University of Southern Mississippi Hattiesburg United States University Malaysia Pahang Faculty of Computing Pahang Malaysia
Phishing is a major threat to internet security, targeting human vulnerabilities instead of software vulnerabilities. It involves directing users to malicious websites where their sensitive information can be stolen. ... 详细信息
来源: 评论
Privacy preserving dynamic data release based on non-synonymous diverse anatomy
收藏 引用
International Journal of Security and Networks 2023年 第2期18卷 75-90页
作者: Yan, Yan Eyeleko, Anselme Herman Mahmood, Adnan Sun, Zichao Dong, Zhuoyue Xu, Fei School of Computer and Communication Lanzhou University of Technology Lanzhou730050 China School of Computing Faculty of Science and Engineering Macquarie University SydneyNSW2109 Australia
The publishing and using of big data brought unprecedented convenience to users. However, it also results in the disclosure of personal privacy information. In order to mitigate the privacy leakage risk of sensitive i... 详细信息
来源: 评论
Higher-Level Experimental Prototype of a Control Device for Dynamic Beverage-Cooling Process  46
Higher-Level Experimental Prototype of a Control Device for ...
收藏 引用
46th ICT and Electronics Convention, MIPRO 2023
作者: Spolijaric, T. Komljen, B. Vuletic Cvitas, Lj. Malcic, G. Matusko, J. Miletic, M. Zagreb University of Applied Sciences Department of Electrical Engineering Croatia University of Zagreb Faculty of Electrical Engineering and Computing Croatia
In this paper development and testing of an electronic controller for operation of a beverage cooling device is described. This development is a part of a project research that includes a cooling device with a water-s... 详细信息
来源: 评论
Secure Image Communication Using Galois Field,Hyper 3D Logistic Map,and B92 Quantum Protocol
收藏 引用
Computers, Materials & Continua 2024年 第12期81卷 4435-4463页
作者: De Rosal Ignatius Moses Setiadi Nova Rijati Ahmad Rofiqul Muslikh Bonifacius Vicky Indriyono Aceng Sambas Faculty of Computer Science Universitas Dian NuswantoroSemarang50131Central JavaIndonesia Research Center for Quantum Computing and Materials Informatics Faculty of Computer ScienceUniversitas Dian NuswantoroSemarang50131Central JavaIndonesia Faculty of Information Technology Universitas MerdekaMalang65146East JavaIndonesia Faculty of Economics and Business Universitas STRADA IndonesiaKediri64133East JavaIndonesia Faculty of Informatics and Computing Universiti Sultan Zainal AbidinCampus BesutBesut22200TerengganuMalaysia Department of Mechanical Engineering Universitas Muhammadiyah TasikmalayaTamansari GobrasTasikmalaya46196Indonesia
In this paper,we propose a novel secure image communication system that integrates quantum key distribution and hyperchaotic encryption techniques to ensure enhanced security for both key distribution and plaintext **... 详细信息
来源: 评论
Prototyping a Generic Physical Layer Encryption Scheme for IoT Networks  29
Prototyping a Generic Physical Layer Encryption Scheme for I...
收藏 引用
29th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2024
作者: Zachos, Georgios Ribeiro, Jose C. Mantas, Georgios Rodriguez, Jonathan Instituto de Telecomunicações Aveiro Portugal University of Greenwich Chatham Faculty of Engineering and Science Maritime United Kingdom University of South Wales Faculty of Computing Engineering and Science Pontypridd United Kingdom
To achieve information security objectives at the physical layer, while requiring a minimal resource footprint, Physical Layer Security (PLS) is a promising approach. In a previous work, the Grain-128PLE, a lightweigh... 详细信息
来源: 评论
Efficient Resource Allocation Algorithm in Uplink OFDM-Based Cognitive Radio Networks
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 3045-3064页
作者: Omar Abdulghafoor Musbah Shaat Ibraheem Shayea Ahmad Hamood Abdelzahir Abdelmaboud Ashraf Osman Ibrahim Fadhil Mukhlif Herish Badal Norafida Ithnin Ali Khadim Lwas Electronic&Telecommunications Engineering Department The American University of KurdistanDuhokKurdistan RegionIraq CTTC BarcelonaSpain Faculty of Electrical and Electronics Engineering Istanbul Technical UniversityIstanbulTurkey Department of Information Systems King Khalid UniversityMuhayel AseerSaudi Arabia Faculty of Computing and Informatics University Malaysia SabahKota KinabaluMalaysia Information Assurance and Security Research Group(IASRG) School of ComputingFaculty of EngineeringUniversiti Teknologi MalaysiaJohorMalaysia R&D Ministry of Industry and MineralsBaghdadIraq
The computational complexity of resource allocation processes,in cognitive radio networks(CRNs),is a major issue to be ***,the complicated solution of the optimal algorithm for handling resource allocation in CRNs mak... 详细信息
来源: 评论
YOLOv8-Based Model for Precise Corrosion Segmentation in Industrial Imagery
YOLOv8-Based Model for Precise Corrosion Segmentation in Ind...
收藏 引用
2024 International Conference on Computational Intelligence for Green and Sustainable Technologies, ICCIGST 2024
作者: Chandu, Seethala Devi Varma, Sai Ranjani, M. SRM Institute of Science and Technology Kattankulathur Department of Computing Technologies Chennai India SRM Institute of Science and Technology Kattankulathur Faculty of Engineering and Technology Department of Computing and Technologies Chennai India
A significant risk to the longevity and intelligence of fundamental infrastructure, such bridges and pipelines, is corrosion. Easy finding and erosion monitoring are important for predicting additional setbacks and en... 详细信息
来源: 评论
Enhancing Intent-Driven Networking with Granular and Aspect Approach  33
Enhancing Intent-Driven Networking with Granular and Aspect ...
收藏 引用
33rd International Telecommunication Networks and Applications Conference, ITNAC 2023
作者: Dragun, Nenad Bogunovic, Nikola Independent Researcher Zagreb Croatia University of Zagreb Faculty of Electrical Engineering and Computing Zagreb Croatia
Intent-driven networking propelled by new networking concepts as well as the introduction of achievements from machine learning and artificial intelligence domains in network management, has gained a significant momen... 详细信息
来源: 评论
Investigation of Internet-of-Things gateway-based solution for protection of industrial control systems
Investigation of Internet-of-Things gateway-based solution f...
收藏 引用
2023 International Conference on Electrical, Computer, Communications and Mechatronics engineering, ICECCME 2023
作者: Slunjski, M. Sumina, D. University of Zagreb Faculty of Electrical Engineering and Computing Unska 3 Zagreb10 000 Croatia
The paper deals with different industrial control system (ICS) cyber threats by investigating simple to implement and effective protection solution. The protection solution is a combination of software (hereinafter re... 详细信息
来源: 评论