咨询与建议

限定检索结果

文献类型

  • 8,555 篇 会议
  • 5,887 篇 期刊文献
  • 228 册 图书

馆藏范围

  • 14,670 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,854 篇 工学
    • 6,120 篇 计算机科学与技术...
    • 4,959 篇 软件工程
    • 2,219 篇 信息与通信工程
    • 1,415 篇 控制科学与工程
    • 1,173 篇 电气工程
    • 1,118 篇 生物工程
    • 1,065 篇 电子科学与技术(可...
    • 875 篇 生物医学工程(可授...
    • 738 篇 机械工程
    • 618 篇 光学工程
    • 561 篇 仪器科学与技术
    • 448 篇 动力工程及工程热...
    • 424 篇 化学工程与技术
    • 385 篇 网络空间安全
    • 334 篇 安全科学与工程
    • 298 篇 交通运输工程
  • 5,106 篇 理学
    • 2,442 篇 数学
    • 1,772 篇 物理学
    • 1,256 篇 生物学
    • 821 篇 统计学(可授理学、...
    • 566 篇 系统科学
    • 478 篇 化学
  • 2,541 篇 管理学
    • 1,575 篇 管理科学与工程(可...
    • 1,043 篇 图书情报与档案管...
    • 745 篇 工商管理
  • 934 篇 医学
    • 788 篇 临床医学
    • 675 篇 基础医学(可授医学...
    • 411 篇 药学(可授医学、理...
    • 380 篇 公共卫生与预防医...
  • 401 篇 法学
    • 328 篇 社会学
  • 281 篇 经济学
  • 210 篇 农学
  • 198 篇 教育学
  • 64 篇 文学
  • 38 篇 军事学
  • 34 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 443 篇 deep learning
  • 297 篇 machine learning
  • 260 篇 feature extracti...
  • 238 篇 computational mo...
  • 232 篇 accuracy
  • 214 篇 internet of thin...
  • 214 篇 information tech...
  • 205 篇 optimization
  • 194 篇 artificial intel...
  • 184 篇 support vector m...
  • 181 篇 computer science
  • 174 篇 predictive model...
  • 172 篇 data mining
  • 150 篇 training
  • 131 篇 neural networks
  • 121 篇 covid-19
  • 119 篇 real-time system...
  • 116 篇 security
  • 114 篇 computational in...
  • 110 篇 wireless communi...

机构

  • 286 篇 department for p...
  • 285 篇 faculty of scien...
  • 284 篇 department of ph...
  • 280 篇 departamento de ...
  • 275 篇 department of ph...
  • 271 篇 kirchhoff-instit...
  • 268 篇 department of ph...
  • 266 篇 department of ph...
  • 258 篇 faculté des scie...
  • 242 篇 institute of phy...
  • 240 篇 fakultät für phy...
  • 231 篇 institut für ast...
  • 229 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 219 篇 physics division...
  • 213 篇 department of ph...
  • 208 篇 department of ph...
  • 201 篇 institute of phy...
  • 198 篇 department of ph...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 263 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 255 篇 s. guindon
  • 251 篇 d. guest

语言

  • 14,076 篇 英文
  • 492 篇 其他
  • 92 篇 中文
  • 23 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Faculty of Information Technology and Computer Engineering"
14670 条 记 录,以下是111-120 订阅
排序:
Privacy Protection in Learning Management Systems’ Mobile technology-Based Learning Analytics
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第6期19卷 197-208页
作者: Rawat, Manoj Kumar Jha, Suresh Kumar Sree Lakshmi, A. Venkata Ramana, J. Gonge, Sudhanshu S. De, Arunava Department of Computer Science and Engineering Medi-Caps University Madhya Pradesh Indore India Manipal University Rajasthan Jaipur India Geetanjali College of Engineering and Technology Telangana Hyderabad India Department of MBA KL Business School Koneru Lakshmaiah Education Foundation Vaddeswaram Campus Guntur District Andhra Pradesh India Department of Computer Science & Information Technology Symbiosis Institute of Technology Lavale A Constituent of Symbiosis International University Maharashtra Pune India Faculty of Information Technology Gopal Narayan Singh University Bihar Jamuhar India
Mobile technology use in education is changing, much like in the business and health sectors. Research is now conducted on designing user-centric platforms that allow people to engage in teaching and learning activiti... 详细信息
来源: 评论
Rethinking Transferable Adversarial Attacks With Double Adversarial Neuron Attribution
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第2期6卷 354-364页
作者: Zhu, Zhiyu Jin, Zhibo Wang, Xinyi Zhang, Jiayu Chen, Huaming Choo, Kim-Kwang Raymond University of Sydney School of Electrical and Computer Engineering DarlingtonNSW2008 Australia University of Malaya Faculty of Computer Science and Information Technology KualaLumpur50603 Malaysia SuZhou Yierqi Jiangsu Suzhou215000 China The University of Texas at San Antonio San AntonioTX78249 United States
Transferable adversarial attacks are a threat to deep neural networks, in particular, for black-box scenarios where access to model information is limited. One can, for example, exploit the intermediate layer neurons ... 详细信息
来源: 评论
Automatic speaker identification system based on MLP network and deep learning in the presence of severe interference
收藏 引用
Multimedia Tools and Applications 2025年 1-42页
作者: Shafik, Amira Sedik, Ahmed El-Shafai, Walid Khalaf, Ashraf A. M. El-Rabaie, El-Sayed M. El-Samie, Fathi E. Abd Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Electrical Engineering Faculty of Engineering Minia University Minia61519 Egypt Smart Systems Engineering Laboratory College of Engineering Prince Sultan University Riyadh11586 Saudi Arabia Department of the Robotics and Intelligent Machines Faculty of Artificial Intelligence Kafr Elsheikh University Kafr El‑Shaikh Egypt Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Automatic Speaker Identification (ASI) is so crucial for security. Current ASI systems perform well in quiet and clean surroundings. However, in noisy situations, the robustness of an ASI system against additive noise... 详细信息
来源: 评论
A Novel Hybrid Approach-Based on Heartbeat and Accelerometer Signals for Enhanced Security in WBSNs
收藏 引用
IEEE Sensors Journal 2025年 第6期25卷 10295-10308页
作者: Yan, Guixiang Zhang, Guanghe Liu, Fanghua Williams Samuel, Oluwarotimi Aborokbah, Majed Guo, Jiquan Zhu, Liqing Wei, Sikang Jiangxi Normal University School of Computer and Information Engineering Nanchang330022 China University of Derby School of Computing and Data Science Research Centre DerbyDE22 3AW United Kingdom INTI International University Faculty of Data Science and Information Technology Nilai71800 Malaysia University of Tabuk Faculty of Computers and Information Technology Tabuk71491 Saudi Arabia Jiangxi Normal University School of Digital Industry Shangrao334000 China
In wireless body sensor networks (WBSNs), ensuring secure and efficient key distribution is critical, particularly given the limited computational and energy resources of the sensors. Existing methods often struggle t... 详细信息
来源: 评论
Bidirectional LSTM-Based Energy Consumption Forecasting:Advancing AI-Driven Cloud Integration for Cognitive City Energy Management
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2907-2926页
作者: Sheik Mohideen Shah Meganathan Selvamani Mahesh Thyluru Ramakrishna Surbhi Bhatia Khan Shakila Basheer Wajdan Al Malwi Mohammad Tabrez Quasim Department of Computer Science and Engineering Srinivasa Ramanujan CentreSASTRA Deemed UniversityKumbakonam612001India Department of Computer Science and Engineering Faculty of Engineering and TechnologyJAIN(Deemed-to-be University)Bangalore562112India School of Science Engineering and EnvironmentUniversity of SalfordManchesterM54WTUK University Centre for Research and Development Chandigarh UniversityMohali140413PunjabIndia Centre for Research Impact and Outcome Chitkara University Institute of Engineering and TechnologyChitkara UniversityRajpura140401PunjabIndia Department of Information Systems College ofComputer and Information SciencePrincessNourah bintAbdulrahmanUniversityP.O.Box 84428Riyadh11671Saudi Arabia College of Computer Science Informatics and Computer Systems Department King Khalid UniversityAbha61421Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computing and Information TechnologyUniversity of BishaBisha61922Saudi Arabia
Efficient energy management is a cornerstone of advancing cognitive cities,where AI,IoT,and cloud computing seamlessly integrate to meet escalating global energy *** this context,the ability to forecast electricity co... 详细信息
来源: 评论
Enhanced Speech Emotion and Gender Recognition Using Hybrid CNN-LSTM Models  4
Enhanced Speech Emotion and Gender Recognition Using Hybrid ...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Priyadharshini, S. Sundar, G. Naveen Narmadha, D. Thangavel, Senthil Kumar Ajibesin, Adeyemi Abel Kolandapalayam Shanmugam, Selvanayaki Karunya Institute of Technology and Sciences Department of Computer Science and Engineering Coimbatore India Amrita School of Computing Department of Computer Science and Engineering Coimbatore India Cape Peninsula University of Technology Faculty of Informatics and Design Department of Information Technology South Africa Ashland University Department of Mathematics and Computer Science United States
The current paper proposes a new approach for peripheral speech emotion analysis and gender estimation incorporating the best machine learning architectures such as CNNs and LSTMs. Its correct depiction of emotions an... 详细信息
来源: 评论
Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第3期19卷 170-190页
作者: Al-Nawashi, Malek M. Al-Hazaimeh, Obaida M. Tahat, Nedal M. Gharaibeh, Nasr Abu-Ain, Waleed A. Abu-Ain, Tarik Al-Huson University College Al-Balqa Applied University Irbid Jordan Faculty of Information Technology Department of Information Security and Cybersecurity Philadelphia University Amman Jordan Faculty of Science The Hashemite University Zarqa Jordan College of Science and Computer Engineering Taibah University Yanbu Saudi Arabia College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia
The detection of cyberattacks has been increasingly emphasized in recent years, focusing on both infrastructure and people. Conventional security measures such as intrusion detection, firewalls, and encryption are ins... 详细信息
来源: 评论
Deep Learning-Driven Throughput Maximization in Covert Communication for UAV-RIS Cognitive Systems
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2025年 6卷 4140-4155页
作者: Vo, Van Nhan Long, Nguyen Quoc Dang, Viet-Hung Ho, Tu Dac Tran, Hung Chatzinotas, Symeon Tran, Dinh-Hieu Sanguanpong, Surasak So-In, Chakchai Faculty of Information Technology Duy Tan University Da Nang550000 Viet Nam Institute of Research and Development Duy Tan University Da Nang550000 Viet Nam Department of Information Security and Communication Technology Faculty of Information Technology and Electrical Engineering Norwegian University of Science and Technology - NTNU Norway DATCOM Lab Faculty of Data Science and Artificial Intelligence College of Technology National Economics University Hanoi12116 Viet Nam University of Luxembourg Luxembourg Department of Computer Engineering Faculty of Engineering Kasetsart University Bangkok10900 Thailand College of Computing Khon Kaen University Khon Kaen40002 Thailand
This paper examines a cognitive radio (CR) nonorthogonal multiple access (NOMA) system in which an unmanned aerial vehicle equipped with a reconfigurable intelligent surface (UAV-RIS) plays two roles: relaying and fri... 详细信息
来源: 评论
Water Quality Classification Using an Artificial Neural Network  1st
Water Quality Classification Using an Artificial Neural Netw...
收藏 引用
1st International Conference on Intelligent Systems, Blockchain, and Communication Technologies, ISBCom 2024
作者: Mohsen, Saeed Abdel-Rehim, Wael M. F. Abdel-Aziz, M. Electronics and Communications Engineering Department Al-Madinah Higher Institute for Engineering and Technology Giza12947 Egypt South Sinai46511 Egypt Department of Computer Science Faculty of Computers and Information Suez University Suez43512 Egypt Department of Basic Sciences Faculty of Computer and Information Sciences Ain Shams University Cairo11566 Egypt
Water quality is vital for public health and ecosystem sustainability. However, approximately 2 billion people worldwide do not have access to drinking water that is appropriately managed, contributing to significant ... 详细信息
来源: 评论
MetaCon: Revitalizing Internet Congestion Control with Meta-Reinforcement Learning
MetaCon: Revitalizing Internet Congestion Control with Meta-...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Bai, He Li, Hui Que, Jianming Zhang, Minglong Chong, Peter Han Joo Sudheera, Kalupahana Liyanage Kushan Pei, Xinyuan School of Electronic and Computer Engineering Peking University Shenzhen China School of Computer Science Fuyao University of Science and Technology Fuzhou China Department of Electrical and Computer Engineering Mississippi State University Starkville United States School of Engineering Computer and Mathematical Sciences Auckland University of Technology Auckland New Zealand Department of Electrical and Information Engineering Faculty of Engineering University of Ruhuna Sri Lanka
Effective congestion control algorithms (CCAs) are crucial for the smooth operation of Internet communication infrastructure. CCAs adjust transmission rates based on congestion signals, optimizing resource utilization... 详细信息
来源: 评论