咨询与建议

限定检索结果

文献类型

  • 3,848 篇 期刊文献
  • 3,406 篇 会议
  • 90 册 图书

馆藏范围

  • 7,344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,502 篇 工学
    • 2,719 篇 计算机科学与技术...
    • 2,219 篇 软件工程
    • 1,010 篇 信息与通信工程
    • 742 篇 控制科学与工程
    • 704 篇 电气工程
    • 580 篇 电子科学与技术(可...
    • 474 篇 生物工程
    • 411 篇 机械工程
    • 400 篇 光学工程
    • 361 篇 生物医学工程(可授...
    • 336 篇 仪器科学与技术
    • 222 篇 化学工程与技术
    • 218 篇 动力工程及工程热...
    • 175 篇 材料科学与工程(可...
    • 165 篇 航空宇航科学与技...
    • 144 篇 交通运输工程
  • 2,924 篇 理学
    • 1,244 篇 物理学
    • 1,148 篇 数学
    • 572 篇 生物学
    • 407 篇 统计学(可授理学、...
    • 302 篇 系统科学
    • 260 篇 化学
    • 196 篇 地球物理学
  • 1,117 篇 管理学
    • 734 篇 管理科学与工程(可...
    • 417 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 419 篇 医学
    • 364 篇 临床医学
    • 277 篇 基础医学(可授医学...
    • 167 篇 药学(可授医学、理...
    • 143 篇 公共卫生与预防医...
  • 153 篇 法学
  • 107 篇 农学
  • 97 篇 经济学
  • 63 篇 教育学
  • 28 篇 文学
  • 18 篇 艺术学
  • 17 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 194 篇 deep learning
  • 148 篇 machine learning
  • 134 篇 feature extracti...
  • 120 篇 laboratories
  • 111 篇 computational mo...
  • 107 篇 artificial intel...
  • 107 篇 accuracy
  • 90 篇 training
  • 88 篇 information tech...
  • 85 篇 optimization
  • 83 篇 semantics
  • 71 篇 internet of thin...
  • 68 篇 computer science
  • 66 篇 predictive model...
  • 63 篇 image segmentati...
  • 61 篇 data mining
  • 60 篇 reinforcement le...
  • 57 篇 neural networks
  • 53 篇 wireless communi...
  • 50 篇 visualization

机构

  • 285 篇 faculty of scien...
  • 284 篇 department for p...
  • 283 篇 department of ph...
  • 279 篇 departamento de ...
  • 275 篇 department of ph...
  • 267 篇 department of ph...
  • 266 篇 department of ph...
  • 260 篇 kirchhoff-instit...
  • 258 篇 faculté des scie...
  • 252 篇 institute of phy...
  • 241 篇 fakultät für phy...
  • 228 篇 yerevan physics ...
  • 228 篇 institut für ast...
  • 226 篇 institute of phy...
  • 223 篇 department of ph...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 210 篇 department of ph...
  • 205 篇 department of ph...
  • 198 篇 department of ph...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 264 篇 g. spigo
  • 264 篇 a. c. könig
  • 263 篇 f. siegert
  • 261 篇 m. klein
  • 259 篇 r. ströhmer
  • 258 篇 h. a. gordon
  • 255 篇 h. sakamoto
  • 255 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 255 篇 g. gaudio
  • 255 篇 s. mohapatra
  • 253 篇 y. nagasaka
  • 245 篇 s. guindon
  • 242 篇 d. guest

语言

  • 6,819 篇 英文
  • 425 篇 其他
  • 87 篇 中文
  • 11 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Information Technology and Systems Computer Engineering Laboratory"
7344 条 记 录,以下是31-40 订阅
排序:
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 评论
A State-Migration Particle Swarm Optimizer for Adaptive Latent Factor Analysis of High-Dimensional and Incomplete Data
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2220-2235页
作者: Jiufang Chen Kechen Liu Xin Luo Ye Yuan Khaled Sedraoui Yusuf Al-Turki MengChu Zhou IEEE the College of Computer Science and Technology Chongqing University of Posts and Telecommunications the Department of Computer Science Columbia University the College of Computer and Information Science Southwest University the Department of Electrical and Computer Engineering Faculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Center of Research Excellence in Renewable Energy and Power Systems the Department of Electrical and Computer EngineeringFaculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Department of Electrical and Computer Engineering New Jersey Institute of Technology
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation lear... 详细信息
来源: 评论
Fuzzy clustering for electric field characterization and its application to thunderstorm interpretability
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 299-307页
作者: Xu Yang Hongyan Xing Xinyuan Ji Wei Xu Witold Pedrycz School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing 210044China Department of Electrical and Computer Engineering University of AlbertaEdmonton AB T6G 2R3Canada Systems Research Institute Polish Academy of Sciences00-901 WarsawPoland Department of Computer Engineering Faculty of Engineering and Natural SciencesIstinye University34010 IstanbulTurkey
Changes in the Atmospheric Electric Field Signal(AEFS)are highly correlated with weather changes,especially with thunderstorm ***,little attention has been paid to the ambiguous weather information implicit in AEFS **... 详细信息
来源: 评论
Learning cross-modal interaction for RGB-T tracking
收藏 引用
Science China(information Sciences) 2023年 第1期66卷 320-321页
作者: Chunyan XU Zhen CUI Chaoqun WANG Chuanwei ZHOU Jian YANG Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education School of Computer Science and Engineering Nanjing University of Science and Technology
Dear editor,Visual object tracking, which has attracted increasing attention in the field of general visual understanding, aims to track each temporally changing object in a video sequence, with the target specified o...
来源: 评论
YOLOv8n-CGW: A novel approach to multi-oriented vehicle detection in intelligent transportation systems
收藏 引用
Multimedia Tools and Applications 2025年 第7期84卷 3809-3840页
作者: Berwo, Michael Abebe Fang, Yong Sarwar, Nadeem Mahmood, Jabar Aljohani, Mansourah Elhosseini, Mostafa School of Information and Engineering Chang’an University Shaanxi Xi’an710064 China Department of Computer Science Bahria University Lahore Campus Punjab Lahore54600 Pakistan Department of Information Technology Faculty of Computing and Information Technology University of Sialkot Punjab Sialkot51040 Pakistan College of Computer Science and Engineering Taibah University Yanbu46421 Saudi Arabia Computers and Control Systems Engineering Department Faculty of Engineering Mansoura University Mansoura35516 Egypt
In the context of Intelligent Transportation systems (ITS), the role of vehicle detection and classification is indispensable for streamlining transportation management, refining traffic control, and conducting in-dep... 详细信息
来源: 评论
Feature Selection in Socio-Economic Analysis: A Multi-Method Approach for Accurate Predictive Outcomes
收藏 引用
International Journal of Crowd Science 2025年 第1期9卷 64-78页
作者: Al-Qerem, Ahmad Ali, Ali Mohd Jebreen, Issam Nabot, Ahmad Rajab, Mohammed Alauthman, Mohammad Aldweesh, Amjad Aburub, Faisal Alangari, Someah Alzgol, Musab Computer Science Department Faculty of Information Technology Zarqa University Zarqa13110 Jordan Communications and Computer Engineering Department Faculty of Engineering Al-Ahliyya Amman University Amman19328 Jordan University Headquarter University of Anbar Ramadi31001 Iraq Department of Information Security University of Petra Amman11196 Jordan College of Computing and Information Technology Shaqra University Shaqra11911 Saudi Arabia Department of Business Intelligence and Data Analytics University of Petra Amman11196 Jordan Computer Information Systems Department Faculty of Information Technology Isra University Amman11622 Jordan
Feature selection is a cornerstone in advancing the accuracy and efficiency of predictive models, particularly in nuanced domains like socio-economic analysis. This study explores nine distinct feature selection metho... 详细信息
来源: 评论
Securing Cloud-Encrypted Data:Detecting Ransomware-as-a-Service(RaaS)Attacks through Deep Learning Ensemble
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 857-873页
作者: Amardeep Singh Hamad Ali Abosaq Saad Arif Zohaib Mushtaq Muhammad Irfan Ghulam Abbas Arshad Ali Alanoud Al Mazroa School of Computer Information Sciences University of CumberlandsWilliamsburgKentucky40769USA Computer Science Department College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Mechanical Engineering College of EngineeringKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Electrical Electronics and Computer SystemsCollege of Engineering and TechnologyUniversity of SargodhaSargodha40100Pakistan Electrical Engineering Department College of EngineeringNajran UniversityNajran61441Saudi Arabia Department of Electrical Engineering The University of LahoreLahore54000Pakistan Faculty of Computer and Information Systems Islamic University of MadinahMadinah42351Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries,especially in light of the growing number of cybersecurity threats.A major and ... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
Federated Collaborative Graph Neural Networks for Few-shot Graph Classification
收藏 引用
Machine Intelligence Research 2024年 第6期21卷 1077-1091页
作者: Yu Xie Yanfeng Liang Chao Wen A.K.Qin Maoguo Gong School of Computer and Information Technology Shanxi UniversityTaiyuan030000China Key Laboratory of Collaborative Intelligence Systems of Ministry of Education Xidian UniversityXi’an710071China Department of Computer Science and Software Engineering Swinburne University of TechnologyMelbourne3000Australia
Graph neural networks(GNNs)have achieved state-of-the-art performance on graph classification tasks,which aim to pre-dict the class labels of entire graphs and have widespread ***,existing GNN based methods for graph ... 详细信息
来源: 评论
A Parallel Hybrid Testing Technique for Tri-Programming Model-Based Software systems
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4501-4530页
作者: Huda Basloom Mohamed Dahab Abdullah Saad AL-Ghamdi Fathy Eassa Ahmed Mohammed Alghamdi Seif Haridi Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia KTH Royal Institute of Technology StockholmSweden
Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple ... 详细信息
来源: 评论