咨询与建议

限定检索结果

文献类型

  • 3,848 篇 期刊文献
  • 3,406 篇 会议
  • 90 册 图书

馆藏范围

  • 7,344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,502 篇 工学
    • 2,719 篇 计算机科学与技术...
    • 2,219 篇 软件工程
    • 1,010 篇 信息与通信工程
    • 742 篇 控制科学与工程
    • 704 篇 电气工程
    • 580 篇 电子科学与技术(可...
    • 474 篇 生物工程
    • 411 篇 机械工程
    • 400 篇 光学工程
    • 361 篇 生物医学工程(可授...
    • 336 篇 仪器科学与技术
    • 222 篇 化学工程与技术
    • 218 篇 动力工程及工程热...
    • 175 篇 材料科学与工程(可...
    • 165 篇 航空宇航科学与技...
    • 144 篇 交通运输工程
  • 2,924 篇 理学
    • 1,244 篇 物理学
    • 1,148 篇 数学
    • 572 篇 生物学
    • 407 篇 统计学(可授理学、...
    • 302 篇 系统科学
    • 260 篇 化学
    • 196 篇 地球物理学
  • 1,117 篇 管理学
    • 734 篇 管理科学与工程(可...
    • 417 篇 图书情报与档案管...
    • 322 篇 工商管理
  • 419 篇 医学
    • 364 篇 临床医学
    • 277 篇 基础医学(可授医学...
    • 167 篇 药学(可授医学、理...
    • 143 篇 公共卫生与预防医...
  • 153 篇 法学
  • 107 篇 农学
  • 97 篇 经济学
  • 63 篇 教育学
  • 28 篇 文学
  • 18 篇 艺术学
  • 17 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 194 篇 deep learning
  • 148 篇 machine learning
  • 134 篇 feature extracti...
  • 120 篇 laboratories
  • 111 篇 computational mo...
  • 107 篇 artificial intel...
  • 107 篇 accuracy
  • 90 篇 training
  • 88 篇 information tech...
  • 85 篇 optimization
  • 83 篇 semantics
  • 71 篇 internet of thin...
  • 68 篇 computer science
  • 66 篇 predictive model...
  • 63 篇 image segmentati...
  • 61 篇 data mining
  • 60 篇 reinforcement le...
  • 57 篇 neural networks
  • 53 篇 wireless communi...
  • 50 篇 visualization

机构

  • 285 篇 faculty of scien...
  • 284 篇 department for p...
  • 283 篇 department of ph...
  • 279 篇 departamento de ...
  • 275 篇 department of ph...
  • 267 篇 department of ph...
  • 266 篇 department of ph...
  • 260 篇 kirchhoff-instit...
  • 258 篇 faculté des scie...
  • 252 篇 institute of phy...
  • 241 篇 fakultät für phy...
  • 228 篇 yerevan physics ...
  • 228 篇 institut für ast...
  • 226 篇 institute of phy...
  • 223 篇 department of ph...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 210 篇 department of ph...
  • 205 篇 department of ph...
  • 198 篇 department of ph...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 264 篇 g. spigo
  • 264 篇 a. c. könig
  • 263 篇 f. siegert
  • 261 篇 m. klein
  • 259 篇 r. ströhmer
  • 258 篇 h. a. gordon
  • 255 篇 h. sakamoto
  • 255 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 255 篇 g. gaudio
  • 255 篇 s. mohapatra
  • 253 篇 y. nagasaka
  • 245 篇 s. guindon
  • 242 篇 d. guest

语言

  • 6,819 篇 英文
  • 425 篇 其他
  • 87 篇 中文
  • 11 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Information Technology and Systems Computer Engineering Laboratory"
7344 条 记 录,以下是451-460 订阅
排序:
Enhancing Image Security with Rossler Attractor-Based Encryption
Enhancing Image Security with Rossler Attractor-Based Encryp...
收藏 引用
Cyber Resilience (ICCR), International Conference on
作者: Hazem Al-Najjar Nadia Al-Rousan Department of Computer science Faculty of information technology University of Petra Amman Jordan Department of Computer Engineering Faculty of electrical Engineering and information systems German Jordanian University
we introduced image encryption algorithms with high sensitivity, such that even a single alteration in a plain-text image would result in a complete transformation of the ciphered image. The first algorithm employed p... 详细信息
来源: 评论
An Optimal Scheme for WSN Based on Compressed Sensing
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 1053-1069页
作者: Firas Ibrahim AlZobi Ahmad Ali AlZubi Kulakov Yurii Abdullah Alharbi Jazem Mutared Alanazi Sami Smadi Department of Information Systems and Networks Faculty of Information TechnologyThe World Islamic Sciences&Education UniversityJordan Computer Science Department Community CollegeKing Saud UniversitySaudi Arabia Department of Computer Engineering National Technical University of Ukraine Igor Sikorsky Kyiv Polytechnic InstituteUkraine
Wireless sensor networks(WSNs)is one of the renowned ad hoc network technology that has vast varieties of applications such as in computer networks,bio-medical engineering,agriculture,industry and many *** has been us... 详细信息
来源: 评论
An Optimized Algorithm for Resource Allocation for D2D in Heterogeneous Networks
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 2923-2936页
作者: Abdul Kadir Hamid Fahd N.Al-Wesabi Nadhem Nemri Ammar Zahary Imran Khan Department of Electrical&Computer Engineering University of SharjahSharjahUnited Arab Emirates Department of Computer Science King Khalid UniversityMuhayel AseerKSA Faculty of Computer and IT Sana’a UniversitySanaaYemen Department of Information Systems King Khalid UniversityMayahel AseerKSA Department of Electrical Engineering University of Engineering and TechnologyPeshawarPaki
With the emergence of 5G mobile multimedia services,end users’demand for high-speed,low-latency mobile communication network access is *** them,the device-to-device(D2D)communication is one of the considerable *** D2... 详细信息
来源: 评论
Scavenger: Better Space-Time Trade-Offs for Key-Value Separated LSM-trees  40
Scavenger: Better Space-Time Trade-Offs for Key-Value Separa...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Zhang, Jianshun Wang, Fang Qiu, Sheng Wang, Yi Ou, Jiaxin Huang, Junxun Li, Baoquan Fang, Peng Feng, Dan School of Computer Science and Technology Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China China Shenzhen Huazhong University of Science and Technology Research Institute China Bytefrance Inc.
Key-Value Stores (KVS) implemented with log-structured merge-tree (LSM-tree) have gained widespread ac-ceptance in storage systems. Nonetheless, a significant challenge arises in the form of high write amplification d... 详细信息
来源: 评论
SpamVis: A Visual Interactive System for Spam Review Detection  28th
SpamVis: A Visual Interactive System for Spam Review Detecti...
收藏 引用
28th International Conference on Knowledge Based and Intelligent information and engineering systems, KES 2024
作者: Lam, Nguyen Thanh Thao Le, Nu Uyen Phuong Islam, Md Rafiqul Sakib, Md KowsarHossain Prome, Shanjita Akter Sanin, Cesar Szczerbicki, Edward Zhou, Jianlong College of Business & Management VinUniversity Hanoi12426 Viet Nam Faculty of Engineering Architecture and Information Technology University of Queensland BrisbaneQLD4072 Australia Business Information Systems Australian Institute of Higher Education SydneyNSW Australia School of Computer Science Taylor's University Malaysia Faculty of Management and Economics Gdansk University of Technology Gdansk Poland School of Computer Science University of Technology Sydney Australia
In recent times, the number of spam reviews through various online platforms has emerged as a prime challenge, profoundly impacting businesses and consumers. These fake reviews not only distort clients' perception... 详细信息
来源: 评论
A Dynamic Resource-Aware Routing Protocol in Resource-Constrained Opportunistic Networks
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 4147-4167页
作者: Aref Hassan Kurd Ali Halikul Lenando Slim Chaoui Mohamad Alrfaay Medhat A.Tawfeek Department of Computer Systems and Communication Technologies Faculty of Computer Science and Information TechnologyUniversiti Malaysia Sarawak(UNIMAS)Kota Samarahan94300Malaysia Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka2014KSA Unit-Lab of Sciences of Electronics Technologies of Information and TelecommunicationsSfax UniversitySfaxTunisia Department of Basic Sciences First Common Year DeanshipJouf UniversitySakaka2014KSA Department of Computer Sciences College of Computer and Information SciencesJouf UniversitySakaka2014KSA Department of Computer Sciences Faculty of Computers and InformationMenoufia UniversityEgypt
Recently,Opportunistic Networks(OppNets)are considered to be one of the most attractive developments of Mobile Ad Hoc Networks that have arisen thanks to the development of intelligent *** are characterized by a rough... 详细信息
来源: 评论
Historical Arabic Images Classification and Retrieval Using Siamese Deep Learning Model
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 2109-2125页
作者: Manal M.Khayyat Lamiaa A.Elrefaei Mashael M.Khayyat Computer Science Department Umm Al-Qura UniversityMakkahSaudi Arabia Computer Science Department King Abdulaziz UniversityJeddahSaudi Arabia Electrical Engineering Department Faculty of Engineering at ShoubraBenha UniversityCairoEgypt Department of Information Systems and Technology College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia
Classifying the visual features in images to retrieve a specific image is a significant problem within the computer vision field especially when dealing with historical faded colored ***,there were lots of efforts try... 详细信息
来源: 评论
Optimization of Grayscale Image Security through the use of Hybrid Cryptographic Techniques based on Sine and Logistics Maps  4
Optimization of Grayscale Image Security through the use of ...
收藏 引用
4th International Conference on Innovative Research in Applied Science, engineering and technology, IRASET 2024
作者: Koulouh, Fatima Safae, Amine Es-Sabry, Mohammed Mostafa, Merras Elakkad, Nabile Sidi Mohamed Ben Abdellah University Department Of Computer Science Morocco Abdelmalek Essaadi University Laboratory Of Information Security Intelligent Systems And Applications Tetouan Morocco High School Of Technology Moulay Ismail University Image Laboratory Morocco Sidi Mohamed Ben Abdellah University Laboratory Of Engineering Systems And Applications Morocco
This paper presents an innovative method for enhancing security improve the security of grayscale images by integrating hybrid cryptographic techniques, specifically taking advantage of the sine map and a dual applica... 详细信息
来源: 评论
A Framework for Cyber-Secure Monitoring and Safe Operation of Solar PV Microgrids
A Framework for Cyber-Secure Monitoring and Safe Operation o...
收藏 引用
2024 IEEE Energy Conversion Congress and Exposition, ECCE 2024
作者: Kim, Jaewon Ilic, Marija Xie, Le Massachusetts Institute of Technology Laboratory for Information & Decision Systems CambridgeMA02139 United States Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science CambridgeMA02139 United States Texas A&m University Department of Electrical & Computer Engineering College StationTX77843 United States
In this paper, we introduce a systematic design of an end-to-end cyber-secure monitoring and safe operation framework for solar photovoltaic (PV)-rich microgrids, by focusing on the use of on-line attack detector for ... 详细信息
来源: 评论
Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5607-5623页
作者: Abdallah Elhigazi Abdallah Mosab Hamdan Shukor Abd Razak Fuad A.Ghalib Muzaffar Hamzah Suleman Khan Siddiq Ahmed Babikir Ali Mutaz H.H.Khairi Sayeed Salih Faculty of Engineering Future UniversityKhartoum 10553Sudan Faculty of Computing and Informatics Universiti Malaysia SabahKota Kinabalu88400Malaysia Information Assurance and Security Research School of ComputingUniversiti Teknologi MalaysiaJohor81310Malaysia School of Psychology and Computer Science University of Central LancashirePreston PR12HEUK Deaptement of Management Information Systems College of Administrative ScienceApplied Science UniversityAl Eker623Bahrain Deaptement of Information Technology College of Computer and Information SciencesKing Saud UniversityRiyadh11461Saudi Arabia
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 *** to the data transmission nature of the wireless local area netw... 详细信息
来源: 评论