咨询与建议

限定检索结果

文献类型

  • 3,835 篇 期刊文献
  • 3,421 篇 会议
  • 88 册 图书

馆藏范围

  • 7,344 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,606 篇 工学
    • 2,707 篇 计算机科学与技术...
    • 2,203 篇 软件工程
    • 1,003 篇 信息与通信工程
    • 737 篇 控制科学与工程
    • 689 篇 电气工程
    • 579 篇 电子科学与技术(可...
    • 472 篇 生物工程
    • 409 篇 机械工程
    • 386 篇 光学工程
    • 359 篇 生物医学工程(可授...
    • 334 篇 仪器科学与技术
    • 217 篇 化学工程与技术
    • 215 篇 动力工程及工程热...
    • 200 篇 核科学与技术
    • 186 篇 材料科学与工程(可...
    • 164 篇 航空宇航科学与技...
    • 143 篇 交通运输工程
  • 2,902 篇 理学
    • 1,234 篇 物理学
    • 1,159 篇 数学
    • 566 篇 生物学
    • 419 篇 统计学(可授理学、...
    • 301 篇 系统科学
    • 255 篇 化学
    • 196 篇 地球物理学
  • 1,107 篇 管理学
    • 725 篇 管理科学与工程(可...
    • 415 篇 图书情报与档案管...
    • 319 篇 工商管理
  • 414 篇 医学
    • 359 篇 临床医学
    • 273 篇 基础医学(可授医学...
    • 167 篇 药学(可授医学、理...
  • 153 篇 法学
  • 102 篇 农学
  • 96 篇 经济学
  • 63 篇 教育学
  • 28 篇 文学
  • 18 篇 艺术学
  • 17 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 194 篇 deep learning
  • 146 篇 machine learning
  • 140 篇 feature extracti...
  • 120 篇 laboratories
  • 114 篇 computational mo...
  • 113 篇 accuracy
  • 110 篇 artificial intel...
  • 99 篇 training
  • 88 篇 information tech...
  • 87 篇 semantics
  • 86 篇 optimization
  • 72 篇 internet of thin...
  • 66 篇 computer science
  • 65 篇 predictive model...
  • 63 篇 image segmentati...
  • 62 篇 data mining
  • 60 篇 reinforcement le...
  • 57 篇 neural networks
  • 54 篇 wireless communi...
  • 51 篇 visualization

机构

  • 286 篇 faculty of scien...
  • 285 篇 department for p...
  • 284 篇 department of ph...
  • 280 篇 departamento de ...
  • 276 篇 department of ph...
  • 269 篇 department of ph...
  • 268 篇 department of ph...
  • 263 篇 kirchhoff-instit...
  • 258 篇 faculté des scie...
  • 254 篇 institute of phy...
  • 240 篇 fakultät für phy...
  • 230 篇 institut für ast...
  • 229 篇 yerevan physics ...
  • 228 篇 institute of phy...
  • 225 篇 department of ph...
  • 223 篇 department of ph...
  • 219 篇 physics division...
  • 213 篇 department of ph...
  • 207 篇 department of ph...
  • 199 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 262 篇 m. klein
  • 260 篇 r. ströhmer
  • 259 篇 h. a. gordon
  • 256 篇 h. sakamoto
  • 256 篇 m. rijssenbeek
  • 256 篇 s. jin
  • 256 篇 g. gaudio
  • 256 篇 s. mohapatra
  • 255 篇 y. nagasaka
  • 246 篇 s. guindon
  • 243 篇 d. guest

语言

  • 6,462 篇 英文
  • 786 篇 其他
  • 90 篇 中文
  • 11 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Information Technology and Systems Computer Engineering Laboratory"
7344 条 记 录,以下是751-760 订阅
排序:
6D Movable Antenna Enhanced Interference Mitigation for Cellular-Connected UAV Communications
收藏 引用
IEEE Wireless Communications Letters 2025年 第6期14卷 1618-1622页
作者: Ren, Tianshi Zhang, Xianchao Zhu, Lipeng Ma, Wenyan Gao, Xiaozheng Zhang, Rui The School of Information and Electronics Beijing Institute of Technology Beijing100081 China The Department of Electrical and Computer Engineering National University of Singapore Singapore117583 Singapore The Provincial Key Laboratory of Multimodal Perceiving and Intelligent Systems China The Engineering Research Center of Intelligent Human Health Situation Awareness of Zhejiang Province Jiaxing University Jiaxing314001 China School of Science and Engineering Shenzhen Research Institute of Big Data The Chinese University of HongKong Guangdong Shenzhen518172 China
Cellular-connected unmanned aerial vehicle (UAV) communications is an enabling technology to transmit control signaling or payload data for UAVs through cellular networks. Due to the line-of-sight dominant air-to-grou... 详细信息
来源: 评论
The Empirical Evaluation of Artificial Intelligence-based Techniques for Improving Cyber Security  2
The Empirical Evaluation of Artificial Intelligence-based Te...
收藏 引用
2nd International Conference on Electronics and Renewable systems, ICEARS 2023
作者: Nayak, Chhaya Rao, Chintala Lakshmana Alam, Tanweer Singh, Shalini Islam, Shaziya Maginmani, Umme Habiba Pimpri Chinchwad College of Engineering Pune India School of Law Visakhapatnam India Islamic University of Madinah Faculty of Computer and Information Systems Department of Computer Science Madinah Saudi Arabia Graphic Era Deemed to Be University Department of Ece Uttarakhand Dehradun248002 India Rungta College of Engineering and Technology Bhilai India Secab Institute of Engineering and Technology Department of Computer Science and Engineering Karnataka Vijayapur India
Artificial intelligence (AI) technologies have been recently developed, and their advantages can be observed in a wide range of domains, from image processing to face detection. AI-based approaches can assist opponent... 详细信息
来源: 评论
OMNI- CHANNEL RETAILING FOR ENHANCING CUSTOMER ENGAGEMENT AMIDST SUPPLY CHAIN DISRUPTION: AN EMERGING MARKET PERSPECTIVE
Decision Making: Applications in Management and Engineering
收藏 引用
Decision Making: Applications in Management and engineering 2023年 第1期6卷 449-473页
作者: Joshi, Sudhanshu Sharma, Manu Chatterjee, Prasanjit Operations and Supply Chain Management Research Laboratory School of Management Doon University Dehradun India School of Computer Science Faculty of Engineering & Information Technology University of Technology Sydney Sydney Australia Department of Management Studies Graphic Era Deemed to be University Dehradun India Guidhall School of Business and Law London Metropolitan University London United Kingdom MCKV Institute of Engineering West Bangal India
The research aims to explore the strength of enablers and adoption barriers in omnichannel retailing (OCR) and discuss how organizations may focus on redesigning their business models in emerging markets to manage the... 详细信息
来源: 评论
Research on intrusion detection algorithm based on dilated convolution and bidirectional gating cyclic unit
Research on intrusion detection algorithm based on dilated c...
收藏 引用
2022 International Conference on Algorithms, Microchips and Network Applications
作者: Liu, Xingyuan Miao, Xianghua Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming650500 China Computer Technology Application Key Laboratory of Yunnan Province Kunming650500 China
Intrusion detection based on machine learning plays an important role in the security protection of the network environment. In order to improve the accuracy of network intrusion detection, intrusion detection algorit... 详细信息
来源: 评论
Using Lock-Free Design for Throughput-Optimized Cache Eviction
收藏 引用
Proceedings of the ACM on Measurement and Analysis of Computing systems 2025年 第2期9卷 1-28页
作者: Dong, Chao Wang, Fang Jiang, Hong Feng, Dan Huazhong University of Science and Technology Key Laboratory of Information Storage System Wuhan National Laboratory for Optoelectronics Engineering Research Center of data storage systems and Technology School of Computer Science and Technology Ministry of Education of China Hubei Wuhan China University of Texas at Arlington Department of Computer Science and Engineering ArlingtonTX United States
In large-scale information systems, storage device performance continues to improve while workloads expand in size and access characteristics. This growth puts tremendous pressure on caches and storage hierarchy in te... 详细信息
来源: 评论
Mathematical Modelling of ANP for Trust Based IoT Device Categorization in Secured Smart Logistics
收藏 引用
Journal of Network and systems Management 2025年 第3期33卷 1-35页
作者: Abbas, Arbab Waseem Marwat, Safdar Nawaz Khan Al-Fuqaha, Ala Brahim, Ghassen Ben Ahmed, Salman Khan, Waseem Ullah Institute of Computer Sciences and Information Technology Faculty of Management and Computer Sciences The University of Agriculture Peshawar Pakistan Department of Computer Systems Engineering University of Engineering and Technology Peshawar Pakistan College of Science and Engineering Hamad Bin Khalifa University Doha Qatar College of Computer Engineering and Science Prince Mohammad Bin Fahd University Al-Khobar Kingdom of Saudi Arabia
In today’s era of massive information exchange, trust plays a significant role in the Internet of Things (IoT) security and privacy. Trust specifies the confidence of one point or network entity on another in a netwo...
来源: 评论
Prepartition: Load Balancing Approach for Virtual Machine Reservations in a Cloud Data Center
收藏 引用
Journal of computer Science & technology 2023年 第4期38卷 773-792页
作者: 田文洪 徐敏贤 周光耀 吴逵 须成忠 Rajkumar Buyya School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu 610054China Yangtze Delta Region Institute(Huzhou) University of Electronic Science and Technology of ChinaHuzhou 313001China Institute of Advanced Computing and Digital Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China Department of Computer Science University of VictoriaVictoriaBCV8W 3P6Canada State Key Laboratory of Internet of Things for Smart City University of MacaoMacao 999078China School of Computing and Information Systems University of MelbourneMelbourne 3010Australia
Load balancing is vital for the efficient and long-term operation of cloud data *** virtualization,post(reactive)migration of virtual machines(VMs)after allocation is the traditional way for load balancing and consoli... 详细信息
来源: 评论
Desertification Detection in Makkah Region based on Aerial Images Classification
收藏 引用
computer systems Science & engineering 2022年 第2期40卷 607-618页
作者: Yahia Said Mohammad Barr Taoufik Saidani Mohamed Atri Electrical Engineering Department College of EngineeringNorthern Border UniversityArarSaudi Arabia Laboratory of Electronics and Microelectronics(LR99ES30) Faculty of Sciences of MonastirUniversity of MonastirTunisia Department of Computer Sciences Faculty of Computing&Information TechnologyNorthern Border UniversityRafhaSaudi Arabia College of Computer Sciences King Khalid UniversityAbhaSaudi Arabia
Desertification has become a global threat and caused a crisis,especially in Middle Eastern countries,such as Saudi *** is one of the most important cities in Saudi Arabia that needs to be protected from *** vegetatio... 详细信息
来源: 评论
A Novel Krill Herd Based Random Forest Algorithm for Monitoring Patient Health
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4553-4571页
作者: Md.Moddassir Alam Md Mottahir Alam Muhammad Moinuddin Mohammad Tauheed Ahmad Jabir Hakami Anis Ahmad Chaudhary Asif Irshad Khan Tauheed Khan Mohd Department of Health Information Management and Technology University of Hafr Al-BatinSaudi Arabia Department of Electrical and Computer Engineering Faculty of EngineeringKing AbdulazizJeddah21589Saudi Arabia Center of Excellence in Intelligent Engineering Systems King Abdul Aziz UniversityJeddahSaudi Arabia College of Medicine King Khalid UniversityAbhaSaudi Arabia Department of Physics College of ScienceJazan UniversityP.O.Box.114Jazan45142Saudi Arabia Department of Biology College of ScienceImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11623Saudi Arabia Computer Science Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Math and Computer Science Augustana CollegeIL61201United States
Artificial Intelligence(AI)is finding increasing application in healthcare *** learning systems are utilized for monitoring patient health through the use of IoT sensor,which keep track of the physiological state by w... 详细信息
来源: 评论
Unveiling the Landscape of Machine Learning and Deep Learning Methodologies in Network Security: A Comprehensive Literature Review  2
Unveiling the Landscape of Machine Learning and Deep Learnin...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Saeed, Nouf Majid Sultan Eid Ibrahim, Amer Ali, Liaqat Al-Dmour, Nidal A. Mohammed, Abdul Salam Ghazal, Taher M. American University In The Emirates Dubai United Arab Emirates College Of Engineering And Technology University Of Science And Technology Of Fujairah Fujairah United Arab Emirates College Of Engineering Mutah University Department Of Computer Engineering Jordan Skyline University College University City Sharjah Shariah United Arab Emirates Khalifa University Centre For Cyber Physical Systems Computer Science Department United Arab Emirates Center For Cyber Security Faculty Of Information Science And Technology Selangor Bangi43600 Malaysia
The dynamic nature of cyber threats offers a continual problem in the field of cybersecurity in the context of the expanding internet environment. This study provides an in-depth assessment of the literature on machin... 详细信息
来源: 评论