咨询与建议

限定检索结果

文献类型

  • 11,654 篇 会议
  • 7,228 篇 期刊文献
  • 294 册 图书

馆藏范围

  • 19,176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,429 篇 工学
    • 7,948 篇 计算机科学与技术...
    • 6,433 篇 软件工程
    • 2,814 篇 信息与通信工程
    • 1,854 篇 控制科学与工程
    • 1,471 篇 电气工程
    • 1,405 篇 生物工程
    • 1,332 篇 电子科学与技术(可...
    • 1,120 篇 生物医学工程(可授...
    • 893 篇 机械工程
    • 792 篇 光学工程
    • 694 篇 仪器科学与技术
    • 542 篇 动力工程及工程热...
    • 521 篇 化学工程与技术
    • 452 篇 网络空间安全
    • 398 篇 安全科学与工程
    • 348 篇 交通运输工程
  • 6,466 篇 理学
    • 3,170 篇 数学
    • 2,133 篇 物理学
    • 1,582 篇 生物学
    • 1,042 篇 统计学(可授理学、...
    • 749 篇 系统科学
    • 587 篇 化学
  • 3,251 篇 管理学
    • 1,982 篇 管理科学与工程(可...
    • 1,377 篇 图书情报与档案管...
    • 965 篇 工商管理
  • 1,177 篇 医学
    • 1,002 篇 临床医学
    • 846 篇 基础医学(可授医学...
    • 510 篇 药学(可授医学、理...
    • 482 篇 公共卫生与预防医...
  • 508 篇 法学
    • 421 篇 社会学
  • 349 篇 经济学
  • 281 篇 教育学
  • 272 篇 农学
  • 84 篇 文学
  • 46 篇 艺术学
  • 41 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 528 篇 deep learning
  • 320 篇 feature extracti...
  • 307 篇 accuracy
  • 295 篇 machine learning
  • 290 篇 computer science
  • 262 篇 internet of thin...
  • 259 篇 computational mo...
  • 244 篇 support vector m...
  • 237 篇 optimization
  • 234 篇 information tech...
  • 232 篇 artificial intel...
  • 201 篇 data mining
  • 196 篇 training
  • 194 篇 neural networks
  • 154 篇 image segmentati...
  • 154 篇 predictive model...
  • 150 篇 covid-19
  • 141 篇 wireless communi...
  • 136 篇 computer archite...
  • 128 篇 reliability

机构

  • 286 篇 faculty of scien...
  • 284 篇 department for p...
  • 283 篇 department of ph...
  • 280 篇 departamento de ...
  • 276 篇 department of ph...
  • 270 篇 department of ph...
  • 267 篇 department of ph...
  • 266 篇 kirchhoff-instit...
  • 259 篇 faculté des scie...
  • 230 篇 fakultät für phy...
  • 229 篇 yerevan physics ...
  • 225 篇 department of ph...
  • 224 篇 department of ph...
  • 220 篇 physics division...
  • 216 篇 department of ph...
  • 212 篇 institute of phy...
  • 208 篇 institut für ast...
  • 205 篇 department of ph...
  • 199 篇 department of ph...
  • 177 篇 institute of phy...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 264 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 251 篇 d. guest
  • 246 篇 s. guindon

语言

  • 16,837 篇 英文
  • 2,187 篇 其他
  • 140 篇 中文
  • 32 篇 日文
  • 15 篇 德文
  • 9 篇 法文
  • 4 篇 俄文
  • 3 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 波兰文
检索条件"机构=Faculty of Information and Computer Engineering"
19176 条 记 录,以下是11-20 订阅
排序:
Towards robust and efficient intrusion detection in IoMT: a deep learning approach addressing data leakage and enhancing model generalizability
收藏 引用
Multimedia Tools and Applications 2024年 1-20页
作者: Bouke, Mohamed Aly El Atigh, Hayate Abdullah, Azizol Department of Communication Technology and Network Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang43400 Malaysia Departement of Computer Engineering Faculty of Computer Engineering Bandirma Onyedi Eylul University Balikesir10200 Turkey
The Internet of Medical Things (IoMT) brings advanced patient monitoring and predictive analytics to healthcare but also raises cybersecurity and data privacy issues. This paper introduces a deep-learning model for Io... 详细信息
来源: 评论
An Adaptive Framework for Classification and Detection of Android Malware
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第21期18卷 59-73页
作者: Al Sharah, Ashraf Alrub, Yousef Abu Owida, Hamza Abu Elsoud, Esraa Abu Alshdaifat, Nawaf Khtatnaha, Hamzah Department of Electrical Engineering College of Engineering Technology Al-Balqa Applied University Amman Jordan Department of Computer Information Systems Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Medical Engineering Faculty of Engineering Al-Ahliyya Amman University Amman Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa Jordan Faculty of Information Technology Applied Science Private University Amman Jordan
The hardware and software of a computer are controlled by its operating system (OS), which performs essential tasks such as input and output processing, file and memory management, and the management of peripheral dev... 详细信息
来源: 评论
VSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain
收藏 引用
ACM Transactions on Sensor Networks 2024年 第2期20卷 1-22页
作者: Tian, Siben Bai, Fenhua Shen, Tao Zhang, Chi Gong, Bei Faculty of Information Engineering and Automation Kunming University of Science and Technology Yunnan Key Laboratory of Computer Technology Applications China Faculty of Information Technology Beijing University of Technology China
To solve the problems of vote forgery and malicious election of candidate nodes in the Raft consensus algorithm, we combine zero trust with the Raft consensus algorithm and propose a secure and efficient consensus alg... 详细信息
来源: 评论
A three-branch deep neural network for diagnosing respiratory sounds
收藏 引用
Neural Computing and Applications 2024年 第35期36卷 22611-22631页
作者: Imani, Maryam Ghassemian, Hassan Image Processing and Information Analysis Lab Faculty of Electrical and Computer Engineering Tarbiat Modares University Tehran Iran
Finding an accurate model is essential for classification of respiratory pathologies through extraction and fusion of respiratory sounds’ features. To handle the unlabeled data, a sequence of autoencoders are used fo... 详细信息
来源: 评论
A Novel Framework for Gauging information Extracted from Smartphones Using Neutrosophic Logic
收藏 引用
Neutrosophic Sets and Systems 2025年 76卷 154-171页
作者: Abou Alzahab, R.M. Ismail, Amr Abd Elkhalik, S.H. Shams, M.Y. El-Bakry, H.M. Salama, A.A. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah51418 Saudi Arabia Department. of Communication and Computer Engineering Air Defense University Egypt Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt Department of Information Systems. Faculty of Computer and Information Science Mansoura University Egypt
Smartphones contain a vast amount of information about their users, which can be used as evidence in criminal cases. However, the sheer volume of data can make it challenging for forensic investigators to identify and... 详细信息
来源: 评论
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG College of Information Science and Engineering Hunan Normal University School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Computer Science Department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 评论
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5035-5048页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
MV-DUO: multi-variate discrete unified optimization for psychological vital assessments
收藏 引用
Neural Computing and Applications 2024年 第31期36卷 19777-19793页
作者: Pethuraj, Mohamed Shakeel Burhanuddin, M.A. Dzakiyullah, Nur Rachman Department of Information System Faculty of Computer and Engineering Universitas Alma Ata Yogyakarta Indonesia Faculty of Information and Communication Technology Universiti Teknikal Malaysia Melaka Durian Tunggal Melaka Malaysia
Psychological vital assessments are required for monitoring health conditions and observing body reactions toward diseases and medications. Wearable sensors play a vital role in sensing body vitals and presenting them... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论