咨询与建议

限定检索结果

文献类型

  • 30,271 篇 会议
  • 15,163 篇 期刊文献
  • 425 册 图书

馆藏范围

  • 45,859 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 27,070 篇 工学
    • 19,672 篇 计算机科学与技术...
    • 15,880 篇 软件工程
    • 6,562 篇 信息与通信工程
    • 4,813 篇 控制科学与工程
    • 3,189 篇 电气工程
    • 3,084 篇 生物工程
    • 2,871 篇 电子科学与技术(可...
    • 2,540 篇 生物医学工程(可授...
    • 2,111 篇 机械工程
    • 1,602 篇 仪器科学与技术
    • 1,563 篇 光学工程
    • 1,438 篇 动力工程及工程热...
    • 1,273 篇 安全科学与工程
    • 1,177 篇 化学工程与技术
    • 1,123 篇 网络空间安全
    • 1,089 篇 交通运输工程
  • 14,849 篇 理学
    • 7,093 篇 数学
    • 4,648 篇 物理学
    • 3,533 篇 生物学
    • 2,295 篇 统计学(可授理学、...
    • 2,004 篇 系统科学
    • 1,311 篇 化学
  • 8,405 篇 管理学
    • 5,235 篇 管理科学与工程(可...
    • 3,601 篇 图书情报与档案管...
    • 2,644 篇 工商管理
  • 2,854 篇 医学
    • 2,430 篇 临床医学
    • 2,125 篇 基础医学(可授医学...
    • 1,273 篇 公共卫生与预防医...
    • 1,220 篇 药学(可授医学、理...
  • 1,437 篇 法学
    • 1,154 篇 社会学
  • 949 篇 经济学
  • 729 篇 农学
  • 712 篇 教育学
  • 225 篇 文学
  • 118 篇 军事学
  • 88 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,375 篇 computer science
  • 1,095 篇 deep learning
  • 1,059 篇 accuracy
  • 922 篇 machine learning
  • 905 篇 feature extracti...
  • 842 篇 internet of thin...
  • 801 篇 computational mo...
  • 679 篇 training
  • 568 篇 information tech...
  • 555 篇 artificial intel...
  • 542 篇 support vector m...
  • 539 篇 real-time system...
  • 498 篇 data mining
  • 483 篇 security
  • 450 篇 predictive model...
  • 406 篇 monitoring
  • 383 篇 cloud computing
  • 353 篇 optimization
  • 345 篇 convolutional ne...
  • 344 篇 data models

机构

  • 295 篇 faculty of scien...
  • 286 篇 department for p...
  • 280 篇 department of ph...
  • 279 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 269 篇 department of ph...
  • 265 篇 department of ph...
  • 253 篇 faculté des scie...
  • 232 篇 department of ph...
  • 228 篇 department of ph...
  • 227 篇 department of co...
  • 216 篇 physics division...
  • 195 篇 cavendish labora...
  • 171 篇 school of physic...
  • 168 篇 yerevan physics ...
  • 168 篇 institute of phy...
  • 168 篇 institute of phy...
  • 161 篇 department of ph...
  • 161 篇 kirchhoff-instit...

作者

  • 274 篇 c. alexa
  • 272 篇 j. m. izen
  • 272 篇 c. amelung
  • 270 篇 g. bella
  • 270 篇 j. strandberg
  • 270 篇 d. calvet
  • 269 篇 g. spigo
  • 267 篇 f. siegert
  • 261 篇 m. klein
  • 260 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 253 篇 g. gaudio
  • 252 篇 h. a. gordon
  • 250 篇 a. c. könig
  • 246 篇 y. tayalati
  • 243 篇 s. mohapatra
  • 242 篇 h. sakamoto
  • 235 篇 d. guest
  • 212 篇 y. nagasaka

语言

  • 43,187 篇 英文
  • 2,189 篇 其他
  • 463 篇 中文
  • 61 篇 日文
  • 9 篇 德文
  • 8 篇 法文
  • 7 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 2 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45859 条 记 录,以下是1131-1140 订阅
排序:
Proposed Biometric Security system Based on Deep Learning and Chaos Algorithms
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3515-3537页
作者: Iman Almomani Walid El-Shafai Aala AlKhayer Albandari Alsumayt Sumayh S.Aljameel Khalid Alissa Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Computer Science Department King Abdullah II School of Information TechnologyThe University of Jordan11942Jordan Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Computer Science Department Applied CollegeImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Computer Science Department College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia SAUDI ARAMCO Cybersecurity Chair Networks and Communications DepartmentCollege of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia
Nowadays,there is tremendous growth in biometric authentication and cybersecurity ***,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private ***,designing a... 详细信息
来源: 评论
Efficient UAV Routing Strategies for Wireless Sensor Network Data Retrieval
Efficient UAV Routing Strategies for Wireless Sensor Network...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Al-Sharhanee, Kareem Ali Malalah Najim, Ali Hamza Alheeti, Khattab M. Ali Satar, Nurhizam Safie Mohd Hashim, Aisha Hassan Abdallah Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad10011 Iraq Department of Computer Technical Al-Diwaniyah Iraq College of Computer and Information Technology University of Anbar Computer Networking Systems Department Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
WSNs are applied in many disciplines where certain conditions require the ability to adapt to network sink mobility and changes in the dynamics of the area coverage. To meet these needs, it is necessary to develop int... 详细信息
来源: 评论
Performance Improvement Technique of RSA Algorithm in Document Data Security  12
Performance Improvement Technique of RSA Algorithm in Docume...
收藏 引用
12th International Conference on Cyber and IT Service Management, CITSM 2024
作者: Wandira, Agtori Nasution, Benny Benyamin Zarlis, M. Universitas Sumatera Utara Faculty of Computer Science and Information Technology Medan Indonesia Politeknik Negeri Medan Departement of Computer Engineering Medan Indonesia
One of the first public key schemes was developed in 1977 by Ron Rivest, Adi Shamir, and Len Adleman at MIT and first published in 1978. Since then, the RSA scheme has become the most widely accepted and applied publi... 详细信息
来源: 评论
ConvNeXt network with transfer learning for cumulative foot pressure images recognition
收藏 引用
International Journal of information technology (Singapore) 2024年 1-14页
作者: Iskandar, Ayman Alfonse, Marco Roushdy, Mohamed El-Horbaty, El-Sayed M. Computer Science Department Faculty of Computer and Information Sciences Ain Shams University Cairo Egypt Laboratoire Interdisciplinaire de L’Université Française d’Égypte (UFEID LAB) Université Française d’Égypte Cairo Egypt Computer Science Department Faculty of Computers and Information Technology Future University in Egypt Cairo Egypt
Humans can be differentiated by their walking style using cumulative foot pressure images, which are 2-D cumulative ground reaction forces during each gait cycle. In this paper, we propose a new model for cumulative f... 详细信息
来源: 评论
Ensuring purity, precision and consumption in every drop of water with IoT technology  4
Ensuring purity, precision and consumption in every drop of ...
收藏 引用
4th International Conference on Power, Energy, Control and Transmission systems, ICPECTS 2024
作者: Gomathi, S. Devi, D. Srinidhi, A. Shanthini, P. Sri Sairam Engineering College Department of Information Technology Chennai India Sathyabama Institute of Science and Technology Department of Computer Science and Engineering India
In a world where access to clean and pure water is paramount, ensuring its quality and fair distribution is of utmost importance. Traditional water purification methods often fall short in providing real-time insights... 详细信息
来源: 评论
Providing an Intelligent Hybrid Routing Method in Wireless Sensor Networks  23th
Providing an Intelligent Hybrid Routing Method in Wireless S...
收藏 引用
23rd International Conference on Intelligent systems Design and Applications, ISDA 2023
作者: Hosseinabadi, Ali Asghar Rahmani Mirkamali, Seyedsaeid Hajiabadi, Mahdi Rohani Abraham, Ajith Department of Computer Science University of Regina Regina Canada Department of Computer Engineering and IT Payame Noor University Tehran Iran Faculty of Computer and Information Technology Engineering Islamic Azad University Qazvin Qazvin Iran School of Computer Science Engineering and Technology Bennett University Uttar Pradesh Greater Noida India
Optimal energy consumption in Wireless Sensor Networks (WSNs) is important. Previous research has shown that by organizing network nodes into a number of clusters, one can achieve greater energy efficiency leading to ... 详细信息
来源: 评论
Towards Blockchain-based Decentralized Employee Transfer system  6
Towards Blockchain-based Decentralized Employee Transfer Sys...
收藏 引用
6th International Conference on Blockchain Computing and Applications, BCCA 2024
作者: Zaib, Alam Mustafa, Ehzaz Khan, Ahsan Khattak, Hasan Ali Ibrahim, Isa Ali Namoun, Abdallah Shuja, Junaid Ahmad, Raja Wasim Department of Computer Science Comsats University Islamabad Abbottabad Campus Pakistan Faculty of Computing & Information Technology Sohar University Sohar Oman School of Information and Communication Technology Federal University of Technology Imo Owerri1526 Nigeria AI Centre Faculty of Computer and Information Systems Islamic University of Madinah Madinah42351 Saudi Arabia Department of Computer Science Southeast Missouri State University Cape GirardeauMO United States Department of Computer & Information Sciences Ajman University Ajman United Arab Emirates
Employees are the main driving force in organizations that undergo recruitment, promotion, and transfer. There are many employee management systems, but most of them are centralized. Centralization leads to problems s... 详细信息
来源: 评论
Deep Learning Techniques for Advanced Large-Scale Data Processing  15
Deep Learning Techniques for Advanced Large-Scale Data Proce...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Sunil, M.P. Shekhawat, Jyoti Vanaja, T. Mohammed, Vazeer Ali Thaware, Shailesh J. Singh, Vaishali Karnataka Bangalore India Department of Computer Science & Application Vivekananda Global University Jaipur India Department of Information Technology Prince Shri Venkateshwara Padmavathy Engineering College Chennai127 India Department of Computer & Information System Lewis University Illinois United States Department of Computer Engineering Vishwakarma Institute of Technology Pune India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India
Deep getting to know techniques have become increasingly more popular due to their potential to improve huge-scale records processing performance. Leveraging specialized hardware which includes GPUs, deep getting to k... 详细信息
来源: 评论
Marine Predators Algorithm with Deep Learning-Based Leukemia Cancer Classification on Medical Images
收藏 引用
computer Modeling in Engineering & sciences 2024年 第10期141卷 893-916页
作者: Sonali Das Saroja Kumar Rout Sujit Kumar Panda Pradyumna Kumar Mohapatra Abdulaziz S.Almazyad Muhammed Basheer Jasser Guojiang Xiong Ali Wagdy Mohamed Department of Computer Science&Engineering Gandhi Institute for TechnologyBPUTBhubaneswar752054India Department of Information Technology Vardhaman College of Engineering(Autonomous)Hyderabad501218TelanganaIndia Department of Electronic&Communication Engineering Vedang Institute of TechnologyBhubaneswar752010India Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Department of Computing and Information Systems School of Engineering and TechnologySunway UniversityJalan UniversitiBandar SunwaySelangor Darul Ehsan47500Malaysia Research Centre for Human-Machine Collaboration(HUMAC) School of Engineering and TechnologySunway UniversityJalan UniversitiBandar SunwaySelangor Darul Ehsan47500Malaysia Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmman11931Jordan
In blood or bone marrow,leukemia is a form of cancer.A person with leukemia has an expansion of white blood cells(WBCs).It primarily affects children and rarely affects *** depends on the type of leukemia and the exte... 详细信息
来源: 评论
Assessing Student Visual Fatigue in Virtual Semiconductor Labs via Head-Mounted Displays: A computer Vision Syndrome Questionnaire (CVS-Q)  3
Assessing Student Visual Fatigue in Virtual Semiconductor La...
收藏 引用
3rd IEEE International Maghreb Meeting of the Conference on sciences and Techniques of Automatic Control and computer Engineering, MI-STA 2023
作者: Alnagrat, Ahmed Jamah Ahmed Ismail, Rizalafande Che Akeel, Abubaker Almintisir Abubaker Salem, Asma Almkhtar Miftah Alhaj Khalefah, Salah Eldeen Ali Saad Idrus, Syed Zulkarnain Syed Department of Communication Department of Computer Science and Information Technology Perlis Kangar01000 Malaysia Wadi al-Shati Fezzan Libya Arau02600 Malaysia Wadi Alshatti University Faculty of Education Department of Mathematics and Computer Fezzan Libya Higher Institute of Sciences and Technology Department of Computer Science and Information Technology Tripoli Libya Higher Institute of Science and Technology Department of Computer Science and Information Technology Fezzan Libya Department of Communication Perlis Kangar01000 Malaysia
This paper evaluates visual fatigue among students in a virtual semiconductor lab using HMDs - the HP Reverb G2 and Oculus Quest 2 - and the CVS-Q questionnaire. The study measures the frequency of visual fatigue symp... 详细信息
来源: 评论