咨询与建议

限定检索结果

文献类型

  • 30,328 篇 会议
  • 14,991 篇 期刊文献
  • 426 册 图书

馆藏范围

  • 45,745 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 27,089 篇 工学
    • 19,569 篇 计算机科学与技术...
    • 15,821 篇 软件工程
    • 6,517 篇 信息与通信工程
    • 4,762 篇 控制科学与工程
    • 3,152 篇 电气工程
    • 3,070 篇 生物工程
    • 2,854 篇 电子科学与技术(可...
    • 2,528 篇 生物医学工程(可授...
    • 2,103 篇 机械工程
    • 1,585 篇 仪器科学与技术
    • 1,536 篇 光学工程
    • 1,419 篇 动力工程及工程热...
    • 1,268 篇 安全科学与工程
    • 1,166 篇 化学工程与技术
    • 1,116 篇 网络空间安全
    • 1,084 篇 交通运输工程
  • 14,731 篇 理学
    • 7,092 篇 数学
    • 4,607 篇 物理学
    • 3,518 篇 生物学
    • 2,322 篇 统计学(可授理学、...
    • 2,002 篇 系统科学
    • 1,293 篇 化学
  • 8,384 篇 管理学
    • 5,224 篇 管理科学与工程(可...
    • 3,592 篇 图书情报与档案管...
    • 2,641 篇 工商管理
  • 2,825 篇 医学
    • 2,409 篇 临床医学
    • 2,112 篇 基础医学(可授医学...
    • 1,269 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,435 篇 法学
    • 1,153 篇 社会学
  • 944 篇 经济学
  • 716 篇 农学
  • 713 篇 教育学
  • 224 篇 文学
  • 117 篇 军事学
  • 87 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,375 篇 computer science
  • 1,098 篇 deep learning
  • 1,082 篇 accuracy
  • 911 篇 machine learning
  • 907 篇 feature extracti...
  • 850 篇 internet of thin...
  • 813 篇 computational mo...
  • 683 篇 training
  • 562 篇 real-time system...
  • 559 篇 information tech...
  • 557 篇 artificial intel...
  • 542 篇 support vector m...
  • 501 篇 data mining
  • 490 篇 security
  • 454 篇 predictive model...
  • 400 篇 monitoring
  • 393 篇 cloud computing
  • 356 篇 optimization
  • 355 篇 reliability
  • 351 篇 data models

机构

  • 296 篇 faculty of scien...
  • 285 篇 department for p...
  • 280 篇 department of ph...
  • 278 篇 departamento de ...
  • 275 篇 department of ph...
  • 273 篇 department of ph...
  • 270 篇 department of ph...
  • 267 篇 department of ph...
  • 252 篇 faculté des scie...
  • 240 篇 department of co...
  • 233 篇 department of ph...
  • 229 篇 department of ph...
  • 217 篇 physics division...
  • 195 篇 cavendish labora...
  • 171 篇 yerevan physics ...
  • 169 篇 school of physic...
  • 168 篇 institute of phy...
  • 168 篇 institute of phy...
  • 166 篇 department of ph...
  • 161 篇 kirchhoff-instit...

作者

  • 276 篇 c. alexa
  • 274 篇 c. amelung
  • 273 篇 j. m. izen
  • 272 篇 g. bella
  • 272 篇 j. strandberg
  • 272 篇 d. calvet
  • 269 篇 g. spigo
  • 267 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 254 篇 g. gaudio
  • 253 篇 h. a. gordon
  • 251 篇 a. c. könig
  • 248 篇 y. tayalati
  • 244 篇 s. mohapatra
  • 243 篇 h. sakamoto
  • 234 篇 d. guest
  • 215 篇 y. nagasaka

语言

  • 40,392 篇 英文
  • 4,885 篇 其他
  • 468 篇 中文
  • 62 篇 日文
  • 19 篇 德文
  • 17 篇 法文
  • 14 篇 斯洛文尼亚文
  • 7 篇 俄文
  • 2 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45745 条 记 录,以下是1701-1710 订阅
排序:
Peak-Average-Power Ratio Techniques for 5G Waveforms Using D-SLM and D-PTS
收藏 引用
computer systems science & Engineering 2023年 第5期45卷 1199-1210页
作者: Himanshu Sharma karthikeyan Rajagopal G.Gugapriya Rajneesh Pareek Arun Kumar HayaMesfer Alshahrani Mohamed K.Nour Hany Mahgoub Mohamed Mousa Anwer Mustafa Hilal Department of Computer Science&Engineering JECRC UniversityJaipurIndia Centre for Nonlinear Systems Chennai Institute of TechnologyChennaiIndia School of Electronics Engineering Vellore Institute of TechnologyChennaiIndia Department of Electronics and Communication Engineering JECRC UniversityJaipurIndia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Electrical Engineering Department Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Multicarrier Waveform(MCW)has several advantages and plays a very important role in cellular *** generation(5G)MCW such as Non-Orthogonal Multiple Access(NOMA)and Filter Bank Multicarrier(FBMC)are thought to be import... 详细信息
来源: 评论
A Novel Cryptocurrency Prediction Method Using Optimum CNN
收藏 引用
computers, Materials & Continua 2022年 第4期71卷 1051-1063页
作者: Syed H.Hasan Syeda Huyam Hasan Mohammed Salih Ahmed Syed Hamid Hasan Iowa State University AmesUSA University of Texas at Arlington USA Department of Computer Engineering College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityDammamSaudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia
In recent years,cryptocurrency has become gradually more significant in economic regions *** cryptocurrencies,records are stored using a cryptographic *** main aim of this research was to develop an optimal solution f... 详细信息
来源: 评论
Effects of the Attunement of an Attack Target by Whispering in AIWolf  14
Effects of the Attunement of an Attack Target by Whispering ...
收藏 引用
14th IIAI International Congress on Advanced Applied Informatics, IIAI-AAI 2023
作者: Murakami, Tomohiro Nakao, Nozomi Miyake, Hikaru Murata, Hayate Amano, Itsuki Kojima, Taisei Ando, Keisuke Ito, Nobuhiro Aichi Institute of Technology Graduate School of Business Administration and Computer Science Toyota Japan Aichi Institute of Technology Department of Information Science Toyota Japan Aichi Institute of Technology Faculty of Information Science Toyota Japan
Recently, research on AIWolf, which is artificial intelligence that plays the Werewolf game, has attracted much attention. Werewolves in the Werewolf game should cooperate using 'whispers;' which are conversat... 详细信息
来源: 评论
eRock at Qur’an QA 2022: Contemporary Deep Neural Networks for Qur’an based Reading Comprehension Question Answers  5
eRock at Qur’an QA 2022: Contemporary Deep Neural Networks ...
收藏 引用
5th Workshop Open-Source Arabic Corpora and Processing Tools with Shared Tasks on Qur'an QA and Fine-Grained Hate Speech Detection, OSACT 2022
作者: Aftab, Esha Malik, Muhammad Kamran Department of Computer Science Department of Information Technology Faculty of Computing and Information Technology University of the Punjab Lahore Pakistan
Question Answering (QA) has enticed the interest of NLP community in recent years. NLP enthusiasts are engineering new Models and fine-tuning the existing ones that can give out answers for the posed questions. The de... 详细信息
来源: 评论
The Correlation Between Architecture Smells, Package Stability and Reusability: A Case Study  4
The Correlation Between Architecture Smells, Package Stabili...
收藏 引用
4th IEEE International Maghreb Meeting of the Conference on sciences and Techniques of Automatic Control and computer Engineering, MI-STA 2024
作者: Benidris, Mrwan Elfallah, Ehab A. Omar Cheema, Marwa Aslam Alsma, Mohammed Salah Addin Kadiki, Tareq Ziad Elbarsha, Abdelfattah University of Benghazi Faculty of Information Technology Dep. of Computer Science Libya Libyan International Medical University Faculty of Information Technology Dept. of Software Engineering Libya University of Benghazi Faculty of Public Health Health Informatics Department Libya
the design decisions made in the architecture of a software system are essential to its maintainability, and thus its quality is of great importance. Architecture smells (ASs) can be used to identify any quality issue... 详细信息
来源: 评论
Secure Private Data Storage and File Sharing Using Homomorphic and Hybrid Hash-Based Cryptographic Technique in Cloud
Secure Private Data Storage and File Sharing Using Homomorph...
收藏 引用
International Conference on Computing and Machine Learning, CML 2024
作者: Senthil, G.A. Prabha, R. Monica, K.M. Priya, R. Mohana Kanna, R. Rajesh Department of Information Technology Agni College of Technology Chennai India Department of Electronics and Communication Engineering Sri SaiRam Institute of Technology Chennai India Department of Computer Science and Engineering Vellore Institute of Technology Chennai Campus Chennai India Salem India Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Campus Chennai India
Data is a crucial asset in any business, and for some businesses, it ranks among the most valuable. More and more businesses want to keep their data on the cloud and securely and efficiently distribute it among their ... 详细信息
来源: 评论
A Mutual Authentication and Cross Verification Protocol for Securing Internet-of-Drones (IoD)
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 5845-5869页
作者: Saeed Ullah Jan Irshad Ahmed Abbasi Fahad Algarni Department of Computer Science&IT University of MalakandChakadara18800Pakistan Faculty of Science&Arts Belqarn Department of Computer ScienceUniversity of BishaSabtul Alaya 61985Saudi Arabia Faculty of Computing and Information Technology University of BishaBisha 67714Saudi Arabia
With the rapid miniaturization in sensor technology,Internet-ofDrones(IoD)has delighted researchers towards information transmission security among drones with the control station server(CSS).In IoD,the drone is diffe... 详细信息
来源: 评论
Security in the Age of Deepfakes: Detecting Manipulated Media with Neural Networks  1
收藏 引用
8th International Conference on information system Design and Intelligent Applications, ISDIA 2024
作者: Phatale, Utkarsh Limkar, Suresh Department of Computer Engineering AISSMS Institute of Information Technology Maharashtra Pune India Department of Computer Science and Engineering Central University of Jammu Jammu and Kashmir India
The proliferation of deep fake technology presents a substantial peril to both individuals and society, underscoring the urgent requirement for the development of effective deep fake detection techniques. This study i... 详细信息
来源: 评论
A Novel Cluster Analysis-Based Crop Dataset Recommendation Method in Precision Farming
收藏 引用
computer systems science & Engineering 2023年 第9期46卷 3239-3260页
作者: K.R.Naveen Kumar Husam Lahza B.R.Sreenivasa Tawfeeq Shawly Ahmed A.Alsheikhy H.Arunkumar C.R.Nirmala Department of Computer Science&Engineering Bapuji Institute of Engineering&TechnologyDavangereKarnatakaIndia Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Information Science&Engineering Bapuji Institute of Engineering&TechnologyDavangereKarnatakaIndia Department of Electrical Engineering Faculty of Engineering at RabighKing Abdulaziz UniversityJeddahSaudi Arabia Department of Electrical Engineering College of EngineeringNorthern Border UniversityArarSaudi Arabia
Data mining and analytics involve inspecting and modeling large pre-existing datasets to discover decision-making *** agriculture uses datamining to advance agricultural *** farmers aren’t getting the most out of the... 详细信息
来源: 评论
Enhancing Video Anomaly Detection Using Spatio-Temporal Autoencoders and Convolutional LSTM Networks
收藏 引用
SN computer science 2024年 第1期5卷 1-13页
作者: Almahadin, Ghayth Subburaj, Maheswari Hiari, Mohammad Sathasivam Singaram, Saranya Kolla, Bhanu Prakash Dadheech, Pankaj Vibhute, Amol D. Sengan, Sudhakar Department of Networks and Cybersecurity Faculty of Information Technology Al Ahliyya Amman University Country Amman Jordan School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai 600127 India Department of Networks and Cybersecurity Information Technology Al Ahliyya Amman University Amman Jordan Department Computing Technology School of Computing SRM Institute of Science and Technology Kattankulathur Campus Tamil Nadu Chennai 603203 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Guntur 522302 India Department of Computer Science and Engineering Swami Keshvanand Institute of Technology Management and Gramothan (SKIT) Rajasthan Jaipur 302017 India Symbiosis Institute of Computer Studies and Research (SICSR) Symbiosis International (Deemed University) MH Pune 411016 India Department of Computer Science and Engineering PSN College of Engineering and Technology Tamil Nadu Tirunelveli 627152 India
Identifying suspicious activities or behaviors is essential in the domain of Anomaly Detection (AD). In crowded scenes, the presence of inter-object occlusions often complicates the detection of such behaviors. Theref... 详细信息
来源: 评论