咨询与建议

限定检索结果

文献类型

  • 30,090 篇 会议
  • 14,989 篇 期刊文献
  • 424 册 图书

馆藏范围

  • 45,503 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 26,820 篇 工学
    • 19,519 篇 计算机科学与技术...
    • 15,793 篇 软件工程
    • 6,503 篇 信息与通信工程
    • 4,733 篇 控制科学与工程
    • 3,145 篇 电气工程
    • 3,070 篇 生物工程
    • 2,829 篇 电子科学与技术(可...
    • 2,519 篇 生物医学工程(可授...
    • 2,096 篇 机械工程
    • 1,586 篇 仪器科学与技术
    • 1,543 篇 光学工程
    • 1,426 篇 动力工程及工程热...
    • 1,276 篇 安全科学与工程
    • 1,170 篇 化学工程与技术
    • 1,110 篇 网络空间安全
    • 1,087 篇 交通运输工程
  • 14,740 篇 理学
    • 7,062 篇 数学
    • 4,604 篇 物理学
    • 3,518 篇 生物学
    • 2,288 篇 统计学(可授理学、...
    • 2,003 篇 系统科学
    • 1,294 篇 化学
  • 8,378 篇 管理学
    • 5,227 篇 管理科学与工程(可...
    • 3,580 篇 图书情报与档案管...
    • 2,639 篇 工商管理
  • 2,827 篇 医学
    • 2,411 篇 临床医学
    • 2,116 篇 基础医学(可授医学...
    • 1,260 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,435 篇 法学
    • 1,152 篇 社会学
  • 951 篇 经济学
  • 718 篇 农学
  • 708 篇 教育学
  • 225 篇 文学
  • 118 篇 军事学
  • 88 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,373 篇 computer science
  • 1,060 篇 deep learning
  • 1,036 篇 accuracy
  • 900 篇 machine learning
  • 882 篇 feature extracti...
  • 840 篇 internet of thin...
  • 790 篇 computational mo...
  • 666 篇 training
  • 564 篇 information tech...
  • 548 篇 artificial intel...
  • 537 篇 support vector m...
  • 524 篇 real-time system...
  • 497 篇 data mining
  • 476 篇 security
  • 438 篇 predictive model...
  • 400 篇 monitoring
  • 381 篇 cloud computing
  • 349 篇 optimization
  • 339 篇 databases
  • 339 篇 data models

机构

  • 297 篇 faculty of scien...
  • 288 篇 department for p...
  • 284 篇 department of ph...
  • 283 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 271 篇 department of ph...
  • 266 篇 department of ph...
  • 256 篇 faculté des scie...
  • 232 篇 department of ph...
  • 229 篇 department of co...
  • 228 篇 department of ph...
  • 216 篇 physics division...
  • 192 篇 cavendish labora...
  • 175 篇 yerevan physics ...
  • 169 篇 institute of phy...
  • 169 篇 institute of phy...
  • 168 篇 school of physic...
  • 165 篇 department of ph...
  • 164 篇 kirchhoff-instit...

作者

  • 275 篇 c. alexa
  • 273 篇 j. m. izen
  • 273 篇 c. amelung
  • 271 篇 g. bella
  • 271 篇 j. strandberg
  • 271 篇 d. calvet
  • 270 篇 g. spigo
  • 268 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 259 篇 m. rijssenbeek
  • 256 篇 s. jin
  • 253 篇 h. a. gordon
  • 253 篇 g. gaudio
  • 251 篇 a. c. könig
  • 247 篇 y. tayalati
  • 243 篇 h. sakamoto
  • 243 篇 s. mohapatra
  • 236 篇 d. guest
  • 213 篇 y. nagasaka

语言

  • 43,683 篇 英文
  • 1,346 篇 其他
  • 449 篇 中文
  • 61 篇 日文
  • 8 篇 德文
  • 8 篇 法文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 2 篇 朝鲜文
  • 2 篇 俄文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45503 条 记 录,以下是221-230 订阅
排序:
Task Consistent Prototype Learning for Incremental Few-Shot Semantic Segmentation  27th
Task Consistent Prototype Learning for Incremental Few-Shot...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Xu, Wenbo Wu, Yanan Jiang, Haoran Wang, Yang Wu, Qiang Zhang, Jian Faculty of Engineering and Information Technology University of Technology Sydney Sydney2007 Australia School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China Department of Computer Science and Software Engineering Concordia University MontrealH3G2J1 Canada
Incremental Few-Shot Semantic Segmentation (iFSS) tackles a task that requires a model to continually expand its segmentation capability on novel classes using only a few annotated examples. Typical incremental approa... 详细信息
来源: 评论
Energy Harvesting Jammer-Aided Covert Communications in Wireless Multi-Relay IoT systems
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17443-17455页
作者: Lv, Hao Yang, Bin Sun, Xiuwen Gao, Chan Gui, Bao Taleb, Tarik School of Computer Science and Technology of Anhui University Hefei230000 China Chuzhou University School of Computer and Information Engineering Chuzhou239000 China Xi'an University of Posts and Telecommunications National Engineering Research Center for Secured Wireless School of Cybersecurity Xi'an710121 China Ruhr University Bochum Faculty of Electrical Engineering and Information Technology Bochum44801 Germany
This paper investigates covert communications in a multi-relay Internet of Things (IoT) system with multiple energy harvesting jammers, where a transmitter (Alice) attempts to covertly transmit confidential messages t... 详细信息
来源: 评论
Evaluating marginal likelihood approximations of dose–response relationship models in Bayesian benchmark dose methods for risk assessment
收藏 引用
Computational Toxicology 2025年 34卷
作者: Minewaki, Sota Ohigashi, Tomohiro Sozu, Takashi Department of Information and Computer Technology Tokyo University of Science of Engineering Japan Department of Information and Computer Technology Faculty of Engineering Tokyo University of Science Japan
Benchmark dose (BMD;a dose associated with a specified change in response) is used to determine the point of departure for the acceptable daily intake of substances for humans. Multiple dose–response relationship mod... 详细信息
来源: 评论
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论
Review of dehazing techniques: challenges and future trends
收藏 引用
Multimedia Tools and Applications 2025年 第3期84卷 1103-1131页
作者: Ayoub, Abeer El-Shafai, Walid El-Samie, Fathi E. Abd Hamad, Ehab K. I. EL-Rabaie, El-Sayed M. Department of Electronics and Electrical Communication Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh11671 Saudi Arabia Electrical Engineering Department Faculty of Engineering Aswan University Aswan81542 Egypt
The phenomenon of atmospheric haze arises due to the scattering of light by minute particles suspended in the atmosphere. This optical effect gives rise to visual degradation in images and videos. The degradation is p... 详细信息
来源: 评论
Smart Voting system Using Deep Learning  5th
Smart Voting System Using Deep Learning
收藏 引用
5th International Conference on Innovative Product Design and Intelligent Manufacturing systems, ICIPDIMS 2023
作者: Prasanthi, P. Aneesha, K. Sujith, P. Deepika, S. Sai Vamsi, S. Jayanthi Rao, M. Department of Information Technology Aditya Institute of Technology and Management Tekkali532201 India Department of Computer Science and Engineering Aditya Institute of Technology and Management Tekkali532201 India
The world's largest democratic nation is India, where we live. Therefore, it is imperative to guarantee that a fair election is used to elect the governing body. India exclusively employs an offline voting system,... 详细信息
来源: 评论
A Lightweight U-Net Model for Accurate Skin Lesion Segmentation
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer science and Mathematics 2025年 第2期6卷 1-11页
作者: Najjar, Fallah H. Kadhim, Karrar A. Mohamed, Farhan Rahim, Mohd Shafry Mohd Abdullah, Asniyani Nur Haidar Department of Emergent Computing Faculty of Computing Universiti Teknologi Malaysia Johor Bahru Malaysia Department of Computer Systems Techniques Technical Institute of Najaf Al-Furat Al-Awsat Technical University Najaf54001 Iraq Computer Techniques Engineering Department Faculty of Information Technology Imam Ja’afar Al-Sadiq University Baghdad Iraq Faculty of Information & Communication Technology Universiti Teknikal Malaysia Melaka Hang Tuah Jaya Melaka Durian Tunggal76100 Malaysia
In this paper, a new lightweight U-Net deep learning-based neural network designed for the segmentation of skin lesions is proposed. Segmentation of skin lesions is the most critical step in computer-aided dermatology... 详细信息
来源: 评论
Ethiopic Cryptography: An Efficient Hybrid Encryption Algorithm for Reducing Cybersecurity Attack  11th
Ethiopic Cryptography: An Efficient Hybrid Encryption Algori...
收藏 引用
11th EAI International Conference on Advancement of science and technology, ICAST 2023
作者: Akele, Tadesse Birara Bahiru, Tadesse Kebede Molla, Tibebu Legesse Fentie, Shambel Dessale Belay, Tadesse Destaw Marye, Almaz Yemataw Getaneh, Mersha Derese Department of Information System Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Department of Information Technology Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Deparment of Software Engineering Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Department of Computer Science Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia
Cryptography is an essential tool in ensuring the security of data during network communication. Network and service providers prioritize data security to ensure secure data exchanges. Ethiopic cryptography is a uniqu... 详细信息
来源: 评论
Lightweight and Roubust Key Agreement for Securing IIoT-Driven Flexible Manufacturing systems
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17197-17209页
作者: Hammad, Muhammad Badshah, Akhtar Almeer, Mohammed A. Waqas, Muhammad Song, Houbing Chen, Sheng Han, Zhu GIK Institute of Engineering Sciences and Technology Faculty of Mechanical Engineering Topi23640 Pakistan University of Malakand Department of Software Engineering Dir Lower18800 Pakistan University of Bahrain Computer Engineering Department College of Information Technology 32038 Bahrain University of Greenwich Faculty of Engineering and Science Centre for Sustainable Cybersecurity United Kingdom Edith Cowan University School of Engineering PerthWA6027 Australia Department of Information Systems BaltimoreMD United States University of Southampton School of Electronics and Computer Science SouthamptonSO17 1BJ United Kingdom University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The ever-evolving Internet of Things (IoT) has ushered in a new era of intelligent manufacturing across multiple industries. However, the security and privacy of real-time data transmitted over the public channel of t... 详细信息
来源: 评论
Social Networks on WEB 3.0  12th
Social Networks on WEB 3.0
收藏 引用
12th International Conference on Frontiers of Intelligent Computing: Theory and Applications, FICTA 2024
作者: Cidri, Anirudh AshaRedddy, M. Bhaskar, T. Vijaya Krishna, A. Suryanarayana, G. Department of Information Technology Vardhaman College of Engineering Hyderabad India Department of Computer Science & Engineering-AIML CMR College of Engineering Hyderabad India Department of Information Technology G. Narayanamma Institute of Technology and Science Hyderabad India
The "Social Network on WEB3.0" project is poised to revolutionize online social dynamics by leveraging blockchain technology to create a decentralized platform. This initiative prioritizes user control and s... 详细信息
来源: 评论