咨询与建议

限定检索结果

文献类型

  • 30,090 篇 会议
  • 14,989 篇 期刊文献
  • 424 册 图书

馆藏范围

  • 45,503 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 26,820 篇 工学
    • 19,519 篇 计算机科学与技术...
    • 15,793 篇 软件工程
    • 6,503 篇 信息与通信工程
    • 4,733 篇 控制科学与工程
    • 3,145 篇 电气工程
    • 3,070 篇 生物工程
    • 2,829 篇 电子科学与技术(可...
    • 2,519 篇 生物医学工程(可授...
    • 2,096 篇 机械工程
    • 1,586 篇 仪器科学与技术
    • 1,543 篇 光学工程
    • 1,426 篇 动力工程及工程热...
    • 1,276 篇 安全科学与工程
    • 1,170 篇 化学工程与技术
    • 1,110 篇 网络空间安全
    • 1,087 篇 交通运输工程
  • 14,740 篇 理学
    • 7,062 篇 数学
    • 4,604 篇 物理学
    • 3,518 篇 生物学
    • 2,288 篇 统计学(可授理学、...
    • 2,003 篇 系统科学
    • 1,294 篇 化学
  • 8,378 篇 管理学
    • 5,227 篇 管理科学与工程(可...
    • 3,580 篇 图书情报与档案管...
    • 2,639 篇 工商管理
  • 2,827 篇 医学
    • 2,411 篇 临床医学
    • 2,116 篇 基础医学(可授医学...
    • 1,260 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,435 篇 法学
    • 1,152 篇 社会学
  • 951 篇 经济学
  • 718 篇 农学
  • 708 篇 教育学
  • 225 篇 文学
  • 118 篇 军事学
  • 88 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,373 篇 computer science
  • 1,060 篇 deep learning
  • 1,036 篇 accuracy
  • 900 篇 machine learning
  • 882 篇 feature extracti...
  • 840 篇 internet of thin...
  • 790 篇 computational mo...
  • 666 篇 training
  • 564 篇 information tech...
  • 548 篇 artificial intel...
  • 537 篇 support vector m...
  • 524 篇 real-time system...
  • 497 篇 data mining
  • 476 篇 security
  • 438 篇 predictive model...
  • 400 篇 monitoring
  • 381 篇 cloud computing
  • 349 篇 optimization
  • 339 篇 databases
  • 339 篇 data models

机构

  • 297 篇 faculty of scien...
  • 288 篇 department for p...
  • 284 篇 department of ph...
  • 283 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 271 篇 department of ph...
  • 266 篇 department of ph...
  • 256 篇 faculté des scie...
  • 232 篇 department of ph...
  • 229 篇 department of co...
  • 228 篇 department of ph...
  • 216 篇 physics division...
  • 192 篇 cavendish labora...
  • 175 篇 yerevan physics ...
  • 169 篇 institute of phy...
  • 169 篇 institute of phy...
  • 168 篇 school of physic...
  • 165 篇 department of ph...
  • 164 篇 kirchhoff-instit...

作者

  • 275 篇 c. alexa
  • 273 篇 j. m. izen
  • 273 篇 c. amelung
  • 271 篇 g. bella
  • 271 篇 j. strandberg
  • 271 篇 d. calvet
  • 270 篇 g. spigo
  • 268 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 259 篇 m. rijssenbeek
  • 256 篇 s. jin
  • 253 篇 h. a. gordon
  • 253 篇 g. gaudio
  • 251 篇 a. c. könig
  • 247 篇 y. tayalati
  • 243 篇 h. sakamoto
  • 243 篇 s. mohapatra
  • 236 篇 d. guest
  • 213 篇 y. nagasaka

语言

  • 43,683 篇 英文
  • 1,346 篇 其他
  • 449 篇 中文
  • 61 篇 日文
  • 8 篇 德文
  • 8 篇 法文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 2 篇 朝鲜文
  • 2 篇 俄文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45503 条 记 录,以下是261-270 订阅
排序:
Implementation of Secure and Verifiable Access Control Procedures using the NTRU Cryptosystem to Store Big Data in the Cloud Environment
收藏 引用
Recent Patents on Engineering 2025年 第2期19卷 57-70页
作者: Babu B, Ravindra Saxena, Swati Widjaja, Gunawan Vinodha D, Vedha Omarov, Batyrkhan Ramaiah, Gurumurthy B. Vats, Prashant Adama Ethiopia Department of Computer Science KCG College of Technology Chennai India Universitas Krisnadwipayana Jawa Barat 13077 Indonesia Department of Electronics and Communication Engineering JCT College Of Engineering and Technology Pichanur Coimbatore India International University of Tourism and Hospitality Turkistan Kazakhstan Technical and Vocational Training Institute Addis Ababa Ethiopia Department of Computer Science and Engineering Faculty of Engineering and Technology SGT University Haryana Gurugram India
Background: Due to their complexity and size, deploying ciphertexts for clouds is considered the most useful approach to accessing large data stores. Methods: However, access to a user's access legitimacy and impr... 详细信息
来源: 评论
Implementation of Multi-Label Fuzzy Classification system using Topic Detection Data set  4
Implementation of Multi-Label Fuzzy Classification System us...
收藏 引用
4th International Conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Kanagaraj, R. Krishnaraj, N. Selvakumar, J. Ramprasath, J. School of Computer Science and Engineering Vellore Institute of Technology Vellore632014 India Department of Computer Science and Engineering Sri Ramakrishna Engineering College Coimbatore641022 India Department of Information Technology Dr.Mahalingam College of Engineering and Technology Pollachi642003 India
Multiclass Classification can be implemented by using consequent approaches to translate the multiclass problem into binary class classification problems and fuzzy classification methods. This work proposes a predicti... 详细信息
来源: 评论
Load Balancing in Cloud Computing based on Ant Colony Optimization and Crow Search Algorithm  27
Load Balancing in Cloud Computing based on Ant Colony Optimi...
收藏 引用
27th International Conference on Advanced Communications technology, ICACT 2025
作者: Alsheavi, Amar N. Wang, Xingfu Zhao, Wei Hawbani, Ammar Alhusaini, Naji Ahmed, Ibrahim Abdulrab Ismail, A.S. School of Computer Science and Technology University of Science and Technology of China Anhui Hefei230027 China School of Computer Science and Technology Anhui University of Technology Anhui China School of Computer Science Shenyang Aerospace University Shenyang110136 China School of Computer and Information Engineering Chuzhou University Anhui Chuzhou239000 China Computer Department Applied College Najran University Najran66462 Saudi Arabia College of Life Sciences and Oceanography Shenzhen University Shenzhen518060 China Faculty of Science Zagazig University Zagazig44519 Egypt
With the rapid increase in cloud services and the increasing shift toward them, balancing the cloud load has become a critical research issue. The increasing demand from customers for technology services worldwide is ... 详细信息
来源: 评论
Assessing the Effectiveness of Machine Learning Algorithms in Vehicle Insurance Fraud Prediction: A Comparative Approach  3
Assessing the Effectiveness of Machine Learning Algorithms i...
收藏 引用
3rd International Conference on Electronics and Renewable systems, ICEARS 2025
作者: Satone, Aditya P. Daronde, Subodh Faculty of Engineering and Technology Department of Computer Science and Medical Engineering Maharashtra Wardha442001 India Faculty of Engineering and Technology Department of Biomedical Engineering Maharashtra Wardha442001 India
Due to the wealth of information accessible on many insurance issues, including travel and auto insurance, individuals are becoming more and more impacted by these kinds of insurance in today's society. But this t... 详细信息
来源: 评论
An IoT-Assisted Real-Time Urban Air Pollution Data Collection system  5th
An IoT-Assisted Real-Time Urban Air Pollution Data Collectio...
收藏 引用
5th International Conference on Computing and Network Communications, CoCoNet 2023
作者: Ghose, Banani Minsar, Sk. Ghosh, Udayan Arif Mohammad, Sk. Mallick, Adil Hossain Rehena, Zeenat Department of Information Technology Haldia Institute of Technology West Bengal Haldia India Department of Computer Science and Engineering Aliah University West Bengal Kolkata India
Air pollution is one of the innumerable menaces an individual comes across every moment. Countless means to make urban lives smoother are indebted to witnessing air pollution and other types of pollution. It is contri... 详细信息
来源: 评论
Enabling Robust Security in MQTT-Based IoT Networks with Dynamic Resource-Aware Key Sharing  4
Enabling Robust Security in MQTT-Based IoT Networks with Dyn...
收藏 引用
4th International Conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Kaganurmath, Sharadadevi Cholli, Nagaraj Department of Computer Science Engineering Global Academy of Technology Bengaluru India Department of Information Science Engineering RV College of Engineering Bengaluru India
This paper presents a novel approach aimed at developing a secure secret key-sharing system optimized for resource-constrained Internet of Things (IoT) devices. Focusing on the MQTT protocol, the research endeavors to... 详细信息
来源: 评论
A privacy-preserving approach for detecting smishing attacks using federated deep learning
收藏 引用
International Journal of information technology (Singapore) 2025年 第1期17卷 547-553页
作者: Remmide, Mohamed Abdelkarim Boumahdi, Fatima Ilhem, Bousmaha Boustia, Narhimene LRDSI Laboratory Department of Computer Science Faculty of Sciences University of Blida 1 Blida Algeria Electronics Department Faculty of Technology University of Blida 1 Blida Algeria
Smishing is a type of social engineering attack that involves sending fraudulent SMS messages to trick recipients into revealing sensitive information. In recent years, it has become a significant threat to mobile com... 详细信息
来源: 评论
Opticurve: an optimized informer-curvelet framework for enhanced hyperspectral image segmentation and classification
收藏 引用
International Journal of information technology (Singapore) 2025年 1-16页
作者: Shaw, Kailash Wou Onn, Choo Li, Baihua Department of Computer Science and Engineering (AIML) Vishwakarma Institute of Technology Maharashtra Pune 411037 India Faculty of Data Science and Information Technology INTI International University Persiaran Perdana BBN Putra Nilai Negeri Sembilan Nilai 71800 Malaysia Department of Computer Science Loughborough University Loughborough LE11 3TU United Kingdom
Hyperspectral image (HSI) classification is crucial for applications in climate action, land use analysis, disaster risk reduction, and informed decision-making, given the complex spatial and spectral variations inher... 详细信息
来源: 评论
Neuro-Mimetic Developmental Architecture for Continual Learning through Self-Organizing Multimodal Perception Coordination
收藏 引用
IEEE Access 2025年 13卷 91625-91641页
作者: Dawood, Farhan Masuyama, Naoki Loo, Chu Kiong Iqra University Department of Computing & Technology Islamabad Pakistan Osaka Metropolitan University Graduate School of Informatics 1-1 Gakuen-cho Naka-ku Sakai-Shi Osaka599-8531 Japan University of Malaya Faculty of Computer Science and Information Technology Department of Artificial Intelligence Kuala Lumpur50603 Malaysia
Developing cognitive capabilities in autonomous agents stands as a challenging yet pivotal task. In order to construct cohesive representations and extract meaningful insights from the environment, the brain utilizes ... 详细信息
来源: 评论
Intelligent Anti-tamper systems: Safeguarding Critical Infrastructure in the Era of Proliferating Interconnected Devices and IoBT  6th
Intelligent Anti-tamper Systems: Safeguarding Critical Infra...
收藏 引用
6th International Conference on Computational Intelligence in Pattern Recognition, CIPR 2024
作者: Jena, Shubhashish Behera, H.S. Jena, Gunamani Department of Information Technology VSSUT Odisha Burla India Department of Computer Science and Engineering BVCE Andhra Pradesh Odalarevu India
By 2025, the expected 50 billion connected devices worldwide will heighten risks of physical and direct attacks on critical systems. The Internet of Battlefield Things (IoBT) and embedded devices in industrial control... 详细信息
来源: 评论