咨询与建议

限定检索结果

文献类型

  • 30,090 篇 会议
  • 14,989 篇 期刊文献
  • 424 册 图书

馆藏范围

  • 45,503 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 26,820 篇 工学
    • 19,519 篇 计算机科学与技术...
    • 15,793 篇 软件工程
    • 6,503 篇 信息与通信工程
    • 4,733 篇 控制科学与工程
    • 3,145 篇 电气工程
    • 3,070 篇 生物工程
    • 2,829 篇 电子科学与技术(可...
    • 2,519 篇 生物医学工程(可授...
    • 2,096 篇 机械工程
    • 1,586 篇 仪器科学与技术
    • 1,543 篇 光学工程
    • 1,426 篇 动力工程及工程热...
    • 1,276 篇 安全科学与工程
    • 1,170 篇 化学工程与技术
    • 1,110 篇 网络空间安全
    • 1,087 篇 交通运输工程
  • 14,740 篇 理学
    • 7,062 篇 数学
    • 4,604 篇 物理学
    • 3,518 篇 生物学
    • 2,288 篇 统计学(可授理学、...
    • 2,003 篇 系统科学
    • 1,294 篇 化学
  • 8,378 篇 管理学
    • 5,227 篇 管理科学与工程(可...
    • 3,580 篇 图书情报与档案管...
    • 2,639 篇 工商管理
  • 2,827 篇 医学
    • 2,411 篇 临床医学
    • 2,116 篇 基础医学(可授医学...
    • 1,260 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,435 篇 法学
    • 1,152 篇 社会学
  • 951 篇 经济学
  • 718 篇 农学
  • 708 篇 教育学
  • 225 篇 文学
  • 118 篇 军事学
  • 88 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,373 篇 computer science
  • 1,060 篇 deep learning
  • 1,036 篇 accuracy
  • 900 篇 machine learning
  • 882 篇 feature extracti...
  • 840 篇 internet of thin...
  • 790 篇 computational mo...
  • 666 篇 training
  • 564 篇 information tech...
  • 548 篇 artificial intel...
  • 537 篇 support vector m...
  • 524 篇 real-time system...
  • 497 篇 data mining
  • 476 篇 security
  • 438 篇 predictive model...
  • 400 篇 monitoring
  • 381 篇 cloud computing
  • 349 篇 optimization
  • 339 篇 databases
  • 339 篇 data models

机构

  • 297 篇 faculty of scien...
  • 288 篇 department for p...
  • 284 篇 department of ph...
  • 283 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 271 篇 department of ph...
  • 266 篇 department of ph...
  • 256 篇 faculté des scie...
  • 232 篇 department of ph...
  • 229 篇 department of co...
  • 228 篇 department of ph...
  • 216 篇 physics division...
  • 192 篇 cavendish labora...
  • 175 篇 yerevan physics ...
  • 169 篇 institute of phy...
  • 169 篇 institute of phy...
  • 168 篇 school of physic...
  • 165 篇 department of ph...
  • 164 篇 kirchhoff-instit...

作者

  • 275 篇 c. alexa
  • 273 篇 j. m. izen
  • 273 篇 c. amelung
  • 271 篇 g. bella
  • 271 篇 j. strandberg
  • 271 篇 d. calvet
  • 270 篇 g. spigo
  • 268 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 259 篇 m. rijssenbeek
  • 256 篇 s. jin
  • 253 篇 h. a. gordon
  • 253 篇 g. gaudio
  • 251 篇 a. c. könig
  • 247 篇 y. tayalati
  • 243 篇 h. sakamoto
  • 243 篇 s. mohapatra
  • 236 篇 d. guest
  • 213 篇 y. nagasaka

语言

  • 43,683 篇 英文
  • 1,346 篇 其他
  • 449 篇 中文
  • 61 篇 日文
  • 8 篇 德文
  • 8 篇 法文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 2 篇 朝鲜文
  • 2 篇 俄文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45503 条 记 录,以下是281-290 订阅
排序:
Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique
收藏 引用
computer systems science & Engineering 2023年 第1期44卷 859-872页
作者: Fawaz Alassery Ahmed Alzahrani Asif Irshad Khan Kanika Sharma Masood Ahmad Raees Ahmad Khan Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Applications Mangalmay Institute of Engineering&TechnologyGreater Noida201310Uttar PradeshIndia Department of Information Technology Babasaheb Bhimrao Ambedkar UniversityLucknow226025Uttar PradeshIndia
In recent years,it has been observed that the disclosure of information increases the risk of *** restricting the accessibility of information,providing security is ***,there is a demand for time tofill the gap betwee... 详细信息
来源: 评论
Custom Object Detection for Fresh and Rotten Fruit Classification  5
Custom Object Detection for Fresh and Rotten Fruit Classific...
收藏 引用
5th International Conference on Advanced information Technologies, ICAIT 2024
作者: Thant, Khine Zin Khant Paing, Minn Thant, Win Win Hmway Tar, Hmway Oo, Aung Nway University of Information Technology Yangon Myanmar University of Information Technology Faculty of Computer Science Yangon Myanmar
Automated grading and processing of fruits is a complex task which requires the creation of effective fruit vision detection systems. This paper presents an introduction of Fruit detection and recognition system for g... 详细信息
来源: 评论
BERT-CNN: A Deep Learning Model for Detecting Emotions from Text
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2943-2961页
作者: Ahmed R.Abas Ibrahim Elhenawy Mahinda Zidan Mahmoud Othman Department of Computer Science Faculty of Computer and InformaticsZagazig UniversityZagazig44519Egypt Department of Computer Science Faculty of Computers and Information TechnologyFuture University in Egypt11835Egypt
Due to the widespread usage of social media in our recent daily lifestyles,sentiment analysis becomes an important field in pattern recognition and Natural Language Processing(NLP).In this field,users’feedback data o... 详细信息
来源: 评论
Security Threats to xApps Access Control and E2 Interface in O-RAN
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2024年 5卷 1197-1203页
作者: Hung, Cheng-Feng Chen, You-Run Tseng, Chi-Heng Cheng, Shin-Ming National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei106335 Taiwan
Open Radio Access Networks (O-RANs) represent a novel wireless access network architecture that decomposes traditional RAN functions and makes them openly accessible. O-RANs enable real-time coordination, RAN performa... 详细信息
来源: 评论
Deep learning-based method for detection of copy-move forgery in videos
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8451-8464页
作者: Elbarougy, Reda Abdelfatah, Osama Behery, G.M. El-Badry, Noha M. Department of Artificial Intelligence and Data Science College of Computer Science and Engineering University of Ha’il Ha’il81481 Saudi Arabia Department of Information Technology Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Computer Science Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Mathematics Faculty of Science Damietta University New Damietta Kafr Saad Egypt
Video forgery is one of the most serious problems affecting the credibility and reliability of video content. Therefore, detecting video forgery presents a major challenge for researchers due to the diversity of forge... 详细信息
来源: 评论
IRS-enabled NOMA communication systems:A network architecture primer with future trends and challenges
收藏 引用
Digital Communications and Networks 2024年 第5期10卷 1503-1528页
作者: Haleema Sadia Ahmad Kamal Hassan Ziaul Haq Abbas Ghulam Abbas Muhammad Waqas Zhu Han Faculty of Electrical Engineering and Telecommunications and Networking(TeleCoN)Research Center Ghulam Ishaq Khan Institute of Engineering and Technology(GIKI)Topi 23640Pakistan Faculty of Computer Science and Engineering GIKITopi 23640Pakistan Department of Computer Engineering College of Information TechnologyUniversity of Bahrain32028Bahrain School of Engineering Edith Cowan UniversityPerth WA6027Australia Department of Electrical and Computer Engineering University of HoustonHoustonTX 77004USA Department of Computer Science and Engineering Kyung Hee UniversitySeoul 446-701South Korea
Non-Orthogonal Multiple Access(NOMA)has already proven to be an effective multiple access scheme for5th Generation(5G)wireless *** provides improved performance in terms of system throughput,spectral efficiency,fairne... 详细信息
来源: 评论
Analysis and Classification of Fake News Using Sequential Pattern Mining
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 942-963页
作者: M.Zohaib Nawaz M.Saqib Nawaz Philippe Fournier-Viger Yulin He College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518060 Guangdong Laboratory of Artificial Intelligence and Digital Economy(SZ) Shenzhen 518107China Department of Computer Science Faculty of Computing and Information TechnologyUnivesity of SargodhaSargodha 40100Pakistan
Disinformation,often known as fake news,is a major issue that has received a lot of attention *** researchers have proposed effective means of detecting and addressing *** machine and deep learning based methodologies... 详细信息
来源: 评论
A novel myocarditis detection combining deep reinforcement learning and an improved differential evolution algorithm
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第6期9卷 1347-1360页
作者: Jing Yang Touseef Sadiq Jiale Xiong Muhammad Awais Uzair Aslam Bhatti Roohallah Alizadehsani Juan Manuel Gorriz Department of Computer System and Technology Faculty of Computer Science and Information TechnologyUniversiti MalayaKuala LumpurMalaysia Centre for Artificial Intelligence Research(CAIR) Department of Information and Communication TechnologyUniversity of AgderGrimstadNorway Department of Creative Technologies Air UniversityIslamabadPakistan School of Information and Communication Engineering Hainan UniversityHaikouHainanChina Institute for Intelligent Systems Research and Innovation(IISRI) Deakin UniversityWaurn PondsVictoriaAustralia Data Science and Computational Intelligence Institute University of GranadaGranadaSpain
Myocarditis is a serious cardiovascular ailment that can lead to severe consequences if not promptly *** is triggered by viral infections and presents symptoms such as chest pain and heart *** detection is crucial for... 详细信息
来源: 评论
Per-user network access control kernel module with secure multifactor authentication
收藏 引用
Journal of Supercomputing 2024年 第1期80卷 970-1008页
作者: Cheng, Sheng-Tzong Horng, Gwo-Jiun Hsu, Chih-Wei Su, Z.-Yu Department of Computer Science and Information Engineering National Cheng Kung University Tainan701 Taiwan Department of Computer Science and Information Engineering Southern Taiwan University of Science and Technology Tainan Taiwan
Network attacks, such as botnets stealing sensitive data, constitute a critical concern for administrators in the Internet area. Such attacks can be prevented using a network access control (NAC) scheme. However, exis... 详细信息
来源: 评论
EduGym Post-Mortem: Open Educational Resource for Educational Game
EduGym Post-Mortem: Open Educational Resource for Educationa...
收藏 引用
2025 International Conference on Advancement in Data science, E-learning and information system, ICADEIS 2025
作者: Tarigan, Jos Timanta Zamzami, Elviawaty Muisa Zendrato, Niskarto Nababan, Anandhini Medianty Universitas Sumatera Utara Faculty of Computer Science and Information Technology Medan Indonesia
This paper aims to delve into the development of EduGym, an educational microlearning game specifically designed for mobile platforms. The discussion highlights the implementation and integration of Open Educational R... 详细信息
来源: 评论