咨询与建议

限定检索结果

文献类型

  • 30,099 篇 会议
  • 15,249 篇 期刊文献
  • 424 册 图书

馆藏范围

  • 45,772 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 27,053 篇 工学
    • 19,677 篇 计算机科学与技术...
    • 15,871 篇 软件工程
    • 6,594 篇 信息与通信工程
    • 4,787 篇 控制科学与工程
    • 3,258 篇 电气工程
    • 3,079 篇 生物工程
    • 2,875 篇 电子科学与技术(可...
    • 2,528 篇 生物医学工程(可授...
    • 2,125 篇 机械工程
    • 1,597 篇 仪器科学与技术
    • 1,560 篇 光学工程
    • 1,439 篇 动力工程及工程热...
    • 1,288 篇 安全科学与工程
    • 1,183 篇 化学工程与技术
    • 1,139 篇 网络空间安全
    • 1,102 篇 交通运输工程
  • 14,867 篇 理学
    • 7,110 篇 数学
    • 4,649 篇 物理学
    • 3,544 篇 生物学
    • 2,302 篇 统计学(可授理学、...
    • 2,011 篇 系统科学
    • 1,307 篇 化学
  • 8,421 篇 管理学
    • 5,250 篇 管理科学与工程(可...
    • 3,604 篇 图书情报与档案管...
    • 2,645 篇 工商管理
  • 2,862 篇 医学
    • 2,427 篇 临床医学
    • 2,137 篇 基础医学(可授医学...
    • 1,276 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,439 篇 法学
    • 1,154 篇 社会学
  • 954 篇 经济学
  • 722 篇 农学
  • 712 篇 教育学
  • 226 篇 文学
  • 118 篇 军事学
  • 88 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,374 篇 computer science
  • 1,088 篇 deep learning
  • 1,042 篇 accuracy
  • 928 篇 machine learning
  • 888 篇 feature extracti...
  • 844 篇 internet of thin...
  • 795 篇 computational mo...
  • 667 篇 training
  • 564 篇 information tech...
  • 560 篇 artificial intel...
  • 535 篇 support vector m...
  • 524 篇 real-time system...
  • 497 篇 data mining
  • 479 篇 security
  • 444 篇 predictive model...
  • 402 篇 monitoring
  • 379 篇 cloud computing
  • 352 篇 optimization
  • 340 篇 data models
  • 339 篇 databases

机构

  • 297 篇 faculty of scien...
  • 287 篇 department for p...
  • 284 篇 department of ph...
  • 282 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 271 篇 department of ph...
  • 266 篇 department of ph...
  • 256 篇 faculté des scie...
  • 232 篇 department of ph...
  • 229 篇 department of co...
  • 228 篇 department of ph...
  • 216 篇 physics division...
  • 192 篇 cavendish labora...
  • 174 篇 yerevan physics ...
  • 169 篇 institute of phy...
  • 169 篇 institute of phy...
  • 168 篇 school of physic...
  • 164 篇 department of ph...
  • 163 篇 kirchhoff-instit...

作者

  • 275 篇 c. alexa
  • 273 篇 j. m. izen
  • 273 篇 c. amelung
  • 271 篇 g. bella
  • 271 篇 j. strandberg
  • 271 篇 d. calvet
  • 270 篇 g. spigo
  • 268 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 259 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 253 篇 h. a. gordon
  • 253 篇 g. gaudio
  • 251 篇 a. c. könig
  • 247 篇 y. tayalati
  • 243 篇 h. sakamoto
  • 241 篇 s. mohapatra
  • 236 篇 d. guest
  • 214 篇 y. nagasaka

语言

  • 43,894 篇 英文
  • 1,399 篇 其他
  • 452 篇 中文
  • 61 篇 日文
  • 11 篇 法文
  • 8 篇 德文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 2 篇 朝鲜文
  • 2 篇 俄文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45772 条 记 录,以下是311-320 订阅
排序:
Assessing the Effectiveness of Machine Learning Algorithms in Vehicle Insurance Fraud Prediction: A Comparative Approach  3
Assessing the Effectiveness of Machine Learning Algorithms i...
收藏 引用
3rd International Conference on Electronics and Renewable systems, ICEARS 2025
作者: Satone, Aditya P. Daronde, Subodh Faculty of Engineering and Technology Department of Computer Science and Medical Engineering Maharashtra Wardha442001 India Faculty of Engineering and Technology Department of Biomedical Engineering Maharashtra Wardha442001 India
Due to the wealth of information accessible on many insurance issues, including travel and auto insurance, individuals are becoming more and more impacted by these kinds of insurance in today's society. But this t... 详细信息
来源: 评论
An IoT-Assisted Real-Time Urban Air Pollution Data Collection system  5th
An IoT-Assisted Real-Time Urban Air Pollution Data Collectio...
收藏 引用
5th International Conference on Computing and Network Communications, CoCoNet 2023
作者: Ghose, Banani Minsar, Sk. Ghosh, Udayan Arif Mohammad, Sk. Mallick, Adil Hossain Rehena, Zeenat Department of Information Technology Haldia Institute of Technology West Bengal Haldia India Department of Computer Science and Engineering Aliah University West Bengal Kolkata India
Air pollution is one of the innumerable menaces an individual comes across every moment. Countless means to make urban lives smoother are indebted to witnessing air pollution and other types of pollution. It is contri... 详细信息
来源: 评论
Enabling Robust Security in MQTT-Based IoT Networks with Dynamic Resource-Aware Key Sharing  4
Enabling Robust Security in MQTT-Based IoT Networks with Dyn...
收藏 引用
4th International Conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2024
作者: Kaganurmath, Sharadadevi Cholli, Nagaraj Department of Computer Science Engineering Global Academy of Technology Bengaluru India Department of Information Science Engineering RV College of Engineering Bengaluru India
This paper presents a novel approach aimed at developing a secure secret key-sharing system optimized for resource-constrained Internet of Things (IoT) devices. Focusing on the MQTT protocol, the research endeavors to... 详细信息
来源: 评论
A privacy-preserving approach for detecting smishing attacks using federated deep learning
收藏 引用
International Journal of information technology (Singapore) 2025年 第1期17卷 547-553页
作者: Remmide, Mohamed Abdelkarim Boumahdi, Fatima Ilhem, Bousmaha Boustia, Narhimene LRDSI Laboratory Department of Computer Science Faculty of Sciences University of Blida 1 Blida Algeria Electronics Department Faculty of Technology University of Blida 1 Blida Algeria
Smishing is a type of social engineering attack that involves sending fraudulent SMS messages to trick recipients into revealing sensitive information. In recent years, it has become a significant threat to mobile com... 详细信息
来源: 评论
Opticurve: an optimized informer-curvelet framework for enhanced hyperspectral image segmentation and classification
收藏 引用
International Journal of information technology (Singapore) 2025年 1-16页
作者: Shaw, Kailash Wou Onn, Choo Li, Baihua Department of Computer Science and Engineering (AIML) Vishwakarma Institute of Technology Maharashtra Pune 411037 India Faculty of Data Science and Information Technology INTI International University Persiaran Perdana BBN Putra Nilai Negeri Sembilan Nilai 71800 Malaysia Department of Computer Science Loughborough University Loughborough LE11 3TU United Kingdom
Hyperspectral image (HSI) classification is crucial for applications in climate action, land use analysis, disaster risk reduction, and informed decision-making, given the complex spatial and spectral variations inher... 详细信息
来源: 评论
Modulation Assessment With IQD Correction for Two-Way Sequential AAF Relaying Transmissions
收藏 引用
IEEE Access 2025年 13卷 72389-72401页
作者: Mostafa, Hala Marey, Mohamed Mohamad Almustafa, Khaled Katrib, Juliano Princess Nourah bint Abdulrahman University College of Computer and Information Sciences Department of Information Technology P.O. Box 84428 Riyadh11671 Saudi Arabia Menoufia University Faculty of Engineering Shebeen El-Kom6132711 Egypt Department of Electrical and Computer Engineering Hawally32093 Kuwait Hawally32093 Kuwait
Modulation assessment (MA) is a fundamental element in the development of adaptive radios that can interact effectively with their context to optimize resource usage. This assessment has been extensively studied in th... 详细信息
来源: 评论
Intelligent Anti-tamper systems: Safeguarding Critical Infrastructure in the Era of Proliferating Interconnected Devices and IoBT  6th
Intelligent Anti-tamper Systems: Safeguarding Critical Infra...
收藏 引用
6th International Conference on Computational Intelligence in Pattern Recognition, CIPR 2024
作者: Jena, Shubhashish Behera, H.S. Jena, Gunamani Department of Information Technology VSSUT Odisha Burla India Department of Computer Science and Engineering BVCE Andhra Pradesh Odalarevu India
By 2025, the expected 50 billion connected devices worldwide will heighten risks of physical and direct attacks on critical systems. The Internet of Battlefield Things (IoBT) and embedded devices in industrial control... 详细信息
来源: 评论
Confidence-Based Trustscoring system for Identification of Secure Agent Platforms
Confidence-Based Trustscoring System for Identification of S...
收藏 引用
2025 International Conference on Multi-Agent systems for Collaborative Intelligence, ICMSCI 2025
作者: Joseph, Adri Jovin John Marikkannu, P. Mariappan, Marikkannan Sri Ramakrishna Institute of Technology Department of Information Technology Coimbatore India Anna University Department of Information Technology Regional Campus Coimbatore Coimbatore India Government College of Engineering Department of Computer Science and Engineering Erode India
Autonomous mobile agent systems can accomplish multiple tasks in an asynchronous and dynamic manner in platforms where there is excessive network load, network interruption and in slow networks. However, the decisions... 详细信息
来源: 评论
Perception-Centric Explainable AI: Bridging Cognitive Theories and HCI Design for Enhanced User Experience  16
Perception-Centric Explainable AI: Bridging Cognitive Theori...
收藏 引用
16th International Conference on Ambient systems, Networks and Technologies Networks, ANT 2025 / 8th International Conference on Emerging Data and Industry 4.0, EDI40 2025
作者: Alhasan, Sara Alnanih, Reem Computer Science Department Faculty of Computing and Information Technology King Abdulaziz University Jeddah 21589 Saudi Arabia
Artificial Intelligence (AI) systems increasingly influence high-stakes decision-making, necessitating explainability tailored to non-technical users. This research investigates integrating cognitive theories, Human-C... 详细信息
来源: 评论
Enhancing Image Search Engine Accuracy Using Psychological Intention Diagrams  3
Enhancing Image Search Engine Accuracy Using Psychological I...
收藏 引用
3rd International Conference on Integrated Circuits and Communication systems, ICICACS 2025
作者: Aswathi, K.P. Yadwad, Sunita Raj, D. Nirmal Rastogi, Shailesh Chennai Institute of Technology Department of Computer Science and Engineering Chennai India Parul University Faculty of Engineering and Technology Department of Computer science and Engineering Vadodara India Pune India Pune India
As the Internet becomes increasingly image-centric, users face substantial challenges in efficiently locating desired images due to the inherent limitations of image search engines in interpreting visual content and k... 详细信息
来源: 评论