咨询与建议

限定检索结果

文献类型

  • 30,123 篇 会议
  • 15,055 篇 期刊文献
  • 425 册 图书

馆藏范围

  • 45,603 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 26,856 篇 工学
    • 19,528 篇 计算机科学与技术...
    • 15,794 篇 软件工程
    • 6,503 篇 信息与通信工程
    • 4,736 篇 控制科学与工程
    • 3,155 篇 电气工程
    • 3,070 篇 生物工程
    • 2,828 篇 电子科学与技术(可...
    • 2,519 篇 生物医学工程(可授...
    • 2,095 篇 机械工程
    • 1,586 篇 仪器科学与技术
    • 1,544 篇 光学工程
    • 1,432 篇 动力工程及工程热...
    • 1,276 篇 安全科学与工程
    • 1,172 篇 化学工程与技术
    • 1,109 篇 网络空间安全
    • 1,087 篇 交通运输工程
  • 14,753 篇 理学
    • 7,063 篇 数学
    • 4,607 篇 物理学
    • 3,522 篇 生物学
    • 2,288 篇 统计学(可授理学、...
    • 2,003 篇 系统科学
    • 1,296 篇 化学
  • 8,384 篇 管理学
    • 5,231 篇 管理科学与工程(可...
    • 3,581 篇 图书情报与档案管...
    • 2,638 篇 工商管理
  • 2,835 篇 医学
    • 2,416 篇 临床医学
    • 2,118 篇 基础医学(可授医学...
    • 1,261 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,436 篇 法学
    • 1,153 篇 社会学
  • 950 篇 经济学
  • 722 篇 农学
  • 709 篇 教育学
  • 225 篇 文学
  • 118 篇 军事学
  • 88 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,375 篇 computer science
  • 1,070 篇 deep learning
  • 1,052 篇 accuracy
  • 904 篇 machine learning
  • 894 篇 feature extracti...
  • 842 篇 internet of thin...
  • 796 篇 computational mo...
  • 673 篇 training
  • 564 篇 information tech...
  • 552 篇 artificial intel...
  • 536 篇 support vector m...
  • 532 篇 real-time system...
  • 497 篇 data mining
  • 479 篇 security
  • 440 篇 predictive model...
  • 405 篇 monitoring
  • 381 篇 cloud computing
  • 349 篇 optimization
  • 342 篇 data models
  • 340 篇 databases

机构

  • 295 篇 faculty of scien...
  • 286 篇 department for p...
  • 280 篇 department of ph...
  • 279 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 269 篇 department of ph...
  • 266 篇 department of ph...
  • 253 篇 faculté des scie...
  • 232 篇 department of ph...
  • 229 篇 department of co...
  • 228 篇 department of ph...
  • 216 篇 physics division...
  • 195 篇 cavendish labora...
  • 171 篇 school of physic...
  • 169 篇 yerevan physics ...
  • 168 篇 institute of phy...
  • 168 篇 institute of phy...
  • 164 篇 department of ph...
  • 162 篇 kirchhoff-instit...

作者

  • 274 篇 c. alexa
  • 272 篇 j. m. izen
  • 272 篇 c. amelung
  • 270 篇 g. bella
  • 270 篇 j. strandberg
  • 270 篇 d. calvet
  • 269 篇 g. spigo
  • 267 篇 f. siegert
  • 261 篇 m. klein
  • 260 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 253 篇 g. gaudio
  • 252 篇 h. a. gordon
  • 250 篇 a. c. könig
  • 246 篇 y. tayalati
  • 243 篇 s. mohapatra
  • 242 篇 h. sakamoto
  • 235 篇 d. guest
  • 213 篇 y. nagasaka

语言

  • 43,784 篇 英文
  • 1,346 篇 其他
  • 448 篇 中文
  • 61 篇 日文
  • 8 篇 德文
  • 8 篇 法文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 2 篇 朝鲜文
  • 2 篇 俄文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45603 条 记 录,以下是431-440 订阅
排序:
Gender-Based Analysis of User Reactions to Facebook Posts
收藏 引用
Big Data Mining and Analytics 2024年 第1期7卷 75-86页
作者: Yassine El Moudene Jaafar Idrais Rida El Abassi Abderrahim Sabour Mathematical Engineering and Computer Science Laboratory Faculty of SciencesIbn Zohr UniversityAgadir 8706Morocco Department of Computer Science Mathematical−High School of Technology Ibn Zohr UniversityAgadir 8706Morocco
Online Social Networks(OSNs)are based on the sharing of different types of information and on various interactions(comments,reactions,and sharing).One of these important actions is the emotional reaction to the *** di... 详细信息
来源: 评论
Function Scheduling with Data Security in Serverless Computing systems  17
Function Scheduling with Data Security in Serverless Computi...
收藏 引用
17th International Conference on COMmunication systems and NETworkS, COMSNETS 2025
作者: Saha, Srestha Pandey, Arvind Addya, Sourav Kanti Brata Nath, Shubha Indian Institute of Information Technology Department of Computer Science and Engineering Guwahati India SRM Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu India National Institute of Technology Karnataka Department of Computer Science and Engineering Surathkal India
In serverless computing, the service provider takes full responsibility for function management. However, serverless computing has many challenges regarding data security and function scheduling. To address these chal... 详细信息
来源: 评论
Detection of Kidney Cysts of Kidney Ultrasound Image using Hybrid Method: KNN, GLCM, and ANN Backpropagation
Detection of Kidney Cysts of Kidney Ultrasound Image using H...
收藏 引用
2023 International Conference on computer science, information technology and Engineering, ICCoSITE 2023
作者: Mardison Yuhandri Universitas Putra Indonesia YPTK Computer System Computer Science Faculty Padang Indonesia Universitas Putra Indonesia YPTK Information Technology Computer Science Faculty Padang Indonesia
This research is aim to detect kidney cysts from human kidney Ultrasound (USG) 2D Images. This research uses data from Hospital patients as many as 25 Ultrasound images of the human kidney in the format ***. This rese... 详细信息
来源: 评论
RT-PPS: Real-time privacy-preserving scheme for cloud-hosted IoT data
收藏 引用
Journal of High Speed Networks 2025年 第1期31卷 71-89页
作者: Elhoseny, Mohamed Riad, Khaled College of Computing and Informatics University of Sharjah Sharjah27272 United Arab Emirates Faculty of Computers and Information Mansoura University Mansoura35516 Egypt Computer Science Department College of Computer Sciences & Information Technology King Faisal University Al-Ahsa 31982 Saudi Arabia Mathematics Department Faculty of Science Zagazig University Zagazig44519 Egypt
The Internet of Things (IoT) is a rapidly growing network of devices that can communicate with each other and with cloud-based services. These devices generate vast amounts of data that can be used to provide valuable... 详细信息
来源: 评论
Penetration Testing and Machine Learning-Driven Cybersecurity Framework for IoT and Smart City Wireless Networks
收藏 引用
IEEE Access 2025年 13卷 86144-86166页
作者: Zhukabayeva, Tamara Ahmad, Zulfiqar Adamova, Aigul Karabayev, Nurdaulet Mardenov, Yerik Satybaldina, Dina L.N. Gumilyov Eurasian National University Faculty of Information Technology Astana010000 Kazakhstan Hazara University Department of Computer Science and Information Technology Mansehra21300 Pakistan
Internet of Things (IoT) technology development speed, along with its integration into smart city infrastructure, requires strong cybersecurity solutions to protect important systems. The research introduces an extens... 详细信息
来源: 评论
Customer Segmentation Using Hierarchical Clustering  9
Customer Segmentation Using Hierarchical Clustering
收藏 引用
9th IEEE International Conference for Convergence in technology, I2CT 2024
作者: Afzal, Areeba Khan, Laiba Hussain, Muhammad Zunnurain Zulkifl Hasan, Muhammad Mustafa, Muzzamil Khalid, Aqsa Awan, Rimsha Ashraf, Farhan Khan, Zohaib Ahmed Javaid, Arslan Information Technology University Lahore Department of Computer Engineering Punjab Pakistan Bahria University Lahore Campus Dept. of Computer Science Pakistan University of Central Punjab Lahore Faculty of Information Technology Department of Computer Science Pakistan National College of Business Administration And Economics Department of Computer Science Lahore Pakistan Information Technology University Lahore Pakistan
In the dynamic landscape of retail, understanding customer behavior is paramount for businesses seeking to optimize marketing strategies and enhance the shopping experience. This study explores the utilization of hier... 详细信息
来源: 评论
E-voting system using cloud-based hybrid blockchain technology
收藏 引用
Journal of Safety science and Resilience 2024年 第1期5卷 102-109页
作者: Beulah Jayakumari S Lilly Sheeba Maya Eapen Jani Anbarasi Vinayakumar Ravi A.Suganya Malathy Jawahar Department of Information Technology Tagore Engineering College Chennai India School of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram ChennaiIndia Department of Information Technology Jerusalem College of Engineering ChennaiIndia School of Computer Science and Engineering Vellore Institute of Technology Chennai India Center for Artificial Intelligence Prince Mohammad Bin Fahd UniversityKhobarSaudi Arabia Leather Process Technology Division CSIR-Central Leather Research Institute ChennaiIndia
With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election *** pandemic situations,citizens tend to develop panic about mass gatherin... 详细信息
来源: 评论
Dynamic Evolutionary Game-based Modeling,Analysis and Performance Enhancement of Blockchain Channels
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第1期10卷 188-202页
作者: PeiYun Zhang MengChu Zhou ChenXi Li Abdullah Abusorrah IEEE the School of Computer Science Nanjing University of Information Science&TechnologyNanjing 210044China the Helen and John C.Hartmann Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102 USA the School of Computer and Information Anhui Normal UniversityWuhu 241003China the Department of Electrical and Computer Engineering Faculty of Engineeringand Center of Research Excellence in Renewable Energy and Power SystemsKing Abdulaziz UniversityJeddah 21481Saudi Arabia
The recent development of channel technology has promised to reduce the transaction verification time in blockchain *** transactions are transmitted through the channels created by nodes,the nodes need to cooperate wi... 详细信息
来源: 评论
Design of a Lightweight Compressed Video Stream-Based Patient Activity Monitoring system
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1253-1274页
作者: Sangeeta Yadav Preeti Gulia Nasib Singh Gill Piyush Kumar Shukla Arfat Ahmad Khan Sultan Alharby Ahmed Alhussen Mohd Anul Haq Department of Computer Science&Applications Maharshi Dayanand UniversityRohtak124001India University Institute of Technology Rajiv Gandhi Proudyogiki VishwavidyalayaBhopal462033India Department of Computer Science College of ComputingKhon Kaen UniversityKhon Kaen40002Thailand Department of Computer Science College of Computer and Information SciencesMajmaah UniversityAl Majmaah11952Kingdom of Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityAl Majmaah11952Kingdom of Saudi Arabia
Inpatient falls from beds in hospitals are a common *** falls may result in severe *** problem can be addressed by continuous monitoring of patients using *** advancements in deep learning-based video analytics have m... 详细信息
来源: 评论
A Holistic Approach for Cyber Security Vulnerability Assessment Based on Open Source Tools: Nikto, Acunitx, ZAP, Nessus and Enhanced with AI-Powered Tool ImmuniWeb  4
A Holistic Approach for Cyber Security Vulnerability Assessm...
收藏 引用
4th IEEE International Maghreb Meeting of the Conference on sciences and Techniques of Automatic Control and computer Engineering, MI-STA 2024
作者: Sllame, Azeddien M. Tomia, Tayma Esam Rahuma, Ruqia Mohammed University of Tripoli Faculty of Information Technology Computer Network Department Libya
This paper describes a cyber security vulnerability assessment methodology powered by AI tactics. The AI-powered tool 'ImmuniWeb AI' effectively supported the tools of the suggested approach by automating a nu... 详细信息
来源: 评论