咨询与建议

限定检索结果

文献类型

  • 30,328 篇 会议
  • 15,066 篇 期刊文献
  • 430 册 图书

馆藏范围

  • 45,824 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 27,068 篇 工学
    • 19,575 篇 计算机科学与技术...
    • 15,822 篇 软件工程
    • 6,517 篇 信息与通信工程
    • 4,764 篇 控制科学与工程
    • 3,143 篇 电气工程
    • 3,070 篇 生物工程
    • 2,844 篇 电子科学与技术(可...
    • 2,527 篇 生物医学工程(可授...
    • 2,104 篇 机械工程
    • 1,586 篇 仪器科学与技术
    • 1,538 篇 光学工程
    • 1,419 篇 动力工程及工程热...
    • 1,268 篇 安全科学与工程
    • 1,167 篇 化学工程与技术
    • 1,117 篇 网络空间安全
    • 1,084 篇 交通运输工程
  • 14,735 篇 理学
    • 7,087 篇 数学
    • 4,613 篇 物理学
    • 3,519 篇 生物学
    • 2,317 篇 统计学(可授理学、...
    • 2,002 篇 系统科学
    • 1,293 篇 化学
  • 8,389 篇 管理学
    • 5,227 篇 管理科学与工程(可...
    • 3,593 篇 图书情报与档案管...
    • 2,641 篇 工商管理
  • 2,828 篇 医学
    • 2,411 篇 临床医学
    • 2,113 篇 基础医学(可授医学...
    • 1,270 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,436 篇 法学
    • 1,152 篇 社会学
  • 946 篇 经济学
  • 716 篇 农学
  • 714 篇 教育学
  • 224 篇 文学
  • 117 篇 军事学
  • 87 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,375 篇 computer science
  • 1,104 篇 deep learning
  • 1,085 篇 accuracy
  • 911 篇 machine learning
  • 907 篇 feature extracti...
  • 849 篇 internet of thin...
  • 810 篇 computational mo...
  • 682 篇 training
  • 567 篇 information tech...
  • 561 篇 real-time system...
  • 561 篇 artificial intel...
  • 543 篇 support vector m...
  • 505 篇 data mining
  • 487 篇 security
  • 454 篇 predictive model...
  • 406 篇 monitoring
  • 388 篇 cloud computing
  • 359 篇 optimization
  • 354 篇 reliability
  • 350 篇 data models

机构

  • 297 篇 faculty of scien...
  • 290 篇 department for p...
  • 281 篇 department of ph...
  • 280 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 272 篇 department of ph...
  • 270 篇 department of ph...
  • 253 篇 faculté des scie...
  • 235 篇 department of ph...
  • 232 篇 department of co...
  • 230 篇 department of ph...
  • 218 篇 physics division...
  • 195 篇 cavendish labora...
  • 172 篇 yerevan physics ...
  • 169 篇 institute of phy...
  • 169 篇 school of physic...
  • 168 篇 institute of phy...
  • 162 篇 department of ph...
  • 162 篇 kirchhoff-instit...

作者

  • 276 篇 c. alexa
  • 274 篇 c. amelung
  • 273 篇 j. m. izen
  • 272 篇 g. bella
  • 272 篇 j. strandberg
  • 272 篇 d. calvet
  • 270 篇 g. spigo
  • 268 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 256 篇 s. jin
  • 255 篇 g. gaudio
  • 253 篇 h. a. gordon
  • 251 篇 a. c. könig
  • 248 篇 y. tayalati
  • 245 篇 s. mohapatra
  • 243 篇 h. sakamoto
  • 235 篇 d. guest
  • 217 篇 y. nagasaka

语言

  • 40,466 篇 英文
  • 4,887 篇 其他
  • 471 篇 中文
  • 62 篇 日文
  • 19 篇 德文
  • 17 篇 法文
  • 14 篇 斯洛文尼亚文
  • 7 篇 俄文
  • 2 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45824 条 记 录,以下是4711-4720 订阅
排序:
Understanding Server-Assisted Federated Learning in the Presence of Incomplete Client Participation  41
Understanding Server-Assisted Federated Learning in the Pres...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Yang, Haibo Qiu, Peiwen Khanduri, Prashant Fang, Minghong Liu, Jia Department of Computing and Information Sciences Ph.D. Rochester Institute of Technology RochesterNY United States Department of Electrical and Computer Engineering The Ohio State University ColumbusOH United States Department of Computer Science Wayne State University DetroitMI United States Department of Computer Science and Engineering University of Louisville LouisvilleKY United States
Existing works in federated learning (FL) often assume either full client or uniformly distributed client participation. However, in reality, some clients may never participate in FL training (aka incomplete client pa... 详细信息
来源: 评论
Enhancing Cybersecurity with Transformers: Preventing Phishing Emails and Social Media Scams
Enhancing Cybersecurity with Transformers: Preventing Phishi...
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Essam Al Daoud Laith Al Daoud Mahmoud Asassfeh Ala'a Al-Shaikh Ala'a Saeb Al-Sherideh Suha Afaneh Department of Cybersecurity Zarqa University Zarqa Jordan Computer Information System Jordan University of Science and Technology Jordan
In this study, the enhancement of cybersecurity through the use of transformer models is explored, specifically focusing on the prevention of phishing emails and social media scams. Two modern datasets were utilized: ... 详细信息
来源: 评论
Hybrid Transfer Learning and Deep Learning for Cloud Intrusion Detection Using Bio-Inspired Optimization
Hybrid Transfer Learning and Deep Learning for Cloud Intrusi...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Salam Al-E'mari Yousef Sanjalawe Waleed Awwad Hamzah Alqudah Mohammed Aladaileh Information Security Department Faculty of Information Technology University of Petra (UoP) Amman Jordan Information Technology Department King Abdullah II School for Information Technology The University of Jordan (JU) Amman Jordan Department of Computer Science College of Science Northern Border University (NBU) Arar KSA Department of Data Science and Artificial Intelligence Faculty of Information Technology American University of Madaba Amman Jordan Department of Computer Science Faculty of Information Technology University of Petra (UoP) Amman Jordan
This paper proposes a novel hybrid model for cloud intrusion detection, integrating transfer learning with bio-inspired optimization techniques to enhance detection accuracy and efficiency. Cloud environments present ... 详细信息
来源: 评论
Analysis of Privacy, Security, and Trust in the Internet of Things (IoT) Ecosystem
Analysis of Privacy, Security, and Trust in the Internet of ...
收藏 引用
International Symposium on Networks, computers and Communications (ISNCC)
作者: Anteneh Girma Antione Searcy Adine Barrett Department of Computer Science and Information Technology University of the District of Columbia
In the wake of rapidly increasing connectivity and social acceptance of IoT devices, understanding the privacy, secu-rity, and trust dimensions of IoT is instrumental in shaping how connected technologies are applied.... 详细信息
来源: 评论
Climate Change Analysis Using Machine Learning  3
Climate Change Analysis Using Machine Learning
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Sharma, Dolly Gupta, Pawan Rawat, Gourav Kumar, Sharad Malik, Suraj Bansal, Nidhi School of Computing Department Graphic Era Hill University Haldwani India Biet Jhansi Dr. A. P. J. Abdul Kalam Technical University Faculty of Information Technology Lucknow India School of Engineering and Technology Sharda University Department of Computer Science & Engineering Greater Noida India Biet Jhansi Dr. A. P. J. Abdul Kalam Technical University Faculty of Computer Science & Engineering Lucknow India Iimt University Department of Computer Science and Engineering Meerut India Nagpur Campus Pune India
More analysis is required day to day due to the frequent changes in the weather. Every second the subject needs accurate analysis. This research paper is suggesting a useful technique for analysis using machine learni... 详细信息
来源: 评论
A Novel Heart Disease Monitoring and Prediction Using Machine Learning Algorithm  8th
A Novel Heart Disease Monitoring and Prediction Using Machin...
收藏 引用
8th International Conference on Internet of Things and Connected Technologies, ICIoTCT 2023
作者: Senbagavalli, M. Karpagalakshmi, R.C. Sumathi, D. Lenin, J. Prasad, G.R.K. Manikandan, A. Department of Computer Science and Information Technology Alliance College of Engineering and Design Alliance University Bangalore India Department of ECE Koneru Lakshmaiah Education Foundation Vaddeswaram India Kattankulathur Chennai603203 India
Background: Continuous monitoring of patient health statistics becomes a difficult task in hospitals. Manually, it is difficult to monitor the health of the patients in the hospital continuously. Older and unconscious... 详细信息
来源: 评论
Temperature Sensor Circuit for a Wearable Perspiration Monitoring system
Temperature Sensor Circuit for a Wearable Perspiration Monit...
收藏 引用
2023 International Symposium on Devices, Circuits and systems, ISDCS 2023
作者: Ichimura, Yuichiro Goto, Kenta Johguchi, Koh Graduate School of Science and Technology Shinshu University Electrical and Computer Engineering Division Department of Engineering Nagano Japan Shinshu University Faculty of Engineering Department of Electrical and Computer Engineering Nagano Japan
In this work, a prototype system has been designed with a 0.18-μm CMOS technology to capture perspiration rate in daily life. To calculate an amount of perspiration, a temperature sensor is necessary concurrently wit... 详细信息
来源: 评论
Automation 4.0 for Water Level Monitoring system  7
Automation 4.0 for Water Level Monitoring System
收藏 引用
7th International Conference on information technology, InCIT 2023
作者: Kimpan, Warangkhana Palananda, Attapon Kruekaew, Boonhatai School of Science King Mongkut's Institute of Technology Ladkrabang Department of Computer Science Bangkok Thailand Nakhon Pathom Rajabhat University Faculty of Science and Technology Department of Intelligent Control Innovation Nakhon Pathom Thailand
This paper proposed the concept of using automation 4.0 for monitoring the water level. The water level warning system specifications are to measure the water level using ultrasonic sensors and measure the amount of r... 详细信息
来源: 评论
A Microservice Architecture with Load Balancing Mechanism in Cloud Environment  1
收藏 引用
International Conference on Machine Learning and Big Data Analytics, ICMLBDA 2022
作者: Mummana, Satyanarayana Sambana, Bosubabu Ramanababu, Budimure Gandreti, Preethi Rani, P. Pratima Mishra, Priyanka Chandrasekhar, A. Narasimha Raju, K. Andhra Pradesh Vizianagaram India Jawaharlal Nehru Technological University Andhra Pradesh Kakinada India Department of Computer Science and Engineering Indian Institute of Information Technology Kota Rajasthan Jaipur India Andhra Pradesh Visakhapatnam India Department of Computer Science and Engineering Vignan’s Institute of Information Technology Visakhapatnam Andhra Pradesh India Department of Computer Science and Engineering Avanthi Institute of Engineering and Technology Vizianagaram Andhra Pradesh India Visakhapatnam Andhra University Andhra Pradesh India
To solve the rising delay in responding to requests in Microservices Architecture (MSA), a load-balancing algorithm for requests is proposed based on microservice chain awareness. To formalize the request delay and mi... 详细信息
来源: 评论
Integrating Digital Twins with AI for Real-Time Intrusion Detection in Smart Infrastructure Networks
Integrating Digital Twins with AI for Real-Time Intrusion De...
收藏 引用
2024 International Conference on Intelligent Algorithms for Computational Intelligence systems, IACIS 2024
作者: Sasikala, M. Mahaboob John, Y.M. Jothi, B. Nandhini, S. Senthil Kumar, S. Sona College of Technology Department of Information Technology Salem India Mahendra College of Engineering Ece Department Salem India Srm Institute of Science and Technology Department of Computational Intelligence Kattankulathur India Karpagam Academy of Higher Education Computer Science and Engineering Coimbatore India R.M.K. College of Engineering and Technology Department of Mechanical Engineering Thiruvallur India
The integration of Digital Twins with Artificial Intelligence (AI) represents a revolutionary approach to enhancing real-time intrusion detection in smart infrastructure networks. Digital Twins, as virtual replicas of... 详细信息
来源: 评论