咨询与建议

限定检索结果

文献类型

  • 30,328 篇 会议
  • 14,991 篇 期刊文献
  • 426 册 图书

馆藏范围

  • 45,745 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 27,089 篇 工学
    • 19,569 篇 计算机科学与技术...
    • 15,821 篇 软件工程
    • 6,517 篇 信息与通信工程
    • 4,762 篇 控制科学与工程
    • 3,152 篇 电气工程
    • 3,070 篇 生物工程
    • 2,854 篇 电子科学与技术(可...
    • 2,528 篇 生物医学工程(可授...
    • 2,103 篇 机械工程
    • 1,585 篇 仪器科学与技术
    • 1,536 篇 光学工程
    • 1,419 篇 动力工程及工程热...
    • 1,268 篇 安全科学与工程
    • 1,166 篇 化学工程与技术
    • 1,116 篇 网络空间安全
    • 1,084 篇 交通运输工程
  • 14,731 篇 理学
    • 7,092 篇 数学
    • 4,607 篇 物理学
    • 3,518 篇 生物学
    • 2,322 篇 统计学(可授理学、...
    • 2,002 篇 系统科学
    • 1,293 篇 化学
  • 8,384 篇 管理学
    • 5,224 篇 管理科学与工程(可...
    • 3,592 篇 图书情报与档案管...
    • 2,641 篇 工商管理
  • 2,825 篇 医学
    • 2,409 篇 临床医学
    • 2,112 篇 基础医学(可授医学...
    • 1,269 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,435 篇 法学
    • 1,153 篇 社会学
  • 944 篇 经济学
  • 716 篇 农学
  • 713 篇 教育学
  • 224 篇 文学
  • 117 篇 军事学
  • 87 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,375 篇 computer science
  • 1,098 篇 deep learning
  • 1,082 篇 accuracy
  • 911 篇 machine learning
  • 907 篇 feature extracti...
  • 850 篇 internet of thin...
  • 813 篇 computational mo...
  • 683 篇 training
  • 562 篇 real-time system...
  • 559 篇 information tech...
  • 557 篇 artificial intel...
  • 542 篇 support vector m...
  • 501 篇 data mining
  • 490 篇 security
  • 454 篇 predictive model...
  • 400 篇 monitoring
  • 393 篇 cloud computing
  • 356 篇 optimization
  • 355 篇 reliability
  • 351 篇 data models

机构

  • 296 篇 faculty of scien...
  • 285 篇 department for p...
  • 280 篇 department of ph...
  • 278 篇 departamento de ...
  • 275 篇 department of ph...
  • 273 篇 department of ph...
  • 270 篇 department of ph...
  • 267 篇 department of ph...
  • 252 篇 faculté des scie...
  • 240 篇 department of co...
  • 233 篇 department of ph...
  • 229 篇 department of ph...
  • 217 篇 physics division...
  • 195 篇 cavendish labora...
  • 171 篇 yerevan physics ...
  • 169 篇 school of physic...
  • 168 篇 institute of phy...
  • 168 篇 institute of phy...
  • 166 篇 department of ph...
  • 161 篇 kirchhoff-instit...

作者

  • 276 篇 c. alexa
  • 274 篇 c. amelung
  • 273 篇 j. m. izen
  • 272 篇 g. bella
  • 272 篇 j. strandberg
  • 272 篇 d. calvet
  • 269 篇 g. spigo
  • 267 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 254 篇 g. gaudio
  • 253 篇 h. a. gordon
  • 251 篇 a. c. könig
  • 248 篇 y. tayalati
  • 244 篇 s. mohapatra
  • 243 篇 h. sakamoto
  • 234 篇 d. guest
  • 215 篇 y. nagasaka

语言

  • 40,392 篇 英文
  • 4,885 篇 其他
  • 468 篇 中文
  • 62 篇 日文
  • 19 篇 德文
  • 17 篇 法文
  • 14 篇 斯洛文尼亚文
  • 7 篇 俄文
  • 2 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45745 条 记 录,以下是4861-4870 订阅
Single-walled carbon nanotubes coated D-shaped fiber for aqueous ethanol detection
收藏 引用
Optoelectronics Letters 2022年 第7期18卷 430-433页
作者: Huda Adnan Zain Malathy Batumalay Hazli Rafis Abdul Rahim Moh Yasin Sulaiman Wadi Harun Department of Electrical Engineering University of MalayaKuala Lumpur 50603Malaysia Faculty of Information Technology INTI International UniversityNilai 71800Malaysia Faculty of Electronic and Computer Engineering Universiti Teknikal Malaysia MelakaMelakaMalaysia Department of Physics Faculty of Science and TechnologyAirlangga UniversitySurabayaIndonesia
In this letter,single-walled carbon nanotubes(SWCNT)coating was used on the D-shaped silica fiber for ethanol sensing in aqueous *** performance of this structure as an ethanol sensor was studied here by monitoring ou... 详细信息
来源: 评论
Improved FBVANET Based on Hierarchical Stability Rate
Improved FBVANET Based on Hierarchical Stability Rate
收藏 引用
IEEE International Conference on Artificial Intelligence in Engineering and technology (IICAIET)
作者: Ahmad Firdaus Muhammad Melvin Ismail Ahmedy Saaidal Razalli Azzuhri Faculty of Computer Science and Information Technology University Malaya Kuala Lumpur Malaysia
A mobile wireless sensor network works such as those used in vehicle ad hoc networks differs from a static wireless sensor network in that the nodes are not affix to one singular location but can traverse within the s... 详细信息
来源: 评论
A Game Theory based Attacker Defender Model for IDS in Cloud Security  9
A Game Theory based Attacker Defender Model for IDS in Cloud...
收藏 引用
9th International Conference on Computing for Sustainable Global Development, INDIACom 2022
作者: Jain, Ashima Tripathi, Khushboo Jatain, Aman Chaudhary, Manju Amity University Department of Computer Science and Engineering Haryana Gurugram India Jaypee Institute of Information Technology Department of Computer Science and Engineering Noida India
Cloud security has become a serious challenge due to increasing number of attacks day-by-day. Intrusion Detection system (IDS) requires an efficient security model for improving security in the cloud. This paper propo... 详细信息
来源: 评论
Fuzzy Based Ant Colony Optimization Scheduling in Cloud Computing
收藏 引用
computer systems science & Engineering 2022年 第2期40卷 581-592页
作者: K.Rajakumari M.Vinoth Kumar Garima Verma S.Balu Dilip Kumar Sharma Sudhakar Sengan Department of Computer Science and Engineering School of EngineeringAvinashlingam Institute for Home Science and Higher Education for WomenCoimbatore641043Tamil NaduIndia Department of Information Science and Engineering Dayananda Sagar Academy of Technology and ManagementBangalore560082India School of Computing DIT UniversityDehradun248009UttarakhandIndia Department of Computer Science and Engineering Paavai Engineering CollegePachal637018Tamil NaduIndia Department of Mathematics Jaypee University of Engineering and TechnologyGuna473226M.P.India Department of Computer Science and Engineering PSN College of Engineering and TechnologyTirunelveli627152Tamil NaduIndia
Cloud computing is an information technology deployment model established on *** scheduling states the set of rules for task allocations to an exact virtual machine in the cloud computing ***,task scheduling challenge... 详细信息
来源: 评论
Modeling of computer Virus Propagation with Fuzzy Parameters
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5663-5678页
作者: Reemah M.Alhebshi Nauman Ahmed Dumitru Baleanu Umbreen Fatima Fazal Dayan Muhammad Rafiq Ali Raza Muhammad Ozair Ahmad Emad E.Mahmoud Computer Science Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Mathematics and Statistics University of LahoreLahore54590Pakistan Department of Mathematics Cankaya UniversityBalgatAnkara06530Turkey Department of Medical Research China Medical UniversityTaichung406040TaiwanChina Institute of Space Sciences Magurele-Bucharest077125Romania Department of Computer Science University of LahoreLahore54590Pakistan Department of Mathematics School of ScienceUniversity of Management and TechnologyLahore54000Pakistan Department of Mathematics Faculty of Science and TechnologyUniversity of Central PunjabLahore54000Pakistan Department of Mathematics Near East University TRNCMersin10Turkey Department of Mathematics Government Maulana Zafar Ali Khan Graduate College WazirabadPunjab Higher Education Department(PHED)Lahore5400Pakistan Department of Mathematics and Statistics College of ScienceTaif UniversityP O Box11099Taif21944Saudi Arabia
Typically,a computer has infectivity as soon as it is *** is a reality that no antivirus programming can identify and eliminate all kinds of viruses,suggesting that infections would persevere on the *** understand the... 详细信息
来源: 评论
Incremental Learning Algorithms for Broad Learning system with Node and Input Addition
Incremental Learning Algorithms for Broad Learning System wi...
收藏 引用
2024 IEEE International Conference on systems, Man, and Cybernetics, SMC 2024
作者: Chen, Guang-Ze Jin, Junwei Sun, Hai-Wei Philip Chen, C.L. Faculty of Science and Technology University of Macau Department of Mathematics 99999 China School of Artificial Intelligence and Big Data Henan University of Technology Zhengzhou450001 China School of Computer Science and Engineering South China University of Technology and Pazhou Lab Guangzhou510641 510335 China
The Broad Learning system (BLS) has been established as an effective flat network alternative to Deep Neural Networks (DNNs), delivering high efficiency while achieving competitive accuracy. Despite its advantages, th... 详细信息
来源: 评论
Optimizing Propagation Predictions for Last-mile Connectivity in a CubeSat Perspective  3
Optimizing Propagation Predictions for Last-mile Connectivit...
收藏 引用
3rd International Conference on Computing and information technology, ICCIT 2023
作者: Almalki, Faris A. Aljahdalia, Haitham College of Computers and Information Technology Taif University Computer Engineering Department Taif Saudi Arabia King Abdullah University of Science and Technology Core Labs Thuwal Saudi Arabia
CubeSats is seen as an innovative approach to provide many wireless communications services in a wide footprint coverage manner. However, this could lead to electromagnetic spectrum congestion, which requires larger b... 详细信息
来源: 评论
Securing the Health Care Data Using Hybrid Rabin and Routing Algorithm  5
Securing the Health Care Data Using Hybrid Rabin and Routing...
收藏 引用
5th IEEE International Conference on Electrical, computer and Communication Technologies, ICECCT 2023
作者: Kaliyaperumal, Karthikeyan Raja, N. Kannaiya Velmurugan, L. Woyessa, Bacha Uma Ambo University Department of Information Technology HH Campus Ambo Ethiopia Ambo University Department of Computer Science HH Campus Ambo Ethiopia Ambo University Faculty of IT HH Campus Ambo Ethiopia
Chronic illnesses are becoming more common as a result of the current environmental conditions;most people prefer IoT to take care of their own health. The (IoT) plays a significant role in each and every industry tha... 详细信息
来源: 评论
A PORTABLE system THERAPY FOR PATIENTS WITH MOTOR PROBLEMS IN THEIR HANDS POST-STROKE
收藏 引用
International Journal of Electrical Engineering 2021年 第3期28卷 71-75页
作者: Castellanos, Ari Ernesto Ortiz Liu, Chuan-Ming Department of Electrical Engineering and Computer Science National Taipei University of Technology Taiwan Department of Computer Science and Information Engineering National Taipei University of Technology Taiwan
Stroke is a disease that affects many people in the world and causes many disabili-ties in humans who suffer Post-Stroke. In this work, we propose a Portable Hybrid system for Cognitive Rehabilitation Therapy. We desi... 详细信息
来源: 评论
Ensemble Based Detection Model for DDoS Attacks in SDNs Using Advanced Feature Selection  17
Ensemble Based Detection Model for DDoS Attacks in SDNs Usin...
收藏 引用
17th International Conference on Signal Processing and Communication systems, ICSPCS 2024
作者: Alashhab, Abdussalam Ahmed Edrah, Aisha Mohd Zahid, Mohd Soperi Siddikur Rahman, Md. Department of Computer and Information Sciences Universiti Teknologi Petronas Seri Iskandar Malaysia Faculty of Information Technology Alasmarya Islamic University Zliten Libya Western University Faculty of Engineering Department of Electrical and Computer Engineering LondonONN6A 5B9 Canada Universiti Teknologi Petronas Department of Electrical and Electronics Engineering Seri Iskandar Malaysia
Software-Defined Networking (SDN) enhances flexibility, scalability, and innovation by decoupling the control plane from the data plane, managed through streamlined controller operations. However, Distributed Denial o... 详细信息
来源: 评论