咨询与建议

限定检索结果

文献类型

  • 30,099 篇 会议
  • 15,249 篇 期刊文献
  • 424 册 图书

馆藏范围

  • 45,772 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 27,053 篇 工学
    • 19,677 篇 计算机科学与技术...
    • 15,871 篇 软件工程
    • 6,594 篇 信息与通信工程
    • 4,787 篇 控制科学与工程
    • 3,258 篇 电气工程
    • 3,079 篇 生物工程
    • 2,875 篇 电子科学与技术(可...
    • 2,528 篇 生物医学工程(可授...
    • 2,125 篇 机械工程
    • 1,597 篇 仪器科学与技术
    • 1,560 篇 光学工程
    • 1,439 篇 动力工程及工程热...
    • 1,288 篇 安全科学与工程
    • 1,183 篇 化学工程与技术
    • 1,139 篇 网络空间安全
    • 1,102 篇 交通运输工程
  • 14,867 篇 理学
    • 7,110 篇 数学
    • 4,649 篇 物理学
    • 3,544 篇 生物学
    • 2,302 篇 统计学(可授理学、...
    • 2,011 篇 系统科学
    • 1,307 篇 化学
  • 8,421 篇 管理学
    • 5,250 篇 管理科学与工程(可...
    • 3,604 篇 图书情报与档案管...
    • 2,645 篇 工商管理
  • 2,862 篇 医学
    • 2,427 篇 临床医学
    • 2,137 篇 基础医学(可授医学...
    • 1,276 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,439 篇 法学
    • 1,154 篇 社会学
  • 954 篇 经济学
  • 722 篇 农学
  • 712 篇 教育学
  • 226 篇 文学
  • 118 篇 军事学
  • 88 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,374 篇 computer science
  • 1,088 篇 deep learning
  • 1,042 篇 accuracy
  • 928 篇 machine learning
  • 888 篇 feature extracti...
  • 844 篇 internet of thin...
  • 795 篇 computational mo...
  • 667 篇 training
  • 564 篇 information tech...
  • 560 篇 artificial intel...
  • 535 篇 support vector m...
  • 524 篇 real-time system...
  • 497 篇 data mining
  • 479 篇 security
  • 444 篇 predictive model...
  • 402 篇 monitoring
  • 379 篇 cloud computing
  • 352 篇 optimization
  • 340 篇 data models
  • 339 篇 databases

机构

  • 297 篇 faculty of scien...
  • 287 篇 department for p...
  • 284 篇 department of ph...
  • 282 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 271 篇 department of ph...
  • 266 篇 department of ph...
  • 256 篇 faculté des scie...
  • 232 篇 department of ph...
  • 229 篇 department of co...
  • 228 篇 department of ph...
  • 216 篇 physics division...
  • 192 篇 cavendish labora...
  • 174 篇 yerevan physics ...
  • 169 篇 institute of phy...
  • 169 篇 institute of phy...
  • 168 篇 school of physic...
  • 164 篇 department of ph...
  • 163 篇 kirchhoff-instit...

作者

  • 275 篇 c. alexa
  • 273 篇 j. m. izen
  • 273 篇 c. amelung
  • 271 篇 g. bella
  • 271 篇 j. strandberg
  • 271 篇 d. calvet
  • 270 篇 g. spigo
  • 268 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 259 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 253 篇 h. a. gordon
  • 253 篇 g. gaudio
  • 251 篇 a. c. könig
  • 247 篇 y. tayalati
  • 243 篇 h. sakamoto
  • 241 篇 s. mohapatra
  • 236 篇 d. guest
  • 214 篇 y. nagasaka

语言

  • 43,894 篇 英文
  • 1,399 篇 其他
  • 452 篇 中文
  • 61 篇 日文
  • 11 篇 法文
  • 8 篇 德文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 2 篇 朝鲜文
  • 2 篇 俄文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45772 条 记 录,以下是4901-4910 订阅
排序:
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
Enhancing Early Childhood Learning using Image Processing for Sinhala Medium Education  5
Enhancing Early Childhood Learning using Image Processing fo...
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Saranga, R.G.V. Jayasinghe, A.H.N. Divyantha, U.A.S. De Silva, S.W.L.P. Swarnakantha, N.H.P. Ravi Supunya Kumari, P. K. Suriya Sri Lanka Institute of Information Technology Faculty of Computing Department of Computer Science and Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Computing Department of Information Technology Malabe Sri Lanka
The study aims to develop a mobile application for young children to learn Sinhala letters, shapes, colors, and storytelling incorporating machine learning models to evaluate and enhance educational activities. With t... 详细信息
来源: 评论
Formal verification for security and attacks in IoT physical layer
收藏 引用
Journal of Reliable Intelligent Environments 2024年 第1期10卷 73-91页
作者: Toman, Zinah Hussein Hamel, Lazhar Toman, Sarah Hussein Graiet, Mohamed Valadares, Dalton Cézane Gomes Department of Computer Science FSM Al-Monastir University Monastir Tunisia Department of Computer Science Faculty of Computer Science and Information Technology Al-Qadisiyah University Al Diwaniyah Iraq Department of Computer Science ISIMM Al-Monastir University Monastir Tunisia IMT Atlantique LS2N Nantes France Federal Institute of Pernambuco/Federal University of Campina Grande Campina Grande Brazil
IoT devices are more important than ever. In a connected world, IoT devices have many uses. They are no longer merely used at work;they are part of our everyday lives. Security concerns arise if the devices generate, ... 详细信息
来源: 评论
Notification system and GPS Position Tracking as a Security Feature for Child Pick Up At Daycare
Notification System and GPS Position Tracking as a Security ...
收藏 引用
2022 International Symposium on information technology and Digital Innovation, ISITDI 2022
作者: Aisuwarya, Ratna Erlina, Tati Sabyl, Syafajar Ahmad Andalas University Faculty Of Information Technology Computer Engineering Department Padang Indonesia
On the Internet of Things (IoT) era, specialized applications are highly demanded to solve real-life problems. We apply Haversine Formula in our proposed notification system and GPS position tracking method and choose... 详细信息
来源: 评论
IMAN: An Adaptive Network for Robust NPC Mortality Prediction with Missing Modalities
IMAN: An Adaptive Network for Robust NPC Mortality Predictio...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Huo, Yejing Huang, Guoheng Cheng, Lianglun He, Jianbin Chen, Xuhang Yuan, Xiaochen Zhong, Guo Pun, Chi-Man Guangdong University of Technology School of Computer Science and Technology China Huizhou University School of Computer Science and Engineering China University of Macau Department of Computer and Information Science China Macao Polytechnic University Faculty of Applied Sciences China Guangdong University of Foreign Studies School of Information Science and Technology China
Accurate prediction of mortality in nasopharyngeal carcinoma (NPC), a complex malignancy particularly challenging in advanced stages, is crucial for optimizing treatment strategies and improving patient outcomes. Howe... 详细信息
来源: 评论
POSTER: A behavioral biometric authentication framework on smartphones
POSTER: A behavioral biometric authentication framework on s...
收藏 引用
2017 ACM Asia Conference on computer and Communications Security, ASIA CCS 2017
作者: Mahfouz, Ahmed Mahmoud, Tarek M. Eldin, Ahmed Sharaf Computer Science Department Minia University EL-Minya Egypt Cairo Egypt Information Systems Department Helwan University Egypt Faculty of Information Technology and Computer Science Sinai University Egypt
To protect smartphones from unauthorized access, the user has the option to activate authentication mechanisms : PIN, Password, or Pattern. Unfortunately, these mechanisms are vulnerable to shoulder-surfing, smudge an... 详细信息
来源: 评论
Design of Bicycle's Speed Measurement system Using Hall Effect Sensor  1
Design of Bicycle's Speed Measurement System Using Hall Effe...
收藏 引用
1st International Conference computer science and Engineering, IC2SE 2019
作者: Aisuwarya, Ratna Azmi Riyan, Muhammad Eka Putri, Rahmi Computer Engineering Department Faculty of Information Technology Universitas Andalas Padang Indonesia
Bicycles are an easy-to-use and affordable transportation tool for all society. However, in cycling, there is no information about the speed and distance that has been taken. Whereas, these parameters are quite essent... 详细信息
来源: 评论
Efficient representation of text with multiple perspectives
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2012年 第1期19卷 101-111页
作者: PING Yuan ZHOU Ya-jian XUE Chao YANG Yi-xian Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science and Technology Xuchang University Xuchang 461000 China Science and Technology on Electronic Control Laboratory Chengdu 610036 China
An effective text representation scheme dominates the performance of text categorization system. However, based on the assumption of independent terms, the traditional schemes which tediously use term frequency (TF)... 详细信息
来源: 评论
Design of Wearable Device for Monitoring the Position of A Person with Dementia  5
Design of Wearable Device for Monitoring the Position of A P...
收藏 引用
5th International Seminar on Research of information technology and Intelligent systems, ISRITI 2022
作者: Aisuwarya, Ratna Akbar, Ilham Universitas Andalas Faculty of Information Technology Computer Engineering Department Padang Indonesia
The incidence of missing persons with dementia is defined as wandering, a condition in which the person with dementia is lost track of their caregivers. We propose to develop a wearable system that can be used more ef... 详细信息
来源: 评论
"Requirement Declarative Markup Language" for timetabling: A case study based development
"Requirement Declarative Markup Language" for timetabling: A...
收藏 引用
ICIIS 2007 - 2nd International Conference on Industrial and information systems 2007
作者: Liyanage, Arunasiri K. Udugama, L.S.K. Department of Information Technology Faculty of Information Technology University of Moratuwa Sri Lanka Department of Electrical and Computer Engineering Faculty of Engineering Technology Open University of Sri Lanka
Preparation of timetables is one of the challenges in universities. Universities are attempting to automate the timetabling process. However neither the manual nor the automated system may give a 100% accurate timetab... 详细信息
来源: 评论