咨询与建议

限定检索结果

文献类型

  • 30,123 篇 会议
  • 15,055 篇 期刊文献
  • 425 册 图书

馆藏范围

  • 45,603 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 26,856 篇 工学
    • 19,528 篇 计算机科学与技术...
    • 15,794 篇 软件工程
    • 6,503 篇 信息与通信工程
    • 4,736 篇 控制科学与工程
    • 3,155 篇 电气工程
    • 3,070 篇 生物工程
    • 2,828 篇 电子科学与技术(可...
    • 2,519 篇 生物医学工程(可授...
    • 2,095 篇 机械工程
    • 1,586 篇 仪器科学与技术
    • 1,544 篇 光学工程
    • 1,432 篇 动力工程及工程热...
    • 1,276 篇 安全科学与工程
    • 1,172 篇 化学工程与技术
    • 1,109 篇 网络空间安全
    • 1,087 篇 交通运输工程
  • 14,753 篇 理学
    • 7,063 篇 数学
    • 4,607 篇 物理学
    • 3,522 篇 生物学
    • 2,288 篇 统计学(可授理学、...
    • 2,003 篇 系统科学
    • 1,296 篇 化学
  • 8,384 篇 管理学
    • 5,231 篇 管理科学与工程(可...
    • 3,581 篇 图书情报与档案管...
    • 2,638 篇 工商管理
  • 2,835 篇 医学
    • 2,416 篇 临床医学
    • 2,118 篇 基础医学(可授医学...
    • 1,261 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,436 篇 法学
    • 1,153 篇 社会学
  • 950 篇 经济学
  • 722 篇 农学
  • 709 篇 教育学
  • 225 篇 文学
  • 118 篇 军事学
  • 88 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,375 篇 computer science
  • 1,070 篇 deep learning
  • 1,052 篇 accuracy
  • 904 篇 machine learning
  • 894 篇 feature extracti...
  • 842 篇 internet of thin...
  • 796 篇 computational mo...
  • 673 篇 training
  • 564 篇 information tech...
  • 552 篇 artificial intel...
  • 536 篇 support vector m...
  • 532 篇 real-time system...
  • 497 篇 data mining
  • 479 篇 security
  • 440 篇 predictive model...
  • 405 篇 monitoring
  • 381 篇 cloud computing
  • 349 篇 optimization
  • 342 篇 data models
  • 340 篇 databases

机构

  • 295 篇 faculty of scien...
  • 286 篇 department for p...
  • 280 篇 department of ph...
  • 279 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 269 篇 department of ph...
  • 266 篇 department of ph...
  • 253 篇 faculté des scie...
  • 232 篇 department of ph...
  • 229 篇 department of co...
  • 228 篇 department of ph...
  • 216 篇 physics division...
  • 195 篇 cavendish labora...
  • 171 篇 school of physic...
  • 169 篇 yerevan physics ...
  • 168 篇 institute of phy...
  • 168 篇 institute of phy...
  • 164 篇 department of ph...
  • 162 篇 kirchhoff-instit...

作者

  • 274 篇 c. alexa
  • 272 篇 j. m. izen
  • 272 篇 c. amelung
  • 270 篇 g. bella
  • 270 篇 j. strandberg
  • 270 篇 d. calvet
  • 269 篇 g. spigo
  • 267 篇 f. siegert
  • 261 篇 m. klein
  • 260 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 253 篇 g. gaudio
  • 252 篇 h. a. gordon
  • 250 篇 a. c. könig
  • 246 篇 y. tayalati
  • 243 篇 s. mohapatra
  • 242 篇 h. sakamoto
  • 235 篇 d. guest
  • 213 篇 y. nagasaka

语言

  • 43,784 篇 英文
  • 1,346 篇 其他
  • 448 篇 中文
  • 61 篇 日文
  • 8 篇 德文
  • 8 篇 法文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 2 篇 朝鲜文
  • 2 篇 俄文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45603 条 记 录,以下是491-500 订阅
排序:
Query Optimization Framework for Graph Database in Cloud Dew Environment
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 2317-2330页
作者: Tahir Alyas Ali Alzahrani Yazed Alsaawy Khalid Alissa Qaiser Abbas Nadia Tabassum Department of Computer Science Lahore Garrison UniversityLahorePakistan Faculty of Computer Science and Information Systems Islamic University Madinah Madinah42351Saudi Arabia Networks and Communications Department College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Science Virtual University of PakistanLahorePakistan
The query optimizer uses cost-based optimization to create an execution plan with the least cost,which also consumes the least amount of *** challenge of query optimization for relational database systems is a combina... 详细信息
来源: 评论
Building an effective KPI monitoring system for an OTT Platform  4
Building an effective KPI monitoring system for an OTT Platf...
收藏 引用
4th International Conference on Emerging systems and Intelligent Computing, ESIC 2024
作者: Jena, Biswaranjan Mishra, Debahuti Mishra, Smitaprava University Department of Computer Science and Engineering Bhubaneswar India University Department of Computer Science and Information Technology Bhubaneswar India
Success of any Over the Top (OTT) platform depends on how the platform is providing best user experience along with content to its customers. Being in media and entertainment space customers need to access content fro... 详细信息
来源: 评论
SWIFT: Swarm Intelligence Driven ESL Synthesis for Functional Trojan Fortification  10
SWIFT: Swarm Intelligence Driven ESL Synthesis for Functiona...
收藏 引用
10th IEEE International Symposium on Smart Electronic systems, iSES 2024
作者: Sengupta, Anirban Chaurasia, Rahul Indian Institute of Technology Department of Computer Science and Engineering Indore India Indian Institute of Information Technology Department of Computer Science and Engineering Bhopal India
This paper presents a novel Swarm Intelligence driven Electronic system-Level (ESL) synthesis-based security methodology for functional Trojan fortification (called 'SWIFT'). Backdoor functional Trojan covertl... 详细信息
来源: 评论
Comparative Analysis of Decision Tree Algorithms Using Gini and Entropy Criteria on the Forest Covertypes Dataset  3rd
Comparative Analysis of Decision Tree Algorithms Using Gini ...
收藏 引用
3rd International Conference on Innovations in Computing Research, ICR 2024
作者: Mustafa, Omar M. Ahmed, Omer M. Saeed, Vaman A. Computer Science Department University of Zakho Duhok Iraq Computer Information System Department Duhok Polytechnic University Duhok Iraq Information Technology Department Duhok Polytechnic University Duhok Iraq
By applying split conditions at each node that divide the training records into subsets with output variables of the same class, decision trees are constructed recursively. The procedure commences at the root node of ... 详细信息
来源: 评论
Deep Transfer Learning Models for Mobile-Based Ocular Disorder Identification on Retinal Images
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 139-161页
作者: Roseline Oluwaseun Ogundokun Joseph Bamidele Awotunde Hakeem Babalola Akande Cheng-Chi Lee Agbotiname Lucky Imoize Department of Multimedia Engineering Kaunas University of TechnologyKaunas44249Lithuania Department of Computer Science Landmark UniversityOmu Aran251103Nigeria Department of Computer Science Faculty of Information and Communication SciencesUniversity of IlorinIlorin240003Nigeria Department of Telecommunication Science University of IlorinIlorin230003Nigeria Department of Library and Information Science Fu Jen Catholic UniversityNew Taipei City24205TaiwanChina Department of Computer Science and Information Engineering Fintech and Blockchain Research CenterAsia UniversityTaichung City41354TaiwanChina Department of Electrical and Electronics Engineering Faculty of EngineeringUniversity of LagosAkokaLagos100213Nigeria Department of Electrical Engineering and Information Technology Institute of Digital CommunicationRuhr UniversityBochum44801Germany
Mobile technology is developing *** phone technologies have been integrated into the healthcare industry to help medical ***,computer vision models focus on image detection and classification ***2 is a computer vision... 详细信息
来源: 评论
Optimized Evaluation of Mobile Base Station by Modern Topological Invariants
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 363-378页
作者: Khalid Hamid Muhammad Waseem Iqbal Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Due to a tremendous increase in mobile traffic,mobile operators have started to restructure their networks to offload their *** directions will lead to fundamental changes in the design of future Fifthgeneration(5G)ce... 详细信息
来源: 评论
Intrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model
收藏 引用
computer Modeling in Engineering & sciences 2025年 第4期143卷 639-671页
作者: Noveela Iftikhar Mujeeb Ur Rehman Mumtaz Ali Shah Mohammed J.F.Alenazi Jehad Ali Knowledge Unit of Systems and Technology University of Management and TechnologySialkot51310Pakistan Department of Computer Science University ofWahWah Cantt47010Pakistan Department of Computer Engineering College of Computer and Information Sciences(CCIS)King Saud UniversityRiyadh11451Saudi Arabia Department of AI Convergence Network Ajou UniversitySuwon16499Republic of Korea
Intrusion attempts against Internet of Things(IoT)devices have significantly increased in the last few *** devices are now easy targets for hackers because of their built-in security *** a Self-Organizing Map(SOM)hybr... 详细信息
来源: 评论
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
收藏 引用
computer Modeling in Engineering & sciences 2024年 第3期138卷 3013-3032页
作者: Chunlin Xiong Zhengqiu Weng Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen518052China Sangfor Technologies Inc. Shenzhen518055China School of Data Science and Artificial Intelligence Wenzhou University of TechnologyWenzhou325035China College of Computer Science&Technology Zhejiang University of TechnologyHangzhou310023China Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Math&Computer Science Department Faculty of ScienceMenofia UniversityShebin El-KomEgypt Computing Science Department University of AberdeenAberdeenUK
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... 详细信息
来源: 评论
Cumulative histogram as a feature selection technique for anomaly detection
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10095-10107页
作者: Nassar, Mostafa Salama, Rania A. Saleeb, Adel A. El-bahnasawy, Nirmeen A. Ahmed, Hossam Eldin H. Abd El-Samie, Fathi E. Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Department of Information Technology Faculty of Computers and Information Suez University Suez Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh11671 Saudi Arabia
The enhancement of Intrusion Detection systems (IDS) is required to ensure protection of network resources and services. This is a hot research topic, especially in the presence of advanced intrusions and at... 详细信息
来源: 评论
Al-Biruni Earth Radius Optimization for COVID-19 Forecasting
收藏 引用
computer systems science & Engineering 2023年 第7期46卷 883-896页
作者: El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Tatiana Makarovskikh Amal H.Alharbi Doaa Sami Khafaga Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams University11566CairoEgypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura University35516MansouraEgypt Department of System Programming South Ural State University454080ChelyabinskRussia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Several instances of pneumonia with no clear etiology were recorded in Wuhan,China,on December 31,*** world health organization(WHO)called it COVID-19 that stands for“Coronavirus Disease 2019,”which is the second ve... 详细信息
来源: 评论