咨询与建议

限定检索结果

文献类型

  • 30,271 篇 会议
  • 15,163 篇 期刊文献
  • 425 册 图书

馆藏范围

  • 45,859 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 27,070 篇 工学
    • 19,672 篇 计算机科学与技术...
    • 15,880 篇 软件工程
    • 6,562 篇 信息与通信工程
    • 4,813 篇 控制科学与工程
    • 3,189 篇 电气工程
    • 3,084 篇 生物工程
    • 2,871 篇 电子科学与技术(可...
    • 2,540 篇 生物医学工程(可授...
    • 2,111 篇 机械工程
    • 1,602 篇 仪器科学与技术
    • 1,563 篇 光学工程
    • 1,438 篇 动力工程及工程热...
    • 1,273 篇 安全科学与工程
    • 1,177 篇 化学工程与技术
    • 1,123 篇 网络空间安全
    • 1,089 篇 交通运输工程
  • 14,849 篇 理学
    • 7,093 篇 数学
    • 4,648 篇 物理学
    • 3,533 篇 生物学
    • 2,295 篇 统计学(可授理学、...
    • 2,004 篇 系统科学
    • 1,311 篇 化学
  • 8,405 篇 管理学
    • 5,235 篇 管理科学与工程(可...
    • 3,601 篇 图书情报与档案管...
    • 2,644 篇 工商管理
  • 2,854 篇 医学
    • 2,430 篇 临床医学
    • 2,125 篇 基础医学(可授医学...
    • 1,273 篇 公共卫生与预防医...
    • 1,220 篇 药学(可授医学、理...
  • 1,437 篇 法学
    • 1,154 篇 社会学
  • 949 篇 经济学
  • 729 篇 农学
  • 712 篇 教育学
  • 225 篇 文学
  • 118 篇 军事学
  • 88 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,375 篇 computer science
  • 1,095 篇 deep learning
  • 1,059 篇 accuracy
  • 922 篇 machine learning
  • 905 篇 feature extracti...
  • 842 篇 internet of thin...
  • 801 篇 computational mo...
  • 679 篇 training
  • 568 篇 information tech...
  • 555 篇 artificial intel...
  • 542 篇 support vector m...
  • 539 篇 real-time system...
  • 498 篇 data mining
  • 483 篇 security
  • 450 篇 predictive model...
  • 406 篇 monitoring
  • 383 篇 cloud computing
  • 353 篇 optimization
  • 345 篇 convolutional ne...
  • 344 篇 data models

机构

  • 295 篇 faculty of scien...
  • 286 篇 department for p...
  • 280 篇 department of ph...
  • 279 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 269 篇 department of ph...
  • 265 篇 department of ph...
  • 253 篇 faculté des scie...
  • 232 篇 department of ph...
  • 228 篇 department of ph...
  • 227 篇 department of co...
  • 216 篇 physics division...
  • 195 篇 cavendish labora...
  • 171 篇 school of physic...
  • 168 篇 yerevan physics ...
  • 168 篇 institute of phy...
  • 168 篇 institute of phy...
  • 161 篇 department of ph...
  • 161 篇 kirchhoff-instit...

作者

  • 274 篇 c. alexa
  • 272 篇 j. m. izen
  • 272 篇 c. amelung
  • 270 篇 g. bella
  • 270 篇 j. strandberg
  • 270 篇 d. calvet
  • 269 篇 g. spigo
  • 267 篇 f. siegert
  • 261 篇 m. klein
  • 260 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 253 篇 g. gaudio
  • 252 篇 h. a. gordon
  • 250 篇 a. c. könig
  • 246 篇 y. tayalati
  • 243 篇 s. mohapatra
  • 242 篇 h. sakamoto
  • 235 篇 d. guest
  • 212 篇 y. nagasaka

语言

  • 43,187 篇 英文
  • 2,189 篇 其他
  • 463 篇 中文
  • 61 篇 日文
  • 9 篇 德文
  • 8 篇 法文
  • 7 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 2 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45859 条 记 录,以下是691-700 订阅
排序:
A Review of Key Elements for Underwater Wireless Sensor Networks
A Review of Key Elements for Underwater Wireless Sensor Netw...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Al-Dulaimi, Aymen Mohammed Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Aliesawi, Salah A. Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Engineering Techniques Department of Communication Technical Engineering Al-Farahidi University Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia College of Computer and Information Technology Department of Computer Networking Systems University of Anbar Anbar Iraq
Underwater Wireless Sensor Networks (UWSNs) are emerging and have huge prospects since they have various applications in oceanography, environmental monitoring, and underwater communication. These networks contain low... 详细信息
来源: 评论
Smart Water-Powered Renewable Energy system with IoT Integration
Smart Water-Powered Renewable Energy System with IoT Integra...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Najim, Ali Hamza Ibraheem, Ahmed Salman Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq Department of Computer Technical Engineering Baghdad Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
An advanced hybrid renewable energy collecting and storage system prototype that utilizes water flow as its primary power source. Additionally, the system incorporates an energy monitoring system based on the Internet... 详细信息
来源: 评论
Preemptive Min Max Optimal Cost Based Scheduling for Improving the Load Balancing in Virtualized Cloud Environment
收藏 引用
SN computer science 2024年 第6期5卷 754页
作者: Ravikumar, K. Saravanakumar, K. Viswanathan, Anand Department of Computer Science and Engineering RRASE College of Engineering Department of Computer Science and Engineering Sri Eshwar College of Engineering Department of Information Technology Ponjesly College of Engineering
Load balancing and scheduling are essential components of cloud computing that aim to optimize resource allocation and utilization. In a cloud environment, multiple virtual machines and applications compete for shared... 详细信息
来源: 评论
Understanding Time Series Analysis in Early Detection of Unclassified Endocrine Tumors
Understanding Time Series Analysis in Early Detection of Unc...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Seth, Jyoti Prakash, Febin Singh, Vaishali Vivekananda Global University Department of Computer Science & Engineering Jaipur India Department of Computer Science and Information Technology Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
Endocrine tumors are malignant tumors that get up inside the endocrine system, a network of glands and organs responsible for producing hormones that affect the physiological procedures of the frame. Although endocrin... 详细信息
来源: 评论
An Efficient Scalp Inspection and Diagnosis system Using Multiple Deep Learning-Based Modules un système efficace d'inspection et de diagnostic du cuir chevelure utilisant plusieurs modules basés sur l'apprentissage profond
IEEE Canadian Journal of Electrical and Computer Engineering
收藏 引用
IEEE Canadian Journal of Electrical and computer Engineering 2024年 第1期47卷 22-35页
作者: Chen, Liang-Bi Chang, Wan-Jung Chiu, Yi-Chan Huang, Xiang-Rui National Penghu University of Science and Technology Department of Computer Science and Information Engineering Penghu880011 Taiwan National Kaohsiung University of Science and Technology Department of Electronic Engineering Kaohsiung807618 Taiwan Southern Taiwan University of Science and Technology Department of Electronic Engineering Tainan710 Taiwan
The conventional approach to scalp inspection in the hairdressing industry relies on manually interpreting scalp symptom images. Hairdressers provide treatments based on visual assessment, leading to potential inaccur... 详细信息
来源: 评论
SeBROP:blind ROP attacks without returns
收藏 引用
Frontiers of computer science 2022年 第4期16卷 185-202页
作者: Tianning Zhang Miao Cai Diming Zhang Hao Huang Department of Computer Science and Technology Nanjing UniversityNanjing210023China School of Computer and Information Hohai UniversityNanjing211106China College of Computer Engineering Jiangsu University of Science and TechnologyZhenjiang212008China
Currently,security-critical server programs are well protected by various defense techniques,such as Address Space Layout Randomization(ASLR),eXecute Only Memory(XOM),and Data Execution Prevention(DEP),against modern ... 详细信息
来源: 评论
Prediction of Reliability of Data in Underwater Communication Network Using Fuzzy Logic
Prediction of Reliability of Data in Underwater Communicatio...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Yadav, Surendra Gobi, N. Yadav, Rakesh Kumar Vivekananda Global University Department of Computer Science & Application Jaipur India Department of Computer Science and Information Technology Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
This paper uses fuzzy logic to propose a reliability prediction set of rules for the underwater communication community. The set of rules uses fixed fuzzy rules to expect communication reliability among nodes in an un... 详细信息
来源: 评论
Unsupervised Classification of Hyper Spectral Images using Feature Extraction and Fuzzy Logic
Unsupervised Classification of Hyper Spectral Images using F...
收藏 引用
2024 International Conference on Optimization Computing and Wireless Communication, ICOCWC 2024
作者: Kannagi, A. Chaudhary, Chetan Seth, Jyoti Department of Computer Science and Information Technology Bangalore India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Vivekananda Global University Department of Computer Science & Engineering Jaipur India
Hyperspectral pictures are complicated information items with high spectral resolution, making their categorization and analysis timeingesting and challenging. Traditional strategies for classifying hyperspectral pix ... 详细信息
来源: 评论
Design of secure QR payment system using Visual Cryptography method
Design of secure QR payment system using Visual Cryptography...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Narayanan, Praveena Lokesh, Yadlapalli Charitha, P. Kumar, G.Chethan Teja Bhavya, B. Hemalatha, S. Madanapalle Institute of Technology & Science Department of Computer Science and Technology Madanapalle India Madanapalle Institute of Technology & Science Department of Computer Science and Information Technology Madanapalle India
In this paper, we will discuss how a secure link-sharing system based on QR codes was created and put into operation. In recent years, QR codes have grown in popularity since they expedite link sharing and provide use... 详细信息
来源: 评论
Data-driven output regulation control for constrained linear systems
收藏 引用
science China(information sciences) 2025年 第3期68卷 338-353页
作者: Chaoyu XIA Yi DONG Chaoli WANG Shengyuan XU Shanghai Research Institute for Intelligent Autonomous Systems Tongji University College of Electronic and Information Engineering Shanghai Research Institute for Intelligent Autonomous SystemsTongji University Department of Control Science and Engineering School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and Technology Department of Automation Nanjing University of Science and Technology
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe... 详细信息
来源: 评论