咨询与建议

限定检索结果

文献类型

  • 3,688 篇 会议
  • 2,837 篇 期刊文献
  • 167 册 图书

馆藏范围

  • 6,692 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,118 篇 工学
    • 2,968 篇 计算机科学与技术...
    • 2,421 篇 软件工程
    • 889 篇 信息与通信工程
    • 707 篇 控制科学与工程
    • 505 篇 电气工程
    • 480 篇 生物工程
    • 387 篇 电子科学与技术(可...
    • 360 篇 生物医学工程(可授...
    • 322 篇 机械工程
    • 268 篇 光学工程
    • 189 篇 动力工程及工程热...
    • 175 篇 安全科学与工程
    • 174 篇 仪器科学与技术
    • 158 篇 化学工程与技术
    • 148 篇 交通运输工程
  • 2,165 篇 理学
    • 1,098 篇 数学
    • 578 篇 生物学
    • 540 篇 物理学
    • 379 篇 统计学(可授理学、...
    • 313 篇 系统科学
    • 201 篇 化学
  • 1,208 篇 管理学
    • 832 篇 管理科学与工程(可...
    • 422 篇 图书情报与档案管...
    • 413 篇 工商管理
  • 439 篇 医学
    • 385 篇 临床医学
    • 327 篇 基础医学(可授医学...
    • 181 篇 公共卫生与预防医...
    • 170 篇 药学(可授医学、理...
  • 224 篇 法学
    • 178 篇 社会学
  • 149 篇 经济学
    • 148 篇 应用经济学
  • 119 篇 教育学
  • 70 篇 农学
  • 26 篇 文学
  • 24 篇 军事学
  • 12 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 214 篇 computer science
  • 187 篇 deep learning
  • 186 篇 machine learning
  • 150 篇 artificial intel...
  • 130 篇 software enginee...
  • 129 篇 accuracy
  • 115 篇 computational mo...
  • 114 篇 feature extracti...
  • 107 篇 internet of thin...
  • 96 篇 data mining
  • 94 篇 training
  • 87 篇 information syst...
  • 85 篇 wireless sensor ...
  • 82 篇 optimization
  • 75 篇 laboratories
  • 75 篇 predictive model...
  • 71 篇 support vector m...
  • 70 篇 cloud computing
  • 67 篇 computer archite...
  • 67 篇 convolutional ne...

机构

  • 44 篇 department of la...
  • 36 篇 sri lanka instit...
  • 35 篇 college of compu...
  • 34 篇 department of co...
  • 31 篇 graduate school ...
  • 27 篇 department of co...
  • 27 篇 concordia instit...
  • 26 篇 school of comput...
  • 25 篇 sri lanka instit...
  • 24 篇 computer science...
  • 24 篇 department of co...
  • 23 篇 institute of inf...
  • 22 篇 department of in...
  • 22 篇 state key labora...
  • 21 篇 department of el...
  • 21 篇 state key labora...
  • 19 篇 department of co...
  • 19 篇 ieee
  • 19 篇 concordia instit...
  • 19 篇 department of co...

作者

  • 63 篇 leonard barolli
  • 49 篇 arjan durresi
  • 41 篇 fatos xhafa
  • 36 篇 bentahar jamal
  • 29 篇 niyato dusit
  • 22 篇 el-sayed m.el-ke...
  • 22 篇 fan guisheng
  • 21 篇 akio koyama
  • 21 篇 ismail leila
  • 21 篇 mohammad s. obai...
  • 20 篇 pedrycz witold
  • 20 篇 keshta ismail
  • 19 篇 tao yang
  • 18 篇 abdelaziz a.abde...
  • 18 篇 choo kim-kwang r...
  • 17 篇 soni mukesh
  • 17 篇 hayashi eiji
  • 16 篇 mengchu zhou
  • 16 篇 gjergji mino
  • 16 篇 yu huiqun

语言

  • 6,360 篇 英文
  • 276 篇 其他
  • 61 篇 中文
  • 7 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Software Engineering Department of Computer Science and Information Systems"
6692 条 记 录,以下是1-10 订阅
排序:
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论
An Intelligent Privacy Protection Scheme for Efficient Edge Computation Offloading in IoV
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 910-919页
作者: Liang YAO Xiaolong XU Wanchun DOU Muhammad Bilal School of Software Nanjing University of Information Science and Technology State Key Laboratory for Novel Software Technology Nanjing University Department of Computer and Electronics Systems Engineering Hankuk University of Foreign Studies
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive... 详细信息
来源: 评论
Enhancing Arabic Cyberbullying Detection with End-to-End Transformer Model
收藏 引用
computer Modeling in engineering & sciences 2024年 第11期141卷 1651-1671页
作者: Mohamed A.Mahdi Suliman Mohamed Fati Mohamed A.G.Hazber Shahanawaj Ahamad Sawsan A.Saad Information and Computer Science Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Information Systems Department College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia Software Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Computer Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online *** tackle this challenge,our study introduces a new ap... 详细信息
来源: 评论
Towards Drought Modeling in South Asia: Machine Learning Approaches, Challenges and Opportunities
收藏 引用
IEEE Access 2025年 13卷 87654-87671页
作者: Reshan, Mana Saleh Al Raza, Muhammad Owais Mahoto, Naeem Ahmed Rajab, Adel Shaikh, Asadullah Elmagzoub, M.A. Rajab, Khairan Najran University College of Computer Science and Information Systems Department of Information Systems Najran61441 Saudi Arabia College of Computer Science and Information Systems Najran61441 Saudi Arabia Istanbul Sabahattin Zaim University Department of Computer Engineering Istanbul34303 Turkey Mehran University of Engineering and Technology Department of Software Engineering Sindh Jamshoro76062 Pakistan Najran University College of Computer Science and Information Systems Department of Computer Science Najran61441 Saudi Arabia Najran University College of Computer Science and Information Systems Department of Network and Communication Engineering Najran Saudi Arabia
Drought is an environmental and economic problem. Sustainable ecosystems, water resources, food security, and all are severely affected by drought. Due to the increasing frequency and severity of droughts caused by cl... 详细信息
来源: 评论
Data-driven output regulation control for constrained linear systems
收藏 引用
science China(information sciences) 2025年 第3期68卷 338-353页
作者: Chaoyu XIA Yi DONG Chaoli WANG Shengyuan XU Shanghai Research Institute for Intelligent Autonomous Systems Tongji University College of Electronic and Information Engineering Shanghai Research Institute for Intelligent Autonomous SystemsTongji University Department of Control Science and Engineering School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and Technology Department of Automation Nanjing University of Science and Technology
This study introduces a data-driven approach for state and output feedback control addressing the constrained output regulation problem in unknown linear discrete-time systems. Our method ensures effective tracking pe... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论
Early Detection of Colletotrichum Kahawae Disease in Coffee Cherry Based on computer Vision Techniques
收藏 引用
computer Modeling in engineering & sciences 2024年 第4期139卷 759-782页
作者: Raveena Selvanarayanan Surendran Rajendran Youseef Alotaibi Department of Computer Science and Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical ScienceChennai602105India Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955Saudi Arabia
Colletotrichum kahawae(Coffee Berry Disease)spreads through spores that can be carried by wind,rain,and insects affecting coffee plantations,and causes 80%yield losses and poor-quality coffee *** deadly disease is har... 详细信息
来源: 评论
Sentiment analysis in social internet of things using contextual representations and dilated convolution neural network
收藏 引用
Neural Computing and Applications 2024年 第20期36卷 12357-12370页
作者: Abid, Fazeel Rasheed, Jawad Hamdi, Mohammed Alshahrani, Hani Al Reshan, Mana Saleh Shaikh, Asadullah Department of Information Systems Dr. Hassan Murad School of Management University of Management and Technology Lahore Pakistan Department of Computer Engineering Istanbul Sabahattin Zaim University Istanbul34303 Turkey Department of Software Engineering Istanbul Nisantasi University Istanbul34394 Turkey Department Computer Science College of Computer Science and Information Systems Najran University Najran61441 Saudi Arabia Department Information Systems College of Computer Science and Information Systems Najran University Najran61441 Saudi Arabia
The methodologies based on neural networks are substantial to accomplish sentiment analysis in the Social Internet of Things (SIoT). With social media sentiment analysis, significant insights can produce efficient and... 详细信息
来源: 评论
Committed-programming reductions: formalizations,implications and relations
收藏 引用
science China(information sciences) 2024年 第10期67卷 151-171页
作者: Jiang ZHANG Yu YU Dengguo FENG Shuqin FAN Zhenfeng ZHANG State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some we... 详细信息
来源: 评论
Reliable Task Offloading for 6G-Based IoT Applications
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2255-2274页
作者: Usman Mahmood Malik Muhammad Awais Javed Ahmad Naseem Alvi Mohammed Alkhathami Department of Computer Software Engineering National University of Science and Technology(NUST)Islamabad44000Pakistan Department of Electrical and Computer Engineering COMSATS University IslamabadIslamabad45550Pakistan Information Systems Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia
Fog computing is a key enabling technology of 6G systems as it provides quick and reliable computing,and data storage services which are required for several 6G *** Intelligence(AI)algorithms will be an integral part ... 详细信息
来源: 评论