咨询与建议

限定检索结果

文献类型

  • 3,688 篇 会议
  • 2,837 篇 期刊文献
  • 167 册 图书

馆藏范围

  • 6,692 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,118 篇 工学
    • 2,968 篇 计算机科学与技术...
    • 2,421 篇 软件工程
    • 889 篇 信息与通信工程
    • 707 篇 控制科学与工程
    • 505 篇 电气工程
    • 480 篇 生物工程
    • 387 篇 电子科学与技术(可...
    • 360 篇 生物医学工程(可授...
    • 322 篇 机械工程
    • 268 篇 光学工程
    • 189 篇 动力工程及工程热...
    • 175 篇 安全科学与工程
    • 174 篇 仪器科学与技术
    • 158 篇 化学工程与技术
    • 148 篇 交通运输工程
  • 2,165 篇 理学
    • 1,098 篇 数学
    • 578 篇 生物学
    • 540 篇 物理学
    • 379 篇 统计学(可授理学、...
    • 313 篇 系统科学
    • 201 篇 化学
  • 1,208 篇 管理学
    • 832 篇 管理科学与工程(可...
    • 422 篇 图书情报与档案管...
    • 413 篇 工商管理
  • 439 篇 医学
    • 385 篇 临床医学
    • 327 篇 基础医学(可授医学...
    • 181 篇 公共卫生与预防医...
    • 170 篇 药学(可授医学、理...
  • 224 篇 法学
    • 178 篇 社会学
  • 149 篇 经济学
    • 148 篇 应用经济学
  • 119 篇 教育学
  • 70 篇 农学
  • 26 篇 文学
  • 24 篇 军事学
  • 12 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 214 篇 computer science
  • 187 篇 deep learning
  • 186 篇 machine learning
  • 150 篇 artificial intel...
  • 130 篇 software enginee...
  • 129 篇 accuracy
  • 115 篇 computational mo...
  • 114 篇 feature extracti...
  • 107 篇 internet of thin...
  • 96 篇 data mining
  • 94 篇 training
  • 87 篇 information syst...
  • 85 篇 wireless sensor ...
  • 82 篇 optimization
  • 75 篇 laboratories
  • 75 篇 predictive model...
  • 71 篇 support vector m...
  • 70 篇 cloud computing
  • 67 篇 computer archite...
  • 67 篇 convolutional ne...

机构

  • 44 篇 department of la...
  • 36 篇 sri lanka instit...
  • 35 篇 college of compu...
  • 34 篇 department of co...
  • 31 篇 graduate school ...
  • 27 篇 department of co...
  • 27 篇 concordia instit...
  • 26 篇 school of comput...
  • 25 篇 sri lanka instit...
  • 24 篇 computer science...
  • 24 篇 department of co...
  • 23 篇 institute of inf...
  • 22 篇 department of in...
  • 22 篇 state key labora...
  • 21 篇 department of el...
  • 21 篇 state key labora...
  • 19 篇 department of co...
  • 19 篇 ieee
  • 19 篇 concordia instit...
  • 19 篇 department of co...

作者

  • 63 篇 leonard barolli
  • 49 篇 arjan durresi
  • 41 篇 fatos xhafa
  • 36 篇 bentahar jamal
  • 29 篇 niyato dusit
  • 22 篇 el-sayed m.el-ke...
  • 22 篇 fan guisheng
  • 21 篇 akio koyama
  • 21 篇 ismail leila
  • 21 篇 mohammad s. obai...
  • 20 篇 pedrycz witold
  • 20 篇 keshta ismail
  • 19 篇 tao yang
  • 18 篇 abdelaziz a.abde...
  • 18 篇 choo kim-kwang r...
  • 17 篇 soni mukesh
  • 17 篇 hayashi eiji
  • 16 篇 mengchu zhou
  • 16 篇 gjergji mino
  • 16 篇 yu huiqun

语言

  • 6,360 篇 英文
  • 276 篇 其他
  • 61 篇 中文
  • 7 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Software Engineering Department of Computer Science and Information Systems"
6692 条 记 录,以下是91-100 订阅
排序:
Lightweight and Roubust Key Agreement for Securing IIoT-Driven Flexible Manufacturing systems
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17197-17209页
作者: Hammad, Muhammad Badshah, Akhtar Almeer, Mohammed A. Waqas, Muhammad Song, Houbing Chen, Sheng Han, Zhu GIK Institute of Engineering Sciences and Technology Faculty of Mechanical Engineering Topi23640 Pakistan University of Malakand Department of Software Engineering Dir Lower18800 Pakistan University of Bahrain Computer Engineering Department College of Information Technology 32038 Bahrain University of Greenwich Faculty of Engineering and Science Centre for Sustainable Cybersecurity United Kingdom Edith Cowan University School of Engineering PerthWA6027 Australia Department of Information Systems BaltimoreMD United States University of Southampton School of Electronics and Computer Science SouthamptonSO17 1BJ United Kingdom University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The ever-evolving Internet of Things (IoT) has ushered in a new era of intelligent manufacturing across multiple industries. However, the security and privacy of real-time data transmitted over the public channel of t... 详细信息
来源: 评论
Image Hiding with High Robustness Based on Dynamic Region Attention in the Wavelet Domain
收藏 引用
computer Modeling in engineering & sciences 2024年 第10期141卷 847-869页
作者: Zengxiang Li Yongchong Wu Alanoud Al Mazroa Donghua Jiang Jianhua Wu Xishun Zhu Department of Information Engineering Gongqing CollegeNanchang UniversityJiujiang332020China School of Information Engineering Gongqing Institute of Science and TechnologyJiujiang332020China Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia School of Computer Science and Engineering Sun Yat-sen UniversityGuangzhou511400China School of Information Engineering Nanchang UniversityNanchang330031China School of Mathematics and Statistics Hainan Normal UniversityHaikou571158China
Hidden capacity,concealment,security,and robustness are essential indicators of hiding ***,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the *** ... 详细信息
来源: 评论
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 93-115页
作者: Shafi Ullah Sibghat Ullah Bazai Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed Department of Computer Engineering Balochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Department of Information Technology Balochistan University of Information TechnologyEngineeringand Management SciencesQuetta87300Pakistan Department of Information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Software Engineering College of ComputingRiphah International UniversityFaisalabad44000Pakistan Department of Electrical Engineering Balochistan University of Information Technology Engineeringand Management SciencesQuetta87300Pakistan Department of Mathematics College of Science Al-ZulfiMajmaah UniversityAl-Majmaah11952Saudi Arabia
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... 详细信息
来源: 评论
IoT-Supported Indoor Navigation System Using Machine Learning Technique  12th
IoT-Supported Indoor Navigation System Using Machine Learnin...
收藏 引用
12th International Conference on Recent Trends in Computing, ICRTC 2024
作者: Christy Jeba Malar, A. Deva Priya, M. Bhuvana, S. Vidhya, K. Sudharsan, S. Suhita, S. Department of Information Technology Sri Krishna College of Technology Tamilnadu Coimbatore India Department of Computer Science and Engineering Karpagam College of Engineering Tamilnadu Coimbatore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
Indoor Navigation System (INS) supports seamless movement of objects within confined spaces in smart environments. In this paper, a novel INS that relies on ESP32-based Received Signal Strength Indication (RSSI) measu... 详细信息
来源: 评论
Novel Approach for Enhancing Mental Well-Being Through Machine Learning Techniques  5
Novel Approach for Enhancing Mental Well-Being Through Machi...
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Roshani, O.V.D.E. Ayuwardhana, H.M.K.J.J. Rodrigo, P.H.M.S. Hewageegana, R.U. Fernando, Harinda De Silva, Dilshan I. Sri Lanka Institute of Information Technology Faculty of Computing Department of Computer Science and Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Computing Department of Computer Systems Engineering Malabe Sri Lanka
Frequently, individuals undergo specific episodes of mental health challenges throughout their lifetime. But the COVID pandemic has triggered a surge in mental health disorders arising from isolation, monotonous routi... 详细信息
来源: 评论
Status Quo of Hate Content Research using Bibliometric Analysis
Status Quo of Hate Content Research using Bibliometric Analy...
收藏 引用
2024 International Conference on Cybernation and Computation, CYBERCOM 2024
作者: Chetty, Naganna Alathur, Sreejith Pai, Vinayak NMAM Institute of Technology Nitte University Department of Information Science & Engineering Mangaluru India Indian Institute of Management Department of Information Systems Kozhikode India Manipal Institute of Technology MAHE Department of Computer Science & Engineering Manipal India
Expression of hate content through social media is prevalent and a global issue. The objective of this paper is to conduct analysis on hate content research and suggest policies to combat online hate content. The Scop... 详细信息
来源: 评论
Identification of Age, Plumage, and Sex of Bird Species Using Pre-Trained Deep Convolutional Neural Network  2
Identification of Age, Plumage, and Sex of Bird Species Usin...
收藏 引用
2nd IEEE International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics, ICIITCEE 2024
作者: Banerjee, Sourik Gupta, Richa Pandian, J. Arun Saranya, S. Mariappan, L. Thanga Vellore Institute of Technology Department of Computer Application Vellore India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Vellore India K.Ramakrishnan College of Engineering Department of Computer Science and Engineering Tiruchirappalli India
The research aims to identify the age, plumage, and sex of bird species using standard Pre-trained Deep Convolutional Neural Networks (Pre-DCNNs). The proposed work involves collecting various bird images, which are t... 详细信息
来源: 评论
WIP: An Engaging Undergraduate Intro to Model Checking in software engineering Using TLA+  54
WIP: An Engaging Undergraduate Intro to Model Checking in So...
收藏 引用
54th IEEE Frontiers in Education Conference, FIE 2024
作者: Läufer, Konstantin Mertin, Gunda Thiruvathukal, George K. Loyola University Software and Systems Laboratory Department of Computer Science Chicago United States Institute for Software Engineering and Programming Languages University of Lübeck Germany
Background: In this Innovative Practice Work in Progress, we present our initial efforts to integrate formal methods, with a focus on model-checking specifications written in Temporal Logic of Actions (TLA+), into com... 详细信息
来源: 评论
A Transmission and Transformation Fault Detection Algorithm Based on Improved YOLOv5
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 2997-3011页
作者: Xinliang Tang Xiaotong Ru Jingfang Su Gabriel Adonis School of Information Science and Engineering Hebei University of Science and TechnologyShijiazhuang050000China Department of Computer Science and Information Systems Birkbeck Institute for Data AnalyticsLondonB100ABWC1E 7HXUK
On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line *** these faults is of great significance for the s... 详细信息
来源: 评论
Collaborative learning-based inter-dependent task dispatching and co-location in an integrated edge computing system
收藏 引用
Digital Communications and Networks 2024年 第6期10卷 1837-1850页
作者: Uchechukwu Awada Jiankang Zhang Sheng Chen Shuangzhi Li Shouyi Yang School of Software Henan Institute of Science and TechnologyXinxiang 453003China School of Electrical and Information Engineering Zhengzhou UniversityZhengzhou 450001China Department of Computing and Informatics Bournemouth UniversityPoole BH125BBUK School of Electronics and Computer Science University of SouthamptonSouthampton SO171BJUK Faculty of Information Science and Engineering Ocean University of ChinaQingdao 266100China
Recently,several edge deployment types,such as on-premise edge clusters,Unmanned Aerial Vehicles(UAV)-attached edge devices,telecommunication base stations installed with edge clusters,etc.,are being deployed to enabl... 详细信息
来源: 评论