咨询与建议

限定检索结果

文献类型

  • 3,719 篇 会议
  • 2,863 篇 期刊文献
  • 167 册 图书

馆藏范围

  • 6,749 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,179 篇 工学
    • 3,015 篇 计算机科学与技术...
    • 2,446 篇 软件工程
    • 901 篇 信息与通信工程
    • 726 篇 控制科学与工程
    • 513 篇 电气工程
    • 484 篇 生物工程
    • 398 篇 电子科学与技术(可...
    • 362 篇 生物医学工程(可授...
    • 325 篇 机械工程
    • 274 篇 光学工程
    • 190 篇 动力工程及工程热...
    • 177 篇 安全科学与工程
    • 175 篇 仪器科学与技术
    • 162 篇 化学工程与技术
    • 149 篇 交通运输工程
  • 2,185 篇 理学
    • 1,101 篇 数学
    • 583 篇 生物学
    • 548 篇 物理学
    • 379 篇 统计学(可授理学、...
    • 314 篇 系统科学
    • 204 篇 化学
  • 1,212 篇 管理学
    • 835 篇 管理科学与工程(可...
    • 424 篇 图书情报与档案管...
    • 413 篇 工商管理
  • 442 篇 医学
    • 387 篇 临床医学
    • 327 篇 基础医学(可授医学...
    • 184 篇 公共卫生与预防医...
    • 170 篇 药学(可授医学、理...
  • 222 篇 法学
    • 177 篇 社会学
  • 149 篇 经济学
    • 148 篇 应用经济学
  • 117 篇 教育学
  • 70 篇 农学
  • 25 篇 文学
  • 24 篇 军事学
  • 12 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 214 篇 computer science
  • 188 篇 deep learning
  • 187 篇 machine learning
  • 151 篇 artificial intel...
  • 131 篇 accuracy
  • 130 篇 software enginee...
  • 115 篇 computational mo...
  • 115 篇 feature extracti...
  • 108 篇 internet of thin...
  • 96 篇 data mining
  • 95 篇 training
  • 87 篇 information syst...
  • 86 篇 wireless sensor ...
  • 80 篇 optimization
  • 77 篇 predictive model...
  • 75 篇 laboratories
  • 71 篇 support vector m...
  • 71 篇 cloud computing
  • 71 篇 convolutional ne...
  • 67 篇 computer archite...

机构

  • 44 篇 department of la...
  • 37 篇 college of compu...
  • 36 篇 sri lanka instit...
  • 34 篇 department of co...
  • 31 篇 graduate school ...
  • 27 篇 school of comput...
  • 27 篇 department of co...
  • 27 篇 concordia instit...
  • 25 篇 sri lanka instit...
  • 25 篇 department of co...
  • 23 篇 institute of inf...
  • 23 篇 department of in...
  • 22 篇 computer science...
  • 22 篇 state key labora...
  • 21 篇 department of el...
  • 21 篇 state key labora...
  • 19 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 ieee
  • 19 篇 concordia instit...

作者

  • 63 篇 leonard barolli
  • 49 篇 arjan durresi
  • 41 篇 fatos xhafa
  • 36 篇 bentahar jamal
  • 29 篇 niyato dusit
  • 22 篇 el-sayed m.el-ke...
  • 22 篇 fan guisheng
  • 21 篇 akio koyama
  • 21 篇 ismail leila
  • 21 篇 mohammad s. obai...
  • 21 篇 keshta ismail
  • 20 篇 pedrycz witold
  • 19 篇 soni mukesh
  • 19 篇 tao yang
  • 19 篇 choo kim-kwang r...
  • 18 篇 abdelaziz a.abde...
  • 17 篇 hayashi eiji
  • 16 篇 mengchu zhou
  • 16 篇 johansson karl h...
  • 16 篇 gjergji mino

语言

  • 6,286 篇 英文
  • 407 篇 其他
  • 61 篇 中文
  • 7 篇 日文
  • 2 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Software Engineering Department of Computer Science and Information Systems"
6749 条 记 录,以下是371-380 订阅
排序:
Improved Prediction of Metamaterial Antenna Bandwidth Using Adaptive Optimization of LSTM
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 865-881页
作者: Doaa Sami Khafaga Amel Ali Alhussan El-Sayed M.El-kenawy Abdelhameed Ibrahim Said H.Abd Elkhalik Shady Y.El-Mashad Abdelaziz A.Abdelhamid Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Systems Engineering Faculty of Engineering at ShoubraBenha UniversityEgypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia
The design of an antenna requires a careful selection of its parameters to retain the desired ***,this task is time-consuming when the traditional approaches are employed,which represents a significant *** the other h... 详细信息
来源: 评论
Secure Energy Efficiency for ARIS Networks With Deep Learning: Active Beamforming and Position Optimization
收藏 引用
IEEE Transactions on Wireless Communications 2025年 第6期24卷 5282-5296页
作者: Wang, Dawei Wang, Zijun Zhao, Hongbo Zhou, Fuhui Alfarraj, Osama Yang, Weichao Mumtaz, Shahid Leung, Victor C. M. Northwestern Polytechnical University School of Electronics and Information Shaanxi Xi’an710072 China Beihang University School of Electronic and Information Engineering Beijing100191 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing210000 China King Saud University Community College Computer Science Department Riyadh11437 Saudi Arabia Nottingham Trent University Department of Computer Science NottinghamNG1 4FQ United Kingdom Artificial Intelligence Research Institute Shenzhen MSU-BIT University Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen528060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Incorporating an active reconfigurable intelligent surface on an autonomous aerial vehicles (AAVs), denoted as an aerial reconfigurable intelligent surface (ARIS), introduces a novel dimension for secure transmissions... 详细信息
来源: 评论
Ethiopic Cryptography: An Efficient Hybrid Encryption Algorithm for Reducing Cybersecurity Attack  11th
Ethiopic Cryptography: An Efficient Hybrid Encryption Algori...
收藏 引用
11th EAI International Conference on Advancement of science and Technology, ICAST 2023
作者: Akele, Tadesse Birara Bahiru, Tadesse Kebede Molla, Tibebu Legesse Fentie, Shambel Dessale Belay, Tadesse Destaw Marye, Almaz Yemataw Getaneh, Mersha Derese Department of Information System Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Department of Information Technology Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Deparment of Software Engineering Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia Department of Computer Science Kombolcha Institute of Technology Wollo University Kombolcha Ethiopia
Cryptography is an essential tool in ensuring the security of data during network communication. Network and service providers prioritize data security to ensure secure data exchanges. Ethiopic cryptography is a uniqu... 详细信息
来源: 评论
Tolerant Tracking Control Protocol for PMSM Based on Policy Iteration Algorithm and Fault Compensation  16th
Tolerant Tracking Control Protocol for PMSM Based on Polic...
收藏 引用
16th International Conference on Social Robotics, ICSR + InnoBiz 2024
作者: Yan, Shuya Li, Xiaocong Qian, Huaming Ma, Jun Al Mamun, Abdullah College of Intelligent Systems Science and Engineering Harbin Engineering University Harbin150001 China Department of Electrical and Computer Engineering National University of Singapore Singapore117583 Singapore Guangzhou China Information Science and Technology Eastern Institute of Technology Ningbo China
In robotics applications, ensuring reliable performance in the presence of actuator faults is essential for maintaining system safety and reliability. This paper presents a tolerant tracking control method for permane... 详细信息
来源: 评论
software Defect Prediction Harnessing on Multi 1-Dimensional Convolutional Neural Network Structure
收藏 引用
computers, Materials & Continua 2022年 第4期71卷 1521-1546页
作者: Zuhaira Muhammad Zain Sapiah Sakri Nurul Halimatul Asmak Ismail Reza M.Parizi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia Department of Computer Science and Information Technology College of CommunityPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia College of Computing and Software Engineering Kennesaw State UniversityMariettaGA30060USA
Developing successful software with no defects is one of the main goals of software *** order to provide a software project with the anticipated software quality,the prediction of software defects plays a vital *** le... 详细信息
来源: 评论
Real-Time Implementation of Quadrotor UAV Control System Based on a Deep Reinforcement Learning Approach
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 4757-4786页
作者: Taha Yacine Trad Kheireddine Choutri Mohand Lagha Souham Meshoul Fouad Khenfri Raouf Fareh Hadil Shaiba Aeronautical Sciences Laboratory Aeronautical and Spatial Studies InstituteBlida 1 UniversityBlida0900Algeria Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Energy and Embedded Systems for Transportation Research Department ESTACA-LABMontigny-Le-Bretonneux78066France Department of Electrical Engineering University of SharjahSharjah27272United Arab Emirates Department of Computer Science College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
The popularity of quadrotor Unmanned Aerial Vehicles(UAVs)stems from their simple propulsion systems and structural ***,their complex and nonlinear dynamic behavior presents a significant challenge for control,necessi... 详细信息
来源: 评论
Early Prediction and Diagnosis Cardiovascular Disease Using Deep Learning Models
Early Prediction and Diagnosis Cardiovascular Disease Using ...
收藏 引用
2024 IEEE International Conference on Emerging Technologies in computer science for Interdisciplinary Applications, ICETCS 2024
作者: Rani, Rudra Yamini Prasad, Mudarakola Lakshmi Reddy, Induru Sunnihith Tayubi, Iftikhar Aslam Sultan, Ghazala Reddy, Pundru Chandra Shaker VNR Vignana Jyothi Institute of Engineering and Technology Department of Information Technology Telangana Hyderabad India Computer Science and Engineering Institute of Aeronautical Engineering Telangana Dundigal India Computer Science and Business Systems RMK Engineering College Tamilnadu Tiruvallur India King Abdulaziz University Faculty of Computing and Information Technology Rabigh Jeddah Saudi Arabia Aligarh Muslim University Department of Computer Science Uttar Pradesh Aligarh India SR University School of Computer Science and Artificial Intelligence Telangana Warangal506371 India
Cardiovascular disease (CVD) risk assessment and prognosis in otherwise healthy people is an important part of disease management. Early detection and diagnosis of CVD, supported by the extensive health data on the co... 详细信息
来源: 评论
STEP UP: Systematically Motivating the Children with Low Psychological Maturity Level and Disabled Children using Gamification and Human computer Interaction  7
STEP UP: Systematically Motivating the Children with Low Psy...
收藏 引用
7th IEEE International conference for Convergence in Technology, I2CT 2022
作者: Dharmarathne, R.S.C.K. Medagedara, K.A. Madhubashinee, N.B.W.N. Maitipe, P.T. Sriyaratna, Disni Abeywardena, Kavinga Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Computer Systems Engineering Malabe Sri Lanka
Children are the future of this world. Therefore, teaching them to have a better future is very important. Also, as the adults we have to motivate them to overcome the obstacles and challenges they face throughout the... 详细信息
来源: 评论
Cloud Intrusion Detection System Based on Honeynet, Honeywell, Honeypot, and Honeytoken Strategies
Cloud Intrusion Detection System Based on Honeynet, Honeywel...
收藏 引用
International Conference on Data science and Network engineering, ICDSNE 2023
作者: Yasotha, B. Arthy, M. Shoba, L.K. Loganathan, Muralidaran Department of Data Science and Business Systems SRM Institute of Science and Technology Kattankulathur Tamil Nadu India Department of Computing Technologies SRM Institute of Science and Technology Kattankulathur Tamil Nadu India Computer Science and Information Systems Engineering St. Joseph University Dares Salaam Tanzania United Republic of
The security aspect of cloud computing is much more challenging for researchers. Preventing the attack requires knowledge about the type of attack, its origin, and how vulnerabilities and tools are used for the attack... 详细信息
来源: 评论
An Efficient Steganographic Approach for Securing Text Transmission Using S-Box in Cloud  2
An Efficient Steganographic Approach for Securing Text Trans...
收藏 引用
2nd International Conference on Business Analytics for Technology and Security, ICBATS 2023
作者: Ashraf, Humaira Malik, Javeria Ihsan, Uswa Al-Quayed, Fatima Humayun, Mamoona Jhanjhi, N.Z. International Islamic University Department of Computer Science and Software Engineering Islamabad Pakistan Department of Computer Science College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Department of Information Systems College of Computer and Information Sciences Jouf University Sakakah Saudi Arabia Taylor's University Malaysia Applied Science Research Center Applied Science Private University Amman11937 Jordan
In era of modern world and technology where everything is digitalized. Cloud computing emerged as one of the fastest growing parts of digital industry. With the Succor of cloud computing models, business accomplishes ... 详细信息
来源: 评论