咨询与建议

限定检索结果

文献类型

  • 2,010 篇 会议
  • 1,982 篇 期刊文献
  • 110 册 图书

馆藏范围

  • 4,102 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,237 篇 工学
    • 1,346 篇 计算机科学与技术...
    • 1,083 篇 软件工程
    • 519 篇 信息与通信工程
    • 282 篇 生物医学工程(可授...
    • 275 篇 生物工程
    • 267 篇 控制科学与工程
    • 248 篇 电气工程
    • 244 篇 电子科学与技术(可...
    • 231 篇 光学工程
    • 191 篇 仪器科学与技术
    • 164 篇 核科学与技术
    • 151 篇 机械工程
    • 102 篇 化学工程与技术
    • 84 篇 动力工程及工程热...
    • 69 篇 材料科学与工程(可...
  • 1,770 篇 理学
    • 903 篇 物理学
    • 594 篇 数学
    • 336 篇 生物学
    • 201 篇 统计学(可授理学、...
    • 138 篇 化学
    • 132 篇 系统科学
    • 92 篇 地球物理学
  • 546 篇 管理学
    • 333 篇 管理科学与工程(可...
    • 231 篇 图书情报与档案管...
    • 177 篇 工商管理
  • 291 篇 医学
    • 241 篇 临床医学
    • 221 篇 基础医学(可授医学...
    • 148 篇 药学(可授医学、理...
    • 95 篇 公共卫生与预防医...
  • 90 篇 法学
    • 75 篇 社会学
  • 68 篇 经济学
  • 50 篇 教育学
  • 44 篇 农学
  • 11 篇 文学
  • 6 篇 艺术学
  • 3 篇 军事学

主题

  • 141 篇 informatics
  • 97 篇 artificial intel...
  • 90 篇 hadron colliders
  • 72 篇 machine learning
  • 72 篇 computer network...
  • 63 篇 higgs bosons
  • 58 篇 deep learning
  • 58 篇 wireless sensor ...
  • 55 篇 quality of servi...
  • 55 篇 computational mo...
  • 53 篇 computer archite...
  • 48 篇 protocols
  • 47 篇 proton-proton in...
  • 45 篇 bandwidth
  • 44 篇 mobile communica...
  • 43 篇 costs
  • 42 篇 electronic mail
  • 41 篇 routing
  • 41 篇 image segmentati...
  • 40 篇 resource managem...

机构

  • 417 篇 department for p...
  • 410 篇 faculty of scien...
  • 404 篇 kirchhoff-instit...
  • 400 篇 department of ph...
  • 387 篇 department of ph...
  • 387 篇 institute of phy...
  • 386 篇 department of ph...
  • 373 篇 institute of phy...
  • 368 篇 fakultät für phy...
  • 341 篇 instituto de fís...
  • 308 篇 department of ph...
  • 287 篇 department of ph...
  • 285 篇 graduate school ...
  • 284 篇 nikhef national ...
  • 282 篇 dipartimento di ...
  • 281 篇 department of ph...
  • 275 篇 universidade fed...
  • 267 篇 department of ph...
  • 267 篇 ictp trieste
  • 259 篇 yerevan physics ...

作者

  • 336 篇 c. alexa
  • 333 篇 j. m. izen
  • 332 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 325 篇 g. spigo
  • 325 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 318 篇 s. mohapatra
  • 310 篇 s. guindon
  • 307 篇 a. kaczmarska
  • 301 篇 j. schaarschmidt
  • 299 篇 y. tayalati
  • 292 篇 a. d. pilkington
  • 288 篇 l. chevalier
  • 282 篇 m. klein

语言

  • 3,515 篇 英文
  • 554 篇 其他
  • 37 篇 中文
  • 4 篇 日文
  • 3 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=RA Computer Technology Institute and Department of Computer Engineering and Informatics"
4102 条 记 录,以下是11-20 订阅
An intrusion detection system using ranked feature bagging
收藏 引用
International Journal of Information technology (Singapore) 2024年 第2期16卷 1213-1219页
作者: Azhagiri, M. rajesh, A. Karthik, S. raja, K. Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India Department of Computer Science and Engineering Jain University Bangalore India Department of IT College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India
An Intrusion Detection System monitors the network for any malicious attacks. It is an ideal tool for protecting extensive business networks from any kind of attack. In this paper, an Intrusion Detection System using ... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
Energy-Aware Heterogeneous Federated Learning via Approximate DNN Accelerators
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年 第6期44卷 2054-2066页
作者: Pfeiffer, Kilian Balaskas, Konstantinos Siozios, Kostas Henkel, Jorg Karlsruhe Institute of Technology Chair for Embedded Systems Karlsruhe76131 Germany University of Patras Department of Computer Engineering and Informatics Patras26504 Greece Aristotle University of Thessaloniki Department of Physics Thessaloniki54124 Greece
In Federated Learning (FL), devices that participate in the training usually have heterogeneous resources, i.e., energy availability. In current deployments of FL, devices that do not fulfill certain hardware requirem... 详细信息
来源: 评论
A fusion of machine learning and cryptography for fast data encryption through the encoding of high and moderate plaintext information blocks
收藏 引用
Multimedia Tools and Applications 2025年 第8期84卷 5349-5375页
作者: Shafique, Arslan Mehmood, Abid Alawida, Moatsum Elhadef, Mourad Rehman, Mujeeb Ur School of Biomedical Engineering University of Glasgow Glasgow United Kingdom Department of Computer Sciences Abu Dhabi University Abu Dhabi United Arab Emirates Cyber Technology Institute School of Computer Science and Informatics De Montfort University Leicester United Kingdom
Within the domain of image encryption, an intrinsic trade-off emerges between computational complexity and the integrity of data transmission security. Protecting digital images often requires extensive mathematical o... 详细信息
来源: 评论
Supremal and Robust Control Against Actuator Jamming Attacks in Cyber-Physical Systems
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第9期9卷 5435-5447页
作者: Duo, Wenli Wang, Shouguang Zhou, MengChu You, Dan Winiewski, Remigiusz Bazydlo, Grzegorz Albeshri, Aiiad Macau University of Science and Technology Institute of Systems Engineering 999078 China Zhejiang Gongshang University School of Information and Electronic Engineering Hangzhou310018 China New Jersey Institute of Technology Helen and John C. Hartmann Department of Electrical and Computer Engineering NewarkNJ07102 United States University of Zielona Góra Institute of Control and Computation Engineering Zielona Góra65-516 Poland King Abdulaziz University Department of Computer Science Jeddah21481 Saudi Arabia
Cyber-physical systems, such as unmanned aerial vehicles and connected and autonomous vehicles, are vulnerable to cyber attacks, which can cause significant damage to society. This paper examines the attack issue in c... 详细信息
来源: 评论
A novel medical image data protection scheme for smart healthcare system
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第4期9卷 821-836页
作者: Mujeeb Ur Rehman Arslan Shafique Muhammad Shahbaz Khan Maha Driss Wadii Boulila Yazeed Yasin Ghadi Suresh Babu Changalasetty Majed Alhaisoni Jawad Ahmad School of Computer Science and Informatics Cyber Technology InstituteDe Montfort UniversityLeicesterUK Department of Biomedical Engineering University of GlasgowGlasgowUK School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghUK Robotics and Internet‐of‐Things Laboratory Prince Sultan UniversityRiyadhSaudi Arabia Department of Computer Science Al Ain UniversityAl AinUnited Arab Emirates Department of Computer Engineering College of Computer Science King Khalid UniversityAbhaSaudi Arabia Computer Sciences Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia
The Internet of Multimedia Things(IoMT)refers to a network of interconnected multimedia devices that communicate with each other over the ***,smart healthcare has emerged as a significant application of the IoMT,parti... 详细信息
来源: 评论
Insights into research on blockchain for smart contracts: a bibliometric analysis
收藏 引用
Multimedia Tools and Applications 2024年 1-25页
作者: Singh, Renu Gupta, Ashlesha Mittal, Poonam Faculty of Informatics and Computing J.C. Bose University of Science and Technology YMCA Faridabad India Department of Computer Science & amp Engineering Indraprastha Institute of Information Technology IIIT New Delhi India
Over the past few years, blockchain technology has gained significant attention. This surge in popularity can be attributed to the emergence of cryptocurrencies and the development of smart contracts. Cryptocurrency i... 详细信息
来源: 评论
A Terramechanics-based Dynamic Model for Motion Control of Unmanned Tracked Vehicles
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-14页
作者: Zhang, Ruizeng Zhou, Wei Liu, Haiou Gong, Jianwei Chen, Huiyan Khajepour, Amir School of Mechanical Engineering Beijing Institute of Technology Beijing China School of Computer Science and Informatics Cardiff University Cardiff U.K Department of Mechanical and Mechatronics Engineering University of Waterloo Waterloo Canada
Existing terramechanics-based dynamic models for tracked vehicles (TRVs) are widely used in dynamics analysis. However, these models are incompatible with model-based controller design due to their high complexity and... 详细信息
来源: 评论
Guest Editorial: Introduction to Heterogeneous Robotic Systems in 5G and Beyond Networks
收藏 引用
IEEE Wireless Communications 2023年 第2期30卷 64-65页
作者: Lu, Huimin Ho, Pin-Han Khalfi, Bassem Verikoukis, Christos Kyushu Institute of Technology Japan Department of Electrical and Computer Engineering The University of Waterloo Canada Oregon State University CorvallisOR United States University of Patras Department of Computer Engineering & Informatics Greece
Remote intelligence in the application of robotics and the autonomous system relies heavily on seamless wireless connections. The 5G mobile network technology meets traditional manufacturing enterprises' applicati... 详细信息
来源: 评论
Implementing a Robust and Scalable Detect-and-Avoid Algorithm for UAV Navigation in ROS  15
Implementing a Robust and Scalable Detect-and-Avoid Algorith...
收藏 引用
15th International Conference on Information, Intelligence, Systems and Applications, IISA 2024
作者: Meimetis, Dimitrios Daramouskas, Ioannis Lappas, Vaios Perikos, Isidoros Kapoulas, Vaggelis Paraskevas, Michael Nkua Department of Aerospace Science & Technology Athens Greece Computer Technology Institute and Press 'Diophantus' Patras Greece UoP Applied Mechanics Lab Patras Greece UoP Computer Engineering and Informatics Department Patras Greece Computer Technology Institute and Press 'Diophantus' University of Peloponnese Electrical and Computer Engineering Dept. Patras Greece
Unmanned aerial vehicles (UAVs) have garnered significant attention from the research community during the last decade, due to their diverse capabilities and potential applications. One of the most critical functions ... 详细信息
来源: 评论