咨询与建议

限定检索结果

文献类型

  • 66,967 篇 会议
  • 42,897 篇 期刊文献
  • 1,075 册 图书

馆藏范围

  • 110,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 67,317 篇 工学
    • 42,670 篇 计算机科学与技术...
    • 34,635 篇 软件工程
    • 16,003 篇 信息与通信工程
    • 11,338 篇 控制科学与工程
    • 9,675 篇 电气工程
    • 9,195 篇 电子科学与技术(可...
    • 8,111 篇 生物工程
    • 6,719 篇 生物医学工程(可授...
    • 5,980 篇 光学工程
    • 4,861 篇 机械工程
    • 4,402 篇 化学工程与技术
    • 3,995 篇 动力工程及工程热...
    • 3,838 篇 仪器科学与技术
    • 3,606 篇 材料科学与工程(可...
    • 2,721 篇 网络空间安全
    • 2,652 篇 安全科学与工程
  • 40,534 篇 理学
    • 19,172 篇 数学
    • 13,661 篇 物理学
    • 9,404 篇 生物学
    • 6,473 篇 统计学(可授理学、...
    • 4,849 篇 化学
    • 4,390 篇 系统科学
  • 17,087 篇 管理学
    • 11,022 篇 管理科学与工程(可...
    • 6,582 篇 图书情报与档案管...
    • 5,175 篇 工商管理
  • 7,087 篇 医学
    • 5,703 篇 临床医学
    • 5,007 篇 基础医学(可授医学...
    • 3,000 篇 药学(可授医学、理...
    • 2,958 篇 公共卫生与预防医...
  • 3,203 篇 法学
    • 2,714 篇 社会学
  • 2,027 篇 经济学
  • 1,542 篇 农学
  • 1,179 篇 教育学
  • 562 篇 文学
  • 235 篇 军事学
  • 136 篇 艺术学
  • 19 篇 哲学
  • 16 篇 历史学

主题

  • 3,023 篇 accuracy
  • 2,744 篇 computer science
  • 2,627 篇 deep learning
  • 2,257 篇 machine learning
  • 2,075 篇 feature extracti...
  • 2,074 篇 computational mo...
  • 1,927 篇 training
  • 1,434 篇 optimization
  • 1,387 篇 predictive model...
  • 1,372 篇 internet of thin...
  • 1,333 篇 real-time system...
  • 1,308 篇 support vector m...
  • 1,287 篇 artificial intel...
  • 1,264 篇 convolutional ne...
  • 1,032 篇 neural networks
  • 1,005 篇 data models
  • 963 篇 data mining
  • 879 篇 wireless sensor ...
  • 857 篇 image segmentati...
  • 807 篇 security

机构

  • 1,098 篇 cavendish labora...
  • 1,027 篇 department of ph...
  • 979 篇 physikalisches i...
  • 968 篇 oliver lodge lab...
  • 703 篇 university of ch...
  • 580 篇 fakultät physik ...
  • 552 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 537 篇 department of ph...
  • 535 篇 school of physic...
  • 528 篇 imperial college...
  • 517 篇 h.h. wills physi...
  • 514 篇 nikhef national ...
  • 513 篇 stfc rutherford ...
  • 501 篇 school of physic...
  • 500 篇 physik-institut ...
  • 489 篇 department of el...
  • 489 篇 henryk niewodnic...
  • 482 篇 center for high ...
  • 479 篇 van swinderen in...

作者

  • 268 篇 a. gomes
  • 257 篇 barter w.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 243 篇 c. amelung
  • 242 篇 g. bella
  • 242 篇 j. strandberg
  • 242 篇 d. calvet
  • 237 篇 beiter a.
  • 235 篇 s. chen
  • 231 篇 blake t.
  • 225 篇 bellee v.
  • 225 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 218 篇 boettcher t.
  • 217 篇 g. spigo
  • 217 篇 brundu d.
  • 217 篇 borsato m.
  • 214 篇 bencivenni g.

语言

  • 101,840 篇 英文
  • 7,627 篇 其他
  • 1,325 篇 中文
  • 201 篇 日文
  • 20 篇 德文
  • 14 篇 法文
  • 13 篇 朝鲜文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 2 篇 俄文
检索条件"机构=School of Computer Science and System Engineering Department"
110939 条 记 录,以下是591-600 订阅
排序:
A Novel Access Point Deployment Framework for mmWave Cell-Free Massive MIMO Networks
收藏 引用
IEEE Transactions on Wireless Communications 2025年 第6期24卷 4581-4597页
作者: Topal, Ozan Alp Demir, Ozlem Tugfe Bjornson, Emil Cavdar, Cicek School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm Sweden Department of Electrical and Electronics Engineering TOBB University of Economics and Technology Ankara Turkey
Millimeter-wave network deployment is an essential and ongoing problem due to the limited coverage and expensive network infrastructure. In this work, we solve a joint network deployment and resource allocation optimi... 详细信息
来源: 评论
Blockchain-Enabled Mitigation Strategies for Distributed Denial of Service Attacks in IoT Sensor Networks:An Experimental Approach
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 3679-3705页
作者: Kithmini Godewatte Arachchige Mohsin Murtaza Chi-Tsun Cheng Bader M.Albahlal Cheng-Chi Lee Department of Engineering Technologies School of ScienceComputing and Engineering TechnologiesSwinburne UniversityMelbourne3122Australia School of Engineering Science Technology Engineering and Mathematics CollegeRMIT UniversityMelbourneVIC 3001Australia Department of Information Technology College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia Department of Library and Information Science Fu Jen Catholic UniversityNew Taipei City24205TaiwanChina Department of Computer Science and Information Engineering Asia UniversityTaichung City41354TaiwanChina
Information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data commu... 详细信息
来源: 评论
A comprehensive survey of visible infrared person re-identification from an application perspective
收藏 引用
Multimedia Tools and Applications 2024年 第42期83卷 90243-90270页
作者: Chang, Hua Xu, Xin Liu, Wei Lu, Lingyi Li, Weigang School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology Wuhan430065 China School of Information Science and Engineering Wuhan University of Science and Technology Wuhan China
Person re-identification (ReID) is a significant issue in computer vision, aiming to match the same pedestrian across various cameras. Recent research on this issue has successfully reached a satisfactory performance ... 详细信息
来源: 评论
An In-Depth Review of Machine Learning, Blockchain, and Deep Learning Models for Intelligent Security and Resilience Enhancement in Smart Cities
An In-Depth Review of Machine Learning, Blockchain, and Deep...
收藏 引用
2024 International Conference on Artificial Intelligence and Quantum Computation-Based Sensor Applications, ICAIQSA 2024
作者: Lanjewar, Umesh Khekare, Ganesh Wahi, Amitabh Bhagwant University Department of Computer Science & Engineering Ajmer India School of Computer Science & Engineering Vellore Institute of Technology Vellore India
A smart city is a fast-moving terrain that requires efficient and smart security mechanisms with resilience for solving the intricate challenges of modern urbanism. The current paper presents the critical review of ma... 详细信息
来源: 评论
Mitigating Cross-Site Request Forgery Vulnerabilities: An Examination of Prevention systems  18
Mitigating Cross-Site Request Forgery Vulnerabilities: An Ex...
收藏 引用
18th IEEE International Conference on Advanced Networks and Telecommunications systems, ANTS 2024
作者: Singh, Yuvraj Goel, Paranjay Aggarwal, Shubhani Chaudhary, Rajat Budhiraja, Ishan Amity University Amity School of Engineering & Technology Department of Computer Science & Engineering Punjab India Bennett University School of Computer Science Engineering and Technology Greater Noida India
Cross-Site Request Forgery (CSRF) remains a pervasive vulnerability in web applications, appearing regularly in the OWASP Top 10 lists, posing significant threats to user data and system integrity despite the existenc... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
science China(Information sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
An ensemble deep learning model for cyber threat hunting in industrial internet of things
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 101-110页
作者: Abbas Yazdinejad Mostafa Kazemi Reza M.Parizi Ali Dehghantanha Hadis Karimipour Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Electrical Engineering Faculty of EngineeringShahed UniversityTehranIran College of Computing and Software Engineering Kennesaw State UniversityGAUSA School of Engineering University of GuelphOntarioCanada
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the... 详细信息
来源: 评论
Python-Based Free and Open-Source Web Framework Implements Data Privacy in Cloud Computing  4th
Python-Based Free and Open-Source Web Framework Implements D...
收藏 引用
4th International Conference on IoT Based Control Networks and Intelligent systems, ICICNIS 2023
作者: Veeresh, V. Parvathy, L. Rama Department of Computer Science and Engineering Saveetha School of Engineering Tamil Nadu Chennai India
Data sharing turn into a remarkably striking service delivered by cloud computing architecture due to its suitability and reduced cost. As a probable practice for understanding finely secured distribution of data, usi... 详细信息
来源: 评论
Decentralized Energy Using IoT and Cloud Computing for Enhancing Grid Resilience Through Microgrid Integration  6
Decentralized Energy Using IoT and Cloud Computing for Enhan...
收藏 引用
6th International Conference on Energy, Power and Environment, ICEPE 2024
作者: Solainayagi, P. Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India
Climate change, cyberattacks, and renewable energy integration threaten the contemporary electrical system. This paper proposes integrating decentralized energy production, the Internet of Things (IoT), microgrids, an... 详细信息
来源: 评论
FSE2R:An Improved Collision-Avoidance-based Energy Efficient Route Selection Protocolin USN
收藏 引用
computer systems science & engineering 2023年 第3期44卷 2225-2242页
作者: Prasant Ku.Dash Lopamudra Hota Madhumita Panda N.Z.Jhanjhi Kshira Sagar Sahoo Mehedi Masud Department of Computer Science and Engineering Sambalpur UniversityOdisha768019India Department of Computer Science and Engineering NITRourkelaOdisha769008India Department of Computer Science G.M UniversitySambalpurOdisha768001India School of Computer Science and Engineering SCETaylor’s UniversitySubang Jaya47500Malaysia Department of Computer Science and Engineering SRM UniversityAmaravatiAndhra Pradesh522502India Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia
The 3D Underwater Sensor Network(USNs)has become the most optimistic medium for tracking and monitoring underwater *** and collision are two most critical factors in USNs for both sparse and dense *** to harsh ocean e... 详细信息
来源: 评论