咨询与建议

限定检索结果

文献类型

  • 95,505 篇 会议
  • 56,006 篇 期刊文献
  • 1,465 册 图书
  • 2 篇 科技报告

馆藏范围

  • 152,976 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 90,628 篇 工学
    • 54,986 篇 计算机科学与技术...
    • 44,493 篇 软件工程
    • 21,776 篇 信息与通信工程
    • 15,262 篇 控制科学与工程
    • 14,239 篇 电气工程
    • 14,035 篇 电子科学与技术(可...
    • 10,825 篇 生物工程
    • 9,546 篇 生物医学工程(可授...
    • 8,536 篇 光学工程
    • 6,569 篇 机械工程
    • 5,780 篇 化学工程与技术
    • 5,521 篇 动力工程及工程热...
    • 5,506 篇 仪器科学与技术
    • 4,853 篇 材料科学与工程(可...
    • 3,393 篇 安全科学与工程
    • 3,248 篇 交通运输工程
  • 55,848 篇 理学
    • 26,086 篇 数学
    • 20,316 篇 物理学
    • 12,548 篇 生物学
    • 8,845 篇 统计学(可授理学、...
    • 6,510 篇 化学
    • 6,359 篇 系统科学
  • 21,729 篇 管理学
    • 13,936 篇 管理科学与工程(可...
    • 8,464 篇 图书情报与档案管...
    • 6,784 篇 工商管理
  • 9,839 篇 医学
    • 7,994 篇 临床医学
    • 6,998 篇 基础医学(可授医学...
    • 4,217 篇 药学(可授医学、理...
    • 3,780 篇 公共卫生与预防医...
  • 4,062 篇 法学
    • 3,475 篇 社会学
  • 2,726 篇 经济学
  • 1,971 篇 农学
  • 1,635 篇 教育学
  • 720 篇 文学
  • 310 篇 军事学
  • 181 篇 艺术学
  • 30 篇 哲学
  • 18 篇 历史学

主题

  • 3,663 篇 accuracy
  • 3,011 篇 deep learning
  • 2,859 篇 computational mo...
  • 2,831 篇 machine learning
  • 2,703 篇 computer science
  • 2,691 篇 feature extracti...
  • 2,506 篇 training
  • 1,935 篇 optimization
  • 1,832 篇 predictive model...
  • 1,748 篇 artificial intel...
  • 1,664 篇 internet of thin...
  • 1,628 篇 real-time system...
  • 1,600 篇 support vector m...
  • 1,419 篇 neural networks
  • 1,414 篇 convolutional ne...
  • 1,378 篇 wireless sensor ...
  • 1,300 篇 data mining
  • 1,299 篇 data models
  • 1,224 篇 educational inst...
  • 1,171 篇 computer archite...

机构

  • 1,754 篇 cavendish labora...
  • 1,104 篇 school of physic...
  • 1,047 篇 physikalisches i...
  • 1,018 篇 department for p...
  • 1,017 篇 department of el...
  • 1,006 篇 institute of phy...
  • 946 篇 department of ph...
  • 916 篇 institute of phy...
  • 892 篇 fakultät physik ...
  • 865 篇 physics departme...
  • 849 篇 department of ph...
  • 830 篇 niels bohr insti...
  • 830 篇 department of ph...
  • 822 篇 oliver lodge lab...
  • 819 篇 institute of hig...
  • 794 篇 horia hulubei na...
  • 793 篇 cern geneva
  • 782 篇 dipartimento di ...
  • 764 篇 department of ph...
  • 732 篇 west university ...

作者

  • 562 篇 bachacou h.
  • 549 篇 annovi a.
  • 519 篇 akimov a.v.
  • 506 篇 aad g.
  • 502 篇 alonso f.
  • 498 篇 alexopoulos t.
  • 497 篇 amidei d.
  • 496 篇 argyropoulos s.
  • 495 篇 anastopoulos c.
  • 495 篇 adelman j.
  • 494 篇 arnaez o.
  • 494 篇 alimonti g.
  • 492 篇 alexa c.
  • 489 篇 amelung c.
  • 488 篇 abulaiti y.
  • 486 篇 azuelos g.
  • 486 篇 arnold h.
  • 485 篇 aloisio a.
  • 482 篇 augsten k.
  • 481 篇 asai s.

语言

  • 141,735 篇 英文
  • 9,442 篇 其他
  • 1,635 篇 中文
  • 205 篇 日文
  • 32 篇 德文
  • 17 篇 法文
  • 16 篇 朝鲜文
  • 9 篇 斯洛文尼亚文
  • 7 篇 土耳其文
  • 5 篇 西班牙文
  • 5 篇 葡萄牙文
  • 4 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 意大利文
  • 1 篇 爱沙尼亚文
检索条件"机构=School of Engineering Department of Computer Engineering and Informatics"
152978 条 记 录,以下是851-860 订阅
排序:
Mitigating Cross-Site Request Forgery Vulnerabilities: An Examination of Prevention Systems  18
Mitigating Cross-Site Request Forgery Vulnerabilities: An Ex...
收藏 引用
18th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2024
作者: Singh, Yuvraj Goel, Paranjay Aggarwal, Shubhani Chaudhary, Rajat Budhiraja, Ishan Amity University Amity School of Engineering & Technology Department of Computer Science & Engineering Punjab India Bennett University School of Computer Science Engineering and Technology Greater Noida India
Cross-Site Request Forgery (CSRF) remains a pervasive vulnerability in web applications, appearing regularly in the OWASP Top 10 lists, posing significant threats to user data and system integrity despite the existenc... 详细信息
来源: 评论
Mutual Coupling Mitigation Through Parasitic Structure in a Dual-Band Millimeter-Wave Flexible MIMO Antenna  10
Mutual Coupling Mitigation Through Parasitic Structure in a ...
收藏 引用
10th International Conference on engineering and Emerging Technologies, ICEET 2024
作者: Ahmad, Jawad Hashmi, Mohammad School of Engineering and Digital Sciences Nazarbayev University Department of Electrical and Computer Engineering Astana Kazakhstan
This paper introduces a dual-band millimeter-wave flexible multi-input multi-output (MIMO) antenna for wearable applications, comprising four identical elements in a cross configuration on a flexible Rogers RT5880 sub... 详细信息
来源: 评论
Behavior Based Group Recommendation from Social Media Dataset by Using Deep Learning and Topic Modeling
收藏 引用
SN computer Science 2024年 第6期5卷 712页
作者: Mukta, Md. Saddam Hossain Ahmed, Jubaer Raiaan, Mohaimenul Azam Khan Fahad, Nur Mohammad Islam, Muhammad Nazrul Imtiaz, Nafiz Islam, Md. Adnanul Ali, Mohammed Eunus Azam, Sami LUT School of Engineering Sciences Lappeenranta-Lahti University of Technology Department of Computer Science and Engineering United International University Department of Computer Science and Engineering Military Institute of Science and Technology Department of HCC Action Lab Monash University Department of Computer Science and Engineering Bangladesh University of Engineering and Technology Faculty of Science and Technology Charles Darwin University
In this digital era, users frequently share their thoughts, preferences, and ideas through social media, which reflect their Basic Human Values. Basic Human Values (aka values) are the fundamental aspects of human beh... 详细信息
来源: 评论
Deep Learning-Powered Camouflaged Object Recognition Model  2
Deep Learning-Powered Camouflaged Object Recognition Model
收藏 引用
2nd IEEE International Conference on Integrated Circuits and Communication Systems, ICICACS 2024
作者: Tomar, Riya Chauhan, Naman Chauhan, Chhavi Tomar, Yash Singh, Soumyendra Chauhan, Nishant Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Chennai India University of Petroleum and Energy Studies School of Computer Science Dehradun India Cmr University Department of Computer Science and Engineering Bengaluru India Amrita School of Engineering Amrita Vishwa Vidyapeetham Department of Mathematics Chennai India Amity School of Engineering and Technology Amity University Department of Computer Science and Engineering Noida India
This research paper delves into the intersection of advanced technology and military strategies, specifically focusing on the imperative task of camouflaged object detection within the Indian Paramilitary forces. Leve... 详细信息
来源: 评论
A Two-Pronged Approach to Security of Discrete-Event Systems
收藏 引用
Journal of Systems Science & Complexity 2025年 第1期38卷 178-209页
作者: MATSUI Shoma RUDIE Karen CAI Kai Department of Electrical and Computer Engineering&the Ingenuity Labs Research Institute Queen's UniversityKingston K7L 3N6Canada Department of Core Informatics Osaka Metropolitan UniversityOsaka 545-0051Japan
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and ... 详细信息
来源: 评论
Towards Threat Modelling of IoT Context-Sharing Platforms  22
Towards Threat Modelling of IoT Context-Sharing Platforms
收藏 引用
22nd International Symposium on Network Computing and Applications, NCA 2024
作者: Goudarzi, Mohammad Shaghaghi, Arash Finn, Simon Stiller, Burkhard Jha, Sanjay School of Computer Science and Engineering UNSW Sydney Australia Australia Communication Systems Group Department of Informatics University of Zurich Switzerland Cisco Australia
The Internet of Things (IoT) involves complex, interconnected systems and devices that depend on context-sharing platforms for interoperability and information exchange. These platforms are, therefore, critical compon... 详细信息
来源: 评论
Use of a Genetic Algorithm to Evolve the Parameters of an Iterated Function System in Order to Create Adapted Phenotypic Structures  26th
Use of a Genetic Algorithm to Evolve the Parameters of ...
收藏 引用
26th International Conference on Applications of Evolutionary Computation, EvoApplications 2023, held as part of EvoStar 2023
作者: Akter, Habiba Young, Rupert Birch, Phil Chatwin, Chris Department of Engineering and Design School of Engineering and Informatics University of Sussex Brighton United Kingdom
This work investigates the use of Evolutionary Computation to generate fractal pattern structures representing the phenotype of an organism, using the Barnsley fern as an example. Genetic Algorithm is implemented as t... 详细信息
来源: 评论
A DL-DeNoiseNet Framework for Robust Image Denoising and Artifact Reduction in Medical Image Diagnostics  2
A DL-DeNoiseNet Framework for Robust Image Denoising and Art...
收藏 引用
2nd IEEE International Conference on Integrated Intelligence and Communication Systems, ICIICS 2024
作者: Nanthini, S. Maindola, Meenakshi Madhu, R. Ravishankar, M.D. Gandhi, Jay Patil, Harshal Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai India Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun India Department of Mechanical Engineering The National Institute of Engineering Mysore India Faculty of Engineering and Technology Parul institute of Engineering and Technology Vadodara India School of Computer Science and Engineering IILM University Greater Noida India
For precise illness diagnosis and therapy planning, medical imaging diagnostics are necessary. Nevertheless, diagnostic errors can occur due to noise and aberrations that are inherent to imaging modalities including C... 详细信息
来源: 评论
IoT Task Offloading in Edge Computing Using Non-Cooperative Game Theory for Healthcare Systems
收藏 引用
computer Modeling in engineering & Sciences 2024年 第5期139卷 1487-1503页
作者: Dinesh Mavaluru Chettupally Anil Carie Ahmed I.Alutaibi Satish Anamalamudi Bayapa Reddy Narapureddy Murali Krishna Enduri Md Ezaz Ahmed School of Computing and Informatics Saudi Electronic UniversityRiyadhSaudi Arabia Department of Computer Engineering SRM University APGunturIndia College of Computer and Information Sciences Majmaah UniversityAl Majma’ahSaudi Arabia Department of Public Health College of Applied Medical SciencesKing Khalid UniversityAbhaSaudi Arabia
In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)*** network comprises essential comp... 详细信息
来源: 评论
Learner Assessment System in e-Learning with OBE Approach: Activity Performance, Ability Level and Recommendation
HighTech and Innovation Journal
收藏 引用
HighTech and Innovation Journal 2024年 第3期5卷 572-602页
作者: Yuniarti, Wenty D. Hartati, Sri Priyanta, Sigit Surjono, Herman D. Department of Computer Science and Electronics Universitas Gadjah Mada Yogyakarta55281 Indonesia Department of Information Technology Universitas Islam Negeri Walisongo Semarang50185 Indonesia Department of Informatics Engineering Education Faculty of Engineering Universitas Islam Negeri Walisongo Yogyakarta55281 Indonesia
E-learning can lead learners to achieve learning outcomes if it is designed based on several principles. One is applying assessments that motivate and inform ability levels. In Outcome-based Education (OBE), assessmen... 详细信息
来源: 评论