咨询与建议

限定检索结果

文献类型

  • 1,478 篇 期刊文献
  • 1,270 篇 会议
  • 60 册 图书

馆藏范围

  • 2,808 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,633 篇 工学
    • 1,157 篇 计算机科学与技术...
    • 926 篇 软件工程
    • 349 篇 信息与通信工程
    • 324 篇 控制科学与工程
    • 215 篇 电气工程
    • 187 篇 电子科学与技术(可...
    • 186 篇 生物工程
    • 155 篇 机械工程
    • 154 篇 生物医学工程(可授...
    • 114 篇 光学工程
    • 92 篇 仪器科学与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 网络空间安全
    • 66 篇 化学工程与技术
    • 63 篇 交通运输工程
  • 1,016 篇 理学
    • 442 篇 物理学
    • 380 篇 数学
    • 231 篇 生物学
    • 114 篇 统计学(可授理学、...
    • 98 篇 系统科学
    • 76 篇 化学
  • 507 篇 管理学
    • 344 篇 管理科学与工程(可...
    • 179 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 215 篇 医学
    • 175 篇 临床医学
    • 132 篇 基础医学(可授医学...
    • 79 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 69 篇 法学
    • 57 篇 社会学
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 51 篇 农学
  • 37 篇 教育学
  • 12 篇 艺术学
  • 10 篇 文学
  • 4 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 114 篇 deep learning
  • 83 篇 machine learning
  • 65 篇 artificial intel...
  • 47 篇 proton-proton in...
  • 47 篇 information tech...
  • 45 篇 feature extracti...
  • 43 篇 internet of thin...
  • 40 篇 optimization
  • 39 篇 accuracy
  • 36 篇 computational mo...
  • 35 篇 computer science
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 35 篇 training
  • 33 篇 testing
  • 31 篇 predictive model...
  • 29 篇 covid-19
  • 29 篇 collisions (nucl...
  • 29 篇 nuclear counters
  • 28 篇 convolutional ne...

机构

  • 166 篇 faculty of scien...
  • 166 篇 departamento de ...
  • 166 篇 department for p...
  • 166 篇 department of ph...
  • 164 篇 department of ph...
  • 161 篇 faculté des scie...
  • 161 篇 yerevan physics ...
  • 158 篇 kirchhoff-instit...
  • 157 篇 department of ph...
  • 157 篇 department of ph...
  • 156 篇 department of ph...
  • 154 篇 institute of phy...
  • 152 篇 institute of phy...
  • 150 篇 fakultät für phy...
  • 150 篇 physikalisches i...
  • 147 篇 national scienti...
  • 147 篇 dsm/irfu cea sac...
  • 147 篇 instituto de fís...
  • 146 篇 physics departme...
  • 143 篇 institut für ast...

作者

  • 162 篇 c. alexa
  • 162 篇 j. m. izen
  • 162 篇 k. bos
  • 162 篇 g. bella
  • 162 篇 j. strandberg
  • 162 篇 d. calvet
  • 162 篇 c. amelung
  • 162 篇 h. a. gordon
  • 162 篇 g. spigo
  • 162 篇 e. hines
  • 162 篇 a. c. könig
  • 161 篇 f. siegert
  • 160 篇 m. klein
  • 159 篇 r. ströhmer
  • 158 篇 h. sakamoto
  • 158 篇 s. nektarijevic
  • 158 篇 m. rijssenbeek
  • 158 篇 f. marroquim
  • 158 篇 s. jin
  • 158 篇 g. gaudio

语言

  • 2,658 篇 英文
  • 136 篇 其他
  • 9 篇 日文
  • 9 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Section Computer Engineering Faculty of Information Technology and Systems"
2808 条 记 录,以下是2291-2300 订阅
排序:
Cryptographic security models for eHealth P2P database management systems network
Cryptographic security models for eHealth P2P database manag...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Sk. Md. Mizanur Rahman Md. Mehedi Masud Carlisle Adams Khalil El-Khatib Hussein T. Mouftah Eiji Okamoto School of Information Technology and Engineering University of Ottawa Ottawa ONT Canada Computer Science Department Taif University Taif Makkah Saudi Arabia Faculty of Business and Information Technology UOIT Oshawa ONT Canada Graduate School of Systems and Information Engineering University of Tsukuba Tsukuba Japan
In an eHealth peer-to-peer database management system(P2PDBMS), peers exchange data in a pair-wise fashion on-the-fly in response to a query without any centralized control. Generally, the communication link between t... 详细信息
来源: 评论
Prediction of software project effort using fuzzy logic
Prediction of software project effort using fuzzy logic
收藏 引用
International Conference on Electronic computer technology
作者: Mohd. Sadiq Farhana Mariyam Aleem Alil Shadab Khan Pradeep Tripathi Computer Engineering Laboratory Section of Computer Engineering University Polytechnic Faculty of Engineering and Technology Jamia Millia Islamia (A Central University) New Delhi India Department of Computer Science and Engineering AL-Falah School of Engineering and Technology Maharshi Dayanand University Rohtak Haryana India Department of Computer Science and Information Technology Sunder Deep College of Engineering and Technology U.P. Technical University Lucknow U.P. India
Software development effort estimation is a branch of forecasting that has received increased interest in academia as well as in the field of research and development. Predicting software effort with any acceptable de... 详细信息
来源: 评论
Analytic Hierarchy Process (AHP) Approach for Selecting Mobile Service Category (Consumers' Preferences)
Analytic Hierarchy Process (AHP) Approach for Selecting Mobi...
收藏 引用
International Conference on Mobile Business (ICMB)
作者: Shahrokh Nikou Jozsef Mezei Harry Bouwman Institute of Advanced Management Systems Research Department of Information Technologies Åbo Akademi University Turku Centre of Computer Science (TUCS) Turku Finland Institute of Advanced Management Systems Research (IAMSR) Åbo Akademi University Turku Finland Faculty of Technology Policy and Management Section of Information and Communication Technology Delft University of Technology Delft Netherlands
There is an essential quest in the literature to open up the "black-box" of characteristics of the new information technology innovation by identifying the users' preferences on mobile service and servic... 详细信息
来源: 评论
Using Automated Control Charts for the Runtime Evaluation of QoS Attributes
Using Automated Control Charts for the Runtime Evaluation of...
收藏 引用
IEEE International Symposim on High Assurance systems engineering
作者: Ayman Amin Alan Colman Lars Grunske Centre for Computing & Engineering Software Systems Faculty of Information and Communication Technologies Swinburne University of Technology Hawthorn VIC Australia Department of Computer Science Software Engineering: AG AQUA University of Kaiserslautern Kaiserslautern Germany
As modern software systems operate in a highly dynamic context, they have to adapt their behaviour in response to changes in their operational environment or/and requirements. Triggering adaptation depends on detectin... 详细信息
来源: 评论
A distributed intrusion detection scheme for wireless sensor networks
A distributed intrusion detection scheme for wireless sensor...
收藏 引用
IEEE International Conference on Electro-information technology
作者: S. I. Eludiora O. O. Abiona A. O. Oluwatope S. A. Bello M. L. Sanni D. O. Ayanda C. E. Onime E. R. Adagunodo L. O. Kehinde Department of Computer Science & Engineering Obafemi Awolowo University Ile Ife Nigeria Department of Computer Information Systems Indiana University Northwest Garry IN USA Information and Communication Technology Section Abdus Salam International Centre for Theoretical Physics Trieste Italy Department of Engineering Technologies Texas Southern University Houston TX USA
The task of Intrusion Detection systems (IDS) in Wireless Sensors Networks (WSNs) is to monitor sensor network systems; detecting possible intrusions in the WSNs environment, alerting users after intrusions had been d... 详细信息
来源: 评论
Compressed sensing MRI by two-dimensional wavelet filter banks
Compressed sensing MRI by two-dimensional wavelet filter ban...
收藏 引用
International Workshop on Multidimensional (nD) systems
作者: Zangen Zhu Ran Yang Jingxin Zhang Cishen Zhang School of Information Science and Technology Sun Yat-Sen University Guangzhou China Department of Computer Systems and Electrical Engineering Monash University Clayton VIC Australia Faculty of Engineering and Industrial Sciences Swinburne University of Technology Hawthorn VIC Australia
How to speed up the scanning process is the bottleneck problem of magnetic resonance imaging (MRI). As a newly developed mathematical framework of signal sampling and recovery, compressed sensing (CS) provides a solut... 详细信息
来源: 评论
PrIvacy Risks And Countermeasures In Publishing And Mining Social Network Data
PrIvacy Risks And Countermeasures In Publishing And Mining S...
收藏 引用
International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
作者: Chiemi Watanabe Toshiyuki Amagasa Ling Liu Department of Information Science Faculty of Science Ochanomizu University Bunkyo Tokyo Japan Graduate School of Systems and Information Engineering University of Tsukuba Tsukuba Ibaraki Japan School of Computer Science Georgia Institute of Technology Atlanta GA USA
As interests in sharing and mining social network data continue to grow, we see a growing demand for privacy preserving social network data publishing. In this paper, we discuss privacy risks in publishing social netw...
来源: 评论
A real-time analysis of granular information: Some initial thoughts on a convex hull-based fuzzy regression approach
A real-time analysis of granular information: Some initial t...
收藏 引用
IEEE International Conference on Fuzzy systems (FUZZ-IEEE)
作者: Azizul Azhar Ramli Witold Pedrycz Junzo Watada Nureize Arbaiy Graduate School of Information Production and Systems Waseda University Kitakyushu Japan Systems Research Institute Polish Academy of Sciences Warsaw Poland Department of Electrical and Computer Engineering University of Alberta Edmonton AB Canada Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Johor Darul Takzim Malaysia
Regression models are well known and widely used as one of the important categories of models in system modeling. In this paper, we extend the concept of fuzzy regression in order to handle real-time implementation of... 详细信息
来源: 评论
Promoting Harmonization of BME Education in Europe: The CRH-BME Tempus Project
Promoting Harmonization of BME Education in Europe: The CRH-...
收藏 引用
Annual International Conference of the IEEE engineering in Medicine and Biology Society
作者: Nicolas Pallikarakis Zhivko Bliznakov Damijan Miklavcic Tomaz Jarm Ratko Magjarevic Igor Lackovic Leandro Pecchia Rita Stagni Akos Jobaggy Joseph Barbenel University of Patras School of Health Sciences Department of Medical Physics Biomedical Technology Unit Institute of Biomedical Technology University of Ljubljana Faculty of Electrical Engineering University of Zagreb Faculty of Electrical Engineering and Computing University of Naples - Federico II Department of Biomedical Electronic and Telecommunication Engineering University of Bologna Department of Electronics Computer Science and Systems Budapest University of Technology and Economics Department of Measurement and Information Systems University of Strathclyde
Biomedical Engineers should be prepared to adapt to existing or forecasted needs. There is a strong pressure on education, training and life long learning programs to continuously adapt their objectives in order to fa... 详细信息
来源: 评论
Detecting resource consumption attack over MANET using an artificial immune algorithm
收藏 引用
Research Journal of Applied Sciences, engineering and technology 2011年 第9期3卷 1026-1033页
作者: Abdelhaq, Maha Hassan, Rosilah Ismail, Mahamod Israf, Daud School of Computer Science Faculty of Information Science and Technology University Kebangsaan Malaysia 43600 UKM Bangi Selangor Darul Ehsan Malaysia Department of Electrical Electronics and Systems Engineering Faculty of Engineering Universiti Kebangsaan Malaysia 43600 UKM Bangi Selangor Malaysia Department of Biomedical Sciences Faculty of Medicine and Healthy Sciences UPM 43400 Serdang Selangor Malaysia
The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based syst... 详细信息
来源: 评论