咨询与建议

限定检索结果

文献类型

  • 5,706 篇 会议
  • 3,631 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,449 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,151 篇 工学
    • 4,817 篇 计算机科学与技术...
    • 3,978 篇 软件工程
    • 1,355 篇 信息与通信工程
    • 752 篇 控制科学与工程
    • 692 篇 生物工程
    • 571 篇 电气工程
    • 420 篇 机械工程
    • 410 篇 电子科学与技术(可...
    • 385 篇 生物医学工程(可授...
    • 350 篇 光学工程
    • 235 篇 动力工程及工程热...
    • 213 篇 安全科学与工程
    • 213 篇 网络空间安全
    • 210 篇 化学工程与技术
    • 208 篇 仪器科学与技术
    • 177 篇 交通运输工程
  • 2,810 篇 理学
    • 1,571 篇 数学
    • 759 篇 生物学
    • 621 篇 物理学
    • 467 篇 统计学(可授理学、...
    • 308 篇 系统科学
    • 228 篇 化学
  • 1,917 篇 管理学
    • 1,185 篇 管理科学与工程(可...
    • 811 篇 图书情报与档案管...
    • 513 篇 工商管理
  • 399 篇 医学
    • 335 篇 临床医学
    • 300 篇 基础医学(可授医学...
    • 187 篇 公共卫生与预防医...
  • 326 篇 法学
    • 247 篇 社会学
  • 201 篇 经济学
    • 199 篇 应用经济学
  • 175 篇 教育学
  • 91 篇 农学
  • 38 篇 文学
  • 38 篇 军事学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 242 篇 software enginee...
  • 205 篇 deep learning
  • 203 篇 feature extracti...
  • 190 篇 computational mo...
  • 188 篇 machine learning
  • 165 篇 data mining
  • 151 篇 semantics
  • 143 篇 training
  • 137 篇 cloud computing
  • 136 篇 accuracy
  • 132 篇 software
  • 128 篇 internet of thin...
  • 124 篇 optimization
  • 122 篇 authentication
  • 119 篇 predictive model...
  • 108 篇 artificial intel...
  • 106 篇 security
  • 102 篇 servers
  • 101 篇 neural networks

机构

  • 305 篇 college of compu...
  • 272 篇 school of inform...
  • 267 篇 school of comput...
  • 144 篇 school of comput...
  • 114 篇 state key labora...
  • 89 篇 school of softwa...
  • 88 篇 school of inform...
  • 55 篇 school of comput...
  • 50 篇 shandong provinc...
  • 46 篇 school of softwa...
  • 44 篇 shandong provinc...
  • 43 篇 college of compu...
  • 42 篇 college of infor...
  • 41 篇 sri lanka instit...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 university of el...
  • 37 篇 department of so...
  • 36 篇 school of big da...

作者

  • 52 篇 shen linlin
  • 37 篇 xu xiaolong
  • 35 篇 sun xingming
  • 34 篇 qi lianyong
  • 34 篇 ismail leila
  • 31 篇 tao dacheng
  • 30 篇 mu yi
  • 29 篇 mohammad s. obai...
  • 28 篇 huang min
  • 26 篇 qi liu
  • 26 篇 susilo willy
  • 24 篇 shen jian
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 23 篇 zhang zhao
  • 22 篇 liu yang
  • 22 篇 fan guisheng
  • 20 篇 lu dianjie
  • 20 篇 wang wei
  • 19 篇 zhi-hui wang

语言

  • 8,096 篇 英文
  • 1,223 篇 其他
  • 156 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9449 条 记 录,以下是531-540 订阅
排序:
Securing Multi-Tenant Cloud Environments with Fully Homomorphically Encrypted Secure Multiparty Computation
Securing Multi-Tenant Cloud Environments with Fully Homomorp...
收藏 引用
2024 IEEE International Conference on Recent Advances in science and engineering Technology, ICRASET 2024
作者: Ponmalar, A. Pandiarajan, Rajkumar Sudha, I. Ramesh, P.S. Jagannathan, J. R.M.K. Engineering College Tamilnadu Chennai India School of Computing Kalasalingam Academy Of Research and Education Department of Information and Technology Krishnankoil Virudhunagar India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India
The aim of this work is to examine the application of FHE-SMPC as a viable security model for protecting the tenant isolation in multi-tenant cloud model. In multi-tenant environments, where various customers use the ... 详细信息
来源: 评论
Optimizing User Data Privacy and Confidentiality in Cloud Storage Systems Through Advanced Obfuscrypt Encryption Methods for Enhanced Security and Efficient Data Protection
Optimizing User Data Privacy and Confidentiality in Cloud St...
收藏 引用
2024 IEEE International Conference on Recent Advances in science and engineering Technology, ICRASET 2024
作者: Ramesh, P.S. Sudha, I. Jagannathan, J. Pandiarajan, Rajkumar Ponmalar, A. Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India Kalasalingam Academy Of Research and Education School of Computing Department of Information and Technology Krishnankoil Virudhunagar India R.M.K. Engineering College Tamilnadu Chennai India
With a steady increase in the adoption of cloud storage systems, the client's data are at risk of being leaked. There are several methods of encrypting data which are quite useful but they lack some of the feature... 详细信息
来源: 评论
Machine Learning in Higher Education using RF and SVM for Pedagogical Enhancement  3
Machine Learning in Higher Education using RF and SVM for Pe...
收藏 引用
3rd International Conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Kunwar, Fateh Bahadur Srivastava, Satyajee Dhivya, R. Gulati, Monika Anand, Taruna Raj, D. Antony Arul Geetanjali Institute of Technical Studies Department of Computer Science and Engineering Udaipur India School of Engineering and Technology Manav Rachna International Institute of Research and Studies Department of Computer Science and Engineering Faridabad India M.Kumarasamy College of Engineering Department of Information Technology Karur India Ambala India University Department of Humanities and Social Sciences Dehradun India Psg College of Arts & Science Department of Software Systems Coimbatore India
AI's revolutionary potential in higher education is examined in this proposal, including how it could revolutionize teaching, learning, administration, and research. Adaptive learning platforms, intelligent tutori... 详细信息
来源: 评论
A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 22301-22309页
作者: Mahmood, Khalid Ghaffar, Zahid Farooq, Muhammad Yahya, Khalid Das, Ashok Kumar Chaudhry, Shehzad Ashraf National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan National Yunlin University Of Science And Technology Graduate School Of Engineering Science And Technology Douliu64002 Taiwan Abu Dhabi University Department Of Mathematics And Statistics College Of Arts And Sciences Abu Dhabi United Arab Emirates Istanbul Gelisim University Department Of Electrical And Electronics Engineering Istanbul34310 Turkey Sabratah University Department Of Electrical Engineering Faculty Of Engineering Regdalen Libya Center For Security Theory And Algorithmic Research Hyderabad500 032 India Abu Dhabi University Department Of Computer Science And Information Technology College Of Engineering Abu Dhabi United Arab Emirates Nisantasi University Faculty Of Engineering And Architecture Department Of Software Engineering Istanbul34398 Turkey
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling them to participate in a connected network. In IoD infrastructure, drones communicate not only among themselves but also with... 详细信息
来源: 评论
Reseed Skipping of Linear Congruential Generator for Multi-level Image Steganography Security of Financial Data
收藏 引用
SN computer science 2023年 第2期4卷 124页
作者: Danso, Juliana Mantebea Missah, Yaw Marfo Gyamfi, Enoch Opanin Dankwa, Stephen Kwabena, Sarpong Department of Computer Science Kwame Nkrumah University of Science and Technology (KNUST) Kumasi Ghana School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Department of Cyber Security and Computer Engineering Technology School of Computing and Information Sciences C.K. Tedam University of Technology and Applied Sciences Upper East Region Navrongo Ghana School of Automation Engineering University of Electronic Science and Technology of China Chengdu China
This paper proposed a multi-level image steganography model that integrates with image and plaintext encryption schemes. The model starts by partitioning the cover-image pixel positions into two regions of respective ... 详细信息
来源: 评论
Audio2AB:Audio-driven collaborative generation of virtual character animation
收藏 引用
虚拟现实与智能硬件(中英文) 2024年 第1期6卷 56-70页
作者: Lichao NIU Wenjun XIE Dong WANG Zhongrui CAO Xiaoping LIU School of Computer Science and Information Engineering Hefei University of TechnologyHeifei 230009China School of Software Hefei University of TechnologyHeifei 230009China Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei University of TechnologyHefei 230601China
Background Considerable research has been conducted in the areas of audio-driven virtual character gestures and facial animation with some degree of ***,few methods exist for generating full-body animations,and the po... 详细信息
来源: 评论
Research on Entity Recognition Method for Quality Standards of Concrete Prefabricated Components  1
Research on Entity Recognition Method for Quality Standards ...
收藏 引用
1st International Conference on Intelligent Manufacturing and Cloud Computing, ICIMCC 2024
作者: Zhang, Tingshu Tu, Ming Wang, Gefan Chen, Bingyong Zhao, Yishi Shang, Jianga School of Computer Science China University of Geosciences Wuhang China Intelligent Construction System Research Institute China Construction Third Engineering Buerau Group Co.L Wuhang China Engineering Research Center of Natural Resource Information Management and Digital Twin Engineering Software Ministry of Education School of Computer Science China University of Geosciences Wuhang China
In recent years, the country has released a large number of standard documents related to prefabricated concrete components. Due to the dispersion and complexity of these standards, it is difficult for industry manage... 详细信息
来源: 评论
computer-Aided Potato Disease Detection by Using Deep Learning Techniques
Computer-Aided Potato Disease Detection by Using Deep Learni...
收藏 引用
International Conference on Green Energy, Computing, and Intelligent Technology, GEn-CITy 2023
作者: Razaq, Fareeha Bilal, Muhammad Ramzan, Muhammad Naveed, Muhammad Razzaq, Samreen Department of Computer Science University of Sargodha Sargodha Pakistan Department of Computing and Information Systems School of Engineering and Technology Sunway University Petaling Jaya Malaysia Department of Software Engineering University of Sargodha Sargodha Pakistan School of Electronics and Computer Science University of Southampton Malaysia Iskandar Puteri Malaysia
Potato is the most widely grown and consumed food throughout the world. There are a number of potato crop diseases that affect production, and these diseases differ in symptoms, circumstances, and controls. Early dete... 详细信息
来源: 评论
Enhancing Healthcare Data Security in Cloud Computing Systems through Advanced Homomorphic Encryption Techniques Integrated with Cuckoo Search Optimization Algorithm
Enhancing Healthcare Data Security in Cloud Computing System...
收藏 引用
2024 IEEE International Conference on Recent Advances in science and engineering Technology, ICRASET 2024
作者: Sudha, I. Ramesh, P.S. Ponmalar, A. Jagannathan, J. Pandiarajan, Rajkumar Saveetha Institute of Medical and Technical Sciences Simats University Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Tamilnadu Chennai India R.M.K. Engineering College Tamilnadu Chennai India Vellore Institute of Technology School of Computer Science Engineering and Information Systems Department of Software and Systems Engineering Katpadi Vellore India Kalasalingam Academy of Research and Education School of Computing Department of Information and Technology Krishnankoil Virudhunagar India
The studies in this research are focused on the mix of homomorphic encryption mechanisms and the Cuckoo Search Optimization Algorithm to promote the security of the healthcare data in the cloud computing system. I hav... 详细信息
来源: 评论
Bridging Machine Learning and Formal Concept Analysis for Effective Crowd Detection  25
Bridging Machine Learning and Formal Concept Analysis for Ef...
收藏 引用
25th International Arab Conference on information Technology, ACIT 2024
作者: Al-Oraiqat, Anas M. Drieiev, Oleksandr Samara, Ghassan Almatarneh, Sattam Al-Oraiqat, Karim A. Alrawashdeh, Hazim Drieieva, Hanna Elrashidi, Ali Hasan, Yassin M. Y. Zarqa University Faculty of Information Technology Department of Computer Science Jordan Central Ukrainian National Technical University Department of Cybersecurity and Software Kropyvnytskyi Ukraine Zarqa University Faculty of Information Technology Department of Data Science and Artificial Intelligence Jordan Zarqa University Faculty of Information Technology Department of Software Engineering Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Assiut University Electrical Engineering Department Egypt
Crowd detection and prevention systems have become essential for managing densely populated areas. Modern systems leverage the combined power of machine learning, data mining, and image processing to extract and analy... 详细信息
来源: 评论