咨询与建议

限定检索结果

文献类型

  • 82,927 篇 会议
  • 46,701 篇 期刊文献
  • 879 册 图书
  • 5 篇 科技报告
  • 1 篇 专利

馆藏范围

  • 130,513 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 78,718 篇 工学
    • 53,386 篇 计算机科学与技术...
    • 43,272 篇 软件工程
    • 17,859 篇 信息与通信工程
    • 13,101 篇 控制科学与工程
    • 9,090 篇 电气工程
    • 8,572 篇 生物工程
    • 8,273 篇 电子科学与技术(可...
    • 6,446 篇 生物医学工程(可授...
    • 6,201 篇 机械工程
    • 5,561 篇 光学工程
    • 4,626 篇 化学工程与技术
    • 4,258 篇 仪器科学与技术
    • 3,985 篇 动力工程及工程热...
    • 3,325 篇 网络空间安全
    • 3,263 篇 材料科学与工程(可...
    • 3,010 篇 安全科学与工程
    • 2,877 篇 交通运输工程
  • 45,464 篇 理学
    • 22,495 篇 数学
    • 13,985 篇 物理学
    • 10,036 篇 生物学
    • 6,910 篇 统计学(可授理学、...
    • 4,896 篇 系统科学
    • 4,888 篇 化学
  • 22,254 篇 管理学
    • 14,003 篇 管理科学与工程(可...
    • 9,203 篇 图书情报与档案管...
    • 5,893 篇 工商管理
  • 6,811 篇 医学
    • 5,578 篇 临床医学
    • 4,868 篇 基础医学(可授医学...
    • 2,901 篇 药学(可授医学、理...
  • 3,597 篇 法学
    • 2,902 篇 社会学
  • 2,359 篇 经济学
  • 2,086 篇 农学
  • 1,553 篇 教育学
  • 555 篇 文学
  • 366 篇 军事学
  • 254 篇 艺术学
  • 32 篇 哲学
  • 22 篇 历史学

主题

  • 3,450 篇 accuracy
  • 3,352 篇 feature extracti...
  • 3,249 篇 computer science
  • 3,182 篇 deep learning
  • 3,136 篇 educational inst...
  • 2,649 篇 computational mo...
  • 2,606 篇 training
  • 2,549 篇 machine learning
  • 1,798 篇 support vector m...
  • 1,763 篇 predictive model...
  • 1,759 篇 internet of thin...
  • 1,732 篇 data mining
  • 1,700 篇 optimization
  • 1,653 篇 convolutional ne...
  • 1,637 篇 real-time system...
  • 1,472 篇 data models
  • 1,435 篇 artificial intel...
  • 1,365 篇 neural networks
  • 1,326 篇 semantics
  • 1,229 篇 security

机构

  • 2,539 篇 college of compu...
  • 2,454 篇 college of compu...
  • 1,150 篇 college of compu...
  • 1,050 篇 college of compu...
  • 1,014 篇 department of ph...
  • 997 篇 cavendish labora...
  • 948 篇 oliver lodge lab...
  • 944 篇 physikalisches i...
  • 846 篇 university of ch...
  • 614 篇 infn sezione di ...
  • 595 篇 infn sezione di ...
  • 577 篇 infn laboratori ...
  • 550 篇 department of ph...
  • 541 篇 fakultät physik ...
  • 540 篇 imperial college...
  • 537 篇 infn sezione di ...
  • 536 篇 horia hulubei na...
  • 532 篇 school of physic...
  • 531 篇 school of physic...
  • 515 篇 h.h. wills physi...

作者

  • 253 篇 barter w.
  • 244 篇 a. gomes
  • 237 篇 j. wang
  • 229 篇 c. alexa
  • 229 篇 j. m. izen
  • 229 篇 blake t.
  • 226 篇 beiter a.
  • 226 篇 s. chen
  • 225 篇 bellee v.
  • 222 篇 g. bella
  • 222 篇 j. strandberg
  • 221 篇 d. calvet
  • 221 篇 c. amelung
  • 221 篇 bowcock t.j.v.
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 219 篇 borsato m.
  • 218 篇 bencivenni g.
  • 217 篇 brundu d.
  • 216 篇 boettcher t.

语言

  • 120,453 篇 英文
  • 7,668 篇 其他
  • 2,350 篇 中文
  • 129 篇 日文
  • 16 篇 斯洛文尼亚文
  • 14 篇 德文
  • 14 篇 法文
  • 5 篇 俄文
  • 3 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 葡萄牙文
检索条件"机构=Technology Systems College of Technology and Computer Science"
130513 条 记 录,以下是4781-4790 订阅
排序:
A Digital Evidences Preservation Framework for a Logic Based Smart Contract
收藏 引用
Informatica (Slovenia) 2023年 第8期47卷 141-152页
作者: Wala’a, Al-Omari Sabri, Khair Eddin Obeid, Nadim Department of Cyber Security College of Computer Sciences and Informatics Amman Arab University Amman Jordan Department of Computer Information Systems King Abdullah II School for Information Technology The University of Jordan Amman Jordan
Recently, smart contracts were introduced as a necessity to automatically execute specific operations within blockchain systems. The popularity and diversity of blockchain systems attracted intensive attentions from a... 详细信息
来源: 评论
WD: A Sliding Window based Time Series compression algorithm  5
WD: A Sliding Window based Time Series compression algorithm
收藏 引用
5th International Conference on Machine Learning, Big Data and Business Intelligence, MLBDBI 2023
作者: Meng, Jingwen Liu, Liang Liu, Yulei Wang, Ning Nanjing University of Aeronautics and Astronautics Nuaa College of Computer Science and Technology Nanjing China
The fast generation speed and large volume of time series data make the efficient storage and transmission of time series challenging. In addition, time series is also characterized by instability, however, many advan... 详细信息
来源: 评论
An Effective Hybrid Model for Skin Cancer Detection Using Transfer Learning  16
An Effective Hybrid Model for Skin Cancer Detection Using Tr...
收藏 引用
16th International Conference on Developments in esystems Engineering, DeSE 2023
作者: Mohammed, Hussam J. Nafea, Ahmed Adil Almulla, Hussein K. Aliesawi, Salah A. S. Al-Ani, Mohammed M University of Anbar College of Computer Science and Information Technology Dept. Artificail Inteligence Ramadi Iraq University of Anbar Computer Center Ramadi Iraq University of Anbar College of Computer Science and Information Technology Dept. Computer Science Ramadi Iraq Selangor Bangi Malaysia
Skin cancer is considered one of the most fatal illnesses in the human population. Within the current healthcare system, the procedure of identifying skin cancer is time-consuming and poses a potential risk to human l... 详细信息
来源: 评论
Intrusion Detection in WSN with Optimal Trained Hybrid Model: Introduction to Self-Improved Beluga Whale Optimization  4
Intrusion Detection in WSN with Optimal Trained Hybrid Model...
收藏 引用
4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Chandan, Madhavarapu Santhi, S.G. Rao, T. Srinivasa Annamalai University Faculty of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Annamalainagar India Faculty of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Annamalainagar608002 India Gudlavalleru Engineering College Department of Computer Science and Engineering Andhra Pradesh Gudlavalleru India
WSN security is a current area of research for many scientists. One of the best security tools for defending the network from malicious assaults or the unauthenticated access is IDS. In this article, we suggest an opt... 详细信息
来源: 评论
Modeling and Analysis of Risk Propagation and Loss Causing Capacity for Key Nodes in Cyber-Physical Coupled Power Network
收藏 引用
Complex System Modeling and Simulation 2024年 第2期4卷 124-136页
作者: Dongqi Liu Qiong Zhang Haolan Liang Tao Zhan Rui Wang National Key Laboratory of Disaster Prevention and Reduction for Power Grid Changsha University of Science and TechnologyChangsha 410114China the School of Electrical and Information Engineering Changsha University of Science and TechnologyChangsha 410114China the College of Electrical and Information Engineering Hunan Institute of EngineeringXiangtan 411104China the School of Systems Engineering National University of Defense TechnologyChangsha 410003China
The modern power system has evolved into a cyber-physical system with deep coupling of physical and information domains,which brings new security *** at the problem that the“information-physical”cross-domain attacks... 详细信息
来源: 评论
RT-PPS: Real-time privacy-preserving scheme for cloud-hosted IoT data
收藏 引用
Journal of High Speed Networks 2025年 第1期31卷 71-89页
作者: Elhoseny, Mohamed Riad, Khaled College of Computing and Informatics University of Sharjah Sharjah27272 United Arab Emirates Faculty of Computers and Information Mansoura University Mansoura35516 Egypt Computer Science Department College of Computer Sciences & Information Technology King Faisal University Al-Ahsa 31982 Saudi Arabia Mathematics Department Faculty of Science Zagazig University Zagazig44519 Egypt
The Internet of Things (IoT) is a rapidly growing network of devices that can communicate with each other and with cloud-based services. These devices generate vast amounts of data that can be used to provide valuable... 详细信息
来源: 评论
A Comprehensive Evaluation Method for KG-Augmented Large Language Models  8th
A Comprehensive Evaluation Method for KG-Augmented Large La...
收藏 引用
8th EAI International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2024
作者: Chen, Xingyu Dong, Ligang Han, Meng College of Information and Electronic Engineering Zhejiang Gongshang University Hangzhou310018 China College of Computer Science and Technology Zhejiang University Hangzhou310058 China
Integrating factual information from knowledge graphs (KGs) into large language models (LLMs) has emerged as a promising approach to mitigate hallucination issues inherent in LLMs. This augmentation not only addresses... 详细信息
来源: 评论
Research on Metamaterial technology for Microwave Wireless Power Transfer
Research on Metamaterial Technology for Microwave Wireless P...
收藏 引用
2024 International Symposium on Antennas and Propagation, ISAP 2024
作者: Yamamoto, Tsunayuki Kobashi, Takeo Maruyama, Tamami Department of Integrated Science and Technology National Institute of Technology Tsuyama College Tsuyama-shi Japan Advanced Electronics and Information System Engineering Course National Institute of Technology Tsuyama College Tsuyama-shi Japan Department of Production Systems Engineering Institute of Technology Hakodate College Hakodate-shi Japan
In this paper, two technologies of metamaterial for microwave wireless power transfer are shown. One is a zeroth-order resonance for a microwave snow melting system, and another one is a focusing reflector for realizi... 详细信息
来源: 评论
Blockchain Based Enhanced ERP Transaction Integrity Architecture and PoET Consensus
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 1089-1109页
作者: Tehreem Aslam Ayesha Maqbool Maham Akhtar Alina Mirza Muhammad Anees Khan Wazir Zada Khan Shadab Alam Department of Computer Engineering National University of Sciences and TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of Sciences and TechnologyIslamabad44000Pakistan Department of Management Studies Bahria Business SchoolIslamabad44000Pakistan Department of Computer Science Capital University of Science and TechnologyIslamabad44000Pakistan Department of Computer Science College of Computer Science and ITJazan UniversityJazan67714Saudi Arabia
Enterprise Resource Planning(ERP)software is extensively used for the management of business *** offers a system of integrated applications with a shared central *** all business-critical information in a central plac... 详细信息
来源: 评论
Privacy Preservation in IoT Devices by Detecting Obfuscated Malware Using Wide Residual Network
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2395-2436页
作者: Deema Alsekait Mohammed Zakariah Syed Umar Amin Zafar Iqbal Khan Jehad Saad Alqurni Applied College Department of Computer Science and Information TechnologyPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia College of Computer and Information Sciences King Saud UniversityRiyadh11362Saudi Arabia College of Computer and Information Sciences Prince Sultan UniversityRiyadh11586Saudi Arabia Department of Educational Technologies College of EducationImam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia
The widespread adoption of Internet of Things(IoT)devices has resulted in notable progress in different fields,improving operational effectiveness while also raising concerns about privacy due to their vulnerability t... 详细信息
来源: 评论