咨询与建议

限定检索结果

文献类型

  • 21,784 篇 会议
  • 19,485 篇 期刊文献
  • 514 册 图书

馆藏范围

  • 41,783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,349 篇 工学
    • 13,978 篇 计算机科学与技术...
    • 11,026 篇 软件工程
    • 5,231 篇 信息与通信工程
    • 4,162 篇 电子科学与技术(可...
    • 4,126 篇 电气工程
    • 3,379 篇 控制科学与工程
    • 3,025 篇 光学工程
    • 2,837 篇 生物工程
    • 2,584 篇 生物医学工程(可授...
    • 2,014 篇 化学工程与技术
    • 1,851 篇 材料科学与工程(可...
    • 1,639 篇 仪器科学与技术
    • 1,512 篇 机械工程
    • 1,352 篇 动力工程及工程热...
    • 874 篇 网络空间安全
    • 808 篇 力学(可授工学、理...
  • 17,421 篇 理学
    • 8,259 篇 物理学
    • 6,483 篇 数学
    • 3,518 篇 生物学
    • 2,451 篇 化学
    • 2,217 篇 统计学(可授理学、...
    • 1,294 篇 系统科学
  • 5,490 篇 管理学
    • 3,479 篇 管理科学与工程(可...
    • 2,122 篇 图书情报与档案管...
    • 1,691 篇 工商管理
  • 2,947 篇 医学
    • 2,376 篇 临床医学
    • 1,975 篇 基础医学(可授医学...
    • 1,209 篇 药学(可授医学、理...
    • 1,113 篇 公共卫生与预防医...
  • 1,017 篇 法学
    • 863 篇 社会学
  • 666 篇 经济学
  • 643 篇 农学
  • 403 篇 教育学
  • 174 篇 文学
  • 80 篇 军事学
  • 52 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 982 篇 accuracy
  • 981 篇 deep learning
  • 842 篇 machine learning
  • 819 篇 computer science
  • 611 篇 computational mo...
  • 603 篇 feature extracti...
  • 549 篇 training
  • 542 篇 artificial intel...
  • 535 篇 internet of thin...
  • 451 篇 real-time system...
  • 406 篇 support vector m...
  • 361 篇 predictive model...
  • 361 篇 convolutional ne...
  • 338 篇 optimization
  • 287 篇 reliability
  • 268 篇 scalability
  • 255 篇 data models
  • 232 篇 computer archite...
  • 228 篇 neural networks
  • 226 篇 reinforcement le...

机构

  • 1,105 篇 cavendish labora...
  • 1,027 篇 department of ph...
  • 979 篇 oliver lodge lab...
  • 979 篇 physikalisches i...
  • 702 篇 university of ch...
  • 660 篇 infn laboratori ...
  • 624 篇 infn sezione di ...
  • 604 篇 infn sezione di ...
  • 596 篇 fakultät physik ...
  • 593 篇 infn sezione di ...
  • 553 篇 school of physic...
  • 553 篇 department of ph...
  • 544 篇 horia hulubei na...
  • 533 篇 school of physic...
  • 524 篇 school of physic...
  • 523 篇 iccub universita...
  • 523 篇 imperial college...
  • 517 篇 h.h. wills physi...
  • 516 篇 nikhef national ...
  • 513 篇 stfc rutherford ...

作者

  • 265 篇 barter w.
  • 254 篇 a. gomes
  • 244 篇 c. alexa
  • 242 篇 j. m. izen
  • 241 篇 beiter a.
  • 234 篇 bellee v.
  • 231 篇 c. amelung
  • 231 篇 s. chen
  • 230 篇 g. bella
  • 230 篇 j. strandberg
  • 230 篇 j. wang
  • 229 篇 d. calvet
  • 229 篇 brundu d.
  • 227 篇 blake t.
  • 226 篇 g. spigo
  • 226 篇 bowcock t.j.v.
  • 222 篇 f. siegert
  • 221 篇 amato s.
  • 219 篇 boettcher t.
  • 217 篇 betancourt c.

语言

  • 39,636 篇 英文
  • 1,803 篇 其他
  • 345 篇 中文
  • 20 篇 日文
  • 9 篇 德文
  • 9 篇 法文
  • 5 篇 朝鲜文
  • 3 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Applied Computing Research Institute Department Of Computer Science and Computer Engineering"
41783 条 记 录,以下是91-100 订阅
排序:
Infield disease detection in citrus plants: integrating semantic segmentation and dynamic deep learning object detection model for enhanced agricultural yield
收藏 引用
Neural computing and Applications 2024年 第35期36卷 22485-22510页
作者: Rani, N. Shobha Krishna, Arun Sri Sunag, M. Sangamesha, M.A. Pushpa, B.R. University Bengaluru India Department of Computer Science School of Computing Amrita Vishwa Vidyapeetham Mysuru India Department of Chemistry The National Institute of Engineering Mysuru India
Simultaneous and dynamic detection of diseases from infield images of citrus plants is the primary objective of this investigation. Refraining from discarding the disease-related issues would reduce agricultural yield... 详细信息
来源: 评论
A new design of parity-preserving reversible multipliers based on multiple-control toffoli synthesis targeting emerging quantum circuits
收藏 引用
Frontiers of computer science 2024年 第6期18卷 229-244页
作者: Mojtaba NOORALLAHZADEH Mohammad MOSLEH Kamalika DATTA Department of Computer Engineering Dezful BranchIslamic Azad UniversityDezfulIran German Research Centre for Artificial Intelligence(DFKI) Bremen 28359Germany Institute of Computer Science University of BremenBremen 28359Germany
With the recent demonstration of quantum computers,interests in the field of reversible logic synthesis and optimization have taken a different *** every quantum operation is inherently reversible,there is an immense ... 详细信息
来源: 评论
3-Multi ranked encryption with enhanced security in cloud computing
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 313-326页
作者: YeEun Kim Junggab Son Reza M.Parizi Gautam Srivastava Heekuck Oh Major in Bio Artificial Intelligence Dept.of Computer Science and EngineeringHanyang UniversityAnsanRepublic of Korea Department of Computer Science Kennesaw State UniversityMariettaUSA Department of Software Engineering Kennesaw State UniversityMariettaUSA Department of Mathematics and Computer Science Brandon UniversityBrandonCanada Research Center for Interneural Computing China Medical UniversityTaichungTaiwanChina Dept.of Computer Science and Engineering Hanyang UniversityAnsanRepublic of Korea
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple... 详细信息
来源: 评论
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 31-63页
作者: Sunil Kumar Dilip Kumar Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You Department of Computer Science and Engineering National Institute of Technology JamshedpurJamshedpurIndia School of Computing Science and Engineering VIT University BhopalBhopal466114India Center for Industrial Software The Maersk Mc-Kinney Moller InstituteUniversity of Southern DenmarkSonderborgOdenseDenmark Department of Applied Mathematics and Computer Science Technical University of DenmarkLyngby2800Denmark Department of Information Security Cryptologyand MathematicsKookmin UniversitySeoulSouth Korea
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ... 详细信息
来源: 评论
CNN-LSTM: A Novel Hybrid Deep Neural Network Model for Brain Tumor Classification
收藏 引用
Intelligent Automation & Soft computing 2023年 第7期37卷 1129-1143页
作者: R.D.Dhaniya K.M.Umamaheswari Department of Computer Science and Engineering SRM Institute of Science and TechnologyKattankulathur603202India Department of Computing technologies SRM Institute of Science and TechnologyKattankulathur603202India
Current revelations in medical imaging have seen a slew of computer-aided diagnostic(CAD)tools for radiologists *** tumor classification is essential for radiologists to fully support and better interpret magnetic res... 详细信息
来源: 评论
Resolution-aware beam scanning for joint detection and communication in ISAC systems
收藏 引用
science China(Information sciences) 2025年 第5期68卷 250-266页
作者: Yiming XU Dongfang XU Zhanyuan XIE Zheng JIANG Shenghui SONG Derrick Wing Kwan NG Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology China Telecom Research Institute School of Electrical Engineering and Telecommunications University of New South Wales
Beam scanning for joint detection and communication in integrated sensing and communication(ISAC) systems plays a critical role in continuous monitoring and rapid adaptation to dynamic environments. However, the desig... 详细信息
来源: 评论
Beamforming and Reflection Design for Short Packet ISAC With Non-Ideal RIS: An A3C-Based Approach
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8379-8384页
作者: Mahmoudi, Behrad Khonsari, Ahmad Zeinali, Farshad Mili, Mohammad Robat Mashhadi, Mahdi Boloursaz Xiao, Pei University of Tehran Department of Electrical and Computer Engineering Tehran Iran University of Tehran School of Electrical and Computer Engineering College of Engineering Tehran Iran School of Computer Science in the Institute for Research in Fundamental Sciences Tehran Iran United Kingdom Institute for Advanced Innovative Solutions Tehran Iran
Integrated sensing and communication (ISAC) is a promising solution to mitigate the increasing congestion of the wireless spectrum. In this paper, we investigate the short packet communication regime within an ISAC sy... 详细信息
来源: 评论
Zero Trust Networks: Evolution and Application from Concept to Practice
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1593-1613页
作者: Yongjun Ren Zhiming Wang Pradip Kumar Sharma Fayez Alqahtani Amr Tolba Jin Wang School of Computer Science School of Cyber Science and EngineeringEngineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science and TechnologyNanjing210044China Department of Computing Science University of AberdeenAberdeenAB243FXUK Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Sanya Institute of Hunan University of Science and Technology Sanya572024China
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address... 详细信息
来源: 评论
Collaborative Search With Knowledge Sharing And Summarization  4
Collaborative Search With Knowledge Sharing And Summarizatio...
收藏 引用
4th International Conference on Sustainable Expert Systems, ICSES 2024
作者: Mohan, Venkateshwaran Sivaganesan, D. Balasubramaniam, S. Vikhas, S.G. Dhinesh, S.P. Psg Institute of Technology and Applied Research Department of Computer Science and Engineering Coimbatore India Dr Mahalingam College of Engineering and Technology Department of Computer Science and Engineering Pollachi India Psg College of Technology Department of Computer Science and Engineering Coimbatore India Sri Krishna Arts and Science College Department of Computer Science Coimbatore India
A collaborative search engine is used for a group of users who want to search information together for various group activities. This will be time saving as the users can split the work between them. Summarization is ... 详细信息
来源: 评论
An intrusion detection system using ranked feature bagging
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第2期16卷 1213-1219页
作者: Azhagiri, M. Rajesh, A. Karthik, S. Raja, K. Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India Department of Computer Science and Engineering Jain University Bangalore India Department of IT College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India
An Intrusion Detection System monitors the network for any malicious attacks. It is an ideal tool for protecting extensive business networks from any kind of attack. In this paper, an Intrusion Detection System using ... 详细信息
来源: 评论