咨询与建议

限定检索结果

文献类型

  • 22,180 篇 会议
  • 19,607 篇 期刊文献
  • 518 册 图书

馆藏范围

  • 42,305 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,745 篇 工学
    • 14,242 篇 计算机科学与技术...
    • 11,160 篇 软件工程
    • 5,306 篇 信息与通信工程
    • 4,230 篇 电子科学与技术(可...
    • 4,162 篇 电气工程
    • 3,468 篇 控制科学与工程
    • 3,055 篇 光学工程
    • 2,863 篇 生物工程
    • 2,621 篇 生物医学工程(可授...
    • 2,041 篇 化学工程与技术
    • 1,870 篇 材料科学与工程(可...
    • 1,663 篇 仪器科学与技术
    • 1,519 篇 机械工程
    • 1,368 篇 动力工程及工程热...
    • 898 篇 网络空间安全
    • 815 篇 安全科学与工程
  • 17,601 篇 理学
    • 8,345 篇 物理学
    • 6,546 篇 数学
    • 3,551 篇 生物学
    • 2,479 篇 化学
    • 2,238 篇 统计学(可授理学、...
    • 1,300 篇 系统科学
  • 5,550 篇 管理学
    • 3,497 篇 管理科学与工程(可...
    • 2,168 篇 图书情报与档案管...
    • 1,708 篇 工商管理
  • 2,986 篇 医学
    • 2,402 篇 临床医学
    • 1,994 篇 基础医学(可授医学...
    • 1,212 篇 药学(可授医学、理...
    • 1,133 篇 公共卫生与预防医...
  • 1,030 篇 法学
    • 870 篇 社会学
  • 668 篇 经济学
  • 660 篇 农学
  • 411 篇 教育学
  • 172 篇 文学
  • 82 篇 军事学
  • 54 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 1,036 篇 accuracy
  • 1,014 篇 deep learning
  • 852 篇 machine learning
  • 822 篇 computer science
  • 624 篇 feature extracti...
  • 620 篇 computational mo...
  • 568 篇 artificial intel...
  • 567 篇 training
  • 561 篇 internet of thin...
  • 489 篇 real-time system...
  • 420 篇 support vector m...
  • 378 篇 predictive model...
  • 373 篇 convolutional ne...
  • 352 篇 optimization
  • 298 篇 reliability
  • 274 篇 scalability
  • 264 篇 data models
  • 242 篇 security
  • 234 篇 reinforcement le...
  • 227 篇 computer archite...

机构

  • 1,103 篇 cavendish labora...
  • 1,029 篇 department of ph...
  • 980 篇 physikalisches i...
  • 974 篇 oliver lodge lab...
  • 706 篇 university of ch...
  • 660 篇 infn laboratori ...
  • 620 篇 infn sezione di ...
  • 611 篇 fakultät physik ...
  • 602 篇 infn sezione di ...
  • 594 篇 infn sezione di ...
  • 557 篇 school of physic...
  • 556 篇 department of ph...
  • 541 篇 horia hulubei na...
  • 532 篇 school of physic...
  • 528 篇 iccub universita...
  • 523 篇 imperial college...
  • 523 篇 school of physic...
  • 517 篇 h.h. wills physi...
  • 512 篇 nikhef national ...
  • 511 篇 stfc rutherford ...

作者

  • 273 篇 barter w.
  • 250 篇 a. gomes
  • 243 篇 c. alexa
  • 241 篇 j. m. izen
  • 238 篇 beiter a.
  • 237 篇 bellee v.
  • 235 篇 blake t.
  • 234 篇 brundu d.
  • 232 篇 c. amelung
  • 230 篇 g. bella
  • 230 篇 j. strandberg
  • 230 篇 d. calvet
  • 230 篇 j. wang
  • 228 篇 bowcock t.j.v.
  • 227 篇 g. spigo
  • 225 篇 s. chen
  • 224 篇 amato s.
  • 223 篇 f. siegert
  • 222 篇 betancourt c.
  • 222 篇 boettcher t.

语言

  • 33,922 篇 英文
  • 8,047 篇 其他
  • 395 篇 中文
  • 20 篇 日文
  • 18 篇 德文
  • 12 篇 法文
  • 5 篇 朝鲜文
  • 3 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 荷兰文
检索条件"机构=Applied Computing Research Institute Department Of Computer Science and Computer Engineering"
42305 条 记 录,以下是321-330 订阅
Generative Adversarial Networks (GANs) for Artistic Style Transfer in Images
Generative Adversarial Networks (GANs) for Artistic Style Tr...
收藏 引用
2024 International Conference on Distributed Systems, computer Networks and Cybersecurity, ICDSCNC 2024
作者: Jamalpur, Bhavana Kiruthiga, S. Ranjitha, B. Lefty Joyson, J. Jayaram, K. Soundar, K. Ruba S R University Department of Computer Science and Artificial Intelligence India School of Computing Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science & Engineering Chennai India Mohan Babu University Department of Mathematics India Jp College of Engineering Department of Computer Science and Engineering Ayikudi India College of Engineering Adoor Department of Computer Science and Engineering Pathanamthitta India Department of Computer Science and Engineering Sivakasi India
Many in computer vision and computational imaging consider Generative Adversarial Networks (GANs) a big advance. Style transfer converts semantic visual content into creative styles. Recently, GANs for style transfer ... 详细信息
来源: 评论
Machine learning approaches to detect, prevent and mitigate malicious insider threats: State-of-the-art review
收藏 引用
Multimedia Tools and Applications 2024年 1-41页
作者: Jaiswal, Ayshwarya Dwivedi, Pragya Dewang, Rupesh Kumar Computer Science and Engineering Motilal Nehru National Institute of Technology Allahabad Uttar Pradesh Prayagraj211004 India Computer Science and Engineering Education Department National Institute of Technical Teachers’ Training and Research Madhya Pradesh Bhopal462002 India
Insider threats are profoundly damaging and pose serious security challenges. These threats, perpetrated by insiders, may arise from delinquency, retaliation, or motives such as ambition for success, recognition, fina... 详细信息
来源: 评论
DDoS Attacks Detection in IoT Networks using Naive Bayes and Random Forest  3
DDoS Attacks Detection in IoT Networks using Naive Bayes and...
收藏 引用
3rd International Conference on applied Artificial Intelligence and computing, ICAAIC 2024
作者: Srivastava, Animesh Tiwari, Shweta Rawat, Bhupender Singh Dhondiyal, Shiv Ashish Graphic Era Hill University Department of Computer Science & Engineering Dehradun India Institute of Engineering Chandigarh University Department of Computer Science & Engineering Department / University Punjab Gharuan Mohali India Coer University College of Smart Computing Roorkee India Department of Computer Science & Engineering Dehradun India
The proliferation of Internet of Things (IoT) devices has resulted in numerous benefits, including streamlined tasks and improved connectivity but has also raised concerns regarding security vulnerabilities. Distribut... 详细信息
来源: 评论
Data-Filtered Prediction With Decomposition and Amplitude-Aware Permutation Entropy for Workload and Resource Utilization in Cloud Data Centers
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 19189-19201页
作者: Yuan, Haitao Hu, Qinglong Wang, Meijia Wang, Shen Bi, Jing Buyya, Rajkumar Shi, Shuyuan Yang, Jinhong Zhang, Jia Zhou, Mengchu Beihang University School of Automation Science and Electrical Engineering Beijing100191 China City University of Hong Kong Department of Computer Science Kowloon Hong Kong Beijing University of Technology School of Software Engineering Faculty of Information Technology Beijing100124 China University of Melbourne Cloud Computing and Distributed Systems Lab School of Computing and Information Systems MelbourneVIC3010 Australia Beihang University School of Integrated Circuit Science and Engineering Beijing100191 China CSSC Systems Engineering Research Institute Beijing100036 China Southern Methodist University Department of Computer Science Lyle School of Engineering DallasTX75205 United States New Jersey Institute of Technology Department of Electrical and Computer Engineering NewarkNJ07102 United States
In recent years, cloud computing has witnessed widespread applications across numerous organizations. Predicting workload and computing resource data can facilitate proactive service operation management, leading to s... 详细信息
来源: 评论
Network Intrusion Detection System Using Optuna  5
Network Intrusion Detection System Using Optuna
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Parekh, Nishank Sen, Arzob Rajasekaran, P. Jayaseeli, J. D. Dorathi Robert, P. School of Computing Department of Computer Science and Engineering SRM Institute of Science and Technology Tamil Nadu Chengalpattu India School of Computing Department of Computing Technologies SRM Institute of Science and Technology Tamil Nadu Chengalpattu India
The rapid growth of the digital industry has created a higher demand for robust Network Intrusion Detection Systems (NIDS) to protect valuable information and the integrity of network infrastructures as the digital in... 详细信息
来源: 评论
CNN-Based Deep Learning Model for Early Identification and Categorization of Melanoma Skin Cancer Using Medical Imaging
收藏 引用
SN computer science 2024年 第7期5卷 911页
作者: Pandimurugan, V. Ahmad, Sultan Prabu, A.V. Rahmani, Mohammad Khalid Imam Abdeljaber, Hikmat A. M. Eswaran, Malathi Nazeer, Jabeen Computer Science and Engineering Acharya Institute of Technology Bangalore India Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Alkharj 11942 Saudi Arabia University Center for Research and Development (UCRD) Department of Computer Science and Engineering Chandigarh University Gharuan Punjab Mohali 140413 India Department of Electronics and Communication Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram AP Guntur 522502 India College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia Department of Computer Science Faculty of Information Technology Applied Science Private University Amman Jordan MEU Research Unit Middle East University Amman 11831 Jordan Department of Computer Technology Kongu Engineering College Perundurai Tamil Nadu Erode India
In human life, skin cancer is a curse. If not appropriately diagnosed, it spreads around all body parts in the earlier stage. The melanoma skin cancer death rate is 75% all over the world. There is an urgent need for ... 详细信息
来源: 评论
Optimizing the Clinical Decision Support System (CDSS) by Using Recurrent Neural Network (RNN) Language Models for Real-Time Medical Query Processing
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 4787-4832页
作者: Israa Ibraheem Al Barazanchi Wahidah Hashim Reema Thabit Mashary Nawwaf Alrasheedy Abeer Aljohan Jongwoon Park Byoungchol Chang College of Computing and Informatics Universiti Tenaga Nasional(UNITEN)Kajang43000Malaysia College of Engineering University ofWarith Al-AnbiyaaKarbala56001Iraq Faculty of Information Science&Technology Universiti Kebangsaan MalaysiaBangi43600Malaysia Department of Computer Science Applied CollegeUniversity of HailHail55424Saudi Arabia Department of Computer Science and Informatics Taibah UniversityMedina42353Saudi Arabia Department of Computer Science Hanyang UniversitySeoul04763Republic of Korea
This research aims to enhance Clinical Decision Support Systems(CDSS)within Wireless Body Area Networks(WBANs)by leveraging advanced machine learning ***,we target the challenges of accurate diagnosis in medical imagi... 详细信息
来源: 评论
Secure Data Embedding in Digital Images: Enhancing Covert Communication with LSB-Based Techniques  3
Secure Data Embedding in Digital Images: Enhancing Covert Co...
收藏 引用
3rd International Conference on Machine Learning and Data engineering, ICMLDE 2024
作者: Babu, Tina Nair, Rekha R. Rajesh, M.T. Kishore, S. Department of Computer Science and Engineering School of Advanced Computing Alliance University Bengaluru India Department of Computer Science and Engineering Dayananda Sagar University Bengaluru India Nitte Institute of Professional Education Karnataka Mangalore India
Information security and the ability to convey secret messages have been necessities since the dawn of civilization. Various media forms, such as photos, audio files, and videos, offer a conducive environment for conc... 详细信息
来源: 评论
Leveraging EfficientNetB3 in a Deep Learning Framework for High-Accuracy MRI Tumor Classification
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 867-883页
作者: Mahesh Thyluru Ramakrishna Kuppusamy Pothanaicker Padma Selvaraj Surbhi Bhatia Khan Vinoth Kumar Venkatesan Saeed Alzahrani Mohammad Alojail Department of Computer Science&Engineering Faculty of Engineering and TechnologyJAIN(Deemed-to-be University)Bengaluru562112India School of Computer Science and Engineering VIT-AP UniversityAmaravati522241India Department of Computer Science&Technology Madanapalle Institute of Technology&ScienceMadanapalle517325India School of Science Engineering and EnvironmentUniversity of SalfordManchesterM54WTUK School of Computer Science Engineering&Information Systems(SCORE) Vellore Institute of Technology(VIT)Vellore632014India Management Information System Department College of Business AdministrationKing Saud UniversityRiyadh11531Saudi Arabia Adjunct Research Faculty Centre for Research Impact&OutcomeChitkara UniversityRajpuraPunjab140401India
Brain tumor is a global issue due to which several people suffer,and its early diagnosis can help in the treatment in a more efficient *** different types of brain tumors,including gliomas,meningiomas,pituitary tumors... 详细信息
来源: 评论
Cavity-agnostic acoustofluidic manipulations enabled by guided flexural waves on a membrane acoustic waveguide actuator
收藏 引用
Microsystems & Nanoengineering 2024年 第2期10卷 153-171页
作者: Philippe Vachon Srinivas Merugu Jaibir Sharma Amit Lal Eldwin J.Ng Yul Koh Joshua E.-Y.Lee Chengkuo Lee Department of Electrical and Computer Engineering National University of SingaporeSingaporeSingapore Institute of Microelectronics Agency for ScienceTechnology and Research(A*STAR)SingaporeSingapore SonicMEMS Laboratory School of Electrical and Computer EngineeringCornell UniversityIthacaNYUSA School of Electrical and Data Engineering University of Technology SydneyUltimoNSWAustralia
This article presents an in-depth exploration of the acoustofluidic capabilities of guided flexural waves(GFWs)generated by a membrane acoustic waveguide actuator(MAWA).By harnessing the potential of GFWs,cavity-agnos... 详细信息
来源: 评论