咨询与建议

限定检索结果

文献类型

  • 6,702 篇 会议
  • 6,533 篇 期刊文献
  • 263 册 图书

馆藏范围

  • 13,498 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,265 篇 工学
    • 5,702 篇 计算机科学与技术...
    • 4,463 篇 软件工程
    • 1,636 篇 信息与通信工程
    • 1,384 篇 控制科学与工程
    • 1,046 篇 生物工程
    • 935 篇 生物医学工程(可授...
    • 861 篇 电气工程
    • 681 篇 电子科学与技术(可...
    • 586 篇 光学工程
    • 577 篇 机械工程
    • 401 篇 仪器科学与技术
    • 351 篇 动力工程及工程热...
    • 349 篇 化学工程与技术
    • 311 篇 核科学与技术
    • 286 篇 安全科学与工程
    • 270 篇 网络空间安全
  • 4,894 篇 理学
    • 2,246 篇 数学
    • 1,545 篇 物理学
    • 1,265 篇 生物学
    • 776 篇 统计学(可授理学、...
    • 527 篇 系统科学
    • 407 篇 化学
  • 2,385 篇 管理学
    • 1,489 篇 管理科学与工程(可...
    • 982 篇 图书情报与档案管...
    • 758 篇 工商管理
  • 1,161 篇 医学
    • 970 篇 临床医学
    • 806 篇 基础医学(可授医学...
    • 464 篇 公共卫生与预防医...
    • 450 篇 药学(可授医学、理...
  • 422 篇 法学
    • 351 篇 社会学
  • 269 篇 经济学
  • 258 篇 教育学
  • 215 篇 农学
  • 47 篇 文学
  • 35 篇 艺术学
  • 25 篇 军事学
  • 16 篇 哲学
  • 10 篇 历史学

主题

  • 404 篇 deep learning
  • 333 篇 machine learning
  • 322 篇 computer science
  • 284 篇 educational inst...
  • 207 篇 internet of thin...
  • 193 篇 artificial intel...
  • 191 篇 computational mo...
  • 162 篇 feature extracti...
  • 144 篇 optimization
  • 143 篇 predictive model...
  • 142 篇 accuracy
  • 138 篇 real-time system...
  • 130 篇 support vector m...
  • 122 篇 wireless sensor ...
  • 119 篇 security
  • 116 篇 neural networks
  • 112 篇 computer archite...
  • 112 篇 data mining
  • 108 篇 semantics
  • 106 篇 covid-19

机构

  • 410 篇 department for p...
  • 407 篇 faculty of scien...
  • 398 篇 department of ph...
  • 388 篇 department of ph...
  • 388 篇 kirchhoff-instit...
  • 384 篇 department of ph...
  • 348 篇 fakultät für phy...
  • 334 篇 institute of phy...
  • 310 篇 institute of phy...
  • 309 篇 department of ph...
  • 280 篇 instituto de fís...
  • 279 篇 department of ph...
  • 271 篇 department of ph...
  • 270 篇 universidade fed...
  • 266 篇 graduate school ...
  • 261 篇 ictp trieste
  • 254 篇 yerevan physics ...
  • 253 篇 department of ph...
  • 250 篇 nikhef national ...
  • 250 篇 department of ph...

作者

  • 338 篇 c. alexa
  • 335 篇 j. m. izen
  • 333 篇 g. bella
  • 333 篇 d. calvet
  • 333 篇 c. amelung
  • 331 篇 j. strandberg
  • 326 篇 g. spigo
  • 325 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 318 篇 s. mohapatra
  • 301 篇 s. guindon
  • 300 篇 y. tayalati
  • 296 篇 a. kaczmarska
  • 289 篇 m. klein
  • 282 篇 j. schaarschmidt
  • 263 篇 a. d. pilkington
  • 261 篇 f. pastore

语言

  • 11,850 篇 英文
  • 1,567 篇 其他
  • 89 篇 中文
  • 10 篇 德文
  • 9 篇 日文
  • 9 篇 斯洛文尼亚文
  • 4 篇 法文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=College of Computer Science Informatics and Computer Systems Department"
13498 条 记 录,以下是4071-4080 订阅
排序:
IoT Based Smart Fish-Feeder and Monitoring System
IoT Based Smart Fish-Feeder and Monitoring System
收藏 引用
2022 International Conference on Business Analytics for Technology and Security, ICBATS 2022
作者: Abu-Khadrah, Ahmed Issa, Ghassan F. Aslam, Shaukat Shahzad, Muhammad Ateeq, Karamath Hussain, Munawar Saudi Electronic University College of Computing and Informatics Riyadh Saudi Arabia Skyline University College School of Information Technology Sharjah United Arab Emirates NCBAandE School of Computer Science Lahore Pakistan Riphah International University Department of Computing and Applied Sciences Lahore Pakistan Skyline University Bsit Faculty Sharjah United Arab Emirates
People have always enjoyed having pets around them, but in today's hectic world, it might be difficult to properly care for pets, particularly fish, which require more attention. When fish owners are out of town, ... 详细信息
来源: 评论
Deep Learning-Driven Resource Allocation for MEC-Enabled UAV Collision Avoidance System
Deep Learning-Driven Resource Allocation for MEC-Enabled UAV...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Khadidja Zairi Bouziane Brik Younes Guellouma Hadda Cherroun LIM Lab. Amar Telidji University Laghouat Algeria Computer Science Department College of Computing and Informatics Sharjah University Sharjah UAE DRIVE Laboratory EA1859 University of Burgundy 49 Rue Mademoiselle Bourgeois Nevers France
The Internet of Unmanned Aerial Vehicles (UAVs) envisions critical services like Collision detection and Avoidance among Vehicles (CAVs). These services are typically implemented at the Multi-access Edge Computing (ME... 详细信息
来源: 评论
ShieldSMS Sentinel: Guardian of Your Digital Communication Bastion
ShieldSMS Sentinel: Guardian of Your Digital Communication B...
收藏 引用
Artificial Intelligence in Education and Industry 4.0 (IDICAIEI), DMIHER International Conference on
作者: Palash Gourshettiwar Rajesh D Thakare Prapti Duddalwar Rushikesh Shete Swapnil Gundewar Prateek Verma Department of Computer Science and Medical Engineering Faculty of Engineering and Technology DMIHER(DU) Wardha Maharashtra India Department of Electronics Engineering Yashavantrao Chavan College of Engineering Nagpur Maharashtra India Department of Electronics Engineering Vishwakarma Institute of Technology Pune Maharashtra India Department of Computer Science and Business Systems St. Vincent Pallotti College of Engineering and Technology Nagpur Maharashtra India Department of Artificial Intelligence and Machine Learning Faculty of Engineering and Technology DMIHER(DU) Wardha Maharashtra India
The SMS spam detection Project provides a comprehensive framework for reliably identifying and classifying spam messages sent over SMS communication channels by fusing ML algorithms with NLP techniques. Using EDA, a d... 详细信息
来源: 评论
Deep Reinforcement Learning for Network Security Applications With A Safety Guide
Deep Reinforcement Learning for Network Security Application...
收藏 引用
IEEE International Conference on Communications in China (ICCC)
作者: Zhibo Liu Xiaozhen Lu Yuhan Chen Yilin Xiao Liang Xiao Yanling Bu College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China Department of Informatics and Communication Engineering Xiamen University Xiamen China
Most of the typical reinforcement learning algorithms help wireless devices choose the security policy such as the moving strategy and communication policy by exploring all the possible state-action pairs including th...
来源: 评论
Building Trust Management using Blockchain Technology
Building Trust Management using Blockchain Technology
收藏 引用
Sustainable Computing and Data Communication systems (ICSCDS), International Conference on
作者: R. Jayanthi S. Sundararajan Tanweer Alam Neha Garg Rupesh Roshan Singh M. Udhayamoorthi Department of Commerce Vidhya Sagar Women’s College University of Madras Chennai Tamilnadu SNS College of Technology Coimbatore-35 Tamilnadu Department of Computer Science Faculty of Computer and Information Systems Islamic University of Madinah Madinah Saudi Arabia Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India Block-14 Mittal School of Business Lovely Professional University Jalandhar-Delhi G.T. Road Phagwara Punjab INDIA
For all parties involved in a logistics system, precise data and smart business operations are essential. However, a hurdle to implementation could be posed by a lack of shared trust. Supply chains experience difficul... 详细信息
来源: 评论
A systematic study on the role of SentiWordNet in opinion mining
收藏 引用
Frontiers of computer science 2021年 第4期15卷 165-183页
作者: Mujtaba HUSNAIN Malik Muhammad Saad MISSEN Nadeem AKHTAR Mickael COUSTATY Shahzad MUMTAZ V.B.Surya PRASATH Department of IT Faculty of ComputingThe Islamia University of BahawalpurBahawalpur 63100Pakistan Laboratoire Informatique Image et Interaction(L3i)Facultés des Sciences et TechnologiesUniversity of La RochelleLa Rochelle 17000France Division of Biomedical Informatics Cincinnati Children’s Hospital Medical CenterCincinnati 45229USA Department of Pediatrics University of Cincinnati College of MedicineCincinnati 45229USA Department of Biomedical Informatics College of MedicineUniversity of CincinnatiCincinnati 45267USA Department of Electrical Engineering and Computer Science University of CincinnatiCincinnati 45221USA
Sentiment lexicons(SL)(aka lexical resources)are the repositories of one or several dictionaries that consist of known and precompiled sentiment *** lexicons play an important role in performing several different opin... 详细信息
来源: 评论
Prediction of Cervical Cancer from Behavior Risk Using Machine Learning Techniques
收藏 引用
SN computer science 2021年 第3期2卷 1-10页
作者: Akter, Laboni Ferdib-Al-Islam Islam, Md. Milon Al-Rakhami, Mabrook S. Haque, Md. Rezwanul Department of Biomedical Engineering Khulna University of Engineering & Technology Khulna 9203 Bangladesh Department of Computer Science and Engineering Khulna University of Engineering & Technology Khulna 9203 Bangladesh Research Chair of Pervasive and Mobile Computing Information Systems Department College of Computer and Information Sciences King Saud University Riyadh 11543 Saudi Arabia
Cervical cancer growth is the fourth maximum of regular diseases in females. It is one of the sicknesses which is compromising ladies' wellbeing everywhere in the world and it is difficult to notice any sign in th... 详细信息
来源: 评论
Unsupervised Single Valued Neutrosophic Sets Approach for Cloud Clustering
收藏 引用
Procedia computer science 2025年 258卷 3580-3589页
作者: Haewon Byeon Pramod Kumar Ihtiram Raza Khan Faisal Yousef Alghayadh Maher Ali Rusho Mukesh Soni Inje University Medical Big Data Research Center Gimhae 50834 Republic of Korea Associate professor Ganga Institute of Technology and Management Jhajjar - Bahadurgarh Rd Kablana Bhadana Haryana 124104 Computer science department Jamia Hamdard Delhi Computer Science and Information Systems Department College of Applied Sciences AlMaarefa University Riyadh Saudi Arabia Department of Lockheed Martin Engineering Management University of Colorado Boulder Boulder Colorado Dr. D.Y. Patil Vidyapeeth Pune Dr. D.Y. Patil School of Science & Technology Tathawade Pune
This work presents an innovative approach to integrating restricted rationality and strategic manipulation into multi-attribute decision-making in product style design, resulting in more precise and objective outcomes... 详细信息
来源: 评论
The Deep Analysis of Accuracy of Performance Level of NBC Algorithm for Diagnosing BC
The Deep Analysis of Accuracy of Performance Level of NBC Al...
收藏 引用
Advance Computing and Innovative Technologies in Engineering (ICACITE), International Conference on
作者: P. Valarmathi M Ramchander Sampathirao Suneetha P. Sasirekha Saad Khudhur Mohammed Ahmed Hussain Department of CSE Mookambigai College of Engineering Department of MCA Chaitanya Bharathi Institute of Technology Hyderabad Department of Computer Science & Systems Engineering Andhra University College of Engineering Andhra University Andhra Pradesh Department of Electrical and Electronics Engineering M.Kumarasamy College of Engineering Karur Collage of Pharmacy National University of Science and Technology Dhi Qar Iraq Al-Farahidi university Baghdad Iraq
These days, breast cancer is the foremost predominant cancer among ladies around the world and one of the driving causes of cancer-related mortality. In this ponder, an existing Observation, The study of disease trans... 详细信息
来源: 评论
HGIC: A Hand Gesture Based Interactive Control System for Efficient and Scalable Multi-UAV Operations
HGIC: A Hand Gesture Based Interactive Control System for Ef...
收藏 引用
IEEE International Workshop on Robot and Human Communication (ROMAN)
作者: Mengsha Hu Jinzhou Li Runxiang Jin Chao Shi Lei Xu Rui Liu Cognitive Robotics and AI Lab (CRAI) College of Aeronautics and Engineering Kent State University Kent OH USA Department of Computer Science Kent State University Kent OH USA College of Engineering Cornell University Ithaca NY USA Department of Systems Science and Industrial Engineering Binghamton University Binghamton NY USA
As technological advancements continue to expand the capabilities of multi unmanned-aerial-vehicle systems (mUAV), human operators face challenges in scalability and efficiency due to the complex cognitive load and op... 详细信息
来源: 评论