咨询与建议

限定检索结果

文献类型

  • 8,203 篇 期刊文献
  • 7,688 篇 会议
  • 211 册 图书

馆藏范围

  • 16,102 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,490 篇 工学
    • 4,848 篇 计算机科学与技术...
    • 3,757 篇 软件工程
    • 1,716 篇 电子科学与技术(可...
    • 1,629 篇 电气工程
    • 1,508 篇 信息与通信工程
    • 1,218 篇 控制科学与工程
    • 1,008 篇 材料科学与工程(可...
    • 882 篇 化学工程与技术
    • 868 篇 生物工程
    • 773 篇 光学工程
    • 673 篇 生物医学工程(可授...
    • 653 篇 机械工程
    • 596 篇 仪器科学与技术
    • 566 篇 动力工程及工程热...
    • 552 篇 核科学与技术
    • 434 篇 力学(可授工学、理...
    • 349 篇 冶金工程
  • 7,912 篇 理学
    • 4,256 篇 物理学
    • 3,068 篇 数学
    • 1,076 篇 生物学
    • 1,067 篇 统计学(可授理学、...
    • 1,011 篇 化学
    • 561 篇 系统科学
    • 323 篇 地球物理学
  • 1,864 篇 管理学
    • 1,210 篇 管理科学与工程(可...
    • 704 篇 图书情报与档案管...
    • 619 篇 工商管理
  • 737 篇 医学
    • 598 篇 临床医学
    • 498 篇 基础医学(可授医学...
    • 292 篇 药学(可授医学、理...
  • 328 篇 法学
  • 256 篇 经济学
  • 191 篇 农学
  • 185 篇 教育学
  • 37 篇 文学
  • 25 篇 艺术学
  • 24 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 329 篇 deep learning
  • 321 篇 computer science
  • 254 篇 machine learning
  • 208 篇 computational mo...
  • 190 篇 accuracy
  • 171 篇 feature extracti...
  • 160 篇 optimization
  • 152 篇 internet of thin...
  • 134 篇 neural networks
  • 132 篇 data mining
  • 127 篇 predictive model...
  • 124 篇 artificial intel...
  • 123 篇 support vector m...
  • 122 篇 real-time system...
  • 121 篇 computational in...
  • 115 篇 hadrons
  • 104 篇 image segmentati...
  • 100 篇 computer archite...
  • 90 篇 educational inst...
  • 87 篇 covid-19

机构

  • 1,106 篇 cavendish labora...
  • 1,040 篇 department of ph...
  • 990 篇 oliver lodge lab...
  • 990 篇 physikalisches i...
  • 618 篇 fakultät physik ...
  • 570 篇 department of ph...
  • 569 篇 school of physic...
  • 555 篇 horia hulubei na...
  • 549 篇 iccub universita...
  • 541 篇 school of physic...
  • 535 篇 school of physic...
  • 530 篇 h.h. wills physi...
  • 528 篇 imperial college...
  • 526 篇 nikhef national ...
  • 520 篇 university of ch...
  • 520 篇 stfc rutherford ...
  • 507 篇 infn laboratori ...
  • 505 篇 physik-institut ...
  • 501 篇 school of physic...
  • 499 篇 infn sezione di ...

作者

  • 288 篇 barter w.
  • 265 篇 a. gomes
  • 262 篇 beiter a.
  • 252 篇 c. alexa
  • 252 篇 c. amelung
  • 251 篇 bellee v.
  • 250 篇 j. m. izen
  • 250 篇 g. bella
  • 250 篇 j. strandberg
  • 250 篇 d. calvet
  • 248 篇 blake t.
  • 247 篇 g. spigo
  • 246 篇 bowcock t.j.v.
  • 243 篇 f. siegert
  • 243 篇 brundu d.
  • 239 篇 s. chen
  • 233 篇 betancourt c.
  • 230 篇 y. tayalati
  • 230 篇 borsato m.
  • 227 篇 r. ströhmer

语言

  • 14,100 篇 英文
  • 1,857 篇 其他
  • 142 篇 中文
  • 8 篇 日文
  • 6 篇 德文
  • 5 篇 法文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 捷克文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science Applied Computer Technology"
16102 条 记 录,以下是1181-1190 订阅
排序:
Digitization Techniques for the Representation of Genomic Sequences in LSTM-Based Models  6th
Digitization Techniques for the Representation of Genomic Se...
收藏 引用
6th World Conference on Smart Trends in Systems, Security and Sustainability, WS4 2022
作者: Adebiyi, Marion Enwere, Miracle Nmesomachi Shekari, Abenego Adebiyi, Ayodele Osang, Francis B. Department of Computer Science College of Pure and Applied Sciences Landmark University Kwara State Omu-Aran Nigeria Ogun State Ota Nigeria Department of Computer and Information Sciences College of Science and Technology Covenant University Ogun State Ota Nigeria Landmark University SDG4: Quality Education Kwara State Omu-Aran Nigeria Department of Computer Science National Open University of Nigeria Abuja Nigeria
Deep learning (DL) is an actively growing domain of machine learning owing to the proliferation of big data in multifaceted fields of study. Widespread in literature, there are multiple reports on the implementation o... 详细信息
来源: 评论
Addressing the Rising Challenge of Malware Innovative Detection and Mitigation Techniques
Addressing the Rising Challenge of Malware Innovative Detect...
收藏 引用
2024 International Conference on Communication, computer sciences and Engineering, IC3SE 2024
作者: Balaram, A. Umashankari, E. Dutt, Amit Bharadwaj, Garima Revathi, V. Albawi, Ali Mlr Institute Of Technology Department Of Computer Science And Engineering Telangana Hyderabad India Institute Of Aeronautical Engineering Department Of Computer Science And Engineering Telangana Hyderabad India Lovely Professional University Phagwara India Amity Business School Amity University Greater Noida India New Horizon College Of Engineering Department Of Applied Sciences Bangalore India College Of Medical Technology The Islamic University Radiology Techniques Department Najaf Iraq
This research talks about Hybrid Anomaly Detection (HAD), a complex technology for finding and stopping malware. There are four different methods to apply the approach. The following are a few examples: EDR, DBA, TIS,... 详细信息
来源: 评论
Deep Broad Learning for Emotion Classification in Textual Conversations
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 481-491页
作者: Sancheng Peng Rong Zeng Hongzhan Liu Lihong Cao Guojun Wang Jianguo Xie Center for Linguistics and Applied Linguistics and Laboratory of Language Engineering and ComputingGuangdong University of Foreign StudiesGuangzhou 510006China Guangdong Provincial Key Laboratory of Nanophotonic Functional Materials and Devices South China Normal UniversityGuangzhou 510006China School of Computer Science and Cyber Engineering Guangzhou UniversityGuangzhou 510006China Modern Education Technology Center Guangdong University of Foreign StudiesGuangzhou 510006China
Emotion classification in textual conversations focuses on classifying the emotion of each utterance from textual *** is becoming one of the most important tasks for natural language processing in recent ***,it is a c... 详细信息
来源: 评论
EuropeanLawAdvisor: An open source search engine for European laws
EuropeanLawAdvisor: An open source search engine for Europea...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Russo, Raffaele Russo, Diego Orlando, Gian Marco Romano, Antonio Riccio, Giuseppe Gatta, Valerio La Postiglione, Marco Moscato, Vincenzo University of Naples Federico II Department of Electrical Engineering and Information Technology via Claudio 21 80125 Naples Italy Northwestern University Department of Computer Science McCormick School of Engineering and Applied Science 2233 Tech Dr Evanston IL 60208 United States
Legal Artificial Intelligence has emerged as an essential field, focusing on AI technologies that facilitate various legal tasks and alleviate the workload of legal professionals. Despite advancements in Legal Artific... 详细信息
来源: 评论
Leveraging Information-Centric Edge Computing in Private 5G Cellular Networks via the W3C Web of Things
Leveraging Information-Centric Edge Computing in Private 5G ...
收藏 引用
Consumer Communications and Networking Conference, CCNC IEEE
作者: Jan Romann Hugo Hakim Damer T M Rayhan Gias Olaf Bergmann Department of Electrical Engineering and Computer Science Faculty of Technology University of Applied Sciences Emden/Leer Emden Germany
In this paper, we present an architecture for the deployment of an edge computing system based on Named Data Networking (NDN) as part of a private 5G network. Our proposed architecture integrates IP-based and non-IP-b... 详细信息
来源: 评论
Use of IOT in computer Control Using Hand Gesture Using AT Mega 328 over the Cloud
Use of IOT in Computer Control Using Hand Gesture Using AT M...
收藏 引用
International Conference on ICT in Business Industry & Government (ICTBIG)
作者: Ishwarlal Rathod Kunal Rathod Neha Gupta Computer Science and Information Technology Symbiosis University of Applied Sciences Indore India Computer Science and Engineering Acropolis Institute of Technology and Research Indore India
In the realm of remote control, my preference is computer manipulation through hand gestures. Recent strides in technology showcase the feasibility of using manual gestures on Arduino platforms, facilitated by cloud c...
来源: 评论
Agent-Based Modeling and Simulation for Transmission Dynamics and Surveillance of Dengue: Conceptual and Design Model  16
Agent-Based Modeling and Simulation for Transmission Dynamic...
收藏 引用
16th IEEE AFRICON, AFRICON 2023
作者: Pascoe, Luba Nyambo, Devotha Godfrey Bradshaw, Karen Clemen, Thomas School of Computational and Communication Science and Engineering Nelson Mandela African Institution of Science and Technology Arusha Tanzania United Republic of Rhodes University Grahamstown South Africa Hamburg University of Applied Sciences Department of Computer Science Hamburg20099 Germany
African countries need to strengthen surveillance and control of arboviral diseases such as dengue due to increased outbreaks and spread of arboviruses. Climatic, socio-environment, and ecological variables influence ... 详细信息
来源: 评论
Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5607-5623页
作者: Abdallah Elhigazi Abdallah Mosab Hamdan Shukor Abd Razak Fuad A.Ghalib Muzaffar Hamzah Suleman Khan Siddiq Ahmed Babikir Ali Mutaz H.H.Khairi Sayeed Salih Faculty of Engineering Future UniversityKhartoum 10553Sudan Faculty of Computing and Informatics Universiti Malaysia SabahKota Kinabalu88400Malaysia Information Assurance and Security Research School of ComputingUniversiti Teknologi MalaysiaJohor81310Malaysia School of Psychology and Computer Science University of Central LancashirePreston PR12HEUK Deaptement of Management Information Systems College of Administrative ScienceApplied Science UniversityAl Eker623Bahrain Deaptement of Information Technology College of Computer and Information SciencesKing Saud UniversityRiyadh11461Saudi Arabia
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 *** to the data transmission nature of the wireless local area netw... 详细信息
来源: 评论
Classifying Arabian Gulf Tweets to Detect People's Trends: A case study  9
Classifying Arabian Gulf Tweets to Detect People's Trends: A...
收藏 引用
9th International Conference on Social Networks Analysis, Management and Security, SNAMS 2022
作者: Balhaf, Khaled Darwish, Omar Rawashdeh, Emad Awad, Mohammad Abu Darweesh, Dirar Tashtoush, Yahya Rawashdeh, Saif Department of Computer Science Jordan University of Science and Technology Irbid Jordan Information Security and Applied Computing Eastern Michigan University Ypsilanti United States
Recently, media and business companies are utilizing social media to reach a large set of users to maximize the amount of gained profit. Actually, these companies are looking for the best ways to satisfy their user... 详细信息
来源: 评论
Navigating Cloud Security: Developing Privacy-Aware Architectures for Service Industry Data Protection  5th
Navigating Cloud Security: Developing Privacy-Aware Architec...
收藏 引用
5th Doctoral Symposium on Computational Intelligence, DoSCI 2024
作者: Guan, Qing Goyal, S.B. Rajawat, Anand Singh Ibrahim, A.Z.M. City Graduate School City University Petaling Jaya46100 Malaysia Nanchang Normal College of Applied Technology Nanchang China Faculty of Information Technology City University Petaling Jaya46100 Malaysia School of Computer Science and Engineering Sandip University Nashik India
With the advancement of technology, the digital age is exploding, which poses significant challenges to cloud data control and privacy. How to find a middle ground between data privacy protection and technological inn... 详细信息
来源: 评论