咨询与建议

限定检索结果

文献类型

  • 8,203 篇 期刊文献
  • 7,688 篇 会议
  • 211 册 图书

馆藏范围

  • 16,102 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,490 篇 工学
    • 4,848 篇 计算机科学与技术...
    • 3,757 篇 软件工程
    • 1,716 篇 电子科学与技术(可...
    • 1,629 篇 电气工程
    • 1,508 篇 信息与通信工程
    • 1,218 篇 控制科学与工程
    • 1,008 篇 材料科学与工程(可...
    • 882 篇 化学工程与技术
    • 868 篇 生物工程
    • 773 篇 光学工程
    • 673 篇 生物医学工程(可授...
    • 653 篇 机械工程
    • 596 篇 仪器科学与技术
    • 566 篇 动力工程及工程热...
    • 552 篇 核科学与技术
    • 434 篇 力学(可授工学、理...
    • 349 篇 冶金工程
  • 7,912 篇 理学
    • 4,256 篇 物理学
    • 3,068 篇 数学
    • 1,076 篇 生物学
    • 1,067 篇 统计学(可授理学、...
    • 1,011 篇 化学
    • 561 篇 系统科学
    • 323 篇 地球物理学
  • 1,864 篇 管理学
    • 1,210 篇 管理科学与工程(可...
    • 704 篇 图书情报与档案管...
    • 619 篇 工商管理
  • 737 篇 医学
    • 598 篇 临床医学
    • 498 篇 基础医学(可授医学...
    • 292 篇 药学(可授医学、理...
  • 328 篇 法学
  • 256 篇 经济学
  • 191 篇 农学
  • 185 篇 教育学
  • 37 篇 文学
  • 25 篇 艺术学
  • 24 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 329 篇 deep learning
  • 321 篇 computer science
  • 254 篇 machine learning
  • 208 篇 computational mo...
  • 190 篇 accuracy
  • 171 篇 feature extracti...
  • 160 篇 optimization
  • 152 篇 internet of thin...
  • 134 篇 neural networks
  • 132 篇 data mining
  • 127 篇 predictive model...
  • 124 篇 artificial intel...
  • 123 篇 support vector m...
  • 122 篇 real-time system...
  • 121 篇 computational in...
  • 115 篇 hadrons
  • 104 篇 image segmentati...
  • 100 篇 computer archite...
  • 90 篇 educational inst...
  • 87 篇 covid-19

机构

  • 1,106 篇 cavendish labora...
  • 1,040 篇 department of ph...
  • 990 篇 oliver lodge lab...
  • 990 篇 physikalisches i...
  • 618 篇 fakultät physik ...
  • 570 篇 department of ph...
  • 569 篇 school of physic...
  • 555 篇 horia hulubei na...
  • 549 篇 iccub universita...
  • 541 篇 school of physic...
  • 535 篇 school of physic...
  • 530 篇 h.h. wills physi...
  • 528 篇 imperial college...
  • 526 篇 nikhef national ...
  • 520 篇 university of ch...
  • 520 篇 stfc rutherford ...
  • 507 篇 infn laboratori ...
  • 505 篇 physik-institut ...
  • 501 篇 school of physic...
  • 499 篇 infn sezione di ...

作者

  • 288 篇 barter w.
  • 265 篇 a. gomes
  • 262 篇 beiter a.
  • 252 篇 c. alexa
  • 252 篇 c. amelung
  • 251 篇 bellee v.
  • 250 篇 j. m. izen
  • 250 篇 g. bella
  • 250 篇 j. strandberg
  • 250 篇 d. calvet
  • 248 篇 blake t.
  • 247 篇 g. spigo
  • 246 篇 bowcock t.j.v.
  • 243 篇 f. siegert
  • 243 篇 brundu d.
  • 239 篇 s. chen
  • 233 篇 betancourt c.
  • 230 篇 y. tayalati
  • 230 篇 borsato m.
  • 227 篇 r. ströhmer

语言

  • 14,100 篇 英文
  • 1,857 篇 其他
  • 142 篇 中文
  • 8 篇 日文
  • 6 篇 德文
  • 5 篇 法文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 捷克文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science Applied Computer Technology"
16102 条 记 录,以下是1261-1270 订阅
排序:
Optimizing Phishing URL Detection: A Comparative Analysis of Feature Counts and Training Times  5
Optimizing Phishing URL Detection: A Comparative Analysis of...
收藏 引用
5th International Conference on Intelligent Computing, Communication, Networking and Services, ICCNS 2024
作者: Alajlouni, Moayyad Tashtoush, Yahya Dossari, Saud Alhajaj Al. Darwish, Omar Jordan University of Science and Technology Department of Computer Science Irbid Jordan Prince Sattam bin Abdulaziz University Department of Electrical Engineering Wadi Addwasir Saudi Arabia Eastern Michigan University Information Security and Applied Computing Department YpsilantiMI48197 United States
Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic web sites to obtain sensitive information such as passwords and bank statements. On... 详细信息
来源: 评论
Photovoltaic Module Parameter Estimation by Using Wild Horse Optimizer
收藏 引用
Procedia computer science 2025年 258卷 2808-2816页
作者: Anuj Kumar Tina Sharma Manoj K. Singh Sangeeta Pant Hitesh Kumar Sharma School of Computer Science Engineering & Applications D Y Patil International University (DYPIU) Pune India- 411044 Department of Mathematics Birla Institute of Technology and Science Pilani India School of Computer Science Engineering and Technology Bennett University Greater Noida India- 201310 Department of Applied Sciences Symbiosis Institute of Technology Symbiosis International (Deemed University) (SIU) Pune India- 412115 School of Computer Science University of Petroleum & Energy Studies Dehradun India-248007
The development of highly accurate models is essential for optimizing the performance and efficiency of photovoltaic (PV) modules, which are integral to renewable energy systems. In this context, metaheuristic algorit... 详细信息
来源: 评论
Detection of Magnetite Rust Using Circular Microstrip Patch Antenna-based Chipless RFID Sensor
Detection of Magnetite Rust Using Circular Microstrip Patch ...
收藏 引用
2023 International Electrical Engineering Congress, iEECON 2023
作者: Nongpromma, Sirisak Janin, Suwan Kaemarungsi, Kamol Boonpoonga, Akkarat Chudpooti, Nonchanutt Bannawat, Lakkhana King Mongkut's University of Technology North Bangkok Faculty of Engineering Department of Electrical and Computer Engineering Bangkok Thailand Rajamangala University of Technology Lanna Lampang Faculty of Engineering Department of Engineering and Technology Lampang52000 Thailand National Electronics and Computer Technology Center National Science and Technology Development Agency Pathumthani Thailand King Mongkut's University of Technology North Bangkok Faculty of Engineering Department of Electrical and Computer Engineering Bangkok Thailand King Mongkut's University of Technology North Bangkok Faculty of Applied Science Department of Industrial Physics and Medical Instrumentation Bangkok Thailand Rajamangala University of Technology Rattanakosin Faculty of Engineering Department of Computer Engineering Nakhon Pathom Thailand
In this paper, detection of the magnetite rust is presented by using a chipless RFID sensor based on a circular microstrip patch antenna (CMPA). The sensor is designed at the resonant frequency of 4.89 GHz by using a ... 详细信息
来源: 评论
Image cyberbullying detection and recognition using transfer deep machine learning
收藏 引用
International Journal of Cognitive Computing in Engineering 2024年 第1期5卷 14-26页
作者: Almomani, Ammar Nahar, Khalid Alauthman, Mohammad Al-Betar, Mohammed Azmi Yaseen, Qussai Gupta, Brij B. School of Computing Skyline University College University City of Sharjah P.O. Box 1797 Sharjah United Arab Emirates I.T. department Al-Huson University College AlBalqa Applied University Irbid Jordan Computer Science Department Faculty of I.T. Yarmouk University Irbid Jordan Department of Information Security Faculty of Information Technology University of Petra Amman Jordan Ajman University Ajman United Arab Emirates Department of Computer Science and Information Engineering Asia University Taichung413 Taiwan Symbiosis International University Pune India Department of Electrical and Computer Engineering Lebanese American University Beirut1102 Lebanon Dehradun India
Cyberbullying detection on social media platforms is increasingly important, necessitating robust computational methods. Current approaches, while promising, have not fully leveraged the combined strengths of deep lea... 详细信息
来源: 评论
Real-Time Enhanced GAN-Powered Intrusion Prevention System: Safeguarding Networks with Advanced AI  2
Real-Time Enhanced GAN-Powered Intrusion Prevention System: ...
收藏 引用
2nd International Conference on Computing and Data Analytics, ICCDA 2024
作者: Sutherlin Subitha, G. Seldev Christopher, C. Wilfred Blessing, N.R. Sheeja Kumari, V. Stella Mary's College of Engineering Department of Computer Science and Engineering Tamil Nadu Kanyakumari India St. Xavier's Catholic College of Engineering Department of Computer Science and Engineering Tamil Nadu Nagercoil India College of Computing and Information Sciences University of Technology and Applied Sciences Ibri Oman Saveetha School of Engineering Simats Univeristy Department of Computational Intellegence Chennai600025 India
In an era of escalating cyber threats and evolving networks, the demand for robust intrusion prevention is paramount. Introducing the Real-Time Enhanced GAN-Powered Intrusion Prevention System (RT-EGAN-IPS), a state-o... 详细信息
来源: 评论
Quantum Network Coding and Distribution of Maximally Entangled States in Measurement-Based Quantum Computing
Quantum Network Coding and Distribution of Maximally Entangl...
收藏 引用
2023 National Conference on Communications, NCC 2023
作者: Pandey, Cheeranjiv Gupta, Sanidhya Das, Rimon Ranjit Raina, Ankur Indian Institute of Technology Department of Physics Ropar India Indian Institute of Science Education and Research Department of Electrical Engineering and Computer Science Bhopal India Amity University Amity Institute of Applied Sciences Department of Physics India
Classical network coding uses encoding of information over networks to achieve secure and high throughput communication with low latency. Its quantum analog, namely Quantum Network Coding (QNC) is a promising protocol... 详细信息
来源: 评论
Attention-Guided Deep Learning Framework For Movement Quality Assessment  48
Attention-Guided Deep Learning Framework For Movement Qualit...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Kanade, Aditya Sharma, Mansi Muniyandi, Manivannan Indian Institute of Technology Madras Department of Electrical Engineering India Amrita Vishwa Vidyapeetham Amrita School of Computing Coimbatore Department of Computer Science and Engineering India Indian Institute of Technology Madras Department of Applied Mechanics India
Physical rehabilitation programs frequently begin with a brief stay in the hospital and continue with home-based rehabilitation. Lack of feedback on exercise correctness is a significant issue in home-based rehabilita... 详细信息
来源: 评论
Predicting Conflict Zones on Terrestrial Routes of Automated Guided Vehicles with Fuzzy Querying on Apache Kafka  10
Predicting Conflict Zones on Terrestrial Routes of Automated...
收藏 引用
10th IEEE International Conference on Data science and Advanced Analytics, DSAA 2023
作者: Malysiak-Mrozek, Bozena Bas, Mario Sunderam, Vaidy Kozielski, Stanislaw Mrozek, Dariusz Silesian University of Technology Department of Distributed Systems and Informatic Devices Gliwice Poland Silesian University of Technology Department of Applied Informatics Gliwice Poland Emory University Department of Computer Science AtlantaGA30322 United States
In today's world, smart factories are a coexisting element of smarticizing cities. Smart manufacturing of today relies on the automation of many component tasks of the production process. Automated guided vehicles... 详细信息
来源: 评论
SMS Spam Detection using Advance Naive-Bayes Approach
SMS Spam Detection using Advance Naive-Bayes Approach
收藏 引用
Pervasive Computational Technologies (ICPCT), International Conference on
作者: Yojna Arora Neha Gupta Yogesh Singh Rathore Nidhi Bansal Aina Mehta Shikha Chadha Ashwani Kumar Department of Computer Science and Engineering Sharda University Greater Noida India School of Computer Science & Information Technology Symbiosis University of Applied Sciences Indore Madhya Pradesh India Department of Computer Science and Applications School of Engineering and Technology Sharda University Greater Noida Uttar Pradesh India Department of Computer Science & Engineering School of Engineering and Technology Manav Rachna International Institute of Research and Studies (Deemed to be University) Faridabad Haryana India School of Computer Science Engineering and Technology Bennett University India
Recently, with increased use of mobile phones, it has transformed into a multibillion-dollar Short Message Service or SMS. However, the drop in the cost of messaging services has led to an increased number of unsolici... 详细信息
来源: 评论
CAPE: Commitment-based Privacy-Preserving Payment Channel Scheme in Blockchain
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Gai, Keke Guo, Yunwei Yu, Jing Chan, Weilin Zhu, Liehuang Zhang, Yinqian Meng, Weizhi The School of Cyberspace Science and Technology Beijing Institute of Technology Beijing100081 China The Institute of Information Engineering Chinese Academy of Sciences Beijing China The Department of Computer Science and Engineering Southern University of Science and Technology Guangdong Shenzhen China Department of Applied Mathematics and Computer Science Cybersecurity Engineering Technical University of Denmark Kongens Lyngby Denmark
Ensuring scalability in cryptocurrency systems is significant in guaranteeing real-world utility along with the remarkable increment of cryptographic currency. As an alternative in solving scalability issue, payment c... 详细信息
来源: 评论