咨询与建议

限定检索结果

文献类型

  • 8,203 篇 期刊文献
  • 7,688 篇 会议
  • 211 册 图书

馆藏范围

  • 16,102 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,490 篇 工学
    • 4,848 篇 计算机科学与技术...
    • 3,757 篇 软件工程
    • 1,716 篇 电子科学与技术(可...
    • 1,629 篇 电气工程
    • 1,508 篇 信息与通信工程
    • 1,218 篇 控制科学与工程
    • 1,008 篇 材料科学与工程(可...
    • 882 篇 化学工程与技术
    • 868 篇 生物工程
    • 773 篇 光学工程
    • 673 篇 生物医学工程(可授...
    • 653 篇 机械工程
    • 596 篇 仪器科学与技术
    • 566 篇 动力工程及工程热...
    • 552 篇 核科学与技术
    • 434 篇 力学(可授工学、理...
    • 349 篇 冶金工程
  • 7,912 篇 理学
    • 4,256 篇 物理学
    • 3,068 篇 数学
    • 1,076 篇 生物学
    • 1,067 篇 统计学(可授理学、...
    • 1,011 篇 化学
    • 561 篇 系统科学
    • 323 篇 地球物理学
  • 1,864 篇 管理学
    • 1,210 篇 管理科学与工程(可...
    • 704 篇 图书情报与档案管...
    • 619 篇 工商管理
  • 737 篇 医学
    • 598 篇 临床医学
    • 498 篇 基础医学(可授医学...
    • 292 篇 药学(可授医学、理...
  • 328 篇 法学
  • 256 篇 经济学
  • 191 篇 农学
  • 185 篇 教育学
  • 37 篇 文学
  • 25 篇 艺术学
  • 24 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 329 篇 deep learning
  • 321 篇 computer science
  • 254 篇 machine learning
  • 208 篇 computational mo...
  • 190 篇 accuracy
  • 171 篇 feature extracti...
  • 160 篇 optimization
  • 152 篇 internet of thin...
  • 134 篇 neural networks
  • 132 篇 data mining
  • 127 篇 predictive model...
  • 124 篇 artificial intel...
  • 123 篇 support vector m...
  • 122 篇 real-time system...
  • 121 篇 computational in...
  • 115 篇 hadrons
  • 104 篇 image segmentati...
  • 100 篇 computer archite...
  • 90 篇 educational inst...
  • 87 篇 covid-19

机构

  • 1,106 篇 cavendish labora...
  • 1,040 篇 department of ph...
  • 990 篇 oliver lodge lab...
  • 990 篇 physikalisches i...
  • 618 篇 fakultät physik ...
  • 570 篇 department of ph...
  • 569 篇 school of physic...
  • 555 篇 horia hulubei na...
  • 549 篇 iccub universita...
  • 541 篇 school of physic...
  • 535 篇 school of physic...
  • 530 篇 h.h. wills physi...
  • 528 篇 imperial college...
  • 526 篇 nikhef national ...
  • 520 篇 university of ch...
  • 520 篇 stfc rutherford ...
  • 507 篇 infn laboratori ...
  • 505 篇 physik-institut ...
  • 501 篇 school of physic...
  • 499 篇 infn sezione di ...

作者

  • 288 篇 barter w.
  • 265 篇 a. gomes
  • 262 篇 beiter a.
  • 252 篇 c. alexa
  • 252 篇 c. amelung
  • 251 篇 bellee v.
  • 250 篇 j. m. izen
  • 250 篇 g. bella
  • 250 篇 j. strandberg
  • 250 篇 d. calvet
  • 248 篇 blake t.
  • 247 篇 g. spigo
  • 246 篇 bowcock t.j.v.
  • 243 篇 f. siegert
  • 243 篇 brundu d.
  • 239 篇 s. chen
  • 233 篇 betancourt c.
  • 230 篇 y. tayalati
  • 230 篇 borsato m.
  • 227 篇 r. ströhmer

语言

  • 14,100 篇 英文
  • 1,857 篇 其他
  • 142 篇 中文
  • 8 篇 日文
  • 6 篇 德文
  • 5 篇 法文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 捷克文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science Applied Computer Technology"
16102 条 记 录,以下是1341-1350 订阅
排序:
Artificial Intelligence Role in Software Automation Testing
Artificial Intelligence Role in Software Automation Testing
收藏 引用
Decision Aid sciences and Application (DASA), International Conference on
作者: Abdallah Awad Mahmoud H. Qutqut Ali Ahmed Fatima Al-Haj Fadi Almasalha Faculty of Information Technology Applied Science Private University Amman Jordan Computer Science Department Center for Applied Mathematics and Bioinformatics (CAMB) Gulf University for Science & Technology West Mishref Hawalli Kuwait
Artificial intelligence (AI) significantly influences the systems and applications that underpin modern life. Large datasets are generated from diverse sources. Hence, there is a need for effective data monitoring, pr... 详细信息
来源: 评论
Stochastic Triangular Fuzzy Number (S-TFN) Normalization: A New Approach for Nonmonotonic Normalization  27
Stochastic Triangular Fuzzy Number (S-TFN) Normalization: A ...
收藏 引用
27th International Conference on Knowledge Based and Intelligent Information and Engineering Sytems, KES 2023
作者: Kizielewicz, Bartlomiej Dobryakova, Larisa Research Team on Intelligent Decision Support Systems Department of Artificial Intelligence and Applied Mathematics Faculty of Computer Science and Information Technology West Pomeranian University of Technology in Szczecin ul. Zolnierska 49 Szczecin71-210 Poland
Data normalization is essential in many fields, such as speech recognition, deep learning, machine learning, and optimization. Many researchers focus on developing various normalization techniques, such as min-max, sc... 详细信息
来源: 评论
An Overview of Tools and Techniques in Network Forensics  25
An Overview of Tools and Techniques in Network Forensics
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Asassfeh, Mahmoud Al-Mousa, Mohammad Rasmi Al-Dweikat, Hasan Al-Mashagbeh, Malak Hamad Afaneh, Suha Samara, Ghassan Zaid, Ali Abu Khouj, Mohammed Al Daoud, Essam Zarqa University Department of Cybersecurity Zarqa Jordan Applied Science Private University Cybersecurity and Cloud Computing Department Amman Jordan Zarqa University Department of Computer Science Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Zarqa University Faculty of Information Technology Zarqa Jordan
Network forensics pertains to a subfield of digital forensics that deals with network security. It is utilized in conjunction with computer network traffic monitoring and analysis, which acts as an intrusion detection... 详细信息
来源: 评论
Next-Generation Critical Infrastructure Security: A Framework for Autonomous Defense Systems
Next-Generation Critical Infrastructure Security: A Framewor...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Mohammad Alauthman Ashraf Mashaleh Nauman Aslam Mouhammd Alkasassbeh Ammar Almomani Department of Information Security University of Petra Jordan Al-Balqa Applied University Al-Salt Jordan Department of Computer and Information Sciences Northumbria University U.K. Computer Science Department Princess Sumaya University for Technology Jordan Department of Computer Information Science Higher Colleges of Technology UAE Al-Balqa Applied University Jordan
As critical infrastructure systems become more interconnected and digitized, they face increasing cyber threats that can have severe consequences for national security, public safety, and economic stability. Tradition... 详细信息
来源: 评论
Secure Key Management in 5G Networks Using Elliptic Curve Integrated Encryption Scheme (ECIES) for Low-Power IoT Devices  4
Secure Key Management in 5G Networks Using Elliptic Curve In...
收藏 引用
4th IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2024
作者: Chitra Kiran, N. Maindola, Meenakshi Kumara, Bharath Kaliappan, S. Bhatt, Pooja Maranan, Ramya Alliance University Department of Electronics and Communication Engineering Bengaluru India Graphic Era Deemed to be University Department of Computer Science & Engineering Dehradun India Ramaiah University of Applied Science Department of Electronics and Communication Engineering Bengaluru India Lovely Professional University Division of Research and Development Phagwara India Parul institute of Engineering and Technology Parul University Faculty of Engineering and Technology Department of Computer Science and Engineering Post Limda India Saveetha School of Engineering Simats Department of Research and Innovation Chennai India
The rapid proliferation of the Internet of Things (IoT) has led to a surge in cyber threats, demanding the development of robust security frameworks. This paper introduces an advanced threat detection model, leveragin... 详细信息
来源: 评论
An overview of common emotion models in computer systems  45
An overview of common emotion models in computer systems
收藏 引用
45th Jubilee International Convention on Information, Communication and Electronic technology, MIPRO 2022
作者: Horvat, M. Stojanovic, A. Kovacevic, Z. University of Zagreb Faculty of Electrical Engineering and Computing Department of Applied Computing Zagreb Croatia Zagreb University of Applied Sciences Department of Computer Science and Information Technology Zagreb Croatia
Emotions are an omnipresent and important factor in the interaction and communication between people. Since emotions are an indispensable part of human life, it would accelerate the progress of artificial intelligence... 详细信息
来源: 评论
Enhancing Vegetable Quality Prediction with Fuzzy Interference System  2
Enhancing Vegetable Quality Prediction with Fuzzy Interferen...
收藏 引用
2nd International Conference on Business Analytics for technology and Security, ICBATS 2023
作者: Al-Rajab, Murad Asif, Muhammad Chuhan, Saad Hussain Mustafa, Muzzamil Ilyas, Amna Kamran, Rukshanda Ahmad Abazeed, Ashraf Riad Abu Saima, Mahmoud Geeta, Sai Abu Dhabi University Computer Science and IT College of Engineering United Arab Emirates NCBA&E School of Computer Science Lahore Pakistan Applied Science Private University Applied Science Research Center Amman11937 Jordan Universiti Malaysia Faculty of Compter Science and Information Technology Sarawak94300 Malaysia ADVETI Abu Dhabi Vocational Education and Training Institute United Arab Emirates United Arab Emirates University College of Science United Arab Emirates Institute of Management Technology Dubai Head QAIE and Accreditation United Arab Emirates
We are living in this hurly burly world of Tumult and Turmoil where many problems arises who have not any exact solution/answer like we have health and nutrition problems people facing difficulties to select best vege... 详细信息
来源: 评论
Enhanced Intrusion Detection System for an EH IoT Architecture Using a Cooperative UAV Relay and Friendly UAV Jammer
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第11期8卷 1786-1799页
作者: Van Nhan Vo Hung Tran Chakchai So-In Institute of Research and Development Duy Tan UniversityDa Nang 550000Vietnam Faculty of Information Technology Duy Tan UniversityDa Nang 550000Vietnam Applied Network Technology Laboratory Department of Computer ScienceFaculty of ScienceKhon Kaen UniversityKhon Kaen 40002Thailand Faculty of Computer Science Phenikaa UniversityHanoi 100000Vietnam
In this paper,the detection capabilities and system performance of an energy harvesting(EH)Internet of Things(Io T)architecture in the presence of an unmanned aerial vehicle(UAV)eavesdropper(UE)are *** communication p... 详细信息
来源: 评论
ANN-Based Modeling and Control of a Pick and Place Manipulator  1
收藏 引用
8th International Congress on Information and Communication technology, ICICT 2023
作者: Mostafa, Mohamed Essam Mostafa, Aya Essam Ammar, Hossam Hassan Shalaby, Raafat School of Engineering and Applied Science NU Giza Egypt School of Information Technology and Computer Science NU Giza Egypt SESC Center School of EAS NU Giza Egypt Faculty of Electronic Engineering Menofia University Menouf Egypt
Pick-and-place robots are used in the manufacturing industry. This paper will focus on one of the most used functionalities in the industry. In addition, it will focus on this functionality and how to achieve more pre... 详细信息
来源: 评论
Impact of Blockchain technology and Fintech on Sustainable Performance  2
Impact of Blockchain Technology and Fintech on Sustainable P...
收藏 引用
2nd International Conference on Business Analytics for technology and Security, ICBATS 2023
作者: Almahadin, Hamed Ahmad Shehadeh, Maha Al-Gasaymeh, Anwar S. Abu-Alsondos, Ibrahim A. Atta, Anas Ahmad Bani Applied Science Private University Finance and Banking Science Department Amman Jordan American University in the Emirates College of Computer Information Technology Dubai United Arab Emirates Middle East University Department of Accounting and Finance Amman Jordan
The financial industries have grown concerned over the last ten years about the rapid development of financial technology, or Fintech, and the conversation surrounding sustainable performance. Achieving cutting-edge p... 详细信息
来源: 评论