咨询与建议

限定检索结果

文献类型

  • 8,247 篇 期刊文献
  • 7,688 篇 会议
  • 213 册 图书

馆藏范围

  • 16,148 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,433 篇 工学
    • 4,851 篇 计算机科学与技术...
    • 3,758 篇 软件工程
    • 1,702 篇 电子科学与技术(可...
    • 1,615 篇 电气工程
    • 1,508 篇 信息与通信工程
    • 1,221 篇 控制科学与工程
    • 987 篇 材料科学与工程(可...
    • 882 篇 化学工程与技术
    • 868 篇 生物工程
    • 780 篇 光学工程
    • 673 篇 生物医学工程(可授...
    • 653 篇 机械工程
    • 596 篇 仪器科学与技术
    • 566 篇 动力工程及工程热...
    • 505 篇 核科学与技术
    • 434 篇 力学(可授工学、理...
    • 349 篇 冶金工程
  • 7,918 篇 理学
    • 4,259 篇 物理学
    • 3,065 篇 数学
    • 1,076 篇 生物学
    • 1,060 篇 统计学(可授理学、...
    • 1,010 篇 化学
    • 561 篇 系统科学
    • 323 篇 地球物理学
  • 1,865 篇 管理学
    • 1,211 篇 管理科学与工程(可...
    • 704 篇 图书情报与档案管...
    • 619 篇 工商管理
  • 739 篇 医学
    • 600 篇 临床医学
    • 498 篇 基础医学(可授医学...
    • 292 篇 药学(可授医学、理...
  • 328 篇 法学
  • 256 篇 经济学
  • 191 篇 农学
  • 185 篇 教育学
  • 37 篇 文学
  • 25 篇 艺术学
  • 24 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 330 篇 deep learning
  • 321 篇 computer science
  • 259 篇 machine learning
  • 206 篇 computational mo...
  • 188 篇 accuracy
  • 166 篇 feature extracti...
  • 160 篇 optimization
  • 153 篇 internet of thin...
  • 134 篇 neural networks
  • 133 篇 data mining
  • 129 篇 artificial intel...
  • 124 篇 predictive model...
  • 124 篇 real-time system...
  • 123 篇 support vector m...
  • 122 篇 computational in...
  • 116 篇 hadrons
  • 104 篇 image segmentati...
  • 100 篇 computer archite...
  • 90 篇 educational inst...
  • 87 篇 covid-19

机构

  • 1,111 篇 cavendish labora...
  • 1,045 篇 department of ph...
  • 999 篇 physikalisches i...
  • 994 篇 oliver lodge lab...
  • 628 篇 fakultät physik ...
  • 572 篇 department of ph...
  • 570 篇 school of physic...
  • 559 篇 horia hulubei na...
  • 556 篇 iccub universita...
  • 546 篇 school of physic...
  • 533 篇 school of physic...
  • 532 篇 h.h. wills physi...
  • 531 篇 imperial college...
  • 525 篇 nikhef national ...
  • 523 篇 stfc rutherford ...
  • 522 篇 university of ch...
  • 516 篇 infn laboratori ...
  • 504 篇 physik-institut ...
  • 502 篇 infn sezione di ...
  • 501 篇 infn sezione di ...

作者

  • 292 篇 barter w.
  • 264 篇 a. gomes
  • 263 篇 beiter a.
  • 254 篇 bellee v.
  • 253 篇 c. alexa
  • 252 篇 c. amelung
  • 252 篇 blake t.
  • 251 篇 j. m. izen
  • 251 篇 g. bella
  • 251 篇 j. strandberg
  • 251 篇 d. calvet
  • 249 篇 g. spigo
  • 248 篇 brundu d.
  • 246 篇 f. siegert
  • 244 篇 bowcock t.j.v.
  • 239 篇 s. chen
  • 238 篇 betancourt c.
  • 235 篇 borsato m.
  • 231 篇 y. tayalati
  • 230 篇 amato s.

语言

  • 14,142 篇 英文
  • 1,859 篇 其他
  • 144 篇 中文
  • 8 篇 日文
  • 6 篇 德文
  • 5 篇 法文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 捷克文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science Applied Computer Technology"
16148 条 记 录,以下是1481-1490 订阅
排序:
Implementing Blockchain Based DApp for Secure Sharing of Students' Credentials  9
Implementing Blockchain Based DApp for Secure Sharing of Stu...
收藏 引用
9th IEEE International Conference for Convergence in technology, I2CT 2024
作者: Sree Divya, K. Swetha, G. Charyulu, Gomatam Mohana Madhuri, P. Shyamala Srividya, M. Mutar, Modhi Lafta Saikumar, K. Madanapalle Institute of Technology And Science Department of Computer Science & Technology Andhra Pradesh Madanapalle India Cvr College of Engineering Department of Cse Telangana Hyderabad India Vfstr Deemed To Be University School of Applied Sciences And Humanities Dept of English AP Vadlamudi India Vishnu Institute of Technology Department of Cse Bhimavaram Andhra Pradesh Vishnupur534202 India Mlr Institute of Technology Department of Computer Science And Information Technology Telangana Hyderabad India Al-Ayen University Technical Engineering College Thi-Qar64001 Iraq Koneru Lakshmaiah Education Foundation Dept of Ece Green Fields Andhra Pradesh Vaddeswaram522302 India
When a student excels in a course, the school rewards them with a course credential. These credentials are crucial for students when presenting their academic achievements to potential employers or government agencies... 详细信息
来源: 评论
From News to Summaries: Building a Hungarian Corpus for Extractive and Abstractive Summarization
arXiv
收藏 引用
arXiv 2024年
作者: Barta, Botond Lakatos, Dorina Nagy, Attila Nyist, Milán Konor Ács, Judit HUN-REN Institute for Computer Science and Control Department of Automation and Applied Informatics Budapest University of Technology and Economics Hungary
Training summarization models requires substantial amounts of training data. However for less resourceful languages like Hungarian, openly available models and datasets are notably scarce. To address this gap our pape...
来源: 评论
Cybersecurity Threats in the Era of AI: Detection of Phishing Domains Through Classification Rules  2
Cybersecurity Threats in the Era of AI: Detection of Phishin...
收藏 引用
2nd International Engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Aljaidi, Mohammad Alsarhan, Ayoub Al-Fraihat, Dimah Al-Arjan, Ahmed Igried, Bashar El-Salhi, Subhieh M. Khalid, Muhammad Al-Na'amneh, Qais Zarqa University Faculty of Information Technology Department of Computer Science Zarqa13110 Jordan The Hashemite University Department of Information Technology Jordan Isra University Faculty of Information Technology Department of Software Engineering Amman11622 Jordan The Hashemite University Faculty of Prince AL-Hussein Bin Abdullah Ii of Information Technology Department of Information Technology Jordan The Hashemite University Department of Computer Science and Applications Zarqa Jordan The Hashemite University P. O Box 330127 Zarqa13133 Jordan University of Hull Department of Computer Sciences and Technology Kingston upon Hull United Kingdom Applied Science Private University Dep. of Cyber Security Amman Jordan
Phishing is a cyber threat where attackers create deceptive websites or emails to exploit individuals for fraudulent purposes such as providing sensitive information like usernames, passwords, or financial details. He... 详细信息
来源: 评论
NoteLink: A Point-and-Shoot Linking Interface between Students' Handwritten Notebooks and Instructional Videos  21
NoteLink: A Point-and-Shoot Linking Interface between Studen...
收藏 引用
Proceedings of the 2021 ACM/IEEE Joint Conference on Digital Libraries
作者: Ranjitha Jaddigadde Srinivasa Samuel Dodson Kyoungwon Seo Dongwook Yoon Sidney Fels Department of Electrical & Computer Engineering University of British Columbia Department of Information Science University at Buffalo Department of Applied Artificial Intelligence Seoul National University of Science and Technology Department of Computer Science University of British Columbia
When learning from instructional videos, students frequently take handwritten notes to improve recall and comprehension. When reviewing their notes, it can be difficult to return to the corresponding part of the video... 详细信息
来源: 评论
Enable Business Users to Embed Dynamic Database Content in Existing Web-Based Systems UsingWeb Components and GenericWeb Services  20
Enable Business Users to Embed Dynamic Database Content in E...
收藏 引用
20th International Conference on Web Information Systems and Technologies, WEBIST 2024
作者: Schmidt, Andreas Münch, Tobias Karlsruhe Germany Department of Computer Science and Business Information Systems Karlsruhe University of Applied Sciences Karlsruhe Germany Münch Ges. für IT Solutions MbH Gewerbering 1 Lohne49393 Germany Chemnitz University of Technology Chemnitz Germany
In our digitalized world and under the economic pressure of competition, every company must react flexibly to opportunities and problems that arise. One way to cope with these challenges is to use web-based Enterprise... 详细信息
来源: 评论
A new class of generalized quasi-variational inequalities with applications to Oseen problems under nonsmooth boundary conditions
收藏 引用
science China Mathematics 2024年 第2期67卷 315-338页
作者: Shengda Zeng Akhtar A.Khan Stanislaw Migórski Guangxi Colleges and Universities Key Laboratory of Complex System Optimization and Big Data Processing Yulin Normal UniversityYulin 537000China Faculty of Mathematics and Computer Science Jagiellonian University in Krak´owKrak´ow 30348Poland Center for Applied and Computational Mathematics School of Mathematical SciencesRochester Institute of TechnologyRochesterNY 14623USA College of Sciences Beibu Gulf UniversityQinzhou 535000China
In this paper, we study a generalized quasi-variational inequality (GQVI for short) with twomultivalued operators and two bifunctions in a Banach space setting. A coupling of the Tychonov fixedpoint principle and the ... 详细信息
来源: 评论
Multi-dimensional multiplexing optical secret sharing framework with cascaded liquid crystal holograms
收藏 引用
Opto-Electronic Advances 2024年 第1期7卷 28-35页
作者: Keyao Li Yiming Wang Dapu Pi Baoli Li Haitao Luan Xinyuan Fang Peng Chen Yanqing Lu Min Gu Institute of Photonic Chips University of Shanghai for Science and TechnologyShanghai 200093China Centre for Artificial-Intelligence Nanophotonics School of Optical-Electrical and Computer EngineeringUniversity of Shanghai for Science and TechnologyShanghai 200093China National Laboratory of Solid State Microstructures and College of Engineering and Applied SciencesNanjing UniversityNanjing 210093China
Secret sharing is a promising technology for information encryption by splitting the secret information into different ***,the traditional scheme suffers from information leakage in decryption process since the amount... 详细信息
来源: 评论
Optimization of Cognitive Radio System Using Enhanced Firefly Algorithm
收藏 引用
Intelligent Automation & Soft Computing 2023年 第9期37卷 3159-3177页
作者: Nitin Mittal Rohit Salgotra Abhishek Sharma Sandeep Kaur SSAskar Mohamed Abouhawwash University Center for Research and Development Chandigarh UniversityMohaliPunjab140413India Faculty of Physics and Applied Computer Science AGH University of Science&TechnologyKrakowPoland Faculty of Information Technology Middle East UniversityAmman11813Jordan Department of Computer Engineering and Applications GLA UniversityMathura281406India Department of Computer Engineering&Technology Guru Nanak Dev UniversityAmritsarPunjab143005India Department of Statistics and Operations Research College of ScienceKing Saud UniversityP.O.Box 2455Riyadh11451Saudi Arabia Department of Computational Mathematics Science and EngineeringCollege of EngineeringMichigan State UniversityEast LansingMI48824USA Department of Mathematics Faculty of ScienceMansoura UniversityMansoura35516Egypt
The optimization of cognitive radio(CR)system using an enhanced firefly algorithm(EFA)is presented in this *** Firefly algorithm(FA)is a nature-inspired algorithm based on the unique light-flashing behavior of *** has... 详细信息
来源: 评论
The Smart Coverage Path Planner for Autonomous Drones Using TSP and Tree Selection  1
收藏 引用
9th International Conference on Mining Intelligence and Knowledge Exploration, MIKE 2023
作者: Sundarrajan, M. Jothi, Akshya Prabakar, D. Kadry, Seifedine SRM Institute of Science and Technology Chennai India Department of Applied Data Science Noroff University College Kristiansand Norway Ajman University Ajman346 United Arab Emirates Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon
The problem of efficiently covering an area with a limited number of sensors or cameras is an important research topic in various fields such as surveillance, monitoring, and inspection. This problem can be posed as a... 详细信息
来源: 评论
A Literature Review of the Seriousness of Flooding-based DoS Attack
A Literature Review of the Seriousness of Flooding-based DoS...
收藏 引用
2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2022
作者: Albadi, Houda Mohammed Khder, Moaiad Ahmad Fujo, Samah Wael Yousif, Tasneem Mohamed University of Technology and Applied Sciences - Ibri Oman Applied Science University Department of Computer Science Bahrain Nasser Artificial Intelligence Research and Development Centre Bahrain University of Nottingham Department of Electrical and Electronics United Kingdom
The denial of service (DoS) attack has evolved into one of the most serious security threats on the Internet, aimed at preventing a service from being available. To launch a distributed denial of service (DDoS) attack... 详细信息
来源: 评论