咨询与建议

限定检索结果

文献类型

  • 8,239 篇 期刊文献
  • 7,628 篇 会议
  • 212 册 图书

馆藏范围

  • 16,079 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,034 篇 工学
    • 4,842 篇 计算机科学与技术...
    • 3,750 篇 软件工程
    • 1,562 篇 电子科学与技术(可...
    • 1,513 篇 信息与通信工程
    • 1,475 篇 电气工程
    • 1,215 篇 控制科学与工程
    • 870 篇 化学工程与技术
    • 867 篇 生物工程
    • 821 篇 材料科学与工程(可...
    • 800 篇 光学工程
    • 674 篇 生物医学工程(可授...
    • 653 篇 机械工程
    • 597 篇 仪器科学与技术
    • 568 篇 动力工程及工程热...
    • 437 篇 力学(可授工学、理...
    • 349 篇 冶金工程
  • 7,906 篇 理学
    • 4,247 篇 物理学
    • 3,039 篇 数学
    • 1,073 篇 生物学
    • 1,026 篇 统计学(可授理学、...
    • 1,001 篇 化学
    • 561 篇 系统科学
    • 322 篇 地球物理学
  • 1,871 篇 管理学
    • 1,216 篇 管理科学与工程(可...
    • 701 篇 图书情报与档案管...
    • 619 篇 工商管理
  • 745 篇 医学
    • 603 篇 临床医学
    • 500 篇 基础医学(可授医学...
    • 291 篇 药学(可授医学、理...
    • 281 篇 公共卫生与预防医...
  • 326 篇 法学
  • 259 篇 经济学
  • 195 篇 农学
  • 183 篇 教育学
  • 37 篇 文学
  • 25 篇 艺术学
  • 24 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 328 篇 deep learning
  • 322 篇 computer science
  • 245 篇 machine learning
  • 195 篇 computational mo...
  • 172 篇 accuracy
  • 161 篇 optimization
  • 150 篇 feature extracti...
  • 149 篇 internet of thin...
  • 133 篇 neural networks
  • 131 篇 data mining
  • 120 篇 predictive model...
  • 120 篇 artificial intel...
  • 119 篇 support vector m...
  • 118 篇 computational in...
  • 118 篇 real-time system...
  • 117 篇 hadrons
  • 107 篇 image segmentati...
  • 100 篇 computer archite...
  • 90 篇 educational inst...
  • 87 篇 covid-19

机构

  • 1,106 篇 cavendish labora...
  • 1,038 篇 department of ph...
  • 991 篇 physikalisches i...
  • 989 篇 oliver lodge lab...
  • 614 篇 fakultät physik ...
  • 572 篇 department of ph...
  • 567 篇 school of physic...
  • 559 篇 horia hulubei na...
  • 552 篇 iccub universita...
  • 547 篇 school of physic...
  • 535 篇 school of physic...
  • 534 篇 h.h. wills physi...
  • 532 篇 imperial college...
  • 528 篇 nikhef national ...
  • 524 篇 stfc rutherford ...
  • 522 篇 university of ch...
  • 510 篇 physik-institut ...
  • 510 篇 infn laboratori ...
  • 505 篇 school of physic...
  • 504 篇 henryk niewodnic...

作者

  • 284 篇 barter w.
  • 266 篇 a. gomes
  • 262 篇 beiter a.
  • 253 篇 c. alexa
  • 253 篇 c. amelung
  • 251 篇 j. m. izen
  • 251 篇 g. bella
  • 251 篇 j. strandberg
  • 251 篇 d. calvet
  • 251 篇 bellee v.
  • 248 篇 g. spigo
  • 246 篇 blake t.
  • 244 篇 f. siegert
  • 244 篇 bowcock t.j.v.
  • 243 篇 brundu d.
  • 239 篇 s. chen
  • 233 篇 betancourt c.
  • 230 篇 y. tayalati
  • 230 篇 borsato m.
  • 227 篇 amato s.

语言

  • 15,391 篇 英文
  • 544 篇 其他
  • 136 篇 中文
  • 8 篇 日文
  • 4 篇 德文
  • 4 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science Applied Computer Technology"
16079 条 记 录,以下是251-260 订阅
排序:
Video classification for efficient data storage using deep learning: a comparison of sequential and simultaneous feature extraction methods
收藏 引用
Multimedia Tools and Applications 2025年 第6期84卷 3071-3094页
作者: Dang Thi, Phuc Nguyen Dang, Hoang Thi Doan Huu, Phuc Dau Sy, Hieu Department of Computer Science Faculty of Information Technology Industrial University of Ho Chi Minh City 12 Nguyen Van Bao Ho Chi Minh City7000 Viet Nam Department of Applied Physics Faculty of Applied Science University of Technology - Viet Nam National University HCMC To Hien Thanh Ho Chi Minh City7000 Viet Nam
Optimizing camera information storage is a critical issue due to the increasing data volume and a large number of daily surveillance videos. In this study, we propose a deep learning-based system for efficient data st... 详细信息
来源: 评论
Dynamic generative R-CNN
收藏 引用
Neural Computing and Applications 2025年 第10期37卷 7107-7120页
作者: Saffarini, Rasha Khamayseh, Faisal Awwad, Yousef Sabha, Muath Eleyan, Derar IT Engineering Arab American University Jenin Palestine Department of Computer Science Palestine Polytechnic University Hebron Palestine Department of Computer System Engineering Palestine Technical University Tulkarm Palestine Department of Multimedia Technology Arab American University Jenin Palestine Department of Applied Computing Palestine Technical University Tulkarm Palestine
Different techniques have been developed for object detection and recognition. These techniques can be divided into single-shot and two-shot methods. Single-shot methods focus on real-time applications, while two-shot... 详细信息
来源: 评论
Automated Radiology Report Generation from Chest X-ray Scans Using Deep Learning  6th
Automated Radiology Report Generation from Chest X-ray Scans...
收藏 引用
6th International Conference on Recent Innovations in Computing, ICRIC 2023
作者: Veer, V. Druva Priya, S. Baghavathi Tamilselvi, M. Department of Computer Science and Engineering Amrita School of Computing AmritaVishwaVidyapeetham Chennai India Information Technology Department University of Technology and Applied Sciences Nizwa Oman
A chest X-ray is a common diagnostic tool for many thoracic illnesses. Interpreting these images and coming up with accurate diagnostic results is a difficult and time-consuming task for radiologists. Recent results u... 详细信息
来源: 评论
Utilization of Machine Learning in Breast Cancer Detection  25
Utilization of Machine Learning in Breast Cancer Detection
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Momani, Mutaz Yousef, Nidal Aljawazneh, Qotadeh Issa, A.T. Abuowaida, Suhaila Alazaidah, Raed Khouj, Mohammed Talat Batyha, Radwan Elsoud, Esraa Abu Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan Al-Albayt University Faculty of Information Technology Department of Computer Science Mafraq Jordan Zarqa University Department of Data Science and Ai Faculty of Information Technology Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Private University Faculty of It Applied Science Department of Computer Science Amman Jordan
Breast cancer is the most prevalent cancer among women and can be deadly, necessitating early detection to enhance patient outcomes and treatment effectiveness. Recently, Machine Learning (ML) techniques have shown po... 详细信息
来源: 评论
Boosting Adversarial Training with Learnable Distribution
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3247-3265页
作者: Kai Chen Jinwei Wang James Msughter Adeke Guangjie Liu Yuewei Dai School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China Key Laboratory of Intelligent Support Technology for Complex Environments Ministry of EducationNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Nanjing Center for Applied Mathematics Nanjing211135China
In recent years,various adversarial defense methods have been proposed to improve the robustness of deep neural *** training is one of the most potent methods to defend against adversarial ***,the difference in the fe... 详细信息
来源: 评论
AI-Powered Healthcare with Advanced Graph Convolutional Neural Networks and SVM for Diagnosis  3
AI-Powered Healthcare with Advanced Graph Convolutional Neur...
收藏 引用
3rd International Conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Mahendran, A. Nalla, Sridhar Babu Trivedi, Lalit Mohan Mohankumar, S. Williams, D.R. Mohan Renuka, Manne Sona College of Arts and Science Department of Computer Science Salem India Sr University Department of Computer Science and Engineering Hyderabad India Moradabad Institute of Technology Department of Ash Mathematics Moradabad India Erode Sengunthar Engineering College Department of Computer Science and Engineering Perundurai India College of Computing and Information Sciences University of Technology and Applied Science-Sohar Department of Information Technology Sohar Oman Vidya Jyothi Institute of Technology Department of Electronics and Communication Engineering Hyderabad India
Medical treatment costs are rising for many reasons. These include an increasing world population, an aging population, greater healthcare needs, more diseases, and inflation. With AI's emergence in navigation, vo... 详细信息
来源: 评论
An Anonymous IoT-Based E-Health Monitoring System Using Blockchain technology
收藏 引用
IEEE Systems Journal 2023年 第2期17卷 2422-2433页
作者: Samuel, Omaji Omojo, Akogwu Blessing Mohsin, Syed Muhammad Tiwari, Prayag Gupta, Deepak Band, Shahab S. Department of Computer Science Osara264103 Nigeria Edo State University Uzairue300281 Nigeria Shestco Applied Mathematics and Simulation Advanced Research Centre Abuja186 Nigeria Comsats University Islamabad Department of Computer Science Islamabad45550 Pakistan Aalto University Department of Computer Science Espoo02150 Finland Department of Computer Science and Engineering Maharaja Agrasen Institute of Technology Delhi110086 India Research Advisor Ucrd Chandigarh University GharuanPunjab Mohali140413 India National Yunlin University of Science and Technology Future Technology Research Center Douliou64002 Taiwan
The Internet of Things (IoT) has made it possible for health institutions to have remote diagnosis, reliable, preventive, and real-time decision-making. However, the anonymity and privacy of patients are not considere... 详细信息
来源: 评论
SkinMarkNet: an automated approach for prediction of monkeyPox using image data augmentation with deep ensemble learning models
收藏 引用
Multimedia Tools and Applications 2024年 第18期84卷 1-17页
作者: Akram, Aqsa Jamjoom, Arwa A. Innab, Nisreen Almujally, Nouf Abdullah Umer, Muhammad Alsubai, Shtwai Fimiani, Gianluca Bahawalpur Pakistan Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Computer Science and Information Systems College of Applied Sciences AlMaarefa University Riyadh Diriyah13713 Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Department of Computer Science The Islamia University of Bahawalpur Bahawalpur Pakistan Department of Computer Science College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University P.O. Box 151 Al-Kharj11942 Saudi Arabia Department of Computer Science University of Salerno Fisciano84084 Italy
Monkeypox, a rare but potentially fatal viral disease, poses a significant public health challenge due to its potential for outbreaks and complications. Detecting monkeypox lesions early and accurately is vital to eff... 详细信息
来源: 评论
Use of Polygram Substitution in Spotting the Swindler in Secret Sharing  11th
Use of Polygram Substitution in Spotting the Swindler in Sec...
收藏 引用
11th International Conference on Intelligent Computing and Applications, ICRTC 2023
作者: Yadav, Poonam Satheesh Kumar, S. Muthukumaran, V. Sandeep Kumar, Mathivanan Radhika, E.K. Department of Computer Science School of Applied Sciences Reva University Bangalore India Department of Mathematics College of Engineering and Technology SRM Institute of Science and Technology Tamil Nadu Kattankulathur 603203 India School of Computer Science and Engineering Galgotias University Uttar Pradesh Greater Noida203201 India Department of Computer Science and Applications Sindhi College Bangalore560024 India
In the polygram substitution, one set of characters is replaced by another set based on algorithm. The model is proposed for calculating and estimating secure online secret shares, where dynamic modification in any of... 详细信息
来源: 评论
Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3515-3537页
作者: Iman Almomani Walid El-Shafai Aala AlKhayer Albandari Alsumayt Sumayh S.Aljameel Khalid Alissa Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Computer Science Department King Abdullah II School of Information TechnologyThe University of Jordan11942Jordan Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Computer Science Department Applied CollegeImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Computer Science Department College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia SAUDI ARAMCO Cybersecurity Chair Networks and Communications DepartmentCollege of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia
Nowadays,there is tremendous growth in biometric authentication and cybersecurity ***,the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private ***,designing a... 详细信息
来源: 评论