咨询与建议

限定检索结果

文献类型

  • 8,282 篇 期刊文献
  • 7,725 篇 会议
  • 214 册 图书

馆藏范围

  • 16,221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,152 篇 工学
    • 4,929 篇 计算机科学与技术...
    • 3,801 篇 软件工程
    • 1,577 篇 电子科学与技术(可...
    • 1,527 篇 信息与通信工程
    • 1,494 篇 电气工程
    • 1,240 篇 控制科学与工程
    • 882 篇 化学工程与技术
    • 872 篇 生物工程
    • 821 篇 材料科学与工程(可...
    • 809 篇 光学工程
    • 683 篇 生物医学工程(可授...
    • 657 篇 机械工程
    • 603 篇 仪器科学与技术
    • 563 篇 动力工程及工程热...
    • 436 篇 力学(可授工学、理...
    • 353 篇 冶金工程
  • 7,969 篇 理学
    • 4,282 篇 物理学
    • 3,053 篇 数学
    • 1,087 篇 生物学
    • 1,025 篇 统计学(可授理学、...
    • 1,012 篇 化学
    • 561 篇 系统科学
    • 323 篇 地球物理学
  • 1,888 篇 管理学
    • 1,224 篇 管理科学与工程(可...
    • 711 篇 图书情报与档案管...
    • 625 篇 工商管理
  • 745 篇 医学
    • 604 篇 临床医学
    • 498 篇 基础医学(可授医学...
    • 291 篇 药学(可授医学、理...
    • 285 篇 公共卫生与预防医...
  • 335 篇 法学
  • 257 篇 经济学
  • 202 篇 农学
  • 184 篇 教育学
  • 37 篇 文学
  • 25 篇 艺术学
  • 24 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 333 篇 deep learning
  • 323 篇 computer science
  • 245 篇 machine learning
  • 199 篇 computational mo...
  • 180 篇 accuracy
  • 162 篇 optimization
  • 155 篇 feature extracti...
  • 152 篇 internet of thin...
  • 134 篇 neural networks
  • 131 篇 data mining
  • 127 篇 artificial intel...
  • 124 篇 support vector m...
  • 123 篇 computational in...
  • 119 篇 hadrons
  • 115 篇 predictive model...
  • 114 篇 real-time system...
  • 103 篇 image segmentati...
  • 99 篇 computer archite...
  • 90 篇 educational inst...
  • 88 篇 covid-19

机构

  • 1,106 篇 cavendish labora...
  • 1,039 篇 department of ph...
  • 992 篇 physikalisches i...
  • 986 篇 oliver lodge lab...
  • 629 篇 fakultät physik ...
  • 573 篇 department of ph...
  • 567 篇 school of physic...
  • 558 篇 horia hulubei na...
  • 555 篇 iccub universita...
  • 547 篇 school of physic...
  • 534 篇 h.h. wills physi...
  • 534 篇 school of physic...
  • 530 篇 imperial college...
  • 524 篇 nikhef national ...
  • 522 篇 university of ch...
  • 522 篇 stfc rutherford ...
  • 512 篇 infn laboratori ...
  • 503 篇 physik-institut ...
  • 501 篇 infn sezione di ...
  • 501 篇 school of physic...

作者

  • 294 篇 barter w.
  • 260 篇 a. gomes
  • 259 篇 beiter a.
  • 254 篇 bellee v.
  • 252 篇 c. alexa
  • 252 篇 blake t.
  • 251 篇 c. amelung
  • 250 篇 j. m. izen
  • 250 篇 g. bella
  • 250 篇 j. strandberg
  • 250 篇 d. calvet
  • 248 篇 g. spigo
  • 248 篇 brundu d.
  • 246 篇 bowcock t.j.v.
  • 245 篇 f. siegert
  • 238 篇 betancourt c.
  • 235 篇 borsato m.
  • 235 篇 s. chen
  • 230 篇 y. tayalati
  • 230 篇 amato s.

语言

  • 13,529 篇 英文
  • 2,557 篇 其他
  • 149 篇 中文
  • 8 篇 日文
  • 7 篇 德文
  • 6 篇 法文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 捷克文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science Applied Computer Technology"
16221 条 记 录,以下是301-310 订阅
A Novel Spark-Based Algorithm for Mining Frequent Utility Patterns  6
A Novel Spark-Based Algorithm for Mining Frequent Utility Pa...
收藏 引用
6th International Conference on Artificial Intelligence and Big Data, ICAIBD 2023
作者: Wu, Jimmy Ming-Tai Zhou, Huiying Lin, Jerry Chun-Wei Wang, Ke Liu, Shuo Li, Ranran Shandong University of Science and Technology College of Computer Science and Engineering Qingdao China Western Norway University of Applied Sciences Department of Computer Science Electrical Engineering and Mathematical Sciences Bergen Norway
We are now living in the era of big data thanks to technological innovation. It is very important to discover valuable information in massive data. High utility itemset mining and frequent itemset mining are commonly ... 详细信息
来源: 评论
Blockchain and Quantum-based Collaborative Communication Framework for Telehealth
Blockchain and Quantum-based Collaborative Communication Fra...
收藏 引用
2024 IEEE International Conference on E-Health Networking, Application and Services, HealthCom 2024
作者: Gajjar, Harshal Jivani, Dirgha Trivedi, Chinmay Gupta, Rajesh Jadav, Nilesh Kumar Tanwar, Sudeep Dutta, Ashit Kumar Rodrigues, Joel J.P.C. Department of Computer Science and Engineering Institute of Technology Nirma University Gujarat India Department of Computer Science and Information Systems College of Applied Sciences AlMaarefa University Saudi Arabia Amazonas State University AM Manaus Brazil
This paper introduces a novel telehealth communication system, designed to enhance the security and integrity of medical data exchange. In the rapidly evolving digital healthcare landscape, the protection of sensitive... 详细信息
来源: 评论
Influence of performance and emission of diesel engine with alumina nano material-based catalyst biodiesel using IoT
收藏 引用
International Journal of Power and Energy Conversion 2024年 第4期15卷 338-351页
作者: Venkatesh, B. Khan, Mudassir Babu, J. Chinna Nagaraju, C.H. Mohan, R. Madhan Department of Mechanical Engineering Annamacharya Institute of Technology and Sciences Andhra Pradesh Rajampet India Department of Computer Science College of Computer Science Applied College Tanumah King Khalid University P.O. Box 960-61421 Abha Saudi Arabia Department of Electronics and Communication Engineering Annamacharya Institute of Technology and Sciences Andhra Pradesh Rajampet India Department of Electrical and Electronics Engineering Annamacharya Institute of Technology and Sciences India
In this study, the performance and emissions of Al2O3 alkaline cottonseed biodiesel-powered compression ignition engines were predicted. An experiment was conducted using different biodiesel blends made from cottonsee... 详细信息
来源: 评论
On Error-Based Step Size Control for Discontinuous Galerkin Methods for Compressible Fluid Dynamics
收藏 引用
应用数学与计算数学学报 2025年 第1期7卷 3-39页
作者: Hendrik Ranocha Andrew R.Winters Hugo Guillermo Castro Lisandro Dalcin Michael Schlottke-Lakemper Gregor J.Gassner Matteo Parsani Applied Mathematics University of HamburgBundesstr.5520146 HamburgGermany Department of Mathematics Applied Mathematics Linköping UniversityLinköpingSweden Extreme Computing Research Center(ECRC) Computer Electrical and Mathematical Science and Engineering Division(CEMSE)King Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Saudi Arabia Applied and Computational Mathematics RWTH Aachen UniversityAachenGermany High-Performance Computing Center Stuttgart University of StuttgartStuttgartGermany Department of Mathematics and Computer Science University of CologneCologneGermany Center for Data and Simulation Science University of CologneCologneGermany Extreme Computing Research Center(ECRC) Computer Electrical and Mathematical Science and Engineering Division(CEMSE)King Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Saudi Arabia Physical Science and Engineering Division(PSE) King Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Saudi Arabia
We study a temporal step size control of explicit Runge-Kutta(RK)methods for com-pressible computational fluid dynamics(CFD),including the Navier-Stokes equations and hyperbolic systems of conservation laws such as th... 详细信息
来源: 评论
Handling Non-IID Data in Federated Learning: An Experimental Evaluation Towards Unified Metrics
Handling Non-IID Data in Federated Learning: An Experimental...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber science and technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Haller, Marc Lenz, Christian Nachtigall, Robin Awayshehl, Feras M. Alawadi, Sadi Karlsruhe University of Applied Sciences Karlsruhe Germany Institute of Computer Science Delta The University of Tartu Tartu Estonia Blekinge Institute of Technology Department of Computer Science Karlskrona Sweden
Recent research has demonstrated that Non-Identically Distributed (Non-IID) data can negatively impact the performance of global models constructed in federated learning. To address this concern, multiple approaches h... 详细信息
来源: 评论
IDS-INT:Intrusion detection system using transformer-based transfer learning for imbalanced network traffic
收藏 引用
Digital Communications and Networks 2024年 第1期10卷 190-204页
作者: Farhan Ullah Shamsher Ullah Gautam Srivastava Jerry Chun-Wei Lin School of Software Northwestern Polytechnical UniversityXian710072ShaanxiChina Knowledge Unit of Systems and Technology University of Management and TechnologySialkot 51040Pakistan Department of Math and Computer Science Brandon UniversityBrandonMB R7A 6A9Canada Department of Computer Science and Math Lebanese American UniversityBeirut1102Lebanon Western Norway University of Applied Sciences BergenNorway Research Centre for Interneural Computing China Medical UniversityTaichungTaiwanChina
A network intrusion detection system is critical for cyber security against llegitimate *** terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcat... 详细信息
来源: 评论
Construction of computer Network Information Security Protection System Based on Genetic Algorithm  15
Construction of Computer Network Information Security Protec...
收藏 引用
15th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2023
作者: Xiao, Sanxiang Deng, Yihui Li, Ming School of Computer Science Guangzhou College of Applied Science and Technology Guangdong Guangzhou511300 China Guangzhou College of Applied Science and Technology Experimental Training Center Guangdong Guangzhou511300 China School of Computer Science Guangzhou City Construction College Guangdong Guangzhou511300 China
The development of the Internet has brought convenience to people, but also caused security risks. How to establish a protection system that can not only effectively prevent computer network(CN)s from being attacked b... 详细信息
来源: 评论
Analyze the encryption and decryption methods using the Catalan sequence  38
Analyze the encryption and decryption methods using the Cata...
收藏 引用
38th ECMS International Conference on Modelling and Simulation, ECMS 2024
作者: Zdanski, Maciej Walusiak, Lukasz Rylko, Natalia Faculty of Computer Science and Telecommunications Cracow University of Technology Poland Faculty of Architecture Civil Construction and Applied Arts Academy of Silesia Poland
This paper concerns the project and implementation of a cryptographic tool based on the Catalan sequence. It explains the beginnings of cryptography and how people’s approach to transmitting messages has changed over... 详细信息
来源: 评论
Software Reliability Assessment:An Architectural and Component Impact Analysis
收藏 引用
Tsinghua science and technology 2025年 第2期30卷 908-925页
作者: Saleh Alyahyan Mohammed Naif Alatawi Mrim M.Alnfiai Shoayee Dlaim Alotaibi Abdullah Alshammari Zaid Alzaid Hathal Salamah Alwageed Applied College in Dwadmi Shaqra UniverityShaqra 11961Saudi Arabia Department of Information Technology University of TabukTabuk 47713Saudi Arabia Department of Information Technology Taif UniversityTaif 21944Saudi Arabia Department of Artificial Intelligence and Data Science University of HailHail 55431Saudi Arabia College of Computer Science and Engineering University of Hafr AlbatinHafar Albatin 31991Saudi Arabia Department of Computer Science Islamic University of MadinahMadinah 42351Saudi Arabia College of Computer and Information Sciences Jouf UniversitySakaka 42421Saudi Arabia
In the software landscape,understanding component impacts on system reliability is pivotal,especially given the unique complexities of modern software *** paper presents a model tailored for software reliability *** a... 详细信息
来源: 评论
A Survey of Fault Tolerance in Cloud Computing
A Survey of Fault Tolerance in Cloud Computing
收藏 引用
2024 International Symposium of Systems, Advanced Technologies and Knowledge, ISSATK 2024
作者: Elhajjej, Om Kolthoum Alyaoui, Nouha Dardouri, Samia Chabir, Karim Tunisia Higher Institute of Applied Sciences and Technology Computer Science and Telecommunications Department Zarroug Gafsa Tunisia Shaqra University College of Computing and Information Technology Department of Computer Science Saudi Arabia University of Carthage InnoV'COM Laboratory-Sup'Com Tunisia
This paper is designed to provide a comprehensive overview of the latest developments in fault tolerance methods for cloud computing. Maintaining high availability and reliability of cloud environments requires fault ... 详细信息
来源: 评论