咨询与建议

限定检索结果

文献类型

  • 8,282 篇 期刊文献
  • 7,725 篇 会议
  • 214 册 图书

馆藏范围

  • 16,221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,152 篇 工学
    • 4,929 篇 计算机科学与技术...
    • 3,801 篇 软件工程
    • 1,577 篇 电子科学与技术(可...
    • 1,527 篇 信息与通信工程
    • 1,494 篇 电气工程
    • 1,240 篇 控制科学与工程
    • 882 篇 化学工程与技术
    • 872 篇 生物工程
    • 821 篇 材料科学与工程(可...
    • 809 篇 光学工程
    • 683 篇 生物医学工程(可授...
    • 657 篇 机械工程
    • 603 篇 仪器科学与技术
    • 563 篇 动力工程及工程热...
    • 436 篇 力学(可授工学、理...
    • 353 篇 冶金工程
  • 7,969 篇 理学
    • 4,282 篇 物理学
    • 3,053 篇 数学
    • 1,087 篇 生物学
    • 1,025 篇 统计学(可授理学、...
    • 1,012 篇 化学
    • 561 篇 系统科学
    • 323 篇 地球物理学
  • 1,888 篇 管理学
    • 1,224 篇 管理科学与工程(可...
    • 711 篇 图书情报与档案管...
    • 625 篇 工商管理
  • 745 篇 医学
    • 604 篇 临床医学
    • 498 篇 基础医学(可授医学...
    • 291 篇 药学(可授医学、理...
    • 285 篇 公共卫生与预防医...
  • 335 篇 法学
  • 257 篇 经济学
  • 202 篇 农学
  • 184 篇 教育学
  • 37 篇 文学
  • 25 篇 艺术学
  • 24 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 333 篇 deep learning
  • 323 篇 computer science
  • 245 篇 machine learning
  • 199 篇 computational mo...
  • 180 篇 accuracy
  • 162 篇 optimization
  • 155 篇 feature extracti...
  • 152 篇 internet of thin...
  • 134 篇 neural networks
  • 131 篇 data mining
  • 127 篇 artificial intel...
  • 124 篇 support vector m...
  • 123 篇 computational in...
  • 119 篇 hadrons
  • 115 篇 predictive model...
  • 114 篇 real-time system...
  • 103 篇 image segmentati...
  • 99 篇 computer archite...
  • 90 篇 educational inst...
  • 88 篇 covid-19

机构

  • 1,106 篇 cavendish labora...
  • 1,039 篇 department of ph...
  • 992 篇 physikalisches i...
  • 986 篇 oliver lodge lab...
  • 629 篇 fakultät physik ...
  • 573 篇 department of ph...
  • 567 篇 school of physic...
  • 558 篇 horia hulubei na...
  • 555 篇 iccub universita...
  • 547 篇 school of physic...
  • 534 篇 h.h. wills physi...
  • 534 篇 school of physic...
  • 530 篇 imperial college...
  • 524 篇 nikhef national ...
  • 522 篇 university of ch...
  • 522 篇 stfc rutherford ...
  • 512 篇 infn laboratori ...
  • 503 篇 physik-institut ...
  • 501 篇 infn sezione di ...
  • 501 篇 school of physic...

作者

  • 294 篇 barter w.
  • 260 篇 a. gomes
  • 259 篇 beiter a.
  • 254 篇 bellee v.
  • 252 篇 c. alexa
  • 252 篇 blake t.
  • 251 篇 c. amelung
  • 250 篇 j. m. izen
  • 250 篇 g. bella
  • 250 篇 j. strandberg
  • 250 篇 d. calvet
  • 248 篇 g. spigo
  • 248 篇 brundu d.
  • 246 篇 bowcock t.j.v.
  • 245 篇 f. siegert
  • 238 篇 betancourt c.
  • 235 篇 borsato m.
  • 235 篇 s. chen
  • 230 篇 y. tayalati
  • 230 篇 amato s.

语言

  • 13,529 篇 英文
  • 2,557 篇 其他
  • 149 篇 中文
  • 8 篇 日文
  • 7 篇 德文
  • 6 篇 法文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 捷克文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science Applied Computer Technology"
16221 条 记 录,以下是361-370 订阅
排序:
Security in Social Networks and Media  1
Security in Social Networks and Media
收藏 引用
1st IEEE International Conference on Advances in Electronics, Communication, Computing and Intelligent Information Systems, ICAECIS 2023
作者: Jyothi, A.P. Badiger, Vinayak N Shivakumar, Vinyas Ramaiah University of Applied Sciences Faculty of Engineering and Technology Dept. of Computer Science Karnataka Bengaluru India
In today's data-driven world, data privacy and security is of utmost importance. Social media platforms have become the main source of data breaches due to the sheer number of users who are exposed to these risks.... 详细信息
来源: 评论
Mining skyline frequent-utility patterns from big data environment based on MapReduce framework
收藏 引用
Intelligent Data Analysis 2023年 第5期27卷 1359-1377页
作者: Wu, Jimmy Ming-Tai Li, Ranran Wu, Mu-En Lin, Jerry Chun-Wei Department of Information Management National Kaohsiung University of Science and Technology Kaohsiung Taiwan Department of Information and Finance Management National Taipei University of Technology Taipei Taiwan Department of Computer Science Western Norway University of Applied Sciences Bergen Norway
When the concentration focuses on data mining, frequent itemset mining (FIM) and high-utility itemset mining (HUIM) are commonly addressed and researched. Many related algorithms are proposed to reveal the general rel... 详细信息
来源: 评论
Towards Classifying File Segments in Memory Using Machine-Learning  9
Towards Classifying File Segments in Memory Using Machine-Le...
收藏 引用
9th International Conference on Information technology Trends, ITT 2023
作者: Al-Saleh, Mohammed I. Alkouz, Akram Alarabeyyat, Abdulsalam Bouchahma, Majed Jordan University of Science and Technology Computer Science Department Jordan Higher Colleges of Technology Computer Information System United Arab Emirates Al-Balqa Applied University Software Engineering Department Jordan-Salt Jordan
Digital media triage is a main challenge that faces a digital investigator. Knowing what might be useful during crime investigation could greatly save the investigator's time and enhance outcomes. Memory investiga... 详细信息
来源: 评论
Performance Analysis of Routing Protocols in VANETs using OSM, SUMO, and NS2  2
Performance Analysis of Routing Protocols in VANETs using OS...
收藏 引用
2nd IEEE International Conference on Interdisciplinary Approaches in technology and Management for Social Innovation, IATMSI 2024
作者: Thangam, S. Aaditi Avvaru, Ananya Tandon, Aryan Kumari, J. Jesy Janet Saleem Raja, A. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science & Engineering Bengaluru India University of Technology and Applied Sciences-Shinas Oman
With growing urbanization there is a need to manage vehicle-to-vehicle communication for intelligent communication in congested traffic. The performance of the widely used routing protocols AODV, DSDV, DSR, LAR, and Z... 详细信息
来源: 评论
Cloud Computing Malware Detection Using Feature Selection Based on Optimized White Shark Algorithm (WSO)  2
Cloud Computing Malware Detection Using Feature Selection Ba...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Mustafa, Hossam M. J. Al-Zyod, Mohammad H. University Of Petra Faculty Of Information Technology Department Of Data Science And Artificial Intelligence Amman Jordan Al-Balqa Applied University Computer Science Department Salt Jordan
The majority of information technology organizations nowadays prefer cloud computing as their main choice due to improvements in information technology. However, as a result of cloud computing's vast and open arch... 详细信息
来源: 评论
Multi-Tenancy Architecture for Augmented Security in Cloud Computing  5
Multi-Tenancy Architecture for Augmented Security in Cloud C...
收藏 引用
5th International Conference on Inventive Research in Computing Applications, ICIRCA 2023
作者: Koley, Santanu Majumdar, Jayeeta Bera, Mihir Baran Acharjya, Pinaki Pratim Haldia Institute of Technology Dept. of Computer Science & Engineering Haldia India School of Applied Science and Humanities Haldia Institute of Technology Haldia India
Several Virtual Machines (VMs) belonging to various users transparently share physical resources in multi-tenancy cloud milieu. In these situations, implementing an effective access control system can stop unwanted ac... 详细信息
来源: 评论
A Modified Oppositional Chaotic Local Search Strategy Based Aquila Optimizer to Design an Effective Controller for Vehicle Cruise Control System
收藏 引用
Journal of Bionic Engineering 2023年 第4期20卷 1828-1851页
作者: Serdar Ekinci Davut Izci Laith Abualigah Raed Abu Zitar Department of Computer Engineering Batman University72100BatmanTurkey Center for Engineering Application and Technology Solutions Ho Chi Minh City Open UniversityHo Chi MinhVietnam Hourani Center for Applied Scientific Research Al-Ahliyya Amman UniversityAmman19328Jordan Computer Science Department Prince Hussein Bin Abdullah Faculty for Information TechnologyAl Al-Bayt UniversityMafraq25113Jordan Faculty of Information Technology Middle East UniversityAmman11831Jordan Applied Science Research Center Applied Science Private UniversityAmman11931Jordan School of Computer Sciences Universiti Sains Malaysia11800PenangPulau PinangMalaysia Sorbonne Center of Artificial Intelligence Sorbonne University-Abu DhabiAbu DhabiUnited Arab Emirates
In this work,we propose a real proportional-integral-derivative plus second-order derivative(PIDD2)controller as an efficient controller for vehicle cruise control systems to address the challenging issues related to ... 详细信息
来源: 评论
Explainable-AI for DoS Attacks Detection in 5G Network Using Deep Learning Models  5
Explainable-AI for DoS Attacks Detection in 5G Network Using...
收藏 引用
5th International Conference on Intelligent Computing, Communication, Networking and Services, ICCNS 2024
作者: Albashayreh, Amjad Tashtoush, Yahya Aldosary, Abdallah Darwish, Omar Albalas, Firas The University of Jordan Department of Computer Science Amman Jordan Jordan University of Science and Technology Department of Computer Science Irbid Jordan Prince Sattam bin Abdulaziz University The Department of Computer Engineering Ar Riyadh Saudi Arabia Eastern Michigan University Information Security and Applied Computing Department YpsilantiMI48197 United States
With the emergence of the fifth-generation (5G) net-work, numerous revolutionary applications are enabled, including low-latency and machine-type communications. This great in-crease creates a broader security threat ... 详细信息
来源: 评论
GA-Net: Gated Attention Mechanism Based Global Refinement Network for Image Inpainting  29
GA-Net: Gated Attention Mechanism Based Global Refinement Ne...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Qiu, Ran Zhao, Shengrong Liang, Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Underwater images are often affected by problems such as light attenuation, color distortion, noise and scattering, resulting in image defects. A novel image inpainting method is proposed to intelligently predict and ... 详细信息
来源: 评论
Label Few Classify Many: N-Shot GAN for Abnormality Screening Using Chest X-Rays  6th
Label Few Classify Many: N-Shot GAN for Abnormality Screeni...
收藏 引用
6th International Conference on Computational Intelligence in Pattern Recognition, CIPR 2024
作者: Pandey, Priyam Singh, Satish Kumar Santosh, K.C. Applied Artificial Intelligence Research Lab Department of Computer Science University of South Dakota VermillionSD57069 United States Computer Vision and Biometrics Lab Indian Institute of Information Technology Allahabad Prayagraj211015 India
Typical machine learning models typically demand a substantial volume of data for effective training, ensuring optimal performance during testing. However, these models often fail to specify the extent of data require... 详细信息
来源: 评论