咨询与建议

限定检索结果

文献类型

  • 8,279 篇 期刊文献
  • 7,674 篇 会议
  • 212 册 图书

馆藏范围

  • 16,165 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,102 篇 工学
    • 4,883 篇 计算机科学与技术...
    • 3,769 篇 软件工程
    • 1,576 篇 电子科学与技术(可...
    • 1,530 篇 信息与通信工程
    • 1,490 篇 电气工程
    • 1,237 篇 控制科学与工程
    • 880 篇 化学工程与技术
    • 873 篇 生物工程
    • 829 篇 材料科学与工程(可...
    • 803 篇 光学工程
    • 677 篇 生物医学工程(可授...
    • 660 篇 机械工程
    • 599 篇 仪器科学与技术
    • 567 篇 动力工程及工程热...
    • 438 篇 力学(可授工学、理...
    • 350 篇 冶金工程
  • 7,957 篇 理学
    • 4,269 篇 物理学
    • 3,048 篇 数学
    • 1,082 篇 生物学
    • 1,030 篇 统计学(可授理学、...
    • 1,013 篇 化学
    • 560 篇 系统科学
    • 324 篇 地球物理学
  • 1,877 篇 管理学
    • 1,220 篇 管理科学与工程(可...
    • 705 篇 图书情报与档案管...
    • 624 篇 工商管理
  • 743 篇 医学
    • 605 篇 临床医学
    • 500 篇 基础医学(可授医学...
    • 291 篇 药学(可授医学、理...
  • 329 篇 法学
    • 281 篇 社会学
  • 260 篇 经济学
  • 196 篇 农学
  • 185 篇 教育学
  • 37 篇 文学
  • 25 篇 艺术学
  • 24 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 333 篇 deep learning
  • 323 篇 computer science
  • 248 篇 machine learning
  • 198 篇 computational mo...
  • 174 篇 accuracy
  • 162 篇 optimization
  • 155 篇 feature extracti...
  • 150 篇 internet of thin...
  • 133 篇 neural networks
  • 132 篇 data mining
  • 122 篇 computational in...
  • 121 篇 artificial intel...
  • 120 篇 support vector m...
  • 119 篇 predictive model...
  • 118 篇 real-time system...
  • 117 篇 hadrons
  • 106 篇 image segmentati...
  • 100 篇 computer archite...
  • 90 篇 educational inst...
  • 87 篇 covid-19

机构

  • 1,108 篇 cavendish labora...
  • 1,040 篇 department of ph...
  • 991 篇 oliver lodge lab...
  • 991 篇 physikalisches i...
  • 618 篇 fakultät physik ...
  • 572 篇 department of ph...
  • 569 篇 school of physic...
  • 559 篇 horia hulubei na...
  • 552 篇 iccub universita...
  • 546 篇 school of physic...
  • 535 篇 school of physic...
  • 534 篇 h.h. wills physi...
  • 530 篇 imperial college...
  • 526 篇 nikhef national ...
  • 522 篇 university of ch...
  • 522 篇 stfc rutherford ...
  • 511 篇 infn laboratori ...
  • 508 篇 physik-institut ...
  • 503 篇 school of physic...
  • 502 篇 henryk niewodnic...

作者

  • 284 篇 barter w.
  • 264 篇 a. gomes
  • 262 篇 beiter a.
  • 252 篇 c. alexa
  • 252 篇 c. amelung
  • 251 篇 bellee v.
  • 250 篇 j. m. izen
  • 250 篇 g. bella
  • 250 篇 j. strandberg
  • 250 篇 d. calvet
  • 248 篇 g. spigo
  • 246 篇 blake t.
  • 244 篇 f. siegert
  • 244 篇 bowcock t.j.v.
  • 243 篇 brundu d.
  • 239 篇 s. chen
  • 233 篇 betancourt c.
  • 230 篇 y. tayalati
  • 230 篇 borsato m.
  • 227 篇 amato s.

语言

  • 15,126 篇 英文
  • 891 篇 其他
  • 139 篇 中文
  • 8 篇 日文
  • 5 篇 德文
  • 4 篇 法文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science Applied Computer Technology"
16165 条 记 录,以下是411-420 订阅
排序:
Image Captcha Blended with OTP for Secured Authentication  1
收藏 引用
7th International Conference on Intelligent Computing and Optimization, ICO 2023
作者: Bazeer Ahamed, B. Krishnamoorthy, Murugan University of Technology and Applied Sciences College of Computing and Information Sciences Al Musannah Oman School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India
With the recent development in digital currency, the number of online transactions done every day is increasing exponentially. Along with the growing need for online transactions various attacks are developed to mimic... 详细信息
来源: 评论
A new method for human activity identification using convolutional neural networks
收藏 引用
International Journal of Cloud Computing 2023年 第2-4期12卷 191-200页
作者: Prakash, P.S. Balakrishnan, S. Venkatachalam, K. Balasubramanian, Saravana Balaji Department of Computer Science and Engineering Vivekanandha College of Engineering for Women Namakkal Tiruchengode637205 India Department of Computer Science and Business Systems Sri Krishna College of Engineering and Technology Tamilnadu Coimbatore India Department of Applied Cybernetics Faculty of Science University of Hradec Králové Hradec Králové50003 Czech Republic Department of Information Technology Lebanese French University Erbil Iraq
Body fitness monitoring applications are using mobile sensors to identify human activities. Human activity identification is a challenging task because of the wide availability of human activities. This paper proposes... 详细信息
来源: 评论
A variable structure model of neurons’ application in computer vision
收藏 引用
Multimedia Tools and Applications 2025年 1-11页
作者: Sridi, Alaeddine Attia, Mouna Bouallegue, Kais Electronics and Micro-Electronics Laboratory Faculty of Sciences of Monastir University of Monastir Monastir Tunisia The Higher Institute of Computer Science and Communication Technologies of Hammam Sousse University of Sousse Sousse Tunisia Laboratory of Computer Science Parallelism and Intelligent Communicating Systems Faculty of Sciences of Tunisia University of Tunis ELManar Tunis Tunisia Department of Electrical Engineering Higher Institute of Applied Sciences and Technology of Sousse University of Sousse Sousse Tunisia
The neuron doctrine defines the neuron as the basic unit of the nervous system, which drives the dynamic behavior of our organs. This has led to neurons becoming the focus of modern neuroscience research and to the ri... 详细信息
来源: 评论
Reseed Skipping of Linear Congruential Generator for Multi-level Image Steganography Security of Financial Data
收藏 引用
SN computer science 2023年 第2期4卷 124页
作者: Danso, Juliana Mantebea Missah, Yaw Marfo Gyamfi, Enoch Opanin Dankwa, Stephen Kwabena, Sarpong Department of Computer Science Kwame Nkrumah University of Science and Technology (KNUST) Kumasi Ghana School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Department of Cyber Security and Computer Engineering Technology School of Computing and Information Sciences C.K. Tedam University of Technology and Applied Sciences Upper East Region Navrongo Ghana School of Automation Engineering University of Electronic Science and Technology of China Chengdu China
This paper proposed a multi-level image steganography model that integrates with image and plaintext encryption schemes. The model starts by partitioning the cover-image pixel positions into two regions of respective ... 详细信息
来源: 评论
A Continual Learning System with Self Domain Shift Adaptation for Fake News Detection  10
A Continual Learning System with Self Domain Shift Adaptatio...
收藏 引用
10th IEEE International Conference on Data science and Advanced Analytics, DSAA 2023
作者: Basterrech, Sebastian Kasprzak, Andrzej Platos, Jan Wozniak, Michal Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby Denmark Wroclaw University of Science and Technology Department of Systems and Computer Networks Wroclaw Poland VŠB-Technical University of Ostrava Faculty of Electrical Engineering and Computer Science Ostrava Czech Republic
Detecting fake news is currently one of the critical challenges facing modern societies. The problem is particularly relevant, as disinformation is readily used for political warfare but can also cause significant har... 详细信息
来源: 评论
AI Modeling and Water Quality Sensing Technique Proffers Water Security: An Open Review  3
AI Modeling and Water Quality Sensing Technique Proffers Wat...
收藏 引用
3rd International Conference on Electronics and Renewable Systems, ICEARS 2025
作者: Wilfred Blessing, N.R. Palarimath, Suresh Gunasekaran, Hemalatha Haidar, Sk Wasim Sutherlin Subitha, G. Sarmila, J. University of Technology and Applied Sciences College of Computing and Information Sciences Ibri Oman University of Technology and Applied Sciences College of Computing and Information Sciences Salalah Oman Stella Mary's College of Engineering Department of Computer Science and Engineering Kanyakumari District India St. Xavier's Catholic College of Engineering Department of Computer Science and Engineering Tamil Nadu Chunkankadai India
Water Quality Sensors (WQSs) are becoming a promised tool in water quality data assessment and scientific value of aquatic structure. Such sensors are broadly used to produce live results by evaluating major water qua... 详细信息
来源: 评论
Innovative Approaches to Arabic Author Identification: A Comprehensive Evaluation of Classical and Deep Learning Approaches  2
Innovative Approaches to Arabic Author Identification: A Com...
收藏 引用
2nd International Conference of Intelligent Methods, Systems and Applications, IMSA 2024
作者: Almanaseer, Waref Alsekait, Deema Mohammed Gomaa, Ibrahim A Zeid, Magdy Abd-Elghany Abdelaziz, Amr Elsabbagh, Belal Essam, George Nader, Nour Abdelminaam, Diaa Salama Applied Science Private University Faculty of Information Technology Amman11931 Jordan Applied College Princess Nourah Bint Abdulrahman University Department of Computer Science and Information Technology Riyadh11671 Saudi Arabia Alobour high institute for computer and informatics Computer Science Department Cairo Egypt Misr International University Faculty of Computer Science Cairo Egypt Jadara University Jadara Research Center Irbid21110 Jordan Benha University Faculty of Computers and Artificial Intelligence Benha Egypt MEU Research Unit Middle East University Amman11831 Jordan
The amount of written text on the internet has grown exponentially. When pairing that with the difficulties in sourcing the author of a text, a need emerges to be able to verify claimed author of text and attribute an... 详细信息
来源: 评论
Parameter estimation of continuous variable quantum key distribution system via artificial neural networks
收藏 引用
Chinese Physics B 2022年 第2期31卷 233-241页
作者: Hao Luo Yi-Jun Wang Wei Ye Hai Zhong Yi-Yu Mao Ying Guo School of Automation Central South UniversityChangsha 410083China School of Computer Science and Engineering Central South UniversityChangsha 410083China College of Applied Science Jiangxi University of Science and TechnologyGanzhou 341000China
Continuous-variable quantum key distribution(CVQKD)allows legitimate parties to extract and exchange secret ***,the tradeoff between the secret key rate and the accuracy of parameter estimation still around the presen... 详细信息
来源: 评论
Uncovering Android Zero-Day Threats: The Zero-Vuln Approach with Deep and Zero-Shot Learning  2
Uncovering Android Zero-Day Threats: The Zero-Vuln Approach ...
收藏 引用
2nd International Conference on Computing and Data Analytics, ICCDA 2024
作者: Palarimath, Suresh Maran, Pyingkodi Wilfred Blessing, N.R. Kavitha, S.J. Cibi, A. Sutherlin, Subitha G. College of Computing and Information Sciences University of Technology and Applied Sciences Salalah Oman Kongu Engineering College Department of Computer Applications Erode India College of Computing and Information Sciences University of Technology and Applied Sciences Ibri Oman Department of Computer Science and Engineering Pallavaram Chennai India Virtusa Consulting Services Private Limited Chennai India Stella Mary's College of Engineering Department of Computer Science and Engineering Kanyakumari India
The growing occurrence of cybersecurity hazards, such as Android zero-day vulnerabilities, poses substantial difficulties because they are unattended and imperceptible. With the increasing popularity of Android smartp... 详细信息
来源: 评论
Diabetes Prediction Algorithm Using Recursive Ridge Regression L2
收藏 引用
computers, Materials & Continua 2022年 第4期71卷 457-471页
作者: Milos Mravik T.Vetriselvi K.Venkatachalam Marko Sarac Nebojsa Bacanin Sasa Adamovic Department of Computer Science Singidunum UniversityBelgrade11000Serbia Department of Computer science and Engineering K.Ramakrishnan College of TechnologyTrichy621112India Department of Applied Cybernetics Faculty of ScienceUniversity of Hradec Králové50003Hradec KrálovéCzech Republic
At present,the prevalence of diabetes is increasing because the human body cannot metabolize the glucose *** prediction of diabetes patients is an important research *** researchers have proposed techniques to predict... 详细信息
来源: 评论