咨询与建议

限定检索结果

文献类型

  • 8,310 篇 期刊文献
  • 7,735 篇 会议
  • 213 册 图书

馆藏范围

  • 16,258 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,167 篇 工学
    • 4,930 篇 计算机科学与技术...
    • 3,788 篇 软件工程
    • 1,577 篇 电子科学与技术(可...
    • 1,551 篇 信息与通信工程
    • 1,511 篇 电气工程
    • 1,264 篇 控制科学与工程
    • 887 篇 化学工程与技术
    • 874 篇 生物工程
    • 833 篇 材料科学与工程(可...
    • 807 篇 光学工程
    • 680 篇 生物医学工程(可授...
    • 664 篇 机械工程
    • 608 篇 仪器科学与技术
    • 575 篇 动力工程及工程热...
    • 441 篇 力学(可授工学、理...
    • 350 篇 冶金工程
  • 7,988 篇 理学
    • 4,290 篇 物理学
    • 3,060 篇 数学
    • 1,089 篇 生物学
    • 1,032 篇 统计学(可授理学、...
    • 1,026 篇 化学
    • 561 篇 系统科学
    • 326 篇 地球物理学
  • 1,900 篇 管理学
    • 1,236 篇 管理科学与工程(可...
    • 725 篇 图书情报与档案管...
    • 622 篇 工商管理
  • 759 篇 医学
    • 610 篇 临床医学
    • 500 篇 基础医学(可授医学...
    • 294 篇 公共卫生与预防医...
    • 292 篇 药学(可授医学、理...
  • 335 篇 法学
  • 256 篇 经济学
  • 196 篇 农学
  • 192 篇 教育学
  • 38 篇 文学
  • 25 篇 艺术学
  • 24 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 338 篇 deep learning
  • 321 篇 computer science
  • 253 篇 machine learning
  • 201 篇 computational mo...
  • 179 篇 accuracy
  • 163 篇 optimization
  • 154 篇 feature extracti...
  • 153 篇 internet of thin...
  • 133 篇 neural networks
  • 132 篇 data mining
  • 128 篇 artificial intel...
  • 124 篇 support vector m...
  • 122 篇 computational in...
  • 118 篇 real-time system...
  • 117 篇 hadrons
  • 117 篇 predictive model...
  • 105 篇 image segmentati...
  • 100 篇 computer archite...
  • 90 篇 educational inst...
  • 88 篇 covid-19

机构

  • 1,111 篇 cavendish labora...
  • 1,043 篇 department of ph...
  • 1,000 篇 physikalisches i...
  • 994 篇 oliver lodge lab...
  • 628 篇 fakultät physik ...
  • 572 篇 department of ph...
  • 570 篇 school of physic...
  • 559 篇 horia hulubei na...
  • 555 篇 iccub universita...
  • 546 篇 school of physic...
  • 534 篇 h.h. wills physi...
  • 533 篇 school of physic...
  • 531 篇 imperial college...
  • 525 篇 nikhef national ...
  • 523 篇 university of ch...
  • 523 篇 stfc rutherford ...
  • 514 篇 infn laboratori ...
  • 502 篇 infn sezione di ...
  • 502 篇 physik-institut ...
  • 501 篇 infn sezione di ...

作者

  • 292 篇 barter w.
  • 264 篇 a. gomes
  • 257 篇 beiter a.
  • 254 篇 bellee v.
  • 253 篇 c. alexa
  • 252 篇 c. amelung
  • 252 篇 blake t.
  • 251 篇 j. m. izen
  • 251 篇 g. bella
  • 251 篇 j. strandberg
  • 251 篇 d. calvet
  • 249 篇 g. spigo
  • 248 篇 brundu d.
  • 246 篇 f. siegert
  • 244 篇 bowcock t.j.v.
  • 239 篇 s. chen
  • 238 篇 betancourt c.
  • 235 篇 borsato m.
  • 231 篇 y. tayalati
  • 230 篇 amato s.

语言

  • 13,561 篇 英文
  • 2,562 篇 其他
  • 149 篇 中文
  • 8 篇 德文
  • 8 篇 日文
  • 6 篇 法文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 捷克文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science Applied Computer Technology"
16258 条 记 录,以下是4681-4690 订阅
排序:
A novel ensemble method for enhancing Internet of Things device security against botnet attacks
收藏 引用
Decision Analytics Journal 2023年 8卷
作者: Arshad, Amina Jabeen, Maira Ubaid, Saqib Raza, Ali Abualigah, Laith Aldiabat, Khaled Jia, Heming Institute of Computer Science Khwaja Fareed University of Engineering and Information Technology Rahim Yar Khan 64200 Pakistan Computer Science Department Prince Hussein Bin Abdullah Faculty for Information Technology Al al-Bayt University Mafraq 25113 Jordan Department of Electrical and Computer Engineering Lebanese American University Byblos 13-5053 Lebanon Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman 19328 Jordan MEU Research Unit Middle East University Amman 11831 Jordan Applied science research center Applied science private university Amman 11931 Jordan School of Computer Sciences Universiti Sains Malaysia Pulau Pinang 11800 Malaysia School of Engineering and Technology Sunway University Malaysia Petaling Jaya 27500 Malaysia Department of Management Information Systems Ajloun National University Jordan School of Information Engineering Sanming University Sanming 365004 China
The growing number of connected Internet of Things (IoT) devices has led to the daily growth of network botnet attacks. The networks of compromised devices controlled by a single entity can be used for malicious purpo... 详细信息
来源: 评论
Blockchain technology, Structure, and Applications: A Survey
收藏 引用
Procedia computer science 2024年 237卷 645-658页
作者: Nazanin Moosavi Hamed Taherdoost Nachaat Mohamed Mitra Madanchian Yousef Farhaoui Inam Ullah Khan Research and Development Departement Hamta Business Corporation Vancouver Canada Department of Arts Communications and Social Sciences University Canada West Vancouver Canada QMinded | Quark Minded Technology Inc Vancouver Canada College of Technology and Engineering Westcliff University Irvine USA Rabdan Academy (HLS) Abu Dhabi UAE Fairleigh Dickinson University Vancouver Canada Department of Computer Science Faculty of Sciences and Technic Moulay Ismail University Moroccoo Department of Electronic Engineering School of Engineering and Applied Science Isra University Pakistan
Blockchain-based decentralized technology has gained a lot of attractions and interest in academia and industry. This peer-to-peer and transparent blockchain network makes it an acceptable technology. This decentraliz... 详细信息
来源: 评论
A Hybrid Deep Neural Network with Attention Mechanism for Human Activity Recognition Based on Smartphone Sensors
A Hybrid Deep Neural Network with Attention Mechanism for Hu...
收藏 引用
International Conference on Information technology (INCIT)
作者: Sakorn Mekruksavanich Datchakorn Tancharoen Anuchit Jitpattanakul Department of Computer Engineering School of Information and Communication Technology University of Phayao Phayao Thailand Faculty of Engineering and Technology Panyapiwat Institute of Management Nonthaburi Thailand Department of Mathematics Intelligent and Nonlinear Dynamic Innovations Research Center Faculty of Applied Science King Mongkut’s University of Technology North Bangkok Bangkok Thailand
Human activity recognition (HAR) is an area of study that seeks to automatically and precisely detect an individual’s behavior by analyzing bio-signal data. Bio-signal data can be acquired using sensing technology in...
来源: 评论
Android CompCache based on Graphics Processing Unit  7
Android CompCache based on Graphics Processing Unit
收藏 引用
7th International Conference on Software Defined Systems, SDS 2020
作者: Almiani, Muder Razaque, Abdul Ziqi, Shen Yaqin, Ge Atiewi, Saleh Alweshah, Mohammed Al-Dmour, Ayman Magableh, Basel Al-Hussein Bin Talal University College of Information Technology Jordan International IT University Dept. of Computer Engineering Telecommunication Almaty Kazakhstan New York Institute of Technology Department of Computer Science Nanjing Campus China Al-Balqa Applied University Amman Jordan Applied Science University Department of Computer Science Manama Bahrain Technological University Dublin Ireland
Android systems have been successfully developed to meet the demands of users. The following four methods are used in Android systems for memory management: backing swap, CompCache, traditional Linux swap, and low mem... 详细信息
来源: 评论
A deterministic model of COVID-19 with differential infectivity and vaccination booster
收藏 引用
Decision Analytics Journal 2024年 10卷
作者: Tchoumi, Stephane Y. Schwartz, Elissa J. Tchuenche, Jean M. Department of Mathematics and Computer Sciences ENSAI University of NGaoundéré PO Box 455 Ngaoundéré Cameroon Department of Mathematics and Applied Mathematics University of Pretoria South Africa Department of Mathematics & Statistics and School of Biological Sciences Washington State University PO Box 643113 Pullman 99164-3113 WA United States School of Computer Science and Applied Mathematics University of the Witwatersrand Johannesburg South Africa School of Computational and Communication Sciences and Engineering Nelson Mandela African Institution of Science and Technology Arusha Tanzania
Vaccine boosters have been recommended to mitigate the spread of the coronavirus disease 2019 (COVID-19) pandemic. A mathematical model with three vaccine doses and susceptibility is formulated. The model is calibrate... 详细信息
来源: 评论
Strong hanani-tutte for the torus  37
Strong hanani-tutte for the torus
收藏 引用
37th International Symposium on Computational Geometry, SoCG 2021
作者: Fulek, Radoslav Pelsmajer, Michael J. Schaefer, Marcus Department of Mathematics UC San Diego San DiegoCA United States Department of Applied Mathematics Illinois Institute of Technology ChicagoIL United States Department of Computer Science DePaul University ChicagoIL United States
If a graph can be drawn on the torus so that every two independent edges cross an even number of times, then the graph can be embedded on the torus. © Radoslav Fulek, Michael J. Pelsmajer, and Marcus Schaefer;lic... 详细信息
来源: 评论
Reliability-Redundancy Optimization of an Overspeed Protection System of a Gas Turbine by Modified Wild Horse Optimizer
Reliability-Redundancy Optimization of an Overspeed Protecti...
收藏 引用
Disruptive Technologies (ICDT), International Conference on
作者: Shshank Chaube Sangeeta Pant B.P. Joshi Anuj Kumar Manoj K. Singh Ketan Kotecha Department of Physical Sciences Jaypee University Anoopshar Uttar Pradesh India Department of Applied Sciences Symbiosis Institute of Technology Symbiosis International (Deemed University) (SIU) Lavale Pune Maharashtra India Department of Mathematics Graphic Era Hill University Bhimtal India School of Computer Science Engg. & Applications D. Y. Patil International University (DYPIU) Akurdi Pune India School of Computer Science Engineering and Technology Bennett University Techzone II Greater Noida Uttar Pradesh India Symbiosis Institute of Technology Symbiosis International (Deemed University) (SIU) Lavale Pune Maharashtra India
This article addresses the persistent challenges involved in the complex system reliability redundancy optimization of the overspeed protection system of a gas turbine (OPSGT), which is an essential complex system for...
来源: 评论
Recent results of the CKM angle γ measurement at the lhcb and prospects for Run 3 and run 4
Recent results of the CKM angle γ measurement at the lhcb a...
收藏 引用
作者: Krupa, Wojciech AGH University of Science and Technology Faculty of Physics and Applied Computer Science al. Mickiewicza 30 Kraków30-059 Poland
The Standard Model (SM) description of the CP violation can be tested by over-constraining the angles of the Unitary Triangle. Discrepancies between precise measurements of the Cabibbo–Kobayashi–Maskawa (CKM) angle ...
来源: 评论
Hybrid Quantum-Classical Multilevel Approach for Maximum Cuts on Graphs
Hybrid Quantum-Classical Multilevel Approach for Maximum Cut...
收藏 引用
IEEE Conference on High Performance Extreme Computing (HPEC)
作者: Anthony Angone Xiaoyuan Liu Ruslan Shaydulin Ilya Safro Quantum Science and Engineering University of Delaware Newark DE Fujitsu Research of America Inc. Sunnyvale CA Global Technology Applied Research JPMorgan Chase New York NY Department of Computer and Information Sciences University of Delaware Newark DE
Combinatorial optimization is one of the fields where near term quantum devices are being utilized with hybrid quantum-classical algorithms to demonstrate potentially practical applications of quantum computing. One o...
来源: 评论
Knowledge-based Implementation of Deep Reinforcement Learning Agents in Assembly
收藏 引用
Procedia CIRP 2022年 112卷 459-464页
作者: Marcus Röhler Johannes Schilp Fraunhofer Research Institution for Casting Composite and Processing Technology IGCV Am Technologiezentrum 10 86159 Augsburg Germany Chair of Digital Manufacturing Faculty of Applied Computer Science Augsburg University Eichleitnerstr. 30 86159 Augsburg Germany
Robotic systems based on Deep Reinforcement Learning have shown great potential to enable assembly systems with higher flexibility and robustness. This paper presents a concept of a Case-Based Reasoning system to auto... 详细信息
来源: 评论