咨询与建议

限定检索结果

文献类型

  • 8,198 篇 期刊文献
  • 7,627 篇 会议
  • 212 册 图书

馆藏范围

  • 16,037 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,008 篇 工学
    • 4,831 篇 计算机科学与技术...
    • 3,741 篇 软件工程
    • 1,561 篇 电子科学与技术(可...
    • 1,510 篇 信息与通信工程
    • 1,470 篇 电气工程
    • 1,214 篇 控制科学与工程
    • 869 篇 化学工程与技术
    • 867 篇 生物工程
    • 819 篇 材料科学与工程(可...
    • 798 篇 光学工程
    • 674 篇 生物医学工程(可授...
    • 649 篇 机械工程
    • 596 篇 仪器科学与技术
    • 564 篇 动力工程及工程热...
    • 436 篇 力学(可授工学、理...
    • 348 篇 冶金工程
  • 7,890 篇 理学
    • 4,243 篇 物理学
    • 3,029 篇 数学
    • 1,072 篇 生物学
    • 1,024 篇 统计学(可授理学、...
    • 1,000 篇 化学
    • 560 篇 系统科学
    • 322 篇 地球物理学
  • 1,862 篇 管理学
    • 1,210 篇 管理科学与工程(可...
    • 699 篇 图书情报与档案管...
    • 616 篇 工商管理
  • 737 篇 医学
    • 599 篇 临床医学
    • 496 篇 基础医学(可授医学...
    • 291 篇 药学(可授医学、理...
  • 324 篇 法学
    • 277 篇 社会学
  • 258 篇 经济学
  • 195 篇 农学
  • 183 篇 教育学
  • 37 篇 文学
  • 25 篇 艺术学
  • 24 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 324 篇 deep learning
  • 322 篇 computer science
  • 245 篇 machine learning
  • 195 篇 computational mo...
  • 172 篇 accuracy
  • 161 篇 optimization
  • 151 篇 feature extracti...
  • 149 篇 internet of thin...
  • 133 篇 neural networks
  • 131 篇 data mining
  • 120 篇 predictive model...
  • 119 篇 support vector m...
  • 119 篇 artificial intel...
  • 118 篇 computational in...
  • 118 篇 real-time system...
  • 117 篇 hadrons
  • 106 篇 image segmentati...
  • 100 篇 computer archite...
  • 90 篇 educational inst...
  • 86 篇 covid-19

机构

  • 1,106 篇 cavendish labora...
  • 1,038 篇 department of ph...
  • 991 篇 physikalisches i...
  • 989 篇 oliver lodge lab...
  • 616 篇 fakultät physik ...
  • 572 篇 department of ph...
  • 567 篇 school of physic...
  • 559 篇 horia hulubei na...
  • 552 篇 iccub universita...
  • 547 篇 school of physic...
  • 535 篇 school of physic...
  • 534 篇 h.h. wills physi...
  • 532 篇 imperial college...
  • 528 篇 nikhef national ...
  • 524 篇 stfc rutherford ...
  • 522 篇 university of ch...
  • 510 篇 physik-institut ...
  • 510 篇 infn laboratori ...
  • 505 篇 school of physic...
  • 504 篇 henryk niewodnic...

作者

  • 284 篇 barter w.
  • 266 篇 a. gomes
  • 262 篇 beiter a.
  • 253 篇 c. alexa
  • 253 篇 c. amelung
  • 251 篇 j. m. izen
  • 251 篇 g. bella
  • 251 篇 j. strandberg
  • 251 篇 d. calvet
  • 251 篇 bellee v.
  • 248 篇 g. spigo
  • 246 篇 blake t.
  • 244 篇 f. siegert
  • 244 篇 bowcock t.j.v.
  • 243 篇 brundu d.
  • 239 篇 s. chen
  • 233 篇 betancourt c.
  • 230 篇 y. tayalati
  • 230 篇 borsato m.
  • 227 篇 amato s.

语言

  • 15,361 篇 英文
  • 532 篇 其他
  • 136 篇 中文
  • 8 篇 日文
  • 4 篇 德文
  • 4 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science Applied Computer Technology"
16037 条 记 录,以下是481-490 订阅
排序:
Classification Attack on IoT Devices with Machine Learning  9
Classification Attack on IoT Devices with Machine Learning
收藏 引用
9th IEEE International Conference on Computational Intelligence and Applications, ICCIA 2024
作者: Charoenwong, Nutcha Kosolsombat, Somkiat Ratanavilisagul, Chiabwoot College of Interdisciplinary Studies Thammasat University Data Science and Innovation Pathum Thani Thailand King Mongkut's University of Technology Faculty of Applied Science Department of Computer and Information Science North Bangkok Thailand
Internet of Things (IoT) devices are small, low-power devices used for detecting and processing data remotely through the internet. These devices have increasingly been integrated into our daily lives, both in the dig... 详细信息
来源: 评论
AI-Enhanced Virtual Twin Modelling for Strengthening IoT Software Security Protocols  1
AI-Enhanced Virtual Twin Modelling for Strengthening IoT Sof...
收藏 引用
1st International Conference on Software, Systems and Information technology, SSITCON 2024
作者: Kumara, Bharath Barmola, Pareshwar Prasad Arora, Renuka Parikh, Swapnil M Maranan, Ramya Ramaiah University of Applied Science Department of Electronics and Communication Engineering Bengaluru India Graphic Era Deemed to Be University Department of Computer Science and Engineering Dehradun India Jagannath University Department of Computer Science and Engineering Haryana India Parul Institute of Engineering and Technology Parul University Faculty of Computer Science and Engineering Vadodara India Simats Saveetha School of Engineering Department of Research and Innovation Chennai India
To fortify security mechanisms in software systems for the Internet of Things (IoT), this article presents a framework for AI-Enhanced Virtual Twin Modelling. In order to track and examine the actions of IoT devices i... 详细信息
来源: 评论
Machine Learning Classification for Intrusion Detection on computer Networks  9
Machine Learning Classification for Intrusion Detection on C...
收藏 引用
9th IEEE International Conference on Computational Intelligence and Applications, ICCIA 2024
作者: Tachaapornchai, Abhibhu Kosolsombat, Somkiat Ratanavilisagul, Chiabwoot Data Science and Innovation College of Interdisciplinary Studies Thammasat University Pathum Thani Thailand King Mongkut's University of Technology Faculty of Applied Science Department of Computer and Information Science North Bangkok Thailand
To build an intelligent intrusion detection system, it is essential to have a suitable and high-quality dataset with a sufficiently large quantity to simulate real-world scenarios. The NSL-KDD dataset is an improved v... 详细信息
来源: 评论
Harnessing Deep Learning for Effective Extractive Text Summarization: A Comparative Study  2
Harnessing Deep Learning for Effective Extractive Text Summa...
收藏 引用
2nd International Conference of Intelligent Methods, Systems and Applications, IMSA 2024
作者: Alsekait, Deema Mohammed Almanaseer, Waref Gomaa, Ibrahim A Zeid, Magdy Abd-Elghany Baligh, Salma Alaa, Hana Hegazy, Jasmine Magdy, Julia Eldmrat, Alaa Tariq Abdelminaam, Diaa Salama Applied College Princess Nourah Bint Abdulrahman University Department of Computer Science and Information Technology Saudi Arabia Applied Science Private University Faculty of Information Technology Amman11931 Jordan Alobour high institute for computer and informatics Computer Science Department Cairo Egypt Misr International University Faculty of Computer Science Cairo Egypt Midocean University Faculty of Human Sciences United Arab Emirates Jadara University Jadara Research Center Irbid21110 Jordan Misr International University Egypt MEU Research Unit Middle East University Faculty of Computers Amman11831 Jordan
Text Summarization might seem like a trivial problem, but in reality, is essential for data acquisition and understanding by compressing large amounts of text into specific a nd to-the-point summaries. This research i... 详细信息
来源: 评论
Towards Differentiating Between Failures and Domain Shifts in Industrial Data Streams
Towards Differentiating Between Failures and Domain Shifts i...
收藏 引用
2024 Workshop on Embracing Human-Aware AI in Industry 5.0, HAII5.0 2024
作者: Wojak-Strzelecka, Natalia Bobek, Szymon Nalepa, Grzegorz J. Stefanowski, Jerzy Jagiellonian Human-Centered AI Lab Mark Kac Center for Complex Systems Research Institute of Applied Computer Science Faculty of Physics Astronomy and Applied Computer Science Jagiellonian University ul. prof. Stanislawa Lojasiewicza 11 Krakow30-348 Poland Institute of Computing Science Poznań University of Technology Poznań60-965 Poland
Anomaly and failure detection methods are crucial in identifying deviations from normal system operational conditions, which allows for actions to be taken in advance, usually preventing more serious damages. Long-las... 详细信息
来源: 评论
PDF Malware Detection Using Machine Learning  9
PDF Malware Detection Using Machine Learning
收藏 引用
9th IEEE International Conference on Computational Intelligence and Applications, ICCIA 2024
作者: Tantikulvichit, Naragorn Kosolsombat, Somkiat Ratanavilisagul, Chiabwoot College of Interdisciplinary Studies Thammasat University Data Science and Innovation Pathum Thani Thailand King Mongkut's University of Technology Faculty of Applied Science Department of Computer and Information Science North Bangkok Thailand
In today's world, cyber-attacks are on the rise, and PDF files are commonly used as a means of attack. One common type of attack through PDF files is the covert embedding of dangerous malware and tricking users in... 详细信息
来源: 评论
Improved Reptile Search Algorithm by Salp Swarm Algorithm for Medical Image Segmentation
收藏 引用
Journal of Bionic Engineering 2023年 第4期20卷 1766-1790页
作者: Laith Abualigah Mahmoud Habash Essam Said Hanandeh Ahmad MohdAziz Hussein Mohammad Al Shinwan Raed Abu Zitar Heming Jia Computer Science Department Prince Hussein Bin Abdullah Faculty for Information TechnologyAl Al-Bayt UniversityMafraq25113Jordan Hourani Center for Applied Scientific Research Al-Ahliyya Amman UniversityAmman19328Jordan Faculty of Information Technology Middle East UniversityAmman11831Jordan Applied Science Research Center Applied Science Private UniversityAmman11931Jordan School of Computer Sciences Universiti Sains Malaysia11800Pulau PinangMalaysia Amman Arab University AmmanJordan Department of Computer Information System Zarqa UniversityP.O.Box 13132ZarqaJordan Deanship of E-Learning and Distance Education Umm Al-Qura UniversityMakkah21955Saudi Arabia Faculty of Information Technology Applied Science Private UniversityAmman11931Jordan Sorbonne Center of Artificial Intelligence Sorbonne University-Abu DhabiAbu DhabiUnited Arab Emirates School of Information Engineering Sanming UniversitySanming365004China
This study proposes a novel nature-inspired meta-heuristic optimizer based on the Reptile Search Algorithm combed with Salp Swarm Algorithm for image segmentation using gray-scale multi-level thresholding,called *** p... 详细信息
来源: 评论
Exploring Research Opportunities to Apply Data Mining Techniques in Software Engineering Lifecycle  1
Exploring Research Opportunities to Apply Data Mining Techni...
收藏 引用
1st International Conference on Advances in Electrical, Electronics and Computational Intelligence, ICAEECI 2023
作者: Anitha Gracy, J. Parthasarathy, S. Bagavathilaksmi, R. Thiagarajar College of Engineering Applied Mathametics and Computational Science Madurai India VELS Institute of Science Technology and Advanced Studies Department of Computer Application/Information Technology Chennai India
This Software engineering (SE) is the core research area of the software industry, and numerous algorithms and frameworks are proposed every day. Software Engineering is the discipline that keeps up with recent develo... 详细信息
来源: 评论
Video Summarization Approach Based on Binary Robust Invariant Scalable Keypoints and Bisecting K-Means
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3565-3583页
作者: Sameh Zarif Eman Morad Khalid Amin Abdullah Alharbi Wail S.Elkilani Shouze Tang Department of Information Technology Faculty of Computers and InformationMenoufia UniversityMenoufia32511Egypt Department of Artificial Intelligence Faculty of Artificial IntelligenceEgyptian Russian UniversityBader11829Egypt Department of Computer Science Community CollegeKing Saud UniversityRiyadh11362Saudi Arabia College of Applied Computer Science King Saud UniversityAl-Muzahmiya19676Saudi Arabia School of Communication and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing400065China
Due to the exponential growth of video data,aided by rapid advancements in multimedia *** became difficult for the user to obtain information from a large video *** process of providing an abstract of the entire video... 详细信息
来源: 评论
Degree-Based Entropy Descriptors of Graphenylene Using Topological Indices
收藏 引用
computer Modeling in Engineering & sciences 2023年 第10期137卷 939-964页
作者: M.C.Shanmukha Sokjoon Lee A.Usha K.C.Shilpa Muhammad Azeem Department of Mathematics Bapuji Institute of Engineering&TechnologyDavanagere577004India Department of Computer Engineering(Smart Security) Gachon UniversitySeongnam13120South Korea Department of Mathematics Alliance School of Applied MathematicsAlliance UniversityBangalore562106India Department of Computer Science and Engineering Bapuji Institute of Engineering&TechnologyDavanagere577004India Department of Mathematics Riphah Institute of Computing and Applied SciencesRiphah International UniversityLahore54660Pakistan
Graph theory plays a significant role in the applications of chemistry,pharmacy,communication,maps,and aeronautical *** molecules of chemical compounds are modelled as a graph to study the properties of the *** geomet... 详细信息
来源: 评论