咨询与建议

限定检索结果

文献类型

  • 8,279 篇 期刊文献
  • 7,674 篇 会议
  • 212 册 图书

馆藏范围

  • 16,165 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,102 篇 工学
    • 4,883 篇 计算机科学与技术...
    • 3,769 篇 软件工程
    • 1,576 篇 电子科学与技术(可...
    • 1,530 篇 信息与通信工程
    • 1,490 篇 电气工程
    • 1,237 篇 控制科学与工程
    • 880 篇 化学工程与技术
    • 873 篇 生物工程
    • 829 篇 材料科学与工程(可...
    • 803 篇 光学工程
    • 677 篇 生物医学工程(可授...
    • 660 篇 机械工程
    • 599 篇 仪器科学与技术
    • 567 篇 动力工程及工程热...
    • 438 篇 力学(可授工学、理...
    • 350 篇 冶金工程
  • 7,957 篇 理学
    • 4,269 篇 物理学
    • 3,048 篇 数学
    • 1,082 篇 生物学
    • 1,030 篇 统计学(可授理学、...
    • 1,013 篇 化学
    • 560 篇 系统科学
    • 324 篇 地球物理学
  • 1,877 篇 管理学
    • 1,220 篇 管理科学与工程(可...
    • 705 篇 图书情报与档案管...
    • 624 篇 工商管理
  • 743 篇 医学
    • 605 篇 临床医学
    • 500 篇 基础医学(可授医学...
    • 291 篇 药学(可授医学、理...
  • 329 篇 法学
    • 281 篇 社会学
  • 260 篇 经济学
  • 196 篇 农学
  • 185 篇 教育学
  • 37 篇 文学
  • 25 篇 艺术学
  • 24 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 333 篇 deep learning
  • 323 篇 computer science
  • 248 篇 machine learning
  • 198 篇 computational mo...
  • 174 篇 accuracy
  • 162 篇 optimization
  • 155 篇 feature extracti...
  • 150 篇 internet of thin...
  • 133 篇 neural networks
  • 132 篇 data mining
  • 122 篇 computational in...
  • 121 篇 artificial intel...
  • 120 篇 support vector m...
  • 119 篇 predictive model...
  • 118 篇 real-time system...
  • 117 篇 hadrons
  • 106 篇 image segmentati...
  • 100 篇 computer archite...
  • 90 篇 educational inst...
  • 87 篇 covid-19

机构

  • 1,108 篇 cavendish labora...
  • 1,040 篇 department of ph...
  • 991 篇 oliver lodge lab...
  • 991 篇 physikalisches i...
  • 618 篇 fakultät physik ...
  • 572 篇 department of ph...
  • 569 篇 school of physic...
  • 559 篇 horia hulubei na...
  • 552 篇 iccub universita...
  • 546 篇 school of physic...
  • 535 篇 school of physic...
  • 534 篇 h.h. wills physi...
  • 530 篇 imperial college...
  • 526 篇 nikhef national ...
  • 522 篇 university of ch...
  • 522 篇 stfc rutherford ...
  • 511 篇 infn laboratori ...
  • 508 篇 physik-institut ...
  • 503 篇 school of physic...
  • 502 篇 henryk niewodnic...

作者

  • 284 篇 barter w.
  • 264 篇 a. gomes
  • 262 篇 beiter a.
  • 252 篇 c. alexa
  • 252 篇 c. amelung
  • 251 篇 bellee v.
  • 250 篇 j. m. izen
  • 250 篇 g. bella
  • 250 篇 j. strandberg
  • 250 篇 d. calvet
  • 248 篇 g. spigo
  • 246 篇 blake t.
  • 244 篇 f. siegert
  • 244 篇 bowcock t.j.v.
  • 243 篇 brundu d.
  • 239 篇 s. chen
  • 233 篇 betancourt c.
  • 230 篇 y. tayalati
  • 230 篇 borsato m.
  • 227 篇 amato s.

语言

  • 15,126 篇 英文
  • 891 篇 其他
  • 139 篇 中文
  • 8 篇 日文
  • 5 篇 德文
  • 4 篇 法文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science Applied Computer Technology"
16165 条 记 录,以下是631-640 订阅
排序:
Hybrid Genetic Algorithm and Ant Colony Algorithm for Solving Travelling Salesman Problem  9
Hybrid Genetic Algorithm and Ant Colony Algorithm for Solvin...
收藏 引用
9th IEEE International Conference on Computational Intelligence and Applications, ICCIA 2024
作者: Thongpiem, Jirawat Punkong, Narong Ratanavilisagul, Chiabwoot Kosolsombat, Somkiat Faculty of Applied Science Department of Computer and Information Sciences Bangkok Thailand Digital Technology for Business Faculty of Management Science Kanchanaburi Thailand Data Science and Innovation College of Interdisciplinary Studies Thammasat University Pathum Thani Thailand
The traveling salesman problem (TSP) is a combinatorial optimization problem and a NP-complete problem. It is a well-known problem for comparison of algorithm performance. Many researchers try to solve the TSP by the ... 详细信息
来源: 评论
'Do Not Disturb': An Implication Design To Be Alerted But Less Stress
'Do Not Disturb': An Implication Design To Be Alerted But Le...
收藏 引用
2023 International Seminar on Application for technology of Information and Communication, iSemantic 2023
作者: Jarupreechachan, Weerachaya Kitchat, Kotcharat Surasak, Thattapon Kasetsart University Faculty of Engineering at Kamphaeng Saen Dept. of Computer Engineering Nakhon Pathom Thailand National Central University Dept. of Computer Science and Information Engineering Taoyuan Taiwan King Mongkut's University of Technology North Bangkok Faculty of Applied Science Dept. of Computer and Information Science Bangkok Thailand
The pervasive utilization of smartphones, while augmenting personal and professional communications, also elicits mental stress and disrupts the work-life balance. Users necessitate staying connected to critical updat... 详细信息
来源: 评论
SimV: A Self-extension Similarity Viterbi Algorithm for Service Function Chain Deployment for Multi-access Edge Computing
SimV: A Self-extension Similarity Viterbi Algorithm for Serv...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Wenqiang Deng School of Computer Science Guangzhou College of Applied Science and Technology Zhaoqing China
Advancements in Multi-access Edge Computing (MEC) and Network Function Virtualization (NFV) offer a lot of potential for providing flexible and low-latency network services at the edge. In NFV, traditional middleboxes... 详细信息
来源: 评论
Fog Computing – Desktop Review
Fog Computing – Desktop Review
收藏 引用
International Multidisciplinary Information technology and Engineering Conference (IMITEC)
作者: Sicelo Prince Sithole Naume Sonhera Tranos Zuva Department of Computer Science Faculty of Applied and Computer Sciences Vaal University of Technology Vanderbjilpark South Africa
Fog computing is an innovative approach that brings cloud computing capabilities to the edge of the network, and it has great potential for enterprises looking to improve real-time data processing and lower latency. H... 详细信息
来源: 评论
A local meshless method for solving multi-dimensional Galilei invariant fractional advection–diffusion equation
收藏 引用
Engineering Analysis with Boundary Elements 2022年 143卷 283-292页
作者: Eslami, Samira Ilati, Mohammad Dehghan, Mehdi Department of Applied Mathematics Faculty of Basic Sciences Sahand University of Technology Tabriz Iran Department of Applied Mathematics Faculty of Mathematics and Computer Science Amirkabir University of Technology Hafez Ave. TehranNo. 424 Iran
In this article, a local meshless technique is applied for numerical simulation of multi-dimensional Galilei invariant fractional advection–diffusion model on regular and irregular computational domains. In the sugge... 详细信息
来源: 评论
Classifying Psychiatric Patients Using Machine Learning  25
Classifying Psychiatric Patients Using Machine Learning
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Alrjoob, Hmmam M. Alazaidah, Raed Batyha, Radwan Khafajeh, Hayel Elsoud, Esraa Abu Saeb Al-Sherideh, Ala'a Elrashidi, Ali Alqaraleh, Muhyeeddin Amer, Waleed Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan Zarqa University Faculty of Information Technology Department of Data Science and Ai Zarqa Jordan Applied Science Private University Faculty of Information Technology Department of Computer Science Amman Jordan Zarqa University Faculty of Information Technology Department Computer Science Zarqa Jordan Zarqa University Faculty of Information Technology Department of Cyper Security Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Zarqa University Faculty of Information Technology Department of Software Engineering Zarqa Jordan Zarqa University Faculty on Information Technology Department of Cyber Security Zarqa Jordan
Psychological disorders are considered chronic illnesses that affect a wide range of populations. Some studies in the United States indicate that one in every eight individuals is affected by a psychological disorder.... 详细信息
来源: 评论
Automated Road Toll Collection and Vehicle Tracking (ARTCVT) Using Advanced RFID and GSM technology
Automated Road Toll Collection and Vehicle Tracking (ARTCVT)...
收藏 引用
2022 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems, ICETSIS 2022
作者: Khder, Moaiad Ahmad Dawood, Kareem Abbas Abdal, Rozin Badeel Alqaisy, Sarah Abdulrahman Applied Science University Bahrain Komar University of Science and Technology Computer Science Department Kurdistan Region Iraq Malaysia
Toll plazas in Malaysia now utilize two passing techniques for toll collection: touch n' go and smart tag. These methods are not fast which is time-consuming the car pausing to pay the toll, or passing slowly if u... 详细信息
来源: 评论
Text Post-processing on Optical Character Recognition output using Natural Language Processing Methods  3
Text Post-processing on Optical Character Recognition output...
收藏 引用
3rd IEEE Mysore Sub Section International Conference, MysuruCon 2023
作者: Thangam Kumaran, U. Biswas, Dipshikha Sneha, B. Nadipalli, Suneel Raja, Saleem Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bengaluru India University of Technology and Applied Sciences Shinas Oman
The technique of turning images of printed or written text from scanned documents, images of documents, or simple photos into machine-encoded text is known as optical character recognition (OCR). OCR has proven to be ... 详细信息
来源: 评论
A Blockchain Framework for Investment Authorities to Manage Assets and Funds  5th
A Blockchain Framework for Investment Authorities to Manage ...
收藏 引用
5th EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing, BDCC 2022
作者: Sherimon, P.C. Sherimon, Vinu Thomas, Jeff Jaimon, Kevin Faculty of Computer Studies Arab Open University Muscat Oman Department of IT University of Technology and Applied Sciences Muscat Oman Department of Computer Science and Engineering Saintgits College of Engineering Kerala Pathamuttam Kottayam India
Investment authorities are broad financial institutions that carefully manage investments on behalf of the national government using a long-term value development approach. To provide a stronger structure or framework... 详细信息
来源: 评论
Statistical Investigation of Scientific Journals Impact Factors in Relation to Benford's Law  6
Statistical Investigation of Scientific Journals Impact Fact...
收藏 引用
6th IEEE Novel Intelligent and Leading Emerging sciences Conference, NILES 2024
作者: Sorour, Marwa A. Marey, Yassmine A. Halim, Islam Tharwat Abdel Kasem, Mohamed Mahran School of Information Technology and Computer Science Nile University Giza Egypt Nile University Giza Egypt Alexandria University Faculty of Engineering Egypt School of Engineering and Applied Science Nile University Giza Egypt
Benford's law (BL) has been used as a tool for the detection of possible data manipulation in datasets. The statistics of the first digit(s) of the observed values are compared to a set of expected values given by... 详细信息
来源: 评论