咨询与建议

限定检索结果

文献类型

  • 8,279 篇 期刊文献
  • 7,674 篇 会议
  • 212 册 图书

馆藏范围

  • 16,165 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,102 篇 工学
    • 4,883 篇 计算机科学与技术...
    • 3,769 篇 软件工程
    • 1,576 篇 电子科学与技术(可...
    • 1,530 篇 信息与通信工程
    • 1,490 篇 电气工程
    • 1,237 篇 控制科学与工程
    • 880 篇 化学工程与技术
    • 873 篇 生物工程
    • 829 篇 材料科学与工程(可...
    • 803 篇 光学工程
    • 677 篇 生物医学工程(可授...
    • 660 篇 机械工程
    • 599 篇 仪器科学与技术
    • 567 篇 动力工程及工程热...
    • 438 篇 力学(可授工学、理...
    • 350 篇 冶金工程
  • 7,957 篇 理学
    • 4,269 篇 物理学
    • 3,048 篇 数学
    • 1,082 篇 生物学
    • 1,030 篇 统计学(可授理学、...
    • 1,013 篇 化学
    • 560 篇 系统科学
    • 324 篇 地球物理学
  • 1,877 篇 管理学
    • 1,220 篇 管理科学与工程(可...
    • 705 篇 图书情报与档案管...
    • 624 篇 工商管理
  • 743 篇 医学
    • 605 篇 临床医学
    • 500 篇 基础医学(可授医学...
    • 291 篇 药学(可授医学、理...
  • 329 篇 法学
    • 281 篇 社会学
  • 260 篇 经济学
  • 196 篇 农学
  • 185 篇 教育学
  • 37 篇 文学
  • 25 篇 艺术学
  • 24 篇 军事学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 333 篇 deep learning
  • 323 篇 computer science
  • 248 篇 machine learning
  • 198 篇 computational mo...
  • 174 篇 accuracy
  • 162 篇 optimization
  • 155 篇 feature extracti...
  • 150 篇 internet of thin...
  • 133 篇 neural networks
  • 132 篇 data mining
  • 122 篇 computational in...
  • 121 篇 artificial intel...
  • 120 篇 support vector m...
  • 119 篇 predictive model...
  • 118 篇 real-time system...
  • 117 篇 hadrons
  • 106 篇 image segmentati...
  • 100 篇 computer archite...
  • 90 篇 educational inst...
  • 87 篇 covid-19

机构

  • 1,108 篇 cavendish labora...
  • 1,040 篇 department of ph...
  • 991 篇 oliver lodge lab...
  • 991 篇 physikalisches i...
  • 618 篇 fakultät physik ...
  • 572 篇 department of ph...
  • 569 篇 school of physic...
  • 559 篇 horia hulubei na...
  • 552 篇 iccub universita...
  • 546 篇 school of physic...
  • 535 篇 school of physic...
  • 534 篇 h.h. wills physi...
  • 530 篇 imperial college...
  • 526 篇 nikhef national ...
  • 522 篇 university of ch...
  • 522 篇 stfc rutherford ...
  • 511 篇 infn laboratori ...
  • 508 篇 physik-institut ...
  • 503 篇 school of physic...
  • 502 篇 henryk niewodnic...

作者

  • 284 篇 barter w.
  • 264 篇 a. gomes
  • 262 篇 beiter a.
  • 252 篇 c. alexa
  • 252 篇 c. amelung
  • 251 篇 bellee v.
  • 250 篇 j. m. izen
  • 250 篇 g. bella
  • 250 篇 j. strandberg
  • 250 篇 d. calvet
  • 248 篇 g. spigo
  • 246 篇 blake t.
  • 244 篇 f. siegert
  • 244 篇 bowcock t.j.v.
  • 243 篇 brundu d.
  • 239 篇 s. chen
  • 233 篇 betancourt c.
  • 230 篇 y. tayalati
  • 230 篇 borsato m.
  • 227 篇 amato s.

语言

  • 15,126 篇 英文
  • 891 篇 其他
  • 139 篇 中文
  • 8 篇 日文
  • 5 篇 德文
  • 4 篇 法文
  • 2 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science Applied Computer Technology"
16165 条 记 录,以下是791-800 订阅
排序:
A Review on the need of Clustering Techniques Used for Wireless Sensor Networks  2
A Review on the need of Clustering Techniques Used for Wirel...
收藏 引用
2nd International Conference on Business Analytics for technology and Security, ICBATS 2023
作者: Bharany, Salil Rehman, Ateeq Ur Tariq Sadiq, M. Farrukh, Muhammad Alharbi, Meshal Hussain, Amjad Issa, Ghassan F. CET and Technology Department Amritsar India Government College University Department of Electrical Engineering Lahore Pakistan University of Brighton School of Architecture & Engineering United Kingdom Minhaj University Department of Computer Science Lahore Pakistan Prince Sattam Bin Abdulaziz University College of Computer Engineering and Sciences Department of Computer Science Alkharj11942 Saudi Arabia School of Computer Science NCBA&E Lahore Pakistan Applied Science Private University Applied Science Research Center Amman11937 Jordan Skyline University College School of Information Technology Sharjah United Arab Emirates
Wireless sensor networks have been implemented in various software to help gather and analyze data from the physical world. Wireless sensor networks are networks of multiple tiny sensors powered by low-energy batterie... 详细信息
来源: 评论
Revealing Top-k Dominant Individuals in Incomplete Data Based on Spark Environment  14th
Revealing Top-k Dominant Individuals in Incomplete Data Bas...
收藏 引用
14th International Conference on Genetic and Evolutionary Computing, ICGEC 2021
作者: Wang, Ke Wu, Jimmy Ming-Tai Cui, Binge Lin, Jerry Chun-Wei College of Computer Science and Engineering Shandong University of Science and Technology Shandong China Department of Computer Science Electrical Engineering and Mathematical Sciences Western Norway University of Applied Sciences Bergen Norway
A large number of incomplete datasets exist in our life, which may be caused by missing data transmission, privacy information protection, and sudden device failure. It is more difficult to mine the key information in... 详细信息
来源: 评论
Modelling of diffraction of X-rays in perovskite superlattices  7
Modelling of diffraction of X-rays in perovskite superlattic...
收藏 引用
7th International Conference of Computational Methods in Engineering science, CMES 2022
作者: Kokosza, L. Mitura, Z. Department of Applied Computer Science and Modelling Faculty of Metals Engineering and Industrial Computer Science AGH University of Science and Technology al. Mickiewicza 30 Kraków30-059 Poland
Nowadays, different perovskite structures are widely investigated because they can be potentially used in many branches of industry. If two materials are deposited alternately on a substrate, then a superlattice havin... 详细信息
来源: 评论
Cybersecurity Revolution via Large Language Models and Explainable AI  17
Cybersecurity Revolution via Large Language Models and Expla...
收藏 引用
17th International Conference on Security of Information and Networks, SIN 2024
作者: Ghazal, Taher M. Janjua, Jamshaid Iqbal Abushiba, Walid Ahmad, Munir Ihsan, Anuam Al-Dmour, Nidal A. College of Arts & Science Applied Science University Manama Bahrain Center for Cyber Security Faculty of Information Science and Technology Selangor Malaysia Lahore Pakistan College of Engineering Applied Science University Bahrain College of Informatics Korea University Seoul02841 Korea Republic of College of Engineering Mutah University Department of Computer Engineering Jordan
Integrating Groundbreaking advancements in AI, like language models, interpretable AI, and machine learning, opens up a world of exciting new possibilities. The Evolving face of cybersecurity and Modern cyber threats ... 详细信息
来源: 评论
QLAW: An Improved Quantization-Based Local Audio Watermarking Scheme Using Inter-Frame Correlation
收藏 引用
IEEE Access 2025年 13卷 93359-93371页
作者: Qiutong Li Zheng Xing Ju Wang Guoheng Huang Xiaochen Yuan Faculty of Applied Sciences Macao Polytechnic University Macao SAR China School of Computer Science and Technology Guangdong University of Technology Guangzhou China
With the rapid development of the Internet, audio distribution has become more convenient with increasing copyright infringement. To address this problem, this paper proposes a quantization-based local audio watermark... 详细信息
来源: 评论
Heart-Net: AMulti-Modal Deep Learning Approach for Diagnosing Cardiovascular Diseases
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 3967-3990页
作者: DeemaMohammed Alsekait Ahmed Younes Shdefat AymanNabil Asif Nawaz Muhammad Rizwan Rashid Rana Zohair Ahmed Hanaa Fathi Diaa Salama Abd Elminaam Department of Computer Science and Information Technology Applied CollegePrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia College of Engineering and Technology American University of the Middle EastEgaila15453Kuwait Faculty of Computers Science Misr International UniversityCairo11800Egypt University Institute of Information Technology—PMAS Arid Agriculture University Rawalpjndi46000Pakistan Department of Computer Science International Islamic UniversityIslamabad04436Pakistan Jadara Research Center Jadara UniversityIrbid21110Jordan Information System Department Faculty of Computers and Artificial IntelligenceBenha UniversityBanha13511Egypt MEU Research Unit Middle East UniversityAmman11831Jordan
Heart disease remains a leading cause of morbidity and mortality worldwide,highlighting the need for improved diagnostic *** diagnostics face limitations such as reliance on single-modality data and vulnerability to a... 详细信息
来源: 评论
Real-Time Sensor Fault Tolerant Control of DC-DC Converters in DC Microgrids Using a Switching Unknown Input Observer
收藏 引用
IEEE Access 2025年 13卷 95837-95850页
作者: Ouahabi, Mohammed Said Benyounes, Abdelhafid Barkat, Said Ihammouchen, Syphax Rekioua, Toufik Rabehi, Abdelaziz El-Kenawy, El-Sayed M. Alharbi, Amal H. University of M’sila Electrical Engineering Laboratory Faculty of Technology M’sila28000 Algeria University of Bejaia Laboratoire de Technologie industrielle et de l’Information Bejaia06000 Algeria University of Djelfa Telecommunications and Smart Systems Laboratory PO Box 3117 Djelfa17000 Algeria PO Box 33349 Isa Town Bahrain Applied Science Private University Applied Science Research Center Amman Jordan Princess Nourah bint Abdulrahman University College of Computer and Information Sciences Department of Computer Sciences P.O. Box 84428 Riyadh11671 Saudi Arabia
DC Microgrids are rapidly developing, driven by the increasing integration of renewable sources and dynamic loads. Their growing adoption in critical applications raises the need for operational safety and reliability... 详细信息
来源: 评论
A roadmap to data science: Background, future, and trends
收藏 引用
International Journal of Intelligent Information and Database Systems 2021年 第3期14卷 277-293页
作者: Khder, Moaiad Ahmad Fujo, Samah Wael Sayfi, Mohammad Adnan Department of Computer Science Applied Science University Bahrain Department of Computing Engineering and Technology Faculty of Applied Sciences University of Sunderland United Kingdom
Data science is a combination of several disciplines that aims to get accurate insights from a bunch of data, develop the technology, and algorithm to solve the complicated problems analytically. Today, data science p... 详细信息
来源: 评论
Enhancing Human Action Recognition with Adaptive Hybrid Deep Attentive Networks and Archerfish Optimization
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4791-4812页
作者: Ahmad Yahiya Ahmad Bani Ahmad Jafar Alzubi Sophers James Vincent Omollo Nyangaresi Chanthirasekaran Kutralakani Anguraju Krishnan Department of Accounting and Finance Faculty of BusinessMiddle East UniversityAmman11831Jordan Faculty of Engineering Al-Balqa Applied UniversitySalt19117Jordan Department of Mathematics Kongunadu College of Engineering and Technology(Autonomous)TholurpattiTrichy621215India Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo210-40601Kenya Department of Electronics and Communication Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical SciencesChennai602105India Department of Electronics and Communication Engineering Saveetha Engineering College(Autonomous)Chennai602105India Department of Computer Science and Engineering Kongunadu College of Engineering and Technology(Autonomous)TholurpattiTrichy621215India
In recent years,wearable devices-based Human Activity Recognition(HAR)models have received significant *** developed HAR models use hand-crafted features to recognize human activities,leading to the extraction of basi... 详细信息
来源: 评论
Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
收藏 引用
International Journal of Intelligent Networks 2023年 第1期4卷 337-348页
作者: Gautam, Sunil Pattani, Ketaki Zuhair, Mohd Rashid, Mamoon Ahmad, Nazir Department of Computer Science and Engineering Institute of Technology Nirma University Ahmedabad Gujarat India Department of Computer Sciences and Engineering Institute of Advanced Research Gujarat Gandhinagar India School of Information Communication and Technology Bahrain Polytechnic Isa Town Bahrain Department of Information System College of Applied Sciences King Khalid University P.O. Box 61913 Muhayel63317 Saudi Arabia
Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection by imposing re... 详细信息
来源: 评论