咨询与建议

限定检索结果

文献类型

  • 1,178 篇 期刊文献
  • 941 篇 会议
  • 40 册 图书

馆藏范围

  • 2,159 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,241 篇 工学
    • 736 篇 计算机科学与技术...
    • 562 篇 软件工程
    • 261 篇 信息与通信工程
    • 187 篇 生物工程
    • 185 篇 生物医学工程(可授...
    • 144 篇 电子科学与技术(可...
    • 143 篇 控制科学与工程
    • 142 篇 电气工程
    • 116 篇 光学工程
    • 87 篇 机械工程
    • 85 篇 化学工程与技术
    • 79 篇 仪器科学与技术
    • 61 篇 材料科学与工程(可...
    • 56 篇 动力工程及工程热...
    • 48 篇 核科学与技术
  • 943 篇 理学
    • 356 篇 物理学
    • 339 篇 数学
    • 244 篇 生物学
    • 122 篇 统计学(可授理学、...
    • 121 篇 地球物理学
    • 98 篇 化学
    • 47 篇 系统科学
  • 314 篇 管理学
    • 165 篇 管理科学与工程(可...
    • 125 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 267 篇 医学
    • 192 篇 临床医学
    • 161 篇 基础医学(可授医学...
    • 91 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 60 篇 法学
    • 57 篇 社会学
  • 54 篇 农学
  • 35 篇 教育学
  • 32 篇 经济学
  • 6 篇 艺术学
  • 4 篇 文学
  • 2 篇 哲学
  • 2 篇 历史学
  • 2 篇 军事学

主题

  • 50 篇 feature extracti...
  • 44 篇 deep learning
  • 42 篇 machine learning
  • 41 篇 computer science
  • 39 篇 artificial intel...
  • 37 篇 galaxies
  • 35 篇 data mining
  • 34 篇 image segmentati...
  • 33 篇 training
  • 32 篇 support vector m...
  • 27 篇 accuracy
  • 26 篇 hadron colliders
  • 24 篇 optimization
  • 21 篇 cosmological par...
  • 19 篇 covid-19
  • 19 篇 cosmology
  • 19 篇 large scale stru...
  • 19 篇 intelligent syst...
  • 18 篇 computational mo...
  • 17 篇 surveys

机构

  • 69 篇 school of mathem...
  • 58 篇 department of ph...
  • 57 篇 inaf-osservatori...
  • 56 篇 fermi national a...
  • 55 篇 institute of cos...
  • 52 篇 university of sc...
  • 51 篇 madrid
  • 50 篇 national and kap...
  • 49 篇 yerevan physics ...
  • 48 篇 department of ph...
  • 46 篇 centro brasileir...
  • 45 篇 department of ph...
  • 45 篇 istanbul technic...
  • 45 篇 center for astro...
  • 43 篇 universidad iber...
  • 43 篇 high energy phys...
  • 42 篇 brunel universit...
  • 42 篇 university of sp...
  • 41 篇 infn sezione di ...
  • 41 篇 department of ph...

作者

  • 58 篇 miquel r.
  • 54 篇 tarle g.
  • 52 篇 aguena m.
  • 51 篇 smith m.
  • 51 篇 sanchez e.
  • 45 篇 gruendl r.a.
  • 45 篇 gruen d.
  • 45 篇 carretero j.
  • 43 篇 palmese a.
  • 43 篇 doel p.
  • 41 篇 flaugher b.
  • 38 篇 to c.
  • 38 篇 garcía-bellido j...
  • 38 篇 james d.j.
  • 37 篇 diehl h.t.
  • 37 篇 romer a.k.
  • 36 篇 costanzi m.
  • 35 篇 gschwend j.
  • 35 篇 dimitrios i. fot...
  • 34 篇 ogando r.l.c.

语言

  • 2,074 篇 英文
  • 62 篇 其他
  • 21 篇 中文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 俄文
检索条件"机构=Computer Science and Technology Unit"
2159 条 记 录,以下是21-30 订阅
排序:
Requests Satisfaction in a Virtual Web Services System
Requests Satisfaction in a Virtual Web Services System
收藏 引用
2023 International Conference on Decision Aid sciences and Applications, DASA 2023
作者: Bernine, Nassima Nacer, Hassina Adel-Aissanou, Karima Aissani, Djamil University of Bejaia LaMOS Research Unit Operational Research Department Algeria University of Science and Technology 'USTHB' Movep Laboratory Computer Science Department Algiers Algeria University of Bejaia LaMOS Research Unit Computer Science Department Algeria
This paper defines analytical models for a Web services system, with two stations on tandem queue, for evaluating the request satisfaction involving two exponential servers, each having its own waiting queue. The firs... 详细信息
来源: 评论
Minimizing energy consumption in fixed node networks using a novel neutrosophic model: comparative analysis with standard and existing algorithms
收藏 引用
International Journal of Information technology (Singapore) 2025年 1-15页
作者: Ghimire, Sangam Bhurtel, Nirjal Jha, Sudan Ahmad, Sultan Abdeljaber, Hikmat A. M. Nazeer, Jabeen Department of Computer Science and Engineering Kathmandu University 28 kilo Bagmati Dhulikhel 45210 Nepal Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-kharj 11942 Saudi Arabia School of Computer Science and Engineering Lovely Professional University Punjab Phagwara 144411 India Department of Computer Science Faculty of Information Technology Applied Science Private University Amman Jordan MEU Research Unit Middle East University Amman 11831 Lebanon
The growing development and utilization of networked systems has led to more concern regarding the energy efficiency of these systems. In this paper, we present a novel approach to minimizing energy consumption in fix... 详细信息
来源: 评论
Intelligent waste classification approach based on improved multi-layered convolutional neural network
收藏 引用
Multimedia Tools and Applications 2024年 第36期83卷 84095-84120页
作者: Chhabra, Megha Sharan, Bhagwati Elbarachi, May Kumar, Manoj Department of Computer Science & amp Engineering School of Engineering & ampTechnology Sharda University UP Gr. Noida India School of Engineering and Sciences Department of Computer Science and Engineering SRM University-AP Andhra Pradesh Amaravati India Head of School of Computer Science University of Wollongong in Dubai Dubai Knowledge Park Dubai United Arab Emirates School of Computer Science University of Wollongong in Dubai Dubai Knowledge Park Dubai United Arab Emirates MEU Research Unit Middle East University Amman11831 Jordan
This study aims to improve the performance of organic to recyclable waste through deep learning techniques. Negative impacts on environmental and Social development have been observed relating to the poor waste segreg... 详细信息
来源: 评论
IDS-INT:Intrusion detection system using transformer-based transfer learning for imbalanced network traffic
收藏 引用
Digital Communications and Networks 2024年 第1期10卷 190-204页
作者: Farhan Ullah Shamsher Ullah Gautam Srivastava Jerry Chun-Wei Lin School of Software Northwestern Polytechnical UniversityXian710072ShaanxiChina Knowledge Unit of Systems and Technology University of Management and TechnologySialkot 51040Pakistan Department of Math and Computer Science Brandon UniversityBrandonMB R7A 6A9Canada Department of Computer Science and Math Lebanese American UniversityBeirut1102Lebanon Western Norway University of Applied Sciences BergenNorway Research Centre for Interneural Computing China Medical UniversityTaichungTaiwanChina
A network intrusion detection system is critical for cyber security against llegitimate *** terms of feature perspectives,network traffic may include a variety of elements such as attack reference,attack type,a subcat... 详细信息
来源: 评论
Statistical inference on multicomponent stress–strength reliability with non-identical component strengths using progressively censored data from Kumaraswamy distribution
收藏 引用
Soft Computing 2024年 第17-18期28卷 9317-9339页
作者: Saini, Shubham Patel, Jyoti Garg, Renu Department of Computer Science and Engineering Indian Institute of Technology Roorkee Roorkee247667 India Machine Intelligence Unit Indian Statistical Institute Kolkata700108 India Department of Statistics Ramanujan College Delhi110019 India
In this article, we draw inferences on stress–strength reliability in a multicomponent system with non-identical strength components based on the progressively censored data from the Kumaraswamy distribution (KuD). W... 详细信息
来源: 评论
Fault Secured JPEG-Codec Hardware Accelerator with Piracy Detective Control using Secure Fingerprint Template  36
Fault Secured JPEG-Codec Hardware Accelerator with Piracy De...
收藏 引用
36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2023
作者: Chaurasia, Rahul Reddy Asireddy, Abhinav Sengupta, Anirban Indian Institute of Technology Computer Science and Engineering Indore India Indian Institute of Technology Department of Computer Science and Engineering Indore India Indian Statistical Institute Advanced Computing and Microelectronics Unit Kolkata India
This paper presents a novel methodology to design fault secured JPEG-compression-decompression (codec) hardware accelerator with piracy detective control using secure fingerprint template of intellectual property (IP)... 详细信息
来源: 评论
A Comprehensive Approach of Algorithmic Trading System based on Technical Analysis
A Comprehensive Approach of Algorithmic Trading System based...
收藏 引用
2024 IEEE International Conference on Cybernetics and Innovations, ICCI 2024
作者: Jongpermwattanapol, Apisan Jongkohpo, Khathathorn Worasucheep, Chukiat Hiruncharoenvate, Chaya Krongtong, Tassanee King Mongkut's University Of Technology Engineering Science Classroom Bangkok Thailand King Mongkut's University Of Technology Applied Computer Science Bangkok Thailand Securities And Exchange Commission Bangkok Thailand The Institute For The Promotion Of Teaching Science The Institute And Technology Technology Unit Bangkok Thailand
Machine Learning researchers have been attempting to accurately predict stock price trends. Moreover, financial researchers use Technical Analysis with optimization models [1] to achieve the same task by extracting an... 详细信息
来源: 评论
Personalized Differential Privacy Preservation Method for Trajectory Based on Regional Density Analysis  2
Personalized Differential Privacy Preservation Method for Tr...
收藏 引用
2nd International Conference on Big Data, Information and computer Network, BDICN 2023
作者: Zhi, Weicheng Gong, Xiaoze Wang, Yongli Nanjing University of Technology School of Computer Science and Engineering Nanjing China Unit 63850 of PLA Baicheng China
As a reliable privacy protection method, differential privacy has been widely used in trajectory data release. However, the current trajectory protection method based on differential privacy lacks the analysis of the ... 详细信息
来源: 评论
Using Hybrid Genetic Algorithm for Data Aggregation in Wireless Sensor Networks  18
Using Hybrid Genetic Algorithm for Data Aggregation in Wirel...
收藏 引用
18th International Conference on Ubiquitous Information Management and Communication, IMCOM 2024
作者: Sharmin, Sharmin Ahmedy, Ismail Noor, Rafidah Md Ismail, Habibah Universiti Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia Computer Science Unit Centre of Foundation Studies Universiti Teknologi MARA Selangor Dengkil43800 Malaysia
Efficient energy usage is vital for extending Wireless Sensor Networks (WSNs) lifespan. While Improved LowEnergy Adaptive Clustering Hierarchy (ILEACH) excels in energy-efficient data aggregation, challenges like prem... 详细信息
来源: 评论
Drone Gesture Control using OpenCV and Tello  8
Drone Gesture Control using OpenCV and Tello
收藏 引用
8th Conference on Information Communication technology and Society, ICTAS 2024
作者: Khoza, Nokuthula Owolawi, Pius Malele, Vusumuzi Soshanguve Campus Tshwane University of Technology Faculty of Information and Communication Technology Department of Computer Systems Engineering Pretoria South Africa North-West University Unit for Data Science and Computing School of Computer Science and Information Systems Vanderbijlpark Campus Vanderbijlpark South Africa
Tracking a person with an onboard camera is a very difficult and perhaps technically impossible if one camera is used. In this regard, real-life projects use a series of cameras to achieve the task. The advent of came... 详细信息
来源: 评论