咨询与建议

限定检索结果

文献类型

  • 1,960 篇 会议
  • 1,868 篇 期刊文献

馆藏范围

  • 3,828 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,112 篇 工学
    • 1,300 篇 计算机科学与技术...
    • 1,056 篇 软件工程
    • 498 篇 信息与通信工程
    • 283 篇 生物医学工程(可授...
    • 272 篇 生物工程
    • 251 篇 控制科学与工程
    • 227 篇 电气工程
    • 223 篇 光学工程
    • 213 篇 电子科学与技术(可...
    • 168 篇 核科学与技术
    • 142 篇 仪器科学与技术
    • 138 篇 机械工程
    • 88 篇 化学工程与技术
    • 80 篇 动力工程及工程热...
    • 64 篇 材料科学与工程(可...
  • 1,654 篇 理学
    • 843 篇 物理学
    • 570 篇 数学
    • 328 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 128 篇 系统科学
    • 100 篇 化学
  • 524 篇 管理学
    • 319 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 170 篇 工商管理
  • 287 篇 医学
    • 243 篇 临床医学
    • 222 篇 基础医学(可授医学...
    • 148 篇 药学(可授医学、理...
    • 98 篇 公共卫生与预防医...
  • 82 篇 法学
    • 68 篇 社会学
  • 68 篇 经济学
    • 68 篇 应用经济学
  • 50 篇 教育学
  • 44 篇 农学
  • 11 篇 文学
  • 6 篇 艺术学
  • 3 篇 军事学

主题

  • 142 篇 informatics
  • 90 篇 hadron colliders
  • 74 篇 computer network...
  • 64 篇 machine learning
  • 63 篇 higgs bosons
  • 58 篇 wireless sensor ...
  • 55 篇 quality of servi...
  • 55 篇 computational mo...
  • 53 篇 deep learning
  • 53 篇 computer archite...
  • 50 篇 protocols
  • 47 篇 proton-proton in...
  • 45 篇 bandwidth
  • 45 篇 costs
  • 45 篇 mobile communica...
  • 42 篇 electronic mail
  • 41 篇 routing
  • 41 篇 image segmentati...
  • 40 篇 resource managem...
  • 40 篇 accuracy

机构

  • 412 篇 department for p...
  • 407 篇 faculty of scien...
  • 404 篇 kirchhoff-instit...
  • 395 篇 department of ph...
  • 389 篇 department of ph...
  • 386 篇 institute of phy...
  • 382 篇 department of ph...
  • 373 篇 institute of phy...
  • 367 篇 fakultät für phy...
  • 350 篇 instituto de fís...
  • 306 篇 department of ph...
  • 292 篇 dipartimento di ...
  • 289 篇 nikhef national ...
  • 288 篇 graduate school ...
  • 288 篇 department of ph...
  • 282 篇 department of ph...
  • 270 篇 department of ph...
  • 269 篇 universidade fed...
  • 262 篇 yerevan physics ...
  • 262 篇 ictp trieste

作者

  • 337 篇 c. alexa
  • 335 篇 j. m. izen
  • 333 篇 g. bella
  • 332 篇 d. calvet
  • 332 篇 c. amelung
  • 330 篇 j. strandberg
  • 327 篇 g. spigo
  • 326 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 319 篇 s. mohapatra
  • 312 篇 s. guindon
  • 308 篇 a. kaczmarska
  • 305 篇 j. schaarschmidt
  • 300 篇 y. tayalati
  • 296 篇 a. d. pilkington
  • 293 篇 l. chevalier
  • 285 篇 m. klein

语言

  • 3,686 篇 英文
  • 108 篇 其他
  • 33 篇 中文
  • 5 篇 日文
检索条件"机构=Computer Technology Institute CTI and Department of Computer Engineering and Informatics"
3828 条 记 录,以下是131-140 订阅
排序:
Tangles in IOTA to make crypto currency transactions free and secure
收藏 引用
International Journal of Cloud Computing 2022年 第1期11卷 1-13页
作者: Anakath, A.S. Kannadasan, R. Prabakaran, N. Basha, M.S. Saleem Department of MCA EGS Pillai Engineering College Nagapattinam 611002 India School Computer Science and Engineering Vellore Institute of Technology Vellore632014 India Department of Computing and Informatics Mazoon College Muscat133 Oman
Blockchain introduction has made a revolutionary change in the crypto currency around the world but it has not delivered on its promises of free and faster transaction confirmation. Serguei Popov's proposal of usi... 详细信息
来源: 评论
Classifying Upper Extremity Motor Function Using Deep Learning and Third-Person Video Data
Classifying Upper Extremity Motor Function Using Deep Learni...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Tran, Tan Chang, Lin-Ching Lum, Peter The Catholic University of America Department of Electrical Engineering and Computer Science WashingtonDC United States New Jersey Institute of Technology Department of Informatics NewarkNJ United States The Catholic University of America Department of Biomedical Engineering WashingtonDC United States
Post-stroke rehabilitation of upper extremity (UE) motor function is essential. Despite the widespread use of UE rehabilitation in clinical settings, assessing the success of these treatments is challenging. Methods f... 详细信息
来源: 评论
A Review and Analysis of Localization Techniques in Underwater Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5697-5715页
作者: Seema Rani Anju Anupma Sangwan Krishna Kumar Kashif Nisar Tariq Rahim Soomro Ag.Asri Ag.Ibrahim Manoj Gupta Laxmi Chandand Sadiq Ali Khan Department of CSE Guru Jambheshwar University of Science&TechnologyHisar125001India Department of Hydro and Renewable Energy Indian Institute of Technology RoorkeeIndia College of Computer Science and Information Systems Institute of Business ManagementKorangi Creek RoadKarachi75190SindhPakistan Faculty of Computing and Informatics Universiti Malaysia SabahJalan UMSKota Kinabalu88400SabahMalaysia Department of Electronics and Communication Engineering JECRC UniversityJaipurRajasthanIndia Computer Science Department UBIT Karachi UniversityKarachi75270Pakistan
In recent years,there has been a rapid growth in Underwater Wireless Sensor Networks(UWSNs).The focus of research in this area is now on solving the problems associated with large-scale *** of the major issues in such... 详细信息
来源: 评论
Resilient Routing Table Computation Based on Connectivity Preserving Graph Sequences  42
Resilient Routing Table Computation Based on Connectivity Pr...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Tapolcai, Janos Babarczi, Peter Ho, Pin-Han Ronyai, Lajos Budapest University of Technology and Economics Faculty of Electrical Engineering and Informatics Department of Telecommunications and Media Informatics BudapestH-1111 Hungary University of Waterloo Deptartment of Electrical and Computer Engineering Canada Institute for Computer Science and Control Eötvös Loránd Research Networkand Department of Algebra Hungary Institute of Mathematics Budapest University of Technology and Economics BudapestH-1111 Hungary
Fast reroute (FRR) mechanisms that can instantly handle network failures in the data plane are gaining attention in packet-switched networks. In FRR no notification messages are required as the nodes adjacent to the f... 详细信息
来源: 评论
Comprehensive Analysis and Remediation of Insecure Direct Object References (IDOR) Vulnerabilities in Android APIs  1
Comprehensive Analysis and Remediation of Insecure Direct Ob...
收藏 引用
1st IEEE International Conference on Cryptography, informatics, and Cybersecurity, ICoCICs 2023
作者: Yulianto, Semi Abdullah, Roni Reza Soewito, Benfano Bina Nusantara University Binus Graduate Program Computer Science Computer Science Department Jakarta11480 Indonesia National Institute of Science and Technology Faculty of Informatics Engineering Jakarta12630 Indonesia Bina Nusantara University Binus Graduate Program. Master of Computer Science Computer Science Department Jakarta11480 Indonesia
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. ... 详细信息
来源: 评论
Grid Search Hyperparameters Tuning with Supervised Machine Learning for Awngi Language Named Entity Recognition  2
Grid Search Hyperparameters Tuning with Supervised Machine L...
收藏 引用
2nd International Conference Computational and Characterization Techniques in engineering and Sciences, IC3TES 2024
作者: Ayalew, Amogne Andualem Bitew, Gizachew Salau, Ayodeji Olalekan Tegegne, Melaku Lake Gupta, Shashi Kant Israr, Mohammad Tegegne, Tesfa Assegie, Tsehay Admassu Mizan-Tepi University School of Computing and Informatics Department of Information Technology Tepi Ethiopia Mizan Tepi University School of Computing Computer Science Department Mizan-Tepi Ethiopia Afe Babalola University Department of Electrical/Electronics and Computer Engineering Ado-Ekiti Nigeria Injibara University College of Engineering and Technology Department of Information Technology Injibara Ethiopia Eudoxia Research University Department of Computer Science and Engineering United States Maryam Abacha American University of Nigeria Hotoro Gra Kano State Nigeria Bahir Dar University Faculty of Computing Bahir Dar Institute of Technology Bahir Dara Ethiopia Injibara University College of Engineering and Technology Department of Computer Science Injibara Ethiopia
Named entity recognition has emerged as a critical step in recognizing, classifying, and extracting the most significant information from unstructured text without human intervention. It is used in information retriev... 详细信息
来源: 评论
A Machine Learning Model for Predicting Individual Substance Abuse with Associated Risk-Factors
收藏 引用
Annals of Data Science 2023年 第6期10卷 1607-1634页
作者: Islam, Uwaise Ibna Haque, Enamul Alsalman, Dheyaaldin Islam, Muhammad Nazrul Moni, Mohammad Ali Sarker, Iqbal H. Department of Computer Science and Engineering Chittagong University of Engineering & Technology Chittagong4349 Bangladesh University of Waterloo WaterlooONN2L 3G1 Canada School of Engineering Computing and Informatics Dar Al-Hekma University Jeddah Saudi Arabia Department of Computer Science and Engineering Military Institute of Science and Technology Dhaka1216 Bangladesh School of Health and Rehabilitation Sciences Faculty of Health and Behavioural Sciences The University of Queensland St LuciaQLD4072 Australia
Substance abuse is the unrestrained and detrimental use of psychoactive chemical substances, unauthorized drugs, and alcohol that can ultimately lead a human to disastrous consequences. As patients with this behavior ... 详细信息
来源: 评论
LogUAD: Log Unsupervised Anomaly Detection Based on Word2Vec
收藏 引用
computer Systems Science & engineering 2022年 第6期41卷 1207-1222页
作者: Jin Wang Changqing Zhao Shiming He Yu Gu Osama Alfarraj Ahed Abugabah School of Computer and Communication Engineering Changsha University of Science&TechnologyChangsha410114China Department of Chemistry Institute of Inorganic and Analytical ChemistryGoethe-UniversityFrankfurt60438Germany Computer Science Department Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Zayed University CTIAbu Dhabi144534United Arab Emirates
System logs record detailed information about system operation and areimportant for analyzing the system's operational status and performance. Rapidand accurate detection of system anomalies is of great significan... 详细信息
来源: 评论
CervixNet: A Reward-Based Weighted Ensemble Framework for Cervical Cancer Classification  4th
CervixNet: A Reward-Based Weighted Ensemble Framework for Ce...
收藏 引用
4th International Conference on Frontiers in Computing and Systems, COMSYS 2023
作者: Roy, Kaushiki Bhattacharjee, Deboparna Banik, Debapriya Krejcar, Ondrej Sarkar, Ram Kolkata700091 India University of Engineering and Management Kolkata700160 India Department of Computer Science and Engineering Jadavpur University Kolkata700032 India Department of Computer Science and Engineering RCC Institute of Information Technology Kolkata700015 India Department of Computer Science and Engineering ICFAI University Tripura Agartala799210 India Center for Basic and Applied Science Faculty of Informatics and Management University of Hradec Kralove Rokitanskeho 62 Hradec Kralove500 03 Czech Republic
Cervical cancer is one of the most common causes of death among women worldwide. However, this fatal disease can be treated, and the mortality rate can be decreased if detected at an early stage. The Papanicolaou test... 详细信息
来源: 评论
New Cloud Computing Authentication Based on Secure Hash Algorithm (SHA-3) and Lightweight Sosemanuk Algorithm  2nd
New Cloud Computing Authentication Based on Secure Hash Algo...
收藏 引用
2nd International Conference on Cyber Intelligence and Information Retrieval, CIIR 2023
作者: Niaf, Jolan Rokan Kadhim, Aqeel Kamil Mohammed, Qutaiba Humadi Hoomod, Haider K. Salman, Muna Muhsen Iraqi Commission for Computers & Informatics Informatics Institute for Postgraduate Studies Baghdad Iraq Computer Techniques Engineering Department Imam Al-Kadhim College Baghdad Iraq College of Nursing University of Baghdad Baghdad Iraq College of Education Al-Mustansiriyah University Baghdad Iraq Ministry of Science and Technology Department of Information Technology Baghdad Iraq
The term "cloud computing" refers to a vast network of linked, virtually hosted, and easily updatable computer resources. That are capable of consisting of a number of different apps and offering a number of... 详细信息
来源: 评论