咨询与建议

限定检索结果

文献类型

  • 2,265 篇 期刊文献
  • 1,989 篇 会议
  • 56 册 图书

馆藏范围

  • 4,310 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,509 篇 工学
    • 1,473 篇 计算机科学与技术...
    • 1,126 篇 软件工程
    • 409 篇 信息与通信工程
    • 355 篇 电气工程
    • 346 篇 电子科学与技术(可...
    • 338 篇 控制科学与工程
    • 239 篇 材料科学与工程(可...
    • 230 篇 生物工程
    • 229 篇 光学工程
    • 200 篇 化学工程与技术
    • 194 篇 生物医学工程(可授...
    • 171 篇 机械工程
    • 160 篇 力学(可授工学、理...
    • 154 篇 动力工程及工程热...
    • 148 篇 仪器科学与技术
  • 2,089 篇 理学
    • 1,007 篇 物理学
    • 965 篇 数学
    • 327 篇 统计学(可授理学、...
    • 277 篇 生物学
    • 274 篇 化学
    • 193 篇 系统科学
    • 103 篇 地球物理学
  • 548 篇 管理学
    • 330 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 260 篇 医学
    • 204 篇 临床医学
    • 177 篇 基础医学(可授医学...
    • 112 篇 公共卫生与预防医...
    • 92 篇 药学(可授医学、理...
  • 97 篇 法学
  • 65 篇 农学
  • 57 篇 教育学
  • 55 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 7 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 118 篇 deep learning
  • 108 篇 machine learning
  • 101 篇 accuracy
  • 82 篇 artificial intel...
  • 80 篇 computational mo...
  • 71 篇 feature extracti...
  • 62 篇 training
  • 55 篇 convolutional ne...
  • 53 篇 predictive model...
  • 53 篇 data models
  • 51 篇 internet of thin...
  • 49 篇 semantics
  • 43 篇 support vector m...
  • 40 篇 neural networks
  • 40 篇 real-time system...
  • 40 篇 forecasting
  • 34 篇 educational inst...
  • 33 篇 covid-19
  • 33 篇 data mining
  • 33 篇 measurement

机构

  • 52 篇 shandong enginee...
  • 51 篇 shandong provinc...
  • 49 篇 infn sezione di ...
  • 49 篇 north-west unive...
  • 49 篇 institut univers...
  • 46 篇 université de st...
  • 45 篇 national centre ...
  • 43 篇 tno technical sc...
  • 41 篇 department for p...
  • 40 篇 università di ca...
  • 40 篇 department of ph...
  • 40 篇 infn sezione di ...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department of ph...
  • 40 篇 in2p3 lpc campus...
  • 40 篇 yerevan physics ...
  • 39 篇 nikhef national ...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 50 篇 chen a.
  • 49 篇 ferrara g.
  • 49 篇 ardid m.
  • 49 篇 calvo d.
  • 47 篇 benoit d.m.
  • 47 篇 eddymaoui a.
  • 44 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 40 篇 boumaaza j.
  • 39 篇 coleiro a.
  • 39 篇 gozzini s.r.
  • 39 篇 dallier r.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 benhassi m.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 carretero v.

语言

  • 3,653 篇 英文
  • 633 篇 其他
  • 27 篇 中文
  • 3 篇 俄文
  • 2 篇 捷克文
  • 2 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 意大利文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Applied Technology"
4310 条 记 录,以下是991-1000 订阅
排序:
Rectangular multiple-relaxation-time lattice Boltzmann method for the Navier-Stokes and nonlinear convection-diffusion equations: General equilibrium and some important issues
收藏 引用
Physical Review E 2023年 第1期108卷 015304-015304页
作者: Zhenhua Chai (柴振华) Xiaolei Yuan (袁晓垒) Baochang Shi (施保昌) School of Mathematics and Statistics Huazhong University of Science and Technology Wuhan 430074 China Institute of Interdisciplinary Research for Mathematics and Applied Science Huazhong University of Science and Technology Wuhan 430074 China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and Technology Wuhan 430074 China College of Mathematics and Information Science Hebei University Baoding 071002 China
In this paper, we develop a general rectangular multiple-relaxation-time lattice Boltzmann (RMRT-LB) method for the Navier-Stokes equations (NSEs) and nonlinear convection-diffusion equation (NCDE) by extending our re... 详细信息
来源: 评论
Using Contextual Text Mining and Ontology Methods to Establish a Novel technology Trend and Associative Analysis Framework for Sustainable Energy Development in Taiwan
Using Contextual Text Mining and Ontology Methods to Establi...
收藏 引用
IEEE International Conference on Big Data
作者: Yi-Hao Hsiao Chia-Yi Chuang Megn-Chi Huang Chia-Lee Yang Jyh-Horng Wu National Center for High-Performance Computing National Applied Research Laboratories Hsinchu Taiwan Science & Technology Policy Research and Information Center National Applied Research Laboratories Taipei Taiwan
In 2015, the United Nations proposed 17 Sustainable Development Goals, SDGs, as the guidelines for all countries in the world to promote sustainable development before 2030. Government Research Bulletin (GRB), the res... 详细信息
来源: 评论
Intrusion Detection in the Internet of Vehicles Using Transformer Models
Intrusion Detection in the Internet of Vehicles Using Transf...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Mohammad Alauthman Ashraf Mashaleh Nauman Aslam Amjad Aldweesh Ammar Almomani Department of Information Security University of Petra Jordan Al-Balqa Applied University Al-Salt Jordan Department of Computer and Information Sciences Northumbria University U.K. College of computing and IT Shaqra University Shaqra Saudi Arabia Department of Computer Information Science Higher Colleges of Technology UAE Al-Balqa Applied University Jordan
The proliferation of Internet of Vehicles (IoV) systems has introduced critical cybersecurity vulnerabilities in connected vehicle infrastructures. This paper presents a novel application of Transformer architecture f... 详细信息
来源: 评论
An Integrated Deep Learning Framework for Fruits Diseases Classification
收藏 引用
Computers, Materials & Continua 2022年 第4期71卷 1387-1402页
作者: Abdul Majid Muhammad Attique Khan Majed Alhaisoni Muhammad Asfand Eyar Usman Tariq Nazar Hussain Yunyoung Nam Seifedine Kadry Department of Computer Science HITEC University TaxilaTaxilaPakistan College of Computer Science and Engineering University of Ha’ilHa’ilSaudi Arabia Department of Computer Science Bahria UniversityIslamabad College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz UniversityAl-KhrajSaudi Arabia Department of Computer Science and Engineering Soonchunhyang UniversityAsanKorea Faculty of Applied Computing and Technology Noroff University CollegeKristiansandNorway
:Agriculture has been an important research area in the field of image processing for the last five *** affect the quality and quantity of fruits,thereby disrupting the economy of a *** computerized techniques have be... 详细信息
来源: 评论
Collaborative Filtering Approach for Movie Recommendations  19
Collaborative Filtering Approach for Movie Recommendations
收藏 引用
19th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information technology, ECTI-CON 2022
作者: Mohamad, Anis Yasmin Harun, Siti Raisah Shahidan, Nur Anis Alisa Nanthaamornphong, Aziz Mustapha, Aida Wahab, Mohd Helmy Abdul Universiti Tun Hussein Onn Malaysia Faculty of Applied Sciences and Technology Johor Malaysia Prince of Songkla University Andaman Intelligent Tourism and Service Informatics Center College of Computing Phuket Thailand Faculty of Electrical and Electronic Engineering Universiti Tun Hussein Onn Malaysia Johor Malaysia
This paper describes the development of a movies recommendation system by considering the history of the movie watched by the users through the collaborative filtering approach. This analysis are based on two datasets... 详细信息
来源: 评论
Application of Electrical Network Frequency as an Entropy Generator in Distributed Systems
Application of Electrical Network Frequency as an Entropy Ge...
收藏 引用
2023 IEEE National Aerospace and Electronics Conference, NAECON 2023
作者: Nagothu, Deeraj Xu, Ronghua Chen, Yu Blasch, Erik Ardiles-Cruz, Erika Intelligent Fusion Technology Inc. GermantownMD20876 United States Michigan Technological University Dept. of Applied Computing HoughtonMI49931 United States Binghamton University Dept. of Electrical and Computer Engineering BinghamtonNY13902 United States The U.S. Air Force Research Laboratory RomeNY13441 United States
The development of public information technology (IT) infrastructures using modern edge devices has revolutionized the smart city ecosystem. As the number of devices in the ecosystem exponentially increases, the power... 详细信息
来源: 评论
Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code
arXiv
收藏 引用
arXiv 2024年
作者: McCully, Gary A. Hastings, John D. Xu, Shengjie Fortier, Adam The Beacom College of Computer and Cyber Sciences Dakota State University MadisonSD United States Department of Cyber Intelligence and Information Operations College of Applied Science & Technology University of Arizona TucsonAZ United States College of Computing Georgia Institute of Technology AtlantaGA United States
Detecting vulnerabilities within compiled binaries is challenging due to lost high-level code structures and other factors such as architectural dependencies, compilers, and optimization options. To address these obst... 详细信息
来源: 评论
Bird Swarm Algorithm with Fuzzy Min-Max Neural Network for Financial Crisis Prediction
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 1541-1555页
作者: K.Pradeep Mohan Kumar S.Dhanasekaran I.S.Hephzi Punithavathi P.Duraipandy Ashit Kumar Dutta Irina V.Pustokhina Denis A.Pustokhin Department of Computing Technologies Associate ProfessorSRM Institute of Science and TechnologyKattankulathur603203India Department of Information Technology Kalasalingam Academy of Research and Education626126India Department of Computer Science and Engineering Sphoorthy Engineering CollegeHyderabadTelangana501510India Department of Electrical and Electronics Engineering J B Institute of Engineering and TechnologyHyderabadTelangana500075India Department of Computer Science and Information System College of Applied SciencesAlMaarefa UniversityRiyadh11597Kingdom of Saudi Arabia Department of Entrepreneurship and Logistics Plekhanov Russian University of Economics117997MoscowRussia Department of Logistics State University of Management109542MoscowRussia
Financial crisis prediction(FCP)models are used for predicting or forecasting the financial status of a company or financial *** is considered a challenging issue in the financial *** and machine learning(ML)models ca... 详细信息
来源: 评论
Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
arXiv
收藏 引用
arXiv 2024年
作者: McCully, Gary A. Hastings, John D. Xu, Shengjie Fortier, Adam The Beacom College of Computer and Cyber Sciences Dakota State University MadisonSD United States Department of Cyber Intelligence and Information Operations College of Applied Science & Technology University of Arizona TucsonAZ United States College of Computing Georgia Institute of Technology AtlantaGA United States
Ransomware and other forms of malware cause significant financial and operational damage to organizations by exploiting long-standing and often difficult-to-detect software vulnerabilities. To detect vulnerabilities s... 详细信息
来源: 评论
Utilizing Deep Learning in Smart Cities for Environmental Monitoring
Utilizing Deep Learning in Smart Cities for Environmental Mo...
收藏 引用
2024 International Conference on Innovative computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Hoang, Dinh Cong Devi, Shova Koner, Jonardan Dhandayuthapani, Bala Choudhury, Susanta Kumar Sahoo, Deepali Rani Institute for South Asian West Asian and African Studies Department of Middle East & West Asia Studies India Amity Law School Lucknow Amity University Uttar Pradesh UP India Nicmar University Pune India College of Computing and Information Sciences University of Technology and Applied Sciences Department of It Shinas Campus Oman Gietu University Department of Civil Engineering Odisha Gunupur India Symbiosis Law School Noida India Pune India
The effectiveness and dependability of services provided by smart cities are significantly impacted by the significant and difficult issue of intrusion detection. Replay attacks, which weaken security via improper aut... 详细信息
来源: 评论