咨询与建议

限定检索结果

文献类型

  • 2,280 篇 期刊文献
  • 1,977 篇 会议
  • 56 册 图书

馆藏范围

  • 4,313 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,509 篇 工学
    • 1,495 篇 计算机科学与技术...
    • 1,141 篇 软件工程
    • 415 篇 信息与通信工程
    • 350 篇 控制科学与工程
    • 345 篇 电气工程
    • 337 篇 电子科学与技术(可...
    • 247 篇 光学工程
    • 230 篇 生物工程
    • 219 篇 材料科学与工程(可...
    • 203 篇 化学工程与技术
    • 197 篇 生物医学工程(可授...
    • 171 篇 机械工程
    • 160 篇 力学(可授工学、理...
    • 158 篇 动力工程及工程热...
    • 150 篇 仪器科学与技术
  • 2,112 篇 理学
    • 1,016 篇 物理学
    • 961 篇 数学
    • 316 篇 统计学(可授理学、...
    • 278 篇 生物学
    • 277 篇 化学
    • 194 篇 系统科学
    • 107 篇 地球物理学
  • 559 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 258 篇 医学
    • 205 篇 临床医学
    • 176 篇 基础医学(可授医学...
    • 110 篇 公共卫生与预防医...
    • 92 篇 药学(可授医学、理...
  • 99 篇 法学
  • 67 篇 农学
  • 55 篇 教育学
  • 54 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 7 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 120 篇 deep learning
  • 110 篇 machine learning
  • 93 篇 accuracy
  • 81 篇 artificial intel...
  • 74 篇 computational mo...
  • 65 篇 feature extracti...
  • 60 篇 training
  • 58 篇 convolutional ne...
  • 51 篇 predictive model...
  • 49 篇 internet of thin...
  • 49 篇 data models
  • 46 篇 semantics
  • 41 篇 support vector m...
  • 40 篇 neural networks
  • 38 篇 real-time system...
  • 38 篇 forecasting
  • 34 篇 covid-19
  • 34 篇 educational inst...
  • 34 篇 data mining
  • 32 篇 computer science

机构

  • 51 篇 shandong provinc...
  • 50 篇 infn sezione di ...
  • 50 篇 north-west unive...
  • 49 篇 institut univers...
  • 46 篇 shandong enginee...
  • 46 篇 national centre ...
  • 45 篇 université de st...
  • 43 篇 tno technical sc...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 infn sezione di ...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 40 篇 università di ca...
  • 40 篇 in2p3 lpc campus...
  • 39 篇 dipartimento di ...
  • 39 篇 nikhef national ...
  • 38 篇 department of ph...

作者

  • 51 篇 chen a.
  • 50 篇 ferrara g.
  • 50 篇 ardid m.
  • 50 篇 calvo d.
  • 48 篇 benoit d.m.
  • 48 篇 eddymaoui a.
  • 44 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 40 篇 boumaaza j.
  • 39 篇 coleiro a.
  • 39 篇 gozzini s.r.
  • 39 篇 dallier r.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 benhassi m.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 carretero v.

语言

  • 3,950 篇 英文
  • 340 篇 其他
  • 23 篇 中文
  • 3 篇 俄文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 意大利文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Applied Technology"
4313 条 记 录,以下是401-410 订阅
排序:
Visual Object Tracking Using Machine Learning  1st
Visual Object Tracking Using Machine Learning
收藏 引用
Science, Engineering Management and Information technology First International Conference, SEMIT 2022
作者: Odeh, Ammar Keshta, Ismail Al-Fayoumi, Mustafa Department of Computer Science King Hussein School of Computing Sciences Princess Sumaya University for Technology Amman Amman Jordan Department of Computer Science College of Applied Sciences AlMaarefa University Riyadh Riyadh Saudi Arabia
Visual object tracking has become a very active research area in recent years. Each year, a growing number of tracking algorithms are proposed. Object detection and tracking is a critical and challenging task in many ... 详细信息
来源: 评论
Exploring Cultural Learning with Vertical Chatbot: Korda  8th
Exploring Cultural Learning with Vertical Chatbot: Korda
收藏 引用
8th International Conference on the Applications of Science and Mathematics, SCIEMATHIC 2022
作者: Kasinathan, Vinothini Mustapha, Aida Sewnundun, Neekita Bing, Diong Jien Fang, Lee Khoon Yi, Cindy Koh Xin School of Computing and Technology Asia Pacific University Taman Teknologi Malaysia Jalan Teknologi 5 Kuala Lumpur57000 Malaysia Faculty of Applied Sciences and Technology Universiti Tun Hussein Malaysia KM1 Jalan Pagoh Pagoh Johor 84600 Malaysia
Cultural heritage is the tangible and tacit legacy of attributes of society inherited from past generations. Its preservation relies on the memory of communities and individuals, hence limiting it from widespread acce... 详细信息
来源: 评论
Asthma Disease Risk Prediction Using Machine Learning Techniques
Asthma Disease Risk Prediction Using Machine Learning Techni...
收藏 引用
2023 International Conference on Computer Communication and Informatics, ICCCI 2023
作者: Pyingkodi, M. Thenmozhi, K. Wilfred Blessing, N.R. Selvaraj, P.A. Kumar, Kamdev Aadarsh, V. Mariya Arockiya Akash, A. Kongu Engineering College Department of Computer Applications Erode India Kristu Jayanti College Department of Computer Science Bengaluru India University of Technology and Applied Sciences-Ibri College of Computing and Information Sciences IT Department Oman
The signs of asthma, a long-term inflammatory condition of the airways, include wheezing, throat tightness, coughing, and breathing difficulties. The attack of an asthma, which can be fatal, is the fast worsening of t... 详细信息
来源: 评论
A Multi-Module Spatial Semantic Network with Gradient Boosting for Efficient Crop Classification
A Multi-Module Spatial Semantic Network with Gradient Boosti...
收藏 引用
2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity, ICDSCNC 2024
作者: Husain, Saif O. Meghana, A. Soujanya, Rajireddy Sunil, G. Reddy Muvva, Vijaya Bhaskar The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Nitte Meenakshi Institute of Technology Department of Eee Bengaluru India Gokaraju Rangaraju Institute of Engineering and Technology Department of Cse Hyderabad India Sr University School of Computer Science & Artificial Intelligence Warangal India University of Technology and Applied Sciences -Shinas College of Computing and Information Sciences Department of Information Technology Shinas Oman
For the past few years, accurate crop classification is critical for efficient agricultural management and monitoring. While traditional classification techniques have leveraged spectral indices, they often struggle t... 详细信息
来源: 评论
An Optimal Cluster Head and Secure Route Path Selection Using Multi Objective—GWO Approach in Wireless Sensor Networks
An Optimal Cluster Head and Secure Route Path Selection Usin...
收藏 引用
International Conference on 6G Communications Networking and Signal Processing, SGCNSP 2023
作者: Muvva, Vijaya Bhaskar Reddy Almoussawi, Zainab abed Naik, Narayan Madhavan, Sowmya Praveena, Hirald Dwaraka Department of Information Technology College of Computing and Information Sciences University of Technology and Applied Sciences -Shinas Shinas Oman College of Islamic Science Ahl Al Bayt University Karbala Iraq Department of IS&E Canara Engineering College Visvesvaraya Technological University Karnataka BantwalBelagavi India Department of Electronics and Communication Engineering Nitte Meenakshi Institute of Technology Bengaluru India Andhra Pradesh Tirupati India
Wireless Sensor Networks (WSNs) play a crucial role ranging from environmental control to queue tracking. These networks are established by deploying numerous tiny sensor nodes that communicate with each other wireles... 详细信息
来源: 评论
Towards Differentiating Between Failures and Domain Shifts in Industrial Data Streams
Towards Differentiating Between Failures and Domain Shifts i...
收藏 引用
2024 Workshop on Embracing Human-Aware AI in Industry 5.0, HAII5.0 2024
作者: Wojak-Strzelecka, Natalia Bobek, Szymon Nalepa, Grzegorz J. Stefanowski, Jerzy Jagiellonian Human-Centered AI Lab Mark Kac Center for Complex Systems Research Institute of Applied Computer Science Faculty of Physics Astronomy and Applied Computer Science Jagiellonian University ul. prof. Stanislawa Lojasiewicza 11 Krakow30-348 Poland Institute of Computing Science Poznań University of Technology Poznań60-965 Poland
Anomaly and failure detection methods are crucial in identifying deviations from normal system operational conditions, which allows for actions to be taken in advance, usually preventing more serious damages. Long-las... 详细信息
来源: 评论
Empowering Aging Populations: Implementing Robotics Solutions for Elderly
Empowering Aging Populations: Implementing Robotics Solution...
收藏 引用
IEEE Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability (ECBIOS)
作者: Tewfiq El Maliki Gabriel Strano Information Technology Department-Hepia University of Applied Sciences Western Switzerland Geneva Switzerland Computing and communication systems University of applied sciences-HES-SO Geneva Switzerland
The anticipated doubling of the global elderly population by 2050 brings the increased risk and severe consequences of falls to the forefront, especially for those living on their own. This demographic trend underscor... 详细信息
来源: 评论
Parameter identification in PDEs by the solution of monotone inclusion problems
arXiv
收藏 引用
arXiv 2024年
作者: Gautam, Pankaj Grasmair, Markus Department of Applied Mathematics and Scientific Computing Indian Institute of Technology Roorkee India Department of Mathematical Sciences Norwegian University of Science and Technology Trondheim Norway
In this paper we consider the solution of monotone inverse problems using the particular example of a parameter identification problem for a semilinear parabolic PDE. For the regularized solution of this problem, we i... 详细信息
来源: 评论
An Overview of Tools and Techniques in Network Forensics  25
An Overview of Tools and Techniques in Network Forensics
收藏 引用
25th International Arab Conference on Information technology, ACIT 2024
作者: Asassfeh, Mahmoud Al-Mousa, Mohammad Rasmi Al-Dweikat, Hasan Al-Mashagbeh, Malak Hamad Afaneh, Suha Samara, Ghassan Zaid, Ali Abu Khouj, Mohammed Al Daoud, Essam Zarqa University Department of Cybersecurity Zarqa Jordan Applied Science Private University Cybersecurity and Cloud Computing Department Amman Jordan Zarqa University Department of Computer Science Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Zarqa University Faculty of Information Technology Zarqa Jordan
Network forensics pertains to a subfield of digital forensics that deals with network security. It is utilized in conjunction with computer network traffic monitoring and analysis, which acts as an intrusion detection... 详细信息
来源: 评论
A Pruned Multi-Scale Skip Connected and Asymmetric-Convolution-Based U-Net Model for Land Cover Classification
A Pruned Multi-Scale Skip Connected and Asymmetric-Convoluti...
收藏 引用
2024 International Conference on Distributed Systems, Computer Networks and Cybersecurity, ICDSCNC 2024
作者: Almusawi, Muntather Parameshachari, B.D. Sunil, G. Reddy Muvva, Vijaya Bhaskar Siri, Dharmapuri The Islamic University College of Technical Engineering Department of Computers Techniques Engineering Najaf Iraq Nitte Meenakshi Institute of Technology Department of Ece Bengaluru India Sr University Department of Computer Science & Artificial Intelligence Warangal India University of Technology and Applied Sciences -Shinas College of Computing and Information Sciences Department of Information Technology Shinas Oman Gokaraju Rangaraju Institute of Engineering and Technology Department of Cse Hyderabad India
Recently, land cover classification became an evolutionary study in Remote Sensing (RS) satellite interpretations. While extracting features from satellite images, spatial information causes the overfitting issue. In ... 详细信息
来源: 评论