咨询与建议

限定检索结果

文献类型

  • 2,280 篇 期刊文献
  • 1,977 篇 会议
  • 56 册 图书

馆藏范围

  • 4,313 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,509 篇 工学
    • 1,495 篇 计算机科学与技术...
    • 1,141 篇 软件工程
    • 415 篇 信息与通信工程
    • 350 篇 控制科学与工程
    • 345 篇 电气工程
    • 337 篇 电子科学与技术(可...
    • 247 篇 光学工程
    • 230 篇 生物工程
    • 219 篇 材料科学与工程(可...
    • 203 篇 化学工程与技术
    • 197 篇 生物医学工程(可授...
    • 171 篇 机械工程
    • 160 篇 力学(可授工学、理...
    • 158 篇 动力工程及工程热...
    • 150 篇 仪器科学与技术
  • 2,112 篇 理学
    • 1,016 篇 物理学
    • 961 篇 数学
    • 316 篇 统计学(可授理学、...
    • 278 篇 生物学
    • 277 篇 化学
    • 194 篇 系统科学
    • 107 篇 地球物理学
  • 559 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 258 篇 医学
    • 205 篇 临床医学
    • 176 篇 基础医学(可授医学...
    • 110 篇 公共卫生与预防医...
    • 92 篇 药学(可授医学、理...
  • 99 篇 法学
  • 67 篇 农学
  • 55 篇 教育学
  • 54 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 7 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 120 篇 deep learning
  • 110 篇 machine learning
  • 93 篇 accuracy
  • 81 篇 artificial intel...
  • 74 篇 computational mo...
  • 65 篇 feature extracti...
  • 60 篇 training
  • 58 篇 convolutional ne...
  • 51 篇 predictive model...
  • 49 篇 internet of thin...
  • 49 篇 data models
  • 46 篇 semantics
  • 41 篇 support vector m...
  • 40 篇 neural networks
  • 38 篇 real-time system...
  • 38 篇 forecasting
  • 34 篇 covid-19
  • 34 篇 educational inst...
  • 34 篇 data mining
  • 32 篇 computer science

机构

  • 51 篇 shandong provinc...
  • 50 篇 infn sezione di ...
  • 50 篇 north-west unive...
  • 49 篇 institut univers...
  • 46 篇 shandong enginee...
  • 46 篇 national centre ...
  • 45 篇 université de st...
  • 43 篇 tno technical sc...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 infn sezione di ...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 40 篇 università di ca...
  • 40 篇 in2p3 lpc campus...
  • 39 篇 dipartimento di ...
  • 39 篇 nikhef national ...
  • 38 篇 department of ph...

作者

  • 51 篇 chen a.
  • 50 篇 ferrara g.
  • 50 篇 ardid m.
  • 50 篇 calvo d.
  • 48 篇 benoit d.m.
  • 48 篇 eddymaoui a.
  • 44 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 40 篇 boumaaza j.
  • 39 篇 coleiro a.
  • 39 篇 gozzini s.r.
  • 39 篇 dallier r.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 benhassi m.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 carretero v.

语言

  • 3,950 篇 英文
  • 340 篇 其他
  • 23 篇 中文
  • 3 篇 俄文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 意大利文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Applied Technology"
4313 条 记 录,以下是431-440 订阅
排序:
Invariants for level-1 phylogenetic networks under the random walk 4-state Markov model
arXiv
收藏 引用
arXiv 2024年
作者: Frohn, Martin Holtgrefe, Niels van Iersel, Leo Jones, Mark Kelk, Steven Department of Advanced Computing Sciences Maastricht University Maastricht Netherlands Institute of Applied Mathematics Delft University of Technology Delft Netherlands
Phylogenetic networks can represent evolutionary events that cannot be described by phylogenetic trees, such as hybridization, introgression, and lateral gene transfer. Studying phylogenetic networks under a statistic... 详细信息
来源: 评论
Web Extension for Phishing URL Identification  3
Web Extension for Phishing URL Identification
收藏 引用
3rd International Conference on Intelligent computing, Instrumentation and Control Technologies, ICICICT 2022
作者: Kiruthi Whasan, W.R. Khiran Khumhaar, W.R. Reddy, Kalluri Raviteja Dhanalakshmi, R. Kapilan Radhakrishnan, P. Kcg College of Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Applied Computing University of Wales Trinity Saint David United Kingdom
Phishing attacks have been the most consistent and emerging cyber-attack among other social engineering attacks. In spite of several strict mechanisms and policies to identify and avoid phishing websites, new techniqu... 详细信息
来源: 评论
PREFACE: 3rd International Conference on Robotics, Intelligent Automation and Control Technologies (RIACT 2022)
收藏 引用
AIP Conference Proceedings 2023年 第1期2946卷 1-8页
作者: Arockia Doss, Arockia Selvakumar Short, Michael Schilberg, Daniel Design and Automation Research Group School of Mechanical Engineering Vellore Institute of Technology Tamil Nadu Chennai India School of Computing Engineering and Digital Technologies Teesside University United Kingdom Department of Mechatronics and Mechanical Engineering University of Applied Sciences Bochum Germany
Preface: 3rd International Conference on Robotics, Intelligent Automation and Control Technologies (RIACT 2022), AIP Conference Proceedings, Volume 2946, Issue
来源: 评论
An Optimization Approach for Convolutional Neural Network Using Non-Dominated Sorted Genetic Algorithm-Ⅱ
收藏 引用
Computers, Materials & Continua 2023年 第3期74卷 5641-5661页
作者: Afia Zafar Muhammad Aamir Nazri Mohd Nawi Ali Arshad Saman Riaz Abdulrahman Alruban Ashit Kumar Dutta Badr Almutairi Sultan Almotairi Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn MalaysiaMalaysia School of Electronics Computing and MathematicsUniversity of DerbyUK Department of Computer Science National University of TechnologyIslamabadPakistan Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl Majmaah11952Saudi Arabia Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Kingdom of Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia Department of Information Systems Faculty of Computer and Information SciencesIslamic University of MadinahMadinah42351Saudi Arabia
In computer vision,convolutional neural networks have a wide range of *** representmost of today’s data,so it’s important to know how to handle these large amounts of data *** neural networks have been shown to solv... 详细信息
来源: 评论
Development of Interpretable Machine Learning Models for COVID-19 Drug Target Docking Scores Prediction
Development of Interpretable Machine Learning Models for COV...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Shi, Wenqi Murakoso, Mio Guo, Xiaoyan Wang, May D. Georgia Institute of Technology Department of Electrical and Computer Engineering Atlanta United States Kyoto University Department of Applied Life Science Kyoto Japan Georgia Institute of Technology College of Computing Atlanta United States Georgia Institute of Technology Wallace H. Coulter Department of Biomedical Engineering Atlanta United States
With the extensive time and financial requirements incumbent on drug discovery, computational approaches, such as protein-ligand docking predictions, are increasingly crucial for accelerating the process of drug repur... 详细信息
来源: 评论
Nodule Detection Using Local Binary Pattern Features to Enhance Diagnostic Decisions
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3377-3390页
作者: Umar Rashid Arfan Jaffar Muhammad Rashid Mohammed S.Alshuhri Sheeraz Akram Faculty of Computer Science and Information Technology The Superior UniversityLahore54600Pakistan Intelligent Data Visual Computing Research(IDVCR) Lahore54600Pakistan Department of Computer Science National University of TechnologyIslamabad45000Pakistan Department of Radiological Sciences and Medical Imaging College of AppliedMedical SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia Information Systems Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh12571Saudi Arabia
Pulmonary nodules are small, round, or oval-shaped growths on the lungs. They can be benign (noncancerous) or malignant (cancerous). The size of a nodule can range from a few millimeters to a few centimeters in diamet... 详细信息
来源: 评论
Enhanced chaos-based image compression-encryption algorithm utilizing 2D compressive sensing and genetic algorithm optimization
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Nanfak, Arnaud de Dieu Nkapkop, Jean Mvogo Ngono, Joseph Tabekoueng Njitacke, Zeric Lessouga Etoundi, Christophe Magloire Effa, Joseph Yves Laboratory of Electronic Electrical Engineering Automation and Telecommunication National Higher Polytechnic School of Douala University of Douala PO Box 2701 Douala Cameroon Technology and Applied Sciences Laboratory University Institute of Technology University of Douala P.O. Box 8698 Douala Cameroon Applied Computing Laboratory Faculty of Science University of Douala P.O. Box 2701 Douala Cameroon University of Buea P.O. Box 63 Buea Cameroon Department of Physics Faculty of Science University of Ngaoundere P.O. Box 454 Ngaoundere Cameroon
This paper introduces an innovative image compression and encryption algorithm that leverages the genetic algorithm (GA), compressive sensing (CS), and a newly developed hyperchaotic map. In this algorithm, the GA is ... 详细信息
来源: 评论
Exploring Robust DDoS Detection: A Machine Learning Analysis with the CICDDoS2019 Dataset
Exploring Robust DDoS Detection: A Machine Learning Analysis...
收藏 引用
India Council International Subsections Conference (INDISCON), IEEE
作者: Kamal Saluja Susama Bagchi Vikas Solanki Muhammad Numan Ali Khan Esha Dhamija Sanjoy Kumar Debnath Chitkara University Institite of Engineering and Technology Chitkara University Punjab India College of Computing and Information Sciences University of Technology and Applied sciences Shinas Sultanate of Oman
The ever-present threat posed by Distributed Denial of Service attack is highlighted. The significance of building robust cybersecurity measures that are not just inventive but also flexible. The purpose of this study... 详细信息
来源: 评论
Does Human Factor Contribute to Mining Accidents? A Systematic Literature Review Approach
Does Human Factor Contribute to Mining Accidents? A Systemat...
收藏 引用
Human Engineering Symposium, HUMENS 2021
作者: Ismail, Siti Noraishah Ramli, Azizan Faculty of Industrial Sciences and Technology College of Computing and Applied Sciences Universiti Malaysia Pahang Kuantan Pahang Malaysia Faculty of Chemical and Process Engineering Technology College of Engineering Technology Universiti Malaysia Pahang Kuantan Pahang Malaysia
Human factor always has been debated as the key factor contributes to industrial accidents such as manufacturing, construction and many more. However, there are lack of studies globally within this research to review ... 详细信息
来源: 评论
Optimizing Phishing URL Detection: A Comparative Analysis of Feature Counts and Training Times  5
Optimizing Phishing URL Detection: A Comparative Analysis of...
收藏 引用
5th International Conference on Intelligent computing, Communication, Networking and Services, ICCNS 2024
作者: Alajlouni, Moayyad Tashtoush, Yahya Dossari, Saud Alhajaj Al. Darwish, Omar Jordan University of Science and Technology Department of Computer Science Irbid Jordan Prince Sattam bin Abdulaziz University Department of Electrical Engineering Wadi Addwasir Saudi Arabia Eastern Michigan University Information Security and Applied Computing Department YpsilantiMI48197 United States
Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic web sites to obtain sensitive information such as passwords and bank statements. On... 详细信息
来源: 评论