咨询与建议

限定检索结果

文献类型

  • 2,280 篇 期刊文献
  • 1,977 篇 会议
  • 56 册 图书

馆藏范围

  • 4,313 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,509 篇 工学
    • 1,495 篇 计算机科学与技术...
    • 1,141 篇 软件工程
    • 415 篇 信息与通信工程
    • 350 篇 控制科学与工程
    • 345 篇 电气工程
    • 337 篇 电子科学与技术(可...
    • 247 篇 光学工程
    • 230 篇 生物工程
    • 219 篇 材料科学与工程(可...
    • 203 篇 化学工程与技术
    • 197 篇 生物医学工程(可授...
    • 171 篇 机械工程
    • 160 篇 力学(可授工学、理...
    • 158 篇 动力工程及工程热...
    • 150 篇 仪器科学与技术
  • 2,112 篇 理学
    • 1,016 篇 物理学
    • 961 篇 数学
    • 316 篇 统计学(可授理学、...
    • 278 篇 生物学
    • 277 篇 化学
    • 194 篇 系统科学
    • 107 篇 地球物理学
  • 559 篇 管理学
    • 338 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 258 篇 医学
    • 205 篇 临床医学
    • 176 篇 基础医学(可授医学...
    • 110 篇 公共卫生与预防医...
    • 92 篇 药学(可授医学、理...
  • 99 篇 法学
  • 67 篇 农学
  • 55 篇 教育学
  • 54 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 7 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 120 篇 deep learning
  • 110 篇 machine learning
  • 93 篇 accuracy
  • 81 篇 artificial intel...
  • 74 篇 computational mo...
  • 65 篇 feature extracti...
  • 60 篇 training
  • 58 篇 convolutional ne...
  • 51 篇 predictive model...
  • 49 篇 internet of thin...
  • 49 篇 data models
  • 46 篇 semantics
  • 41 篇 support vector m...
  • 40 篇 neural networks
  • 38 篇 real-time system...
  • 38 篇 forecasting
  • 34 篇 covid-19
  • 34 篇 educational inst...
  • 34 篇 data mining
  • 32 篇 computer science

机构

  • 51 篇 shandong provinc...
  • 50 篇 infn sezione di ...
  • 50 篇 north-west unive...
  • 49 篇 institut univers...
  • 46 篇 shandong enginee...
  • 46 篇 national centre ...
  • 45 篇 université de st...
  • 43 篇 tno technical sc...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 infn sezione di ...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 40 篇 università di ca...
  • 40 篇 in2p3 lpc campus...
  • 39 篇 dipartimento di ...
  • 39 篇 nikhef national ...
  • 38 篇 department of ph...

作者

  • 51 篇 chen a.
  • 50 篇 ferrara g.
  • 50 篇 ardid m.
  • 50 篇 calvo d.
  • 48 篇 benoit d.m.
  • 48 篇 eddymaoui a.
  • 44 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 40 篇 boumaaza j.
  • 39 篇 coleiro a.
  • 39 篇 gozzini s.r.
  • 39 篇 dallier r.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 benhassi m.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 carretero v.

语言

  • 3,950 篇 英文
  • 340 篇 其他
  • 23 篇 中文
  • 3 篇 俄文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 意大利文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Applied Technology"
4313 条 记 录,以下是621-630 订阅
排序:
Analyzing darknet traffic through machine learning and neucube spiking neural networks
收藏 引用
Intelligent and Converged Networks 2024年 第4期5卷 265-283页
作者: Iman Akour Mohammad Alauthman Khalid M.O.Nahar Ammar Almomani Brij B.Gupta Information Systems Department College of Computing&InformaticsUniversity of SharjahSharjahUnited Arab Emirates Department of Information Security Faculty of Information TechnologyUniversity of PetraAmman 11196Jordan the Faculty of Computer Studies Arab Open UniversityRiyadh 11681Saudi Arabia Department of Information Technology Al-Huson University CollegeAl-Balqa Applied UniversityIrbid 19117Jordan the Department of Computer Information Science Higher Colleges of TechnologySharjahUnited Arab Emirates the Department of Computer Science and Information Engineering Asia UniversityTaichung 413ChinaSymbiosis Centre for Information TechnologySymbiosis International(Deemed University)Pune 412115India Centre of Inter-disciplinary Research&Innovation University of Petroleum and Energy StudiesDehradun 248007India
The rapidly evolving darknet enables a wide range of cybercrimes through anonymous and untraceable communication *** detection of clandestine darknet traffic is therefore critical yet immensely *** research demonstrat... 详细信息
来源: 评论
Using Contextual Text Mining Algorithm to Analysis Yearly Trend for Population Ageing and Declining Fertility with Government Science and technology Projects in Taiwan  21
Using Contextual Text Mining Algorithm to Analysis Yearly Tr...
收藏 引用
4th International Conference on Computer Science and Software Engineering, CSSE 2021
作者: Chuang, C.Y. Huang, M.C. Lin, Y.Y. Hsiao, Y.H. Wang, T.C. Science and Technology Policy Research and Information Center National Applied Research Laboratories Taiwan National Center for High-performance Computing National Applied Research Laboratories Taiwan
The growth of the world population has been steadily slowing down, primarily owing to an almost worldwide decline of fertility and ageing of population. In Taiwan, the fertility rate is experiencing long-Term downtren... 详细信息
来源: 评论
Strategic Defense Post Allocation Using the Corona Cover Set for Enhanced Military Zone Security
Strategic Defense Post Allocation Using the Corona Cover Set...
收藏 引用
Women in computing (InCoWoCo), International Conference for
作者: Niveditha. P G. Mahadevan C. Sivagnanam Department of Mathematics The Gandhigram Rural Institute (Deemed to be University) Gandhigram Tamilnadu India Mathematics and Computing Skills Unit University of Technology and Applied Sciences-Sur Sultanate of Oman
Defense forces are vital for national safety, peace-keeping, disaster response, and economic support. They require strong support systems, medical access, rapid deployment, and effective command centers to operate eff... 详细信息
来源: 评论
Phase Diagram and Physical Properties Anisotropy of Strontianite
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Zi-Jiang Ju, Jia-Qi Dou, Xilong Jin, Neng-Zhi Zhang, Cai-Rong Sun, Xiao-Wei Zhang, Lei School of Mathematics and Physics Lanzhou Jiaotong University Lanzhou730070 China Key Laboratory of Cloud Computing of Gansu Province Gansu Computing Center Lanzhou730030 China Department of Applied Physics Lanzhou University of Technology Lanzhou730050 China
The physical properties and anisotropy of carbonate at high pressure are the basis of understanding the deep carbon cycle and storage. Here, the phase diagram of strontianite (SrCO3) was constructed by first-principle... 详细信息
来源: 评论
Transmission Line Fault Detection and Classification Using Feature Extraction Based Self-Attention Convolutional Neural Network with Time Series Image  3
Transmission Line Fault Detection and Classification Using F...
收藏 引用
3rd IEEE International Conference on Distributed computing and Electrical Circuits and Electronics, ICDCECE 2024
作者: Almusawi, Muntather Babu, D. Raja Mazumder, Debarshi Bala Dhandayuthapani, V. Saranya, N. Naga College Of Technical Engineering The Islamic University Department Of Computers Techniques Engineering Najaf Iraq Sr University Department Of Electrical And Electronics Engineering Warangal India Nitte Meenakshi Institute Of Technology Department Of Ai & Ds Bengaluru India College Of Computing And Information Sciences University Of Technology And Applied Sciences Department Of It Shinas campus Oman Saveetha College Of Liberal Arts & Science Simats Department Of Computer Applications Chennai India
The transmission lines continuously experience the number of shunt faults and its effective in practical system increases the instability, load damages and line restoration cost. This work implements an advanced self-... 详细信息
来源: 评论
Coding Observer Nodes for Sybil Attacks Detection in Mobile Wireless Sensor Networks  19
Coding Observer Nodes for Sybil Attacks Detection in Mobile ...
收藏 引用
19th IEEE International Conference on Embedded and Ubiquitous computing, EUC 2021
作者: Sassani Sarrafpour, Bahman A. Alomirah, Abdulaziz Pang, Shaning Sarrafpour, Soshian School of Computing Engineering Applied Technology Unitec New Zealand Auckland New Zealand School of Computing Engineering Applied Technology Unitec New Zealand Auckland New Zealand Federation University School of Engineering Information Technology Physical Science Melbourne Australia Yale University School of Medicine Newhaven United States
Sybil attack is one of the most common and serious attacks in wireless sensor networks, in which a malicious node illegitimately forges several (fake) identities. These fake copies confuse and collapse the network. Sy... 详细信息
来源: 评论
Infeasibility of Sequitur-Based Motif for Mouse Dynamics in Digital Forensics
Infeasibility of Sequitur-Based Motif for Mouse Dynamics in ...
收藏 引用
International Symposium on Digital Forensic and Security (ISDFS)
作者: Richard Ikuesan Farkhund Iqbal Abdul Kadhim Hayawi Computing and Applied Technology College of Technological Innovation Zayed University Abu Dhabi UAE Computational Systems College of Interdisciplinary Studies Zayed University Abu Dhabi UAE
Utilizing and deploying behavioral biometric modalities (BBM), specifically mouse dynamics for user attribution in a digital investigation, has seen a rapid upsurge. However, as asserted in a recent study, the current... 详细信息
来源: 评论
Study on the Structure, Elasticity, and Thermal Conductivity of Orthocarbonate Sr2CO4
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Zi-Jiang Ju, Jia-Qi Dou, Xi-Long Jin, Neng-Zhi Zhang, Cai-Rong Wang, Xiao-Yun Wu, Liang School of Mathematics and Physics Lanzhou Jiaotong University Lanzhou730070 China Key Laboratory of Cloud Computing of Gansu Province Gansu Computing Center Lanzhou730030 China Department of Applied Physics Lanzhou University of Technology Lanzhou730050 China
Orthocarbonate Sr2CO4 is a recently discovered Sr-carbonate that plays a crucial role in understanding the global long-term carbon cycle. In this work, the structure, equation of state, elasticity, and thermal conduct... 详细信息
来源: 评论
Analysis of ECM Battery Modeling Techniques for Different Battery Types
Analysis of ECM Battery Modeling Techniques for Different Ba...
收藏 引用
International Workshop on Robot Motion and Control (RoMoCo)
作者: Mohsen Heydarzadeh Mohammad Gerami Tehrani Anam Tahir Eero Immonen Hashem Haghbayan Juha Plosila Faculty of Technology Industry Turku University of Applied Sciences Turku Finland Department of Product Development at Valmet Automotive Plc Department of Computing University of Turku Turku Finland
The paper presents a comparative study of two methods for identifying equivalent circuit models (ECM) parameters for battery modeling. In order to comprehensively compare the methods, the electrical behavior of a lith... 详细信息
来源: 评论
Machinery Fault Diagnoses in High-Voltage Circuit Breakers Using Empirical Mode Decomposition-Support Vector Machine Model  3
Machinery Fault Diagnoses in High-Voltage Circuit Breakers U...
收藏 引用
3rd IEEE International Conference on Distributed computing and Electrical Circuits and Electronics, ICDCECE 2024
作者: Al-Farouni, Mohammed Sudhakar, A.V.V. Divya, G. Bala Dhandayuthapani, V. Shivakanth, Gandla Department Of Computers Techniques Engineering College Of Technical Engineering The Islamic University Najaf Iraq Department Of Electrical And Electronics Engineering Sr University Warangal India Department Of Ece Nitte Meenakshi Institute Of Technology Bengaluru India Department Of It College Of Computing And Information Sciences University Of Technology And Applied Sciences Shinas campus Shinas Oman Department Of Computer Science And Engineering Koneru Lakshmaiah Education Foundation Telangana Hyderabad India
The circuit breakers have a flaw in their trip mechanism. Early mechanical faults like coil-plunger jam are hard to report using traditional fault diagnosis based on the coil current. However, users still have difficu... 详细信息
来源: 评论