咨询与建议

限定检索结果

文献类型

  • 2,263 篇 期刊文献
  • 1,976 篇 会议
  • 56 册 图书

馆藏范围

  • 4,295 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,491 篇 工学
    • 1,484 篇 计算机科学与技术...
    • 1,139 篇 软件工程
    • 413 篇 信息与通信工程
    • 343 篇 电气工程
    • 342 篇 控制科学与工程
    • 337 篇 电子科学与技术(可...
    • 246 篇 光学工程
    • 231 篇 生物工程
    • 217 篇 材料科学与工程(可...
    • 201 篇 化学工程与技术
    • 195 篇 生物医学工程(可授...
    • 173 篇 机械工程
    • 161 篇 力学(可授工学、理...
    • 158 篇 动力工程及工程热...
    • 149 篇 仪器科学与技术
  • 2,106 篇 理学
    • 1,014 篇 物理学
    • 964 篇 数学
    • 317 篇 统计学(可授理学、...
    • 279 篇 生物学
    • 273 篇 化学
    • 194 篇 系统科学
    • 105 篇 地球物理学
  • 556 篇 管理学
    • 336 篇 管理科学与工程(可...
    • 225 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 256 篇 医学
    • 203 篇 临床医学
    • 175 篇 基础医学(可授医学...
    • 111 篇 公共卫生与预防医...
    • 92 篇 药学(可授医学、理...
  • 98 篇 法学
  • 67 篇 农学
  • 56 篇 教育学
  • 55 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 7 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 119 篇 deep learning
  • 107 篇 machine learning
  • 93 篇 accuracy
  • 81 篇 artificial intel...
  • 74 篇 computational mo...
  • 65 篇 feature extracti...
  • 60 篇 training
  • 56 篇 convolutional ne...
  • 51 篇 predictive model...
  • 49 篇 internet of thin...
  • 49 篇 data models
  • 46 篇 semantics
  • 41 篇 support vector m...
  • 40 篇 neural networks
  • 38 篇 real-time system...
  • 38 篇 forecasting
  • 34 篇 covid-19
  • 34 篇 educational inst...
  • 33 篇 data mining
  • 32 篇 computer science

机构

  • 51 篇 shandong provinc...
  • 49 篇 infn sezione di ...
  • 49 篇 north-west unive...
  • 49 篇 institut univers...
  • 46 篇 shandong enginee...
  • 46 篇 université de st...
  • 45 篇 national centre ...
  • 43 篇 tno technical sc...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 40 篇 università di ca...
  • 40 篇 infn sezione di ...
  • 40 篇 in2p3 lpc campus...
  • 39 篇 dipartimento di ...
  • 39 篇 nikhef national ...
  • 38 篇 department of ph...

作者

  • 50 篇 chen a.
  • 49 篇 ferrara g.
  • 49 篇 ardid m.
  • 49 篇 calvo d.
  • 47 篇 benoit d.m.
  • 47 篇 eddymaoui a.
  • 44 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 40 篇 boumaaza j.
  • 39 篇 coleiro a.
  • 39 篇 gozzini s.r.
  • 39 篇 dallier r.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 benhassi m.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 carretero v.

语言

  • 3,931 篇 英文
  • 337 篇 其他
  • 23 篇 中文
  • 3 篇 俄文
  • 2 篇 德文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 意大利文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Applied Technology"
4295 条 记 录,以下是731-740 订阅
排序:
Safety Shielding under Delayed Observation
arXiv
收藏 引用
arXiv 2023年
作者: Córdoba, Filip Cano Palmisano, Alexander Fränzle, Martin Bloem, Roderick Könighofer, Bettina Institute of Applied Information Processing and Communications Graz University of Technology Austria Dpt. of Computing Science Carl von Ossietzky University of Oldenburg Germany
Agents operating in physical environments need to be able to handle delays in the input and output signals since neither data transmission nor sensing or actuating the environment are instantaneous. Shields are correc... 详细信息
来源: 评论
Text Post-processing on Optical Character Recognition output using Natural Language Processing Methods
Text Post-processing on Optical Character Recognition output...
收藏 引用
Mysore Sub Section International Conference (MysuruCon), IEEE
作者: Thangam U Kumaran Dipshikha Biswas B Sneha Suneel Nadipalli Saleem Raja Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India University of Technology and Applied Sciences Shinas Sultanate of Oman
The technique of turning images of printed or written text from scanned documents, images of documents, or simple photos into machine-encoded text is known as optical character recognition (OCR). OCR has proven to be ...
来源: 评论
Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic
收藏 引用
Intelligent Automation & Soft computing 2023年 第8期37卷 2499-2517页
作者: Ammar Almomani Iman Akour Ahmed M.Manasrah Omar Almomani Mohammad Alauthman Esra’a Abdullah Amaal Al Shwait Razan Al Sharaa School of Computing Skyline University CollegeUniversity City of SharjahP.O.Box 1797SharjahUnited Arab Emirates IT-Department-Al-Huson University College Al-Balqa Applied UniversityP.O.Box 50IrbidJordan Information Systems Department College of Computing&InformaticsUniversity of SharjahUnited Arab Emirates Comp.Info Sciences(CIS)Division Higher Colleges of TechnologySharjahUnited Arab Emirates Computer Sciences Department Yarmouk UniversityIrbidJordan Computer Network and Information Systems Department The World Islamic Sciences and Education UniversityAmman11947Jordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan
The exponential growth of Internet and network usage has neces-sitated heightened security measures to protect against data and network ***,executed through network packets,pose a significant challenge for firewalls t... 详细信息
来源: 评论
Skills Extraction from Entities in Arabic CVs
Skills Extraction from Entities in Arabic CVs
收藏 引用
IEEE International Conference on Cognitive Machine Intelligence (CogMI)
作者: Mohamed Abdul Karim Sadiq Thirumurugan Shanmugam Nasser Mohammed Al-Fannah Firdous Kausar College of Computing and Information Science University of Technology and Applied Sciences Suhar Oman Department of Mathematics and Computer Science Fisk University Nashville Tennessee USA
Named Entity Recognition in low resource languages such as Arabic is relatively less accurate. Despite this, many applications attempt query-document matching, which necessitates entity resolution. We explore certain ...
来源: 评论
Cutting-Edge Predictive Methods for Enhancing Short-Term Load Prediction
Cutting-Edge Predictive Methods for Enhancing Short-Term Loa...
收藏 引用
2024 International Conference on Electrical and Computer Engineering Researches, ICECER 2024
作者: Ghazal, Taher M. Janjua, Jamshaid Iqbal Abushiba, Walid Ahmad, Munir Abbas, Tahir Ateeq, Karamath College of Arts & Science Applied Science University P.O.Box 5055 Manama Bahrain Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Selangor Malaysia Lahore Pakistan College of Engineering Applied Science University Bahrain College of Informatics Korea University Seoul02841 Korea Republic of TIMES Institute Department of Computer Science Multan Pakistan School of Computing Skyline University College University City Sharjah Sharjah United Arab Emirates
Efficient management and cost-related factors in the power sector call for accurate short-term load forecasting as it enables better planning with the electric grid and achieving stability within it. This paper looks ... 详细信息
来源: 评论
Utilizing a machine learning algorithm to choose a significant traffic identification system
收藏 引用
International Journal of Information Management Data Insights 2024年 第1期4卷
作者: Natarajan, Rajesh Ranjith, Christodoss Prasanna Mohideen, M.Syed Khaja Gururaj, H.L. Flammini, Francesco Thangarasu, N. Information Technology Department College of Computing and Information Sciences University of Technology and Applied Sciences-Shinas Al-Aqr Shinas 324 Oman Information Technology Department College of Computing and Information Sciences University of Technology and Applied Sciences- Salalah Post Box No 608 Salalah 211 Oman Department of Information Technology Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India IDSIA USI-SUPSI University of Applied Sciences and Arts of Southern Switzerland Switzerland Department of Computer Science Karpagam Academy of Higher Education Tamil Nadu Coimbatore India
The tremendous advancements in computing, sensing, and cognitive-based revolution have made way for critical infrastructure needed to improve the internet for more extensive applications. However, the computation perf... 详细信息
来源: 评论
Optimal Logistic Map with DNA computing Model for Image Encryption
Optimal Logistic Map with DNA Computing Model for Image Encr...
收藏 引用
computing and Data Analytics (ICCDA), International Conference on
作者: Shiny K.V Wilfred Blessing N. R Jino R Suresh Palarimath Mathumitha V Sutherlin Subitha G Department of Computer Science and Engineering Bharath Institute of Higher Education and Research Chennai India College of Computing and Information Sciences University of Technology and Applied Sciences-Ibri Ibri Sultanate of Oman Department of Civil Engineering Vels Institute of Science Technology and Advanced Studies (VISTAS) Chennai India Department of Computer Science and Engineering Stella Mary's College of Engineering Tamil nadu India
The logistic map with optimization with a novel Deoxyribonucleic Acid (DNA) sequence operation-based novel image encryption scheme is generated. The best mask is obtained by enhancing the excellence of DNA which is th... 详细信息
来源: 评论
UNDERSTANDING USERS’ UX NEEDS THROUGH THE LENSES OF PSYCHOLOGICAL NEEDS THEORIES: USERS’ EXPECTATIONS AND FELT EXPERIENCES  16
UNDERSTANDING USERS’ UX NEEDS THROUGH THE LENSES OF PSYCHOL...
收藏 引用
16th International Conference on Interfaces and Human Computer Interaction, IHCI 2022, and 15th International Conference on Game and Entertainment Technologies 2022, GET 2022 - Held at the 16th Multi Conference on Computer Science and Information Systems, MCCSIS 2022
作者: Mkpojiogu, Emmanuel O.C. Okeke-Uzodike, Obianuju E. Omopariola, Victor School of Computing Universiti Utara Malaysia UUM Sintok06010 Malaysia Department of Software Engineering Veritas University Abuja Nigeria Department of Applied Management Durban University of Technology KwaZulu-Natal Pietermaritzburg South Africa Department of Computer and Information Technology Veritas University Abuja Nigeria
The purpose of this study was to conduct a literature review in order to gather material that would serve to underpin and support a link between UX requirements and psychological theories. In the paper, relevant sourc... 详细信息
来源: 评论
OPTIMAL SYSTEMS, CONSERVATION LAWS, AND INVARIANCE ANALYSIS OF THE (2 + 1) EXTENDED BOITI-LEON-MANNA-PEMPINELLI EQUATION VIA THE LIE SYMMETRY APPROACH
arXiv
收藏 引用
arXiv 2024年
作者: Bhardwaj, Akshita Yadav, Shalini Junaid-U-Rehman, Muhammad Arora, Rajan Department of Applied Mathematics and Scientific Computing Indian Institute of Technology Roorkee India Department of Mathematics Lady Shri Ram College For Women–Delhi University India Department of Automation Biomechanics and Mechatronics Lodz University of Technology Lodz Poland
Lie symmetry analysis has been applied to the extended Boiti-Leon-Manna-Pempinelli (eBLMP) equation. This system illustrates the exchange of information between two waves with distinct dispersion characteristics. The ... 详细信息
来源: 评论
Optimized Runge-Kutta Methods with Automatic Step Size Control for Compressible Computational Fluid Dynamics
收藏 引用
Communications on applied Mathematics and Computation 2022年 第4期4卷 1191-1228页
作者: Hendrik Ranocha Lisandro Dalcin Matteo Parsani David I.Ketcheson Applied Mathematics Münster University of MünsterMunsterGermany Computer Electrical and Mathematical Science and Engineering Division(CEMSE) Extreme Computing Research Center(ECRC)King Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Saudi Arabia Computer Electrical and Mathematical Science and Engineering Division(CEMSE) King Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Saudi Arabia
We develop error-control based time integration algorithms for compressible fluid dynam-ics(CFD)applications and show that they are efficient and robust in both the accuracy-limited and stability-limited *** on discon... 详细信息
来源: 评论