咨询与建议

限定检索结果

文献类型

  • 67,916 篇 会议
  • 37,272 篇 期刊文献
  • 1,283 册 图书

馆藏范围

  • 106,471 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 63,558 篇 工学
    • 45,650 篇 计算机科学与技术...
    • 36,392 篇 软件工程
    • 15,860 篇 信息与通信工程
    • 9,970 篇 控制科学与工程
    • 7,500 篇 电气工程
    • 7,146 篇 生物工程
    • 6,650 篇 电子科学与技术(可...
    • 5,624 篇 生物医学工程(可授...
    • 4,363 篇 机械工程
    • 4,201 篇 光学工程
    • 3,283 篇 仪器科学与技术
    • 3,168 篇 化学工程与技术
    • 3,083 篇 动力工程及工程热...
    • 2,756 篇 网络空间安全
    • 2,602 篇 安全科学与工程
    • 2,243 篇 交通运输工程
  • 36,022 篇 理学
    • 18,268 篇 数学
    • 11,335 篇 物理学
    • 8,203 篇 生物学
    • 5,826 篇 统计学(可授理学、...
    • 4,039 篇 系统科学
    • 3,462 篇 化学
  • 18,844 篇 管理学
    • 11,314 篇 管理科学与工程(可...
    • 8,361 篇 图书情报与档案管...
    • 5,377 篇 工商管理
  • 5,981 篇 医学
    • 4,966 篇 临床医学
    • 4,347 篇 基础医学(可授医学...
    • 2,604 篇 药学(可授医学、理...
    • 2,585 篇 公共卫生与预防医...
  • 3,198 篇 法学
    • 2,608 篇 社会学
  • 2,030 篇 经济学
  • 1,523 篇 农学
  • 1,487 篇 教育学
  • 572 篇 文学
  • 250 篇 军事学
  • 192 篇 艺术学
  • 31 篇 哲学
  • 21 篇 历史学

主题

  • 3,372 篇 computer science
  • 2,553 篇 accuracy
  • 2,427 篇 deep learning
  • 2,336 篇 feature extracti...
  • 2,197 篇 machine learning
  • 2,018 篇 computational mo...
  • 1,682 篇 training
  • 1,592 篇 data mining
  • 1,451 篇 artificial intel...
  • 1,420 篇 internet of thin...
  • 1,416 篇 support vector m...
  • 1,312 篇 information tech...
  • 1,170 篇 optimization
  • 1,169 篇 predictive model...
  • 940 篇 security
  • 922 篇 neural networks
  • 912 篇 convolutional ne...
  • 900 篇 real-time system...
  • 893 篇 educational inst...
  • 889 篇 wireless sensor ...

机构

  • 1,101 篇 cavendish labora...
  • 1,028 篇 department of ph...
  • 976 篇 physikalisches i...
  • 967 篇 oliver lodge lab...
  • 903 篇 department of co...
  • 708 篇 university of ch...
  • 621 篇 infn laboratori ...
  • 612 篇 infn sezione di ...
  • 595 篇 infn sezione di ...
  • 586 篇 fakultät physik ...
  • 572 篇 infn sezione di ...
  • 556 篇 school of physic...
  • 553 篇 department of ph...
  • 536 篇 horia hulubei na...
  • 532 篇 school of physic...
  • 519 篇 imperial college...
  • 513 篇 school of physic...
  • 512 篇 h.h. wills physi...
  • 508 篇 nikhef national ...
  • 502 篇 stfc rutherford ...

作者

  • 263 篇 barter w.
  • 248 篇 a. gomes
  • 239 篇 c. alexa
  • 236 篇 j. m. izen
  • 233 篇 blake t.
  • 232 篇 g. bella
  • 232 篇 j. strandberg
  • 232 篇 beiter a.
  • 231 篇 c. amelung
  • 229 篇 d. calvet
  • 227 篇 bellee v.
  • 225 篇 s. chen
  • 224 篇 amato s.
  • 222 篇 brundu d.
  • 222 篇 betancourt c.
  • 222 篇 boettcher t.
  • 220 篇 bowcock t.j.v.
  • 220 篇 borsato m.
  • 219 篇 bencivenni g.
  • 218 篇 g. spigo

语言

  • 89,563 篇 英文
  • 15,860 篇 其他
  • 1,166 篇 中文
  • 104 篇 日文
  • 55 篇 斯洛文尼亚文
  • 37 篇 德文
  • 28 篇 法文
  • 13 篇 俄文
  • 3 篇 阿拉伯文
  • 3 篇 西班牙文
  • 3 篇 朝鲜文
  • 1 篇 捷克文
  • 1 篇 荷兰文
  • 1 篇 波兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department Of Computer Science Faculty of Computer Science and Information Technology"
106471 条 记 录,以下是721-730 订阅
排序:
On The Symbolic 2-plithogenic Fermat's Non-Linear Diophantine Equation
收藏 引用
Neutrosophic Sets and Systems 2023年 59卷 13-21页
作者: Alrawashdeh, Heba Al-Basheer, Othman Hajjari, Arwa Faculty of Computer Information Systems The University of Jordan Aqaba Jordan Sudan University of Science and Technology Faculty of Science Khartoum Sudan Cairo University Department of Mathematics Cairo Egypt
This paper is dedicated to find all symbolic 2-plithogenic integer solutions for the symbolic 2-plithogenic Fermat's Diophantine equation Xn + Yn = Zn for n ≥ 3. We prove that it has exactly 27 solutions, and we ... 详细信息
来源: 评论
Semi-analytic solution of the nonlinear Sharma-Tasso-Olver equation via ramadan group integral transform and accelerated adomian decomposition
Journal of Umm Al-Qura University for Applied Sciences
收藏 引用
Journal of Umm Al-Qura University for Applied sciences 2025年 1-14页
作者: Ramadan, Mohamed A. Mansour, Mariam M. A. El-Shazly, Naglaa M. Mathematics and Computer Science Department Faculty of Science Menoufia University Menoufia Shibin El-Koom Egypt Department of Basic Science Modern Academy of Computer Science and Management Technology Cairo Maadi Egypt
This work focuses on finding an approximate solution to the Sharma-Tasso-Olive (STO) equation. The approach combines accelerated Adomian decomposition (ADM) with the Ramadan group integral transform (RGT) to tackle th... 详细信息
来源: 评论
An Integrated Theoretical Model for Cloud Computing Adoption in Universities of Yemen  1
An Integrated Theoretical Model for Cloud Computing Adoption...
收藏 引用
1st International Conference on Emerging Technologies for Dependable Internet of Things, ICETI 2024
作者: Al-Hashedi, Abdullah Almekhlafi, Nabil Othman, Mohamed Tahar Ben Ghallab, Abdullatif Department of Information Technology University of Science and Technology Sana’a Yemen Department of Computer Science Qassim University Buraydah Saudi Arabia Department of Computer Science University of Science and Technology Sana’a Yemen
Several studies have been conducted in several sectors to determine the factors influencing the adoption of cloud computing (CC) technology at the individual or organizational level. These studies demonstrated the abi... 详细信息
来源: 评论
Multi-layered access control based auto tuning relational key implications in enterprise-level multi-tenancy
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 17805-17836页
作者: Henge, Santosh Kumar Rajakumar, R. Prasanna, P. Parivazhagan, A. Hu, Yu-Chen Chen, Wu-Lin Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation KL University AP Vaddeswaram India Centre for Automation School of Computer Science and Engineering Vellore Institute of Technology Chennai India Department of Computer Science and Engineering Veltech Rangarajan Dr Sagunthala R &D Institute of Science and Technology Chennai India Department of CSE Kalasalingam Academy of Research and Education Tamilnadu Krishnankoil India Department of Computer Science Xitun District Tunghai University No. 1727 Sec. 4 Boulevard Taichung City407224 Taiwan Department of Computer Science and Information Management Providence University Taichung City Taiwan
This article discusses the importance of cloud-based multi-tenancy in private–public-private secure cloud environments, which is achieved through the isolation of end-user data and resources into tenants to ensure da... 详细信息
来源: 评论
3D Object Detection for Autonomous Driving: A Comprehensive Review  6
3D Object Detection for Autonomous Driving: A Comprehensive ...
收藏 引用
6th International Conference on Computing and Informatics, ICCI 2024
作者: Nagiub, Ahmed Soliman Ghoniemy, Said Fayez, Mahmoud Khaled, Heba Computer System Department Faculty of Computer and information Science Ain Shams University Cairo Egypt
accurate perception is a critical component in enabling autonomous vehicles to understand their driving environment. The acquisition of 3D information about objects, including their location and pose, is essential for... 详细信息
来源: 评论
An Optimal Distribution of RSU for Improving Self-Driving Vehicle Connectivity
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 3311-3319页
作者: Khattab Alheeti Abdulkareem Alaloosy Haitham Khalaf Abdulkareem Alzahrani Duaa Al_Dosary Department of Computer Networking System College of Computer Sciences and Information TechnologyUniversity of AnbarRamadiIraq College of Medicine University of AnbarRamadiIraq Department of Computer Science Faculty of Computer Science and Information TechnologyAlbaha UniversityAlbahaSaudi Arabia College of Computer Sciences and Information Technology University of AnbarRamadiIraq
Self-driving and semi-self-driving cars play an important role in our daily *** effectiveness of these cars is based heavily on the use of their surrounding areas to collect sensitive and vital ***,external infrastruc... 详细信息
来源: 评论
Impolite Words Detection Algorithm for Standard Thai and Thai Regional Dialects  28
Impolite Words Detection Algorithm for Standard Thai and Tha...
收藏 引用
28th International computer science and Engineering Conference, ICSEC 2024
作者: Charungchit, Kanida Abhiratthanarath, Nannapas Khancome, Chouvalit Rajabhat Rajanagarindra University Faculty of Science and Technology Department of Information Technology Chachoengsao Thailand Ramkhamhaeng University Faculty of Science Department of Computer Scienc Bangkok Thailand
Impolite word detection, also known as rude word detection, is a natural language processing (NLP) technique designed to identify inappropriate or offensive language in texts and various media. This technique aims to ... 详细信息
来源: 评论
Development of a Lightweight Model for Handwritten Dataset Recognition: Bangladeshi City Names in Bangla Script
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2633-2656页
作者: MdMahbubur Rahman Tusher Fahmid Al Farid MdAl-Hasan Abu Saleh Musa Miah Susmita Roy Rinky Mehedi Hasan Jim Sarina Mansor MdAbdur Rahim Hezerul Abdul Karim Department of Computer Science and Engineering Bangladesh Army University of Science and Technology(BAUST)Saidpur5310Bangladesh Faculty of Engineering Multimedia UniversityCyberjaya63100Malaysia Pabna University of Science and Technology Pabna6600Bangladesh
The context of recognizing handwritten city names,this research addresses the challenges posed by the manual inscription of Bangladeshi city names in the Bangla *** today’s technology-driven era,where precise tools f... 详细信息
来源: 评论
RobustFace: a novel image restoration technique for face adversarial robustness improvement
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 8965-8993页
作者: Sadu, Chiranjeevi Das, Pradip K. Yannam, V Ramanjaneyulu Nayyar, Anand Department of Computer Science and Engineering RGUKT Nuzvid Andhra Pradesh Nuzvid India Department of Computer Science and Engineering IIT Guwahati Assam Guwahati India School of Technology Woxsen University Telangana Hyderabad India Graduate School Faculty of Information Technology Duy Tan University Da Nang550000 Viet Nam
Machine Learning (ML) models, particularly Deep Learning (DL), have made rapid progress and achieved significant milestones across various applications, including numerous safety-critical contexts. However, these mode... 详细信息
来源: 评论
Cat Swarm Algorithm Generated Based on Genetic Programming Framework Applied in Digital Watermarking
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 3135-3163页
作者: Shu-Chuan Chu Libin Fu Jeng-Shyang Pan Xingsi Xue Min Liu School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing210000China College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266000China Department of Information Management Chaoyang University of TechnologyTaichung40601TaiwanChina School of Information Science and Engineering Fujian University of TechnologyFuzhou350000China Key Laboratory of Hydrometeorological Disaster Mechanism and Warning of Ministry of Water Resource Nanjing University of Information Science and TechnologyNanjing210000China
Evolutionary algorithms have been extensively utilized in practical ***,manually designed population updating formulas are inherently prone to the subjective influence of the *** programming(GP),characterized by its t... 详细信息
来源: 评论