咨询与建议

限定检索结果

文献类型

  • 67,361 篇 会议
  • 37,123 篇 期刊文献
  • 1,275 册 图书

馆藏范围

  • 105,759 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 63,153 篇 工学
    • 45,322 篇 计算机科学与技术...
    • 36,250 篇 软件工程
    • 15,561 篇 信息与通信工程
    • 9,746 篇 控制科学与工程
    • 7,318 篇 电气工程
    • 7,130 篇 生物工程
    • 6,605 篇 电子科学与技术(可...
    • 5,609 篇 生物医学工程(可授...
    • 4,261 篇 机械工程
    • 4,182 篇 光学工程
    • 3,247 篇 仪器科学与技术
    • 3,135 篇 化学工程与技术
    • 3,029 篇 动力工程及工程热...
    • 2,576 篇 网络空间安全
    • 2,534 篇 安全科学与工程
    • 2,179 篇 交通运输工程
  • 35,863 篇 理学
    • 18,182 篇 数学
    • 11,281 篇 物理学
    • 8,177 篇 生物学
    • 5,783 篇 统计学(可授理学、...
    • 4,043 篇 系统科学
    • 3,412 篇 化学
  • 18,639 篇 管理学
    • 11,138 篇 管理科学与工程(可...
    • 8,279 篇 图书情报与档案管...
    • 5,348 篇 工商管理
  • 5,908 篇 医学
    • 4,940 篇 临床医学
    • 4,331 篇 基础医学(可授医学...
    • 2,600 篇 药学(可授医学、理...
    • 2,520 篇 公共卫生与预防医...
  • 3,150 篇 法学
    • 2,563 篇 社会学
  • 2,003 篇 经济学
  • 1,521 篇 农学
  • 1,461 篇 教育学
  • 569 篇 文学
  • 249 篇 军事学
  • 191 篇 艺术学
  • 31 篇 哲学
  • 21 篇 历史学

主题

  • 3,373 篇 computer science
  • 2,461 篇 accuracy
  • 2,357 篇 deep learning
  • 2,296 篇 feature extracti...
  • 2,144 篇 machine learning
  • 1,982 篇 computational mo...
  • 1,675 篇 training
  • 1,589 篇 data mining
  • 1,415 篇 artificial intel...
  • 1,404 篇 support vector m...
  • 1,385 篇 internet of thin...
  • 1,318 篇 information tech...
  • 1,143 篇 optimization
  • 1,136 篇 predictive model...
  • 919 篇 security
  • 910 篇 neural networks
  • 897 篇 educational inst...
  • 893 篇 convolutional ne...
  • 887 篇 wireless sensor ...
  • 875 篇 computer archite...

机构

  • 1,100 篇 cavendish labora...
  • 1,025 篇 department of ph...
  • 967 篇 physikalisches i...
  • 966 篇 oliver lodge lab...
  • 910 篇 department of co...
  • 700 篇 university of ch...
  • 621 篇 infn laboratori ...
  • 611 篇 infn sezione di ...
  • 592 篇 infn sezione di ...
  • 578 篇 fakultät physik ...
  • 564 篇 infn sezione di ...
  • 553 篇 school of physic...
  • 549 篇 department of ph...
  • 540 篇 horia hulubei na...
  • 530 篇 school of physic...
  • 516 篇 imperial college...
  • 515 篇 h.h. wills physi...
  • 515 篇 school of physic...
  • 513 篇 nikhef national ...
  • 503 篇 stfc rutherford ...

作者

  • 255 篇 barter w.
  • 248 篇 a. gomes
  • 238 篇 c. alexa
  • 237 篇 beiter a.
  • 235 篇 j. m. izen
  • 231 篇 g. bella
  • 231 篇 j. strandberg
  • 230 篇 c. amelung
  • 228 篇 d. calvet
  • 227 篇 blake t.
  • 225 篇 s. chen
  • 224 篇 bellee v.
  • 221 篇 amato s.
  • 220 篇 bowcock t.j.v.
  • 219 篇 boettcher t.
  • 217 篇 brundu d.
  • 217 篇 betancourt c.
  • 216 篇 g. spigo
  • 215 篇 borsato m.
  • 212 篇 bencivenni g.

语言

  • 99,083 篇 英文
  • 5,550 篇 其他
  • 1,086 篇 中文
  • 102 篇 日文
  • 24 篇 斯洛文尼亚文
  • 20 篇 德文
  • 15 篇 法文
  • 7 篇 俄文
  • 3 篇 朝鲜文
  • 2 篇 阿拉伯文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department Of Computer Science Faculty of Computer Science and Information Technology"
105759 条 记 录,以下是71-80 订阅
排序:
MLMO-HSM: Multi-label Multi-output Hybrid Sequential Model for multi-resident smart home activity recognition
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第3期14卷 2313-2325页
作者: Ramanujam, E. Perumal, Thinagaran Department of Computer Science and Engineering National Institute of Technology Silchar Assam 788010 India Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang India
Smart home automation is protective and preventive measures that are taken to monitor elderly people in a non-intrusive manner using simple and pervasive sensors termed Ambient Assistive Living. The smart home produce... 详细信息
来源: 评论
Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics
收藏 引用
computer Systems science & Engineering 2023年 第2期44卷 1679-1689页
作者: Abdullah Alshehri Nayeem Khan Ali Alowayr Mohammed Yahya Alghamdi Information Technology Department Faculty of Computer Science and Information TechnologyAl Baha UniversityAl Baha65799Saudi Arabia Computer Science Department Faculty of Science and Arts at BuljurashiAl Baha UniversityAl Baha65799Saudi Arabia
This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior *** framework models the user behavior as sequences of events representing the user activities at such a ... 详细信息
来源: 评论
Best low-cost methods for real-time detection of the eye and gaze tracking
收藏 引用
i-com 2024年 第1期23卷 79-94页
作者: Khaleel, Amal Hameed Abbas, Thekra H. Ibrahim, Abdul-Wahab Sami Department of Computer Science College of Computer Science and Information Technology Basrah University Barsh61004 Iraq Department of Computer Science College of Science Mustansiriyah University Baghdad Iraq Department of Computer Science College of Education Mustansiriya University Baghdad Iraq
The study of gaze tracking is a significant research area in computer vision. It focuses on real-world applications and the interface between humans and computers. Recently, new eye-tracking applications have boosted ... 详细信息
来源: 评论
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5035-5048页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis... 详细信息
来源: 评论
A Local Differential Privacy Trajectory Protection Method Based on Temporal and Spatial Restrictions for Staying Detection
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 617-633页
作者: Weiqi Zhang Zhenzhen Xie Akshita Maradapu Vera Venkata Sai Qasim Zia Zaobo He Guisheng Yin College of Computer Science and Technology Harbin Engineering UniversityHarbin 150001China School of Computer Science and Technology Shandong UniversityQingdao 266237China Department of Computer Science Georgia State UniversityAtlantaGA 30303USA College of Information Science and Technology Jinan UniversityGuangzhou 510632China
The widespread availability of GPS has opened up a whole new market that provides a plethora of location-based ***-based social networks have become very popular as they provide end users like us with several such ser... 详细信息
来源: 评论
Modified DS np Chart Using Generalized Multiple Dependent State Sampling under Time Truncated Life Test
收藏 引用
computer Modeling in Engineering & sciences 2024年 第3期138卷 2471-2495页
作者: Wimonmas Bamrungsetthapong Pramote Charongrattanasakul Division of Applied Statistics Department of Mathematics and Computer ScienceFaculty of Science and TechnologyRajamangala University of Technology ThanyaburiPathum Thani12110Thailand Division of Mathematics Department of Mathematics and Computer ScienceFaculty of Science and TechnologyRajamangala University of Technology KrungthepBangkok10120Thailand
This study presents the design of a modified attributed control chart based on a double sampling(DS)np chart applied in combination with generalized multiple dependent state(GMDS)sampling to monitor the mean life of t... 详细信息
来源: 评论
MoBShield:A Novel XML Approach for Securing Mobile Banking
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2123-2149页
作者: Saeed Seraj Ali Safaa Sadiq OmprakashKaiwartya Mohammad Aljaidi Alexandros Konios Mohammed Ali Mohammed Abazeed Department of Computer Science Nottingham Trent UniversityClifton LaneNottinghamNG118NSUK Department of Computer Science Faculty of Information TechnologyZarqa UniversityZarqa13110Jordan Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia
Mobile banking security has witnessed significant R&D attention from both financial institutions and *** is due to the growing number of mobile baking applications and their reachability and usefulness to ***,thes... 详细信息
来源: 评论
Anomaly Detection Model of Time Segment Power Usage Behavior Using Unsupervised Learning
收藏 引用
Journal of Internet technology 2024年 第3期25卷 455-463页
作者: Ho, Wen-Jen Hsieh, Hsin-Yuan Tsai, Chia-Wei Software Technology Institute Institute for Information Industry Taiwan Department of Computer Science and Information Engineering National Taitung University Taiwan Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taiwan
In Taiwan, the current electricity prices for residential users remain relatively low. This results in a diminished incentive for these users to invest in energy-saving improvements. Consequently, devising strategies ... 详细信息
来源: 评论
An Exploration of Deep Learning Techniques for the Detection of Grape Diseases
收藏 引用
Recent Advances in computer science and Communications 2024年 第2期17卷 1-12页
作者: Pandey, Kavita Chandak, Abhimanyu Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Noida India
Plant diseases are one of the major contributors to economic loss in the agriculture industry worldwide. Detection of disease at early stages can help in the reduction of this loss. In recent times, a lot of emphasis ... 详细信息
来源: 评论
Global-local term fusion for optimised community Q&A topic modelling
收藏 引用
International Journal of Innovative Computing and Applications 2024年 第1期15卷 50-69页
作者: Prabha, Sneh Sardana, Neetu Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Noida India
Community question and answer (Q&A) websites have become invaluable information and knowledge-sharing sources. Effective topic modelling on these platforms is crucial for organising and navigating the vast amount ... 详细信息
来源: 评论