咨询与建议

限定检索结果

文献类型

  • 3,744 篇 期刊文献
  • 2,189 篇 会议
  • 30 册 图书

馆藏范围

  • 5,963 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,635 篇 工学
    • 2,014 篇 计算机科学与技术...
    • 1,556 篇 软件工程
    • 642 篇 信息与通信工程
    • 529 篇 控制科学与工程
    • 503 篇 电子科学与技术(可...
    • 460 篇 电气工程
    • 339 篇 仪器科学与技术
    • 305 篇 光学工程
    • 280 篇 生物工程
    • 253 篇 化学工程与技术
    • 244 篇 核科学与技术
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 189 篇 动力工程及工程热...
    • 171 篇 材料科学与工程(可...
    • 145 篇 力学(可授工学、理...
    • 115 篇 航空宇航科学与技...
  • 3,229 篇 理学
    • 1,504 篇 物理学
    • 1,347 篇 数学
    • 500 篇 地球物理学
    • 422 篇 统计学(可授理学、...
    • 348 篇 生物学
    • 307 篇 化学
    • 224 篇 系统科学
  • 867 篇 管理学
    • 533 篇 管理科学与工程(可...
    • 323 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 339 篇 医学
    • 265 篇 临床医学
    • 220 篇 基础医学(可授医学...
    • 161 篇 公共卫生与预防医...
  • 122 篇 法学
  • 94 篇 经济学
  • 71 篇 农学
  • 45 篇 教育学
  • 19 篇 文学
  • 10 篇 艺术学
  • 8 篇 历史学
  • 7 篇 哲学
  • 6 篇 军事学

主题

  • 166 篇 hadron colliders
  • 161 篇 deep learning
  • 142 篇 galaxies
  • 130 篇 machine learning
  • 70 篇 accuracy
  • 68 篇 higgs bosons
  • 65 篇 artificial intel...
  • 64 篇 optimization
  • 62 篇 surveys
  • 59 篇 feature extracti...
  • 58 篇 cosmology
  • 56 篇 internet of thin...
  • 50 篇 real-time system...
  • 49 篇 w & z bosons
  • 48 篇 relativistic hea...
  • 47 篇 training
  • 45 篇 data mining
  • 43 篇 computational mo...
  • 41 篇 covid-19
  • 39 篇 convolutional ne...

机构

  • 334 篇 department of ph...
  • 271 篇 department for p...
  • 270 篇 faculty of scien...
  • 255 篇 department of ph...
  • 248 篇 department of ph...
  • 239 篇 department of ph...
  • 235 篇 kirchhoff-instit...
  • 231 篇 yerevan physics ...
  • 208 篇 west university ...
  • 203 篇 department of mo...
  • 202 篇 infn e laborator...
  • 201 篇 irfu cea univers...
  • 200 篇 fakultät für phy...
  • 196 篇 institute of phy...
  • 194 篇 institute of phy...
  • 192 篇 graduate school ...
  • 190 篇 cavendish labora...
  • 188 篇 department of ph...
  • 186 篇 fermi national a...
  • 178 篇 department of ph...

作者

  • 200 篇 c. alexa
  • 197 篇 j. m. izen
  • 195 篇 g. bella
  • 192 篇 j. strandberg
  • 191 篇 d. calvet
  • 191 篇 c. amelung
  • 169 篇 n. orlando
  • 169 篇 m. lu
  • 167 篇 g. spigo
  • 164 篇 y. tayalati
  • 161 篇 s. veneziano
  • 161 篇 f. siegert
  • 159 篇 v. chiarella
  • 155 篇 r. ströhmer
  • 154 篇 miquel r.
  • 153 篇 a. dimitrievska
  • 152 篇 f. deliot
  • 152 篇 m. rijssenbeek
  • 151 篇 s. jin
  • 151 篇 g. gaudio

语言

  • 5,200 篇 英文
  • 740 篇 其他
  • 22 篇 中文
  • 11 篇 德文
  • 8 篇 法文
  • 2 篇 俄文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department o/Computer Science and Technology"
5963 条 记 录,以下是1-10 订阅
排序:
AMachine Learning Approach to Cyberbullying Detection in Arabic Tweets
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 1033-1054页
作者: Dhiaa Musleh Atta Rahman Mohammed Abbas Alkherallah Menhal Kamel Al-Bohassan Mustafa Mohammed Alawami Hayder Ali Alsebaa Jawad Ali Alnemer Ghazi Fayez Al-Mutairi May Issa Aldossary Dalal A.Aldowaihi Fahd Alhaidari Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Information Systems College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Networks and Communications College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia
With the rapid growth of internet usage,a new situation has been created that enables practicing *** has increased over the past decade,and it has the same adverse effects as face-to-face bullying,like anger,sadness,a... 详细信息
来源: 评论
Pyram: a robust and attack-resistant perceptual image hashing using pyramid histogram of gradients
收藏 引用
International Journal of Information technology (Singapore) 2024年 第8期16卷 5331-5349页
作者: Neog, Prabhakar Sharma Roy, Moumita Sangale, Tejas Jain, Nandita Dahal, Aditi Patgiri, Ripon Thounaojam, Dalton Meitei Department of Computer Science and Engineering National Institute of Technology Silchar Department of Computer Science and Information Technology Siksha ‘O’ Anusandhan University
Perceptual image hashing is a significant and time-effective method for recognizing images within extensive databases, focusing on achieving two key objectives: robustness and discrimination. The right balance between... 详细信息
来源: 评论
Deep Learning Based Signal Detection for Quadrature Spatial Modulation System
收藏 引用
China Communications 2024年 第10期21卷 78-85页
作者: Shu Dingyun Peng Yuyang Yue Ming Fawaz AL-Hazemi Mohammad Meraj Mirza School of Computer Science and Engineering Macao University of Science and TechnologyMacaoChina Department of Computer and Network Engineering University of JeddahSaudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia
With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. ... 详细信息
来源: 评论
Transfer Learning Empowered Skin Diseases Detection in Children
收藏 引用
computer Modeling in Engineering & sciences 2024年 第12期141卷 2609-2623页
作者: Meena N.Alnuaimi Nourah S.Alqahtani Mohammed Gollapalli Atta Rahman Alaa Alahmadi Aghiad Bakry Mustafa Youldash Dania Alkhulaifi Rashad Ahmed Hesham Al-Musallam Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Information Systems College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Engineering College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia ICS Department King Fahd University of Petroleum and MineralsDhahran31261Saudi Arabia
Human beings are often affected by a wide range of skin diseases,which can be attributed to genetic factors and environmental influences,such as exposure to sunshine with ultraviolet(UV)*** left untreated,these diseas... 详细信息
来源: 评论
Approach to Simplify the Development of IoT Systems that Interconnect Embedded Devices Using a Single Program
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 2463-2480页
作者: Enol Matilla Blanco Jordán Pascual Espada Rubén Gonzalez Crespo Department of Computer Science University of OviedoOviedo33007Spain Department of Computer Science and Technology Universidad Internacional de La RiojaLogroño26006Spain
Many Internet of Things(IoT)systems are based on the intercommunication among different devices and centralized ***,there are several commercial and research platforms available to simplify the creation of such IoT **... 详细信息
来源: 评论
Strongly Clean Matrix Rings over a Skew Monoid Ring
收藏 引用
Algebra Colloquium 2023年 第3期30卷 361-370页
作者: Arezou Karimimansoub Mohammad-Reza(Rafsanjani)Sadeghi Department of Mathematics and Computer Science Amirkabir University of TechnologyTehranP.O.Box ***Iran
Let R be a ring with an endomorphismσ,F∪{0}the free monoid generated by U={u1,…,ut}with 0 added,and M a factor of F obtained by setting certain monomials in F to 0 such that M^(n)=0 for some *** we can form the non... 详细信息
来源: 评论
Diabetic Retinopathy Detection: A Hybrid Intelligent Approach
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4561-4576页
作者: Atta Rahman Mustafa Youldash Ghaida Alshammari Abrar Sebiany Joury Alzayat Manar Alsayed Mona Alqahtani Noor Aljishi Department of Computer Science(CS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal University(IAU)P.O.Box 1982Dammam31441Saudi Arabia Department of Computer Engineering(CE) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal University(IAU)P.O.Box 1982Dammam31441Saudi Arabia
Diabetes is a serious health condition that can cause several issues in human body organs such as the heart and kidney as well as a serious eye disease called diabetic retinopathy(DR).Early detection and treatment are... 详细信息
来源: 评论
A Game-Theoretic Approach to Safe Crowd Evacuation in Emergencies
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1631-1657页
作者: Maria Gul Imran Ali Khan Gohar Zaman Atta Rahman Jamaluddin Mir Sardar Asad Ali Biabani May IssaAldossary Mustafa Youldash Ashraf Saadeldeen Maqsood Mahmud Asiya Abdus Salam Dania Alkhulaifi Abdullah AlTurkey31Department of Computer Science COMSATS University IslamabadAbbottabad CampusAbbottabad22010Pakistan Department of Computer Science Abbottabad University of Science and TechnologyAbbottabad22010Pakistan Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Science and Technology Unit Umm Al-Qura UniversityMakkah21955Saudi Arabia Deanship of Scientific Research Umm Al-Qura UniversityMakkah21955Saudi Arabia Department of Computer Information Systems College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Engineering College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Science Faculty of Computer Science and Information TechnologyOmdurman Islamic UniversityOmdurman14415Sudan Business Analytic Program Department of Management and MarketingCollege of Business AdministrationUniversity of BahrainSakhir32038Bahrain
obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoret... 详细信息
来源: 评论
Single-Valued Neutrosophic Graph with Heptapartitioend Structure
收藏 引用
Neutrosophic Sets and Systems 2025年 80卷 728-748页
作者: Fathi, Hanaa Myvizhi, M. Abdelhafeez, Ahmed Abdellah, Mohamed Refaat Eassa, Mohamed Sawah, Mohamed S. Elbehiery, Hussam College of Information Technology Amman Arab University Amman Jordan KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut... 详细信息
来源: 评论
Explainable Classification Model for Android Malware Analysis Using API and Permission-Based Features
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3167-3188页
作者: Nida Aslam Irfan Ullah Khan Salma Abdulrahman Bader Aisha Alansari Lama Abdullah Alaqeel Razan Mohammed Khormy Zahra Abdultawab AlKubaish Tariq Hussain SAUDI ARAMCO Cybersecurity Chair Department of Computer ScienceCollege of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Computer Engineering Department College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia School of Computer Science and Technology Zhejiang Gongshang UniversityHangzhouChina
one of the most widely used smartphone operating systems,Android,is vulnerable to cutting-edge malware that employs sophisticated *** malware attacks could lead to the execution of unauthorized acts on the victims’de... 详细信息
来源: 评论