咨询与建议

限定检索结果

文献类型

  • 1,726 篇 期刊文献
  • 1,181 篇 会议
  • 35 册 图书

馆藏范围

  • 2,942 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,752 篇 工学
    • 988 篇 计算机科学与技术...
    • 743 篇 软件工程
    • 287 篇 信息与通信工程
    • 256 篇 电子科学与技术(可...
    • 253 篇 控制科学与工程
    • 244 篇 电气工程
    • 209 篇 光学工程
    • 166 篇 生物工程
    • 157 篇 材料科学与工程(可...
    • 149 篇 化学工程与技术
    • 143 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 119 篇 机械工程
    • 110 篇 动力工程及工程热...
    • 109 篇 力学(可授工学、理...
  • 1,561 篇 理学
    • 810 篇 物理学
    • 652 篇 数学
    • 223 篇 统计学(可授理学、...
    • 215 篇 化学
    • 204 篇 生物学
    • 139 篇 系统科学
    • 95 篇 地球物理学
  • 368 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 132 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 196 篇 医学
    • 155 篇 临床医学
    • 136 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 72 篇 药学(可授医学、理...
  • 60 篇 法学
  • 55 篇 农学
  • 45 篇 教育学
  • 37 篇 经济学
  • 6 篇 军事学
  • 5 篇 文学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 99 篇 deep learning
  • 74 篇 machine learning
  • 62 篇 accuracy
  • 56 篇 artificial intel...
  • 45 篇 convolutional ne...
  • 37 篇 internet of thin...
  • 36 篇 feature extracti...
  • 34 篇 computational mo...
  • 30 篇 covid-19
  • 30 篇 predictive model...
  • 30 篇 data models
  • 30 篇 training
  • 29 篇 support vector m...
  • 28 篇 computer science
  • 28 篇 real-time system...
  • 27 篇 forecasting
  • 25 篇 educational inst...
  • 22 篇 technological in...
  • 22 篇 quantum optics
  • 21 篇 quantum entangle...

机构

  • 49 篇 infn sezione di ...
  • 49 篇 north-west unive...
  • 49 篇 institut univers...
  • 46 篇 université de st...
  • 45 篇 national centre ...
  • 43 篇 tno technical sc...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 40 篇 università di ca...
  • 40 篇 infn sezione di ...
  • 40 篇 in2p3 lpc campus...
  • 39 篇 dipartimento di ...
  • 39 篇 nikhef national ...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 50 篇 chen a.
  • 49 篇 ferrara g.
  • 49 篇 ardid m.
  • 49 篇 calvo d.
  • 47 篇 benoit d.m.
  • 47 篇 eddymaoui a.
  • 44 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 40 篇 coleiro a.
  • 39 篇 gozzini s.r.
  • 39 篇 dallier r.
  • 39 篇 boettcher m.
  • 38 篇 kulikovskiy v.
  • 38 篇 benhassi m.
  • 38 篇 enzenhöfer a.
  • 38 篇 celli s.
  • 38 篇 carretero v.

语言

  • 2,663 篇 英文
  • 264 篇 其他
  • 11 篇 中文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Applied Computing and Technology"
2942 条 记 录,以下是51-60 订阅
排序:
Network Malaria Model on Account of Wide Communication  2
Network Malaria Model on Account of Wide Communication
收藏 引用
2nd IEEE International Conference on IoT, Communication and Automation technology, ICICAT 2024
作者: Tripathi, Padmaja Chandra, Harish Ramkeval Madan Mohan Malviya University of Technology Department of Mathematics and Scientific Computing Gorakhpur273010 India MJP Rohilkhand University Department of Applied Mathematics Bareilly India
Diseases caused by parasites proliferate quickly over the globe. As a result, their control intervention needs to be swift and comprehensive. Preventing chronic diseases can be accomplished by using multi-modal commun... 详细信息
来源: 评论
Autism Spectrum Disorder Detection Via Eye Gaze Analysis  2
Autism Spectrum Disorder Detection Via Eye Gaze Analysis
收藏 引用
2nd IEEE International Conference on Networking and Communications, ICNWC 2024
作者: Das, Sujay Chotia, Akshat Maheswari, K. M. Uma Sadiq, A.K. SRM Institute Of Science & Technology Department Of Computer Science & Engineering Chennai India University of Technology and Applied Sciences College of Computing and Information Science Suhar campus Oman
Autism is a complex neuro - developmental condition characterized by challenges in social interaction and communication. Early diagnosis and intervention are crucial for effective support. This paper presents a novel ... 详细信息
来源: 评论
An Enhancement of Object Detection Using YOLO V8 and Mobile Net in Challenging Conditions
收藏 引用
SN Computer Science 2025年 第4期6卷 1-20页
作者: Pasupuleti, Shailaja Ramalakshmi, K. Gunasekaran, Hemalatha Arokiaraj, Rex Macedo Debnath, Saswati Jebaseeli, T. Jemima Department of Computer Science and Engineering Alliance University Karnataka Anekal Bangalore India AU-Centre of Excellence Department of Computer Vision Alliance University Karnataka Anekal Bangalore India College of Computing and Information Sciences University of Technology and Applied Sciences Ibri Oman Department of Information Technology College of Computing and Information Sciences University of Technology and Applied Sciences Ibri Oman Department of Computer Science and Engineering Alliance University Karnataka Bangalore India Division of Artificial Intelligence and Machine Learning Karunya Institute of Technology and Sciences Coimbatore India
Autonomous drones and deep learning neural networks are becoming popular tools to revolutionize aircraft operations by partially automating visual inspection processes in aircraft maintenance. The research aims to pro... 详细信息
来源: 评论
A Methodical Framework for Conducting Reconnaissance and Enumeration in the Ethical Hacking Lifecycle  22
A Methodical Framework for Conducting Reconnaissance and Enu...
收藏 引用
22nd European Conference on Cyber Warfare and Security, ECCWS 2023
作者: Barman, Fouz Alkaabi, Nora Almenhali, Hamda Alshedi, Mahra Ikuesan, Richard Computing and Applied Technology Department College of Technological Innovation Zayed University Abu Dhabi United Arab Emirates
Reconnaissance and enumeration are both equally significant phases of the penetration testing lifecycle. In hindsight, both reconnaissance and enumeration seem to be very similar as the pair involve information gather... 详细信息
来源: 评论
Secure Channel Estimation Using Norm Estimation Model for 5G Next Generation Wireless Networks
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 1151-1169页
作者: Khalil Ullah Song Jian Muhammad Naeem Ul Hassan Suliman Khan Mohammad Babar Arshad Ahmad Shafiq Ahmad Faculty of Information Engineering and Automation Kunming University of Science and TechnologyKunming650500China Department of Computer Science Abbottabad University of Science and TechnologyHavelianAbbottabad22500Pakistan Department of Computing and Electronics Engineering Middle East CollegeMuscat124Oman Department of CS&IT Pak-Austria Fachhochschule Institute of Applied Sciences and Technology MangHaripur22621Pakistan Industrial Engineering Department College of EngineeringKing Saud UniversityRiyadh11421Saudi Arabia
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile *** networks are sufficiently scaled to interconnect billions of users and *** i... 详细信息
来源: 评论
Solving 2 by 2 Grid Sudoku Problem using Grover's Algorithm with Intel Quantum SDK  13
Solving 2 by 2 Grid Sudoku Problem using Grover's Algorithm ...
收藏 引用
13th International Conference on Advanced Computer Information Technologies, ACIT 2023
作者: Shinde, Tejas Gambo, Yaknan John Rasch, Kevin Liebelt, Helena Li, Rui Deggendorf Institute of Technology High Performance Computing and Quantum Computing Deggendorf Germany Quantum Computing Research Intel Inc HillsboroOR United States Deggendorf Institute of Technology Department of Applied Computer Science Deggendorf Germany
Quantum technologies are moving towards enabling real world uses and as these technologies develop. The most important thing that differs Quantum from classical computers is that Quantum Computers can do 'multiple... 详细信息
来源: 评论
Digital forensic in a virtual world: A case of metaverse and vr  22
Digital forensic in a virtual world: A case of metaverse and...
收藏 引用
22nd European Conference on Cyber Warfare and Security, ECCWS 2023
作者: Ali, Tayba Al Alfulaiti, Sara Abuzour, Manal Almaqahami, Sheikha Ikuesan, Richard Computing and Applied Technology Department College of Technological Innovation Zayed University Abu Dhabi United Arab Emirates
Metaverse is a virtual space where users can interact with each other. It is a combination of virtual reality, augmented reality, and mixed reality. This evolving technology can offer many exciting opportunities that ... 详细信息
来源: 评论
Empowering Breast Cancer Detection with AI: A Modified Support Vector Machine Approach for Improved Classification Accuracy  4
Empowering Breast Cancer Detection with AI: A Modified Suppo...
收藏 引用
4th International Conference on Expert Clouds and Applications, ICOECA 2024
作者: Palarimath, Suresh Maran, Pyingkodi Thenmozhi, K. Shiny, K.V. Sujatha, T. N.r, Wilfred Blessing College of Computing and Information Sciences University of Technology and Applied Information Technology Department Sciences Salalah Oman Kongu Engineering College Department of Computer Applications Erode India Department of Compute Science Bengaluru India Bharath Institute of Higher Education and Research Department of Computer Science and Engineering Chennai India Sri Krishna College of Engineering and Technology Department of Artificial Intelligence and Data Science Coimbatore India College of Computing and Information Sciences Univesity of Technology and Applied Sciences Information Technology Department Ibri Oman
Breast cancer poses a significant threat to women's health, being a leading cause of cancer-related mortality among female population. In recent years, machine learning has emerged as a promising approach in medic... 详细信息
来源: 评论
A lightweight identity based generalized signcryption scheme for secure communication in standard model
收藏 引用
International Journal of Information technology (Singapore) 2024年 第2期16卷 1221-1229页
作者: Singh, Tej Kumar, Mukesh Gelmecha, Demissie Jabir Thakur, Ganesh Kumar Tyagi, Vikas Sori, Worku Jifara Department of Applied Sciences ABES Engineering College UP Ghaziabad India Institute of Applied Sciences & Humanities GLA University UP Mathura India Department of Electronics and Communication Engineering School of Electrical Engineering and Computing Adama Science and Technology University Adama Ethiopia Department of CSE IMS Engineering College UP Ghaziabad India Department of Computer Science School of Electrical Engineering and Computing Adama Science and Technology University Adama Ethiopia
The implementation of secure communication in the Industrial Internet of Things (IIoT) has made and it is a significant security concern. Identity-based generalized signcryption scheme is one among the cryptographic t... 详细信息
来源: 评论
Performance Analysis of Routing Protocols in VANETs using OSM, SUMO, and NS2  2
Performance Analysis of Routing Protocols in VANETs using OS...
收藏 引用
2nd IEEE International Conference on Interdisciplinary Approaches in technology and Management for Social Innovation, IATMSI 2024
作者: Thangam, S. Aaditi Avvaru, Ananya Tandon, Aryan Kumari, J. Jesy Janet Saleem Raja, A. Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science & Engineering Bengaluru India University of Technology and Applied Sciences-Shinas Oman
With growing urbanization there is a need to manage vehicle-to-vehicle communication for intelligent communication in congested traffic. The performance of the widely used routing protocols AODV, DSDV, DSR, LAR, and Z... 详细信息
来源: 评论