咨询与建议

限定检索结果

文献类型

  • 7,947 篇 期刊文献
  • 7,891 篇 会议
  • 214 册 图书

馆藏范围

  • 16,051 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 9,277 篇 工学
    • 5,019 篇 计算机科学与技术...
    • 3,892 篇 软件工程
    • 1,662 篇 信息与通信工程
    • 1,610 篇 电子科学与技术(可...
    • 1,476 篇 电气工程
    • 1,332 篇 控制科学与工程
    • 960 篇 光学工程
    • 926 篇 生物工程
    • 841 篇 化学工程与技术
    • 819 篇 材料科学与工程(可...
    • 749 篇 生物医学工程(可授...
    • 672 篇 机械工程
    • 619 篇 仪器科学与技术
    • 519 篇 动力工程及工程热...
    • 439 篇 力学(可授工学、理...
    • 282 篇 安全科学与工程
  • 7,608 篇 理学
    • 3,830 篇 物理学
    • 3,052 篇 数学
    • 1,138 篇 生物学
    • 1,016 篇 统计学(可授理学、...
    • 1,015 篇 化学
    • 631 篇 系统科学
  • 1,896 篇 管理学
    • 1,251 篇 管理科学与工程(可...
    • 689 篇 图书情报与档案管...
    • 643 篇 工商管理
  • 785 篇 医学
    • 649 篇 临床医学
    • 544 篇 基础医学(可授医学...
    • 306 篇 药学(可授医学、理...
    • 303 篇 公共卫生与预防医...
  • 321 篇 法学
  • 269 篇 经济学
  • 203 篇 教育学
  • 186 篇 农学
  • 42 篇 文学
  • 28 篇 军事学
  • 23 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 425 篇 computer science
  • 313 篇 deep learning
  • 238 篇 machine learning
  • 172 篇 computational mo...
  • 171 篇 optimization
  • 146 篇 accuracy
  • 129 篇 neural networks
  • 129 篇 artificial intel...
  • 128 篇 internet of thin...
  • 114 篇 educational inst...
  • 111 篇 support vector m...
  • 110 篇 data mining
  • 108 篇 predictive model...
  • 105 篇 computational in...
  • 104 篇 computer archite...
  • 104 篇 image segmentati...
  • 101 篇 feature extracti...
  • 98 篇 hadrons
  • 97 篇 wireless sensor ...
  • 97 篇 real-time system...

机构

  • 1,099 篇 cavendish labora...
  • 1,033 篇 department of ph...
  • 993 篇 physikalisches i...
  • 982 篇 oliver lodge lab...
  • 619 篇 fakultät physik ...
  • 563 篇 horia hulubei na...
  • 562 篇 school of physic...
  • 554 篇 iccub universita...
  • 549 篇 department of ph...
  • 544 篇 school of physic...
  • 537 篇 h.h. wills physi...
  • 529 篇 imperial college...
  • 523 篇 stfc rutherford ...
  • 523 篇 nikhef national ...
  • 517 篇 university of ch...
  • 517 篇 school of physic...
  • 513 篇 physik-institut ...
  • 509 篇 infn laboratori ...
  • 508 篇 infn sezione di ...
  • 508 篇 school of physic...

作者

  • 284 篇 barter w.
  • 271 篇 a. gomes
  • 267 篇 beiter a.
  • 258 篇 c. alexa
  • 258 篇 c. amelung
  • 256 篇 j. m. izen
  • 256 篇 g. bella
  • 256 篇 j. strandberg
  • 256 篇 d. calvet
  • 255 篇 g. spigo
  • 254 篇 f. siegert
  • 252 篇 bellee v.
  • 248 篇 blake t.
  • 244 篇 brundu d.
  • 244 篇 s. chen
  • 243 篇 bowcock t.j.v.
  • 234 篇 y. tayalati
  • 234 篇 betancourt c.
  • 231 篇 borsato m.
  • 230 篇 r. ströhmer

语言

  • 15,336 篇 英文
  • 604 篇 其他
  • 109 篇 中文
  • 6 篇 日文
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 朝鲜文
检索条件"机构=Department of Computer Science and Engineering and Department of Applied Math"
16052 条 记 录,以下是181-190 订阅
排序:
Performance Analysis of Machine Learning Techniques for Detecting Money Laundering in Bitcoin Transactions
Performance Analysis of Machine Learning Techniques for Dete...
收藏 引用
2024 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2024
作者: Salahi, Parisa Shady, Reem Doush, Iyad Abu Kandil, Marwa College of Engineering and Applied Science American University of Kuwait Kuwait Kuwait Computer Science Department Yarmouk University Irbid Jordan
More people are relying on Cryptocurrencies, yet these currencies are not controlled by any central authority or governments. Bitcoin transactions’ anonymity facilitates money laundry activities by cyber-criminals. T... 详细信息
来源: 评论
Prediction of Geopolymer Concrete Compressive Strength Using Convolutional Neural Networks
收藏 引用
computer Modeling in engineering & sciences 2024年 第5期139卷 1455-1486页
作者: Kolli Ramujee Pooja Sadula Golla Madhu Sandeep Kautish Abdulaziz S.Almazyad Guojiang Xiong Ali Wagdy Mohamed Department of Civil Engineering VNR Vignana Jyothi Institute of Engineering and TechnologyHyderabadTelangana500090India Department of Information Technology VNR Vignana Jyothi Institute of Engineering and TechnologyHyderabadTelangana500090India Department of Computer Science LBEF Campus(Asia Pacific University of Technology&InnovationMalaysia)Kathmandu44600Nepal Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmmanJordan
Geopolymer concrete emerges as a promising avenue for sustainable development and offers an effective solution to environmental *** attributes as a non-toxic,low-carbon,and economical substitute for conventional cemen... 详细信息
来源: 评论
Optimizing the Clinical Decision Support System (CDSS) by Using Recurrent Neural Network (RNN) Language Models for Real-Time Medical Query Processing
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 4787-4832页
作者: Israa Ibraheem Al Barazanchi Wahidah Hashim Reema Thabit Mashary Nawwaf Alrasheedy Abeer Aljohan Jongwoon Park Byoungchol Chang College of Computing and Informatics Universiti Tenaga Nasional(UNITEN)Kajang43000Malaysia College of Engineering University ofWarith Al-AnbiyaaKarbala56001Iraq Faculty of Information Science&Technology Universiti Kebangsaan MalaysiaBangi43600Malaysia Department of Computer Science Applied CollegeUniversity of HailHail55424Saudi Arabia Department of Computer Science and Informatics Taibah UniversityMedina42353Saudi Arabia Department of Computer Science Hanyang UniversitySeoul04763Republic of Korea
This research aims to enhance Clinical Decision Support Systems(CDSS)within Wireless Body Area Networks(WBANs)by leveraging advanced machine learning ***,we target the challenges of accurate diagnosis in medical imagi... 详细信息
来源: 评论
Evaluation of Machine-Learning Based Approaches for Early Detection of Breast Cancer Tumor
Evaluation of Machine-Learning Based Approaches for Early De...
收藏 引用
2024 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2024
作者: Mohammad, Fares Al-Haran, Bader Doush, Iyad Abu Kandil, Marwa College of Engineering and Applied Science American University of Kuwait Kuwait Kuwait Computer Science Department Yarmouk University Irbid Jordan
Chances of survival can be significantly improved through early detection of breast cancer. Traditional breast cancer detection techniques require experts to identify the physical features of breast tumors from medica... 详细信息
来源: 评论
BHJO: A Novel Hybrid Metaheuristic Algorithm Combining the Beluga Whale, Honey Badger, and Jellyfish Search Optimizers for Solving engineering Design Problems
收藏 引用
computer Modeling in engineering & sciences 2024年 第10期141卷 219-265页
作者: Farouq Zitouni Saad Harous Abdulaziz S.Almazyad Ali Wagdy Mohamed Guojiang Xiong Fatima Zohra Khechiba Khadidja  Kherchouche Department of Computer Science and Information Technology Kasdi Merbah UniversityP.O.Box 30000OuarglaAlgeria Department of Computer Science College of Computing and InformaticsUniversity of SharjahP.O.Box 27272SharjahUnited Arab Emirates Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmman11937Jordan Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China
Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization *** approach aims to leverage the strengths of mult... 详细信息
来源: 评论
A Nonlinear Cryptosystem Based on Structure Phase Masks, QZ Modulation, Using Gyrator Transform Domain
A Nonlinear Cryptosystem Based on Structure Phase Masks, QZ ...
收藏 引用
2024 International Conference on Intelligent Systems for Cybersecurity, ISCS 2024
作者: Sharma, Bhavana Singh, Hukum Khurana, Mehak The NorthCap University Department of Computer Science and Engineering Gurugram122017 India The NorthCap Univesity Department of Applied Sciences Gurugram122017 India
This communication delves into an encryption methodology centered around the gyrator transform and the utilization of diverse structured phase masks (SPMs). Unlike conventional random phase masks (RPMs), this approach... 详细信息
来源: 评论
Vulnerabilities and Challenges in the Development of PUF-Based Authentication Protocols on FPGAs: A Brief Review  7
Vulnerabilities and Challenges in the Development of PUF-Bas...
收藏 引用
7th IEEE Conference on Dependable and Secure Computing, DSC 2024
作者: Yavuz, Sinan Naroska, Edwin Daniel, Kai University of Siegen Department of Electrical Engineering and Computer Science Siegen Germany Niederrhein University of Applied Sciences Department of Electrical Engineering and Computer Science Krefeld Germany Institute of Measurement and Sensor Technology University of Applied Sciences Ruhr West Mülheim Germany
The security of IoT (Internet of Things) devices and the protection of sensitive information processed by these devices such as personal data, sensor values, process-related information is an important and difficult c... 详细信息
来源: 评论
Artificial Intelligence-Enabled Cooperative Cluster-Based Data Collection for Unmanned Aerial Vehicles
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3351-3365页
作者: R.Rajender C.S.S.Anupama G.Jose Moses E.Laxmi Lydia Seifedine Kadry Sangsoon Lim Department of Computer Science Engineering Lendi Institute of Engineering&TechnologyDenkada535005India Department of Electronics&Instrumentation Engineering V.R.Siddhartha Engineering CollegeVijayawada520007India Department of Computer Science Engineering Malla Reddy Engineering College500100India Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Applied Data Science Noroff University CollegeKristiansand4612Norway Department of Computer Engineering Sungkyul UniversityAnyang14097Korea
In recent times,sixth generation(6G)communication technologies have become a hot research topic because of maximum throughput and low delay services for mobile *** encompasses several heterogeneous resource and commun... 详细信息
来源: 评论
How Large Language Models are Transforming Teachers' Assessment of Student Competency: A Case Study on LLM-Based Report Writing
How Large Language Models are Transforming Teachers' Assessm...
收藏 引用
2025 International Conference on Electronics, Information, and Communication, ICEIC 2025
作者: Lee, Dongyub Kim, Daejung Loeser, Martin Seo, Kyoungwon Seoul National University of Science and Technology Department of Applied Artificial Intelligence Seoul Korea Republic of Seoul National University of Science and Technology Department of Environmental Engineering Seoul Korea Republic of Electrical Engineering and Mechatronics ZHAW Zurich University of Applied Sciences Department of Computer Science Winterthur Switzerland
Evaluating student competencies is critical to fostering academic success, but the traditional process of assessment and report generation is time-consuming and labor-intensive for teachers. The emergence of Large Lan... 详细信息
来源: 评论
A new method for human activity identification using convolutional neural networks
收藏 引用
International Journal of Cloud Computing 2023年 第2-4期12卷 191-200页
作者: Prakash, P.S. Balakrishnan, S. Venkatachalam, K. Balasubramanian, Saravana Balaji Department of Computer Science and Engineering Vivekanandha College of Engineering for Women Namakkal Tiruchengode637205 India Department of Computer Science and Business Systems Sri Krishna College of Engineering and Technology Tamilnadu Coimbatore India Department of Applied Cybernetics Faculty of Science University of Hradec Králové Hradec Králové50003 Czech Republic Department of Information Technology Lebanese French University Erbil Iraq
Body fitness monitoring applications are using mobile sensors to identify human activities. Human activity identification is a challenging task because of the wide availability of human activities. This paper proposes... 详细信息
来源: 评论