咨询与建议

限定检索结果

文献类型

  • 32,196 篇 会议
  • 24,495 篇 期刊文献
  • 594 册 图书

馆藏范围

  • 57,285 篇 电子文献
  • 6 种 纸本馆藏

日期分布

学科分类号

  • 32,688 篇 工学
    • 18,478 篇 计算机科学与技术...
    • 14,766 篇 软件工程
    • 6,487 篇 信息与通信工程
    • 5,437 篇 电气工程
    • 5,352 篇 控制科学与工程
    • 5,348 篇 电子科学与技术(可...
    • 3,971 篇 生物医学工程(可授...
    • 3,928 篇 生物工程
    • 3,753 篇 光学工程
    • 2,555 篇 化学工程与技术
    • 2,292 篇 机械工程
    • 2,236 篇 材料科学与工程(可...
    • 2,078 篇 仪器科学与技术
    • 1,803 篇 动力工程及工程热...
    • 1,120 篇 安全科学与工程
    • 1,039 篇 力学(可授工学、理...
  • 23,089 篇 理学
    • 9,880 篇 物理学
    • 9,570 篇 数学
    • 4,853 篇 生物学
    • 3,290 篇 统计学(可授理学、...
    • 2,926 篇 化学
    • 2,287 篇 系统科学
  • 7,182 篇 管理学
    • 4,554 篇 管理科学与工程(可...
    • 2,747 篇 图书情报与档案管...
    • 2,207 篇 工商管理
  • 4,220 篇 医学
    • 3,451 篇 临床医学
    • 2,944 篇 基础医学(可授医学...
    • 1,812 篇 药学(可授医学、理...
    • 1,496 篇 公共卫生与预防医...
  • 1,287 篇 法学
    • 1,145 篇 社会学
  • 933 篇 经济学
  • 927 篇 农学
  • 620 篇 教育学
  • 232 篇 文学
  • 128 篇 军事学
  • 68 篇 艺术学
  • 13 篇 哲学
  • 12 篇 历史学

主题

  • 1,370 篇 accuracy
  • 1,162 篇 deep learning
  • 1,138 篇 machine learning
  • 979 篇 computational mo...
  • 873 篇 feature extracti...
  • 757 篇 training
  • 711 篇 computer science
  • 691 篇 internet of thin...
  • 666 篇 artificial intel...
  • 624 篇 predictive model...
  • 554 篇 optimization
  • 547 篇 real-time system...
  • 539 篇 support vector m...
  • 522 篇 convolutional ne...
  • 439 篇 testing
  • 412 篇 data models
  • 384 篇 data mining
  • 366 篇 neural networks
  • 351 篇 image segmentati...
  • 331 篇 computer archite...

机构

  • 1,098 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 977 篇 physikalisches i...
  • 968 篇 oliver lodge lab...
  • 877 篇 university of ch...
  • 766 篇 department of el...
  • 637 篇 infn laboratori ...
  • 617 篇 infn sezione di ...
  • 604 篇 infn sezione di ...
  • 595 篇 fakultät physik ...
  • 588 篇 infn sezione di ...
  • 560 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 536 篇 department of ph...
  • 533 篇 school of physic...
  • 521 篇 imperial college...
  • 518 篇 iccub universita...
  • 516 篇 h.h. wills physi...
  • 513 篇 nikhef national ...
  • 508 篇 stfc rutherford ...

作者

  • 265 篇 barter w.
  • 258 篇 a. gomes
  • 246 篇 c. alexa
  • 246 篇 beiter a.
  • 243 篇 j. m. izen
  • 237 篇 bellee v.
  • 236 篇 c. amelung
  • 235 篇 g. bella
  • 235 篇 s. chen
  • 234 篇 j. strandberg
  • 234 篇 d. calvet
  • 230 篇 g. spigo
  • 227 篇 blake t.
  • 226 篇 brundu d.
  • 226 篇 bowcock t.j.v.
  • 225 篇 f. siegert
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 215 篇 borsato m.
  • 214 篇 r. ströhmer

语言

  • 53,385 篇 英文
  • 3,437 篇 其他
  • 443 篇 中文
  • 16 篇 德文
  • 16 篇 日文
  • 8 篇 法文
  • 4 篇 西班牙文
  • 4 篇 斯洛文尼亚文
  • 3 篇 俄文
  • 2 篇 意大利文
  • 2 篇 朝鲜文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Sciences and Computer Engineering"
57285 条 记 录,以下是121-130 订阅
排序:
Efficient One-Stage Deep Learning for Text Detection in Scene Images
EEA - Electrotehnica, Electronica, Automatica
收藏 引用
EEA - Electrotehnica, Electronica, Automatica 2024年 第4期72卷 65-71页
作者: Tibermacine, Ahmed Guettala, Walid Tibermacine, Imad Eddine Faculty of Exact Sciences Natural And Life Sciences University Mohamed Khider of Biskra Algeria Computer Science Department University Mohamed Khider of Biskra Algeria Department of Computer Automation and Management Engineering Sapienza University of Rome Italy
Text detection in natural images is a crucial task for extracting and recognizing valuable information, but it comes with significant challenges. Traditional image processing methods often rely on synthetic features, ... 详细信息
来源: 评论
Optimized Autonomous Computing with Trusted Resilient Data Management for IoT Emerging Networks
收藏 引用
IEEE Sensors Journal 2025年 第11期25卷 20778-20785页
作者: Shafique, Ayesha Cheng, Benmao Zhao, Bo Alwakid, Ghadah Naif Haq, Muhammad Inaam Ul Laboratory of Intelligent IOT Technology and Applications in Universities China Jouf University College of Computer and Information Sciences Department of Computer Science Al Jowf Sakaka72341 Saudi Arabia Quanzhou University of Information Engineering School of Computer Science and Software Engineering Quanzhou362000 China
The innovative city network integrates numerous computational and physical components to develop real-time systems. These systems can capture sensor data and distribute it to end stations. Most solutions have been pre... 详细信息
来源: 评论
Artificial Bee Colony with Cuckoo Search for Solving Service Composition
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 3385-3402页
作者: Fadl Dahan Abdulelah Alwabel Department of Information System College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Sciences Faculty of Computing and Information Technology AlturbahTaiz UniversityTaiz9674Yemen Department of Computer Sciences College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia
In recent years,cloud computing has provided a Software As A Service(SaaS)platform where the software can be reused and applied to fulfill compli-cated user demands according to specific Quality of Services(QoS)*** user... 详细信息
来源: 评论
A Cloud Based Sentiment Analysis through Logistic Regression in AWS Platform
收藏 引用
computer Systems Science & engineering 2023年 第4期45卷 857-868页
作者: Mohemmed Sha Department of Software Engineering College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
The use of Amazon Web Services is growing rapidly as more users are adopting the *** has various functionalities that can be used by large corporates and individuals as *** analysis is used to build an intelligent sys... 详细信息
来源: 评论
Enhancing Intrusion Detection by Using Machine Learning  1st
Enhancing Intrusion Detection by Using Machine Learning
收藏 引用
1st International Conference on Intelligent Systems, Blockchain, and Communication Technologies, ISBCom 2024
作者: Khan, Andleeb Nand, Parma Bhushan, Bharat Hameed, Alaa Ali Jamil, Akhtar Department of Computer Science and Engineering Sharda University Greater Noida India Department of Computer Engineering Istinye University Istanbul34396 Turkey Department of Computer Science National University of Computer and Emerging Sciences Islamabad44000 Pakistan
With the advancing technology, the increase in threats has been exponential. These technologies have led to the production of huge amounts of network traffic data. Therefore, it is of immense importance for the compan... 详细信息
来源: 评论
Deep Learning-based Techniques for Intrusion Detection Systems  2
Deep Learning-based Techniques for Intrusion Detection Syste...
收藏 引用
2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Rizwani, Nafay Jamil, Akhtar Hameed, Alaa Ali National University of Computer and Emerging Sciences Department of Computer Science Islamabad Pakistan Istinye University Department of Computer Engineering Istanbul Turkey
In the evolving landscape of cybersecurity, effective Intrusion Detection Systems (IDS) are essential for protecting against increasingly sophisticated cyber threats. This study explores the efficacy of various neural... 详细信息
来源: 评论
Comprehensive analysis of multiple machine learning techniques for rock slope failure prediction
收藏 引用
Journal of Rock Mechanics and Geotechnical engineering 2024年 第11期16卷 4386-4398页
作者: Arsalan Mahmoodzadeh Abed Alanazi Adil Hussein Mohammed Hawkar Hashim Ibrahim Abdullah Alqahtani Shtwai Alsubai Ahmed Babeker Elhag Department of Civil Engineering University of HalabjaHalabjaKurdistan Region46018Iraq Department of Computer Science College of Computer Engineering and Sciences in Al-KharjPrince Sattam bin Abdulaziz UniversityP.O.Box 151Al-Kharj11942Saudi Arabia Department of Communication and Computer Engineering Faculty of EngineeringCihan University-ErbilKurdistan RegionIraq Department of Civil Engineering College of EngineeringSalahaddin University-Erbil44002ErbilKurdistan RegionIraq Software Engineering Department College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityP.O.Box 151Al-Kharj11942Saudi Arabia Department of Civil Engineering College of EngineeringKing Khalid UniversityAbha61413Saudi Arabia
In this study,twelve machine learning(ML)techniques are used to accurately estimate the safety factor of rock slopes(SFRS).The dataset used for developing these models consists of 344 rock slopes from various open-pit... 详细信息
来源: 评论
Resilient Distributed Optimization for Multi-Agent Cyberphysical Systems
收藏 引用
IEEE Transactions on Automatic Control 2025年 第6期70卷 3952-3967页
作者: Yemini, Michal Nedic, Angelia Goldsmith, Andrea J. Gil, Stephanie Bar-Ilan University Faculty of Engineering Israel Arizona State University School of Electrical Computer and Energy Engineering TempeAZ85281 United States Princeton University Department of Electrical and Computer Engineering PrincetonNJ08544 United States Harvard University Computer Science Department School of Engineering and Applied Sciences CambridgeMA02139 United States
This work focuses on the problem of distributed optimization in multi-agent cyberphysical systems, where a legitimate agent's iterates are influenced both by the values it receives from potentially malicious neigh... 详细信息
来源: 评论
A Review of Blockchain based Decentralised Authentication Solutions and their improvement through Metamask  2
A Review of Blockchain based Decentralised Authentication So...
收藏 引用
2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Khan, Andleeb Nand, Parma Bhushan, Bharat Hameed, Alaa Ali Jamil, Akhtar Sharda School of Engineering & Technology Department of Computer Science & Engineering Greater Noida India Istinye University Department of Computer Engineering Istanbul Turkey National University of Computer and Emerging Sciences Department of Computer Science Islamabad Pakistan
With the advancing technology, it becomes difficult to cope up with novel trends and configurations. Similarly, it is difficult to secure the systems against each emerging threat. With this the loopholes in convention... 详细信息
来源: 评论
Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3183-3198页
作者: Doaa Sami Khafaga Faten Khalid Karim Abdelaziz A.Abdelhamid El-Sayed M.El-kenawy Hend K.Alkahtani Nima Khodadadi Mohammed Hadwan Abdelhameed Ibrahim Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt The Department of Civil and Environmental Engineering Florida International UniversityMiamiFLUSA Department of Information Technology College of ComputerQassim UniversityBuraydah51452Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t... 详细信息
来源: 评论