咨询与建议

限定检索结果

文献类型

  • 11,248 篇 期刊文献
  • 8,832 篇 会议
  • 118 册 图书

馆藏范围

  • 20,198 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,593 篇 工学
    • 6,397 篇 计算机科学与技术...
    • 5,044 篇 软件工程
    • 2,379 篇 信息与通信工程
    • 2,356 篇 电子科学与技术(可...
    • 2,136 篇 电气工程
    • 1,622 篇 光学工程
    • 1,539 篇 生物工程
    • 1,504 篇 控制科学与工程
    • 1,367 篇 生物医学工程(可授...
    • 1,161 篇 材料科学与工程(可...
    • 1,082 篇 化学工程与技术
    • 816 篇 机械工程
    • 797 篇 仪器科学与技术
    • 666 篇 动力工程及工程热...
    • 525 篇 核科学与技术
    • 452 篇 力学(可授工学、理...
    • 389 篇 冶金工程
  • 9,261 篇 理学
    • 4,973 篇 物理学
    • 3,014 篇 数学
    • 1,880 篇 生物学
    • 1,267 篇 化学
    • 1,121 篇 统计学(可授理学、...
    • 613 篇 系统科学
  • 2,520 篇 管理学
    • 1,611 篇 管理科学与工程(可...
    • 923 篇 图书情报与档案管...
    • 715 篇 工商管理
  • 1,442 篇 医学
    • 1,182 篇 临床医学
    • 957 篇 基础医学(可授医学...
    • 598 篇 药学(可授医学、理...
    • 440 篇 公共卫生与预防医...
  • 476 篇 法学
  • 291 篇 农学
  • 261 篇 经济学
  • 234 篇 教育学
  • 79 篇 文学
  • 36 篇 艺术学
  • 35 篇 军事学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 411 篇 deep learning
  • 317 篇 computer science
  • 212 篇 machine learning
  • 177 篇 computational mo...
  • 170 篇 feature extracti...
  • 152 篇 accuracy
  • 149 篇 image segmentati...
  • 148 篇 internet of thin...
  • 142 篇 optimization
  • 131 篇 data mining
  • 129 篇 support vector m...
  • 123 篇 wireless communi...
  • 111 篇 neural networks
  • 108 篇 magnetic resonan...
  • 108 篇 hadron colliders
  • 107 篇 training
  • 106 篇 bandwidth
  • 99 篇 hadrons
  • 94 篇 throughput
  • 94 篇 predictive model...

机构

  • 1,082 篇 cavendish labora...
  • 1,016 篇 department of ph...
  • 970 篇 physikalisches i...
  • 954 篇 oliver lodge lab...
  • 627 篇 infn laboratori ...
  • 600 篇 infn sezione di ...
  • 599 篇 fakultät physik ...
  • 596 篇 university of ch...
  • 581 篇 infn sezione di ...
  • 579 篇 infn sezione di ...
  • 569 篇 school of physic...
  • 526 篇 iccub universita...
  • 522 篇 horia hulubei na...
  • 512 篇 school of physic...
  • 502 篇 department of ph...
  • 496 篇 imperial college...
  • 492 篇 center for high ...
  • 491 篇 h.h. wills physi...
  • 487 篇 stfc rutherford ...
  • 484 篇 nikhef national ...

作者

  • 269 篇 barter w.
  • 264 篇 beiter a.
  • 258 篇 a. gomes
  • 252 篇 bellee v.
  • 244 篇 c. alexa
  • 242 篇 j. m. izen
  • 236 篇 c. amelung
  • 235 篇 g. bella
  • 235 篇 j. strandberg
  • 234 篇 d. calvet
  • 232 篇 blake t.
  • 232 篇 s. chen
  • 230 篇 g. spigo
  • 228 篇 f. siegert
  • 226 篇 brundu d.
  • 225 篇 bowcock t.j.v.
  • 216 篇 j. wang
  • 214 篇 r. ströhmer
  • 212 篇 betancourt c.
  • 210 篇 y. tayalati

语言

  • 17,634 篇 英文
  • 2,304 篇 其他
  • 245 篇 中文
  • 16 篇 日文
  • 8 篇 德文
  • 5 篇 法文
  • 3 篇 朝鲜文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Digital Technology Center and Department of Computer Science and Engineering"
20198 条 记 录,以下是681-690 订阅
排序:
Multi-Equipment Detection Method for Distribution Lines Based on Improved YOLOx-s
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 2735-2749页
作者: Lei Hu Yuanwen Lu Si Wang Wenbin Wang Yongmei Zhang School of Computer and Information Engineering Jiangxi Normal UniversityNanchang330022China School of Digital Industry Jiangxi Normal UniversityShangrao334005China Department of Science and Technology State Grid Jiangxi Electric Power Research InstituteNanchang330096China School of Information North China University of TechnologyBeijing100144China
The YOLOx-s network does not sufficiently meet the accuracy demand of equipment detection in the autonomous inspection of distribution lines by Unmanned Aerial Vehicle(UAV)due to the complex background of distribution... 详细信息
来源: 评论
Transforming Diabetes Care: A Review of IoT-Based Mobile Health Systems  10th
Transforming Diabetes Care: A Review of IoT-Based Mobile He...
收藏 引用
10th EAI International Conference on IoT Technologies for Health-Care, HealthyIoT 2023, and 4th EAI International Conference on Wearables in Healthcare, HealthWear 2023
作者: Ashfaq, Fiza Ahad, Abdul Hussain, Mudassar Madeira, Filipe Department of Computer Science University of Management and Technology Sialkot51040 Pakistan School of Software Northwestern Polytechnical University Shaanxi Xian China Istanbul34467 Turkey /Pole of Digital Literacy and Social Inclusion Polytechnic Institute of Santarem Santarem2001-904 Portugal Department of Computer Science and Creative Technologies Global College of Engineering and Technology Muscat Oman
Diabetes, a chronic ailment requiring ongoing care and monitoring, has undergone a healthcare shift thanks to the Internet of Things (IoT). Real-time monitoring, individualized treatment plans, and improved patient-pr... 详细信息
来源: 评论
Load Forecasting with Hybrid Deep Learning Model for Efficient Power System Management
收藏 引用
Recent Advances in computer science and Communications 2024年 第1期17卷 38-51页
作者: Gochhait, Saikat Sharma, Deepak K. Rathore, Rajkumar Singh Jhaveri, Rutvij H. Neurosciences Research Institute Samara State Medical University Russia Symbiosis Institute of Digital and Telecom Management constituents of Symbiosis International Deemed University Pune India ISBM College of Engineering Pune India Department of Computer Science Cardiff School of Technologies Cardiff Metropolitan University Llan-daff Campus Western Avenue CardiffCF5 2YB United Kingdom Department of Computer Science and Engineering School of Technology Pandit Deendayal Energy University Gandhinagar India
Aim: Load forecasting for efficient power system management. Background: Short-term energy load forecasting (STELF) is a valuable tool for utility compa-nies and energy providers because it allows them to predict and ... 详细信息
来源: 评论
Blockchain Based Security Enabled Smart Contract for Energy Management  16
Blockchain Based Security Enabled Smart Contract for Energy ...
收藏 引用
16th International Conference on Security of Information and Networks, SIN 2023
作者: Sharma, Aditi Patel, Mukta Choudhary, Arjun Kumar, Gajender Department of Computer Science and Engineering Maharashtra Pune India Parul Institute of Technology Parul University Department of Computer Science and Engineering Gujarat Vadodara India Sardar Patel University of Police Center for Cyber Security Security and Criminal Justice Jodhpur India Srm University Department of Computer Science and Engineering Delhi-NCR Campus India
Energy consumption is highly demanded area for major security concerns due to the high eye from attackers. In 2020, the 'Recorded future' released report for massive power outage in India[1]. With the increasi... 详细信息
来源: 评论
Optimization Technique for Deep Learning Methodology on Power Side Channel Attacks  33
Optimization Technique for Deep Learning Methodology on Powe...
收藏 引用
33rd International Telecommunication Networks and Applications Conference, ITNAC 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Nafi, Nazmus Shaker Aman, Azana Hafizah Islam, Shayla Nahi, Mohammad Siab Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Department of Computer Techniques Engineering Baghdad10011 Iraq GS-APAC Kellogg Brown and Root Melbourne Australia Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia
The first non-profiled side-channel attack (SCA) method using deep learning is Timon's Differential Deep Learning Analysis (DDLA). This method is effective in retrieving the secret key with the help of deep learni... 详细信息
来源: 评论
Detection of Crucial Power Side Channel Data Leakage in Neural Networks  33
Detection of Crucial Power Side Channel Data Leakage in Neur...
收藏 引用
33rd International Telecommunication Networks and Applications Conference, ITNAC 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Satar, Nurhizam Safie Mohd Nafi, Nazmus Shaker Aman, Azana Hafizah Islam, Shayla Fadhil, Saif Aamer Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Department of Computer Techniques Engineering Baghdad10011 Iraq Integrated Work Package KBR SouthbankVIC Australia Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia
Neural network (NN) accelerators are now extensively utilized in a range of applications that need a high degree of security, such as driverless cars, NLP, and image recognition. Due to privacy issues and the high cos... 详细信息
来源: 评论
Design of Lightweight Cryptography based Deep Learning Model for Side Channel Attacks  33
Design of Lightweight Cryptography based Deep Learning Model...
收藏 引用
33rd International Telecommunication Networks and Applications Conference, ITNAC 2023
作者: Ahmed, Amjed Abbas Hasan, Mohammad Kamrul Nafi, Nazmus Shaker Aman, Azana Hafizah Islam, Shayla Fadhil, Saif Aamer Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia Department of Computer Techniques Engineering Baghdad10011 Iraq Integrated Work Package KBR SouthbankVIC Australia Institute of Computer Science and Digital Innovation UCSI University Kuala Lumpur56000 Malaysia
Depending on a device's encryption mechanism, a wide variety of tangible details could be exposed. These leaks are used in side-channel analysis, which is used to get keys. Due to deep learning's sensitivity t... 详细信息
来源: 评论
Prognostic Phenotype Clustering of Uterine Sarcoma Patients
Prognostic Phenotype Clustering of Uterine Sarcoma Patients
收藏 引用
2024 IEEE International Conference on E-Health Networking, Application and Services, HealthCom 2024
作者: Zhang, Tuao Yuan, Suzhen Zhou, Xue Wang, Wenwen Zhu, Xin Graduate School of Computer Science and Engineering The University of Aizu Aizuwakamatsu Japan Department of Obstetrics and Gynecology Tongji Hospital Huazhong University of Science and Technology Wuhan China Department of AI Technology Development M&D Data Science Center Institute of Science Tokyo Tokyo Japan
Uterine sarcoma is a rare but highly aggressive malignancy with poor prognosis. In this study, prognostic phenotypes corresponding to the end point of mortality were explored by unsupervised machine learning (ML) on t... 详细信息
来源: 评论
PUF-Based Privacy-Preserving Simultaneous Authentication Among Multiple Vehicles in VANET
收藏 引用
IEEE Transactions on Vehicular technology 2024年 第5期73卷 6727-6739页
作者: Awais, Syed Muhammad Yucheng, Wu Mahmood, Khalid Akram, Muhammad Wahid Hussain, Shafiq Das, Ashok Kumar Park, Youngho Chongqing University School of Microelectronics and Communication Engineering Chongqing400044 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin64002 Taiwan University of Lahore Department of Software Engineering Punjab Lahore54590 Pakistan University of Sahiwal Department of Computer Science Punjab Sahiwal57000 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Telangana Hyderabad500032 India Kyungpook National University School of Electronics Engineering Daegu41566 Korea Republic of
The intellectual and immense attainment of a smart city and auto-mobile vehicles are gradually growing. This growth drives Vehicular Ad-Hoc Network (VANET), a broadly operated complex network for inter-vehicular trans... 详细信息
来源: 评论
A Barrier-Based Machine Learning Approach for Intrusion Detection in Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4181-4218页
作者: Haydar Abdulameer Marhoon Rafid Sagban Atheer Y.Oudah Saadaldeen Rashid Ahmed Information and Communication Technology Research Group Scientific Research CenterAl-Ayen UniversityThi-Qar64011Iraq College of Computer Sciences and Information Technology University of KerbalaKarbala56001Iraq Enginerring Technical College Al-Ayen UniversityThi-Qar64011Iraq Information Technology College University of BabylonHilla51002Iraq Department of Computer Science College of Education for Pure ScienceUniversity ofThi-QarNasiriyah64001Iraq Artificial Intelligence Engineering Department College of EngineeringAl-Ayen UniversityThi-Qar64001Iraq Department of Computer Science Bayan UniversityErbilKurdistan44001Iraq
In order to address the critical security challenges inherent to Wireless Sensor Networks(WSNs),this paper presents a groundbreaking barrier-based machine learning *** applications like military operations,healthcare ... 详细信息
来源: 评论