咨询与建议

限定检索结果

文献类型

  • 13,864 篇 期刊文献
  • 12,740 篇 会议
  • 385 册 图书

馆藏范围

  • 26,988 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 15,401 篇 工学
    • 9,459 篇 计算机科学与技术...
    • 7,321 篇 软件工程
    • 2,858 篇 信息与通信工程
    • 2,310 篇 控制科学与工程
    • 1,756 篇 电气工程
    • 1,555 篇 电子科学与技术(可...
    • 1,479 篇 生物工程
    • 1,090 篇 生物医学工程(可授...
    • 964 篇 机械工程
    • 926 篇 光学工程
    • 918 篇 化学工程与技术
    • 793 篇 材料科学与工程(可...
    • 793 篇 动力工程及工程热...
    • 732 篇 仪器科学与技术
    • 674 篇 力学(可授工学、理...
    • 486 篇 土木工程
    • 458 篇 建筑学
  • 13,546 篇 理学
    • 8,426 篇 数学
    • 4,126 篇 物理学
    • 2,288 篇 统计学(可授理学、...
    • 1,796 篇 生物学
    • 1,433 篇 系统科学
    • 1,040 篇 化学
    • 707 篇 地球物理学
  • 3,572 篇 管理学
    • 2,245 篇 管理科学与工程(可...
    • 1,452 篇 图书情报与档案管...
    • 1,074 篇 工商管理
  • 992 篇 医学
    • 841 篇 临床医学
    • 735 篇 基础医学(可授医学...
  • 565 篇 法学
    • 487 篇 社会学
  • 456 篇 经济学
  • 317 篇 农学
  • 250 篇 教育学
  • 87 篇 文学
  • 62 篇 军事学
  • 40 篇 艺术学
  • 14 篇 哲学
  • 6 篇 历史学

主题

  • 743 篇 computer science
  • 541 篇 mathematics
  • 341 篇 deep learning
  • 293 篇 computational mo...
  • 262 篇 accuracy
  • 259 篇 machine learning
  • 252 篇 optimization
  • 227 篇 support vector m...
  • 199 篇 feature extracti...
  • 195 篇 training
  • 191 篇 internet of thin...
  • 190 篇 educational inst...
  • 182 篇 artificial intel...
  • 178 篇 data mining
  • 174 篇 neural networks
  • 162 篇 approximation al...
  • 159 篇 image segmentati...
  • 149 篇 galaxies
  • 131 篇 computer archite...
  • 125 篇 application soft...

机构

  • 404 篇 faculty of scien...
  • 388 篇 department for p...
  • 384 篇 department of ph...
  • 381 篇 department of ph...
  • 359 篇 department of ph...
  • 323 篇 kirchhoff-instit...
  • 308 篇 department of ph...
  • 284 篇 institute of phy...
  • 283 篇 fakultät für phy...
  • 279 篇 department of ph...
  • 272 篇 instituto de fís...
  • 271 篇 department of ph...
  • 266 篇 institute of phy...
  • 264 篇 universidade fed...
  • 263 篇 ictp trieste
  • 254 篇 nikhef national ...
  • 250 篇 department of ph...
  • 248 篇 department of ph...
  • 246 篇 department of ph...
  • 242 篇 school of physic...

作者

  • 331 篇 c. alexa
  • 328 篇 j. m. izen
  • 324 篇 g. bella
  • 323 篇 d. calvet
  • 323 篇 c. amelung
  • 322 篇 j. strandberg
  • 317 篇 g. spigo
  • 315 篇 f. siegert
  • 306 篇 r. ströhmer
  • 303 篇 m. rijssenbeek
  • 302 篇 s. jin
  • 300 篇 g. gaudio
  • 294 篇 s. mohapatra
  • 291 篇 y. tayalati
  • 277 篇 m. klein
  • 255 篇 s. guindon
  • 252 篇 f. pastore
  • 243 篇 n. orlando
  • 239 篇 a. kaczmarska
  • 225 篇 j. schaarschmidt

语言

  • 23,731 篇 英文
  • 2,990 篇 其他
  • 265 篇 中文
  • 8 篇 德文
  • 7 篇 法文
  • 6 篇 西班牙文
  • 5 篇 俄文
  • 4 篇 日文
  • 4 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 意大利文
检索条件"机构=Science Technology Mathematics Computer Science"
26989 条 记 录,以下是4871-4880 订阅
排序:
The Impact of COVID - 19 to the Trade in India Using Digital, IOT and AI Techniques  2
The Impact of COVID - 19 to the Trade in India Using Digital...
收藏 引用
2nd International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2022
作者: Verma, Kirti Sundararajan, M. Mangal, Adarsh Ray, Samrat Kumar, Ashok Lakshmi Narain College of Technology Department of Engineering Mathematics Bhopal India Mizoram University Department of Mathematics & Computer Science Mizoram 796004 India Engineering College Department of Mathematics Ajmer305025 India Economics Sunstone ClEM Kolkata India K.S.College Bihar Laheriasarai Darbhanga India
The Corona virus also called SARS- CoV-2which spreads a disease called COVID-19. It has been documented that this disease has been spreading at an exponential rate and conquered 6 out of 7 continents sparing Antarctic... 详细信息
来源: 评论
Critical (P5, W4)-Free Graphs
arXiv
收藏 引用
arXiv 2025年
作者: Xia, Wen Jooken, Jorik Goedgebeur, Jan Beaton, Iain Cameron, Ben Huang, Shenwei College of Computer Science Nankai University Tianjin300071 China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300071 China Department of Computer Science KU Leuven Campus Kulak-Kortrijk Kortrijk8500 Belgium Department of Applied Mathematics Computer Science and Statistics Ghent University Ghent9000 Belgium Department of Mathematics and Statistics Acadia University WolfvilleNS Canada School of Mathematical and Computational Sciences University of Prince Edward Island CharlottetownPE Canada
A graph G is k-vertex-critical if χ(G) = k but χ(G − v) 1, H2)-free if it contains no induced subgraph isomorphic to H1 nor H2. A W4 is the graph consisting of a C4 plus an additional vertex adjacent to all the vert... 详细信息
来源: 评论
Optimizing Future Predictions in Children's Health: Implementing OGPA-enhanced Deep Learning for Precise Child Height Forecasting in the Social Media Age
Optimizing Future Predictions in Children's Health: Implemen...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yantao Shao Tianxiang He Yan Mao Kai Fang Wei Wang Keji Mao School of Computer Science and Technology Zhejiang University of Technology Hangzhou China School of Mathematics and Computer Science Zhejiang A&F University Hangzhou China Guangdong-HK-Macao Jt. Lab for Emotion Intell. & Pervasive Comp AI Res. Inst. Shenzhen MSU-BIT Univ Shenzhen China
In recent years, the issue of children's height has garnered widespread attention on social media. Social media platforms serve as pivotal communication channels for parents, doctors, educators, and researchers, w... 详细信息
来源: 评论
Artistic Style Transfer Using Generative Adversarial Networks: A Pix2Pix Implementation
Artistic Style Transfer Using Generative Adversarial Network...
收藏 引用
Communication, computer sciences and Engineering (IC3SE), International Conference on
作者: Dubasi Pavan Kumar Shuchi Bhadula Mohammed Al-Farouni Neeraj Varshney Vishal Sharma Manish Saraswat Department of Mathematics Integrated Master of Science Mathematics National Institute of Technology Patna Department of Computer Science & Engineering Graphic Era Deemed to be University Dehradun Department of computers Techniques engineering College of technical engineering The Islamic university Najaf Iraq Department of Computer Engineering and Applications GLA University Mathura Lovely Professional University Phagwara India Lloyd Institute of Engineering & Technology Greater Noida
This investigation explores the viability of four noticeable models, specifically Pix2Pix, Neural Style Transfer (NST), Fast Neural Style Transfer (FastNST), and CycleGAN, within the space of aesthetic style exchange.... 详细信息
来源: 评论
Implementation of Non-Linear Feedback Stream Cipher System through Hybrid block Cipher Mode to Enhance the Resistivity and Computation Speed of AES  9
Implementation of Non-Linear Feedback Stream Cipher System t...
收藏 引用
9th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and computer Engineering, UPCON 2022
作者: Dodmane, Radhakrishna Raghunandan, K.R. Shetty, Surendra Krishnaraj Rao, N.S. Bhavya, K. Islam, Sardar M.N. NMAM Institute of Technology Computer Science and Engineering Karkala Nitte574110 India NMAM Institute of Technology Dept. of MCA Karkala Nitte574110 India NMAM Institute of Technology Information Science and Engineering Karkala Nitte574110 India NMAM Institute of Technology Department of Mathematics Karkala Nitte574110 India Victoria University ISILC 300 Queen Street MelbourneVIC8001 Australia
In a modern computing world, transmission of the confidential information over public network is very challenge. Various solutions have been proposed to provide the confidentiality, authenticity against the unauthoriz... 详细信息
来源: 评论
Infinite families 2-designs from binary projective three-weight codes
arXiv
收藏 引用
arXiv 2023年
作者: Zhu, Canze Liao, Qunying Liu, Haibo School of Computer Science and Technology Dongguan University of Technology Dongguan523000 China College of Mathematical Science Sichuan Normal University Chengdu610066 China School of Applied Mathematics Chengdu University of Information Technology Sichuan Chengdu610225 China
Combinatorial designs are closely related to linear codes. In recent year, there are a lot of t-designs constructed from certain linear codes. In this paper, we aim to construct 2-designs from binary three-weight code... 详细信息
来源: 评论
The importance of the clustering model to detect new types of intrusion in data traffic
arXiv
收藏 引用
arXiv 2024年
作者: Abd, Noor Saud Karoui, Kamel National School of Engineers of Tunis ENIT Tunisia The Department of Cyber Security Computer Science and Mathematics College Tikrit University Iraq National Institute of Applied Sciences and Technology Tunisia
In the current digital age, the volume of data generated by various cyber activities has become enormous and is constantly increasing. The data may contain valuable insights that can be harnessed to improve cyber secu... 详细信息
来源: 评论
A generalized framework for fsm implementation
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2021年 第2期6卷 289-302页
作者: Hung, Mao-Hsiung Hsieh, Chaur-Heh Wang, Jinshui Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology School of Computer Science and Mathematics Fujian University of Technology no. 33 Xuefunan Road University Town Minhou Fuzhou350118 China College of Artificial Intelligence Yango University Fuzhou350015 China Research School of Computer Science Australian National University ACT2601 Australia
Finite State Machine (FSM) is a useful and powerful tool to model a dynamic system. A traditional implementation of FSM using nested switch-case statement exists problems of poor reusability and maintainability for pr... 详细信息
来源: 评论
Deduction, Constrained Zero Forcing, and Constrained Searching
arXiv
收藏 引用
arXiv 2024年
作者: Burgess, Andrea Dyer, Danny Ojakian, Kerry Wang, Lusheng Xiao, Mingyu Yang, Boting Department of Mathematics and Statistics University of New Brunswick Saint JohnNBE2L 4L5 Canada Department of Mathematics and Statistics Memorial University of Newfoundland St. John’sNLA1C 5S7 Canada Department of Mathematics and Computer Science Bronx Community College The City University of New York BronxNY United States Department of Computer Science City University of Hong Kong Hong Kong School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Department of Computer Science University of Regina ReginaSKS4S 0A2 Canada
Deduction is a recently introduced graph searching process in which searchers clear the vertex set of a graph with one move each, with each searcher’s movement determined by which of its neighbors are protected by ot... 详细信息
来源: 评论
Insight into the Hamilton and Crosser model for ternary hybrid nanofluid flow over a Riga wedge with heterogeneous catalytic reaction
收藏 引用
The European Physical Journal Special Topics 2024年 1-22页
作者: Obalalu, A. M. Shah, S. H. A. M. Darvesh, Adil Khan, Umair Ishak, Anuar Adegbite, Peter Ojewola, O. B. Muhammad, Taseer Galal, Ahmed M. Department of Mathematics and Statistics Kwara State University Malete Nigeria Department of Mathematics and Social Sciences Sukkur IBA University Sukkur Pakistan Department of Mathematics and Statistics Hazara University Mansehra Pakistan Department of Mathematical Sciences Faculty of Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Mathematics Faculty of Science Sakarya University Serdivan/Sakarya Turkey Department of Computer Science and Mathematics Lebanese American University Byblos Lebanon Department of Pure and Applied Mathematics LAUTECH Ogbomosho Nigeria Department of Mathematics College of Science King Khalid University Abha Saudi Arabia Department of Mechanical Engineering College of Engineering in Wadi Alddawasir Prince Sattam bin Abdulaziz University Wadi Alddawasir Saudi Arabia Production Engineering and Mechanical Design Department Faculty of Engineering Mansoura University Mansoura Egypt
The present article is designed to study the Hamilton and Crosser model applied to the flow of ternary hybrid nanofluids over a Riga wedge, incorporating the effects of heterogeneous catalytic reactions. The complex i...
来源: 评论