咨询与建议

限定检索结果

文献类型

  • 4,557 篇 会议
  • 1,766 篇 期刊文献
  • 109 册 图书
  • 1 篇 科技报告

馆藏范围

  • 6,433 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,993 篇 工学
    • 2,766 篇 计算机科学与技术...
    • 2,209 篇 软件工程
    • 760 篇 信息与通信工程
    • 595 篇 控制科学与工程
    • 357 篇 生物工程
    • 351 篇 电气工程
    • 298 篇 电子科学与技术(可...
    • 278 篇 生物医学工程(可授...
    • 255 篇 机械工程
    • 233 篇 光学工程
    • 212 篇 仪器科学与技术
    • 173 篇 化学工程与技术
    • 148 篇 建筑学
    • 141 篇 动力工程及工程热...
    • 140 篇 材料科学与工程(可...
    • 120 篇 土木工程
  • 2,842 篇 理学
    • 1,859 篇 数学
    • 662 篇 物理学
    • 517 篇 统计学(可授理学、...
    • 426 篇 生物学
    • 325 篇 系统科学
    • 209 篇 地球物理学
    • 201 篇 化学
  • 923 篇 管理学
    • 523 篇 管理科学与工程(可...
    • 446 篇 图书情报与档案管...
    • 298 篇 工商管理
  • 203 篇 医学
    • 174 篇 临床医学
    • 171 篇 基础医学(可授医学...
  • 154 篇 法学
    • 138 篇 社会学
  • 129 篇 教育学
    • 124 篇 教育学
  • 102 篇 经济学
  • 83 篇 农学
  • 16 篇 文学
  • 14 篇 军事学
  • 13 篇 哲学
  • 8 篇 艺术学
  • 5 篇 历史学

主题

  • 113 篇 computer science
  • 112 篇 computational mo...
  • 83 篇 accuracy
  • 82 篇 artificial intel...
  • 78 篇 feature extracti...
  • 76 篇 optimization
  • 74 篇 mathematics
  • 72 篇 machine learning
  • 72 篇 training
  • 68 篇 semantics
  • 66 篇 predictive model...
  • 61 篇 deep learning
  • 57 篇 visualization
  • 56 篇 support vector m...
  • 56 篇 data mining
  • 51 篇 internet of thin...
  • 50 篇 analytical model...
  • 50 篇 data models
  • 49 篇 software
  • 47 篇 computer archite...

机构

  • 85 篇 université de st...
  • 84 篇 institut univers...
  • 83 篇 north-west unive...
  • 83 篇 tno technical sc...
  • 82 篇 national centre ...
  • 82 篇 nikhef national ...
  • 81 篇 infn sezione di ...
  • 80 篇 ncsr demokritos ...
  • 79 篇 university würzb...
  • 77 篇 university of jo...
  • 76 篇 infn sezione di ...
  • 76 篇 university moham...
  • 76 篇 infn sezione di ...
  • 71 篇 infn sezione di ...
  • 68 篇 infn sezione di ...
  • 66 篇 università di ca...
  • 60 篇 western sydney u...
  • 58 篇 university moham...
  • 55 篇 university of am...
  • 53 篇 leiden universit...

作者

  • 94 篇 ferrara g.
  • 94 篇 ardid m.
  • 92 篇 kalekin o.
  • 92 篇 díaz a.f.
  • 90 篇 boumaaza j.
  • 90 篇 coleiro a.
  • 88 篇 enzenhöfer a.
  • 88 篇 celli s.
  • 87 篇 chen a.
  • 87 篇 calvo d.
  • 85 篇 dornic d.
  • 83 篇 gal t.
  • 83 篇 bozza c.
  • 80 篇 bendahman m.
  • 80 篇 brunner j.
  • 79 篇 di palma i.
  • 78 篇 gozzini s.r.
  • 78 篇 dallier r.
  • 78 篇 carretero v.
  • 76 篇 huang f.

语言

  • 6,205 篇 英文
  • 189 篇 其他
  • 31 篇 中文
  • 5 篇 日文
  • 4 篇 德文
  • 2 篇 法文
检索条件"机构=dept. Applied Mathematics and Computer Science"
6433 条 记 录,以下是1-10 订阅
排序:
Deep Learning Based Intrusion Detection for Cybersecurity in Unmanned Aerial Vehicles Network  4
Deep Learning Based Intrusion Detection for Cybersecurity in...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Niyonsaba, Simon Konate, Karim Soidridine, Moussa Moindze Dept. Mathematics and Computer Science Dakar Senegal
In this article, we have proposed Deep Learning techniques for cybersecurity in Unmanned Aerial Vehicles (UAVs). UAVs, also known as drones, have become versatile tools used in many applications. However, UA V cyberse... 详细信息
来源: 评论
AAF-SCM: An Authenticated Framework for Supply Chain Management
AAF-SCM: An Authenticated Framework for Supply Chain Managem...
收藏 引用
2024 IEEE International Conference on Intelligent Systems and Advanced Applications, ICISAA 2024
作者: Roy, Prince Kumar, Rajneesh Morshed, Md Neaz Fairleigh Dickinson University Dept. of Applied Computer Science United States Dept. of Computer Science & Engineering India
The process of a supply chain involves a series of activities that distribute, assemble, and manage products, transferring them from the supplier to the end consumer. It operates as a complex, interconnected network r... 详细信息
来源: 评论
Enhancing Human computer Interaction (HCI) Through Machine Learning Application  8
Enhancing Human Computer Interaction (HCI) Through Machine L...
收藏 引用
8th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2024
作者: Yaseen, Fahad Abdulateef Ahmed, Mohammad Shihab Khudhur, Mokhalad Eesee College Tikrit University Dept. Computer Science Computer Science and Mathematics Tikrit Iraq
Integrating human-computer interaction with machine learning is an important development that contributes and opens the way for many experiences that serve the user. This research presents the scientific benefits and ... 详细信息
来源: 评论
Classification Flower Images Based on Deep Learning and Machine Learning  8
Classification Flower Images Based on Deep Learning and Mach...
收藏 引用
8th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2024
作者: Mustfa, Asia Kamal Abdulateef, Salwa Khalid Hameed, Qabas Amer Ahmed, Mohamed Aktham Al-Qaysi, Zaydoon Computer Science and Mathematics College Tikrit University Dept. Computer Science Tikrit Iraq
Image classification has grown increasingly popular due to the growing significance of machine learning and deep learning. Flower images may sometimes exhibit resemblances in terms of hue, form, and visual characteris... 详细信息
来源: 评论
Asymptotic behaviour for a parabolic p-Laplacian equation with an advection force  12
Asymptotic behaviour for a parabolic p-Laplacian equation wi...
收藏 引用
12th International Conference on Mathematical Modeling in Physical sciences, IC-MSQUARE 2023
作者: Aal-Rkhais, Habeeb A. Qasim, Ruba H. Dept. of Mathematics College of Computer Science and Mathematics University of Thi-Qar Iraq
The rescaling method is presented to allow us establishing the interface functions and the nonnegative local solutions to the evolution of nonlinear degenerate parabolic p-Laplacian process with conservation laws that... 详细信息
来源: 评论
Content Based Classification of Short Messages using Recurrent Neural Networks in NLP
Content Based Classification of Short Messages using Recurre...
收藏 引用
2024 International Conference on Artificial Intelligence, computer, Data sciences, and Applications, ACDSA 2024
作者: Bennet, Deepthi Tabitha Bennet, Preethi Samantha Thiagarajan, Priya Sundarakantham, K. Thiagarajar College of Engineering Dept. of Applied Mathematics and Computational Science Madurai India Thiagarajar College of Engineering Dept. of Computer Science and Business Systems Madurai India Thiagarajar College of Engineering Dept. of Computer Science and Engineering Madurai India
Short message spam poses a significant threat for all mobile phone users, as it can act as an efficient tool for cyberattacks including spreading malware and phishing. Traditional anti-spam measures are only minimally... 详细信息
来源: 评论
Evaluation of the Effectiveness of Vulnerable Road User Clustering in C-V2X Systems
Evaluation of the Effectiveness of Vulnerable Road User Clus...
收藏 引用
2023 IEEE International Conference on Omni-Layer Intelligent Systems, COINS 2023
作者: Rupp, Matthias Wischhof, Lars Munich University of Applied Sciences HM Dept. of Computer Science and Mathematics Munich Germany
Vulnerable Road Users (VRUs) are at special risk in road traffic. The dissemination of information about VRUs in Intelligent Transportation Systems (ITS) can help to protect VRUs from various risks. The Vulnerable Roa... 详细信息
来源: 评论
Intrinsic Prioritization in Answer Set Programming Based on an Adapted Notion of Tolerance  37
Intrinsic Prioritization in Answer Set Programming Based on ...
收藏 引用
37th International Florida Artificial Intelligence Research Society Conference, FLAIRS 2024
作者: Wilhelm, Marco Spiegel, Lars-Phillip Kern-Isberner, Gabriele Dept. of Computer Science TU Dortmund University Dortmund Germany Dept. of Mathematics and Computer Science University of Hagen Hagen Germany
Answer set programming (ASP) is a declarative programming language suited to solve complex combinatorial search problems. Prioritized ASP is the subdiscipline of ASP which aims at prioritizing the models (answer sets)... 详细信息
来源: 评论
Minimizing Sorting Networks at the Sub-Comparator Level  25th
Minimizing Sorting Networks at the Sub-Comparator Level
收藏 引用
25th Conference on Logic for Programming, Artificial Intelligence and Reasoning, LPAR 2024
作者: Cruz-Filipe, Luís Schneider-Kam, Peter Dept. Mathematics and Computer Science University of Southern Denmark Denmark
Sorting networks are sorting algorithms that execute a sequence of operations independently of the input. Since they can be implemented directly as circuits, sorting networks are easy to implement in hardware – but t... 详细信息
来源: 评论
A Framework for the Systematic Assessment of Anomaly Detectors in Time-Sensitive Automotive Networks  15
A Framework for the Systematic Assessment of Anomaly Detecto...
收藏 引用
15th IEEE Vehicular Networking Conference, VNC 2024
作者: Meyer, Philipp Hackel, Timo Lubeck, Teresa Korf, Franz Schmidt, Thomas C. Hamburg University of Applied Sciences Dept. Computer Science Germany
Connected cars are susceptible to cyberattacks. Security and safety of future vehicles highly depend on a holistic protection of automotive components, of which the time-sensitive backbone network takes a significant ... 详细信息
来源: 评论