咨询与建议

限定检索结果

文献类型

  • 12,975 篇 会议
  • 6,882 篇 期刊文献
  • 348 册 图书

馆藏范围

  • 20,205 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,540 篇 工学
    • 8,058 篇 计算机科学与技术...
    • 6,615 篇 软件工程
    • 2,715 篇 信息与通信工程
    • 1,652 篇 控制科学与工程
    • 1,534 篇 生物工程
    • 1,479 篇 生物医学工程(可授...
    • 1,250 篇 电气工程
    • 1,128 篇 电子科学与技术(可...
    • 972 篇 光学工程
    • 766 篇 机械工程
    • 628 篇 仪器科学与技术
    • 516 篇 化学工程与技术
    • 470 篇 动力工程及工程热...
    • 398 篇 安全科学与工程
    • 370 篇 交通运输工程
    • 351 篇 建筑学
  • 7,051 篇 理学
    • 3,393 篇 数学
    • 2,351 篇 物理学
    • 1,742 篇 生物学
    • 1,111 篇 统计学(可授理学、...
    • 794 篇 系统科学
    • 556 篇 化学
  • 3,139 篇 管理学
    • 1,792 篇 管理科学与工程(可...
    • 1,496 篇 图书情报与档案管...
    • 969 篇 工商管理
  • 1,405 篇 医学
    • 1,210 篇 临床医学
    • 1,101 篇 基础医学(可授医学...
    • 717 篇 药学(可授医学、理...
    • 506 篇 公共卫生与预防医...
  • 534 篇 法学
    • 446 篇 社会学
  • 320 篇 经济学
  • 282 篇 教育学
  • 261 篇 农学
  • 62 篇 文学
  • 30 篇 军事学
  • 28 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 589 篇 informatics
  • 297 篇 computational mo...
  • 272 篇 computer archite...
  • 265 篇 deep learning
  • 253 篇 computer science
  • 228 篇 machine learning
  • 218 篇 data mining
  • 202 篇 training
  • 201 篇 image segmentati...
  • 193 篇 internet of thin...
  • 193 篇 feature extracti...
  • 182 篇 optimization
  • 181 篇 support vector m...
  • 180 篇 artificial intel...
  • 169 篇 accuracy
  • 158 篇 neural networks
  • 156 篇 quality of servi...
  • 151 篇 bandwidth
  • 149 篇 monitoring
  • 136 篇 resource managem...

机构

  • 411 篇 department for p...
  • 407 篇 faculty of scien...
  • 397 篇 department of ph...
  • 387 篇 department of ph...
  • 387 篇 kirchhoff-instit...
  • 382 篇 department of ph...
  • 346 篇 fakultät für phy...
  • 323 篇 institute of phy...
  • 304 篇 institute of phy...
  • 302 篇 department of ph...
  • 282 篇 department of ph...
  • 270 篇 instituto de fís...
  • 268 篇 department of ph...
  • 267 篇 universidade fed...
  • 263 篇 graduate school ...
  • 261 篇 ictp trieste
  • 255 篇 yerevan physics ...
  • 251 篇 department of ph...
  • 248 篇 nikhef national ...
  • 244 篇 graduate school ...

作者

  • 337 篇 c. alexa
  • 335 篇 j. m. izen
  • 332 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 330 篇 j. strandberg
  • 327 篇 g. spigo
  • 325 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 319 篇 g. gaudio
  • 319 篇 s. mohapatra
  • 303 篇 s. guindon
  • 300 篇 y. tayalati
  • 291 篇 a. kaczmarska
  • 285 篇 m. klein
  • 269 篇 j. schaarschmidt
  • 260 篇 f. pastore
  • 254 篇 a. d. pilkington

语言

  • 19,553 篇 英文
  • 502 篇 其他
  • 134 篇 中文
  • 18 篇 日文
  • 2 篇 土耳其文
  • 1 篇 爱沙尼亚文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Engineering and Informatics"
20205 条 记 录,以下是311-320 订阅
排序:
Evolutionary privacy-preserving learning strategies for edge-based IoT data sharing schemes
收藏 引用
Digital Communications and Networks 2023年 第4期9卷 906-919页
作者: Yizhou Shen Shigen Shen Qi Li Haiping Zhou Zongda Wu Youyang Qu Department of Computer Science and Engineering Shaoxing UniversityShaoxing312000China School of Computer Science and Informatics Cardiff UniversityCardiffCF243AAUnited Kingdom School of Information Engineering Huzhou UniversityHuzhou 313000ZhejiangChina School of Information Technology Deakin UniversityBurwoodVIC3125Australia
The fast proliferation of edge devices for the Internet of Things(IoT)has led to massive volumes of data *** generated data is collected and shared using edge-based IoT structures at a considerably high ***,the data-s... 详细信息
来源: 评论
Leveraging Outage probability in system limited by BX fading and Co-channel interference for ChatGPT-enabled QoS adaptation  31
Leveraging Outage probability in system limited by BX fading...
收藏 引用
31st Telecommunications Forum, TELFOR 2023
作者: Vujović, Vuk Milić, Dejan Petrović, Nenad Marković, Filip Suljović, Suad Stefanović, Radiša MB University Belgrade Computer Science and Informatics Information Technology Belgrade Serbia University of Niš Telecommunications Faculty of Electronic Engineering Niš Serbia University of Niš Computer Science and Informatics Faculty of Electronic Engineering Niš Serbia University of Priština Computer Science and Informatics Faculty of Technical Sciences Kosovska Mitrovica Serbia Computer Science and Informatics the Academy of Applied Technical Studies Belgrade Belgrade Serbia
In this paper, we performed an analysis of the outage probability (Pout) at the output of the receiver with selection combination (SC) with L branches of the wireless communication system in the presence of Beaulieu-X... 详细信息
来源: 评论
Multi-Robot Navigation Uses the Greedy Heuristic Algorithm Based on the ACO Algorithm
Multi-Robot Navigation Uses the Greedy Heuristic Algorithm B...
收藏 引用
2024 International Conference on computer engineering, Network and Intelligent Multimedia, CENIM 2024
作者: Zaini, Ahmad Muhtadin Rioza, Hansen Ade Institut Teknologi Sepuluh Nopember Faculty of Intelligent Electrical and Informatics Technology Department of Computer Engineering Surabaya60111 Indonesia
Robot swarm navigation faces challenges in coordi-nation in dynamic environments with limited information, since each robot only has local access, making optimal paths difficult to achieve. Increasing the number of ro... 详细信息
来源: 评论
ENERGY AND COST BENEFITS OF ADVANCED LIGHTING TECHNOLOGY APPLICATIONS IN TRAFFIC LIGHT SYSTEMS  14
ENERGY AND COST BENEFITS OF ADVANCED LIGHTING TECHNOLOGY APP...
收藏 引用
14th Mediterranean Conference on Power Generation Transmission, Distribution and Energy Conversion, MEDPOWER 2024
作者: Polycarpou, Alexis Georgiou, Marios S. Department of Electrical Computer Engineering and Informatics Frederick University Nicosia Cyprus Electromechanical Section Nicosia Municipality Nicosia Cyprus
Following a pilot project, which concluded in 2016, the replacement of old energy consuming Traffic Light Systems (TLS) of Nicosia Municipality were the subject of an investigation with regards to the energy saving po... 详细信息
来源: 评论
Design and Implementation the Prayer Reminder Application using KISS Principle based on User Centered Design  7
Design and Implementation the Prayer Reminder Application us...
收藏 引用
7th Information Systems International Conference, ISICO 2023
作者: Yunanto, Andhik Ampuh Putri, Febi Fidhiyanti Permatasari, Desy Intan Nailussa'ada Hardiansyah, Fadilah Fahrul Sa'adah, Umi Aziz, Adam Shidqul Department of Informatics and Computer Engineering Politeknik Elektronika Negeri Surabaya Keputih Sukolilo Surabaya East Java60111 Indonesia
The five daily prayers are an obligation of worship for Muslims in the world. Prayers have a predetermined time schedule according to the teachings of the Prophet Muhammad SAW and have different schedules according to... 详细信息
来源: 评论
Indonesian Hate Speech and Abusive Tweets Classification with Deep Learning Pre-trained Language Models  6
Indonesian Hate Speech and Abusive Tweets Classification wit...
收藏 引用
6th International Conference on computer and informatics engineering, IC2IE 2023
作者: Yulianto Darmawan, Bagus Tri Irnawan, Bassamtiano Renaufalgi Suzuki, Yoshimi Politeknik Negeri Jakarta Dept. of Computer and Informatics Engineering Depok Indonesia University of Yamanashi Dept. of Computer Science and Engineering Kofu Japan
Hate speech and abusive language on social media can spread massively and escalate into conflict between two or more individuals or parties. Previous studies about multi-label classification to identify whether the tw... 详细信息
来源: 评论
BEDiff: denoising diffusion probabilistic models for building extraction
收藏 引用
Optoelectronics Letters 2025年 第5期21卷 298-305页
作者: LEI Yanjing WANG Yuan CHAN Sixian HU Jie ZHOU Xiaolong ZHANG Hongkai College of Computer Science and Technology Zhejiang University of Technology Hubei Key Laboratory of Intelligent Vision Based Monitoring for Hydroelectric Engineering College of Computer and Information China Three Gorges University Key Laboratory of Intelligent Informatics for Safety & Emergency of Zhejiang Province Wenzhou University College of Electrical and Information Engineering Quzhou University School of Electronic and Information Engineering Anhui Jianzhu University
Accurately identifying building distribution from remote sensing images with complex background information is challenging. The emergence of diffusion models has prompted the innovative idea of employing the reverse d... 详细信息
来源: 评论
Cerebral cortex contributions to Parkinson's disease tremor:what exactly generates the tremor?
收藏 引用
Neural Regeneration Research 2025年 第12期20卷 3535-3536页
作者: Manuel Bange Hao Ding Muthuraman Muthuraman Informatics for Medical Technology Institute of Computer ScienceUniversity AugsburgAugsburgGermany Department of Neurology Neural Engineering with Signal Analytics and Artificial Intelligence(NESA-AI)University Clinic WürzburgWürzburgGermany
Pathological tremor is one of the cardinal symptoms in Parkinson's disease (PD).Tremor is comprised of involuntary,rhythmic,a nd oscillating movements that can vary according to the circumstances under which they ... 详细信息
来源: 评论
Comparative Study of Facial Expression Recognition Using Facial Landmark in e-Learning System  11
Comparative Study of Facial Expression Recognition Using Fac...
收藏 引用
11th International Conference on Electrical engineering, computer Science and informatics, EECSI 2024
作者: Bachtiar, Fitra Abdurrachman Nainggolan, Cesilia Natasya Soetedjo, Riza Setiawan Rokhmawati, Retno Indah Muflikhah, Lailil Brawijaya University Department of Informatics Engineering Faculty of Computer Science Malang Indonesia Brawijaya University Faculty of Computer Science Department of Information Systems Malang Indonesia
The e-Iearning system or distance learning system has become important, especially during the COVID-19 pan-demic. Several tertiary institutions have made the e-Iearning system an alternative teaching and learning acti... 详细信息
来源: 评论
Implementing Lightweight, Dynamic Hierarchical Key Assignment Scheme For Cloud Computing  28
Implementing Lightweight, Dynamic Hierarchical Key Assignmen...
收藏 引用
2024 28th International Conference on Information Technology, IT 2024
作者: Celikbilek, Ibrahim Celiktas, Baris Ozdemir, Enver Informatics Institute Istanbul Technical University Istanbul34467 Turkey Isik University Computer Engineering Istanbul34398 Turkey
In this paper, we propose the implementation and adaptation of a hierarchical key assignment scheme (HKAS) previously developed in our research to improve access control in cloud computing environments. The secret key... 详细信息
来源: 评论