咨询与建议

限定检索结果

文献类型

  • 50,019 篇 会议
  • 20,333 篇 期刊文献
  • 721 册 图书
  • 1 篇 学位论文

馆藏范围

  • 71,074 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 38,870 篇 工学
    • 22,207 篇 计算机科学与技术...
    • 17,889 篇 软件工程
    • 8,655 篇 信息与通信工程
    • 8,027 篇 控制科学与工程
    • 6,656 篇 电气工程
    • 6,049 篇 电子科学与技术(可...
    • 3,362 篇 生物工程
    • 3,289 篇 机械工程
    • 2,716 篇 生物医学工程(可授...
    • 2,589 篇 光学工程
    • 2,379 篇 动力工程及工程热...
    • 2,320 篇 仪器科学与技术
    • 1,794 篇 化学工程与技术
    • 1,571 篇 材料科学与工程(可...
    • 1,349 篇 交通运输工程
    • 1,237 篇 安全科学与工程
  • 21,134 篇 理学
    • 10,780 篇 数学
    • 6,268 篇 物理学
    • 3,891 篇 生物学
    • 3,628 篇 系统科学
    • 3,487 篇 统计学(可授理学、...
    • 1,904 篇 化学
  • 8,635 篇 管理学
    • 5,896 篇 管理科学与工程(可...
    • 3,108 篇 工商管理
    • 3,062 篇 图书情报与档案管...
  • 2,555 篇 医学
    • 2,148 篇 临床医学
    • 1,840 篇 基础医学(可授医学...
    • 1,121 篇 药学(可授医学、理...
  • 1,507 篇 法学
    • 1,287 篇 社会学
  • 1,159 篇 经济学
    • 1,142 篇 应用经济学
  • 720 篇 教育学
  • 591 篇 农学
  • 215 篇 文学
  • 159 篇 军事学
  • 87 篇 艺术学
  • 11 篇 哲学
  • 5 篇 历史学

主题

  • 1,748 篇 systems engineer...
  • 1,482 篇 control systems
  • 1,459 篇 computational mo...
  • 1,434 篇 computer science
  • 928 篇 computer archite...
  • 881 篇 application soft...
  • 875 篇 bandwidth
  • 853 篇 laboratories
  • 834 篇 optimization
  • 821 篇 costs
  • 772 篇 feature extracti...
  • 763 篇 neural networks
  • 741 篇 deep learning
  • 726 篇 machine learning
  • 683 篇 accuracy
  • 665 篇 switches
  • 660 篇 hardware
  • 646 篇 testing
  • 614 篇 robustness
  • 609 篇 educational inst...

机构

  • 508 篇 department of sy...
  • 402 篇 department of sy...
  • 353 篇 department of sy...
  • 337 篇 department of el...
  • 166 篇 electrical compu...
  • 118 篇 department of sy...
  • 114 篇 ieee
  • 107 篇 department of el...
  • 95 篇 department of co...
  • 78 篇 school of comput...
  • 75 篇 state key labora...
  • 74 篇 computer and sys...
  • 73 篇 center for power...
  • 66 篇 systems and comp...
  • 62 篇 department of el...
  • 61 篇 department of el...
  • 60 篇 systems and comp...
  • 52 篇 department of sy...
  • 50 篇 school of comput...
  • 48 篇 department of co...

作者

  • 150 篇 halim yanikomero...
  • 133 篇 niyato dusit
  • 116 篇 yanikomeroglu ha...
  • 53 篇 hisao ishibuchi
  • 51 篇 d.g. holmes
  • 51 篇 bernhard schölko...
  • 51 篇 gabriel wainer
  • 50 篇 f. richard yu
  • 47 篇 paolo mattavelli
  • 47 篇 guo hong
  • 46 篇 sreeraman rajan
  • 36 篇 yangquan chen
  • 36 篇 john s. baras
  • 33 篇 pedrycz witold
  • 32 篇 venayagamoorthy ...
  • 32 篇 xiong zehui
  • 30 篇 xi zhang
  • 29 篇 gwanggil jeon
  • 28 篇 hong choong seon
  • 27 篇 kurt gunes karab...

语言

  • 67,494 篇 英文
  • 2,658 篇 其他
  • 831 篇 中文
  • 72 篇 日文
  • 18 篇 德文
  • 7 篇 朝鲜文
  • 6 篇 葡萄牙文
  • 5 篇 俄文
  • 4 篇 法文
  • 3 篇 西班牙文
  • 3 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 荷兰文
检索条件"机构=Computer Engineering and Systems"
71074 条 记 录,以下是591-600 订阅
排序:
DASA: Delay-Adaptive Multi-Agent Stochastic Approximation  63
DASA: Delay-Adaptive Multi-Agent Stochastic Approximation
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Fabbro, Nicolo Dal Adibi, Arman Poor, H. Vincent Kulkarni, Sanjeev R. Mitra, Aritra Pappas, George J. University of Pennsylvania Electrical and Systems Engineering Department United States Princeton University Department of Electrical and Computer Engineering United States North Carolina State University Electrical and Computer Engineering Department United States
We consider a setting in which N agents aim to speedup a common Stochastic Approximation (SA) problem by acting in parallel and communicating with a central server. We assume that the up-link transmissions to the serv... 详细信息
来源: 评论
Interaction-Aware Trust Management Scheme for IoT systems With Machine-Learning-Based Attack Detection
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17169-17182页
作者: Farhat, Ali Eldosouky, Abdelrahman Ibnkahla, Mohamed Matrawy, Ashraf Carleton University Department of Systems and Computer Engineering OttawaONK1S 5B6 Canada Carleton University School of Information Technology OttawaON Canada
The recent Internet of Things (IoT) adoption has revolutionized various applications while introducing significant security and privacy challenges. Traditional security solutions are unsuitable for IoT systems due to ... 详细信息
来源: 评论
A Deep Learning Approach to Industrial Corrosion Detection
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2587-2605页
作者: Mehwash Farooqui Atta Rahman Latifa Alsuliman Zainab Alsaif Fatimah Albaik Cadi Alshammari Razan Sharaf Sunday Olatunji Sara Waslallah Althubaiti Hina Gull Department of Computer Engineering(CE) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Science(CS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Information Systems(CIS) College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection *** recent studies have... 详细信息
来源: 评论
Level Plane SLAM: Out-of-Plane Motion Compensation in a Globally Stabilized Coordinate Frame for 2D SLAM
Level Plane SLAM: Out-of-Plane Motion Compensation in a Glob...
收藏 引用
2023 IEEE International Conference on systems, Man, and Cybernetics, SMC 2023
作者: Lovett, Samuel Paquette, Tyler Deboon, Brayden Rajan, Sreeraman Rossa, Carlos Carleton University Department of Systems and Computer Engineering OttawaON Canada Hibou Systems Inc. SpringwaterON Canada
Two-dimensional (2D) simultaneous localization and mapping (SLAM) using a LIDAR is a method used to track the position and orientation of a moving platform. 2D-SLAM assumes that the platform translates in a 2D plane a... 详细信息
来源: 评论
N-Body Simulation Inspired by Metaheuristics Optimization
收藏 引用
computer systems Science & engineering 2022年 第6期41卷 1143-1155页
作者: Muhammad Ali Ismail Maria Waqas Farah Sadiq National Center in Big Data and Cloud Computing Department of Computer and Info Systems EngineeringNED University of Engineering and TechnologyKarachiPakistan
The N-body problem in classical physics, is the calculation of force ofgravitational attraction of heavenly bodies towards each other. Solving this problem for many heavenly bodies has always posed a challenge to phy... 详细信息
来源: 评论
CE-EEN-B0:Contour Extraction Based Extended EfficientNet-B0 for Brain Tumor Classification Using MRI Images
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5967-5982页
作者: Abishek Mahesh Deeptimaan Banerjee Ahona Saha Manas Ranjan Prusty A.Balasundaram School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India Centre for Cyber-Physical Systems Vellore Institute of TechnologyChennai600127India
A brain tumor is the uncharacteristic progression of tissues in the *** are very deadly,and if it is not diagnosed at an early stage,it might shorten the affected patient’s life ***,their classification and detection... 详细信息
来源: 评论
GreenSoal:Illegal Tree Logging Detection System Using IOT  9
GreenSoal:Illegal Tree Logging Detection System Using IOT
收藏 引用
9th International Conference on ICT for Smart Society, ICISS 2022
作者: Bandaranayake, H.M.K.S. Mahamohottala, D.M.M.Y.P. Wijekoon, W.M.A.M. Sandakelum, K.M.V.T. Gamage, Narmada Rankothge, Windhya Computer Systems Engineering Faculty of computing
Illegal logging causes widespread deforestation. Global consequences. Controlling when, where, and how illegal actions occur would help protect trees and decrease deforestation. Because people don't know this, ill... 详细信息
来源: 评论
Security Metrics and Authentication-based RouTing (SMART) Protocol for Vehicular IoT Networks
收藏 引用
SN computer Science 2024年 第2期5卷 1-14页
作者: Kumar, Rakesh Singh, Sunil K. Lobiyal, D.K. Kumar, Sudhakar Jawla, Shashi Department of Applied Computational Sciences & Engineering GLBITM Greater Uttar Pradesh Noida India Department of Computer Science & Engineering CCET Panjab University Chandigarh India School of Computer & Systems Sciences Jawaharlal Nehru University New Delhi India Department of Computer Science & Engineering SVIET Mohali India
Routing protocols, responsible for determining optimal paths, fall into two main categories: reactive and proactive protocols. In the realm of reactive routing protocols, exemplified by Ad hoc On-demand Distance Vecto... 详细信息
来源: 评论
Survey of road anomalies detection methods
收藏 引用
International Journal of Intelligent systems Technologies and Applications 2023年 第3期21卷 280-302页
作者: Saffarini, Rasha Khamayseh, Faisal Daraghmi, Yousef-Awwad Elyan, Derar Sabha, Muath Department of Natural Engineering and Technology Sciences Arab American University Jenin Palestine Department of Computer Systems Engineering Palestine Polytechnic University Hebron Palestine Department of Computer Systems Engineering Palestine Technical University Tulkarm Palestine Department of Applied Computing Palestine Technical University Tulkarm Palestine Department of Multimedia Technology Arab American University Jenin Palestine
Automatic road anomaly detection and recognition systems are essential due to their effect on the comfort and safety of drivers and passengers. Drivers should be aware of bad road conditions and the existence of anoma... 详细信息
来源: 评论
Slow Convergence of Interacting Kalman Filters in Word-of-Mouth Social Learning  60
Slow Convergence of Interacting Kalman Filters in Word-of-Mo...
收藏 引用
60th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2024
作者: Krishnamurthy, Vikram Rojas, Cristian R. School of Electrical and Computer Engineering Cornell University United States School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Division of Decision and Control Systems Stockholm Sweden
We consider word-of-mouth social learning involving m Kalman filter agents that operate sequentially. The first Kalman filter receives the raw observations, while each subsequent Kalman filter receives a noisy measure... 详细信息
来源: 评论