咨询与建议

限定检索结果

文献类型

  • 21,411 篇 会议
  • 16,604 篇 期刊文献
  • 414 册 图书

馆藏范围

  • 38,429 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,048 篇 工学
    • 12,853 篇 计算机科学与技术...
    • 10,535 篇 软件工程
    • 4,646 篇 信息与通信工程
    • 3,425 篇 生物医学工程(可授...
    • 3,363 篇 控制科学与工程
    • 3,241 篇 电气工程
    • 3,146 篇 生物工程
    • 2,954 篇 电子科学与技术(可...
    • 2,180 篇 光学工程
    • 2,021 篇 化学工程与技术
    • 1,709 篇 机械工程
    • 1,532 篇 仪器科学与技术
    • 1,403 篇 动力工程及工程热...
    • 1,396 篇 材料科学与工程(可...
    • 818 篇 安全科学与工程
    • 789 篇 网络空间安全
  • 14,618 篇 理学
    • 5,892 篇 物理学
    • 5,786 篇 数学
    • 3,913 篇 生物学
    • 2,182 篇 化学
    • 1,960 篇 统计学(可授理学、...
    • 1,262 篇 系统科学
  • 5,430 篇 管理学
    • 3,424 篇 管理科学与工程(可...
    • 2,097 篇 图书情报与档案管...
    • 1,707 篇 工商管理
  • 3,997 篇 医学
    • 3,215 篇 临床医学
    • 2,634 篇 基础医学(可授医学...
    • 1,697 篇 药学(可授医学、理...
    • 1,254 篇 公共卫生与预防医...
  • 896 篇 法学
    • 765 篇 社会学
  • 740 篇 经济学
  • 709 篇 农学
  • 446 篇 教育学
  • 101 篇 文学
  • 67 篇 军事学
  • 48 篇 艺术学
  • 5 篇 哲学
  • 4 篇 历史学

主题

  • 1,130 篇 accuracy
  • 1,084 篇 deep learning
  • 775 篇 machine learning
  • 659 篇 feature extracti...
  • 613 篇 internet of thin...
  • 579 篇 training
  • 567 篇 computational mo...
  • 529 篇 real-time system...
  • 507 篇 support vector m...
  • 498 篇 artificial intel...
  • 493 篇 computer science
  • 438 篇 predictive model...
  • 406 篇 convolutional ne...
  • 400 篇 optimization
  • 314 篇 data models
  • 298 篇 image segmentati...
  • 289 篇 reliability
  • 269 篇 covid-19
  • 249 篇 scalability
  • 245 篇 security

机构

  • 1,097 篇 cavendish labora...
  • 1,031 篇 department of ph...
  • 987 篇 physikalisches i...
  • 971 篇 oliver lodge lab...
  • 644 篇 infn laboratori ...
  • 622 篇 infn sezione di ...
  • 613 篇 fakultät physik ...
  • 607 篇 infn sezione di ...
  • 598 篇 infn sezione di ...
  • 595 篇 university of ch...
  • 565 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 538 篇 department of ph...
  • 537 篇 school of physic...
  • 526 篇 iccub universita...
  • 524 篇 imperial college...
  • 515 篇 h.h. wills physi...
  • 513 篇 stfc rutherford ...
  • 511 篇 nikhef national ...
  • 503 篇 school of physic...

作者

  • 275 篇 barter w.
  • 258 篇 a. gomes
  • 248 篇 beiter a.
  • 247 篇 c. alexa
  • 245 篇 j. m. izen
  • 241 篇 g. bella
  • 241 篇 j. strandberg
  • 240 篇 bellee v.
  • 239 篇 c. amelung
  • 237 篇 d. calvet
  • 234 篇 blake t.
  • 233 篇 g. spigo
  • 233 篇 brundu d.
  • 231 篇 s. chen
  • 229 篇 bowcock t.j.v.
  • 228 篇 f. siegert
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.

语言

  • 33,067 篇 英文
  • 4,933 篇 其他
  • 309 篇 中文
  • 84 篇 日文
  • 53 篇 德文
  • 51 篇 法文
  • 6 篇 俄文
  • 6 篇 斯洛文尼亚文
  • 5 篇 荷兰文
  • 3 篇 西班牙文
  • 2 篇 波兰文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science And Medical Engineering Faculty of Engineering and Technology"
38429 条 记 录,以下是4371-4380 订阅
排序:
Exploring the Benefits of DNS-Based Authentication for Wireless Network Security  3
Exploring the Benefits of DNS-Based Authentication for Wirel...
收藏 引用
3rd International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Swarup, Lakshya Jayadurga, R. Borade, Monali R. Ramachandran, T. Singh, Akhilendra Pratap Prabha, Savita Chitkara University Institute of Engineering and Technology Chitkara University Centre of Interdisciplinary Research in Business and Technology Punjab India Prince Shri Venkateshwara Padmavathy Engineering College Department of Master of Business Administration Chennai127 India Vishwakarma Institute of Information Technology Department of Artificial Intelligence & Data Science Pune India Faculty of Engineering and Technology Department of Mechanical Engineering Karnataka Bangalore India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Vivekananda Global University Department of Computer Science & Engineering Jaipur India
Wi-wireless networks are becoming more pervasive and are frequently the primary goal of malicious attackers. Therefore, it is miles crucial that wireless networks are nicely secured to defend their users from maliciou... 详细信息
来源: 评论
Color image restoration by filtering methods: a review
收藏 引用
Soft Computing 2024年 第13-14期28卷 7755-7782页
作者: Salamat, Nadeem Missen, Malik Muhammad Saad Akhtar, Nadeem Mustahsan, Muhammad Surya Prasath, V.B. Department of Mathematics Khawaja Fareed University of Engineering and Information Technology Rahim Yar Khan64200 Pakistan Department of Computer Science and IT The Islamia University of Bahawalpur Bahawalpur63100 Pakistan Division of Biomedical Informatics Cincinnati Children’s Hospital Medical Center CincinnatiOH45229 United States Department of Computer Science Pediatrics and Biomedical Informatics University of Cincinnati CincinnatiOH45221 United States
Digital images are corrupted with noise, and image denoising is an important step in image processing modules. In this review, the latest developments in filtering methods for color image restoration are analyzed. The... 详细信息
来源: 评论
A Deep Drive Analysis Framework on Emotions of Users in Attention Driven Systems  8
A Deep Drive Analysis Framework on Emotions of Users in Atte...
收藏 引用
8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2024
作者: Dharshini, S. Akshita, Ravula Panigrahi, Suman Varma, Nadimpalli Sai Kiran Kumar Thangavel, Senthil Somasudaram, K. Abel Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Tamil Nadu Coimbatore India Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Coimbatore India Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Mathematics Tamil Nadu India Cape Peninsula University of Technology Faculty of Informatic and Design Department of Information Technology South Africa
One of the ways humans communicate is by using facial expressions. In psychology, the detection of emotions or facial expressions requires analysis and assessment of decisions in predicting a person's emotions or ... 详细信息
来源: 评论
Analyzing and Developing the Security of DNS-Based Authentication in Wireless Sensor Network  3
Analyzing and Developing the Security of DNS-Based Authentic...
收藏 引用
3rd International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Sharma, Umesh Chand Kumar, Jambi Ratna Raja Kumari, Meenakshi Anandhasilambarasan, D. Latha, B. Jadhav, Prranjali Mangalayatan University Department of Computer Science Aligarh India Genba Sopanrao Moze College of Engineering Balewadi Department of Computer Engineering Maharashtra Pune India Usha Martin University Faculty of Business Mangagement & Commerce Ranchi India Karpagam Academy of Higher Education Department of Computer Science Engineering Coimbatore India Prince Shri Venkateshwara Padmavathy Engineering College Department of Information Technology Chennai India Vishwakarma Institute of Information Technology Department of Artificial Intelligence & Data Science Pune India
Analyzing and developing the safety of DNS-based total Authentication in Wireless Sensor Networks (WSNs) is a critical research vicinity that is being actively pursued. While preceding work has blanketed authenticatio... 详细信息
来源: 评论
Performance Analysis of Three Spectrum Sensing Detection Techniques with Ambient Backscatter Communication in Cognitive Radio Networks
收藏 引用
computer Modeling in engineering & sciences 2023年 第10期137卷 813-825页
作者: Shayla Islam Anil Kumar Budati Mohammad Kamrul Hasan Saoucene Mahfoudh Syed Bilal Hussian Shah Institute of Computer Science&Digital Innovation ICSDIUCSI UniversityKuala Lumpur56000Malaysia Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)Selangor43600Malaysia School of Engineering Computing and InformaticsDar Al-Hekma UniversityJeddah22246Saudi Arabia
In wireless communications, the Ambient Backscatter Communication (AmBC) technique is a promisingapproach, detecting user presence accurately at low power levels. At low power or a low Signal-to-Noise Ratio(SNR), ther... 详细信息
来源: 评论
Arabic Handwritten Document OCR Solution with Binarization and Adaptive Scale Fusion Detection
Arabic Handwritten Document OCR Solution with Binarization a...
收藏 引用
Novel Intelligent and Leading Emerging sciences Conference (NILES)
作者: Alhossien Waly Bassant Tarek Ali Feteha Rewan Yehia Gasser Amr Ahmed Fares Computer Science and Engineering Departement Faculty of Engineering Egypt-Japan University of Science & Technology E-JUST Alexandria Egypt Electrical Engineering Department Faculty of Engineering Benha University Cairo Egypt
The problem of converting images of text into plain text is a widely researched topic in both academia and industry. Arabic handwritten Text Recognation (AHTR) poses additional challenges due to diverse handwriting st... 详细信息
来源: 评论
Estimating finger joint angles by surface EMG signal using feature extraction and transformer-based deep learning model
收藏 引用
Biomedical Signal Processing and Control 2024年 87卷
作者: Putro, Nur Achmad Sulistyo Avian, Cries Prakosa, Setya Widyawan Mahali, Muhammad Izzuddin Leu, Jenq-Shiou Department of Electronic and Computer Engineering National Taiwan University of Science and Technology Taiwan Department of Computer Science and Electronics Faculty of Mathematics and Natural Sciences Universitas Gadjah Mada Indonesia Department of Electronics and Informatics Engineering Faculty of Engineering Universitas Negeri Yogyakarta Indonesia
Human-machine interfaces frequently use electromyography (EMG) signals. Based on previous work, feature extraction has a great deal of influence on the performance of EMG pattern recognition. Furthermore, the Deep Lea... 详细信息
来源: 评论
High Pressure Water Solar Collector as Potential of Mini Steam Power Plant in Iraq  7
High Pressure Water Solar Collector as Potential of Mini Ste...
收藏 引用
7th International Symposium on Innovative Approaches in Smart Technologies, ISAS 2023
作者: Zaynal, Hussein I. Hussain, Abadal-Salam T. Taha, Taha A. Yass, Alaa. A. Ahmed, Saadaldeen Rashid Ahmed, Shouket A. Al-Kitab University Department of Computer Engineering Technology Altun Kupri Iraq Al-Kitab University Technical Engineering College Department of Medical Instrumentation Techniques Engineering Kirkuk Altun Kupri Iraq Technical University Unit of Renewable Energy Northern Kirkuk Iraq Northern Technical University Department of Electrical Engineering Technology Kirkuk Iraq Bayan University Collage of Engineering and Science Department Computer Science Kurdistan region Erbil Iraq
This paper explores the potential of utilizing high-pressure water solar collectors as a crucial component in mini steam power plants. The study focuses on integrating solar thermal energy with steam turbines to enhan... 详细信息
来源: 评论
Breast Cancer Detection Based Microwave Imaging Using Single Antipodal Vivaldi Antenna
Breast Cancer Detection Based Microwave Imaging Using Single...
收藏 引用
2022 Research, Invention, and Innovation Congress: Innovative Electricals and Electronics, RI2C 2022
作者: Tangwachirapan, Shalermchon Sawangsri, Panupong Pinitkiatisakul, Pitchvara Thongdit, Preecha Thaiwirot, Wanwisa Nakhon Pathom Rajabhat University Faculty of Science and Technology Department of Telecommunication Engineering Nakhon Pathom Thailand King Mongkut's University of Technology North Bangkok Faculty of Engineering Department of Electrical and Computer Engineering Bangkok Thailand
This paper presents breast cancer detection based on microwave imaging using single antipodal Vivaldi antenna. The breast cancer detection system mainly consists of antipodal Vivaldi antenna, vector network analyzer, ... 详细信息
来源: 评论
Optimal Machine Learning Enabled Intrusion Detection in Cyber-Physical System Environment
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4691-4707页
作者: Bassam A.Y.Alqaralleh Fahad Aldhaban Esam A.AlQarallehs Ahmad H.Al-Omari MIS Department College of Business AdministrationUniversity of Business and TechnologyJeddah21448Saudi Arabia School of Engineering Princess Sumaya University for TechnologyAmman11941Jordan Faculty of Science Computer Science DepartmentNorthern Border UniversityArar91431Saudi Arabia
Cyber-attacks on cyber-physical systems(CPSs)resulted to sensing and actuation misbehavior,severe damage to physical object,and safety *** learning(ML)models have been presented to hinder cyberattacks on the CPS envir... 详细信息
来源: 评论