咨询与建议

限定检索结果

文献类型

  • 3,515 篇 会议
  • 2,139 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,691 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,366 篇 工学
    • 2,042 篇 计算机科学与技术...
    • 1,641 篇 软件工程
    • 668 篇 信息与通信工程
    • 631 篇 控制科学与工程
    • 473 篇 电气工程
    • 429 篇 电子科学与技术(可...
    • 367 篇 生物工程
    • 304 篇 机械工程
    • 300 篇 生物医学工程(可授...
    • 251 篇 光学工程
    • 228 篇 仪器科学与技术
    • 208 篇 动力工程及工程热...
    • 185 篇 化学工程与技术
    • 147 篇 交通运输工程
    • 126 篇 材料科学与工程(可...
    • 108 篇 安全科学与工程
  • 1,839 篇 理学
    • 856 篇 数学
    • 566 篇 物理学
    • 424 篇 生物学
    • 284 篇 统计学(可授理学、...
    • 227 篇 系统科学
    • 182 篇 化学
  • 903 篇 管理学
    • 609 篇 管理科学与工程(可...
    • 322 篇 图书情报与档案管...
    • 277 篇 工商管理
  • 310 篇 医学
    • 263 篇 临床医学
    • 205 篇 基础医学(可授医学...
    • 138 篇 药学(可授医学、理...
  • 138 篇 法学
    • 113 篇 社会学
  • 107 篇 经济学
    • 107 篇 应用经济学
  • 69 篇 农学
  • 51 篇 教育学
  • 17 篇 文学
  • 17 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 206 篇 computer science
  • 114 篇 deep learning
  • 97 篇 feature extracti...
  • 94 篇 computational mo...
  • 92 篇 control systems
  • 91 篇 systems engineer...
  • 88 篇 machine learning
  • 88 篇 accuracy
  • 87 篇 data mining
  • 78 篇 neural networks
  • 76 篇 artificial intel...
  • 70 篇 optimization
  • 70 篇 training
  • 67 篇 laboratories
  • 67 篇 costs
  • 65 篇 hardware
  • 61 篇 humans
  • 57 篇 testing
  • 56 篇 protocols
  • 54 篇 information syst...

机构

  • 72 篇 department of co...
  • 36 篇 national enginee...
  • 29 篇 college of compu...
  • 24 篇 department of co...
  • 24 篇 department of co...
  • 24 篇 department of co...
  • 23 篇 department of co...
  • 22 篇 key laboratory o...
  • 22 篇 department of sy...
  • 22 篇 department of el...
  • 22 篇 university of ch...
  • 22 篇 distributed mult...
  • 20 篇 department of el...
  • 18 篇 school of comput...
  • 18 篇 frontiers scienc...
  • 18 篇 department of co...
  • 17 篇 distributed mult...
  • 17 篇 national enginee...
  • 17 篇 department of el...
  • 16 篇 smart network sy...

作者

  • 25 篇 mei-ling shyu
  • 24 篇 shu-ching chen
  • 24 篇 hai jin
  • 21 篇 chen shu-ching
  • 21 篇 abdelwahed motwa...
  • 21 篇 yang yang
  • 20 篇 dutta paramartha
  • 17 篇 wang xingjun
  • 16 篇 han zhu
  • 15 篇 shyu mei-ling
  • 15 篇 paramartha dutta
  • 13 篇 mohamed k.nour
  • 13 篇 tei-wei kuo
  • 13 篇 yunhao liu
  • 13 篇 bowers john e.
  • 13 篇 ai bo
  • 12 篇 kazuyuki kobayas...
  • 12 篇 hayashi eiji
  • 12 篇 liu qi
  • 12 篇 huo yuankai

语言

  • 5,406 篇 英文
  • 164 篇 其他
  • 111 篇 中文
  • 14 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=Computer Science and System Engineering Department"
5691 条 记 录,以下是241-250 订阅
排序:
Towards Classifying File Segments in Memory Using Machine-Learning  9
Towards Classifying File Segments in Memory Using Machine-Le...
收藏 引用
9th International Conference on Information Technology Trends, ITT 2023
作者: Al-Saleh, Mohammed I. Alkouz, Akram Alarabeyyat, Abdulsalam Bouchahma, Majed Jordan University of Science and Technology Computer Science Department Jordan Higher Colleges of Technology Computer Information System United Arab Emirates Al-Balqa Applied University Software Engineering Department Jordan-Salt Jordan
Digital media triage is a main challenge that faces a digital investigator. Knowing what might be useful during crime investigation could greatly save the investigator's time and enhance outcomes. Memory investiga... 详细信息
来源: 评论
Harnessing CNNs for Accurate Skin Disease Identification  3
Harnessing CNNs for Accurate Skin Disease Identification
收藏 引用
3rd International Conference on Technological Advancements in Computational sciences, ICTACS 2023
作者: Dhoundiyal, Parveen Sharma, Vikrant Vats, Satvik Singh, Karan Graphic Era Hill University Department of Computer Science & Engineering Uttarakhand Dehradun India School of Computer and System Sciences Jnu New Delhi New Delhi India
Skin disorders are common and can be brought on by several things, including viruses, bacteria, allergies, or fungi. The speed and precision of detecting skin diseases have increased because of developments in laser a...
来源: 评论
Modified Aquila Optimizer Feature Selection Approach and Support Vector Machine Classifier for Intrusion Detection system
收藏 引用
Multimedia Tools and Applications 2024年 第21期83卷 59887-59913页
作者: Abualigah, Laith Ahmed, Saba Hussein Almomani, Mohammad H. Zitar, Raed Abu Alsoud, Anas Ratib Abuhaija, Belal Hanandeh, Essam Said Jia, Heming Elminaam, Diaa Salama Abd Elaziz, Mohamed Abd Computer Science Department Al Al-Bayt University Mafraq25113 Jordan Department of Electrical and Computer Engineering Lebanese American University Byblos13-5053 Lebanon Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman19328 Jordan MEU Research Unit Middle East University Amman11831 Jordan Applied Science Research Center Applied Science Private University Amman11931 Jordan School of Computer Sciences Universiti Sains Malaysia Pulau Pinang11800 Malaysia School of Engineering and Technology Sunway University Malaysia Petaling Jaya27500 Malaysia Department of Mathematics Facility of Science The Hashemite University P.O box 330127 Zarqa13133 Jordan Sorbonne Center of Artificial Intelligence Sorbonne University-Abu Dhabi Abu Dhabi United Arab Emirates Department of Computer Science Wenzhou-Kean University Wenzhou China Department of Computer Information System Zarqa University P.O. Box 13132 Zarqa Jordan School of Information Engineering Sanming University Sanming365004 China Information Systems Department Faculty of Computers and Artificial Intelligence Benha University Benha12311 Egypt Computer Science Department Faculty of Computer Science Misr International University Cairo12585 Egypt Faculty of Computer Science & Engineering Galala University Suze435611 Egypt Ajman University Ajman346 United Arab Emirates Department of Mathematics Faculty of Science Zagazig University Zagazig44519 Egypt
With the ever-expanding ubiquity of the Internet, wireless networks have permeated every facet of modern life, escalating concerns surrounding network security for users. Consequently, the demand for a robust Intrusio... 详细信息
来源: 评论
K-Banhatti Sombor Invariants of Certain computer Networks
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 15-31页
作者: Khalid Hamid Muhammad Waseem Iqbal Abaid Ur Rehman Virk Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Mathematics University of SialkotSialkot51013Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Any number that can be uniquely determined by a graph is called a graph *** the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation ***,no reliable examinati... 详细信息
来源: 评论
Deep Learning Enabled Object Detection and Tracking Model for Big Data Environment
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 2541-2554页
作者: K.Vijaya Kumar E.Laxmi Lydia Ashit Kumar Dutta Velmurugan Subbiah Parvathy Gobi Ramasamy Irina V.Pustokhina Denis A.Pustokhin Department of Computer Science and Engineering Vignan’s Institute of Engineering for WomenVisakhapatnam530049India Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Computer Science and Information System College of Applied SciencesAlMaarefa UniversityRiyadh11597Kingdom of Saudi Arabia Department of Electronics and Communication Engineering Kalasalingam Academy of Research and EducationKrishnankoil626126TamilnaduIndia Department of Computer Science Christ UniversityBangalore560029India Department of Entrepreneurship and Logistics Plekhanov Russian University of Economics117997MoscowRussia Department of Logistics State University of ManagementMoscow109542Russia
Recently,big data becomes evitable due to massive increase in the generation of data in real time ***,object detection and tracking applications becomes popular among research communities and finds useful in different... 详细信息
来源: 评论
Authenticating Smartphone Users Continuously Even if the Smartphone is in the User’s Pocket  1
收藏 引用
1st International Conference on Advanced Computing, Machine Learning, Robotics and Internet Technologies, AMRIT 2023
作者: Dutta, Sandip Roy, Soumen Roy, Utpal Department of Computer and System Sciences Visva-Bharati West Bengal Santiniketan731235 India Department of Computer Science and Engineering University of Calcutta Acharya Prafulla Chandra Roy Siksha Prangan JD - 2 Sector - III Saltlake City West Bengal Kolkata7000106 India Department of Computer and System Sciences Visva-Bharati West Bengal Santiniketan731235 India
Users often underestimate the power and utility of smartphones, as they are unaware of the wide range of intelligent sensors that are now built-in into them. Smartphones are equipped with a wide array of sensors, incl... 详细信息
来源: 评论
Leveraging Adaptive Algorithms for Real-Time Data Analysis  15
Leveraging Adaptive Algorithms for Real-Time Data Analysis
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Sahoo, Girija Shankar Hannah Jessie Rani, R. Goyal, Manish Kumar Mohammed, Vazeer Ali Jana, D Little Femilin Wasatkar, Namrata N. Maharishi University of Information Technology Maharishi School of Engineering and Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Electrical and Electronics Engineering Karnataka Bangalore India Vivekananda Global University Department of Computer Science & Application Jaipur India Lewis University Illinois Department of Computer & Information System United States Prince Shri Venkateshwara Padmavathy Engineering College Department of Science and Humanities Chennai127 India Vishwakarma Institute of Information Technology Department of Computer Engineering Pune India
This paper proposes the use of adaptive algorithms for real-time data analysis. Adaptive algorithms are a set of practical methods used for acting information-driven optimization and studying. They have a wide variety... 详细信息
来源: 评论
Warped-Compaction: Maximizing GPU Register File Bandwidth Utilization via Operand Compaction  31
Warped-Compaction: Maximizing GPU Register File Bandwidth Ut...
收藏 引用
31st IEEE International Symposium on High Performance computer Architecture, HPCA 2025
作者: Jeong, Eunbi Jeong, Ipoom Yoon, Myung Kuk Kim, Nam Sung Ewha Womans University Department of Computer Science and Engineering Seoul Korea Republic of Yonsei University Department of System Semiconductor Engineering Seoul Korea Republic of Yonsei University Department of Electrical and Electronic Engineering Seoul Korea Republic of University of Illinois Urbana-Champaign Urbana United States
The GPU has been successfully used for diverse emerging compute-intensive applications, including imaging, computer vision, and more recently, deep learning, to name a few. To offer high performance for such applicati... 详细信息
来源: 评论
Peak-Average-Power Ratio Techniques for 5G Waveforms Using D-SLM and D-PTS
收藏 引用
computer systems science & engineering 2023年 第5期45卷 1199-1210页
作者: Himanshu Sharma karthikeyan Rajagopal G.Gugapriya Rajneesh Pareek Arun Kumar HayaMesfer Alshahrani Mohamed K.Nour Hany Mahgoub Mohamed Mousa Anwer Mustafa Hilal Department of Computer Science&Engineering JECRC UniversityJaipurIndia Centre for Nonlinear Systems Chennai Institute of TechnologyChennaiIndia School of Electronics Engineering Vellore Institute of TechnologyChennaiIndia Department of Electronics and Communication Engineering JECRC UniversityJaipurIndia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Electrical Engineering Department Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Multicarrier Waveform(MCW)has several advantages and plays a very important role in cellular *** generation(5G)MCW such as Non-Orthogonal Multiple Access(NOMA)and Filter Bank Multicarrier(FBMC)are thought to be import... 详细信息
来源: 评论
Video key concept extraction using Convolution Neural Network  3
Video key concept extraction using Convolution Neural Networ...
收藏 引用
3rd IEEE International Conference on AI in Cybersecurity, ICAIC 2024
作者: Sardar, Tanvir H Amin Hazarika, Ruhul Pandey, Bishwajeet Guru Prasad, M.S. Mahmudul Hassan, Sk Dodmane, Radhakrishna Gohel, Hardik Dept. of Computer Science & Engg Bengaluru India Manipal Institute of Technology Department of Information Technology Bengaluru India Astana It University Department of Intelligent System and Cyber Security Kazakhstan Dept. of Computer Science & Engg. Dehradun India VIT-AP School of Computer Science and Engineering India Nmam Institute of Technology Department of Computer Science & Engg. Nitte India University of Houston Department of Cse Victoria United States
Objectives: This work aims to develop an automated video summarising methodology and timestamping that uses natural language processing (NLP) tools to extract significant video ***: The methodology comprises extractin... 详细信息
来源: 评论