咨询与建议

限定检索结果

文献类型

  • 35,957 篇 会议
  • 16,227 篇 期刊文献
  • 567 册 图书

馆藏范围

  • 52,751 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 28,572 篇 工学
    • 16,071 篇 计算机科学与技术...
    • 12,804 篇 软件工程
    • 6,470 篇 信息与通信工程
    • 6,093 篇 控制科学与工程
    • 5,140 篇 电气工程
    • 4,511 篇 电子科学与技术(可...
    • 2,572 篇 生物工程
    • 2,443 篇 机械工程
    • 2,109 篇 生物医学工程(可授...
    • 1,839 篇 动力工程及工程热...
    • 1,836 篇 光学工程
    • 1,701 篇 仪器科学与技术
    • 1,350 篇 化学工程与技术
    • 1,245 篇 材料科学与工程(可...
    • 985 篇 交通运输工程
    • 925 篇 安全科学与工程
  • 16,007 篇 理学
    • 8,114 篇 数学
    • 4,813 篇 物理学
    • 3,024 篇 生物学
    • 2,814 篇 系统科学
    • 2,683 篇 统计学(可授理学、...
    • 1,480 篇 化学
  • 6,192 篇 管理学
    • 4,243 篇 管理科学与工程(可...
    • 2,202 篇 工商管理
    • 2,180 篇 图书情报与档案管...
  • 2,064 篇 医学
    • 1,710 篇 临床医学
    • 1,446 篇 基础医学(可授医学...
    • 859 篇 药学(可授医学、理...
  • 1,136 篇 法学
    • 963 篇 社会学
  • 817 篇 经济学
    • 807 篇 应用经济学
  • 513 篇 教育学
  • 454 篇 农学
  • 168 篇 文学
  • 109 篇 军事学
  • 64 篇 艺术学
  • 9 篇 哲学
  • 4 篇 历史学

主题

  • 1,398 篇 systems engineer...
  • 1,279 篇 control systems
  • 1,126 篇 computer science
  • 1,016 篇 computational mo...
  • 665 篇 application soft...
  • 635 篇 bandwidth
  • 633 篇 laboratories
  • 620 篇 costs
  • 598 篇 computer archite...
  • 568 篇 testing
  • 564 篇 deep learning
  • 552 篇 optimization
  • 549 篇 machine learning
  • 542 篇 accuracy
  • 541 篇 feature extracti...
  • 538 篇 robustness
  • 532 篇 neural networks
  • 520 篇 artificial intel...
  • 513 篇 switches
  • 503 篇 hardware

机构

  • 510 篇 department of sy...
  • 403 篇 department of el...
  • 402 篇 department of sy...
  • 362 篇 department of sy...
  • 166 篇 electrical compu...
  • 118 篇 department of sy...
  • 105 篇 department of el...
  • 94 篇 department of co...
  • 80 篇 computer and sys...
  • 75 篇 ieee
  • 73 篇 center for power...
  • 66 篇 department of el...
  • 62 篇 department of el...
  • 61 篇 department of el...
  • 53 篇 department of sy...
  • 49 篇 department of el...
  • 48 篇 department of co...
  • 46 篇 computer and sys...
  • 46 篇 department of el...
  • 45 篇 department of la...

作者

  • 142 篇 halim yanikomero...
  • 104 篇 yanikomeroglu ha...
  • 96 篇 niyato dusit
  • 55 篇 bernhard schölko...
  • 52 篇 hisao ishibuchi
  • 50 篇 d.g. holmes
  • 42 篇 f. richard yu
  • 40 篇 paolo mattavelli
  • 40 篇 gabriel wainer
  • 40 篇 m. zahn
  • 37 篇 sofotasios pasch...
  • 32 篇 kurt gunes karab...
  • 32 篇 pedrycz witold
  • 31 篇 venayagamoorthy ...
  • 30 篇 sreeraman rajan
  • 30 篇 jiang liu
  • 28 篇 hong choong seon
  • 28 篇 john s. baras
  • 27 篇 a.u.h. sheikh
  • 26 篇 el-sayed m.el-ke...

语言

  • 46,698 篇 英文
  • 5,400 篇 其他
  • 638 篇 中文
  • 39 篇 日文
  • 13 篇 德文
  • 8 篇 法文
  • 5 篇 葡萄牙文
  • 5 篇 俄文
  • 5 篇 斯洛文尼亚文
  • 3 篇 阿拉伯文
  • 3 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 芬兰文
  • 1 篇 荷兰文
  • 1 篇 土耳其文
检索条件"机构=Computer and Systems Engineering Department"
52751 条 记 录,以下是141-150 订阅
排序:
DRL-based Trajectory Planning and Sensor Task Scheduling for Edge Robotics  10
DRL-based Trajectory Planning and Sensor Task Scheduling for...
收藏 引用
10th IEEE World Forum on Internet of Things, WF-IoT 2024
作者: Bouhoula, Sirine Avgeris, Marios Leivadeas, Aris Lambadaris, Ioannis Department of Software and IT Engineering Montréal Canada Carleton University Department of Systems and Computer Engineering Ottawa Canada
Mobile Edge Computing (MEC) and Edge Robotics have recently emerged as transformative technologies, revolutionizing industries by enabling real-time processing, decision-making, and automation at the network edge. How... 详细信息
来源: 评论
Performance Evaluation Framework for Insider Threat Detection Using Machine Learning  2
Performance Evaluation Framework for Insider Threat Detectio...
收藏 引用
2nd International Conference of Intelligent Methods, systems and Applications, IMSA 2024
作者: Abdallah, Habiba Emad-Eldin Abd-Elkader, Habiba Hamed Mohamed, Kholoud Khaled Abd-Elmoniem, Mohamed El-Assal, Nizar Walid Mohamed, Salma Mohsen Said, Samar A. Salem, Sameh A. Helwan University Faculty of Engineering Egypt Helwan University Department of Computer and Systems Engineering Egypt
Nowadays, malicious behavior identification is considered a significant and challenging issue in cybersecurity. To mitigate this problem, an effective detection system can be a promising candidate to facilitate precis... 详细信息
来源: 评论
Narrator identification by querying Sanad graph and utilizing the NarratorsKG on AR-Sanad 280K-v2 dataset
收藏 引用
Neural Computing and Applications 2024年 第36期36卷 23169-23180页
作者: Mahmoud, Somaia Nabil, Emad Saif, Omar Torki, Marwan Department of Computer and Systems Engineering Alexandria University Alexandria Egypt Faculty of Computer and Information Systems Islamic University of Madinah Madinah42351 Saudi Arabia Faculty of Hadith and Islamic Studies Islamic University of Madinah Madinah Saudi Arabia
Narrator disambiguation is a field within hadith science that studies unidentified narrators in hadith narration chains, also known as sanads. Sanads can be represented as graphs, with the nodes representing the narra... 详细信息
来源: 评论
CAFFI: A Cybersecurity Assessment Framework for Fault Injection Threats in Smart IoT Devices  6
CAFFI: A Cybersecurity Assessment Framework for Fault Inject...
收藏 引用
6th IEEE Novel Intelligent and Leading Emerging Sciences Conference, NILES 2024
作者: Sadek, Mina G. Salem, Sameh A. Helwan University Faculty of Engineering Department of Computer and Systems Engineering Cairo Egypt Ntra Egypt
The rapid increase in employing smart Internet of Things (IoT) systems in different domains, including critical national infrastructure and vital services has raised the need for robust security measures, especially a... 详细信息
来源: 评论
Efficient Cache Performance Equivalent 2D-Texel to Memory Mapping Identification for Embedded GPUs
收藏 引用
IEEE Access 2025年 13卷 95094-95121页
作者: El-Mahdy, Ahmed Elteir, Marwa K. Shata, Kholoud Giza Egypt Egypt–Japan University of Science and Technology Department of Computer Science and Engineering New Borg El-Arab City21934 Egypt Alexandria University Department of Computer and Systems Engineering Alexandria21544 Egypt New Borg El-Arab City Egypt
With the increasing trend of utilizing smart devices, exploiting embedded GPUs becomes plausible to provide for intense computations that approach workstation performance, opening the way for complex, server-grade app... 详细信息
来源: 评论
Deepfake Detection: Emerging Techniques and Evolving Challenges  12
Deepfake Detection: Emerging Techniques and Evolving Challen...
收藏 引用
12th International Conference on Internet of Everything, Microwave, Embedded, Communication and Networks, IEMECON 2024
作者: Natarajan, Krishnaraj Mathur, Abeer Bhargava, Kshitiz Singh, Manvendra Tejpal, Moulik Department of Database Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India Department of Software Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India
Several newly developed techniques and tools for manipulating images, audio, and videos have been introduced as an outcome of the recent and rapid breakthroughs in AI, machine learning, and deep learning. While most a... 详细信息
来源: 评论
Deepfake Video Detection Using Inception_Resnet_V2: A Convolutional Neural Network Approach  16
Deepfake Video Detection Using Inception_Resnet_V2: A Convol...
收藏 引用
16th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2024
作者: Praveen Kumar, Mandala Kumari, V Valli Lakshmi Durga, K Swathi Andhra University College of Engineering Department of Computer Science and Systems Engineering Visakhapatnam530003 India
Deepfake videos, generated by sophisticated AI algorithms, pose significant challenges to the authenticity and trustworthiness of multimedia content on the internet. In this study, we propose a deepfake video detectio... 详细信息
来源: 评论
A Comparative Study on Deep Learning based Segmentation Techniques for Tamil Inscriptions  8
A Comparative Study on Deep Learning based Segmentation Tech...
收藏 引用
8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2024
作者: Poornimathi, K. Muralibhaskaran, V. Priya, L. Rajalakshmi Engineering College Department of Computer Science and Business Systems India Rajalakshmi Engineering College Department of Computer Science and Engineering India Rajalakshmi Engineering College Department of Information Technology India
The digitization and preservation of Tamil inscriptions are crucial for safeguarding the rich cultural heritage they represent. This study presents an in-depth evaluation of deep learning-based segmentation methods sp... 详细信息
来源: 评论
Introduction
Advances in Industrial Control
收藏 引用
Advances in Industrial Control 2023年 1-18页
作者: Shi, Yang Shen, Chao Wei, Henglai Zhang, Kunwu Department of Mechanical Engineering University of Victoria VictoriaBC Canada Department of Systems and Computer Engineering Carleton University OttawaON Canada
This chapter provides the introductory knowledge about autonomous marine vehicle (AMV) systems. Literature reviews on the motion control of AMVs and model predictive control (MPC) are provided, and the motivation...
来源: 评论
Countering Deepfakes using an Improved Advanced CNN and its Ensemble with Pretrained Models  3
Countering Deepfakes using an Improved Advanced CNN and its ...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Mathur, Abeer Tejpal, Moulik Bhargava, Kshitiz Natarajan, Krishnaraj Singh, Manvendra Vellore Institute of Technology School of Computer Science & Engineering Department of Software Systems Vellore India Vellore Institute of Technology School of Computer Science & Engineering Department of Database Systems Vellore India
The extensive spread of DeepFake images on the internet has emerged as a significant challenge, with applications ranging from harmless entertainment to harmful acts like blackmail, misinformation, and spreading false... 详细信息
来源: 评论