咨询与建议

限定检索结果

文献类型

  • 5,551 篇 会议
  • 4,808 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 10,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,080 篇 工学
    • 2,818 篇 计算机科学与技术...
    • 2,217 篇 软件工程
    • 1,371 篇 电子科学与技术(可...
    • 1,170 篇 电气工程
    • 1,117 篇 信息与通信工程
    • 903 篇 光学工程
    • 699 篇 控制科学与工程
    • 690 篇 材料科学与工程(可...
    • 619 篇 化学工程与技术
    • 606 篇 生物医学工程(可授...
    • 579 篇 生物工程
    • 437 篇 仪器科学与技术
    • 393 篇 机械工程
    • 375 篇 动力工程及工程热...
    • 235 篇 冶金工程
    • 193 篇 力学(可授工学、理...
  • 4,351 篇 理学
    • 2,458 篇 物理学
    • 1,391 篇 数学
    • 734 篇 化学
    • 694 篇 生物学
    • 457 篇 统计学(可授理学、...
    • 276 篇 系统科学
  • 1,138 篇 管理学
    • 800 篇 管理科学与工程(可...
    • 349 篇 图书情报与档案管...
    • 318 篇 工商管理
  • 527 篇 医学
    • 443 篇 临床医学
    • 371 篇 基础医学(可授医学...
    • 253 篇 药学(可授医学、理...
    • 147 篇 公共卫生与预防医...
  • 148 篇 法学
  • 131 篇 经济学
  • 109 篇 农学
  • 48 篇 教育学
  • 22 篇 文学
  • 16 篇 军事学
  • 11 篇 艺术学
  • 1 篇 哲学

主题

  • 290 篇 computer science
  • 148 篇 computational mo...
  • 148 篇 feature extracti...
  • 142 篇 deep learning
  • 131 篇 accuracy
  • 117 篇 computer archite...
  • 117 篇 bandwidth
  • 104 篇 machine learning
  • 94 篇 laboratories
  • 92 篇 optimization
  • 90 篇 energy consumpti...
  • 88 篇 wireless communi...
  • 88 篇 cameras
  • 85 篇 internet of thin...
  • 85 篇 wireless sensor ...
  • 83 篇 throughput
  • 82 篇 neural networks
  • 82 篇 costs
  • 79 篇 control systems
  • 78 篇 support vector m...

机构

  • 337 篇 department of ph...
  • 237 篇 faculty of scien...
  • 237 篇 department of el...
  • 235 篇 department for p...
  • 232 篇 west university ...
  • 230 篇 department of ph...
  • 228 篇 department of mo...
  • 221 篇 infn e laborator...
  • 221 篇 department of ph...
  • 220 篇 kirchhoff-instit...
  • 216 篇 department of ph...
  • 202 篇 research center ...
  • 196 篇 fakultät für phy...
  • 195 篇 department physi...
  • 192 篇 cavendish labora...
  • 188 篇 graduate school ...
  • 178 篇 institute of phy...
  • 161 篇 infn sezione di ...
  • 153 篇 institute of phy...
  • 146 篇 oliver lodge lab...

作者

  • 170 篇 c. alexa
  • 170 篇 g. bella
  • 170 篇 d. calvet
  • 170 篇 c. amelung
  • 169 篇 n. orlando
  • 169 篇 y. tayalati
  • 169 篇 g. spigo
  • 169 篇 v. chiarella
  • 169 篇 f. siegert
  • 168 篇 j. m. izen
  • 168 篇 j. strandberg
  • 166 篇 a. dimitrievska
  • 164 篇 f. deliot
  • 161 篇 r. ströhmer
  • 161 篇 m. rijssenbeek
  • 160 篇 s. jin
  • 160 篇 g. gaudio
  • 158 篇 y. tu
  • 158 篇 y. abulaiti
  • 156 篇 w. j. fawcett

语言

  • 9,818 篇 英文
  • 485 篇 其他
  • 121 篇 中文
  • 8 篇 日文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Advanced Computer Science and Engineering"
10431 条 记 录,以下是201-210 订阅
排序:
Machine Learning Based Phishing Website Detection System - Natural Language Processing Approach  2
Machine Learning Based Phishing Website Detection System - N...
收藏 引用
2nd International Conference on Computational Intelligence, Communication Technology and Networking, CICTN 2025
作者: Patni, Jagdish Chandra Naik, S. Vinay Harika, K. Bahadure, Nilesh Bhaskarrao Verma, Kamal Kant Dept. of CSE Alliance School of Advanced Computing Alliance University Bengaluru India Department of Computer Science and Engineering School of Technology GSFC University Gujarat Vadodara India School of Computer Science IILM University Greater Noida India
Natural language processing (NLP) methods can be used to identify phishing websites in addition to static and dynamic features. Phishing sites frequently include certain phrases, misspellings, or misleading text patte... 详细信息
来源: 评论
Fault Secured JPEG-Codec Hardware Accelerator with Piracy Detective Control using Secure Fingerprint Template  36
Fault Secured JPEG-Codec Hardware Accelerator with Piracy De...
收藏 引用
36th IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2023
作者: Chaurasia, Rahul Reddy Asireddy, Abhinav Sengupta, Anirban Indian Institute of Technology Computer Science and Engineering Indore India Indian Institute of Technology Department of Computer Science and Engineering Indore India Indian Statistical Institute Advanced Computing and Microelectronics Unit Kolkata India
This paper presents a novel methodology to design fault secured JPEG-compression-decompression (codec) hardware accelerator with piracy detective control using secure fingerprint template of intellectual property (IP)... 详细信息
来源: 评论
Multidimensional Voronoi Constellations vs. Short Blocklength Probabilistic Shaping: A Comparison for Multilevel Coding Approach
Multidimensional Voronoi Constellations vs. Short Blocklengt...
收藏 引用
2024 Asia Communications and Photonics Conference, ACP 2024 and International Conference on Information Photonics and Optical Communications, IPOC 2024
作者: Sheng, Yajie Chen, Bin Lei, Yi Deng, Jingxin Xu, Jiwei Fu, Mengfan Zhuge, Qunbi Li, Shen Department of Computer Science and Information Engineering Hefei University of Technology Hefei China State Key Laboratory of Advanced Optical Communication Systems and Networks Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China Department of Electrical and Computer Engineering Université Laval Québec Canada
Performance of concatenated multilevel coding with probabilistic shaping (PS) and Voronoi constellations (VCs) is analysed over AWGN channel. Numerical results show that VCs provide up to 1.3 dB SNR gains over PS-QAM ... 详细信息
来源: 评论
advanced Medical Question and Answering Chatbot Powered by Llama-2 For Precis Health Answer  2
Advanced Medical Question and Answering Chatbot Powered by L...
收藏 引用
2nd International Conference on Computational Intelligence, Communication Technology and Networking, CICTN 2025
作者: Patni, Jagdish Chandra Anup, S.B. Swetha Chitra, K.S. Poornima, B.M. Raviprakash, B.P. Kant Verma, Kamal Dept. of CSE Alliance School of Advanced Computing Alliance University Bengaluru India Department of Computer Science and Engineering School of Technology GSFC University Gujarat Vadodara India School of Computer Science IILM University Greater Noida India
LLaMA-2 model, which is known for having the best capabilities in natural language processing at the core of our system. With respect to symptom diagnosis, it ranked among the most accurate in being able to give the c... 详细信息
来源: 评论
Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1871-1886页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala NerusMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyahKuwait Department of Computer Science Sharif College of Engineering&TechnologyLahore54000Pakistan
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,includi... 详细信息
来源: 评论
Guided Exploration Reinforcement Learning for UAV Pursuit-Evasion Games  11th
Guided Exploration Reinforcement Learning for UAV Pursuit-E...
收藏 引用
11th International Conference on Robot Intelligence Technology and Applications, RiTA 2023
作者: Kim, Dohyun Lee, Seungho Lee, Jayden Dongwoo Lee, Hohyeong Bang, Hyochoong Department of Electrical and Computer Engineering Seoul National University Seoul Korea Republic of Department of Mechanical Engineering Seoul National University Seoul Korea Republic of Department of Aerospace Engineering Korea Advanced Institute of Science and Technology Daejeon Korea Republic of
This paper proposes a novel pursuit strategy for a quadrotor-type UAV pursuit evasion game. The novel guidance law considering 3-dimensional and quadrotor UAV maneuvers is proposed as a baseline and expert knowledge f... 详细信息
来源: 评论
Schottky barrier modulation of bottom contact SnO_(2) thin-film transistors via chloride-based combustion synthesis
收藏 引用
Journal of Materials science & Technology 2023年 第17期148卷 199-208页
作者: Bongho Jang Junhee Lee Hongki Kang Jaewon Jang Hyuk-Jun Kwon Department of Electrical Engineering and Computer Science DGISTDaegu 42988South Korea School of Electronic and Electrical Engineering Kyungpook National UniversityDaegu 41566South Korea School of Electronics Engineering Kyungpook National UniversityDaegu 41566South Korea Convergence Research Advanced Centre for Olfaction DGISTDaegu 42988South Korea
The enhanced carrier flow at the interface between Au and SnO_(2)semiconductors,which initially form Schottky contacts,is realized using chloride-based combustion ***-based combustion sys-tems can achieve chlorine(Cl)... 详细信息
来源: 评论
SDN-Enabled Digital Twins: A Framework for Wireless SDN Simulation and Optimization  22
SDN-Enabled Digital Twins: A Framework for Wireless SDN Simu...
收藏 引用
22nd IEEE Consumer Communications and Networking Conference, CCNC 2025
作者: Trotta, Angelo Miccichè, Mario Heideker, Alexandre Di Felice, Marco University of Bologna Department of Computer Science and Engineering Italy Advanced Research Center on Electronic Systems 'Ercole De Castro' University of Bologna Italy
The dynamic nature of modern wireless networks, combined with the need for efficient management, has heightened interest in Software-Defined Networking (SDN). This paper presents a simulation framework designed to eff... 详细信息
来源: 评论
Effective Hazard Categorization of Near-Earth Objects with Random Forest Techniques
收藏 引用
Procedia computer science 2025年 259卷 1682-1692页
作者: Rekha R Nair Tina Babu Department of Computer Science and Engineering Alliance School of Advanced Computing Alliance University Bengaluru India
Near-Earth Objects (NEOs) have long been a subject of interest for astronomers and planetary defense experts due to their potential impact risk. Hence, Random Forest techniques were utilized to classify NEOs as hazard... 详细信息
来源: 评论
Catalyzing EEG signal analysis: unveiling the potential of machine learning-enabled smart K nearest neighbor outlier detection
收藏 引用
International Journal of Information Technology (Singapore) 2024年 1-12页
作者: Aymen, Abid Khediri, Salim El Thaljaoui, Adel Miladi, Moahmed Kachouri, Abdennaceur Computer & amp Embedded Systems Lab National Engineering School of Sfax University of Sfax Sfax Tunisia Department of Information Technology College of Computer Qassim University Buraydah Saudi Arabia Department of Computer Science Faculty of Science of Gafsa University of Gafsa Gafsa Tunisia Preparatory Institute for Engineering Studies of Gafsa Gafsa Tunisia Department of Computer Science and Information College of Science at Zulfi Majmaah University Al-Majmaah 11952 Saudi Arabia Higher Institute of Computer Science and Multimedia of Sfax University of Sfax Sfax Tunisia Advanced Fluid Dynamics Energetics and Environment Lab National Engineering School of Sfax University of Sfax Sfax Tunisia
Electroencephalogram (EEG) data are susceptible to artifacts, such as lapses in concentration or poor imagination, which can significantly impact the accuracy of disease diagnosis in e-health applications. To mitigate... 详细信息
来源: 评论