咨询与建议

限定检索结果

文献类型

  • 2,343 篇 会议
  • 1,575 篇 期刊文献
  • 73 册 图书

馆藏范围

  • 3,991 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,360 篇 工学
    • 1,591 篇 计算机科学与技术...
    • 1,270 篇 软件工程
    • 660 篇 信息与通信工程
    • 437 篇 控制科学与工程
    • 368 篇 电子科学与技术(可...
    • 339 篇 电气工程
    • 309 篇 生物工程
    • 240 篇 生物医学工程(可授...
    • 196 篇 机械工程
    • 196 篇 光学工程
    • 173 篇 仪器科学与技术
    • 142 篇 动力工程及工程热...
    • 130 篇 网络空间安全
    • 120 篇 安全科学与工程
    • 113 篇 化学工程与技术
    • 98 篇 交通运输工程
  • 1,309 篇 理学
    • 522 篇 数学
    • 438 篇 物理学
    • 353 篇 生物学
    • 167 篇 统计学(可授理学、...
    • 146 篇 化学
    • 134 篇 系统科学
  • 679 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 238 篇 图书情报与档案管...
    • 213 篇 工商管理
  • 332 篇 医学
    • 264 篇 临床医学
    • 219 篇 基础医学(可授医学...
    • 153 篇 公共卫生与预防医...
    • 125 篇 药学(可授医学、理...
  • 118 篇 法学
    • 97 篇 社会学
  • 83 篇 经济学
  • 56 篇 教育学
  • 49 篇 农学
  • 21 篇 文学
  • 8 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 151 篇 deep learning
  • 108 篇 accuracy
  • 98 篇 machine learning
  • 91 篇 artificial intel...
  • 87 篇 internet of thin...
  • 77 篇 computer science
  • 73 篇 feature extracti...
  • 66 篇 real-time system...
  • 56 篇 computational mo...
  • 55 篇 convolutional ne...
  • 53 篇 optimization
  • 53 篇 security
  • 52 篇 training
  • 50 篇 control systems
  • 47 篇 neural networks
  • 46 篇 support vector m...
  • 45 篇 predictive model...
  • 42 篇 monitoring
  • 41 篇 computational in...
  • 41 篇 wireless sensor ...

机构

  • 63 篇 maharishi school...
  • 57 篇 department of co...
  • 46 篇 centre of interd...
  • 38 篇 university of ph...
  • 35 篇 maharishi school...
  • 33 篇 king mongkut's u...
  • 28 篇 department of co...
  • 26 篇 department of el...
  • 26 篇 department of el...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 22 篇 school of inform...
  • 21 篇 prince shri venk...
  • 21 篇 faculty of engin...
  • 20 篇 faculty of infor...
  • 19 篇 presidency unive...
  • 18 篇 department of co...
  • 17 篇 department of ma...
  • 17 篇 department of co...
  • 17 篇 department of co...

作者

  • 91 篇 mekruksavanich s...
  • 87 篇 jitpattanakul an...
  • 66 篇 sakorn mekruksav...
  • 63 篇 anuchit jitpatta...
  • 39 篇 jantawong ponnip...
  • 32 篇 hnoohom narit
  • 26 篇 awotunde joseph ...
  • 25 篇 leonard barolli
  • 24 篇 ponnipa jantawon...
  • 23 篇 ramesh kumar ayy...
  • 21 篇 imoize agbotinam...
  • 18 篇 wikanda phaphan
  • 14 篇 abdelwahed motwa...
  • 14 篇 yuvaraj s.
  • 14 篇 xin xin
  • 13 篇 moni mohammad al...
  • 13 篇 ayyasamy ramesh ...
  • 12 篇 yang yang
  • 11 篇 eldar yonina c.
  • 11 篇 anwer mustafa hi...

语言

  • 3,715 篇 英文
  • 234 篇 其他
  • 28 篇 中文
  • 13 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Department of Communication Engineering Faculty of Computer Science and System Engineering"
3991 条 记 录,以下是41-50 订阅
排序:
Large circuit models: opportunities and challenges
收藏 引用
science China(Information sciences) 2024年 第10期67卷 25-66页
作者: Lei CHEN Yiqi CHEN Zhufei CHU Wenji FANG Tsung-Yi HO Ru HUANG Yu HUANG Sadaf KHAN Min LI Xingquan LI Yu LI Yun LIANG Jinwei LIU Yi LIU Yibo LIN Guojie LUO Hongyang PAN Zhengyuan SHI Guangyu SUN Dimitrios TSARAS Runsheng WANG Ziyi WANG Xinming WEI Zhiyao XIE Qiang XU Chenhao XUE Junchi YAN Jun YANG Bei YU Mingxuan YUAN Evangeline F.Y.YOUNG Xuan ZENG Haoyi ZHANG Zuodong ZHANG Yuxiang ZHAO Hui-Ling ZHEN Ziyang ZHENG Binwu ZHU Keren ZHU Sunan ZOU Huawei Noah’s Ark Lab School of Integrated Circuits Peking University Faculty of Electrical Engineering and Computer Science Ningbo University Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Department of Computer Science and Engineering The Chinese University of Hong Kong School of Integrated Circuits Southeast University Huawei HiSilicon Peng Cheng Laboratory School of Computer Science Peking University School of Microelectronics State Key Laboratory of Integrated Chips and System Fudan University School of Artificial Intelligence Shanghai Jiao Tong University
Within the electronic design automation(EDA) domain, artificial intelligence(AI)-driven solutions have emerged as formidable tools, yet they typically augment rather than redefine existing methodologies. These solutio... 详细信息
来源: 评论
EDSA-Ensemble: an Event Detection Sentiment Analysis Ensemble Architecture
收藏 引用
IEEE Transactions on Affective Computing 2024年 第2期16卷 1-18页
作者: PETRESCU, Alexandru TRUICA, Ciprian-Octavian APOSTOL, Elena-Simona PASCHKE, Adrian Computer Science and Engineering Department Faculty of Automatic Control and Computers National University of Science and Technology Politehnica Bucharest Bucharest Romania Fraunhofer Institute for Open Communication Systems Berlin Germany
As global digitization continues to grow, technology becomes more affordable and easier to use, and social media platforms thrive, becoming the new means of spreading information and news. Communities are built around... 详细信息
来源: 评论
Advancing Bankruptcy Forecasting With Hybrid Machine Learning Techniques: Insights From an Unbalanced Polish Dataset
收藏 引用
IEEE Access 2024年 12卷 9369-9381页
作者: Ainan, Ummey Hany Por, Lip Yee Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
The challenge of bankruptcy prediction, critical for averting financial sector losses, is amplified by the prevalence of imbalanced datasets, which often skew prediction models. Addressing this, our study introduces t... 详细信息
来源: 评论
A systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords
收藏 引用
IEEE Access 2024年 12卷 53408-53423页
作者: Por, Lip Yee Ng, Ian Ouii Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj... 详细信息
来源: 评论
Review On the Techniques Used for Detection of Fabric Defects Using AI  1
Review On the Techniques Used for Detection of Fabric Defect...
收藏 引用
1st IEEE International Conference on Advances in Electronics, communication, Computing and Intelligent Information systems, ICAECIS 2023
作者: Batra, Isheeta Prasad, S A Hari Arvind, K.S. Faculty of Engineering & Technology Department of Computer Science and Engineering Karnataka India Faculty of Engineering & Technology Department of Electronics and Communication Engineering Karnataka India
The garment industry is the second-most polluting industry after oil. These mass-produced clothes if rejected are dumped and have an enormous impact on the environment. Therefore, to save the cost post production it i... 详细信息
来源: 评论
Use of Euclidean Distance to Improve Fingerprint Matching Accuracy  4th
Use of Euclidean Distance to Improve Fingerprint Matching Ac...
收藏 引用
4th International Conference on Innovations in Computational Intelligence and computer Vision, ICICV 2024
作者: Bhargava, Neeraj Yadav, Rajendra Choudhary, Usha Department of Computer Science School of Engineering System Sciences MDS University Rajasthan Ajmer India Department of Computer and Communication Engineering Manipal University Jaipur Rajasthan Jaipur India
Fingerprint authentication is the most sophisticated method of all biometric techniques and has been thoroughly verified through various applications. Fingerprint matching has been done using several fingerprint recog... 详细信息
来源: 评论
Enhancing face recognition performance: a comprehensive evaluation of deep learning models and a novel ensemble approach with hyperparameter tuning
收藏 引用
Soft Computing 2024年 第20期28卷 12399-12424页
作者: Selvaganesan, Jana Sudharani, B. Shekhar, S. N. Chandra Vaishnavi, K. Priyadarsini, K. Raju, K. Srujan Rao, T. Srinivasa Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr. Sagunthala R & ampD Institute of Science and Technology Avadi Tamil Nadu Chennai600062 India Guntur Dist. Andhra Pradesh Vadlamudi India Department of Electronics and Communication Engineering Sreenidhi Institute of Science and Technology Telangana Hyderabad501301 India Department of Computer Science and Engineering Sona College of Technology Tamil Nadu Salem636005 India Department of Data Science and Business Systems School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nadu Kattankulathur603203 India Department of Computer Science and Engineering CMR Technical Campus Medchal Telangana Hyderabad501401 India Department of Electronics and Communication Engineering Aditya Engineering College Surampalem533437 India
In response to growing security concerns and the increasing demand for face recognition (FR) technology in various sectors, this research explores the application of deep learning techniques, specifically pre-trained ... 详细信息
来源: 评论
Supervised learning applied to electrocardiogram statistical features for the detection of premature ventricular contraction
收藏 引用
Research on Biomedical engineering 2025年 第1期41卷 1-12页
作者: Issa, Khouloud Rammal, Abbas Assaf, Rabih Ghandour, Ahmad Electrical and Communication Engineering Department College of Engineering Phoenicia University Zahrani South Lebanon Statistics and Informatics Department Faculty of Science Lebanese University Beirut Lebanon Mathematics and Computer Sciences Department Faculty of Arts and Sciences Lebanese American University Beirut Lebanon Department of Mathematics Faculty of Arts and Sciences Holy Spirit University of Kaslik Jounieh Lebanon Biomedical Engineering Department Faculty of Engineering Islamic University of Lebanon Wardenieh30014 Lebanon
Purpose: The development of an automated premature ventricular contraction (PVC) detection system has significant implications for early intervention and treatment decisions. This study aims to develop a novel approac... 详细信息
来源: 评论
Enhancing visual clarity in hazy media: a comprehensive approach through preprocessing and feature fusion attention-based dehazing
收藏 引用
Multimedia Tools and Applications 2025年 第17期84卷 18071-18093页
作者: Ayoub, Abeer El-Shafai, Walid El-Samie, Fathi E. Abd Hamad, Ehab K. I. Rabaie, El-Sayed M. Department of Electronics and Electrical Communication Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Security Engineering Lab Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Electrical Engineering Department Faculty of Engineering Aswan University Aswan81542 Egypt
Particles in the atmosphere, such as dust and smoke, can cause visual clarity problems in both images and videos. Haze is the result of the interaction between airborne particles and light, which is scattered and atte... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论