咨询与建议

限定检索结果

文献类型

  • 115,133 篇 会议
  • 52,963 篇 期刊文献
  • 1,516 册 图书

馆藏范围

  • 169,612 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 99,826 篇 工学
    • 66,617 篇 计算机科学与技术...
    • 53,604 篇 软件工程
    • 26,059 篇 信息与通信工程
    • 16,987 篇 控制科学与工程
    • 14,884 篇 电气工程
    • 14,014 篇 电子科学与技术(可...
    • 11,851 篇 生物工程
    • 9,458 篇 生物医学工程(可授...
    • 8,433 篇 光学工程
    • 7,131 篇 机械工程
    • 6,049 篇 化学工程与技术
    • 5,988 篇 动力工程及工程热...
    • 5,718 篇 仪器科学与技术
    • 5,044 篇 材料科学与工程(可...
    • 4,862 篇 网络空间安全
    • 4,321 篇 安全科学与工程
  • 57,204 篇 理学
    • 27,271 篇 数学
    • 19,605 篇 物理学
    • 13,467 篇 生物学
    • 8,915 篇 统计学(可授理学、...
    • 6,568 篇 化学
    • 6,327 篇 系统科学
  • 26,388 篇 管理学
    • 16,508 篇 管理科学与工程(可...
    • 10,980 篇 图书情报与档案管...
    • 7,630 篇 工商管理
  • 9,596 篇 医学
    • 7,868 篇 临床医学
    • 7,086 篇 基础医学(可授医学...
    • 4,373 篇 药学(可授医学、理...
    • 4,256 篇 公共卫生与预防医...
  • 5,005 篇 法学
    • 4,087 篇 社会学
  • 3,055 篇 经济学
  • 2,447 篇 农学
  • 1,630 篇 教育学
  • 905 篇 文学
  • 363 篇 军事学
  • 226 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 5,206 篇 computer science
  • 5,200 篇 accuracy
  • 4,480 篇 deep learning
  • 4,051 篇 feature extracti...
  • 3,734 篇 machine learning
  • 3,612 篇 computational mo...
  • 3,167 篇 training
  • 2,564 篇 support vector m...
  • 2,478 篇 convolutional ne...
  • 2,473 篇 real-time system...
  • 2,439 篇 internet of thin...
  • 2,365 篇 predictive model...
  • 2,230 篇 optimization
  • 2,065 篇 artificial intel...
  • 1,903 篇 data mining
  • 1,903 篇 wireless sensor ...
  • 1,719 篇 neural networks
  • 1,660 篇 security
  • 1,626 篇 computer archite...
  • 1,609 篇 data models

机构

  • 1,085 篇 cavendish labora...
  • 1,004 篇 department of ph...
  • 956 篇 physikalisches i...
  • 933 篇 oliver lodge lab...
  • 912 篇 department of co...
  • 834 篇 department of el...
  • 739 篇 university of ch...
  • 692 篇 department of el...
  • 682 篇 department of co...
  • 600 篇 chitkara univers...
  • 594 篇 infn sezione di ...
  • 589 篇 infn laboratori ...
  • 569 篇 infn sezione di ...
  • 550 篇 infn sezione di ...
  • 538 篇 school of physic...
  • 534 篇 horia hulubei na...
  • 533 篇 fakultät physik ...
  • 517 篇 department of ph...
  • 516 篇 school of physic...
  • 513 篇 h.h. wills physi...

作者

  • 260 篇 barter w.
  • 252 篇 a. gomes
  • 242 篇 s. chen
  • 241 篇 c. alexa
  • 238 篇 j. m. izen
  • 237 篇 j. wang
  • 233 篇 blake t.
  • 231 篇 c. amelung
  • 230 篇 g. bella
  • 230 篇 j. strandberg
  • 229 篇 d. calvet
  • 224 篇 bellee v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 beiter a.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 213 篇 bencivenni g.

语言

  • 138,255 篇 英文
  • 29,632 篇 其他
  • 2,038 篇 中文
  • 129 篇 日文
  • 37 篇 斯洛文尼亚文
  • 32 篇 德文
  • 32 篇 法文
  • 20 篇 朝鲜文
  • 9 篇 俄文
  • 7 篇 阿拉伯文
  • 3 篇 捷克文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 波兰文
检索条件"机构=Department of Computer Engineering Science and Technology"
169612 条 记 录,以下是3951-3960 订阅
排序:
An Automatic Brick Grading System Using Convolutional Neural Network: Bangladesh Perspective  1
收藏 引用
3rd International Conference on Advanced Computing and Intelligent Technologies, ICACIT 2023
作者: Dhali, Sourav Islam, Md. Hasibul Barmon, Sourav Ghosh, Arjan Department of Computer Science and Engineering Northern University of Business and Technology Khulna Khulna9100 Bangladesh Computer Science and Engineering Discipline Khulna University Khulna9208 Bangladesh Department of Computer Science and Engineering BRAC University Dhaka1212 Bangladesh
In this work our primary objective is to devise an automated system for grading bricks based on their physical attributes. The conventional brick grading methods heavily rely on manual inspection, a process known for ... 详细信息
来源: 评论
Mal Class: A Deep Learning Approach for Automatic Classification of Malware Images  4
Mal Class: A Deep Learning Approach for Automatic Classifica...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Divya, S. Sree Sastha Institute of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Chembarambakkam600123 India
These days, malware evolves and multiplies exponentially through structural changes and camouflage using methods like encryption, obfuscation, polymorphism, and metamorphism. As deep learning has advanced, techniques ... 详细信息
来源: 评论
Full-model-free Adaptive Graph Deep Deterministic Policy Gradient Model for Multi-terminal Soft Open Point Voltage Control in Distribution Systems
收藏 引用
Journal of Modern Power Systems and Clean Energy 2024年 第6期12卷 1893-1904页
作者: Huayi Wu Zhao Xu Minghao Wang Youwei Jia Department of Electrical and Electronic Engineering The Hong Kong Polytechnic UniversityHong KongChina Shenzhen Research Institute The Hong Kong Polytechnic UniversityShenzhenChina Department of Electrical and Computer Engineering University of MacaoMacaoChina Department of Electrical and Electronic Engineering Southern University of Science and TechnologyShenzhenChina
High penetration of renewable energy sources(RESs)induces sharply-fluctuating feeder power,leading to volt-age deviation in active distribution *** prevent voltage violations,multi-terminal soft open points(M-sOPs)hav... 详细信息
来源: 评论
A 0.75 to 1.5 GHz Reconfigurable Diplexer With Independently Controllable Center Frequency and Insertion Phase
收藏 引用
IEEE Transactions on Circuits and Systems II: Express Briefs 2024年 第4期71卷 1924-1928页
作者: Yi, Chengfei Chen, Xiong Chi, Pei-Ling Yang, Tao The School of Electronic Science and Engineering University of Electronic Science and Technology of China Sichuan Chengdu611731 China The Department of Electrical and Computer Engineering National Chiao Tung University Hsinchu300 Taiwan
A novel reconfigurable diplexer with independently controllable center frequency and insertion phase is proposed in this brief. It simply consists of six coupled resonators and two non-resonating-nodes (NRNs). These s... 详细信息
来源: 评论
Utilizing Customized 3D U-Net Framework for the Classification and Segmentation of Multi-regional Brain Tumors in Volumetric MRI Images  3
Utilizing Customized 3D U-Net Framework for the Classificati...
收藏 引用
3rd International Conference on Advancement in Electrical and Electronic engineering, ICAEEE 2024
作者: Titu, Md. Minhaj Taher Mary, Mekhala Mariam Ahamed, Md. Faysal Oishee, Tasfia Mashud Hasan, Md Mahadi International Standard University Department of Computer Science & Engineering Dhaka1212 Bangladesh Rajshahi University of Engineering & Technology Department of Electrical & Computer Engineering Rajshahi6204 Bangladesh International Standard University Department of Computer Science and Engineering Dhaka1212 Bangladesh
Precise diagnosis and treatment planning depend heavily on the segmentation and classification of brain tumors in medical pictures. The diagnostic and therapeutic challenges posed by brain tumors necessitate innovativ... 详细信息
来源: 评论
On the Design of Cancer Tumor Type Prediction using Machine Learning Techniques for Efficient Diagnosis  2
On the Design of Cancer Tumor Type Prediction using Machine ...
收藏 引用
2nd International Conference on Advancements in Smart, Secure and Intelligent Computing, ASSIC 2024
作者: Thakkar, Hiren Kumar Kumar, Yogesh Kathirisetty, Nikhila School of Technology Pandit Deendayal Energy University Department of Computer Science and Engineering Gujarat 382007 India Vardhaman College of Engineering Department of Computer Science and Data Science Hyderabad Shamshabad India
In the recent past, cancer is designated as the life threatening disease causing significant deaths across the globe. Countries are putting efforts for early stage cancer detection, and mortality prediction. Machine L... 详细信息
来源: 评论
Enhancing structural health monitoring with AI-ML algorithms: a focus on crack detection and prediction
收藏 引用
Asian Journal of Civil engineering 2025年 第5期26卷 1907-1918页
作者: Bader, Ahmad Shtayat, Amir Al-Mistarehi, Bara’ Communication and Computer Department Faculty of Engineering Jadara University Irbid Jordan Department of City Planning and Design Jordan University of Science and Technology Irbid 22110 Jordan Department of Civil Engineering Jordan University of Science and Technology Irbid Jordan
SHM is a very important process in terms of the safety and durability of infrastructure. Traditional SHM often faces problems detecting minor structural defects and handling large datasets. Therefore, certain more adv... 详细信息
来源: 评论
An Efficient Security Solution for IoT and Cloud Security Using Lattice-Based Cryptography
An Efficient Security Solution for IoT and Cloud Security Us...
收藏 引用
2023 International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2023
作者: Bagla, Piyush Sharma, Ravi Mishra, Amit Kumar Tripathi, Neha Dumka, Ankur Pandey, Neeraj Kumar National Institute of Technology Department of Computer Science & Engineering Punjab Jalandhar India Graphic Era Hill University Department of Computer Science & Engineering Dehradun India Department of Computer Science & Engineering Dehradun India Women Institute of Technology Department of Computer Science & Engineering Dehradun India Dehradun India
This study introduces lattice-based cryptography to enhance security in IoT and cloud systems. It focuses on two fundamental challenges in lattice-based encryption. The paper compares the advantages and disadvantages ... 详细信息
来源: 评论
Advanced Semantic Communication Techniques for IoT Using Disentangled Information Bottleneck
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20122-20137页
作者: Xie, Wenwu Xiong, Ming Yang, Liang Wang, Ji Li, Xingwang Yang, Zhihe Hunan Institute of Science and Technology School of Information Science and Engineering Yueyang414006 China Hunan University College of Computer Science and Electronic Engineering Changsha410082 China Central China Normal University College of Physical Science and Technology Department of Electronics and Information Engineering Wuhan430079 China Henan Polytechnic University School of Physics and Electronic Information Engineering Jiaozuo454003 China
This article explores the impact of source data compression on the performance of task execution at the receiver side of a communication system, and investigates the interference and impact of channel environment vari... 详细信息
来源: 评论
Predicting software vulnerability based on software metrics: a deep learning approach
收藏 引用
Iran Journal of computer science 2024年 第4期7卷 801-812页
作者: Agbenyegah, Francis Kwadzo Asante, Micheal Chen, Jinfu Akpaku, Ernest Department of Computer Science Kwame Nkrumah University of Science and Technology Kumasi Ghana School of Computer Science and Communication Engineering Jiangsu University Zhenjiang China Department of Information Technology Faculty of Computing and Information Systems Ghana Communication Technology University Accra Ghana
The security of IT systems is the topmost priority of software developers. Software vulnerabilities undermine the security of computer systems. Lately, there have been a lot of reported issues of software vulnerabilit... 详细信息
来源: 评论