咨询与建议

限定检索结果

文献类型

  • 15,711 篇 会议
  • 9,961 篇 期刊文献
  • 440 册 图书

馆藏范围

  • 26,112 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,264 篇 工学
    • 9,609 篇 计算机科学与技术...
    • 7,708 篇 软件工程
    • 3,222 篇 信息与通信工程
    • 3,040 篇 控制科学与工程
    • 2,086 篇 电气工程
    • 1,829 篇 电子科学与技术(可...
    • 1,657 篇 生物工程
    • 1,311 篇 机械工程
    • 1,301 篇 生物医学工程(可授...
    • 970 篇 光学工程
    • 813 篇 动力工程及工程热...
    • 790 篇 仪器科学与技术
    • 704 篇 化学工程与技术
    • 667 篇 材料科学与工程(可...
    • 555 篇 安全科学与工程
    • 540 篇 交通运输工程
  • 8,732 篇 理学
    • 4,550 篇 数学
    • 2,310 篇 物理学
    • 1,973 篇 生物学
    • 1,586 篇 统计学(可授理学、...
    • 1,463 篇 系统科学
    • 814 篇 化学
  • 3,809 篇 管理学
    • 2,519 篇 管理科学与工程(可...
    • 1,421 篇 图书情报与档案管...
    • 1,293 篇 工商管理
  • 1,370 篇 医学
    • 1,148 篇 临床医学
    • 972 篇 基础医学(可授医学...
    • 565 篇 药学(可授医学、理...
    • 508 篇 公共卫生与预防医...
  • 706 篇 法学
    • 584 篇 社会学
  • 458 篇 经济学
  • 315 篇 教育学
  • 271 篇 农学
  • 70 篇 文学
  • 54 篇 军事学
  • 40 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,112 篇 computer science
  • 485 篇 deep learning
  • 359 篇 systems engineer...
  • 345 篇 computational mo...
  • 339 篇 machine learning
  • 319 篇 application soft...
  • 314 篇 artificial intel...
  • 293 篇 computer archite...
  • 270 篇 internet of thin...
  • 268 篇 control systems
  • 240 篇 accuracy
  • 237 篇 support vector m...
  • 231 篇 feature extracti...
  • 220 篇 neural networks
  • 212 篇 optimization
  • 205 篇 software enginee...
  • 198 篇 information syst...
  • 197 篇 laboratories
  • 194 篇 training
  • 185 篇 routing

机构

  • 55 篇 shanghai key lab...
  • 47 篇 department of la...
  • 46 篇 department of el...
  • 44 篇 department of co...
  • 43 篇 department of sy...
  • 42 篇 department of el...
  • 42 篇 department of el...
  • 42 篇 department of sy...
  • 40 篇 department of co...
  • 40 篇 department of co...
  • 39 篇 department of in...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 33 篇 department of co...
  • 33 篇 school of comput...
  • 32 篇 academy of mathe...
  • 32 篇 department of co...
  • 31 篇 department of co...
  • 27 篇 department of co...
  • 27 篇 department of co...

作者

  • 93 篇 niyato dusit
  • 54 篇 rajkumar buyya
  • 52 篇 hisao ishibuchi
  • 43 篇 m. zahn
  • 42 篇 e. rogers
  • 40 篇 bernhard schölko...
  • 35 篇 abdelwahed motwa...
  • 33 篇 sofotasios pasch...
  • 28 篇 hong choong seon
  • 27 篇 jiang liu
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 shen xuemin
  • 24 篇 liu jiaming
  • 23 篇 tao yang
  • 23 篇 j.h. lang
  • 22 篇 soni mukesh
  • 20 篇 lindemann lars
  • 20 篇 bentahar jamal
  • 19 篇 ferrara antonell...
  • 19 篇 liu xin

语言

  • 23,318 篇 英文
  • 2,542 篇 其他
  • 230 篇 中文
  • 32 篇 日文
  • 8 篇 德文
  • 4 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Department of Computer Engineering and Systems Science"
26112 条 记 录,以下是921-930 订阅
排序:
Unconditional Generation of Scalable Chinese Characters as Bézier Curve Sequences  3
Unconditional Generation of Scalable Chinese Characters as B...
收藏 引用
3rd International Conference on Artificial Intelligence and Signal Processing, AISP 2023
作者: Lasrado, Rohan Nolan Vijayasherly, V. VIT University School of Computer Science and Engineering Vellore India VIT University Department of Software Systems Vellore India
Neural generative modelling of sketches has been an active research direction. SketchRNN set a milestone with their sequence-to-sequence variational autoencoder architecture being able to generate hand drawn sketches ... 详细信息
来源: 评论
Freeze-Phish: An ANN Based Phishing Detection System
收藏 引用
International Journal of Network Security 2023年 第5期25卷 893-898页
作者: Yang, Cheng-Ying Shih, Chun-Yi Yang, Chou-Chen Hwang, Min-Shiang Department of Computer Science University of Taipei Taipei Taiwan Department of Management Information Systems National Chung Hsing University Taichung Taiwan Department of Computer Science and Information Engineering Asia University Taichung41354 Taiwan Fintech and Blockchain Research Center Asia University Taichung41354 Taiwan
Phishing (also known as online phishing) is an online criminal. Attackers use a fake webpage that imitates trusted websites to steal sensitive personal information such as passwords and credit card details. In this pa... 详细信息
来源: 评论
Tolerant Tracking Control Protocol for PMSM Based on Policy Iteration Algorithm and Fault Compensation  16th
Tolerant Tracking Control Protocol for PMSM Based on Polic...
收藏 引用
16th International Conference on Social Robotics, ICSR + InnoBiz 2024
作者: Yan, Shuya Li, Xiaocong Qian, Huaming Ma, Jun Al Mamun, Abdullah College of Intelligent Systems Science and Engineering Harbin Engineering University Harbin150001 China Department of Electrical and Computer Engineering National University of Singapore Singapore117583 Singapore Guangzhou China Information Science and Technology Eastern Institute of Technology Ningbo China
In robotics applications, ensuring reliable performance in the presence of actuator faults is essential for maintaining system safety and reliability. This paper presents a tolerant tracking control method for permane... 详细信息
来源: 评论
Latency Reduction In Industrial Iot Using Yolov8 CNN Approach For Real-Time Data Processing  15
Latency Reduction In Industrial Iot Using Yolov8 CNN Approac...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Nirmala, G. Prasanthi, Yeddula Sajitha, L.P. Ramesh Babu, P. Pratheeksha Hegde, N. Laxmipriya, S. R.M.D Engineering College Department of Computer Science and Engineering Chennai India College of Agricultural Engineering Andhra Pradesh Madakasira India R. M. K Engineering College Department of Computer Science and Business Systems Tamilnadu Kavaraipettai India Wollega University College of Engineering and Technology Department of Computer Science Oromia Region Nekemte Ethiopia Nitte Deemed to be University Department of Ise Nmamit Karnataka Udupi India Mgr Educational and Research Institute Department of Civil Engineering Maduravayol Chennai India
During the era of Industry 4.0, the incorporation of the Internet of Things (IoT) into various industrial processes has become increasingly widespread, resulting in increased levels of production and efficiency. On th... 详细信息
来源: 评论
Multidimensional Voronoi Constellations vs. Short Blocklength Probabilistic Shaping: A Comparison for Multilevel Coding Approach
Multidimensional Voronoi Constellations vs. Short Blocklengt...
收藏 引用
2024 Asia Communications and Photonics Conference, ACP 2024 and International Conference on Information Photonics and Optical Communications, IPOC 2024
作者: Sheng, Yajie Chen, Bin Lei, Yi Deng, Jingxin Xu, Jiwei Fu, Mengfan Zhuge, Qunbi Li, Shen Department of Computer Science and Information Engineering Hefei University of Technology Hefei China State Key Laboratory of Advanced Optical Communication Systems and Networks Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China Department of Electrical and Computer Engineering Université Laval Québec Canada
Performance of concatenated multilevel coding with probabilistic shaping (PS) and Voronoi constellations (VCs) is analysed over AWGN channel. Numerical results show that VCs provide up to 1.3 dB SNR gains over PS-QAM ... 详细信息
来源: 评论
Performance Analysis of Energy and Secure Efficient Routing for Wireless Sensor Networks
Performance Analysis of Energy and Secure Efficient Routing ...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Hussein, Zainab Mohammed Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Universiti Kebangsaan Malaysia Center for Cyber Security Faculty of Information Science and Technology Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Baghdad Iraq Department of Computer Technical Engineering Al-Diwaniyah Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Wireless Sensor Networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect... 详细信息
来源: 评论
Comparative Analysis of Movie Recommendation systems Using Filtering Techniques on IMDB and Rotten Tomatoes  15
Comparative Analysis of Movie Recommendation Systems Using F...
收藏 引用
15th International Conference on Information, Intelligence, systems and Applications, IISA 2024
作者: Majhi, Santosh Kumar Sahani, Preetipadma Pradhan, Rosy Acharya, Biswaranjan Grivokostopoulou, Foteini Kanavos, Andreas Gerogiannis, Vassilis C. Department of Computer Science and Information Technology Bilaspur India Veer Surendra Sai University of Technology Department of Computer Science and Engineering Odisha Burla India Veer Surendra Sai University of Technology Department of Electrical Engineering Odisha Burla India Marwadi University Department of Computer Engineering Ai Rajkot India Computer Technology Institute and Press 'Diophantus' Patras Greece Ionian University Department of Informatics Corfu Greece University of Thessaly Department of Digital Systems Larissa Greece
Recommendation systems are pivotal in industries like entertainment, where competitiveness is intense. This study enhances movie recommendations by utilizing rich datasets from IMDB and Rotten Tomatoes, incorporating ... 详细信息
来源: 评论
Oct Image Blind Despeckling Based on Gradient Guided Filter with Speckle Statistical Prior  48
Oct Image Blind Despeckling Based on Gradient Guided Filter ...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Li, Sanqian Xiong, Muxing Yang, Bing Zhang, Xiaoqing Higashita, Risa Liu, Jiang Southern University of Science and Technology Research Institute of Trustworthy Autonomous Systems Department of Computer Science and Engineering Shenzhen China Tomey Corporation Japan
Optical coherence tomography (OCT) imaging technique has been widely used for ocular disease diagnosis. However, speckles occur in OCT images due to the property of coherent imaging, inevitably affecting the visual qu... 详细信息
来源: 评论
Pediatric Bone Age Prediction Using Deep Learning  26
Pediatric Bone Age Prediction Using Deep Learning
收藏 引用
26th International Conference on computer and Information Technology, ICCIT 2023
作者: Bin Habib, Al Zadid Sultan Islam, Md. Ekramul Bin Syed, Md Asif Ahamed, Md Younus Tasnim, Tanpia West Virginia University Lane Department of Computer Science and Electrical Engineering MorgantownWV26506 United States Stamford University Bangladesh Department of Computer Science & Engineering Dhaka1217 Bangladesh West Virginia University Department of Industrial and Management Systems Engineering MorgantownWV26506 United States Green University of Bangladesh Department of Computer Science and Engineering Dhaka1461 Bangladesh
Pediatric bone age prediction is a crucial task in clinical practice that can help diagnose endocrine disorders and provide insight into a child's growth and development. However, conventional bone age prediction ... 详细信息
来源: 评论
ATFS: A deep learning framework for angle transformation and face swapping of face de-identification
收藏 引用
Multimedia Tools and Applications 2024年 第12期83卷 36797-36822页
作者: Tsai, Chwei-Shyong Wu, Hsien-Chu Chen, Wei-Ting Ying, Josh Jia-Ching Department of Management Information Systems National Chung Hsing University Taichung402 Taiwan Language Center National Chin-Yi University of Technology Taichung411 Taiwan Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taichung404 Taiwan
This paper proposes an effective framework for improving angle transformation and face replacement. This ATFS framework aims to solve the image distortion caused by angled face swapping in face de-identification. In t... 详细信息
来源: 评论