咨询与建议

限定检索结果

文献类型

  • 32,795 篇 会议
  • 19,661 篇 期刊文献
  • 725 册 图书

馆藏范围

  • 53,181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30,988 篇 工学
    • 19,963 篇 计算机科学与技术...
    • 15,856 篇 软件工程
    • 8,529 篇 信息与通信工程
    • 5,179 篇 控制科学与工程
    • 4,806 篇 电气工程
    • 4,773 篇 电子科学与技术(可...
    • 3,575 篇 生物工程
    • 3,246 篇 生物医学工程(可授...
    • 2,562 篇 光学工程
    • 2,334 篇 机械工程
    • 2,099 篇 仪器科学与技术
    • 2,048 篇 动力工程及工程热...
    • 1,946 篇 化学工程与技术
    • 1,449 篇 材料科学与工程(可...
    • 1,446 篇 网络空间安全
    • 1,324 篇 安全科学与工程
    • 1,163 篇 交通运输工程
  • 19,214 篇 理学
    • 8,605 篇 数学
    • 7,412 篇 物理学
    • 4,249 篇 生物学
    • 2,811 篇 统计学(可授理学、...
    • 2,210 篇 化学
    • 1,883 篇 系统科学
  • 7,824 篇 管理学
    • 5,046 篇 管理科学与工程(可...
    • 3,085 篇 图书情报与档案管...
    • 2,421 篇 工商管理
  • 3,540 篇 医学
    • 2,896 篇 临床医学
    • 2,504 篇 基础医学(可授医学...
    • 1,538 篇 公共卫生与预防医...
    • 1,483 篇 药学(可授医学、理...
  • 1,382 篇 法学
  • 990 篇 经济学
  • 814 篇 农学
  • 549 篇 教育学
  • 241 篇 文学
  • 131 篇 军事学
  • 61 篇 艺术学
  • 8 篇 哲学
  • 8 篇 历史学

主题

  • 1,519 篇 accuracy
  • 1,390 篇 deep learning
  • 1,168 篇 computer science
  • 1,092 篇 machine learning
  • 1,001 篇 feature extracti...
  • 989 篇 internet of thin...
  • 855 篇 artificial intel...
  • 835 篇 computational mo...
  • 792 篇 real-time system...
  • 759 篇 training
  • 684 篇 convolutional ne...
  • 612 篇 support vector m...
  • 592 篇 optimization
  • 547 篇 predictive model...
  • 478 篇 wireless sensor ...
  • 444 篇 security
  • 430 篇 neural networks
  • 424 篇 data models
  • 395 篇 wireless communi...
  • 377 篇 reliability

机构

  • 1,097 篇 cavendish labora...
  • 1,029 篇 department of ph...
  • 988 篇 physikalisches i...
  • 973 篇 oliver lodge lab...
  • 648 篇 infn laboratori ...
  • 620 篇 infn sezione di ...
  • 611 篇 fakultät physik ...
  • 605 篇 infn sezione di ...
  • 597 篇 infn sezione di ...
  • 563 篇 school of physic...
  • 550 篇 university of ch...
  • 540 篇 horia hulubei na...
  • 538 篇 department of ph...
  • 535 篇 school of physic...
  • 527 篇 iccub universita...
  • 523 篇 imperial college...
  • 515 篇 h.h. wills physi...
  • 513 篇 stfc rutherford ...
  • 511 篇 nikhef national ...
  • 503 篇 school of physic...

作者

  • 274 篇 barter w.
  • 258 篇 a. gomes
  • 246 篇 c. alexa
  • 244 篇 j. m. izen
  • 241 篇 beiter a.
  • 241 篇 s. chen
  • 239 篇 g. bella
  • 239 篇 j. strandberg
  • 239 篇 bellee v.
  • 237 篇 c. amelung
  • 236 篇 d. calvet
  • 233 篇 brundu d.
  • 233 篇 blake t.
  • 232 篇 g. spigo
  • 227 篇 bowcock t.j.v.
  • 226 篇 f. siegert
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.

语言

  • 43,145 篇 英文
  • 9,619 篇 其他
  • 415 篇 中文
  • 88 篇 日文
  • 33 篇 德文
  • 28 篇 法文
  • 12 篇 俄文
  • 7 篇 斯洛文尼亚文
  • 5 篇 阿拉伯文
  • 3 篇 西班牙文
  • 2 篇 捷克文
  • 2 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 泰文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Communication Engineering Faculty of Engineering"
53181 条 记 录,以下是441-450 订阅
排序:
Testing the Feasibility of Linear Programs with Bandit Feedback  41
Testing the Feasibility of Linear Programs with Bandit Feedb...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Gangrade, Aditya Gopalan, Aditya Saligrama, Venkatesh Scott, Clayton Department of Electrical Computer Engineering Boston University United States Department of Electrical Engineering and Computer Science University of Michigan United States Department of Electrical Communication Engineering Indian Institute of Science India
While the recent literature has seen a surge in the study of constrained bandit problems, all existing methods for these begin by assuming the feasibility of the underlying problem. We initiate the study of testing su... 详细信息
来源: 评论
A machine learning approach for accelerated design of magnesium alloys. Part A:Alloy data and property space
收藏 引用
Journal of Magnesium and Alloys 2023年 第11期11卷 3620-3633页
作者: M.Ghorbani M.Boley P.N.H.Nakashima N.Birbilis Department of Materials Science and Engineering Monash UniversityVIC3800Australia Faculty of Information Technology Monash UniversityVIC3800Australia College of Engineering and Computer Science Australian National UniversityACT2601Australia Faculty of Engineering Science and the Built EnvironmentDeakin UniversityVIC3125Australia
Typically, magnesium alloys have been designed using a so-called hill-climbing approach, with rather incremental advances over the past century. Iterative and incremental alloy design is slow and expensive, but more i... 详细信息
来源: 评论
Impact of atmospheric propagation impairments on submillimetre airborne radar performance
收藏 引用
International Journal of Simulation and Process Modelling 2024年 第4期21卷 305-320页
作者: Teka, Bedilu Ababu Gelmecha, Demissie Jobir Singh, Ram Sewak Shakya, Rajeev Kumar Paikaray, Bijay Kumar Mishra, Satyasis Department of Electronics and Communication Engineering Adama Science and Technology University Adama Ethiopia Centre for Data Science Department of Computer Science and Engineering Siksha ‘O’ Anusandhan (Deemed to be) University Odisha India Department of Electronics and Communication Engineering Centurion University of Technology and Management Odisha India
This research presents the performance of submillimetre airborne radar systems in the presence of various atmospheric propagation impairments. The study aims to assess the effects of environmental factors such as rain... 详细信息
来源: 评论
Identifying Hoaxes in Fake Spotter using XG Boost Machine Learning based Classification Method  4
Identifying Hoaxes in Fake Spotter using XG Boost Machine Le...
收藏 引用
4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024
作者: Chitti, Sridevi Rinku, Dhruva R. Juluru, Tarun Kumar Rao, P. Ramchandar Gouthami, Shiramshetty Kakatiya Institute of Technology and Science Department of Electronics and Communication Engineering Warangal India Cvr College of Engineering Department of Electronics and Communication Engineering Hyderabad India Jayamukhi Institute of Technological Sciences Department of Computer Science Engineering Warangal India
Social media has greatly streamlined communication in recent years which uses network, shares information, and keep up with current events. Many posts on social media are questionable and meant to deceive. There is a ... 详细信息
来源: 评论
Design, Implementation and Analysis of HIBRI Cipher on IoT Platforms
收藏 引用
Journal of The Institution of Engineers (India): Series B 2024年 第6期105卷 1-13页
作者: Nagesh, H.R. Poojari, Asmita Kumar, V. G. Kiran Canara Engineering College Benjanapadavu Bantwal Taluk Karnataka Mangaluru574219 India Department of Computer Science and Engineering NMAM Institute of Technology Karnataka Nitte 574110 India Department of Electronics and Communication Engineering A J Institute Engineering and Technology Karnataka Mangaluru575006 India
With the exponential growth of the Internet of Things through time there has been an enormous increase in the usage of tiny devices and information being exchanged, between low resource devices like sensors, PDA’s an... 详细信息
来源: 评论
Highly efficient ternary organic solar cells with excellent open-circuit voltage and fill factor via precisely tuning molecular stacking and morphology
收藏 引用
science China Chemistry 2024年 第3期67卷 963-972页
作者: Dinghong Sun Zhenyu Chen Jianfeng Zhang Wei Song Jingyu Shi Jintao Zhu Yuanyuan Meng Fei Jin Shuncheng Yang Ziyi Ge Faculty of Electrical Engineering and Computer Science Ningbo UniversityNingbo 315211China Faculty of Material Science and Chemical Engineering Ningbo UniversityNingbo 315211China Zhejiang Provincial Engineering Research Center of Energy Optoelectronic Materials and Devices Ningbo Institute of Materials Technology&EngineeringChinese Academy of SciencesNingbo 315201China Center of Materials Science and Optoelectronics Engineering University of Chinese Academy of Sciences Beijing 100049China Department of Chemical and Environmental Engineering University of Nottingham NingboNingbo 315100China
The micro-morphology and molecular stacking play a key role in determining the charge transport process and nonradiative energy loss, thus impacting the performances of organic solar cells(OSCs). To address this issue... 详细信息
来源: 评论
A Comparative Study of Random Forest, SVM, and Naive Bayes for Sentiment Analysis Optimization  2
A Comparative Study of Random Forest, SVM, and Naive Bayes f...
收藏 引用
2nd IEEE International Conference on Innovations in High-Speed communication and Signal Processing, IHCSP 2024
作者: Pandey, Ranu Patidar, Praveen Kumar Verma, Pushpalata Khan, Gousia Hazra Anjum Harne, Sachin Tiwari, Rovin Shri Rawatpura Sarkar University Department of Computer Science and Engineering Raipur India Parul University Parul Institute of Technology Department of Computer Science and Engineering Vadodara India Bhilai Institute of Technology Department of Computer Science & Engineering Raipur India Government Engineering College Department of Computer Science and Engineering Raipur India Gh Raisoni College of Engineering Department of Computer Science and Engineering Nagpur India Rgpv Department of Electronics and Communication Engineering Bhopal India
This study presents an in-depth evaluation of sentiment analysis models applied to a US Twitter dataset. The performance of machine learning models considered in this study are Random Forest, Support Vector Machine (S... 详细信息
来源: 评论
Game-Theoretic Approach for Integrated Sensing and Computation Offloading in Vehicular Edge Networks: A Utility Maximization Design
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23694-23708页
作者: Wang, Lina Wu, Weihong Dai, Minghui Zh, Haijun University of Science and Technology Beijing department of Communication Engineering China Donghua University School of Computer Science and Technology Shanghai China Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services University of Science and Technology Beijing Beijing China
In recent years, with the rapid development of the Internet of Vehicles (IoVs) and the widespread application of integrated sensing and communication (ISAC) in the IoVs, the integrated sensing and computation offloadi... 详细信息
来源: 评论
Spatial Attention Integrated EfficientNet Architecture for Breast Cancer Classification with Explainable AI
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 5029-5045页
作者: Sannasi Chakravarthy Bharanidharan Nagarajan Surbhi Bhatia Khan Vinoth Kumar Venkatesan Mahesh Thyluru Ramakrishna Ahlam AlMusharraf Khursheed Aurungzeb Department of Electronics and Communication Engineering Bannari Amman Institute of TechnologySathyamangalam638402India School of Computer Science Engineering and Information Systems(SCORE) Vellore Institute of TechnologyVellore632014India School of Science Engineering and EnvironmentUniversity of SalfordManchesterM54WTUK Department of Computer Science&Engineering Faculty of Engineering and TechnologyJAIN(Deemed-to-be University)Bengaluru562112India Department of Management College of Business AdministrationPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Adjunct Research Faculty Centre for Research Impact&OutcomeChitkara UniversityRajpura140401India
Breast cancer is a type of cancer responsible for higher mortality rates among *** cruelty of breast cancer always requires a promising approach for its earlier *** light of this,the proposed research leverages the re... 详细信息
来源: 评论
ML Based Intrusion Detection Scheme for various types of attacks in a WSN using C4.5 and CART classifiers
收藏 引用
Materials Today: Proceedings 2023年 80卷 3769-3776页
作者: Gite, Pratik Chouhan, Kuldeep Murali Krishna, K. Kumar Nayak, Chinmaya Soni, Mukesh Shrivastava, Amit Department of Computer Science and Engineering IPSA-IES Indore AB Road MP Indore India Department of Computer Science and Engineering I.T.S Engineering College Greater Noida India Department of Electronics and Communication Engineering Vignan's Institute of Information Technology Duvvada Andhra Pradesh Visakhapatnam India Faculty of Emerging Technology Sri Sri University Odisha751001 India Department of Computer Science & Engineering Jagran Lakecity University Bhopal India Department of Computer Science Engineering Swami Vivekanand College of Engineering Khandwa Road Near Tolnaka Vivekanand Knowledge City Indore India
A key component for preserving a WSN's integrity is designing an intrusion detection system (IDS). This article covers several sorts of security threats that may occur in a WSN. It proposes a detection of maliciou... 详细信息
来源: 评论