咨询与建议

限定检索结果

文献类型

  • 7,995 篇 期刊文献
  • 7,954 篇 会议
  • 216 册 图书

馆藏范围

  • 16,164 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 9,552 篇 工学
    • 5,035 篇 计算机科学与技术...
    • 3,898 篇 软件工程
    • 1,662 篇 信息与通信工程
    • 1,659 篇 电子科学与技术(可...
    • 1,524 篇 电气工程
    • 1,344 篇 控制科学与工程
    • 952 篇 光学工程
    • 931 篇 生物工程
    • 872 篇 材料科学与工程(可...
    • 857 篇 化学工程与技术
    • 755 篇 生物医学工程(可授...
    • 673 篇 机械工程
    • 621 篇 仪器科学与技术
    • 523 篇 动力工程及工程热...
    • 438 篇 力学(可授工学、理...
    • 429 篇 核科学与技术
  • 7,635 篇 理学
    • 3,845 篇 物理学
    • 3,064 篇 数学
    • 1,145 篇 生物学
    • 1,038 篇 统计学(可授理学、...
    • 1,026 篇 化学
    • 630 篇 系统科学
  • 1,894 篇 管理学
    • 1,247 篇 管理科学与工程(可...
    • 693 篇 图书情报与档案管...
    • 640 篇 工商管理
  • 786 篇 医学
    • 650 篇 临床医学
    • 549 篇 基础医学(可授医学...
    • 307 篇 药学(可授医学、理...
    • 305 篇 公共卫生与预防医...
  • 322 篇 法学
  • 265 篇 经济学
  • 202 篇 教育学
  • 185 篇 农学
  • 42 篇 文学
  • 28 篇 军事学
  • 23 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 424 篇 computer science
  • 321 篇 deep learning
  • 244 篇 machine learning
  • 179 篇 computational mo...
  • 172 篇 optimization
  • 151 篇 accuracy
  • 134 篇 artificial intel...
  • 132 篇 internet of thin...
  • 131 篇 neural networks
  • 116 篇 educational inst...
  • 115 篇 support vector m...
  • 115 篇 predictive model...
  • 114 篇 data mining
  • 112 篇 feature extracti...
  • 109 篇 real-time system...
  • 107 篇 computational in...
  • 105 篇 image segmentati...
  • 104 篇 computer archite...
  • 99 篇 wireless sensor ...
  • 98 篇 hadrons

机构

  • 1,104 篇 cavendish labora...
  • 1,040 篇 department of ph...
  • 999 篇 physikalisches i...
  • 987 篇 oliver lodge lab...
  • 629 篇 fakultät physik ...
  • 568 篇 school of physic...
  • 562 篇 horia hulubei na...
  • 557 篇 iccub universita...
  • 549 篇 department of ph...
  • 544 篇 school of physic...
  • 536 篇 h.h. wills physi...
  • 528 篇 imperial college...
  • 522 篇 stfc rutherford ...
  • 517 篇 university of ch...
  • 516 篇 nikhef national ...
  • 513 篇 infn laboratori ...
  • 511 篇 school of physic...
  • 510 篇 infn sezione di ...
  • 505 篇 physik-institut ...
  • 501 篇 infn sezione di ...

作者

  • 292 篇 barter w.
  • 268 篇 a. gomes
  • 265 篇 beiter a.
  • 255 篇 c. alexa
  • 255 篇 c. amelung
  • 255 篇 bellee v.
  • 255 篇 blake t.
  • 253 篇 j. m. izen
  • 253 篇 g. bella
  • 253 篇 j. strandberg
  • 253 篇 d. calvet
  • 251 篇 g. spigo
  • 250 篇 f. siegert
  • 249 篇 brundu d.
  • 243 篇 bowcock t.j.v.
  • 241 篇 s. chen
  • 239 篇 betancourt c.
  • 235 篇 borsato m.
  • 230 篇 y. tayalati
  • 230 篇 amato s.

语言

  • 14,050 篇 英文
  • 1,995 篇 其他
  • 119 篇 中文
  • 7 篇 德文
  • 6 篇 日文
  • 4 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 西班牙文
检索条件"机构=Department of Computer Science and Engineering and Department of Applied Math"
16165 条 记 录,以下是1371-1380 订阅
排序:
Comparative Analysis of Machine Learning Algorithms and Datasets for Detecting Cyberbullying on Social Media Platforms
Comparative Analysis of Machine Learning Algorithms and Data...
收藏 引用
2024 International Conference on Computing and Intelligent Reality Technologies, ICCIRT 2024
作者: Palagati, Anusha Balan, Santhosh Kumar Arun Joe Babulo, S. Raja, Laxmi Natarajan, K.K. Kalimuthu, Rajkumar Dept. of Computer Science and Engineering Guru Nanak Institute of Technology Ibrahimpatnam Hyderabad India Department of Computer Applications K.S.R College of Arts and Science for Women Tamilnadu Tiruchengode India Department of Cyber Security Karpagam Academy of Higher Education Tamilnadu Coimbatore India College of Engineering and Technology University of Technology and Applied Sciences Al Mussanah Oman Department of Cyber Security Guru Nanak Institute of Technology Ibrahimpatnam Hyderabad India
Cyberbullying is defined as sharing of undesirable material in the cyberspace, primarily- the use of the social sites that instigate hostility and create feelings of hatred among the individuals. Another increasing th... 详细信息
来源: 评论
The Reliability of Information Sources: Student Perceptions and Educational Opportunities  7
The Reliability of Information Sources: Student Perceptions ...
收藏 引用
7th IEEE International Conference and Workshop Obuda on Electrical and Power engineering, CANDO-EPE 2024
作者: Kollar, Anita Mihalovicsne Katona, Jozsef Obuda University Institute of Electronics and Communication Systems Kandó Kálmán Faculty of Electrical Engineering Budapest Hungary John Von Neumann University GAMF Faculty of Engineering and Computer Science Kecskemet Hungary Budapest Business University Faculty of Finance and Accountancy Department of Applied Quantitative Methods Budapest Hungary Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary
The modern digital age demands the skills to be able to assess information. In the current world, access to information and knowledge is abundant from different sources. Indeed, high-quality data are much needed in ed... 详细信息
来源: 评论
Review of on-board conductive charger topologies for electric transportation
收藏 引用
International Journal of Power Electronics 2023年 第4期17卷 406-442页
作者: Vijaya Anand, N. Jaya Sai Praneeth, A.V. Yalla, Naveen Sood, Vijay K. Department of EEE P.V.P. Siddhartha Institute of Technology Kanuru Vijayawada520007 India Advance Engineering Group Borg Warner Technical Center Bascharage Luxembourg Varanasi221005 India Department of Electrical Computer and Software Engineering Faculty of Engineering and Applied Science Ontario Tech University 2000 Simcoe Street North OshawaONL1H 7K4 Canada
This paper presents an overview of on-board conductive charger topologies for electric vehicles (EVs). Battery packs in electric and plug-in hybrid electric vehicles (EVs/PHEVs) need frequent energy refills to fulfil ... 详细信息
来源: 评论
Deep Reinforcement Learning-Based Robust Design for an IRS-Assisted MISO-NOMA System
IEEE Transactions on Machine Learning in Communications and ...
收藏 引用
IEEE Transactions on Machine Learning in Communications and Networking 2024年 2卷 424-441页
作者: Waraiet, Abdulhamed Cumanan, Kanapathippillai Ding, Zhiguo Dobre, Octavia A. University of York School of Physics Engineering and Technology YorkYO10 5DD United Kingdom Khalifa University Department of Computer and Communication Engineering Abu Dhabi United Arab Emirates Memorial University Faculty of Engineering and Applied Science St. John'sNLA1C 5S7 Canada
In this paper, we propose a robust design for an intelligent reflecting surface (IRS)-assisted multiple-input single output non-orthogonal multiple access (NOMA) system. By considering channel uncertainties, the origi... 详细信息
来源: 评论
The Least Square QR Method Improves Extreme Learning Machine
The Least Square QR Method Improves Extreme Learning Machine
收藏 引用
2023 IEEE World Conference on applied Intelligence and Computing, AIC 2023
作者: Subramani, Chinnamuthu Kuppili, Venkatanareshbabu Keshavamurthy, B.N. Jagannath, Ravi Prasad K. Prashanth, Gurusiddappa R. National Institute of Technology Goa Department of Applied Sciences Goa Ponda403401 India National Institute of Technology Goa Department of Computer Science and Engineering Goa Ponda403401 India National Institute of Technology Goa Department of Electronics and Communication Engineering Goa Ponda403401 India
The Extreme Learning Machine (ELM) is a fast and straightforward learning algorithm designed for single hidden layer feed-forward neural networks (SLFNs). The ELM randomly assigns input weights and calculates the outp... 详细信息
来源: 评论
Autonomic IoT Pet Health Monitoring System
Autonomic IoT Pet Health Monitoring System
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Shultz, Michael Rouff, Christopher Tekeoglu, Ali Johns Hopkins University Whiting School of Engineering Computer Science Department United States Johns Hopkins University Applied Physics Laboratory Jhu Whiting School of Engineering United States Leidos Innovations Center Johns Hopkins University Whiting School of Engineering United States
Internet of Things (IoT) devices have seen an uptick in popularity in recent years for individual health tracking, allowing for a person to monitor their health in real time. Simultaneously, pet care devices have also... 详细信息
来源: 评论
Measurement of Dissemination Characteristics of LTE-V2X and ITS-G5 for Safety-Critical Vehicle-to-Vehicle Communication  5
Measurement of Dissemination Characteristics of LTE-V2X and ...
收藏 引用
5th International Conference on Advanced Communication Technologies and Networking, CommNet 2022
作者: Stellwagen, Jochen Deegener, Matthias Kuhn, Michael Frankfurt University of Applied Sciences Facility 2: Computer Science and Engineering Frankfurt a.M. Germany Darmstadt University of Applied Sciences Department of Electrical Engineering Darmstadt Germany
Vehicle-to-vehicle communication enables the exchange of information between road users with the aim of improving safety and efficiency in the traffic environment. The highly dynamic environment with fast moving parti... 详细信息
来源: 评论
Archery Algorithm:A Novel Stochastic Optimization Algorithm for Solving Optimization Problems
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 399-416页
作者: Fatemeh Ahmadi Zeidabadi Mohammad Dehghani Pavel Trojovsky Štěpán Hubálovsky Victor Leiva Gaurav Dhiman Department of Mathematics and Computer Sciences Sirjan University of TechnologySirjanIran Department of Mathematics Faculty of ScienceUniversity of Hradec Králové50003Hradec KrálovéCzech Republic Department of Applied Cybernetics Faculty of ScienceUniversity of Hradec Králové50003Hradec KrálovéCzech Republic School of Industrial Engineering Pontificia Universidad Católica de ValparaísoValparaíso2362807Chile Department of Computer Science Government Bikram College of CommercePatialaPunjabIndia
Finding a suitable solution to an optimization problem designed in science is a major ***,these must be addressed utilizing proper *** on a random search space,optimization algorithms can find acceptable solutions to ... 详细信息
来源: 评论
Discovering High Utility Episodes in Sequences
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第3期4卷 473-486页
作者: Gan, Wensheng Lin, Jerry Chun-Wei Chao, Han-Chieh Yu, Philip S. Jinan University College of Cyber Security Guangzhou510632 China Pazhou Lab Guangzhou510330 China Western Norway University of Applied Sciences Department of Computing Mathematics and Physics Bergen5063 Norway National Dong Hwa University Department of Electrical Engineering Hualien974 Taiwan University of Illinois at Chicago Department of Computer Science ChicagoIL60607 United States
Sequence data are more commonly seen than other types of data (e.g., transaction data) in real-world applications. For the mining task from sequence data, several problems have been formulated, such as sequential patt... 详细信息
来源: 评论
ACPPS: Autonomic Computing based Phishing Protection System  14
ACPPS: Autonomic Computing based Phishing Protection System
收藏 引用
2024 IEEE 14th Annual Computing and Communication Workshop and Conference, CCWC 2024
作者: Mazur, Jordan Rouff, Christopher Tekeoglu, Ali Johns Hopkins University Whiting School of Engineering Computer Science Department United States Johns Hopkins University Applied Physics Laboratory & Jhu Whiting School of Engineering United States Leidos Innovations Center Johns Hopkins University Whiting School of Engineering United States
Phishing attacks are one of the most common initial access vectors malicious actors utilize to get into personal and corporate systems. The weakest component of a system in terms of security is the human user, which i... 详细信息
来源: 评论