咨询与建议

限定检索结果

文献类型

  • 8,063 篇 期刊文献
  • 7,991 篇 会议
  • 216 册 图书

馆藏范围

  • 16,269 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 9,437 篇 工学
    • 5,105 篇 计算机科学与技术...
    • 3,929 篇 软件工程
    • 1,697 篇 信息与通信工程
    • 1,635 篇 电子科学与技术(可...
    • 1,518 篇 电气工程
    • 1,381 篇 控制科学与工程
    • 974 篇 光学工程
    • 936 篇 生物工程
    • 862 篇 化学工程与技术
    • 837 篇 材料科学与工程(可...
    • 760 篇 生物医学工程(可授...
    • 685 篇 机械工程
    • 630 篇 仪器科学与技术
    • 536 篇 动力工程及工程热...
    • 443 篇 力学(可授工学、理...
    • 298 篇 安全科学与工程
  • 7,705 篇 理学
    • 3,878 篇 物理学
    • 3,072 篇 数学
    • 1,156 篇 生物学
    • 1,037 篇 化学
    • 1,026 篇 统计学(可授理学、...
    • 630 篇 系统科学
  • 1,930 篇 管理学
    • 1,275 篇 管理科学与工程(可...
    • 708 篇 图书情报与档案管...
    • 644 篇 工商管理
  • 800 篇 医学
    • 658 篇 临床医学
    • 553 篇 基础医学(可授医学...
    • 311 篇 公共卫生与预防医...
    • 308 篇 药学(可授医学、理...
  • 331 篇 法学
  • 266 篇 经济学
  • 203 篇 教育学
  • 189 篇 农学
  • 44 篇 文学
  • 28 篇 军事学
  • 23 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 424 篇 computer science
  • 328 篇 deep learning
  • 243 篇 machine learning
  • 172 篇 computational mo...
  • 170 篇 optimization
  • 150 篇 accuracy
  • 136 篇 artificial intel...
  • 133 篇 internet of thin...
  • 130 篇 neural networks
  • 115 篇 support vector m...
  • 114 篇 educational inst...
  • 110 篇 data mining
  • 109 篇 predictive model...
  • 107 篇 computational in...
  • 106 篇 image segmentati...
  • 104 篇 computer archite...
  • 103 篇 feature extracti...
  • 102 篇 real-time system...
  • 98 篇 hadrons
  • 96 篇 wireless sensor ...

机构

  • 1,104 篇 cavendish labora...
  • 1,038 篇 department of ph...
  • 1,000 篇 physikalisches i...
  • 987 篇 oliver lodge lab...
  • 629 篇 fakultät physik ...
  • 568 篇 school of physic...
  • 562 篇 horia hulubei na...
  • 557 篇 iccub universita...
  • 549 篇 department of ph...
  • 544 篇 school of physic...
  • 538 篇 h.h. wills physi...
  • 528 篇 imperial college...
  • 522 篇 stfc rutherford ...
  • 518 篇 university of ch...
  • 516 篇 nikhef national ...
  • 511 篇 school of physic...
  • 511 篇 infn laboratori ...
  • 509 篇 infn sezione di ...
  • 503 篇 physik-institut ...
  • 501 篇 infn sezione di ...

作者

  • 292 篇 barter w.
  • 268 篇 a. gomes
  • 260 篇 beiter a.
  • 255 篇 c. alexa
  • 255 篇 c. amelung
  • 255 篇 bellee v.
  • 255 篇 blake t.
  • 253 篇 j. m. izen
  • 253 篇 g. bella
  • 253 篇 j. strandberg
  • 253 篇 d. calvet
  • 251 篇 g. spigo
  • 250 篇 f. siegert
  • 249 篇 brundu d.
  • 243 篇 bowcock t.j.v.
  • 243 篇 s. chen
  • 239 篇 betancourt c.
  • 235 篇 borsato m.
  • 230 篇 y. tayalati
  • 230 篇 amato s.

语言

  • 13,431 篇 英文
  • 2,729 篇 其他
  • 124 篇 中文
  • 8 篇 德文
  • 6 篇 日文
  • 5 篇 法文
  • 2 篇 朝鲜文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 芬兰文
检索条件"机构=Department of Computer Science and Engineering and the Applied Math Department"
16270 条 记 录,以下是4441-4450 订阅
排序:
Tracking and Calculating Speed of Mixing Vehicles Using YOLOv4 and DeepSORT  9
Tracking and Calculating Speed of Mixing Vehicles Using YOLO...
收藏 引用
9th NAFOSTED Conference on Information and computer science, NICS 2022
作者: Huu, Phat Nguyen Anh, Bang Nguyen Nam, Vu Tran Ngoc Hoang, Tran Manh Nguyen, Tien Dzung Minh, Quang Tran School of Electrical and Electronic Engineering Hanoi University of Science and Technology Hanoi Viet Nam Specialized Math Class HUS High School for Gifted Students Hanoi Viet Nam Ho Chi Minh City University of Technology Faculty of Computer Science and Engineering Department of Information Systems Hochiminh Viet Nam Vietnam National University HoChiMinh City Hochiminh Viet Nam
Today, strong development of socio-economic has promoted participation in traffic. As a result, traffic management is becoming more and more difficult. To effectively solve the problem, artificial intelligence (AI) ap... 详细信息
来源: 评论
Botnet Attack Intrusion Detection In IoT Enabled Automated Guided Vehicles
Botnet Attack Intrusion Detection In IoT Enabled Automated G...
收藏 引用
IEEE International Conference on Big Data
作者: Sumaiya Shaikh Ch. Rupa Gautam Srivastava Thippa Reddy Gadekallu Department of CSE Lords Institute of Engineering and Technology Hyderabad India Department of CSE VR Siddhartha Engineering College Vijayawada India Department of Math and Computer Science Brandon University Canada School of Information Technology and Engineering Vellore Institute of Technology India Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon
The Internet of Things (IoT), with the ease of access of Automated Vehicles, is the most reliable technology in the 21 st century making every possible thing within seconds. The people in this era are blessed with al... 详细信息
来源: 评论
MIND-WANDERING DETECTION MODEL WITH ELECTROENCEPHALOGRAM  18
MIND-WANDERING DETECTION MODEL WITH ELECTROENCEPHALOGRAM
收藏 引用
18th International Conference on Cognition and Exploratory Learning in Digital Age, CELDA 2021
作者: Rungsilp, Chutimon Piromsopa, Krerk Viriyopase, Atthaphon U-Yen, Kongpop Department of Computer Engineering Faculty of Engineering Chulalongkorn University Bangkok Thailand Research Group on Applied Digital Technology in Medicine Chulalongkorn University Bangkok Thailand Future Innovation Science and Technology Chulalongkorn University Bangkok Thailand
The study of mind-wandering is popular since it is linked to the emotional problems and working/learning performance. In terms of education, it impacts comprehension during learning which affects academic success. The... 详细信息
来源: 评论
The Space Digital Dome: Autonomous Defense of Space Vehicles from Radio Frequency Interference
The Space Digital Dome: Autonomous Defense of Space Vehicles...
收藏 引用
2022 IEEE Aerospace Conference, AERO 2022
作者: Falco, Gregory Gordon, Nathaniel G. Byerly, Adam Grotto, Andrew Siegel, Josh Zanlongo, Sebastian Institute for Assured Autonomy Johns Hopkins University Department of Civil & Systems Engineering BaltimoreMD United States Applied Physics Laboratory Johns Hopkins University LaurelMD United States Cyber Policy Center Stanford University StanfordCA United States Michigan State University Department of Computer Science East LansingMI United States
While awareness of active threats is critical to space vehicles, action is required to avoid harm. Physical hazard avoidance requires orbital manipulation using propulsion, whereas options for avoiding or nullifying r... 详细信息
来源: 评论
A Classifier to Detect Stream Applications Based on Network Traffic Statistical Metrics
A Classifier to Detect Stream Applications Based on Network ...
收藏 引用
Information Technology (ACIT)
作者: Omar Darwish Sarah Herzallah Majdi Maabreh Shouroq Al-Eidi Mahmoud Al-Maani Yahya Tashtoush Information Security and Applied Computing Eastern Michigan University Ypsilanti Michigan Electrical and Computer Engineering Eastern Michigan University Ypsilanti Michigan Department of Information Technology The Hashemite University Zarqa Jordan Computer Science Department Tafila Technical University Tafila Jordan Department of Computer Science Jordan University of Science and Technology Irbid Jordan
One of the most crucial considerations, when considering security vulnerabilities, is network traffic. There is still potential for more research on the inter-arrival time side, even though some studies concentrate on... 详细信息
来源: 评论
Glioma/Glioblastoma Detection in Brain MRI using Pre-trained Deep-Learning Scheme  3
Glioma/Glioblastoma Detection in Brain MRI using Pre-trained...
收藏 引用
3rd International Conference on Intelligent Computing, Instrumentation and Control Technologies, ICICICT 2022
作者: Rajinikanth, Venkatesan Kadry, Seifedine Damasevicius, Robertas Sujitha, R. Angel Balaji, Gangadharam Mohammed, Mazin Abed Noroff University College Faculty of Applied Computing and Technology Kristiansand94612 Norway Vytautas Magnus University Department of Applied Informatics Kaunas44404 Lithuania St. Joseph's College of Engineering Department of Electronics and Instrumentation Engineering Omr Chennai600119 India M/S Tata Consultancy Services Limited Tcsl Siruseri Sez Unit Sipcot I.T. Park TN Chennai603103 India University of Anbar College of Computer Science and Information Technology Ramadi31001 Iraq
Convolutional Neural Network (CNN) supported medicinal image examination is extensively accepted due to its reputation and improved accuracy. The investigational outcome obtained with DLS along with a chosen classifie... 详细信息
来源: 评论
HomOpt: A Homotopy-Based Hyperparameter Optimization Method
arXiv
收藏 引用
arXiv 2023年
作者: Abraham, Sophia J. Maduranga, Kehelwala D.G. Kinnison, Jeffery Carmichael, Zachariah Hauenstein, Jonathan D. Scheirer, Walter J. Department of Computer Science and Engineering University of Notre Dame Notre DameIN46556 United States Department of Mathematics Tennessee Tech University CookevilleTN38505 United States Department of Applied and Computational Mathematics and Statistics University of Notre Dame Notre DameIN46556 United States
Machine learning has achieved remarkable success over the past couple of decades, often attributed to a combination of algorithmic innovations and the availability of high-quality data available at scale. However, a t... 详细信息
来源: 评论
High-power quantum walk frequency combs
arXiv
收藏 引用
arXiv 2025年
作者: Letsou, Theodore P. Fuchsberger, Johannes Opačak, Nikola Kazakov, Dmitry Schwarz, Benedikt Capasso, Federico Harvard John A. Paulson School of Engineering and Applied Sciences Harvard University CambridgeMA02138 United States Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology CambridgeMA02142 United States Institute of Solid State Electronics TU Wien Vienna1040 Austria
High-power, broadband frequency combs generated by semiconductor lasers have profound implications for on-chip spectroscopy. Here, we present a dry-etched racetrack quantum cascade laser that uses resonant radio-frequ... 详细信息
来源: 评论
A Comparative Study of Deep Learning Robustness for Sensor-based Human Activity Recognition
A Comparative Study of Deep Learning Robustness for Sensor-b...
收藏 引用
International Conference on Telecommunications and Signal Processing (TSP)
作者: Sakorn Mekruksavanich Anuchit Jitpattanakul Department of Computer Engineering School of Information and Communication Technology University of Phayao Phayao Thailand Department of Mathematics Faculty of Applied Science Intelligent and Nonlinear Dynamic Innovations Research Center King Mongkut’s University of Technology North Bangkok Bangkok Thailand
Recognition of human activities has become a highly significant area of research in the current era of the Internet of Things and A.I. technologies. Human activity recognition (HAR) plays a crucial role in monitoring ...
来源: 评论
AlgoXSSF: Detection and Analysis of Cross-Site Request Forgery (XSRF) and Cross-Site Scripting (XSS) Attacks via Machine Learning Algorithms
AlgoXSSF: Detection and Analysis of Cross-Site Request Forge...
收藏 引用
International Symposium on Digital Forensic and Security (ISDFS)
作者: Naresh Kshetri Dilip Kumar James Hutson Navneet Kaur Omar Faruq Osama School of Business & Technology Emporia State University Emporia KS USA Laboratory of Applied Cryptology and Security (LACS) Indian Institute of Technology Mandi India Department of Art History & Culture Lindenwood University Saint Charles Missouri Department of Computer Science University of Missouri St. Louis Missouri USA Department of Systems Science and Industrial Engineering Binghamton University SUNY Binghamton NY USA
The global rise in online users and devices has led to a corresponding surge in cybercrimes and attacks, demanding advanced technology and algorithms like Artificial Intelligence (AI), Deep Learning, and Machine Learn... 详细信息
来源: 评论