咨询与建议

限定检索结果

文献类型

  • 15,677 篇 会议
  • 9,971 篇 期刊文献
  • 447 册 图书

馆藏范围

  • 26,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,259 篇 工学
    • 9,638 篇 计算机科学与技术...
    • 7,742 篇 软件工程
    • 3,231 篇 信息与通信工程
    • 3,053 篇 控制科学与工程
    • 2,081 篇 电气工程
    • 1,820 篇 电子科学与技术(可...
    • 1,658 篇 生物工程
    • 1,310 篇 机械工程
    • 1,303 篇 生物医学工程(可授...
    • 995 篇 光学工程
    • 810 篇 动力工程及工程热...
    • 798 篇 仪器科学与技术
    • 705 篇 化学工程与技术
    • 610 篇 材料科学与工程(可...
    • 557 篇 安全科学与工程
    • 542 篇 交通运输工程
  • 8,748 篇 理学
    • 4,511 篇 数学
    • 2,311 篇 物理学
    • 1,977 篇 生物学
    • 1,541 篇 统计学(可授理学、...
    • 1,463 篇 系统科学
    • 814 篇 化学
  • 3,828 篇 管理学
    • 2,532 篇 管理科学与工程(可...
    • 1,423 篇 图书情报与档案管...
    • 1,296 篇 工商管理
  • 1,384 篇 医学
    • 1,158 篇 临床医学
    • 979 篇 基础医学(可授医学...
    • 565 篇 药学(可授医学、理...
    • 518 篇 公共卫生与预防医...
  • 709 篇 法学
    • 584 篇 社会学
  • 459 篇 经济学
  • 316 篇 教育学
  • 276 篇 农学
  • 70 篇 文学
  • 54 篇 军事学
  • 40 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,114 篇 computer science
  • 482 篇 deep learning
  • 356 篇 systems engineer...
  • 341 篇 computational mo...
  • 331 篇 machine learning
  • 318 篇 application soft...
  • 318 篇 artificial intel...
  • 290 篇 computer archite...
  • 264 篇 control systems
  • 260 篇 internet of thin...
  • 235 篇 support vector m...
  • 232 篇 feature extracti...
  • 224 篇 accuracy
  • 217 篇 optimization
  • 209 篇 neural networks
  • 208 篇 software enginee...
  • 198 篇 information syst...
  • 194 篇 training
  • 193 篇 laboratories
  • 184 篇 routing

机构

  • 55 篇 shanghai key lab...
  • 46 篇 department of la...
  • 46 篇 department of el...
  • 44 篇 department of co...
  • 44 篇 department of sy...
  • 42 篇 department of el...
  • 42 篇 department of sy...
  • 42 篇 department of el...
  • 39 篇 department of co...
  • 39 篇 department of in...
  • 37 篇 department of co...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 33 篇 department of co...
  • 33 篇 school of comput...
  • 32 篇 department of co...
  • 31 篇 academy of mathe...
  • 30 篇 department of co...
  • 27 篇 department of co...
  • 27 篇 department of co...

作者

  • 93 篇 niyato dusit
  • 55 篇 rajkumar buyya
  • 52 篇 hisao ishibuchi
  • 43 篇 m. zahn
  • 41 篇 e. rogers
  • 40 篇 bernhard schölko...
  • 34 篇 abdelwahed motwa...
  • 33 篇 sofotasios pasch...
  • 28 篇 hong choong seon
  • 26 篇 jiang liu
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 shen xuemin
  • 24 篇 liu jiaming
  • 23 篇 tao yang
  • 23 篇 j.h. lang
  • 22 篇 soni mukesh
  • 20 篇 liu xin
  • 20 篇 lin iuon-chang
  • 19 篇 ferrara antonell...
  • 19 篇 lindemann lars

语言

  • 24,565 篇 英文
  • 1,274 篇 其他
  • 224 篇 中文
  • 32 篇 日文
  • 7 篇 德文
  • 3 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Department of Computer Science and Engineering of Systems"
26095 条 记 录,以下是671-680 订阅
排序:
Deep Ear Biometrics for Gender Classification  4th
Deep Ear Biometrics for Gender Classification
收藏 引用
4th International Conference on Communication, Devices and Computing (ICCDC 2023)
作者: Singh, Ritwiz Kashyap, Keshav Mukherjee, Rajesh Bera, Asish Chakraborty, Mamata Dalui Department of Computer Science and Engineering Haldia Institute of Technology WB Haldia India Department of Computer Science and Information Systems Birla Institute of Technology and Science Pilani Rajasthan Pilani Campus 333031 India Department of Computer Science and Engineering National Institute of Technology West Bengal Durgapur India
Human gender classification based on biometric features is a major concern for computer vision due to its vast variety of applications. The human ear is popular among researchers as a soft biometric trait, because it ... 详细信息
来源: 评论
Neural Gas Counter Propagation Neural Network (NG CPNN): A Novel Model for Face Recognition
Neural Gas Counter Propagation Neural Network (NG CPNN): A N...
收藏 引用
2024 International Conference on science, engineering and Business for Driving Sustainable Development Goals, SEB4SDG 2024
作者: Olagunju, Kazeem Michael Samuel Falohun, Adeleye Oke, Alice Oluwafunke Adebiyi, Marion O. Landmark University Directorate of Centre for Systems and Information Services Omu-Aran Nigeria LAUTECH Department of Computer Engineering Ogbomoso Nigeria Landmark University Department of Computer Science Omu-Aran Nigeria
The advent of biometric technology has enhanced security in various ways, especially by lowering the propensity for circumvention which was obtainable in traditional recognition measures such as the use of passwords, ... 详细信息
来源: 评论
Successful Integration of IoT and Blockchain Technologies Using Several Machine Learning Algorithms  5
Successful Integration of IoT and Blockchain Technologies Us...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Calarany, C. Indumathy, M. Senthilraja, P. Suganya, D. Gopi Vardhan, V. Rahul, Yelisetty Shanmukh Tagore Government Arts and Science College Department of Computer Science Puducherry India Rajiv Gandhi College of Engineering & Technology Department of Information Technology Kirumampakkam India K.S.Rangasamy College of Technology Department of Computer Science Tamil Nadu India Rajiv Gandhi College of Engineering & Technology Department of Computer Science Kirumampakkam India Data Science and Business Systems Srm Institute of Science and Technology Kattankulathur India
Internet of Things (IoT) produces massive amounts of data that need to be processed and saved securely. The strong features of Blockchain makes it as a best candidate for storing the data received from IoT sensors. Ho... 详细信息
来源: 评论
ICON: Improving Inter-Report Consistency in Radiology Report Generation via Lesion-aware Mixup Augmentation
ICON: Improving Inter-Report Consistency in Radiology Report...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Hou, Wenjun Cheng, Yi Xu, Kaishuai Hu, Yan Li, Wenjie Liu, Jiang Department of Computing The Hong Kong Polytechnic University Hong Kong Research Institute of Trustworthy Autonomous Systems and Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
Previous research on radiology report generation has made significant progress in terms of increasing the clinical accuracy of generated *** this paper, we emphasize another crucial quality that it should possess, i.e... 详细信息
来源: 评论
Investigating User Preferences for Conversation Design of Voice Assistant systems using Linguistic Features  67th
Investigating User Preferences for Conversation Design of Vo...
收藏 引用
67th International Annual Meeting of the Human Factors and Ergonomics Society, HFES 2023
作者: Sargsyan, Lilit Choi, Seungju Kim, Sang-Hwan Department of Industrial and Manufacturing Systems Engineering College of Engineering and Computer Science University of Michigan – Dearborn DearbornMI United States
As the use of voice assistant (VA) systems is increasing, conversation design in the system is important for effective human-system interaction. The objective of the study was to investigate the level of user preferen... 详细信息
来源: 评论
Image Hiding with High Robustness Based on Dynamic Region Attention in the Wavelet Domain
收藏 引用
computer Modeling in engineering & sciences 2024年 第10期141卷 847-869页
作者: Zengxiang Li Yongchong Wu Alanoud Al Mazroa Donghua Jiang Jianhua Wu Xishun Zhu Department of Information Engineering Gongqing CollegeNanchang UniversityJiujiang332020China School of Information Engineering Gongqing Institute of Science and TechnologyJiujiang332020China Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia School of Computer Science and Engineering Sun Yat-sen UniversityGuangzhou511400China School of Information Engineering Nanchang UniversityNanchang330031China School of Mathematics and Statistics Hainan Normal UniversityHaikou571158China
Hidden capacity,concealment,security,and robustness are essential indicators of hiding ***,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the *** ... 详细信息
来源: 评论
Intelligent identification of hate speeches to address the increased rate of individual mental degeneration
Intelligent identification of hate speeches to address the i...
收藏 引用
2022 International Conference on ENTERprise Information systems, CENTERIS 2022 - International Conference on Project MANagement, ProjMAN 2022 and International Conference on Health and Social Care Information systems and Technologies, HCist 2022
作者: Ava, Lamima Tabassum Karim, Asif Hassan, Md. Mehedi Faisal, Fahad Azam, Sami Al Haque, A.S.M. Farhan Zaman, Sadika Computer Science and Engineering Bangladesh University of Business and Technology Dhaka Bangladesh College of Engineering IT and Environment Charles Darwin University NT Australia Department of Computer Science and Engineering North Western University Khulna Bangladesh Department of Computer Science and Engineering Daffodil International University Dhaka Bangladesh Department of Electronic Systems Aalborg University Copenhagen Denmark Department of Computer Science and Engineering North Western University Khulna Bangladesh
Hate speech is a public statement that demonstrates resentment or provokes disturbance towards a person or group often based upon race, age, religion, sexual orientation, minority group, psychical disability, politica... 详细信息
来源: 评论
Depth First:Optimal Path Discovery Between Designated Nodes in Random Ring-Based Graphs
收藏 引用
China Communications 2024年 第9期21卷 225-241页
作者: Li Qi Xu Jiasheng Zhang Haonan Kang Huquan Fu Luoyi Long Fei Wang Xinbing Department of Electronic Engineering Shanghai Jiao Tong UniversityShanghai 200240China Department of Computer Science and Engineering Shanghai Jiao Tong UniversityShanghai 200240China State Key Laboratory of Media Convergence Production Technology and Systems Xinhua News AgencyBeijing 100077China
This paper focuses on optimally determining the existence of connected paths between some given nodes in random ring-based *** as a fundamental underlying structure in network modeling,ring topology appears as commonp... 详细信息
来源: 评论
Suitable is the Best: Task-Oriented Knowledge Fusion in Vulnerability Detection  38
Suitable is the Best: Task-Oriented Knowledge Fusion in Vuln...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Wang, Jingjing Huang, Minhuan Nie, Yuanpin Li, Xiang Du, Qianjin Kong, Wei Deng, Huan Kuang, Xiaohui Institute of Systems Engineering Academy of Military Sciences PLA China Department of Computer Science and Technology Tsinghua University China School of Information Science and Engineering Zhejiang Sci-Tech University China
Deep learning technologies have demonstrated remarkable performance in vulnerability detection. Existing works primarily adopt a uniform and consistent feature learning pattern across the entire target set. While desi...
来源: 评论
State of Health Estimation of Lithium-Ion Batteries Based on Relaxation Voltage Reconstruction and AM-LSTM Method
收藏 引用
IEEE Transactions on Transportation Electrification 2025年 第3期11卷 7261-7273页
作者: Wei, Liangliang Xu, Hongzhang Sun, Yiwen Diao, Qi Tan, Xiaojun Fan, Yuqian Liu, Han School of Intelligent Systems Engineering Shenzhen518107 China Henan Institute of Science and Technology School of Computer Science and Technology Henan Xinxiang453003 China Dongguan Institute Sun Yat-sen University Guangdong Dongguan523808 China Hong Kong Polytechnic University Department of Building and Energy Engineering Hong Kong
It is essential to accurately estimate the state of health (SOH) for lithium-ion batteries from the perspectives of safety and reliability. Most existing data-driven methods are, however, based on charging or discharg... 详细信息
来源: 评论