咨询与建议

限定检索结果

文献类型

  • 65,833 篇 会议
  • 31,802 篇 期刊文献
  • 1,095 册 图书

馆藏范围

  • 98,730 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 59,568 篇 工学
    • 43,084 篇 计算机科学与技术...
    • 34,458 篇 软件工程
    • 16,569 篇 信息与通信工程
    • 9,268 篇 控制科学与工程
    • 7,104 篇 电气工程
    • 7,069 篇 电子科学与技术(可...
    • 6,765 篇 生物工程
    • 5,131 篇 生物医学工程(可授...
    • 4,240 篇 光学工程
    • 4,027 篇 机械工程
    • 3,231 篇 仪器科学与技术
    • 2,958 篇 动力工程及工程热...
    • 2,741 篇 网络空间安全
    • 2,625 篇 化学工程与技术
    • 2,533 篇 安全科学与工程
    • 2,156 篇 交通运输工程
  • 31,835 篇 理学
    • 16,612 篇 数学
    • 9,476 篇 物理学
    • 7,647 篇 生物学
    • 5,308 篇 统计学(可授理学、...
    • 3,595 篇 系统科学
    • 2,868 篇 化学
  • 17,162 篇 管理学
    • 10,478 篇 管理科学与工程(可...
    • 7,392 篇 图书情报与档案管...
    • 4,836 篇 工商管理
  • 5,422 篇 医学
    • 4,510 篇 临床医学
    • 3,977 篇 基础医学(可授医学...
    • 2,447 篇 公共卫生与预防医...
    • 2,360 篇 药学(可授医学、理...
  • 3,001 篇 法学
    • 2,420 篇 社会学
  • 1,782 篇 经济学
  • 1,363 篇 农学
  • 1,281 篇 教育学
  • 557 篇 文学
  • 276 篇 军事学
  • 179 篇 艺术学
  • 34 篇 哲学
  • 21 篇 历史学

主题

  • 3,072 篇 computer science
  • 2,428 篇 accuracy
  • 2,281 篇 feature extracti...
  • 2,278 篇 deep learning
  • 2,033 篇 machine learning
  • 1,871 篇 computational mo...
  • 1,582 篇 training
  • 1,543 篇 internet of thin...
  • 1,387 篇 data mining
  • 1,316 篇 support vector m...
  • 1,247 篇 artificial intel...
  • 1,165 篇 information tech...
  • 1,150 篇 optimization
  • 1,123 篇 predictive model...
  • 1,085 篇 real-time system...
  • 1,077 篇 wireless sensor ...
  • 1,005 篇 convolutional ne...
  • 904 篇 educational inst...
  • 891 篇 security
  • 847 篇 computer archite...

机构

  • 1,009 篇 department of co...
  • 513 篇 maharishi school...
  • 352 篇 department of co...
  • 274 篇 department of ph...
  • 257 篇 faculté des scie...
  • 254 篇 department of ph...
  • 252 篇 department of co...
  • 226 篇 faculty of scien...
  • 220 篇 department of ph...
  • 216 篇 physics division...
  • 209 篇 school of comput...
  • 198 篇 department of ph...
  • 198 篇 department of co...
  • 197 篇 department of ph...
  • 181 篇 departamento de ...
  • 175 篇 school of inform...
  • 167 篇 maharishi school...
  • 158 篇 department of ph...
  • 158 篇 department of ph...
  • 157 篇 school of comput...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 264 篇 g. spigo
  • 263 篇 f. siegert
  • 262 篇 a. c. könig
  • 259 篇 h. a. gordon
  • 259 篇 m. klein
  • 254 篇 r. ströhmer
  • 246 篇 h. sakamoto
  • 242 篇 y. tayalati
  • 232 篇 m. rijssenbeek
  • 203 篇 d. guest
  • 201 篇 n. orlando
  • 200 篇 f. pastore
  • 199 篇 s. jin
  • 185 篇 niyato dusit

语言

  • 94,171 篇 英文
  • 3,324 篇 其他
  • 1,185 篇 中文
  • 120 篇 日文
  • 16 篇 斯洛文尼亚文
  • 12 篇 德文
  • 11 篇 法文
  • 8 篇 朝鲜文
  • 4 篇 荷兰文
  • 3 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 葡萄牙文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Information and Communication Technology"
98730 条 记 录,以下是4991-5000 订阅
排序:
Optimizing DC-DC Buck-Boost Converters with a PID Controller: Harnessing the Power of Silicon Carbide technology  10
Optimizing DC-DC Buck-Boost Converters with a PID Controller...
收藏 引用
10th International Conference on Engineering and Emerging Technologies, ICEET 2024
作者: Qadir, Brzo Aziz Ati, Modafar Erbil Polytechnic University Department of Automation Industrial Technology Erbil Iraq Abu Dhabi University Department of Computer Science & Information Technology Abu Dhabi United Arab Emirates
The DC-DC buck-boost SiC base that was shown in this research uses a PID controller converter and primarily displays a slightly lower output voltage than the input voltage. With the exception of the SiC Schottky diode... 详细信息
来源: 评论
Cybersecurity Challenges to VANET When RFID Tags Utilized: a Study  3
Cybersecurity Challenges to VANET When RFID Tags Utilized: a...
收藏 引用
3rd IEEE International Maghreb Meeting of the Conference on sciences and Techniques of Automatic Control and computer Engineering, MI-STA 2023
作者: Shembesh, Ainor H. Darbi, Mariam K. Benamer, Sami Younis, Younis A. Libyan International Medical University Faculty of It Computer Networks Department Benghazi Libya University of Benghazi Faculty of Information Technology Departwmtnt of Inforamtion Systems Benghazi Libya University of Benghazi Faculty of Information Technology Department of Communication and Computer Networks Benghazi Libya
An emerging new technology called the Vehicular Ad Hoc Network (VANET) uses wireless technologies to enhance inter-vehicle communications and traffic safety. Due to its hybrid network designs, node movement characteri... 详细信息
来源: 评论
Energy-Efficient Multi-Trip Routing for Municipal Solid Waste Collection by Contribution-Based Adaptive Particle Swarm Optimization
收藏 引用
Complex System Modeling and Simulation 2023年 第3期3卷 202-219页
作者: Xiaoning Shen Hongli Pan Zhongpei Ge Wenyan Chen Liyan Song Shuo Wang Collaborative Innovation Center of Atmospheric Environment and Equipment Technology and also with the Jiangsu Key Laboratory of Big Data Analysis TechnologySchool of AutomationNanjing University of Information Science and TechnologyNanjing 210044China School of Automation Nanjing University of Information Science and TechnologyNanjing 210044China Guangdong Provincial Key Laboratory of Brain-Inspired Intelligent Computation the Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China School of Computer Science University of BirminghamBirminghamB152TTUK
Waste collection is an important part of waste management *** costs and carbon emissions can be greatly reduced by proper vehicle ***,each vehicle can work again after achieving its capacity limit and unloading the **... 详细信息
来源: 评论
Framework for Detection of Malware Using Random Forest Classifier  5th
Framework for Detection of Malware Using Random Forest Class...
收藏 引用
5th International Conference on Recent Innovations in Computing , ICRIC 2022
作者: Manzoor, Mohsin Arora, Bhavna Department of Computer Science and Information Technology Central University of Jammu Samba India Samba181143 India
Malware poses a challenging threat to this digital world of communication, as it can manipulate or perform any baffling activity inside a computer by corrupting important files and disabling the network system with ma... 详细信息
来源: 评论
Intelligent Guitar Chord Recognition Using Spectrogram-Based Feature Extraction and AlexNet Architecture for Categorization
收藏 引用
International Journal of Advanced computer science and Applications 2025年 第4期16卷 758-767页
作者: Korade, Nilesh B. Salunke, Mahendra B. Bhosle, Amol A. Sangve, Sunil M. Joshi, Dhanashri M. Asalkar, Gayatri G. Kadu, Sujata R. Sarwade, Jayesh M. Department of Computer Engineering JSPM’s Rajarshi Shahu College of Engineering Tathawade Maharashtra Pune411033 India Department of Computer Engineering PCET’s Pimpri Chinchwad College of Engineering and Research Ravet Maharashtra Pune412101 India Department of Computer Science and Engineering School of Computing MIT Art Design and Technology University Loni Kalbhor Maharashtra Pune412201 India Department of Artificial Intelligence and Data Science Vishwakarma Institute of Technology Bibwewadi Pune411037 India Department of Computer Engineering Terna Engineering College Maharashtra Mumbai India Department of Information Technology JSPM’s Rajarshi Shahu College of Engineering Tathawade Maharashtra Pune411033 India
Chord prediction plays a key role in the advancement of musical technological innovations, such as automatic music transcription, real-time music tutoring, and intelligent composition tools. Accurate chord prediction ... 详细信息
来源: 评论
Influence Ranking of Hate Users in Content Propagation on Twitter  5
Influence Ranking of Hate Users in Content Propagation on Tw...
收藏 引用
5th International Conference on Advanced Research in Computing, ICARC 2025
作者: Perera, Suresha Perera, Indika Ahangama, Supunmali University of Moratuwa Department of Computer Science and Engineering Katubedda Sri Lanka University of Moratuwa Department of Information Technology Katubedda Sri Lanka
Social media platforms are now essential for communication, but they also lead to the quick spread of hate speech, which leaves people and society at serious risk. To lessen the influence of hate content, it is crucia... 详细信息
来源: 评论
Application of computer Vision and Deep Learning Neural Network in Multi-Modal information Fusion  2
Application of Computer Vision and Deep Learning Neural Netw...
收藏 引用
2nd IEEE International Conference on Data science and Network Security, ICDSNS 2024
作者: Wu, Qiongfei Xie, Qubo Xia, Dingchun Wuhan Institute of Design and Science Department of Information Engineering Hubei Wuhan China School of Computer Science&Technology Huazhong University of Science and Technology Hubei Wuhan China School of Computer Science and Artificial Intelligence Wuhan Textile University Hubei Wuhan China
Multimodal data often requires manual annotation for training, and the annotation process is tedious and time-consuming. The lack of labels makes it difficult to build large-scale labeled multi-modal datasets. In resp... 详细信息
来源: 评论
A new symbol timing and carrier frequency offset estimation algorithm for OTFS for B5G  2
A new symbol timing and carrier frequency offset estimation ...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational science, ICERCS 2024
作者: Thangavel, Gunasekaran Rajan, Sheeba Subbulekshmi, S. Anthonisamy, Arun Ganapathi, Rohini Velankanni, Gowri University of Technology and Applied Sciences Department of Electronics and Communication Engineering Muscat Oman SRM Institute of Science and Technology School of Computing Tiruchirapalli India Prathyusha Engineering College Department of Electronics and Communication Engineering Chennai India Panimalar Engineering College Department of Computer Science and Business System Chennai India St. Joseph's Institute of Technology Department of Electronics and Communication Engineering Chennai India K. Ramakrishnan College of Technology Department of Electronics and Communication Engineering Trichy India
In B5G networks, accurate symbol timing estimate and estimation of the carrier frequency offset are both absolutely necessary. Particularly in highly mobile and interference-ridden settings, these factors are of param... 详细信息
来源: 评论
Throughput Enhancement in Wireless Sensor Network by Novel Genetic Algorithm-Fuzzy Method (NGA-F)  3rd
Throughput Enhancement in Wireless Sensor Network by Novel G...
收藏 引用
3rd International Conference on VLSI, communication and Signal processing, VCAS 2020
作者: Prakash, N. Rajalakshmi, M. Nedunchezhian, R. Department of Electronics and Communication Engineering KIT-Kalaignarkarunanidhi Institute of Technology Coimbatore India Department of Computer Science and Engineering and Information Technology Coimbatore Institute of Technology Coimbatore India
Demodulating the unsafe hubs along with reducing the vitality squander in sensor hubs can drag out the life expectancy of remote sensor systems. By doing the examination, adaptive heuristic search algorithms and an ad... 详细信息
来源: 评论
Video key concept extraction using Convolution Neural Network  3
Video key concept extraction using Convolution Neural Networ...
收藏 引用
3rd IEEE International Conference on AI in Cybersecurity, ICAIC 2024
作者: Sardar, Tanvir H Amin Hazarika, Ruhul Pandey, Bishwajeet Guru Prasad, M.S. Mahmudul Hassan, Sk Dodmane, Radhakrishna Gohel, Hardik Dept. of Computer Science & Engg Bengaluru India Manipal Institute of Technology Department of Information Technology Bengaluru India Astana It University Department of Intelligent System and Cyber Security Kazakhstan Dept. of Computer Science & Engg. Dehradun India VIT-AP School of Computer Science and Engineering India Nmam Institute of Technology Department of Computer Science & Engg. Nitte India University of Houston Department of Cse Victoria United States
Objectives: This work aims to develop an automated video summarising methodology and timestamping that uses natural language processing (NLP) tools to extract significant video ***: The methodology comprises extractin... 详细信息
来源: 评论