咨询与建议

限定检索结果

文献类型

  • 35,147 篇 会议
  • 25,662 篇 期刊文献
  • 916 册 图书

馆藏范围

  • 61,725 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35,969 篇 工学
    • 21,452 篇 计算机科学与技术...
    • 17,171 篇 软件工程
    • 7,441 篇 信息与通信工程
    • 6,417 篇 控制科学与工程
    • 5,233 篇 电气工程
    • 4,717 篇 电子科学与技术(可...
    • 3,863 篇 生物工程
    • 3,439 篇 生物医学工程(可授...
    • 3,009 篇 机械工程
    • 2,586 篇 化学工程与技术
    • 2,575 篇 光学工程
    • 2,296 篇 动力工程及工程热...
    • 2,281 篇 仪器科学与技术
    • 1,982 篇 材料科学与工程(可...
    • 1,255 篇 安全科学与工程
    • 1,216 篇 交通运输工程
  • 23,059 篇 理学
    • 10,511 篇 数学
    • 8,253 篇 物理学
    • 4,711 篇 生物学
    • 3,457 篇 统计学(可授理学、...
    • 2,844 篇 系统科学
    • 2,802 篇 化学
  • 8,711 篇 管理学
    • 5,582 篇 管理科学与工程(可...
    • 3,371 篇 图书情报与档案管...
    • 2,861 篇 工商管理
  • 3,610 篇 医学
    • 2,989 篇 临床医学
    • 2,505 篇 基础医学(可授医学...
    • 1,500 篇 药学(可授医学、理...
    • 1,310 篇 公共卫生与预防医...
  • 1,518 篇 法学
    • 1,283 篇 社会学
  • 1,127 篇 经济学
  • 856 篇 农学
  • 740 篇 教育学
  • 172 篇 文学
  • 126 篇 军事学
  • 79 篇 艺术学
  • 9 篇 哲学
  • 6 篇 历史学

主题

  • 1,745 篇 computer science
  • 1,084 篇 deep learning
  • 1,054 篇 accuracy
  • 1,045 篇 machine learning
  • 945 篇 artificial intel...
  • 931 篇 computational mo...
  • 764 篇 feature extracti...
  • 662 篇 training
  • 659 篇 internet of thin...
  • 611 篇 control systems
  • 608 篇 optimization
  • 560 篇 neural networks
  • 494 篇 data mining
  • 490 篇 predictive model...
  • 469 篇 support vector m...
  • 453 篇 systems engineer...
  • 443 篇 testing
  • 435 篇 real-time system...
  • 408 篇 computer archite...
  • 407 篇 robustness

机构

  • 1,097 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 977 篇 physikalisches i...
  • 972 篇 oliver lodge lab...
  • 660 篇 infn laboratori ...
  • 631 篇 infn sezione di ...
  • 616 篇 infn sezione di ...
  • 607 篇 infn sezione di ...
  • 601 篇 university of ch...
  • 601 篇 fakultät physik ...
  • 558 篇 school of physic...
  • 543 篇 horia hulubei na...
  • 536 篇 department of ph...
  • 535 篇 school of physic...
  • 520 篇 imperial college...
  • 519 篇 iccub universita...
  • 517 篇 h.h. wills physi...
  • 516 篇 nikhef national ...
  • 508 篇 stfc rutherford ...
  • 507 篇 school of physic...

作者

  • 263 篇 barter w.
  • 254 篇 a. gomes
  • 245 篇 c. alexa
  • 243 篇 beiter a.
  • 241 篇 j. m. izen
  • 238 篇 g. bella
  • 238 篇 j. strandberg
  • 235 篇 c. amelung
  • 234 篇 d. calvet
  • 234 篇 bellee v.
  • 230 篇 j. wang
  • 228 篇 g. spigo
  • 227 篇 blake t.
  • 227 篇 s. chen
  • 225 篇 brundu d.
  • 223 篇 bowcock t.j.v.
  • 218 篇 amato s.
  • 217 篇 f. siegert
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.

语言

  • 57,905 篇 英文
  • 3,129 篇 其他
  • 467 篇 中文
  • 202 篇 日文
  • 25 篇 德文
  • 19 篇 法文
  • 7 篇 俄文
  • 5 篇 斯洛文尼亚文
  • 4 篇 西班牙文
  • 4 篇 葡萄牙文
  • 3 篇 朝鲜文
  • 3 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Systems Engineering Faculty of Engineering"
61725 条 记 录,以下是1231-1240 订阅
排序:
An Active Image Forgery Detection Approach Based on Edge Detection
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1603-1619页
作者: Hüseyin Bilal Macit Arif Koyun Department of IT Systems and Technologies Mehmet Akif Ersoy UniversityBucak Z.T.School of Applied Technology and BusinessBurdur15300Türkiye Department of Computer Engineering Suleyman Demirel UniversityEngineering FacultyIsparta32200Türkiye
Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every *** of th... 详细信息
来源: 评论
Backup subscription scheme for differential protection using IEC61850-9-2 sampled values
收藏 引用
Energy Informatics 2024年 第1期7卷 110页
作者: Katoulaei, Mohammad Khalili Rahmani, Aamir Høidalen, Hans Kristian Oleinikova, Irina Mork, Bruce Department of energy systems Norwegian University of Science and Technology Trondheim Norway Department of electrical power system Michigan Technical University Michigan United States Department of Electrical Power Engineering Norwegian University of Science and Technology Trondheim Norway Department of Electrical and Computer Engineering Michigan Technological University HoughtonMI49931 United States
In IEC-61850-based digital substations, the protection IED’s performance is dependent on merging unit’s vendor implementation, communication networks, and measurement circuit’s health conditions. As the process bus... 详细信息
来源: 评论
Deep Learning Technique for Oropharyngeal Cancer Detection in Medical Imaging  7
Deep Learning Technique for Oropharyngeal Cancer Detection i...
收藏 引用
7th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2023
作者: Kumar, R. Pazhanirajan, S. Annamalai University Faculty of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Chidambaram India
Oropharyngeal carcinoma is a life-threatening disease that requires prompt diagnosis and treatment. This study uses deep learning algorithms to present a novel method for improving medical imaging to detect oropharyng... 详细信息
来源: 评论
Smart Glove with Mobile Application to Detect Static Arabic Hijaiyah Hand Code for Quran Recitation  21
Smart Glove with Mobile Application to Detect Static Arabic ...
收藏 引用
21st International Learning and Technology Conference, L and T 2024
作者: Elshareif, Mohamed Elgilani Eltahir Ahmad Alias, Nurul Aswani Jomhari, Nazean Sofian, Hazrina University of Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur Malaysia
The use of assistive technology in the field of education is now a common practice in today's tech-driven era. The implementation is quite rampant in all levels and sections of education, including by special need... 详细信息
来源: 评论
Leveraging power consumption for anomaly detection on IoT devices in smart homes
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第10期14卷 14045-14056页
作者: Nimmy, K. Dilraj, M. Sankaran, Sriram Achuthan, Krishnashree Department of Computer Science and Engineering Amrita Vishwa Vidyapeetham Amritapuri India Center for Cybersecurity Systems and Networks Amrita Vishwa Vidyapeetham Amritapuri India
Anomaly detection in smart homes is paramount in the prevailing information age as smart devices remain susceptible to sophisticated cyber-attacks. Hackers exploit vulnerabilities such as weak passwords and insecure, ... 详细信息
来源: 评论
Identifying player skill of dota 2 using machine learning pipeline
收藏 引用
Discover Artificial Intelligence 2024年 第1期4卷 41页
作者: Pengmatchaya, Methasit Natwichai, Juggapong Data Science Consortium Chiang Mai University Huay Kaew Muang Chiang Mai50200 Thailand Department of Computer Engineering Faculty of Engineering Chiang Mai University Huay Kaew Muang Chiang Mai50200 Thailand
The esports industry is one of the prominent business sectors in the digital era, particularly, Multiplayer Online Battle Arena (MOBA) games which gain much attention from gamers and streaming audiences. Among such ga... 详细信息
来源: 评论
Emergency Vehicle Detection Using Deep ConvNet2D and computer Vision  2
Emergency Vehicle Detection Using Deep ConvNet2D and Compute...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Poongavanam, Elumalaivasan Prathik, A. Munirathinam, T. Kayalvizhi, V. Rajesh, R. Mahavishnu, C. Srm Institute of Science and Technology Department of Data Science and Business Systems Chennai Kattankulathur India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India Sona College of Technology Department of Information Technology Salem India School of Computer Science and Engineering and Information Science Presidency University Bangalore India School of Computer Science and Engineering Vellore Institute of Technology Chennai India Shreenivasa Engineering College Department of Computer Science and Engineering Dharmapuri India
A surveillance system detects emergency vehicles stuck in traffic. This system helps manage traffic because the number of vehicles on the road has been increasing daily for years, causing congestion. This project impl... 详细信息
来源: 评论
Optimal parameter estimation of three solar cell models using modified spotted hyena optimization
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第1期15卷 361-372页
作者: Gafar, Mona El-Sehiemy, Ragab A. Hasanien, Hany M. Abaza, Amlak Department of Computer Science College of Science and Humanities in Al-Sulail Prince Sattam Bin Abdulaziz University Kharj Saudi Arabia Machine Learning and Information Retrieval Department Artificial Intelligence Kafrelsheikh University Kafr El Sheikh Egypt Electrical Engineering Department Faculty of Engineering Kafrelsheikh University Kafr El Sheikh Egypt Electrical Power and Machines Department Faculty of Engineering Ain Shams University Cairo11517 Egypt
This paper is concerned with identifying the optimal parameters of solar cell by using a modified spotted hyena optimization algorithm (MSHOA). In the MSHOA, the optimization process initializes random search agents t... 详细信息
来源: 评论
A distributed B+Tree indexing method for processing range queries over streaming data
收藏 引用
Cluster Computing 2024年 第2期27卷 1251-1274页
作者: Safaee, Shahab Mirabi, Meghdad Rahmani, Amir Masoud Safaei, Ali Asghar Department of Computer Engineering Faculty of Engineering South Tehran Branch Islamic Azad University Tehran Iran Future Technology Research Center National Yunlin University of Science and Technology Yunlin Douliou Taiwan Department of Medical Informatics Faculty of Medical Sciences Tarbiat Modares University Tehran Iran
A data stream exhibits as a massive unbounded sequence of data elements continuously generated at a high rate. Stream databases raise new challenges for query processing due to both the streaming nature of data which ... 详细信息
来源: 评论
Dynamic Trust Management and AI-Based Multi-Factor Authentication for 6G Machine Type Communications  1
Dynamic Trust Management and AI-Based Multi-Factor Authentic...
收藏 引用
1st International Conference on Advances in computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Sinha, Garima Agarwal, Ankita Faculty of Engineering and Technology Department of Computer Science Engineering Ramnagar District Karnataka India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India
New security concerns about the transmission of sensitive data over enormous networks of linked devices have arisen with the advent of the 6G era and the broad adoption of massive machine-type communication (MTC). The... 详细信息
来源: 评论