咨询与建议

限定检索结果

文献类型

  • 35,438 篇 会议
  • 25,755 篇 期刊文献
  • 915 册 图书

馆藏范围

  • 62,108 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36,174 篇 工学
    • 21,652 篇 计算机科学与技术...
    • 17,261 篇 软件工程
    • 7,607 篇 信息与通信工程
    • 6,552 篇 控制科学与工程
    • 5,301 篇 电气工程
    • 4,742 篇 电子科学与技术(可...
    • 3,871 篇 生物工程
    • 3,447 篇 生物医学工程(可授...
    • 3,078 篇 机械工程
    • 2,602 篇 化学工程与技术
    • 2,590 篇 光学工程
    • 2,324 篇 动力工程及工程热...
    • 2,314 篇 仪器科学与技术
    • 1,991 篇 材料科学与工程(可...
    • 1,303 篇 安全科学与工程
    • 1,263 篇 交通运输工程
  • 23,174 篇 理学
    • 10,560 篇 数学
    • 8,304 篇 物理学
    • 4,731 篇 生物学
    • 3,472 篇 统计学(可授理学、...
    • 2,843 篇 系统科学
    • 2,842 篇 化学
  • 8,836 篇 管理学
    • 5,689 篇 管理科学与工程(可...
    • 3,430 篇 图书情报与档案管...
    • 2,882 篇 工商管理
  • 3,668 篇 医学
    • 3,023 篇 临床医学
    • 2,517 篇 基础医学(可授医学...
    • 1,510 篇 药学(可授医学、理...
    • 1,337 篇 公共卫生与预防医...
  • 1,541 篇 法学
    • 1,304 篇 社会学
  • 1,127 篇 经济学
  • 854 篇 农学
  • 751 篇 教育学
  • 175 篇 文学
  • 126 篇 军事学
  • 81 篇 艺术学
  • 9 篇 哲学
  • 6 篇 历史学

主题

  • 1,741 篇 computer science
  • 1,138 篇 deep learning
  • 1,094 篇 accuracy
  • 1,066 篇 machine learning
  • 974 篇 artificial intel...
  • 938 篇 computational mo...
  • 782 篇 feature extracti...
  • 679 篇 training
  • 672 篇 internet of thin...
  • 623 篇 optimization
  • 610 篇 control systems
  • 569 篇 neural networks
  • 504 篇 predictive model...
  • 496 篇 data mining
  • 478 篇 support vector m...
  • 462 篇 real-time system...
  • 453 篇 systems engineer...
  • 449 篇 testing
  • 412 篇 computer archite...
  • 408 篇 robustness

机构

  • 1,098 篇 cavendish labora...
  • 1,029 篇 department of ph...
  • 984 篇 physikalisches i...
  • 973 篇 oliver lodge lab...
  • 664 篇 infn laboratori ...
  • 632 篇 infn sezione di ...
  • 617 篇 infn sezione di ...
  • 611 篇 fakultät physik ...
  • 611 篇 infn sezione di ...
  • 602 篇 university of ch...
  • 561 篇 school of physic...
  • 541 篇 horia hulubei na...
  • 538 篇 department of ph...
  • 537 篇 school of physic...
  • 523 篇 imperial college...
  • 520 篇 iccub universita...
  • 516 篇 h.h. wills physi...
  • 511 篇 stfc rutherford ...
  • 511 篇 nikhef national ...
  • 505 篇 school of physic...

作者

  • 271 篇 barter w.
  • 254 篇 a. gomes
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 238 篇 g. bella
  • 238 篇 j. strandberg
  • 238 篇 beiter a.
  • 237 篇 bellee v.
  • 234 篇 d. calvet
  • 234 篇 c. amelung
  • 233 篇 blake t.
  • 230 篇 brundu d.
  • 228 篇 j. wang
  • 227 篇 g. spigo
  • 227 篇 s. chen
  • 223 篇 amato s.
  • 222 篇 bowcock t.j.v.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.

语言

  • 52,563 篇 英文
  • 8,922 篇 其他
  • 496 篇 中文
  • 206 篇 日文
  • 47 篇 德文
  • 38 篇 法文
  • 14 篇 俄文
  • 8 篇 斯洛文尼亚文
  • 6 篇 阿拉伯文
  • 4 篇 西班牙文
  • 3 篇 捷克文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 2 篇 葡萄牙文
  • 1 篇 芬兰文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Systems Engineering Faculty of Engineering"
62108 条 记 录,以下是1661-1670 订阅
排序:
EEG Signal-Based Autism Spectrum Disorder Detection Through Normalized Mutual Information and Convolutional Neural Network  2nd
EEG Signal-Based Autism Spectrum Disorder Detection Through ...
收藏 引用
2nd International Conference on Big Data, IoT and Machine Learning, BIM 2023
作者: Peya, Zahrul Jannat Maria, Mahfuza Akter Akhand, M.A.H. Siddique, Nazmul Department of Computer Science and Engineering Khulna University of Engineering and Technology Khulna9203 Bangladesh School of Computing Engineering and Intelligent Systems Ulster University Northern Ireland Londonderry United Kingdom
Autism Spectrum Disorder (ASD) is a diverse neurological problem with several contributing factors involving both genetic and environmental variables. The diagnosis of ASD based on neural activity analysis of various ... 详细信息
来源: 评论
A New Intelligent Approach for Deaf/Dumb People based on Deep Learning
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 6045-6060页
作者: Haitham Elwahsh Ahmed Elkhouly Emad Abouel Nasr Ali K.Kamrani Engy El-shafeiy Computer Science Department Faculty of Computers and InformationKafrelsheikh UniversityKafrelsheikhEgypt Industrial Engineering Department College of EngineeringKing Saud UniversityRiyadh 11421Saudi Arabia Industrial Engineering Department College of EngineeringUniversity of HoustonHoustonTX 77204-4008USA Department of Computer Science Faculty of Computers and Artificial IntelligenceUniversity of Sadat CitySadat CityEgypt
People who are deaf or have difficulty speaking use sign language,which consists of hand gestures with particular motions that symbolize the“language”they are communicating.A gesture in a sign language is a particul... 详细信息
来源: 评论
Bluetooth Vulnerabilities and Security  7
Bluetooth Vulnerabilities and Security
收藏 引用
7th IEEE International Conference on Emerging Smart Computing and Informatics, ESCI 2025
作者: Mareeswari, V. Vijayan, R. Shukla, Ashish Department of Software and Systems Engineering School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India Department of Information Technology School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India School of Computer Science Engineering and Information Systems (SCORE) Vellore Institute of Technology (VIT) Vellore India
Bluetooth technology, which facilitates wireless communication between Billions of devices including smartphones, tablets, laptops, and Internet of Thing (IoT) devices, is a cornerstone of modern connectivity. Its imp... 详细信息
来源: 评论
Early-Stage Segmentation and Characterization of Brain Tumor
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 1001-1017页
作者: Syed Nauyan Rashid Muhammad Hanif Usman Habib Akhtar Khalil Omair Inam Hafeez Ur Rehman Department of Computer Science National University of Computer and Emerging Sciences IslamabadPeshawar CampusPakistan Faculty of Computer Science and Engineering Ghulam Ishaq Khan(GIK)Institute of Engineering Sciences and TechnologyTopiPakistan IFahja Pvt Limited PeshawarPakistan Department of Electrical and Computer Engineering COMSATS University IslamabadPakistan
Gliomas are the most aggressive brain tumors caused by the abnormal growth of brain *** life expectancy of patients diagnosed with gliomas decreases *** gliomas are diagnosed in later stages,resulting in imminent *** ... 详细信息
来源: 评论
Innovative Data Encryption Techniques using AI for Wireless Sensor Actuator Network Security  2
Innovative Data Encryption Techniques using AI for Wireless ...
收藏 引用
2nd International Conference on Distributed Computing and Optimization Techniques, ICDCOT 2024
作者: Dharmateja, M. Rama, Prabha K.P. Asha, N. Nithya, P. Lalitha, S. Manojkumar, P. Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Arunai Engineering College Department of Computer Science and Engineering Tamil Nadu Tiruvannamalai India Bannari Amman Institute of Technology Department of Electrical and Electronics Engineering Tamil Nadu Sathyamangalam India
Wireless Sensor Actuator Networks (WSANs) are sensitive to cyber threats due to present static encryption techniques. Adaptive security methods are required in WSAN settings to reduce evolving dangers and maintain dat... 详细信息
来源: 评论
Improving bot detection of fake followers on Twitter via a hybrid B-HC optimisation algorithm  5
Improving bot detection of fake followers on Twitter via a h...
收藏 引用
5th IEEE International Conference on Electrical, computer and Communication Technologies, ICECCT 2023
作者: Alzeyadi, Haider Duran, Fecir Informatics Institute Department of Computer Science Gazi University Ankara Turkey Gazi University Engineering Faculty of Technology Department of Computer Engineering Ankara Turkey
Sophisticated cyber threats are seen on Online Social Networks (OSNs) social media accounts automated to imitate human behaviours has an impactful effect on distorting public thoughts and opinions. OSNs are weaponized... 详细信息
来源: 评论
An Algorithmic Approach to Intrusion Detection in Ad Hoc Wireless Networks Based on Artificial Intelligence
An Algorithmic Approach to Intrusion Detection in Ad Hoc Wir...
收藏 引用
2025 International Conference on Intelligent Control, Computing and Communications, IC3 2025
作者: Sonekar, Shrikant V. Kshirsagar, Pravin R. Unhelkar, Bhuvan Chakrabarti, Prasun Maram, Balajee Upreti, Kamal J D College of Engineering & Management Department of Computer Science & Engineering Nagpur India J D College of Engineering & Management Department of Electronics & Telecommunication Engineering Nagpur India Muma College of Business University of South Florida Department of Infornation Systems and Decision Sciences Sarasata United States Sir Padampat Singhania University Department of Computer Science & Engineering Rajasthan Udaipur3313606 India Sr University Department of Computer Science and Artificial Intelligence Telangana Warangal506371 India Christ University Department of Computer Science Delhi NCR Ghaziabad India
The self-configured, autonomous, and framework-free modes of communication that mobile adhoc networks (MANETs) offer have revolutionized our culture. As a result, efforts have been made to explore ways to maximize the... 详细信息
来源: 评论
Decisioning-Based Approach for Optimising Control engineering Tools Using Digital Twin Capabilities and Other Cyber-Physical Metaverse Manufacturing System Components
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 3212-3221页
作者: Mourad, Nahia Alsattar, Hassan A. Qahtan, Sarah Zaidan, Aws Alaa Deveci, Muhammet Sangaiah, Arun Kumar Pedrycz, Witold British University in Dubai Faculty of Engineering and IT Dubai United Arab Emirates University of Mashreq College of Administrative Science Department of Business Administration Baghdad10067 Iraq Middle Technical University College of Health and Medical Technology-Baghdad Department of Computer Center Baghdad10047 Iraq SP Jain School of Global Management SydneyNSW2141 Australia National Defence University Turkish Naval Academy Department of Industrial Engineering Istanbul34040 Turkey Lebanese American University Department of Electrical and Computer Engineering Byblos Lebanon International Graduate Institute of AI National Yunlin University of Science and Technology Yunlin64002 Taiwan University of Alberta Faculty of Engineering Department of Electrical and Computer Engineering EdmontonABT6G 1H9 Canada Systems Research Institute Polish Academy of Sciences Warsaw00-901 Poland Istinye University Faculty of Engineering and Natural Sciences Department of Computer Engineering Istanbul34010 Turkey
The optimisation of control engineering tools based on digital twin capabilities and other cyber-physical metaverse manufacturing system (CPMMS) components are crucial for the successful performance. This study propos... 详细信息
来源: 评论
A Study on Purchasing Behavior Analysis Method by Comparing Difference in Latent Class Distributions between Membership Stages
收藏 引用
Journal of Japan Industrial Management Association 2022年 第2期73卷 54-69页
作者: Yang, Tianxiang Yamashita, Haruka Goto, Masayuki Major of Industrial and Management Systems Engineering Graduate School of Creative Science and Engineering Waseda University Japan Department of Information and Communication Sciences Faculty of Science and Technology Sophia University Japan Department of Industrial and Management Systems Engineering School of Creative Science and Engineering Waseda University Japan
A marketing policy called the"Membership Stage System" is widely used in retail business. A membership stage provides benefits to customers such as shopping points when a customer's annual cumulative pur... 详细信息
来源: 评论
Characterization of Traffic in the Internet of Vehicles Using Microscopic Modelling
Characterization of Traffic in the Internet of Vehicles Usin...
收藏 引用
2024 IEEE International Conference on Advanced Telecommunication and Networking Technologies, ATNT 2024
作者: Obeng, Kobby Asare Ariffin, Sharifah H.S. Muhammad, Nor Aishah Baharudin, Muhammad Ariff Universiti Teknologi Malaysia Faculty of Electrical Engineering Malaysia Koforidua Technical University Department of Computer Science Ghana Universiti Teknologi Malaysia Faculty of Electrical Engineering Johor Malaysia
The emergence of the Internet of Vehicles (IoV) as a driver for the new age of Intelligent Transportation systems (ITS) provides an opportunity for a wide range of services and applications driven by the various inter... 详细信息
来源: 评论