咨询与建议

限定检索结果

文献类型

  • 33,817 篇 会议
  • 25,130 篇 期刊文献
  • 892 册 图书

馆藏范围

  • 59,839 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34,922 篇 工学
    • 20,879 篇 计算机科学与技术...
    • 16,638 篇 软件工程
    • 7,276 篇 信息与通信工程
    • 6,308 篇 控制科学与工程
    • 5,102 篇 电气工程
    • 4,512 篇 电子科学与技术(可...
    • 3,760 篇 生物工程
    • 3,342 篇 生物医学工程(可授...
    • 2,974 篇 机械工程
    • 2,517 篇 化学工程与技术
    • 2,503 篇 光学工程
    • 2,234 篇 动力工程及工程热...
    • 2,229 篇 仪器科学与技术
    • 1,938 篇 材料科学与工程(可...
    • 1,257 篇 安全科学与工程
    • 1,229 篇 交通运输工程
  • 22,507 篇 理学
    • 10,222 篇 数学
    • 8,085 篇 物理学
    • 4,594 篇 生物学
    • 3,362 篇 统计学(可授理学、...
    • 2,772 篇 化学
    • 2,759 篇 系统科学
  • 8,523 篇 管理学
    • 5,487 篇 管理科学与工程(可...
    • 3,308 篇 图书情报与档案管...
    • 2,776 篇 工商管理
  • 3,576 篇 医学
    • 2,952 篇 临床医学
    • 2,458 篇 基础医学(可授医学...
    • 1,473 篇 药学(可授医学、理...
    • 1,297 篇 公共卫生与预防医...
  • 1,493 篇 法学
    • 1,262 篇 社会学
  • 1,096 篇 经济学
  • 827 篇 农学
  • 718 篇 教育学
  • 172 篇 文学
  • 123 篇 军事学
  • 78 篇 艺术学
  • 9 篇 哲学
  • 6 篇 历史学

主题

  • 1,740 篇 computer science
  • 1,112 篇 deep learning
  • 1,049 篇 accuracy
  • 1,041 篇 machine learning
  • 940 篇 artificial intel...
  • 885 篇 computational mo...
  • 739 篇 feature extracti...
  • 659 篇 internet of thin...
  • 648 篇 training
  • 597 篇 optimization
  • 560 篇 control systems
  • 549 篇 neural networks
  • 482 篇 predictive model...
  • 476 篇 data mining
  • 463 篇 support vector m...
  • 435 篇 real-time system...
  • 422 篇 testing
  • 381 篇 robustness
  • 380 篇 systems engineer...
  • 376 篇 computer archite...

机构

  • 1,098 篇 cavendish labora...
  • 1,029 篇 department of ph...
  • 984 篇 physikalisches i...
  • 973 篇 oliver lodge lab...
  • 664 篇 infn laboratori ...
  • 632 篇 infn sezione di ...
  • 617 篇 infn sezione di ...
  • 613 篇 infn sezione di ...
  • 611 篇 fakultät physik ...
  • 602 篇 university of ch...
  • 561 篇 school of physic...
  • 541 篇 horia hulubei na...
  • 538 篇 department of ph...
  • 537 篇 school of physic...
  • 523 篇 imperial college...
  • 520 篇 iccub universita...
  • 516 篇 h.h. wills physi...
  • 513 篇 stfc rutherford ...
  • 511 篇 nikhef national ...
  • 505 篇 school of physic...

作者

  • 271 篇 barter w.
  • 254 篇 a. gomes
  • 245 篇 c. alexa
  • 241 篇 j. m. izen
  • 238 篇 g. bella
  • 238 篇 j. strandberg
  • 238 篇 beiter a.
  • 237 篇 bellee v.
  • 234 篇 d. calvet
  • 234 篇 c. amelung
  • 233 篇 blake t.
  • 230 篇 brundu d.
  • 228 篇 j. wang
  • 227 篇 g. spigo
  • 227 篇 s. chen
  • 223 篇 bowcock t.j.v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.

语言

  • 50,543 篇 英文
  • 8,692 篇 其他
  • 476 篇 中文
  • 204 篇 日文
  • 45 篇 德文
  • 37 篇 法文
  • 13 篇 俄文
  • 8 篇 斯洛文尼亚文
  • 5 篇 阿拉伯文
  • 3 篇 捷克文
  • 3 篇 西班牙文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 2 篇 葡萄牙文
  • 1 篇 芬兰文
  • 1 篇 泰文
检索条件"机构=Department of Computer Science and Systems Engineering Faculty of Science and Engineering"
59839 条 记 录,以下是371-380 订阅
排序:
A Systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords
收藏 引用
IEEE Access 2024年 12卷 53408-53423页
作者: Por, Lip Yee Ng, Ian Ouii Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj... 详细信息
来源: 评论
Colossal pattern extraction using optimised length constraints based on differential evolutionary arithmetic optimisation algorithm
收藏 引用
International Journal of Information and Communication Technology 2024年 第3期24卷 289-304页
作者: Reddy, T. Sreenivasula Sathya, R. Nuka, Mallikharjunarao Department of Computer Science and Engineering Faculty of Engineering and Technology Annamalai University Annamalai Nagar Tamil Nadu Chidambaram608002 India Department of Computer Science and Engineering Annamalai University Annamalai Nagar Tamil Nadu Chidambaram608002 India Department of Computer Applications Annamacharya Institute of Technology and Sciences YSR Kadapa Andhra Pradesh Rajampet516115 India
Extracting large amounts of information and knowledge from a large database is a trivial task. Existing bulk item mining algorithms for an extensive database are systematic and mathematically expensive and cannot be u... 详细信息
来源: 评论
A TREE STRUCTURE FOR STORAGE, ACCESS AND COLLISION DETECTION OF DISKS
UPB Scientific Bulletin, Series C: Electrical Engineering an...
收藏 引用
UPB Scientific Bulletin, Series C: Electrical engineering and computer science 2023年 第1期85卷 53-64页
作者: Sohrabi, S. Moradinejad, A. Asgharian, A. Department of Mathematics Faculty of Science Urmia University Urmia57561-51818 Iran Faculty of Engineering Urmia University Urmia Iran Department of Computer Engineering Faculty of Electrical and Computer Engineering Urmia University Urmia57561-51818 Iran
This paper presents a new and efficient tree data structure for sorting and collision detection of disks in 2D based on a new tree-based data structure, called hexatree, which is introduced for the first time in this ... 详细信息
来源: 评论
Effect of Decompression Hole Structure Design on Stress Inhomogeneity of Stainless Steel Base Force Transducers  4
Effect of Decompression Hole Structure Design on Stress Inho...
收藏 引用
2023 4th International Conference on Mechanical engineering and Materials, ICMEM 2023
作者: Gao, Kai Department of Systems Engineering Faculty of Innovation and Engineering Macau University of Science and Technology 999078 China
In order to reduce the stress inhomogeneity of the stainless steel base force transducer, the force transducer structure with decompression holes of different depths and different hole morphologies is designed in this... 详细信息
来源: 评论
Advancing Bankruptcy Forecasting With Hybrid Machine Learning Techniques: Insights From an Unbalanced Polish Dataset
收藏 引用
IEEE Access 2024年 12卷 9369-9381页
作者: Ainan, Ummey Hany Por, Lip Yee Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
The challenge of bankruptcy prediction, critical for averting financial sector losses, is amplified by the prevalence of imbalanced datasets, which often skew prediction models. Addressing this, our study introduces t... 详细信息
来源: 评论
An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid systems
收藏 引用
Big Data Mining and Analytics 2024年 第2期7卷 399-418页
作者: Sankaramoorthy Muthubalaji Naresh Kumar Muniyaraj Sarvade Pedda Venkata Subba Rao Kavitha Thandapani Pasupuleti Rama Mohan Thangam Somasundaram Yousef Farhaoui Department of Electrical and Electronics Engineering CMR College of Engineering&TechnologyHyderabad 501401India Department of Electronics and Communication Engineering Vardhaman College of Engineering KacharamShamshabad 501218India Department of Electronics and Communication Engineering Sreenidhi Institute of Science and TechnologyHyderabad 501301India Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and TechnologyChennai 600062India Department of Electrical and Electronics Engineering Bharat Institute of Engineering and TechnologyHyderabad 501510India Department of Computer Science and Engineering Amrita School of ComputingAmrita Vishwa VidhyapeethamBengaluru 560035India T-IDMS Department of Computer ScienceFaculty of Sciences and TechniquesMoulay Ismail UniversityErrachidia 52000Morocco
Big data has the ability to open up innovative and ground-breaking prospects for the electrical grid,which also supports to obtain a variety of technological,social,and financial *** is an unprecedented amount of hete... 详细信息
来源: 评论
Energy Efficiency in Sustainable Software Development: Clean Code Approaches  4
Energy Efficiency in Sustainable Software Development: Clean...
收藏 引用
4th International Conference on Electrical engineering and computer science, ICECOS 2024
作者: Inayatullah Widhiarso, Wijang Stiawan, Deris Universitas Multi Data Palembang Faculty of Computer Science Department Program in Engineering Science Palembang Indonesia Universitas Sriwijaya Faculty Af Computer Science Department Program in Engineering Science Palembang Indonesia Universitas Multi Data Palembang Faculty of Computer Science Palembang Indonesia Universitas Sriwijaya Faculty Af Computer Science Palembang Indonesia
The use of technology and information devices contributes to global warming. This issue has also become a concern for UN institutions, as stated in international environmental agreements, which aim to stabilize greenh... 详细信息
来源: 评论
Congruent Feature Selection Method to Improve the Efficacy of Machine Learning-Based Classification in Medical Image Processing
收藏 引用
computer Modeling in engineering & sciences 2025年 第1期142卷 357-384页
作者: Mohd Anjum Naoufel Kraiem Hong Min Ashit Kumar Dutta Yousef Ibrahim Daradkeh Department of Computer Engineering Aligarh Muslim UniversityAligarh202002India College of Computer Science King Khalid UniversityAbha61413Saudi Arabia School of Computing Gachon UniversitySeongnam13120Republic of Korea Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Engineering and Information College of Engineering in Wadi AlddawasirPrince Sattam bin Abdulaziz UniversityAl-Kharj16273Saudi Arabia
Machine learning(ML)is increasingly applied for medical image processing with appropriate learning *** applications include analyzing images of various organs,such as the brain,lung,eye,etc.,to identify specific flaws... 详细信息
来源: 评论
Deep learning-based method for detection of copy-move forgery in videos
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8451-8464页
作者: Elbarougy, Reda Abdelfatah, Osama Behery, G.M. El-Badry, Noha M. Department of Artificial Intelligence and Data Science College of Computer Science and Engineering University of Ha’il Ha’il81481 Saudi Arabia Department of Information Technology Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Computer Science Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Mathematics Faculty of Science Damietta University New Damietta Kafr Saad Egypt
Video forgery is one of the most serious problems affecting the credibility and reliability of video content. Therefore, detecting video forgery presents a major challenge for researchers due to the diversity of forge... 详细信息
来源: 评论
Modified SPICE-Compatible Model Integrating NBTI and Self-Heating Effects for VDMOS Transistors  11
Modified SPICE-Compatible Model Integrating NBTI and Self-He...
收藏 引用
11th International Conference on Electrical, Electronic and Computing engineering, IcETRAN 2024
作者: Marjanović, Milos Veljković, Sandra Mitrović, Nikola Živanović, Emilija Gavrić, Aleksandar Danković, Danijel Faculty of Electronic Engineering Department of Microelectronics Niš Serbia Faculty of Electronic Engineering Department of Computer Science Niš Serbia
This paper describes a modified SPICE-compatible VDMOS transistor model that includes NBT and self-heating effects. A complete circuit diagram of the transistor is given, which includes the electrical part of the circ... 详细信息
来源: 评论