咨询与建议

限定检索结果

文献类型

  • 24,012 篇 会议
  • 18,389 篇 期刊文献
  • 586 册 图书

馆藏范围

  • 42,987 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 24,958 篇 工学
    • 14,458 篇 计算机科学与技术...
    • 11,763 篇 软件工程
    • 5,534 篇 控制科学与工程
    • 4,887 篇 信息与通信工程
    • 3,809 篇 电气工程
    • 3,210 篇 电子科学与技术(可...
    • 2,659 篇 生物工程
    • 2,463 篇 生物医学工程(可授...
    • 2,309 篇 机械工程
    • 1,796 篇 光学工程
    • 1,734 篇 化学工程与技术
    • 1,599 篇 动力工程及工程热...
    • 1,590 篇 仪器科学与技术
    • 1,191 篇 材料科学与工程(可...
    • 899 篇 交通运输工程
    • 887 篇 安全科学与工程
  • 16,484 篇 理学
    • 7,405 篇 数学
    • 6,024 篇 物理学
    • 3,246 篇 生物学
    • 2,398 篇 系统科学
    • 2,326 篇 统计学(可授理学、...
    • 1,866 篇 化学
  • 5,966 篇 管理学
    • 3,882 篇 管理科学与工程(可...
    • 2,256 篇 图书情报与档案管...
    • 1,879 篇 工商管理
  • 2,593 篇 医学
    • 2,153 篇 临床医学
    • 1,797 篇 基础医学(可授医学...
    • 1,121 篇 药学(可授医学、理...
    • 922 篇 公共卫生与预防医...
  • 978 篇 法学
    • 826 篇 社会学
  • 756 篇 经济学
  • 628 篇 农学
  • 459 篇 教育学
  • 113 篇 文学
  • 82 篇 军事学
  • 57 篇 艺术学
  • 5 篇 历史学
  • 4 篇 哲学

主题

  • 1,022 篇 computer science
  • 828 篇 control systems
  • 798 篇 deep learning
  • 706 篇 accuracy
  • 644 篇 machine learning
  • 549 篇 artificial intel...
  • 519 篇 computational mo...
  • 471 篇 internet of thin...
  • 438 篇 feature extracti...
  • 413 篇 optimization
  • 379 篇 support vector m...
  • 367 篇 training
  • 347 篇 neural networks
  • 304 篇 predictive model...
  • 279 篇 mathematical mod...
  • 259 篇 robustness
  • 243 篇 real-time system...
  • 221 篇 testing
  • 220 篇 covid-19
  • 219 篇 data mining

机构

  • 1,096 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 979 篇 physikalisches i...
  • 974 篇 oliver lodge lab...
  • 644 篇 infn laboratori ...
  • 623 篇 infn sezione di ...
  • 607 篇 fakultät physik ...
  • 606 篇 infn sezione di ...
  • 601 篇 infn sezione di ...
  • 568 篇 university of ch...
  • 560 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 536 篇 department of ph...
  • 535 篇 school of physic...
  • 530 篇 iccub universita...
  • 521 篇 imperial college...
  • 516 篇 h.h. wills physi...
  • 516 篇 nikhef national ...
  • 510 篇 stfc rutherford ...
  • 507 篇 school of physic...

作者

  • 265 篇 barter w.
  • 256 篇 a. gomes
  • 247 篇 c. alexa
  • 247 篇 beiter a.
  • 245 篇 j. m. izen
  • 241 篇 g. bella
  • 239 篇 j. strandberg
  • 238 篇 c. amelung
  • 237 篇 bellee v.
  • 236 篇 d. calvet
  • 232 篇 g. spigo
  • 231 篇 bowcock t.j.v.
  • 230 篇 s. chen
  • 229 篇 f. siegert
  • 228 篇 brundu d.
  • 228 篇 blake t.
  • 225 篇 j. wang
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 boettcher t.

语言

  • 40,279 篇 英文
  • 2,226 篇 其他
  • 356 篇 中文
  • 91 篇 日文
  • 19 篇 德文
  • 12 篇 法文
  • 6 篇 俄文
  • 3 篇 朝鲜文
  • 3 篇 荷兰文
  • 3 篇 葡萄牙文
  • 2 篇 西班牙文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 泰文
检索条件"机构=Department of Control Engineering and Science Faculty of Computer Science and Systems Engineering"
42987 条 记 录,以下是321-330 订阅
排序:
Deep Forest-Based Fall Detection in Internet of Medical Things Environment
收藏 引用
computer systems science & engineering 2023年 第6期45卷 2377-2389页
作者: Mohamed Esmail Karar Omar Reyad Hazem Ibrahim Shehata College of Computing and Information Technology Shaqra UniversityP.O.Box 33Shaqra11961Saudi Arabia Department of Industrial Electronics and Control Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Computer Science Department Faculty of Computers and Artificial IntelligenceSohag UniversitySohag82524Egypt Department of Computer and Systems Engineering Faculty of EngineeringZagazig UniversityZagazig44519Egypt
This article introduces a new medical internet of things(IoT)framework for intelligent fall detection system of senior people based on our proposed deep forest *** cascade multi-layer structure of deep forest classifi... 详细信息
来源: 评论
A Systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords
收藏 引用
IEEE Access 2024年 12卷 53408-53423页
作者: Por, Lip Yee Ng, Ian Ouii Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj... 详细信息
来源: 评论
Colossal pattern extraction using optimised length constraints based on differential evolutionary arithmetic optimisation algorithm
收藏 引用
International Journal of Information and Communication Technology 2024年 第3期24卷 289-304页
作者: Reddy, T. Sreenivasula Sathya, R. Nuka, Mallikharjunarao Department of Computer Science and Engineering Faculty of Engineering and Technology Annamalai University Annamalai Nagar Tamil Nadu Chidambaram608002 India Department of Computer Science and Engineering Annamalai University Annamalai Nagar Tamil Nadu Chidambaram608002 India Department of Computer Applications Annamacharya Institute of Technology and Sciences YSR Kadapa Andhra Pradesh Rajampet516115 India
Extracting large amounts of information and knowledge from a large database is a trivial task. Existing bulk item mining algorithms for an extensive database are systematic and mathematically expensive and cannot be u... 详细信息
来源: 评论
A TREE STRUCTURE FOR STORAGE, ACCESS AND COLLISION DETECTION OF DISKS
UPB Scientific Bulletin, Series C: Electrical Engineering an...
收藏 引用
UPB Scientific Bulletin, Series C: Electrical engineering and computer science 2023年 第1期85卷 53-64页
作者: Sohrabi, S. Moradinejad, A. Asgharian, A. Department of Mathematics Faculty of Science Urmia University Urmia57561-51818 Iran Faculty of Engineering Urmia University Urmia Iran Department of Computer Engineering Faculty of Electrical and Computer Engineering Urmia University Urmia57561-51818 Iran
This paper presents a new and efficient tree data structure for sorting and collision detection of disks in 2D based on a new tree-based data structure, called hexatree, which is introduced for the first time in this ... 详细信息
来源: 评论
Advancing Bankruptcy Forecasting With Hybrid Machine Learning Techniques: Insights From an Unbalanced Polish Dataset
收藏 引用
IEEE Access 2024年 12卷 9369-9381页
作者: Ainan, Ummey Hany Por, Lip Yee Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
The challenge of bankruptcy prediction, critical for averting financial sector losses, is amplified by the prevalence of imbalanced datasets, which often skew prediction models. Addressing this, our study introduces t... 详细信息
来源: 评论
An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid systems
收藏 引用
Big Data Mining and Analytics 2024年 第2期7卷 399-418页
作者: Sankaramoorthy Muthubalaji Naresh Kumar Muniyaraj Sarvade Pedda Venkata Subba Rao Kavitha Thandapani Pasupuleti Rama Mohan Thangam Somasundaram Yousef Farhaoui Department of Electrical and Electronics Engineering CMR College of Engineering&TechnologyHyderabad 501401India Department of Electronics and Communication Engineering Vardhaman College of Engineering KacharamShamshabad 501218India Department of Electronics and Communication Engineering Sreenidhi Institute of Science and TechnologyHyderabad 501301India Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and TechnologyChennai 600062India Department of Electrical and Electronics Engineering Bharat Institute of Engineering and TechnologyHyderabad 501510India Department of Computer Science and Engineering Amrita School of ComputingAmrita Vishwa VidhyapeethamBengaluru 560035India T-IDMS Department of Computer ScienceFaculty of Sciences and TechniquesMoulay Ismail UniversityErrachidia 52000Morocco
Big data has the ability to open up innovative and ground-breaking prospects for the electrical grid,which also supports to obtain a variety of technological,social,and financial *** is an unprecedented amount of hete... 详细信息
来源: 评论
Achieving Near-Optimal Convergence for Distributed Minimax Optimization with Adaptive Stepsizes  38
Achieving Near-Optimal Convergence for Distributed Minimax O...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Huang, Yan Li, Xiang Shen, Yipeng He, Niao Xu, Jinming College of Control Science and Engineering Zhejiang University China Department of Computer Science ETH Zurich Switzerland
In this paper, we show that applying adaptive methods directly to distributed minimax problems can result in non-convergence due to inconsistency in locally computed adaptive stepsizes. To address this challenge, we p...
来源: 评论
Energy Efficiency in Sustainable Software Development: Clean Code Approaches  4
Energy Efficiency in Sustainable Software Development: Clean...
收藏 引用
4th International Conference on Electrical engineering and computer science, ICECOS 2024
作者: Inayatullah Widhiarso, Wijang Stiawan, Deris Universitas Multi Data Palembang Faculty of Computer Science Department Program in Engineering Science Palembang Indonesia Universitas Sriwijaya Faculty Af Computer Science Department Program in Engineering Science Palembang Indonesia Universitas Multi Data Palembang Faculty of Computer Science Palembang Indonesia Universitas Sriwijaya Faculty Af Computer Science Palembang Indonesia
The use of technology and information devices contributes to global warming. This issue has also become a concern for UN institutions, as stated in international environmental agreements, which aim to stabilize greenh... 详细信息
来源: 评论
Deep learning-based method for detection of copy-move forgery in videos
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8451-8464页
作者: Elbarougy, Reda Abdelfatah, Osama Behery, G.M. El-Badry, Noha M. Department of Artificial Intelligence and Data Science College of Computer Science and Engineering University of Ha’il Ha’il81481 Saudi Arabia Department of Information Technology Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Computer Science Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Mathematics Faculty of Science Damietta University New Damietta Kafr Saad Egypt
Video forgery is one of the most serious problems affecting the credibility and reliability of video content. Therefore, detecting video forgery presents a major challenge for researchers due to the diversity of forge... 详细信息
来源: 评论
Challenges in Securing UAV IoT Framework: Future Research Perspective
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2607-2629页
作者: Aljumah, Abdullah Ahanger, Tariq Ahamed Ullah, Imdad Prince Sattam Bin Abdulaziz University College of Computer Engineering and Sciences Saudi Arabia CoBA Prince Sattam Bin Abdulaziz University Department of Management Information Systems Saudi Arabia The University of Sydney School of Computer Science Faculty of Engineering SydneyNSW2006 Australia
Unmanned Aerial Vehicles (UAVs) offer the immense capability for allowing novel applications in a variety of domains including security, military, surveillance, medicine, and traffic monitoring. The prevalence of UAV ... 详细信息
来源: 评论