咨询与建议

限定检索结果

文献类型

  • 24,044 篇 会议
  • 18,391 篇 期刊文献
  • 582 册 图书

馆藏范围

  • 43,017 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25,113 篇 工学
    • 14,416 篇 计算机科学与技术...
    • 11,722 篇 软件工程
    • 5,509 篇 控制科学与工程
    • 4,867 篇 信息与通信工程
    • 3,800 篇 电气工程
    • 3,224 篇 电子科学与技术(可...
    • 2,659 篇 生物工程
    • 2,457 篇 生物医学工程(可授...
    • 2,301 篇 机械工程
    • 1,757 篇 光学工程
    • 1,727 篇 化学工程与技术
    • 1,595 篇 动力工程及工程热...
    • 1,576 篇 仪器科学与技术
    • 1,248 篇 材料科学与工程(可...
    • 892 篇 交通运输工程
    • 881 篇 安全科学与工程
  • 16,408 篇 理学
    • 7,424 篇 数学
    • 5,999 篇 物理学
    • 3,235 篇 生物学
    • 2,389 篇 系统科学
    • 2,354 篇 统计学(可授理学、...
    • 1,861 篇 化学
  • 5,946 篇 管理学
    • 3,870 篇 管理科学与工程(可...
    • 2,251 篇 图书情报与档案管...
    • 1,870 篇 工商管理
  • 2,577 篇 医学
    • 2,144 篇 临床医学
    • 1,786 篇 基础医学(可授医学...
    • 1,124 篇 药学(可授医学、理...
    • 914 篇 公共卫生与预防医...
  • 974 篇 法学
    • 822 篇 社会学
  • 750 篇 经济学
  • 615 篇 农学
  • 456 篇 教育学
  • 113 篇 文学
  • 82 篇 军事学
  • 57 篇 艺术学
  • 5 篇 历史学
  • 4 篇 哲学

主题

  • 1,023 篇 computer science
  • 830 篇 control systems
  • 807 篇 deep learning
  • 721 篇 accuracy
  • 656 篇 machine learning
  • 557 篇 artificial intel...
  • 518 篇 computational mo...
  • 477 篇 internet of thin...
  • 439 篇 feature extracti...
  • 417 篇 optimization
  • 381 篇 support vector m...
  • 372 篇 training
  • 345 篇 neural networks
  • 312 篇 predictive model...
  • 279 篇 mathematical mod...
  • 259 篇 robustness
  • 257 篇 real-time system...
  • 222 篇 data mining
  • 221 篇 covid-19
  • 221 篇 testing

机构

  • 1,097 篇 cavendish labora...
  • 1,031 篇 department of ph...
  • 987 篇 physikalisches i...
  • 975 篇 oliver lodge lab...
  • 648 篇 infn laboratori ...
  • 624 篇 infn sezione di ...
  • 617 篇 fakultät physik ...
  • 609 篇 infn sezione di ...
  • 607 篇 infn sezione di ...
  • 568 篇 university of ch...
  • 563 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 538 篇 department of ph...
  • 537 篇 school of physic...
  • 531 篇 iccub universita...
  • 524 篇 imperial college...
  • 515 篇 h.h. wills physi...
  • 513 篇 stfc rutherford ...
  • 511 篇 nikhef national ...
  • 505 篇 school of physic...

作者

  • 273 篇 barter w.
  • 256 篇 a. gomes
  • 247 篇 c. alexa
  • 246 篇 beiter a.
  • 245 篇 j. m. izen
  • 241 篇 g. bella
  • 240 篇 bellee v.
  • 239 篇 j. strandberg
  • 238 篇 c. amelung
  • 236 篇 d. calvet
  • 234 篇 blake t.
  • 233 篇 brundu d.
  • 231 篇 g. spigo
  • 231 篇 bowcock t.j.v.
  • 230 篇 s. chen
  • 228 篇 f. siegert
  • 223 篇 amato s.
  • 223 篇 j. wang
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.

语言

  • 37,894 篇 英文
  • 4,653 篇 其他
  • 360 篇 中文
  • 92 篇 日文
  • 31 篇 德文
  • 24 篇 法文
  • 8 篇 俄文
  • 3 篇 朝鲜文
  • 3 篇 荷兰文
  • 2 篇 阿拉伯文
  • 2 篇 西班牙文
  • 2 篇 葡萄牙文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 泰文
检索条件"机构=Department of Control Engineering and Science Faculty of Computer Science and Systems Engineering"
43017 条 记 录,以下是4621-4630 订阅
排序:
Ultra-compact and broadband polarization-insensitive mode-order converting power splitter
收藏 引用
Chinese Optics Letters 2024年 第3期22卷 36-41页
作者: 陈浩琪 姚润葵 汪鹏君 符强 陈伟伟 戴世勋 孔德军 林健 金涛 李军 戴庭舸 杨建义 Faculty of Electrical Engineering and Computer Science Ningbo UniversityNingbo 315211China College of Electrical and Electronic Engineering Wenzhou UniversityWenzhou 325035China College of Science and Technology Ningbo UniversityNingbo 315211China Laboratory of Infrared Materials and Devices The Research Institute of Advanced TechnologiesNingbo UniversityNingbo 315211China Department of Information Science and Electronics Engineering Zhejiang UniversityHangzhou 310027China
A polarization-insensitive mode-order converting power splitter using a pixelated region is presented and investigated in this *** TE_(0)and TM_(0)modes are injected into the input port,they are converted into TE_(1)a... 详细信息
来源: 评论
UniQuad: A Unified and Versatile Quadrotor Platform Series for UAV Research and Application
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yichen Chen, Xinyi Liu, Peize Wang, Junzhe Zou, Hetai Pan, Neng Gao, Fei Shen, Shaojie The Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong The Institute of Cyber-Systems and Control College of Control Science and Engineering Zhejiang University Hangzhou China Huzhou Institute Zhejiang University Huzhou China
As quadrotors take on an increasingly diverse range of roles, researchers often need to develop new hardware platforms tailored for specific tasks, introducing significant engineering overhead. In this article, we int... 详细信息
来源: 评论
Blockchain and Edge Computing Integration Boosts Scalability and Reduces Latency  2
Blockchain and Edge Computing Integration Boosts Scalability...
收藏 引用
2nd International Conference on Business Analytics for Technology and Security, ICBATS 2023
作者: Mahfuri, Mahmoud Alnawaiseh, Ahmad Enad Asad, Umber Yousif, Muhammad Aslam, Shoukat Chabani, Zakariya Fiaz, Muhammad International University for Science and Technolgy Faculty of Engineering - Computer and Information Technolgy Department Syria Orange-Jordan Telecom Company Jordan NCBA&E Lahore School of Computer Computer Pakistan Canadian University Dubai Faculty of Management Dubai United Arab Emirates NCBA&E Lahore School of Computer Science Pakistan Applied Science Private University Applied Science Research Center Amman11937 Jordan
Nowadays, the integration of blockchain and edge computing has become important in computer science due to the significant advantages it can bring to a range of real-world applications. By combining the strengths of b... 详细信息
来源: 评论
Modelling of diffraction of X-rays in perovskite superlattices  7
Modelling of diffraction of X-rays in perovskite superlattic...
收藏 引用
7th International Conference of Computational Methods in engineering science, CMES 2022
作者: Kokosza, L. Mitura, Z. Department of Applied Computer Science and Modelling Faculty of Metals Engineering and Industrial Computer Science AGH University of Science and Technology al. Mickiewicza 30 Kraków30-059 Poland
Nowadays, different perovskite structures are widely investigated because they can be potentially used in many branches of industry. If two materials are deposited alternately on a substrate, then a superlattice havin... 详细信息
来源: 评论
Toward Enhancing Cross-Lingual Domain Knowledge Sharing and Transferring for Multilingual Domain Adaptation in NMT
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 2125-2138页
作者: Zhengtao Yu Jinlei Xu Xiang Huang Zhongfen Deng Yonghua Wen Li Sun Yuxin Huang Hao Peng Philip S. Yu Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming China Yunnan Province Key Laboratory of Artificial Intelligence Kunming University of Science and Technology Kunming China School of Cyber Science and Technology Beihang University Beijing China Department of Computer Science University of Illinois Chicago IL USA School of Control and Computer Engineering North China Electric Power University Beijing China
Multilingual Neural Machine Translation (NMT) excels in sharing knowledge across languages and transferring insights from high-resource languages to improve performance in low-resource languages. However, its performa... 详细信息
来源: 评论
Multi-Layered Deep Learning Features Fusion for Human Action Recognition
收藏 引用
computers, Materials & Continua 2021年 第12期69卷 4061-4075页
作者: Sadia Kiran Muhammad Attique Khan Muhammad Younus Javed Majed Alhaisoni Usman Tariq Yunyoung Nam Robertas Damaševicius Muhammad Sharif Department of Computer Science HITEC University TaxilaTaxilaPakistan College of Computer Science and Engineering University of Ha’ilHa’ilSaudi Arabia College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz UniversityAl-KhrajSaudi Arabia Department of Computer Science and Engineering Soonchunhyang UniversityAsanKorea Faculty of Applied Mathematics Silesian University of TechnologyGliwicePoland Department of Computer Science COMSATS University IslamabadWah CampusPakistan
Human Action Recognition(HAR)is an active research topic in machine learning for the last few *** surveillance,robotics,and pedestrian detection are the main applications for action *** vision researchers have introdu... 详细信息
来源: 评论
Performance Comparison of the Invasive Weed Optimization K-Means Algorithm with Particle Swarm Optimization K-Means for Banking Data
Performance Comparison of the Invasive Weed Optimization K-M...
收藏 引用
International Conference on Cybernetics and Intelligent System (ICORIS)
作者: Ni Luh Gede Pivin Suwirmayanti I Ketut Gede Darma Putra Made Sudarma I Made Sukarsa Emy Setyaningsih Department of Computer Systems Faculty of Informatics and Computer Institut Teknologi dan Bisnis STIKOM Bali Bali Indonesia Department of Information Technology Faculty of Engineering Udayana University Jimbaran Hill Bali Indonesia Department of Electrical Engineering Faculty of Engineering Udayana University Jimbaran Hill Bali Indonesia Department of Computer Systems Engineering Faculty of Applied Science Universitas AKPRIND Indonesia Yogyakarta Indonesia
Banking produces extensive and diverse data, so a clustering process is needed to understand customer behavior patterns and transactions more effectively. This clustering has been widely utilized with the K-Means algo... 详细信息
来源: 评论
Virtual Reality Semiconductor Laboratory: Usability Testing to Improve User Experience (UX) in Virtual Environments  3
Virtual Reality Semiconductor Laboratory: Usability Testing ...
收藏 引用
3rd IEEE International Maghreb Meeting of the Conference on sciences and Techniques of Automatic control and computer engineering, MI-STA 2023
作者: Ahmed Alnagrat, Ahmed Jamah Ismail Alkhallas, Muhannad Imhmed Mohamed, Abdalslam S Che Ismail, Rizalafande Syed Idrus, Syed Zulkarnain Salem Saed, Halifah Department of Computer Science and Information Technology Wadi al-Shati Fezzan Libya Perlis Kangar01000 Malaysia Faculty of Engineering Technology in Zuwarah Department of Software Engineering Zuwarah Libya Aljufra University Faculty of Information Technology Aljufra Libya Arau02600 Malaysia Department of Communication Perlis Kangar01000 Malaysia Higher Institute of Science and Technology Wadi Al-Shati Department of Computer Science and Information Technology Wadi al-Shati Fezzan Libya
The Virtual Reality (VR) Semiconductor Laboratory, a computer-based virtual lab designed for training engineering students in semiconductor concepts, was evaluated to enhance user experience (UX) in virtual environmen... 详细信息
来源: 评论
Physical Layer Security in Untrusted Diamond Relay Networks with Imperfect Source-Relay Links
Physical Layer Security in Untrusted Diamond Relay Networks ...
收藏 引用
2022 International Symposium on Networks, computers and Communications, ISNCC 2022
作者: Qian, Shen He, Xin Zhou, Xiaobo Faculty of Engineering Kanagawa University Department of Information Systems Creation Japan Anhui Normal University School of Computer and Information China Tianjin University School of Computer Science and Technology China
A two-untrusted-relay transmission scheme is proposed with lossy-forward (LF) relaying being utilized. Two untrusted relays are located between one source and one common destination and there is no direct link between... 详细信息
来源: 评论
Investigating the Benefits of Adopting Secure Shell (SSH) in Wireless Network Security
Investigating the Benefits of Adopting Secure Shell (SSH) in...
收藏 引用
2023 IEEE International Conference on Paradigm Shift in Information Technologies with Innovative Applications in Global Scenario, ICPSITIAGS 2023
作者: Gavathri, C. Patil, Vivek D. Singh, Dhiraj Kumar Kumar, Ritesh Narmadha, T. Kalra, Hitesh Prince Shri Venkateshwara Padmavathy Engineering College Department of Science and Humanities Chennai127 India Vishwakarma Institute of Information Technology Department of Artificial Intelligence & Data Science Pune India Vivekananda Global University Department of Electrical Engineering Jaipur India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Computer Science Engineering Karnataka 562112 India Chitkara University Institute of Engineering and Technology Chitkara University Centre of Interdisciplinary Research in Business and Technology Punjab India
cozy Shell is an encrypted network protocol that has become increasingly popular in network security. Using SSH, organizations can defend their wireless networks from community penetration and malicious interest. SSH ... 详细信息
来源: 评论