咨询与建议

限定检索结果

文献类型

  • 23,873 篇 会议
  • 18,669 篇 期刊文献
  • 575 册 图书

馆藏范围

  • 43,117 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25,081 篇 工学
    • 14,542 篇 计算机科学与技术...
    • 11,783 篇 软件工程
    • 5,546 篇 控制科学与工程
    • 4,952 篇 信息与通信工程
    • 3,900 篇 电气工程
    • 3,244 篇 电子科学与技术(可...
    • 2,662 篇 生物工程
    • 2,460 篇 生物医学工程(可授...
    • 2,328 篇 机械工程
    • 1,785 篇 光学工程
    • 1,768 篇 化学工程与技术
    • 1,616 篇 动力工程及工程热...
    • 1,587 篇 仪器科学与技术
    • 1,235 篇 材料科学与工程(可...
    • 905 篇 交通运输工程
    • 894 篇 安全科学与工程
  • 16,580 篇 理学
    • 7,434 篇 数学
    • 6,089 篇 物理学
    • 3,265 篇 生物学
    • 2,402 篇 系统科学
    • 2,333 篇 统计学(可授理学、...
    • 1,908 篇 化学
  • 5,977 篇 管理学
    • 3,886 篇 管理科学与工程(可...
    • 2,262 篇 图书情报与档案管...
    • 1,881 篇 工商管理
  • 2,631 篇 医学
    • 2,163 篇 临床医学
    • 1,812 篇 基础医学(可授医学...
    • 1,124 篇 药学(可授医学、理...
    • 926 篇 公共卫生与预防医...
  • 987 篇 法学
    • 833 篇 社会学
  • 764 篇 经济学
  • 628 篇 农学
  • 462 篇 教育学
  • 117 篇 文学
  • 83 篇 军事学
  • 58 篇 艺术学
  • 5 篇 历史学
  • 4 篇 哲学

主题

  • 1,022 篇 computer science
  • 827 篇 control systems
  • 801 篇 deep learning
  • 697 篇 accuracy
  • 655 篇 machine learning
  • 555 篇 artificial intel...
  • 509 篇 computational mo...
  • 479 篇 internet of thin...
  • 439 篇 feature extracti...
  • 415 篇 optimization
  • 374 篇 support vector m...
  • 365 篇 training
  • 347 篇 neural networks
  • 300 篇 predictive model...
  • 281 篇 mathematical mod...
  • 258 篇 robustness
  • 235 篇 real-time system...
  • 219 篇 covid-19
  • 218 篇 data mining
  • 217 篇 testing

机构

  • 1,097 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 986 篇 physikalisches i...
  • 975 篇 oliver lodge lab...
  • 653 篇 infn laboratori ...
  • 632 篇 infn sezione di ...
  • 613 篇 infn sezione di ...
  • 611 篇 infn sezione di ...
  • 607 篇 fakultät physik ...
  • 568 篇 university of ch...
  • 557 篇 school of physic...
  • 543 篇 horia hulubei na...
  • 541 篇 department of ph...
  • 535 篇 school of physic...
  • 529 篇 iccub universita...
  • 525 篇 imperial college...
  • 520 篇 nikhef national ...
  • 517 篇 h.h. wills physi...
  • 515 篇 stfc rutherford ...
  • 510 篇 school of physic...

作者

  • 265 篇 barter w.
  • 259 篇 a. gomes
  • 250 篇 c. alexa
  • 247 篇 j. m. izen
  • 246 篇 beiter a.
  • 243 篇 g. bella
  • 241 篇 j. strandberg
  • 240 篇 c. amelung
  • 238 篇 d. calvet
  • 237 篇 bellee v.
  • 235 篇 s. chen
  • 234 篇 g. spigo
  • 231 篇 f. siegert
  • 231 篇 bowcock t.j.v.
  • 228 篇 brundu d.
  • 228 篇 blake t.
  • 226 篇 j. wang
  • 218 篇 amato s.
  • 217 篇 y. tayalati
  • 217 篇 betancourt c.

语言

  • 41,112 篇 英文
  • 1,540 篇 其他
  • 339 篇 中文
  • 91 篇 日文
  • 16 篇 德文
  • 11 篇 法文
  • 4 篇 荷兰文
  • 4 篇 俄文
  • 3 篇 朝鲜文
  • 3 篇 葡萄牙文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 斯洛文尼亚文
  • 1 篇 泰文
检索条件"机构=Department of Control Engineering and Science Faculty of Computer Science and Systems Engineering"
43117 条 记 录,以下是71-80 订阅
排序:
Artificial intelligence-inspired comprehensive framework for desertification prediction
International Journal of Cognitive Computing in Engineering
收藏 引用
International Journal of Cognitive Computing in engineering 2025年 6卷 462-476页
作者: Alsubai, Shtwai Mosleh, Mogeeb A.A. Al-Hadhrami, Suheer A. Bhatia, Munish College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University Alkharj Saudi Arabia Faculty of Engineering & Computing University of Science & Technology Aden Yemen Faculty of Engineering and Information Technology Taiz Univeristy Taiz Yemen Department of Computer Engineering College of Engineering Al Mukalla Hadhramout Yemen Department of Computer Applications National Institute of Technology Kurukshetra India
Desertification greatly affects land deterioration, farming efficiency, economic growth, and health, especially in Gulf nations. Climate change has worsened desertification, making developmental issues in the area eve... 详细信息
来源: 评论
Message control for Blockchain Rewriting
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 1864-1876页
作者: Li, Yingjiu Sengupta, Binanda Tian, Yangguang Yuan, Jiaming Yuen, Tsz Hon School of Computer and Information Science University of Oregon EugeneOR United States School of Computer Science and Electronic Engineering University of Surrey Guilford Surrey United Kingdom Indian Institute of Engineering Science and Technology Shibpur India Department of Software Systems and Cybersecurity Monash University MelbourneVIC Australia
Blockchain rewriting is necessary for modifying illegal or messages included in blockchain transactions, while maintaining the consistency of subsequent blocks in the blockchain. However, arbitrary blockchain rewritin... 详细信息
来源: 评论
A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1607-1621页
作者: Federica Uccello Marek Pawlicki Salvatore D'Antonio RafałKozik MichałChoras Centro Direzionale Department of EngineeringUniversity of Naples‘Parthenope’Isola C4Napoli80133Italy Department of Computer and Information Science Software and SystemsLinköping UniversityLinköping58183Sweden ITTI Sp.z o.o. Pozna´n61-612Poland Faculty of Telecommunications Computer Science and Electrical EngineeringBydgoszcz University of Science and TechnologyBydgoszcz85-796Poland
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based... 详细信息
来源: 评论
Blockchain Integration in IoT:Applications,Opportunities,and Challenges
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1561-1605页
作者: Mozhgan Gholami Ali Ghaffari Nahideh Derakhshanfard Nadir iBRAHIMO GLU Ali Asghar Pourhaji Kazem Department of Computer Engineering Tabriz BranchIslamic Azad UniversityTabriz***Iran Department of Computer Engineering Faculty of Engineering and Natural ScienceIstinye UniversityIstanbul34396Türkiye Department of Computer Science Khazar UniversityBakuAZ1096Azerbaijan MSDC Department Huawei R&D Center˙Istanbul34768Türkiye
The Internet has been enhanced recently by blockchain and Internet of Things(IoT)*** Internet of Things is a network of various sensor-equipped *** gradually integrates the Internet,sensors,and cloud *** is based on e... 详细信息
来源: 评论
Enhancing Performance of Machine Learning Models in Healthcare: An Analytical Framework for Assessing and Improving Data Quality  5th
Enhancing Performance of Machine Learning Models in Healthca...
收藏 引用
5th International Conference on Advances in Information Communication Technology and Computing, AICTC 2024
作者: Al-Hgaish, Areen Atan, Rodziah Yaakob, Razali Osman, Mohd Hafeez Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang44330 Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang44330 Malaysia
The utilization of Data-Driven Machine Learning (DDML) models in the healthcare sector poses unique challenges due to the crucial nature of clinical decision-making and its impact on patient outcomes. A primary concer... 详细信息
来源: 评论
IoT based Line of control Monitoring System  2
IoT based Line of Control Monitoring System
收藏 引用
2nd International Conference on Machine Learning and Autonomous systems, ICMLAS 2025
作者: Petkar, Taniya Faculty of Engineering and Technology Department of Computer Science And Medical Engineering Maharashtra Wardha442001 India
This paper presents a novel line-of-control (LoC) monitoring system that leverages the Internet of Things (IoT) to improve border security. The system creates a strong infrastructure for real-time monitoring throughou... 详细信息
来源: 评论
TCIP: Transformed Colour Intensity Profiles analysis for fault detection in power line insulators
收藏 引用
Multimedia Tools and Applications 2025年 第8期84卷 4503-4534页
作者: Tomaszewski, Michal Gasz, Rafal Kasana, Singara Singh Osuchowski, Jakub Singh, Simranjit Zator, Slawomir Department of Computer Science Faculty of Electrical Engineering Automatic Control and Informatics Opole University of Technology Prószkowska 76 Opole45-758 Poland Department of Computer Science and Information Technology Central University of Haryana Haryana Mahendergarh123031 India Department of Information Technology Dr B. R. Ambedkar National Institute of Technology Punjab Jalandhar India Department of Safety Engineering and Technical Systems Faculty of Production Engineering and Logistics Opole University of Technology Prószkowska 76 Opole45-758 Poland
In response to the escalating demand for electricity, the aging process and inherent failures in power lines have become unavoidable challenges in their operational integrity. This research addresses the imperative ne... 详细信息
来源: 评论
A new family of q-Bernstein polynomials: probabilistic viewpoint
收藏 引用
Arab Journal of Basic and Applied sciences 2025年 第1期32卷 42-50页
作者: Karagenc, Ayse Acikgoz, Mehmet Araci, Serkan Department of Mathematics Faculty of Science and Arts Gaziantep University Gaziantep Turkey Department of Computer Engineering Faculty of Engineering Hasan Kalyoncu University Gaziantep Turkey
In this paper, we introduce a new class of polynomials, called probabilistic q-Bernstein polynomials, alongside their generating function. Assuming (Formula presented.) is a random variable satisfying moment condition... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
Proposal of a Document Layout Analysis Method Adopting Pre-processing Based on Document Image Classification  16th
Proposal of a Document Layout Analysis Method Adopting Pre...
收藏 引用
16th International Conference on Genetic and Evolutionary Computing, ICGEC 2024
作者: Kakinoki, Kanta Katayama, Tetsuro Department of Computer Science and Systems Engineering Faculty of Engineering University of Miyazaki 1-1 Gakuen-Kibanadai Nishi Miyazaki889-2192 Japan
To extract important information from the document images, document layout analysis research has been carried out. Previous research analyzes document layouts only for specific document formats. This paper proposes a ... 详细信息
来源: 评论