咨询与建议

限定检索结果

文献类型

  • 3,163 篇 会议
  • 2,857 篇 期刊文献
  • 87 册 图书

馆藏范围

  • 6,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,743 篇 工学
    • 2,379 篇 计算机科学与技术...
    • 1,929 篇 软件工程
    • 845 篇 控制科学与工程
    • 750 篇 信息与通信工程
    • 539 篇 电气工程
    • 466 篇 生物工程
    • 451 篇 电子科学与技术(可...
    • 423 篇 生物医学工程(可授...
    • 342 篇 机械工程
    • 321 篇 光学工程
    • 284 篇 仪器科学与技术
    • 163 篇 动力工程及工程热...
    • 154 篇 化学工程与技术
    • 140 篇 交通运输工程
    • 123 篇 安全科学与工程
    • 119 篇 网络空间安全
  • 2,124 篇 理学
    • 955 篇 数学
    • 716 篇 物理学
    • 537 篇 生物学
    • 305 篇 系统科学
    • 295 篇 统计学(可授理学、...
    • 194 篇 化学
  • 924 篇 管理学
    • 616 篇 管理科学与工程(可...
    • 332 篇 图书情报与档案管...
    • 266 篇 工商管理
  • 471 篇 医学
    • 392 篇 临床医学
    • 318 篇 基础医学(可授医学...
    • 204 篇 药学(可授医学、理...
    • 170 篇 公共卫生与预防医...
  • 136 篇 法学
    • 113 篇 社会学
  • 96 篇 经济学
  • 83 篇 教育学
  • 80 篇 农学
  • 16 篇 艺术学
  • 14 篇 文学
  • 11 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 199 篇 deep learning
  • 188 篇 machine learning
  • 124 篇 control systems
  • 123 篇 accuracy
  • 121 篇 artificial intel...
  • 105 篇 feature extracti...
  • 101 篇 computational mo...
  • 86 篇 internet of thin...
  • 77 篇 optimization
  • 73 篇 training
  • 72 篇 real-time system...
  • 64 篇 predictive model...
  • 63 篇 neural networks
  • 58 篇 support vector m...
  • 56 篇 convolutional ne...
  • 55 篇 computer science
  • 54 篇 genetic algorith...
  • 54 篇 robustness
  • 53 篇 image segmentati...
  • 51 篇 security

机构

  • 97 篇 institut univers...
  • 96 篇 north-west unive...
  • 92 篇 tno technical sc...
  • 91 篇 national centre ...
  • 90 篇 infn sezione di ...
  • 89 篇 université de st...
  • 83 篇 nikhef national ...
  • 82 篇 ncsr demokritos ...
  • 79 篇 infn sezione di ...
  • 79 篇 university of jo...
  • 78 篇 infn sezione di ...
  • 75 篇 infn sezione di ...
  • 73 篇 university moham...
  • 70 篇 university würzb...
  • 67 篇 infn sezione di ...
  • 66 篇 università di ca...
  • 59 篇 university moham...
  • 59 篇 western sydney u...
  • 57 篇 university of am...
  • 55 篇 leiden universit...

作者

  • 99 篇 ferrara g.
  • 99 篇 ardid m.
  • 98 篇 calvo d.
  • 96 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 87 篇 coleiro a.
  • 87 篇 gozzini s.r.
  • 87 篇 dallier r.
  • 87 篇 enzenhöfer a.
  • 85 篇 celli s.
  • 84 篇 boettcher m.
  • 82 篇 carretero v.
  • 81 篇 dornic d.
  • 79 篇 bendahman m.
  • 78 篇 brunner j.
  • 77 篇 cherubini s.
  • 76 篇 di palma i.

语言

  • 5,112 篇 英文
  • 955 篇 其他
  • 34 篇 中文
  • 9 篇 日文
  • 8 篇 德文
  • 5 篇 法文
  • 3 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Control and Computer Engineering Faculty of Engineering and Computing"
6107 条 记 录,以下是321-330 订阅
Tekele Zemamie Action Recognition in Ethiopia Orthodox Tewahedo Church Using CNN-Bi-LSTM
Tekele Zemamie Action Recognition in Ethiopia Orthodox Tewah...
收藏 引用
2024 International Conference on Information and Communication Technology for Development for Africa, ICT4DA 2024
作者: Fikirie, Tenagne Azmeraw, Emiyamrew Tesfay, Wakjira Debasu, Abrham Bahir Dar University Faculty of Electrical and Computer Engineering Bahir Dar Institute of Technology P.O.Box 26 Bahir Dar Ethiopia University of Gondar College of Engineering Department of Computer Engineering Gondar Ethiopia Assosa University Department of Computer Engineering Assosa Ethiopia Bahir Dar University Faculty of Computing Bahir Dar Institute of Technology P.O.Box 26 Bahir Dar Ethiopia
Human action recognition (HAR) is a computer vision technique used to understand the activity of the action performed in the scene. computer vision technology has become popular and is applied in various areas like su... 详细信息
来源: 评论
Computational Optimization of RIS-Enhanced Backscatter and Direct Communication for 6G IoT:A DDPG-Based Approach with Physical Layer Security
收藏 引用
computer Modeling in engineering & Sciences 2025年 第3期142卷 2191-2210页
作者: Syed Zain Ul Abideen Mian Muhammad Kamal Eaman Alharbi Ashfaq Ahmad Malik Wadee Alhalabi Muhammad Shahid Anwar Liaqat Ali College of Computer Science and Technology Qingdao UniversityQingdao266071China School of Electronic Science and Engineering Southeast UniversityNanjing210018China Computer Science Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah80200Saudi Arabia Department of Quality Assurance Al-Kawthar UniversityKarachi75300Pakistan Department of Computer Science Immersive Virtual Reality Research GroupKing Abdulaziz UniversityJeddah80200Saudi Arabia Department of AI and Software Gachon UniversitySeongnam-si13120Republic of Korea Department of Electrical Engineering University of Science and TechnologyBannu28100Pakistan
The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet ofThings(IoT)applications,particularly in terms of ultra-reliable,secure,and energyeffic... 详细信息
来源: 评论
Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2497-2513页
作者: Mohammad Alamgeer Fahd N.Al-Wesabi Huda G.Iskandar Imran Khan Nadhem Nemri Mohammad Medani Mohammed Abdullah Al-Hagery Ali Mohammed Al-Sharafi Department of Information Systems King Khalid UniversityMuhayel AseerKingdom of Saudi Arabia Department of Computer Science King Khalid UniversityMuhayel AseerKingdom of Saudi Arabia Faculty of Computer and IT Sana’a UniversitySana’aYemen School of Computing Faculty of EngineeringUniversiti Teknologi MalaysiaMalaysia Department of Electrical Engineering University of Engineering and Technology PeshawarPakistan Department of Computer Science College of ComputerQassim UniversitySaudi Arabia Department of Computer Science College of Computers and Information TechnologyUniversity of BishaKSA
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication *** this paper,a text zero... 详细信息
来源: 评论
Hamiltonian learning using machine-learning models trained with continuous measurements
收藏 引用
Physical Review Applied 2024年 第4期22卷 044080页
作者: Kris Tucker Amit Kiran Rege Conor Smith Claire Monteleoni Tameem Albash Department of Applied Mathematics Department of Computer Science Center for Quantum Information and Control Department of Electrical and Computer Engineering Paris France Center for Computing Research
We build upon recent work on the use of machine-learning models to estimate Hamiltonian parameters using continuous weak measurement of qubits as input. We consider two settings for the training of our model: (1) supe... 详细信息
来源: 评论
A Comparative Evaluation of GA and PSO Tuned PID controllers for the Quadruple Tank System
A Comparative Evaluation of GA and PSO Tuned PID Controllers...
收藏 引用
2024 International Conference on Information and Communication Technology for Development for Africa, ICT4DA 2024
作者: Hailu, Gashaye L. Yetayew, Tefera T. Bahir Dar University Electrical and Computer Engineering Faculty Bahir Dar Institute of Technology Bahir Dar Ethiopia Adama Science and Technology University Department of Power and Control Engineering Adama Ethiopia
In this research, nature inspired metaheuristic optimization algorithms: Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) Techniques are formulated to tune optimal combinations of PID controller parameters... 详细信息
来源: 评论
Road Traffic Accident Pattern Analysis with Data Mining  12
Road Traffic Accident Pattern Analysis with Data Mining
收藏 引用
12th International Conference on Awareness Science and Technology, iCAST 2023
作者: Zhe Chai, Albe Bing Lau, Bee Theng Tsun Tee, Mark Kit McCarthy, Chris Faculty of Engineering Computing & Science Swinburne University of Technology Sarawak Campus Kuching Malaysia Department of Computer Science & Software Engineering Swinburne University of Technology Melbourne Australia
The discovery of Road Traffic Accident (RTA) patterns is vital to formulate mitigation strategies based on the characteristics of RTA. Various studies have applied association rule mining for RTA pattern discovery. Ho... 详细信息
来源: 评论
Estimating the AGV load and a battery lifetime based on the current measurement and random forest application
Estimating the AGV load and a battery lifetime based on the ...
收藏 引用
2023 IEEE International Conference on Big Data, BigData 2023
作者: Hanzel, Krzysztof Grzechca, Damian Ziebinski, Adam Chruszczyk, Lukas Janus, Artur Silesian University of Technology Faculty of Automatic Control Electronics and Computer Science Department of Telecommunications and Teleinformatics Gliwice Poland Silesian University of Technology Faculty of Automatic Control Electronics and Computer Science Department of Electronics Electrical Engineering and Microelectronics Gliwice Poland Silesian University of Technology Faculty of Automatic Control Electronics and Computer Science Department of Distributed Systems and Informatics Devices Gliwice Poland Silesian University of Technology Student of Electrical EngineeringFaculty of Electrical Engineering Gliwice Poland
The paper describes the energy consumption from the battery based on the current measurements for various cases, i.e., speed (PWL adjustment) and loads. The main purpose of the research is to have additional and relia... 详细信息
来源: 评论
A Novel Cyber Threat Intelligence (CTI) Framework for Detecting Android Malware: Work on Progress
A Novel Cyber Threat Intelligence (CTI) Framework for Detect...
收藏 引用
2024 International Conference on Information Technology Systems and Innovation, ICITSI 2024
作者: Wijaya, Andri Stiawan, Deris Abdiansah Suprapto, Bhakti Yudho Saputra, Iwan Pahendra Anto Rini, Dian Palupi Sayfudin Idris, Mohd.Yazid Budiarto, Rahmat Universitas Katolik Musi Charitas Faculty of Engineering Universitas Sriwijaya Department of Information System Indonesia Universitas Sriwijaya Faculty of Computer Science Indonesia Sriwijaya University Faculty of Engineering Electrical Engineering Dept. Palembang Indonesia Sriwijaya University Faculty of Comp.Science Informatic Engineering Dept. Palembang Indonesia Universitas Muhammadiyah Palembang Indonesia Universiti Teknologi Malaysia School of Computing Faculty of Computing Johor81310 Malaysia Al-Baha University College of Computing and Information Al Aqiq Saudi Arabia
The latest approach in cyber threat intelligence (CTI) is becoming increasingly crucial in detecting evolving cyber threats, including malware on Android devices. This problem is getting deeper when the number of Andr... 详细信息
来源: 评论
Ontology-Based News Linking for Semantic Temporal Queries
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3913-3929页
作者: Muhammad Islam Satti Jawad Ahmed Hafiz Syed Muhammad Muslim Akber Abid Gardezi Shafiq Ahmad Abdelaty Edrees Sayed Salman Naseer Muhammad Shafiq Faculty of Computing Riphah International UniversityI-14 CampusIslamabad44000Pakistan Department of Computer Science Zabsolutions SZABISTIslamabadPakistan Department of Computer Science COMSATS University IslamabadIslamabad45550Pakistan Industrial Engineering Department College of EngineeringKing Saud UniversityP.O.Box 800Riyadh11421Saudi Arabia Department of Information Technology University of the Punjab Gujranwala CampusGujranwala52250Pakistan Department of Information and Communication Engineering Yeungnam UniversityGyeongsan38541Korea
Daily newspapers publish a tremendous amount of information disseminated through the *** available and easily accessible large online repositories are not indexed and are in an un-processable *** major hindrance in de... 详细信息
来源: 评论
Reliable Multihop Routing and Congestion Aware Chicken Swarm Optimization in Vehicular Ad-Hoc Network  3
Reliable Multihop Routing and Congestion Aware Chicken Swarm...
收藏 引用
3rd International Conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Anitha, Cuddapah Al-Tarazi, Dalia Vignesh, G.D. Vasuki, A. Vinotha Giri, Jayant Dinesh, M. School of Computing Mohan Babu University Erstwhile Sree Vidyanikethan Engineering College Department of Computer Science and Engineering Tirupati India Zarqa University Faculty of Engineering Department of Architecture Engineering Zarqa Jordan College of Engineering University of Business and Technology Jeddah Saudi Arabia St. Joseph's College of Engineering Department of Electronics and Communication Engineering Chennai India J.P. College of Engineering Department of Computer Science and Engineering Tenkasi India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Lovely Professional University Division of Research and Development Phagwara India Department of Vlsi Microelectronics Chennai India
Background: Vehicular Ad Hoc Networks (VANETs) play a crucial role in intelligent transportation by facilitating communication between vehicles and vehicles with infrastructure-based models. They encounter problems su... 详细信息
来源: 评论