咨询与建议

限定检索结果

文献类型

  • 3,163 篇 会议
  • 2,857 篇 期刊文献
  • 87 册 图书

馆藏范围

  • 6,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,743 篇 工学
    • 2,379 篇 计算机科学与技术...
    • 1,929 篇 软件工程
    • 845 篇 控制科学与工程
    • 750 篇 信息与通信工程
    • 539 篇 电气工程
    • 466 篇 生物工程
    • 451 篇 电子科学与技术(可...
    • 423 篇 生物医学工程(可授...
    • 342 篇 机械工程
    • 321 篇 光学工程
    • 284 篇 仪器科学与技术
    • 163 篇 动力工程及工程热...
    • 154 篇 化学工程与技术
    • 140 篇 交通运输工程
    • 123 篇 安全科学与工程
    • 119 篇 网络空间安全
  • 2,124 篇 理学
    • 955 篇 数学
    • 716 篇 物理学
    • 537 篇 生物学
    • 305 篇 系统科学
    • 295 篇 统计学(可授理学、...
    • 194 篇 化学
  • 924 篇 管理学
    • 616 篇 管理科学与工程(可...
    • 332 篇 图书情报与档案管...
    • 266 篇 工商管理
  • 471 篇 医学
    • 392 篇 临床医学
    • 318 篇 基础医学(可授医学...
    • 204 篇 药学(可授医学、理...
    • 170 篇 公共卫生与预防医...
  • 136 篇 法学
    • 113 篇 社会学
  • 96 篇 经济学
  • 83 篇 教育学
  • 80 篇 农学
  • 16 篇 艺术学
  • 14 篇 文学
  • 11 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 199 篇 deep learning
  • 188 篇 machine learning
  • 124 篇 control systems
  • 123 篇 accuracy
  • 121 篇 artificial intel...
  • 105 篇 feature extracti...
  • 101 篇 computational mo...
  • 86 篇 internet of thin...
  • 77 篇 optimization
  • 73 篇 training
  • 72 篇 real-time system...
  • 64 篇 predictive model...
  • 63 篇 neural networks
  • 58 篇 support vector m...
  • 56 篇 convolutional ne...
  • 55 篇 computer science
  • 54 篇 genetic algorith...
  • 54 篇 robustness
  • 53 篇 image segmentati...
  • 51 篇 security

机构

  • 97 篇 institut univers...
  • 96 篇 north-west unive...
  • 92 篇 tno technical sc...
  • 91 篇 national centre ...
  • 90 篇 infn sezione di ...
  • 89 篇 université de st...
  • 83 篇 nikhef national ...
  • 82 篇 ncsr demokritos ...
  • 79 篇 infn sezione di ...
  • 79 篇 university of jo...
  • 78 篇 infn sezione di ...
  • 75 篇 infn sezione di ...
  • 73 篇 university moham...
  • 70 篇 university würzb...
  • 67 篇 infn sezione di ...
  • 66 篇 università di ca...
  • 59 篇 university moham...
  • 59 篇 western sydney u...
  • 57 篇 university of am...
  • 55 篇 leiden universit...

作者

  • 99 篇 ferrara g.
  • 99 篇 ardid m.
  • 98 篇 calvo d.
  • 96 篇 chen a.
  • 88 篇 gal t.
  • 88 篇 bozza c.
  • 88 篇 díaz a.f.
  • 88 篇 boumaaza j.
  • 87 篇 coleiro a.
  • 87 篇 gozzini s.r.
  • 87 篇 dallier r.
  • 87 篇 enzenhöfer a.
  • 85 篇 celli s.
  • 84 篇 boettcher m.
  • 82 篇 carretero v.
  • 81 篇 dornic d.
  • 79 篇 bendahman m.
  • 78 篇 brunner j.
  • 77 篇 cherubini s.
  • 76 篇 di palma i.

语言

  • 5,112 篇 英文
  • 955 篇 其他
  • 34 篇 中文
  • 9 篇 日文
  • 8 篇 德文
  • 5 篇 法文
  • 3 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Control and Computer Engineering Faculty of Engineering and Computing"
6107 条 记 录,以下是41-50 订阅
排序:
Evaluating Extended Kalman Filter and Unscented Kalman Filter for accurate trajectory estimation  24
Evaluating Extended Kalman Filter and Unscented Kalman Filte...
收藏 引用
24th International Symposium INFOTEH-JAHORINA, INFOTEH 2025
作者: Golić, Anastasija Radović, Mirna University of Novi Sad Faculty of Technical Sciences Department of Computing and Control Engineering Novi Sad Serbia
This paper evaluates two common methods for trajectory estimation: the Extended Kalman Filter (EKF), the Unscented Kalman Filter (UKF). The EKF and UKF are well-established recursive filtering techniques commonly used... 详细信息
来源: 评论
A NOTE ON THE QUALITATIVE BEHAVIOUR OF AN ODE MODEL RELATED TO ENDOTOXIN TOLERANCE
收藏 引用
UPB Scientific Bulletin, Series A: Applied Mathematics and Physics 2024年 第4期86卷 127-130页
作者: Olteanu, Mircea Ştefan, Radu Department of Mathematical Methods and Models Faculty of Applied Sciences University "Politehnica" of Bucharest Romania Department of Automatic Control and Systems Engineering Faculty of Automatic Control and Computer Science University "Politehnica" of Bucharest Romania
The present paper analyses the qualitative behavior of a 2nd order differential equations system modeling the immune system response. © 2024, Politechnica University of Bucharest. All rights reserved.
来源: 评论
Hybrid Deep Learning Based Attack Detection for Imbalanced Data Classification
收藏 引用
Intelligent Automation & Soft computing 2023年 第1期35卷 297-320页
作者: Rasha Almarshdi Laila Nassef Etimad Fadel Nahed Alowidi Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science Faculty of Computer Science and EngineeringUniversity of HailHailSaudi Arabia
Internet of Things(IoT)is the most widespread and fastest growing technology *** to the increasing of IoT devices connected to the Internet,the IoT is the most technology under security *** IoT devices are not designe... 详细信息
来源: 评论
Designing Quantum-Resilient Blockchain Frameworks: Enhancing Transactional Security with Quantum Algorithms in Decentralized Ledgers
收藏 引用
International Journal of Advanced computer Science and Applications 2025年 第4期16卷 618-628页
作者: Kale, Meenal R. Baker El-Ebiary, Yousef A. Sathiya, L. Burugari, Vijay Kumar Yulduz, Erkiniy Muniyandy, Elangovan Alanazi, Rakan Department of Humanities Yeshwantrao Chavan College of Engineering Hingna Nagpur India Faculty of Informatics and Computing UniSZA University Malaysia Department of CSE Panimalar Engineering College Chennai India Dept of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh Guntur India Automatic Control and Computer Engineering Department Turin Polytechnic University in Tashkent Tashkent Uzbekistan Department of Biosciences-Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India Applied Science Research Center Applied Science Private University Amman Jordan Department of Information Technology Faculty of Computing and Information Technology Northern Border University Rafha Saudi Arabia
Quantum computing is progressing at a fast rate and there is a real threat that classical cryptographic methods can be compromised and therefore impact the security of blockchain networks. All of the ways used to secu... 详细信息
来源: 评论
SightAid: empowering the visually impaired in the Kingdom of Saudi Arabia (KSA) with deep learning-based intelligent wearable vision system
收藏 引用
Neural computing and Applications 2024年 第19期36卷 11075-11095页
作者: Talaat, Fatma M. Farsi, Mohammed Badawy, Mahmoud Elhosseini, Mostafa Machine Learning Department Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh Egypt Faculty of Computer Science & amp Engineering New Mansoura University Gamasa35712 Egypt College of Computer Science and Engineering Taibah University Yanbu46421 Saudi Arabia Computers and Control Systems Engineering Department Faculty of Engineering Mansoura University Mansoura35516 Egypt Computer Science and Information Department Applied College Taibah University Madinah46537 Saudi Arabia
In the Kingdom of Saudi Arabia, visual impairment poses significant challenges for approximately 17.5% of school-aged children, mainly due to refractive errors. These challenges extend to everyday navigation, environm... 详细信息
来源: 评论
Liberated Arabic Handwritten Text Recognition using Convolutional Recurrent Neural Networks
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer Science and Mathematics 2025年 第2期6卷 72-81页
作者: AlRababah, Ahmad AbdulQadir Aljahdali, Mohammed Khalid Al jahdali, Abdulrahim Abdulhamid AlGhanmi, Mohammed Saleh Al Barazanchi, Israa Ibraheem Department of Computer Science Faculty of Computing and Information Technology in Rabigh King Abdulaziz University Saudi Arabia College of Engineering University of Warith Al-Anbiyaa Karbala Iraq
Arabic script is exhibited in a cursive style, which is a departure from the norm in many common languages, and the shapes of letters are contingent on their positions within words. The form of the first letter is inf... 详细信息
来源: 评论
An ensemble deep learning model for cyber threat hunting in industrial internet of things
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 101-110页
作者: Abbas Yazdinejad Mostafa Kazemi Reza M.Parizi Ali Dehghantanha Hadis Karimipour Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Electrical Engineering Faculty of EngineeringShahed UniversityTehranIran College of Computing and Software Engineering Kennesaw State UniversityGAUSA School of Engineering University of GuelphOntarioCanada
By the emergence of the fourth industrial revolution,interconnected devices and sensors generate large-scale,dynamic,and inharmonious data in Industrial Internet of Things(IIoT)*** vast heterogeneous data increase the... 详细信息
来源: 评论
Cognition2Vocation: meta-learning via ConvNets and continuous transformers
收藏 引用
Neural computing and Applications 2024年 第21期36卷 12935-12950页
作者: Kamran, Sara Hosseini, Saeid Esmailzadeh, Sayna Kangavari, Mohammad Reza Hua, Wen School of Computer Engineering Iran University of Science and Technology Tehran Iran Faculty of Computing and Information Technology Sohar University Sohar Oman Department of Computing The Hong Kong Polytechnic University Hong Kong
Estimating the suitability of individuals for a vocation via leveraging the knowledge within cognitive factors comes with numerous applications: employment resourcing, occupation counseling, and workload management. A... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
Science China(Information Sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
Exploiting Machine Learning and LSTM for Human Activity Recognition: Using Physiological and Biological Sensor Data from Actigraph  25
Exploiting Machine Learning and LSTM for Human Activity Reco...
收藏 引用
25th IEEE International Conference on Industrial Technology, ICIT 2024
作者: Oyeleye, Matthew Chen, Tianhua Su, Pan Antoniou, Grigoris School Of Computing And Engineering University Of Huddersfield Department Of Computer Science United Kingdom School Of Control And Computer Engineering North China Electric Power University China
Human activity recognition involves identifying the daily living activities of an individual through the utilization of sensor attributes and intelligent learning algorithms. The identification of intricate human acti... 详细信息
来源: 评论