咨询与建议

限定检索结果

文献类型

  • 4,319 篇 会议
  • 3,612 篇 期刊文献
  • 134 册 图书

馆藏范围

  • 8,065 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,807 篇 工学
    • 3,246 篇 计算机科学与技术...
    • 2,612 篇 软件工程
    • 1,191 篇 信息与通信工程
    • 918 篇 控制科学与工程
    • 657 篇 电气工程
    • 590 篇 电子科学与技术(可...
    • 546 篇 生物工程
    • 420 篇 生物医学工程(可授...
    • 415 篇 机械工程
    • 302 篇 光学工程
    • 255 篇 仪器科学与技术
    • 255 篇 动力工程及工程热...
    • 200 篇 化学工程与技术
    • 182 篇 安全科学与工程
    • 171 篇 网络空间安全
    • 162 篇 材料科学与工程(可...
  • 2,773 篇 理学
    • 1,334 篇 数学
    • 879 篇 物理学
    • 641 篇 生物学
    • 462 篇 统计学(可授理学、...
    • 357 篇 系统科学
    • 215 篇 化学
  • 1,332 篇 管理学
    • 908 篇 管理科学与工程(可...
    • 466 篇 图书情报与档案管...
    • 448 篇 工商管理
  • 543 篇 医学
    • 464 篇 临床医学
    • 360 篇 基础医学(可授医学...
    • 217 篇 公共卫生与预防医...
    • 194 篇 药学(可授医学、理...
  • 237 篇 法学
    • 190 篇 社会学
  • 150 篇 经济学
  • 108 篇 农学
  • 105 篇 教育学
  • 33 篇 文学
  • 22 篇 艺术学
  • 12 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 252 篇 deep learning
  • 208 篇 machine learning
  • 143 篇 computer science
  • 143 篇 feature extracti...
  • 142 篇 artificial intel...
  • 133 篇 computational mo...
  • 129 篇 internet of thin...
  • 123 篇 accuracy
  • 113 篇 information tech...
  • 105 篇 optimization
  • 102 篇 wireless sensor ...
  • 99 篇 predictive model...
  • 89 篇 information syst...
  • 88 篇 data mining
  • 86 篇 support vector m...
  • 83 篇 laboratories
  • 83 篇 real-time system...
  • 78 篇 neural networks
  • 77 篇 security
  • 76 篇 protocols

机构

  • 166 篇 faculty of scien...
  • 166 篇 departamento de ...
  • 165 篇 department for p...
  • 165 篇 department of ph...
  • 164 篇 department of ph...
  • 161 篇 faculté des scie...
  • 159 篇 yerevan physics ...
  • 157 篇 department of ph...
  • 157 篇 kirchhoff-instit...
  • 156 篇 department of ph...
  • 153 篇 department of ph...
  • 153 篇 institute of phy...
  • 147 篇 fakultät für phy...
  • 144 篇 national scienti...
  • 143 篇 institute of phy...
  • 140 篇 institut für ast...
  • 137 篇 department of ph...
  • 136 篇 department of ph...
  • 136 篇 physics division...
  • 136 篇 physikalisches i...

作者

  • 162 篇 c. alexa
  • 162 篇 j. m. izen
  • 162 篇 k. bos
  • 162 篇 g. bella
  • 162 篇 j. strandberg
  • 162 篇 d. calvet
  • 162 篇 c. amelung
  • 162 篇 h. a. gordon
  • 162 篇 g. spigo
  • 162 篇 e. hines
  • 162 篇 a. c. könig
  • 161 篇 f. siegert
  • 158 篇 m. klein
  • 158 篇 r. ströhmer
  • 158 篇 h. sakamoto
  • 158 篇 s. nektarijevic
  • 158 篇 m. rijssenbeek
  • 158 篇 f. marroquim
  • 158 篇 s. jin
  • 158 篇 g. gaudio

语言

  • 7,530 篇 英文
  • 458 篇 其他
  • 76 篇 中文
  • 9 篇 日文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Department of Information Technology and Systems Section Computer Engineering"
8065 条 记 录,以下是511-520 订阅
排序:
A hybrid approach for medical images classification and segmentation to reduce complexity
收藏 引用
Innovations in systems and Software engineering 2023年 第1期19卷 33-46页
作者: Kumar, Ankit Bhatia, Surbhi Bhardwaj, Rajat Singh, Kamred Udham varshney, Neeraj Raja, Linesh Department of Computer Engineering and Applications GLA University Chaumuhan Uttar Pradesh Mathura281406 India Department of Information Systems College of Computer Science and Information Technology King Faisal University Dammam31451 Saudi Arabia Chitkara University Institute of Engineering and Technology Chitkara University Chandigarh-Patiala National Highway Punjab Rajpura140401 India Department of Computer Science and Information Engineering National Cheng Kung University Dasyue Street Tainan Tainan701 Taiwan School of Computing Graphic Era Hill University Bell Road Uttarakhand Dehradun248002 India Department of Computer Apllications Manipal University Jaipur Rajasthan Jaipur303007 India
The computational domain facilitates the performance of novel and innovative medical research and development tasks by providing support and computational power. This analysis method forecasts the future by analyzing ... 详细信息
来源: 评论
Success Factors of Requirement Elicitation in the Field of Software engineering  4
Success Factors of Requirement Elicitation in the Field of S...
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Attanayaka, Buddhima Nawinna, Dasuni Manathunga, Kalpani Abeygunawardhana, Pradeep K.W. Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka Department of Computer Systems & Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka
Requirement elicitation (RE) is a cognitively challenging and time-consuming task in software development due to the numerous challenges associated with it including conflicting requirements, unspoken, or assumed requ... 详细信息
来源: 评论
Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 6127-6140页
作者: Mohamed Ali Ibrahim A.Abd El-Moghith Mohamed N.El-Derini Saad M.Darwish Higher Institute for Tourism Hotels and ComputerAl-SeyoufAlexandria21533Egypt Department of Information Technology Institute of Graduate Studies and ResearchAlexandria University21526Egypt Department of Computer and Systems Engineering Faculty of EngineeringAlexandria UniversityAlexandria21544Egypt
Routing is a key function inWireless Sensor Networks(WSNs)since it facilitates data transfer to base *** attacks have the potential to destroy and degrade the functionality ofWSNs.A trustworthy routing system is essen... 详细信息
来源: 评论
Secure-by-Construction Synthesis for Control systems
收藏 引用
IEEE Transactions on Automatic Control 2025年 第6期70卷 4170-4177页
作者: Zhong, Bingzhuo Liu, Siyuan Caccamo, Marco Zamani, Majid Thrust of Artificial Intelligence Information Hub The Thrust of Intelligent Transportation System Hub China KTH Royal Institute of Technology Division of Decision and Control Systems Stockholm Sweden Technical University of Munich TUM School of Engineering and Design Germany University of Colorado Boulder Department of Computer Science United States Ludwig Maximilian University Department of Computer Science Munich Germany
In this note, we present the synthesis of secure-by-construction controllers that address safety and security properties simultaneously in cyber-physical systems. Our focus is on studying a specific security property ... 详细信息
来源: 评论
Performance Evaluation of Intrusion Detection System with SVM  6
Performance Evaluation of Intrusion Detection System with SV...
收藏 引用
6th International Conference on Cybernetics and Intelligent System, ICORIS 2024
作者: Diaz, Ricky Aurelius Nurtanto Putra, I. Ketut Gede Darma Sudarma, Made Sukarsa, I. Made Department of Computer Systems Faculty of Informatics and Computer Institut Teknologi dan Bisnis STIKOM Bali Bali Indonesia Department of Information Technology Faculty of Engineering Udayana University Jimbaran Hill Bali Indonesia Department of Electrical Engineering Faculty of Engineering Udayana University Jimbaran Hill Bali Indonesia
Various machine learning techniques have been proposed to improve the effectiveness of Intrusion Detection systems (IDS), where IDS is one of the important parts of the network that functions to maintain network secur... 详细信息
来源: 评论
Multidimensional Voronoi Constellations vs. Short Blocklength Probabilistic Shaping: A Comparison for Multilevel Coding Approach
Multidimensional Voronoi Constellations vs. Short Blocklengt...
收藏 引用
2024 Asia Communications and Photonics Conference, ACP 2024 and International Conference on information Photonics and Optical Communications, IPOC 2024
作者: Sheng, Yajie Chen, Bin Lei, Yi Deng, Jingxin Xu, Jiwei Fu, Mengfan Zhuge, Qunbi Li, Shen Department of Computer Science and Information Engineering Hefei University of Technology Hefei China State Key Laboratory of Advanced Optical Communication Systems and Networks Department of Electronic Engineering Shanghai Jiao Tong University Shanghai China Department of Electrical and Computer Engineering Université Laval Québec Canada
Performance of concatenated multilevel coding with probabilistic shaping (PS) and Voronoi constellations (VCs) is analysed over AWGN channel. Numerical results show that VCs provide up to 1.3 dB SNR gains over PS-QAM ... 详细信息
来源: 评论
Deep Ear Biometrics for Gender Classification  4th
Deep Ear Biometrics for Gender Classification
收藏 引用
4th International Conference on Communication, Devices and Computing (ICCDC 2023)
作者: Singh, Ritwiz Kashyap, Keshav Mukherjee, Rajesh Bera, Asish Chakraborty, Mamata Dalui Department of Computer Science and Engineering Haldia Institute of Technology WB Haldia India Department of Computer Science and Information Systems Birla Institute of Technology and Science Pilani Rajasthan Pilani Campus 333031 India Department of Computer Science and Engineering National Institute of Technology West Bengal Durgapur India
Human gender classification based on biometric features is a major concern for computer vision due to its vast variety of applications. The human ear is popular among researchers as a soft biometric trait, because it ... 详细信息
来源: 评论
Business intelligent connection between quality and evaluation methods: a case study
收藏 引用
International Journal of Applied Systemic Studies 2022年 第4期9卷 330-343页
作者: Mandellos, Georgios Tsipianitis, Dimitris Telecommunications and Information Technology Division Electrical and Computer Engineering Department University of Patras RionGR-26504 Greece Systems and Automatic Control Division Electrical and Computer Engineering Department University of Patras RionGR-26504 Greece
Nowadays, information and knowledge represent the fundamental wealth of an organisation. Enterprises try to utilise this wealth to gain advantage when making decisions such as a project’s acceptance. After a project ... 详细信息
来源: 评论
The value of formative evaluation in an education program
收藏 引用
International Journal of Applied Systemic Studies 2022年 第4期9卷 381-388页
作者: Tsipianitis, Dimitris Mandellos, Georgios Systems and Automatic Control Division Electrical and Computer Engineering Department University of Patras RionGR-26504 Greece Telecommunications and Information Technology Division Electrical and Computer Engineering Department University of Patras RionGR-26504 Greece
Evaluation is a process that compares the results with the target, an initial situation with the final one. ‘Evaluate’ means making an assessment based on some measure or information and referring to some criteria. ... 详细信息
来源: 评论
Street Light Cum Garbage System Optimal Design Based on IOT  2
Street Light Cum Garbage System Optimal Design Based on IOT
收藏 引用
2nd International Conference on Emerging Trends in information technology and engineering, ic-ETITE 2024
作者: Rajesh, G. Deepa, J. Ezilarasan, M.R. Syed Fiaz, A. Siva Rama Lingham, N. Jagannathan, J. Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Information Technology Chennai India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Electronics and Communication Engineering Chennai India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Department of Software and Systems Engineering Vellore India
Street lights currently use more energy than other types of lighting because of an inefficient mechanism that makes the bulbs use a lot of electricity. The suggested approach uses various sensors on intelligent street... 详细信息
来源: 评论