咨询与建议

限定检索结果

文献类型

  • 3,843 篇 会议
  • 3,134 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 6,997 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,329 篇 工学
    • 2,203 篇 计算机科学与技术...
    • 1,782 篇 软件工程
    • 944 篇 控制科学与工程
    • 702 篇 信息与通信工程
    • 599 篇 电气工程
    • 546 篇 材料科学与工程(可...
    • 514 篇 机械工程
    • 492 篇 电子科学与技术(可...
    • 463 篇 化学工程与技术
    • 458 篇 动力工程及工程热...
    • 452 篇 生物工程
    • 434 篇 生物医学工程(可授...
    • 339 篇 光学工程
    • 324 篇 仪器科学与技术
    • 273 篇 力学(可授工学、理...
    • 226 篇 交通运输工程
    • 210 篇 土木工程
    • 199 篇 网络空间安全
  • 2,807 篇 理学
    • 1,296 篇 物理学
    • 1,002 篇 数学
    • 516 篇 生物学
    • 471 篇 化学
    • 325 篇 统计学(可授理学、...
    • 206 篇 系统科学
  • 1,084 篇 管理学
    • 830 篇 管理科学与工程(可...
    • 346 篇 工商管理
    • 295 篇 图书情报与档案管...
  • 472 篇 医学
    • 374 篇 临床医学
    • 299 篇 基础医学(可授医学...
    • 203 篇 公共卫生与预防医...
  • 178 篇 法学
  • 170 篇 经济学
  • 105 篇 农学
  • 98 篇 教育学
  • 24 篇 文学
  • 15 篇 军事学
  • 10 篇 艺术学

主题

  • 210 篇 accuracy
  • 179 篇 deep learning
  • 170 篇 machine learning
  • 149 篇 hadron colliders
  • 147 篇 real-time system...
  • 127 篇 feature extracti...
  • 117 篇 computational mo...
  • 111 篇 optimization
  • 109 篇 artificial intel...
  • 108 篇 educational inst...
  • 106 篇 internet of thin...
  • 100 篇 predictive model...
  • 86 篇 convolutional ne...
  • 79 篇 support vector m...
  • 76 篇 security
  • 73 篇 training
  • 71 篇 reliability
  • 65 篇 scalability
  • 65 篇 neural networks
  • 64 篇 cloud computing

机构

  • 222 篇 irfu cea univers...
  • 210 篇 department of ph...
  • 208 篇 department for p...
  • 206 篇 infn e laborator...
  • 205 篇 faculty of scien...
  • 204 篇 department of mo...
  • 199 篇 west university ...
  • 197 篇 kirchhoff-instit...
  • 196 篇 department of ph...
  • 194 篇 department of ph...
  • 189 篇 yerevan physics ...
  • 186 篇 department of ph...
  • 181 篇 fakultät für phy...
  • 178 篇 department physi...
  • 176 篇 research center ...
  • 164 篇 graduate school ...
  • 156 篇 institute of phy...
  • 155 篇 institute of phy...
  • 154 篇 deutsches elektr...
  • 147 篇 infn sezione di ...

作者

  • 214 篇 m. lu
  • 147 篇 c. alexa
  • 147 篇 g. bella
  • 146 篇 d. calvet
  • 146 篇 c. amelung
  • 144 篇 j. m. izen
  • 144 篇 j. strandberg
  • 141 篇 n. orlando
  • 138 篇 b. konya
  • 138 篇 f. pastore
  • 133 篇 y. tayalati
  • 132 篇 g. spigo
  • 132 篇 v. chiarella
  • 129 篇 t. pham
  • 126 篇 f. siegert
  • 124 篇 a. dimitrievska
  • 124 篇 f. deliot
  • 121 篇 r. ströhmer
  • 120 篇 y. abulaiti
  • 119 篇 s. veneziano

语言

  • 5,557 篇 英文
  • 1,368 篇 其他
  • 73 篇 中文
  • 9 篇 日文
  • 8 篇 德文
  • 7 篇 法文
  • 3 篇 朝鲜文
  • 1 篇 阿拉伯文
检索条件"机构=Department of Mechanical System Engineering College of Computer Science and System Engineering"
6997 条 记 录,以下是141-150 订阅
排序:
Supervised and unsupervised learning for characterising the industrial material defects
收藏 引用
International Journal of Business Intelligence and Data Mining 2022年 第2期21卷 233-246页
作者: Radha, P. Selvakumar, N. Raja Sekar, J. Johnsonselva, J.V. Department of Computer Applications Mepco Schlenk Engineering College Sivakasi India Department of Mechanical Engineering Mepco Schlenk Engineering College Sivakasi India Department of Computer Science and Engineering Mepco Schlenk Engineering College Sivakasi India
The ultrasonic-based NDT is used in industries to examine the internal defects without damaging the components since the materials used in the industrial standard components must be 100% perfect. The ultrasonic signal... 详细信息
来源: 评论
An Effective Detection of Ransomware Using Improved Long Short-Term Memory  3
An Effective Detection of Ransomware Using Improved Long Sho...
收藏 引用
3rd International Conference on Integrated Circuits and Communication systems, ICICACS 2025
作者: Vijayalakshmi, V. Fallahhusein, Muhamed Balamurugan, D. Suresh, T. Muthu Krishnan, K. Lakshmi Bangaru Arts and Science College Department of Computer Science with Artificial Intelligence Melmaruvathur India College of Technical Engineering The Islamic University Department of Computers Techniques Engineering Najaf Iraq Sona College of Technology Department of Computer Science and Engineering Salem India New Prince Shri Bhavani College of Engineering and Technology Department of Mechanical Engineering Chennai India Dhanalakshmi Srinivasan College of Engineering Technology Department of Electrical and Electronics Engineering Mamallapuram India
Ransomware detection focuses on recognizing the unusual system activities which indicate an unauthorized data access and restriction. It continuously monitors the system behavior continuously to detect potential threa... 详细信息
来源: 评论
A Surrogate-Assisted Evolutionary Algorithm for Expensive Dynamic Multimodal Optimzation  13
A Surrogate-Assisted Evolutionary Algorithm for Expensive Dy...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Wu, Xunfeng Liu, Songbai Ji, Junkai Ma, Lijia Leung, Victor C. M. Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China The University of British Columbia Department of Electrical and Computer Engineering Vancouver Canada
Surrogate-assisted evolutionary algorithms (SAEAs) have demonstrated promising optimization performance in addressing expensive dynamic optimization problems or expensive multimodal optimization problems. However, non... 详细信息
来源: 评论
YOLO-O2E:A Variant YOLO Model for Anomalous Rail Fastening Detection
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 1143-1161页
作者: Zhuhong Chu Jianxun Zhang Chengdong Wang Changhui Yang Department of Computer Science and Engineering Chongqing University of TechnologyChongqing400054China Institute of Flexible Electronics(Future Technologies) Xiamen UniversityXiamen361000China College of Mechanical Engineering Chongqing University of TechnologyChongqing400054China
Rail fasteners are a crucial component of the railway transportation safety *** fasteners,distinguished by their high length-to-width ratio,frequently encounter elevated failure rates,necessitating manual inspection a... 详细信息
来源: 评论
Data Mining with Comprehensive Oppositional Based Learning for Rainfall Prediction
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2725-2738页
作者: Mohammad Alamgeer Amal Al-Rasheed Ahmad Alhindi Manar Ahmed Hamza Abdelwahed Motwakel Mohamed I.Eldesouki Department of Information Systems College of Science&Art at MahayilKing Khalid UniversityAbha62529Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Science College of Computing and Information SystemMecca24382Saudi Arabia Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharj16278Saudi Arabia Department of Information System College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAlKharj16278Saudi Arabia
Data mining process involves a number of steps fromdata collection to visualization to identify useful data from massive data *** same time,the recent advances of machine learning(ML)and deep learning(DL)models can be... 详细信息
来源: 评论
Implementation of Cross Layer Design with Localization Techniques in Wireless Sensor Networks Using Deep Learning  4
Implementation of Cross Layer Design with Localization Techn...
收藏 引用
4th International Conference on Expert Clouds and Applications, ICOECA 2024
作者: Sreethar, S. Srinivas, Regulavalasa Satya S Chanakyan, C. Prasath, S. Senthilkumar, G. Natrayan, L. School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India Tamil Nadu Chennai India MVJ College of Engineering Department of Mechanical Engineering Karnataka Bengaluru India Mohamed Sathak A J college of Engineering Department of Mechanical Engineering Tamil Nadu Chennai India Panimalar Engineering College Department of Computer Science and Engineering Tamil Nadu Poonamallee Chennai India Saveetha School of Engineering SIMATS Department of Mechanical Engineering Tamil Nadu Chennai India
This study addresses the integration of wireless sensor networks, machine learning models, and go-layer architecture to embellish industrial processes in small-scale manufacturing. A strong monitoring infrastructure i... 详细信息
来源: 评论
ForeScanGuard: Proactive Monitoring and Detection for Sustainable Forest Conservation  7
ForeScanGuard: Proactive Monitoring and Detection for Sustai...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Krishnan, R. Santhana Balamurugan, S. Rekha, M. Jose, R. Arul Haribabu, K. Muthu, A. Essaki Scad College of Engineering And Technology Department of Electronics And Communication Engineering Cheranmahadevi India Velammal College of Engineering And Technology Department of Mathematics Madurai India P.S.R.R College of Engineering Department of Computer Science And Engineering Sivakasi India RajaRajeswari College of Engineering Department of Electrical And Electronics Engineering Bangalore India Scad College of Engineering And Technology Department of Mechanical Engineering Cheranmahadevi India Scad College of Engineering And Technology Department of Computer Science And Engineering Cheranmahadevi India
In response to the increasing environmental threats, ForeScanGuard emerges as a vital forest monitoring system. Integrating advanced sensors and a proactive anomaly detection algorithm, it employs a 5-channel fire sen... 详细信息
来源: 评论
Smooth Reference Command Generation and Control for Transition Flight of VTOL Aircraft Using Time-Varying Optimization
Smooth Reference Command Generation and Control for Transiti...
收藏 引用
AIAA science and Technology Forum and Exposition, AIAA SciTech Forum 2025
作者: Kim, Jinrae Bullock, John L. Cheng, Sheng Hovakimyan, Naira Department of Mechanical Science and Engineering The Grainger College of Engineering University of Illinois Urbana-Champaign United States Department of Electrical and Computer Engineering The Grainger College of Engineering University of Illinois Urbana-Champaign United States
Vertical take-off and landing (VTOL) aircraft pose a challenge in generating reference commands during transition flight. While sparsity between hover and cruise flight modes can be promoted for effective transitions ... 详细信息
来源: 评论
Securing the IoT Cyber Environment: Enhancing Intrusion Anomaly Detection With Vision Transformers
收藏 引用
IEEE Access 2024年 12卷 82443-82468页
作者: Sana, Laraib Nazir, Muhammad Mohsin Yang, Jing Hussain, Lal Chen, Yen-Lin Ku, Chin Soon Alatiyyah, Mohammed Alateyah, Sulaiman Abdullah Por, Lip Yee Lahore College for Women University Department of Computer Science Punjab Lahore54000 Pakistan Universiti Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia The University of Azad Jammu and Kashmir Department of Computer Science and IT Neelum Campus Azad Kashmir13230 Pakistan King Abdullah Campus The University of Azad Jammu and Kashmir Department of Computer Science and IT Azad Kashmir Muzaffarabad13100 Pakistan National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia Prince Sattam Bin Abdulaziz University College of Sciences and Humanities-Aflaj Department of Computer Science Al-Kharj16278 Saudi Arabia Qassim University College of Computer Department of Computer Engineering Buraydah52571 Saudi Arabia
The ever-expanding Internet of Things (IoT) landscape presents a double-edged sword. While it fosters interconnectedness, the vast amount of data generated by IoT devices creates a larger attack surface for cybercrimi... 详细信息
来源: 评论
GeoRefineNet: A Multistage Framework for Enhanced Cephalometric Landmark Detection in CBCT Images Using 3D Geometric Information  17th
GeoRefineNet: A Multistage Framework for Enhanced Cephalome...
收藏 引用
17th Asian Conference on computer Vision, ACCV 2024
作者: Viriyasaranon, Thanaporn Ma, Serie Choi, Jang-Hwan Department of Computational Medicine Graduate Program in System Health Science and Engineering Ewha Womans University Seoul Korea Republic of Division of Mechanical and Biomedical Engineering Graduate Program in System Health Science and Engineering Ewha Womans University Seoul Korea Republic of Department of Artificial Intelligence Ewha Womans University Seoul Korea Republic of
The precise detection of cephalometric landmarks on two-dimensional (2D) radiographs or three-dimensional (3D) computed tomography (CT) images is a fundamental step in various medical fields, especially in research on... 详细信息
来源: 评论