咨询与建议

限定检索结果

文献类型

  • 9,257 篇 会议
  • 5,795 篇 期刊文献
  • 294 册 图书

馆藏范围

  • 15,346 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,787 篇 工学
    • 6,048 篇 计算机科学与技术...
    • 4,927 篇 软件工程
    • 2,050 篇 信息与通信工程
    • 1,268 篇 控制科学与工程
    • 1,197 篇 生物工程
    • 1,191 篇 生物医学工程(可授...
    • 969 篇 电气工程
    • 852 篇 电子科学与技术(可...
    • 770 篇 光学工程
    • 575 篇 机械工程
    • 492 篇 仪器科学与技术
    • 384 篇 化学工程与技术
    • 359 篇 动力工程及工程热...
    • 307 篇 安全科学与工程
    • 265 篇 交通运输工程
    • 256 篇 建筑学
  • 5,586 篇 理学
    • 2,614 篇 数学
    • 1,907 篇 物理学
    • 1,385 篇 生物学
    • 861 篇 统计学(可授理学、...
    • 605 篇 系统科学
    • 433 篇 化学
  • 2,366 篇 管理学
    • 1,356 篇 管理科学与工程(可...
    • 1,106 篇 图书情报与档案管...
    • 746 篇 工商管理
  • 1,165 篇 医学
    • 993 篇 临床医学
    • 894 篇 基础医学(可授医学...
    • 580 篇 药学(可授医学、理...
    • 413 篇 公共卫生与预防医...
  • 409 篇 法学
    • 346 篇 社会学
  • 256 篇 经济学
  • 219 篇 教育学
  • 212 篇 农学
  • 51 篇 文学
  • 22 篇 艺术学
  • 21 篇 军事学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 477 篇 informatics
  • 252 篇 computational mo...
  • 210 篇 computer archite...
  • 205 篇 deep learning
  • 200 篇 machine learning
  • 186 篇 computer science
  • 182 篇 data mining
  • 165 篇 artificial intel...
  • 158 篇 image segmentati...
  • 152 篇 optimization
  • 151 篇 internet of thin...
  • 140 篇 feature extracti...
  • 138 篇 quality of servi...
  • 128 篇 wireless sensor ...
  • 127 篇 resource managem...
  • 126 篇 support vector m...
  • 126 篇 bandwidth
  • 125 篇 neural networks
  • 121 篇 monitoring
  • 118 篇 application soft...

机构

  • 413 篇 department for p...
  • 409 篇 faculty of scien...
  • 400 篇 department of ph...
  • 396 篇 kirchhoff-instit...
  • 387 篇 department of ph...
  • 384 篇 department of ph...
  • 357 篇 fakultät für phy...
  • 344 篇 institute of phy...
  • 331 篇 institute of phy...
  • 304 篇 department of ph...
  • 280 篇 department of ph...
  • 279 篇 instituto de fís...
  • 273 篇 graduate school ...
  • 272 篇 department of ph...
  • 271 篇 universidade fed...
  • 265 篇 ictp trieste
  • 257 篇 yerevan physics ...
  • 253 篇 nikhef national ...
  • 250 篇 department of ph...
  • 248 篇 graduate school ...

作者

  • 337 篇 c. alexa
  • 335 篇 j. m. izen
  • 332 篇 g. bella
  • 332 篇 d. calvet
  • 332 篇 c. amelung
  • 330 篇 j. strandberg
  • 327 篇 g. spigo
  • 325 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 317 篇 s. mohapatra
  • 302 篇 s. guindon
  • 300 篇 y. tayalati
  • 298 篇 a. kaczmarska
  • 285 篇 j. schaarschmidt
  • 283 篇 m. klein
  • 270 篇 a. d. pilkington
  • 261 篇 l. chevalier

语言

  • 14,792 篇 英文
  • 448 篇 其他
  • 96 篇 中文
  • 13 篇 日文
  • 2 篇 法文
  • 1 篇 爱沙尼亚文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of informatics and Computer Engineering"
15346 条 记 录,以下是21-30 订阅
排序:
Autonomous vehicle surveillance through fuzzy C-means segmentation and DeepSORT on aerial images
收藏 引用
PeerJ computer Science 2025年 11卷 1-23页
作者: Qureshi, Asifa Mehmood Alotaibi, Moneerah Alotaibi, Sultan Refa AlHammadi, Dina Abdulaziz Jamal, Muhammad Asif Jalal, Ahmad Lee, Bumshik Department of Computer Science Air University Islamabad Pakistan Department of Computer Science College of Science and Humanities Shaqra University Dawadmi Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh Saudi Arabia Information and Communication Engineering Chosun University Gwangju Korea Republic of Department of Computer Science and Engineering College of Informatics Korea University Seoul Korea Republic of
The high mobility of uncrewed aerial vehicles (UAVs) has led to their usage in various computer vision applications, notably in intelligent traffic surveillance, where it enhances productivity and simplifies the proce... 详细信息
来源: 评论
A Two-Pronged Approach to Security of Discrete-Event Systems
收藏 引用
Journal of Systems Science & Complexity 2025年 第1期38卷 178-209页
作者: MATSUI Shoma RUDIE Karen CAI Kai Department of Electrical and Computer Engineering&the Ingenuity Labs Research Institute Queen's UniversityKingston K7L 3N6Canada Department of Core Informatics Osaka Metropolitan UniversityOsaka 545-0051Japan
This paper investigates a security problem of simultaneously addressing two types of attacks:Eavesdropping and *** authors model the target system as a discrete-event system(DES)with subsets of concealable events and ... 详细信息
来源: 评论
Deep Learning Quantitative Susceptibility Mapping With Reduced Training Time Based on Local Field Transformation
收藏 引用
IEEE Transactions on Emerging Topics in Computational Intelligence 2025年 第2期9卷 1527-1538页
作者: Wu, Ming-Long Huang, De-Rong Cheng, Jhih-Shan National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan National Cheng Kung University Institute of Medical Informatics Tainan701 Taiwan
A quantitative susceptibility mapping (QSM) approach using single-orientation imaging data is proposed in this study. The proposed method generates local field maps at five predefined orientations via deep learning fr... 详细信息
来源: 评论
Optimizing task scheduling in cloud environments: a hybrid golden search whale optimization algorithm approach
收藏 引用
Neural Computing and Applications 2025年 1-23页
作者: Acharya, Biswaranjan Panda, Sucheta Das, Satyabrata Majhi, Santosh Kumar Gerogiannis, Vassilis C. Kanavos, Andreas Department of Computer Science and Engineering Veer Surendra Sai University of Technology Odisha Burla India Bilaspur India Department of Digital Systems University of Thessaly Larissa Greece Department of Informatics Ionian University Corfu Greece
Managing fluctuating workloads and optimizing resource utilization in cloud environments pose significant challenges, particularly in fields requiring real-time data processing, such as healthcare. This paper introduc... 详细信息
来源: 评论
(r, k, Ε)-Anonymization: Privacy-Preserving Data Publishing Algorithm Based on Multi-Dimensional Outlier Detection, k-Anonymity, and Ε-Differential Privacy
收藏 引用
IEEE Access 2025年 13卷 70422-70435页
作者: Kara, Burak Cem Eyupoglu, Can Karakus, Oktay National Defence University Turkish Air Force Academy Department of Computer Engineering İstanbul34149 Turkey Cardiff University School of Computer Science and Informatics CardiffCF24 4AG United Kingdom
In recent years, there has been a tremendous rise in both the volume and variety of big data, providing enormous potential benefits to businesses that seek to utilize consumer experiences for research or commercial pu... 详细信息
来源: 评论
Driver Drowsiness Detection Using Swin Transformer and Diffusion Models for Robust Image Denoising
收藏 引用
IEEE Access 2025年 13卷 71880-71907页
作者: El-Nabi, Samy Abd Ibrahim, Ahmed F. El-Rabaie, El-Sayed M. Hassan, Osama F. Soliman, Naglaa F. Ramadan, Khalil F. El-Shafai, Walid Faculty of Computer Science and Engineering Department of Artificial Intelligence Engineering South Sinai 46511 Egypt Menoufia University Faculty of Electronic Engineering Department of Electronics and Electrical Communications Engineering Menouf32952 Egypt Suez Canal University Faculty of Computers and Informatics Information Systems Department Ismailia41522 Egypt Princess Nourah bint Abdulrahman University College of Computer and Information Sciences Department of Information Technology P.O. Box 84428 Riyadh11671 Saudi Arabia Computer Science Department Riyadh11586 Saudi Arabia
With the rapid development of intelligent transportation systems and growing emphasis on driver safety, real-time detection of driver drowsiness has become a critical area of research. This study presents a robust and... 详细信息
来源: 评论
Optimal control for unreliable manufacturing and remanufacturing system under environmental subsidy and overrun penalty mechanism
收藏 引用
IEEE Transactions on engineering Management 2025年 72卷 1983-2002页
作者: Turki, Sadok Jemmali, Mahdi Hidri, Lotfi University of Lorraine Department of Logistic and Maintenance UFR MIM at Metz Metz17 France University of Sharjah Computer Science Department College of Computing and Informatics Sharjah United Arab Emirates King Saud University Industrial Engineering Department College of Engineering Riyadh11421 Saudi Arabia
Because of environmental concerns, remanufacturing has become an integral process for many production companies. Most published papers dealing with manufacturing and remanufacturing systems (MRSs) overlook some indust... 详细信息
来源: 评论
LSTM-XGBoost: An Ensemble Model for Blood Demand Distribution Forecasting – A Case Study in Zakho City, Kurdistan Region, Iraq
收藏 引用
Operations Research Forum 2025年 第1期6卷 1-22页
作者: Zebari, Rizgar R. Zebari, Gheyath M. Al-zebari, Adel Mohammed, Marwan Aziz Department of Computer Science College of Science Knowledge University Erbil 44001 Iraq Department of Information Technology Technical College of Informatics Akre University for Applied Sciences Kurdistan Akre Iraq Department of Computer Engineering College of Engineering Knowledge University Erbil 44001 Iraq
A safe and adequate blood supply is essential for healthcare systems to function effectively. Accurately forecasting blood demand plays a key role in efficient inventory management and resource allocation. Traditional... 详细信息
来源: 评论
Method of Automated Dataset Collection for Microwave Filters Synthesis
Method of Automated Dataset Collection for Microwave Filters...
收藏 引用
2025 Systems of Signals Generating and Processing in the Field of on Board Communications, SOSG 2025
作者: Arinin, O.V. Bakhmach, D.M. Katsnelson, A.I. Kurbeteva, A.S. Yelizarov, A.A. Moscow Technical University of Communications and Informatics Moscow Russia Hse University Electronic Engineering Department Moscow Russia Hse University Computer Engineering Department Moscow Russia
This research discusses the method of dataset collection automatization for microwave filter synthesis by integrating machine learning techniques, thus reducing development time. Utilizing the 3D electromagnetic analy... 详细信息
来源: 评论
Face image authentication scheme based on MTCNN and SLT
收藏 引用
Multimedia Tools and Applications 2025年 1-43页
作者: Thabit, Rasha Al-Askari, Mohanad A. Mohammed, Dunya Zeki Anaam, Elham Abdulwahab Mahmood, Zainab H. Jabbar, Dina Jamal Salih, Zahraa Aqeel Information System Department College of Computer Sciences and Information Technology University of Al-Anbar Al-Anbar Iraq Computer Engineering Department College of Engineering Al-Iraqia University Baghdad Iraq Electronic and Communications Engineering Department College of Engineering Gilgamesh University Baghdad Iraq Faculty of Computing and Informatics Multimedia University Selangor Cyberjaya Malaysia Department of Cybersecurity Engineering College of Information Engineering Al-Nahrain University Baghdad Iraq Electrical Engineering Technical Collage Middle Technical University Baghdad Iraq Department of Business Administration Alamaal University College Baghdad Iraq
DeepFakes and face image manipulation methods have been widely distributed in the last few years and several techniques have been presented to check the authenticity of the face image and detect manipulation if exists... 详细信息
来源: 评论