咨询与建议

限定检索结果

文献类型

  • 4,283 篇 会议
  • 2,309 篇 期刊文献
  • 71 册 图书

馆藏范围

  • 6,663 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,795 篇 工学
    • 2,366 篇 计算机科学与技术...
    • 1,935 篇 软件工程
    • 1,001 篇 信息与通信工程
    • 644 篇 控制科学与工程
    • 538 篇 电气工程
    • 526 篇 生物医学工程(可授...
    • 518 篇 电子科学与技术(可...
    • 494 篇 生物工程
    • 384 篇 光学工程
    • 278 篇 机械工程
    • 251 篇 仪器科学与技术
    • 203 篇 动力工程及工程热...
    • 167 篇 化学工程与技术
    • 144 篇 材料科学与工程(可...
    • 139 篇 交通运输工程
    • 127 篇 安全科学与工程
  • 2,393 篇 理学
    • 1,128 篇 数学
    • 857 篇 物理学
    • 557 篇 生物学
    • 399 篇 统计学(可授理学、...
    • 308 篇 系统科学
    • 198 篇 化学
  • 869 篇 管理学
    • 524 篇 管理科学与工程(可...
    • 385 篇 图书情报与档案管...
    • 286 篇 工商管理
  • 449 篇 医学
    • 388 篇 临床医学
    • 360 篇 基础医学(可授医学...
    • 224 篇 药学(可授医学、理...
    • 166 篇 公共卫生与预防医...
  • 169 篇 法学
    • 144 篇 社会学
  • 101 篇 经济学
  • 70 篇 教育学
  • 63 篇 农学
  • 26 篇 文学
  • 11 篇 军事学
  • 10 篇 艺术学
  • 2 篇 哲学

主题

  • 180 篇 informatics
  • 115 篇 computational mo...
  • 113 篇 machine learning
  • 111 篇 optimization
  • 111 篇 feature extracti...
  • 101 篇 training
  • 94 篇 image segmentati...
  • 94 篇 accuracy
  • 92 篇 data mining
  • 80 篇 monitoring
  • 75 篇 internet of thin...
  • 74 篇 deep learning
  • 74 篇 computer archite...
  • 70 篇 artificial intel...
  • 67 篇 bandwidth
  • 66 篇 educational inst...
  • 64 篇 mathematical mod...
  • 63 篇 databases
  • 62 篇 support vector m...
  • 62 篇 vectors

机构

  • 147 篇 yerevan physics ...
  • 98 篇 faculty of scien...
  • 98 篇 department for p...
  • 98 篇 department of ph...
  • 97 篇 department of ph...
  • 97 篇 departamento de ...
  • 97 篇 dipartimento di ...
  • 92 篇 faculté des scie...
  • 92 篇 kirchhoff-instit...
  • 91 篇 graduate school ...
  • 90 篇 department of ph...
  • 90 篇 centre de calcul...
  • 89 篇 institute of phy...
  • 87 篇 department of ph...
  • 86 篇 department of ph...
  • 86 篇 department of ph...
  • 84 篇 institut für ast...
  • 83 篇 fakultät für phy...
  • 80 篇 institute of phy...
  • 77 篇 physikalisches i...

作者

  • 87 篇 c. alexa
  • 86 篇 j. m. izen
  • 86 篇 s. veneziano
  • 85 篇 f. buehrer
  • 85 篇 a. t. law
  • 85 篇 d. di valentino
  • 84 篇 g. bella
  • 84 篇 d. calvet
  • 84 篇 c. amelung
  • 83 篇 j. strandberg
  • 80 篇 n. orlando
  • 79 篇 c. gumpert
  • 79 篇 y. tayalati
  • 79 篇 g. spigo
  • 79 篇 v. chiarella
  • 79 篇 f. siegert
  • 79 篇 a. dimitrievska
  • 79 篇 f. deliot
  • 79 篇 m. klein
  • 79 篇 r. ströhmer

语言

  • 6,278 篇 英文
  • 323 篇 其他
  • 57 篇 中文
  • 5 篇 日文
  • 4 篇 德文
  • 1 篇 土耳其文
检索条件"机构=Electrical Engineering and Computer Engineering and Informatics"
6663 条 记 录,以下是81-90 订阅
排序:
CEGSet: Collection of standardized cause-effect graph specifications  12
CEGSet: Collection of standardized cause-effect graph specif...
收藏 引用
12th Mediterranean Conference on Embedded Computing, MECO 2023
作者: Krupalija, Ehlimana Cogo, Emir Becirovic, Seila Prazina, Irfan Pozderac, Damir Besic, Ingmar University of Sarajevo Faculty of Electrical Engineering Department of Computer Science and Informatics Sarajevo Bosnia and Herzegovina
Cause-effect graphs are a commonly used black-box testing method, and many different algorithms for converting system requirements to cause-effect graph specifications and deriving test case suites have been proposed.... 详细信息
来源: 评论
Optimization of the test case minimization algorithm based on forward-propagation in cause-effect graphs  22
Optimization of the test case minimization algorithm based o...
收藏 引用
22nd International Symposium INFOTEH-JAHORINA, INFOTEH 2023
作者: Krupalija, Ehlimana Cogo, Emir Bećirović, Šeila Prazina, Irfan Pozderac, Damir Bešić, Ingmar University of Sarajevo Faculty of Electrical Engineering Department of Computer Science and Informatics Sarajevo Bosnia and Herzegovina
Many different methods are used for generating blackbox test case suites. Test case minimization is used for reducing the feasible test case suite size in order to minimize the cost of testing while ensuring maximum f... 详细信息
来源: 评论
Generating animatable 3D cartoon faces from single portraits
收藏 引用
虚拟现实与智能硬件(中英文) 2024年 第4期6卷 292-307页
作者: Chuanyu PAN Guowei YANG Taijiang MU Yu-Kun LAI Department of Electrical Engineering and Computer Sciences University of California BerkeleyBerkeley CA 94704USA Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China School of Computer Science and Informatics Cardiff UniversityCardiff CF244AGUK
Background With the development of virtual reality(VR)technology,there is a growing need for customized 3D ***,traditional methods for 3D avatar modeling are either time-consuming or fail to retain the similarity to t... 详细信息
来源: 评论
An AI-Enabled Framework for Transparency and Interpretability in Cardiovascular Disease Risk Prediction
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5057-5078页
作者: Isha Kiran Shahzad Ali Sajawal ur Rehman Khan Musaed Alhussein Sheraz Aslam Khursheed Aurangzeb Department of Computer Science University of Engineering and TechnologyLahore39161Pakistan Dipartimento di Farmacia e Biotecnologie Alma Mater Studiorum—Universita di BolognaBologna40126Italy Department of Information Sciences University of EducationLahore54770Pakistan Department of Computer Science National Textile UniversityKarachi CampusKarachi74900Pakistan Department of Computer Science National Textile UniversityFaisalabad37610Pakistan Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Department of Electrical Engineering Computer Engineeringand InformaticsCyprus University of TechnologyLimassol3036Cyprus Department of Computer Science CTL EurocollegeLimassol3077Cyprus
Cardiovascular disease(CVD)remains a leading global health challenge due to its high mortality rate and the complexity of early diagnosis,driven by risk factors such as hypertension,high cholesterol,and irregular puls... 详细信息
来源: 评论
Cyber Attacks Detection using Deep Learning Methods for Resilient Operation in DC Shipboard Microgrids
Cyber Attacks Detection using Deep Learning Methods for Resi...
收藏 引用
2024 IEEE IAS Industrial and Commercial Power System Asia, I and CPS Asia 2024
作者: Ali, Zulfiqar Hussain, Tahir Su, Chun-Lien Jurcut, Anca Delia Baloch, Shazia Sadiq, Muhammad National Kaohsiung University of Science and Technology Department of Electrical Engineering Kaohsiung city Taiwan Graduate School of Informatics and Engineering The University of Electro-Communication Department of Informatics Tokyo Japan School of Computer Science University College Dublin BelfieldDublin 4 Ireland Balochistan University of Engineering and Technology Department of Electrical Engineering Khuzdar Pakistan
Cyber resilience has become paramount as a transition of maritime systems towards digitization, particularly within DC shipboard microgrids (SMGs). Adopting innovative communication technologies can enhance the resili... 详细信息
来源: 评论
Relevance Vector Machine for Code Smell Detection  22
Relevance Vector Machine for Code Smell Detection
收藏 引用
22nd IEEE International Conference on Industrial informatics, INDIN 2024
作者: Putro, Hanson Prihantoro Yuhana, Umi Laili Yuniarno, Eko Mulyanto Purnomo, Mauridhi Hery Department of Electrical Engineering Institut Teknologi Sepuluh Nopember Surabaya Indonesia Department of Informatics Institut Teknologi Sepuluh Nopember Surabaya Indonesia Department of Computer Engineering Department of Electrical Engineering Institut Teknologi Sepuluh Nopember Surabaya Indonesia
Various approaches have been proposed to detect code smells, including machine learning models. However, there are still challenges to improving detection accuracy and selecting appropriate quality metrics. This resea... 详细信息
来源: 评论
A spatio-temporal matrix representation for trajectory classification  24
A spatio-temporal matrix representation for trajectory class...
收藏 引用
32nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL 2024
作者: Kontopoulos, Ioannis Varlamis, Iraklis Makris, Antonios Tserpes, Konstantinos Department of Informatics and Telematics Harokopio University of Athens Greece School of Electrical and Computer Engineering National Technical University of Athens Greece
Fish piracy remains widespread globally despite national and international efforts. Experts estimate it accounts for about 20% of the total seafood catch worldwide. Technology is playing a key role in detecting illega... 详细信息
来源: 评论
Exploring Energy Culture and Efficiency Awareness: Insights from Private and Public Sectors in Romania  3
Exploring Energy Culture and Efficiency Awareness: Insights ...
收藏 引用
3rd International Conference on Energy Transition in the Mediterranean Area, SyNERGY MED 2024
作者: Muresan, Claudia Stet, Denisa Cirstea, Stefan Czumbil, Levente Polycarpou, Alexis Micu, Dan D. Technical University of Cluj-Napoca Energy Transition Research Center Cluj-Napoca Romania Frederick University Computer Engineering and Informatics Department of Electrical Engineering Nicosia Cyprus
This paper focuses on the energy transition as a social transition and highlights the importance of understanding individual and collective behaviors, aspirations and perceptions regarding energy consumption. The conc... 详细信息
来源: 评论
Face image authentication scheme based on MTCNN and SLT
收藏 引用
Multimedia Tools and Applications 2025年 1-43页
作者: Thabit, Rasha Al-Askari, Mohanad A. Mohammed, Dunya Zeki Anaam, Elham Abdulwahab Mahmood, Zainab H. Jabbar, Dina Jamal Salih, Zahraa Aqeel Information System Department College of Computer Sciences and Information Technology University of Al-Anbar Al-Anbar Iraq Computer Engineering Department College of Engineering Al-Iraqia University Baghdad Iraq Electronic and Communications Engineering Department College of Engineering Gilgamesh University Baghdad Iraq Faculty of Computing and Informatics Multimedia University Selangor Cyberjaya Malaysia Department of Cybersecurity Engineering College of Information Engineering Al-Nahrain University Baghdad Iraq Electrical Engineering Technical Collage Middle Technical University Baghdad Iraq Department of Business Administration Alamaal University College Baghdad Iraq
DeepFakes and face image manipulation methods have been widely distributed in the last few years and several techniques have been presented to check the authenticity of the face image and detect manipulation if exists... 详细信息
来源: 评论
Optimizing Item-based Collaborative Filtering for Course Recommendation: A Case Study with Coursera Data
Optimizing Item-based Collaborative Filtering for Course Rec...
收藏 引用
2024 International Conference on Information Technology Systems and Innovation, ICITSI 2024
作者: Suryani, Mira Pangestu, Risyad Pradana, Aditya Universitas Padjadjaran Departement of Computer Science Sumedang Indonesia Institut Teknologi Bandung School of Electrical Engineering and Informatics Bandung Indonesia
In e-learning environments, the sheer volume of available courses often overwhelms users, leading to decision fatigue and disengagement Learners vary widely in their preferences, learning styles, and goals, yet generi... 详细信息
来源: 评论