咨询与建议

限定检索结果

文献类型

  • 30,525 篇 会议
  • 18,875 篇 期刊文献
  • 640 册 图书

馆藏范围

  • 50,040 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28,704 篇 工学
    • 18,020 篇 计算机科学与技术...
    • 14,577 篇 软件工程
    • 6,122 篇 信息与通信工程
    • 4,744 篇 控制科学与工程
    • 4,262 篇 电气工程
    • 3,753 篇 电子科学与技术(可...
    • 3,225 篇 生物工程
    • 2,833 篇 生物医学工程(可授...
    • 2,265 篇 机械工程
    • 2,110 篇 光学工程
    • 1,990 篇 化学工程与技术
    • 1,818 篇 仪器科学与技术
    • 1,752 篇 动力工程及工程热...
    • 1,382 篇 材料科学与工程(可...
    • 965 篇 安全科学与工程
    • 949 篇 交通运输工程
  • 18,349 篇 理学
    • 8,550 篇 数学
    • 6,869 篇 物理学
    • 3,807 篇 生物学
    • 2,690 篇 统计学(可授理学、...
    • 2,097 篇 化学
    • 2,004 篇 系统科学
  • 7,246 篇 管理学
    • 4,492 篇 管理科学与工程(可...
    • 3,013 篇 图书情报与档案管...
    • 2,277 篇 工商管理
  • 2,820 篇 医学
    • 2,397 篇 临床医学
    • 2,063 篇 基础医学(可授医学...
    • 1,294 篇 药学(可授医学、理...
    • 1,014 篇 公共卫生与预防医...
  • 1,189 篇 法学
    • 996 篇 社会学
  • 882 篇 经济学
  • 672 篇 农学
  • 640 篇 教育学
  • 143 篇 文学
  • 90 篇 军事学
  • 64 篇 艺术学
  • 8 篇 哲学
  • 6 篇 历史学

主题

  • 1,292 篇 computer science
  • 972 篇 deep learning
  • 958 篇 accuracy
  • 864 篇 machine learning
  • 786 篇 computational mo...
  • 764 篇 feature extracti...
  • 728 篇 training
  • 640 篇 artificial intel...
  • 581 篇 internet of thin...
  • 531 篇 optimization
  • 519 篇 support vector m...
  • 426 篇 predictive model...
  • 405 篇 neural networks
  • 391 篇 data mining
  • 375 篇 data models
  • 354 篇 mathematical mod...
  • 334 篇 convolutional ne...
  • 321 篇 testing
  • 312 篇 real-time system...
  • 301 篇 monitoring

机构

  • 1,096 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 979 篇 physikalisches i...
  • 974 篇 oliver lodge lab...
  • 639 篇 infn laboratori ...
  • 621 篇 infn sezione di ...
  • 605 篇 fakultät physik ...
  • 604 篇 infn sezione di ...
  • 599 篇 infn sezione di ...
  • 569 篇 university of ch...
  • 560 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 536 篇 department of ph...
  • 535 篇 school of physic...
  • 530 篇 iccub universita...
  • 520 篇 imperial college...
  • 516 篇 h.h. wills physi...
  • 516 篇 nikhef national ...
  • 510 篇 stfc rutherford ...
  • 507 篇 school of physic...

作者

  • 264 篇 barter w.
  • 258 篇 a. gomes
  • 250 篇 beiter a.
  • 247 篇 c. alexa
  • 245 篇 j. m. izen
  • 241 篇 g. bella
  • 240 篇 j. strandberg
  • 238 篇 c. amelung
  • 237 篇 bellee v.
  • 236 篇 d. calvet
  • 234 篇 g. spigo
  • 231 篇 bowcock t.j.v.
  • 231 篇 s. chen
  • 228 篇 f. siegert
  • 228 篇 brundu d.
  • 227 篇 blake t.
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 y. tayalati
  • 216 篇 boettcher t.

语言

  • 47,021 篇 英文
  • 2,549 篇 其他
  • 368 篇 中文
  • 109 篇 日文
  • 18 篇 德文
  • 12 篇 法文
  • 5 篇 俄文
  • 5 篇 斯洛文尼亚文
  • 4 篇 西班牙文
  • 2 篇 荷兰文
  • 2 篇 葡萄牙文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
  • 1 篇 泰文
检索条件"机构=Faculty of Computer Science and Computer Engineering"
50040 条 记 录,以下是1161-1170 订阅
排序:
Performance Comparison of Homomorphic Encrypted Convolutional Neural Network Inference Among HElib, Microsoft SEAL and OpenFHE
Performance Comparison of Homomorphic Encrypted Convolutiona...
收藏 引用
2023 IEEE Asia-Pacific Conference on computer science and Data engineering, CSDE 2023
作者: Zhu, Haoyun Suzuki, Takuya Yamana, Hayato Waseda University Department of Computer Science Tokyo Japan Waseda University Department of Computer Science and Communications Engineering Tokyo Japan Waseda University Faculty of Science and Engineering Tokyo Japan
Homomorphic encryption (HE) offers a promising solution for maintaining data privacy even during calculation, as it allows for the evaluation of ciphertexts. Several HE libraries have been released, but selecting the ... 详细信息
来源: 评论
Implementation of Secure and Verifiable Access Control Procedures using the NTRU Cryptosystem to Store Big Data in the Cloud Environment
收藏 引用
Recent Patents on engineering 2025年 第2期19卷 57-70页
作者: Babu B, Ravindra Saxena, Swati Widjaja, Gunawan Vinodha D, Vedha Omarov, Batyrkhan Ramaiah, Gurumurthy B. Vats, Prashant Adama Ethiopia Department of Computer Science KCG College of Technology Chennai India Universitas Krisnadwipayana Jawa Barat 13077 Indonesia Department of Electronics and Communication Engineering JCT College Of Engineering and Technology Pichanur Coimbatore India International University of Tourism and Hospitality Turkistan Kazakhstan Technical and Vocational Training Institute Addis Ababa Ethiopia Department of Computer Science and Engineering Faculty of Engineering and Technology SGT University Haryana Gurugram India
Background: Due to their complexity and size, deploying ciphertexts for clouds is considered the most useful approach to accessing large data stores. Methods: However, access to a user's access legitimacy and impr... 详细信息
来源: 评论
Working Pattern Recognition of Phased Array Radar based on Attention Mechanism and Feature Fusion  16
Working Pattern Recognition of Phased Array Radar based on A...
收藏 引用
16th International Conference on Signal Processing Systems, ICSPS 2024
作者: Qu, Zhiyu Li, Linjie Feng, Yun Faculty of Information Science and Engineering Hohai University Nanjing China College of Computer and Information Hohai University Nanjing China
In the modern battlefield environment, it is very important to realize the working pattern recognition of the enemy phased array radar accurately for subsequent accurate jamming and resource scheduling. In view of the... 详细信息
来源: 评论
Translating Words to Pixels: An Effective Text-To-Image System Utilizing Upsampling and CLIP Models
Translating Words to Pixels: An Effective Text-To-Image Syst...
收藏 引用
2024 International Conference on engineering and Computing, ICECT 2024
作者: Saeed, Nuaima Ghulam Ishaq Khan Institute of Engineering Sciences and Technology Faculty of Computer Science and Engineering Department of Artificial Intelligence Topi Pakistan
Generative AI and text-based image synthesis are being pursued with more interest than ever and adopt a growing audience. This work offers a new way of producing images within a broad range of quality levels, deducing... 详细信息
来源: 评论
Detection of Mobile Phone Usage Among Motorcycle Riders: A computer Vision Approach  5th
Detection of Mobile Phone Usage Among Motorcycle Riders: A C...
收藏 引用
5th International Conference on Electrical and Electronics engineering, ICEEE 2024
作者: Charef, Ayoub Jarir, Zahi Quafafou, Mohamed LAMIGEP EMSI Moroccan School of Engineering Marrakesh Marrakesh Morocco Department of Computer Science Faculty of Science Cadi Ayyad University Marrakech Marrakesh Morocco Department of Computer Science University of Aix-Marseille Marseille Marseille France
This study examines the prevalence of mobile phone use among motorcycle riders at signalized intersections in Marrakech, utilizing advanced computer vision techniques. Employing the YOLOv8 object detection model and t... 详细信息
来源: 评论
Design And Implementation Of A PID Control System On A UAV Tracker Antenna
Design And Implementation Of A PID Control System On A UAV T...
收藏 引用
2023 International Conference on Advanced Mechatronics, Intelligent Manufacture and Industrial Automation, ICAMIMIA 2023
作者: Jayadi, Akhmad Adhinata, Faisal Dharma Persada Sembiring, Jaka Setyo Adhi, Canggih Gelar Herman Selsily, Wendel Amiruddin, Ahmad Universitas Teknokrat Indonesian Faculty of Engineering and Computer Science Lampung Indonesia Institut Teknologi Telkom Purwokerto Faculty of Informatics Jawa Tengah Indonesia Universitas Bina Nusantara Faculty of Computer Science Semarang Indonesia Universitas Kristen Indonesia Maluku Faculty of Computer Science Maluku Indonesia
Antennas are essential components in communication systems, serving as both transmitters and receivers. Their efficient operation depends on precise alignment with the strongest signal source, facilitated by tracker a... 详细信息
来源: 评论
Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2497-2513页
作者: Mohammad Alamgeer Fahd N.Al-Wesabi Huda G.Iskandar Imran Khan Nadhem Nemri Mohammad Medani Mohammed Abdullah Al-Hagery Ali Mohammed Al-Sharafi Department of Information Systems King Khalid UniversityMuhayel AseerKingdom of Saudi Arabia Department of Computer Science King Khalid UniversityMuhayel AseerKingdom of Saudi Arabia Faculty of Computer and IT Sana’a UniversitySana’aYemen School of Computing Faculty of EngineeringUniversiti Teknologi MalaysiaMalaysia Department of Electrical Engineering University of Engineering and Technology PeshawarPakistan Department of Computer Science College of ComputerQassim UniversitySaudi Arabia Department of Computer Science College of Computers and Information TechnologyUniversity of BishaKSA
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication *** this paper,a text zero... 详细信息
来源: 评论
Object Detection in Remote Sensing Images Using Picture Fuzzy Clustering and MapReduce
收藏 引用
computer Systems science & engineering 2022年 第12期43卷 1241-1253页
作者: Tran Manh Tuan Tran Thi Ngan Nguyen Tu Trung Faculty of Computer Science and Engineering Thuyloi University175 Tay SonDong DaHanoi010000Vietnam
In image processing, one of the most important steps is image segmentation. The objects in remote sensing images often have to be detected in order toperform next steps in image processing. Remote sensing images usua... 详细信息
来源: 评论
Assessing the Effects of Blackhole Attacks on MANET Reliability and Security
Assessing the Effects of Blackhole Attacks on MANET Reliabil...
收藏 引用
2024 International Conference on Decision Aid sciences and Applications, DASA 2024
作者: Ahmed, Amjed Abbas Fadhil, Saif Aamer Najim, Ali Hamza Ali Alheeti, Khattab M. Mohd Satar, Nurhizam Safie Abdallah Hashim, Aisha Hassan Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Baghdad Iraq Department of Computer Technical Engineering Baghdad10011 Iraq College of Computer and Information Technology Computer Networking Systems Department University of Anbar Anbar Iraq Bangi43600 Malaysia International Islamic University Malaysia Faculty of Engineering Department of Electrical and Computer Engineering Selangor Malaysia
Mobile Ad Hoc Networks (MANETs) are characterized by some important attributes, including infrastructure, mobile, and dynamic nature, which makes them have vast applications in different areas of computer networks. Th... 详细信息
来源: 评论
Beyond p-y method:A review of artificial intelligence approaches for predicting lateral capacity of drilled shafts in clayey soils
收藏 引用
Journal of Rock Mechanics and Geotechnical engineering 2024年 第9期16卷 3812-3840页
作者: M.E.Al-Atroush A.E.Aboelela Ezz El-Din Hemdan Civil and Environmental Engineering Program Engineering Management DepartmentCollege of EngineeringPrince Sultan UniversityRiyadhSaudi Arabia Department of Structural Engineering Faculty of EngineeringAin Shams UniversityCairoEgypt Structure and Materials Research Lab Prince Sultan UniversityRiyadhSaudi Arabia Computer Science and Engineering Department Faculty of Electronic EngineeringMenoufia UniversityMenoufiaEgypt
In 2023,pivotal advancements in artificial intelligence(AI)have significantly *** that in mind,traditional methodologies,notably the p-y approach,have struggled to accurately model the complex,nonlinear soil-structure... 详细信息
来源: 评论