咨询与建议

限定检索结果

文献类型

  • 30,363 篇 会议
  • 18,983 篇 期刊文献
  • 631 册 图书

馆藏范围

  • 49,977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28,692 篇 工学
    • 18,023 篇 计算机科学与技术...
    • 14,584 篇 软件工程
    • 6,165 篇 信息与通信工程
    • 4,715 篇 控制科学与工程
    • 4,336 篇 电气工程
    • 3,773 篇 电子科学与技术(可...
    • 3,220 篇 生物工程
    • 2,826 篇 生物医学工程(可授...
    • 2,281 篇 机械工程
    • 2,110 篇 光学工程
    • 1,998 篇 化学工程与技术
    • 1,824 篇 仪器科学与技术
    • 1,762 篇 动力工程及工程热...
    • 1,399 篇 材料科学与工程(可...
    • 972 篇 安全科学与工程
    • 955 篇 交通运输工程
  • 18,397 篇 理学
    • 8,558 篇 数学
    • 6,922 篇 物理学
    • 3,822 篇 生物学
    • 2,697 篇 统计学(可授理学、...
    • 2,108 篇 化学
    • 2,006 篇 系统科学
  • 7,250 篇 管理学
    • 4,498 篇 管理科学与工程(可...
    • 3,008 篇 图书情报与档案管...
    • 2,269 篇 工商管理
  • 2,834 篇 医学
    • 2,396 篇 临床医学
    • 2,075 篇 基础医学(可授医学...
    • 1,298 篇 药学(可授医学、理...
    • 1,012 篇 公共卫生与预防医...
  • 1,197 篇 法学
    • 1,003 篇 社会学
  • 884 篇 经济学
  • 667 篇 农学
  • 642 篇 教育学
  • 147 篇 文学
  • 91 篇 军事学
  • 66 篇 艺术学
  • 9 篇 哲学
  • 6 篇 历史学

主题

  • 1,291 篇 computer science
  • 956 篇 deep learning
  • 940 篇 accuracy
  • 858 篇 machine learning
  • 775 篇 computational mo...
  • 760 篇 feature extracti...
  • 722 篇 training
  • 640 篇 artificial intel...
  • 584 篇 internet of thin...
  • 527 篇 optimization
  • 512 篇 support vector m...
  • 420 篇 predictive model...
  • 405 篇 neural networks
  • 390 篇 data mining
  • 373 篇 data models
  • 354 篇 mathematical mod...
  • 324 篇 convolutional ne...
  • 313 篇 testing
  • 300 篇 monitoring
  • 300 篇 real-time system...

机构

  • 1,097 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 986 篇 physikalisches i...
  • 975 篇 oliver lodge lab...
  • 646 篇 infn laboratori ...
  • 630 篇 infn sezione di ...
  • 611 篇 infn sezione di ...
  • 609 篇 infn sezione di ...
  • 603 篇 fakultät physik ...
  • 569 篇 university of ch...
  • 557 篇 school of physic...
  • 543 篇 horia hulubei na...
  • 541 篇 department of ph...
  • 535 篇 school of physic...
  • 530 篇 iccub universita...
  • 525 篇 imperial college...
  • 520 篇 nikhef national ...
  • 517 篇 h.h. wills physi...
  • 515 篇 stfc rutherford ...
  • 510 篇 school of physic...

作者

  • 264 篇 barter w.
  • 261 篇 a. gomes
  • 250 篇 beiter a.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 243 篇 g. bella
  • 242 篇 j. strandberg
  • 240 篇 c. amelung
  • 238 篇 d. calvet
  • 237 篇 bellee v.
  • 236 篇 g. spigo
  • 236 篇 s. chen
  • 231 篇 bowcock t.j.v.
  • 230 篇 f. siegert
  • 228 篇 brundu d.
  • 227 篇 blake t.
  • 218 篇 y. tayalati
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 r. ströhmer

语言

  • 47,809 篇 英文
  • 1,696 篇 其他
  • 347 篇 中文
  • 109 篇 日文
  • 14 篇 德文
  • 11 篇 法文
  • 3 篇 荷兰文
  • 3 篇 俄文
  • 3 篇 斯洛文尼亚文
  • 2 篇 葡萄牙文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 泰文
检索条件"机构=Faculty of Computer Science and Computer Engineering"
49977 条 记 录,以下是251-260 订阅
排序:
Detection of Mobile Phone Usage Among Motorcycle Riders: A computer Vision Approach  5th
Detection of Mobile Phone Usage Among Motorcycle Riders: A C...
收藏 引用
5th International Conference on Electrical and Electronics engineering, ICEEE 2024
作者: Charef, Ayoub Jarir, Zahi Quafafou, Mohamed LAMIGEP EMSI Moroccan School of Engineering Marrakesh Marrakesh Morocco Department of Computer Science Faculty of Science Cadi Ayyad University Marrakech Marrakesh Morocco Department of Computer Science University of Aix-Marseille Marseille Marseille France
This study examines the prevalence of mobile phone use among motorcycle riders at signalized intersections in Marrakech, utilizing advanced computer vision techniques. Employing the YOLOv8 object detection model and t... 详细信息
来源: 评论
Diffusion Models Meet Network Management: Improving Traffic Matrix Analysis with Diffusion-Based Approach
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第2期22卷 1259-1275页
作者: Yuan, Xinyu Qiao, Yan Wei, Zhenchun Zhang, Zeyu Li, Minyue Zhao, Pei Hu, Rongyao Li, Wenjing Hefei University of Technology School of Computer Science and Information Engineering China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology China Macau University of Science and Technology Faculty of Information Technology China
Due to network operation and maintenance relying heavily on network traffic monitoring, traffic matrix analysis has been one of the most crucial issues for network management related tasks. However, it is challenging ... 详细信息
来源: 评论
Assessment of ingestion dose from 226Ra, 228Ra, and 40K in vegetables consumed in Koya district, Iraq
收藏 引用
Environmental science and Pollution Research 2025年 第19期32卷 11972-11980页
作者: Saleh, Dedawan Salam Salh, Hemn Smail, Jahfer Majeed Ahmad, Saddon Taha Department of Physics Faculty of Science and Health Koya University Kurdistan Region KoyaKOY45 Iraq Department of Computer Engineering College of Engineering Knowledge University Erbil44001 Iraq Faculty of Medicine Koya University KoyaKOY45 Iraq
The present work comprises the measurement of activity concentrations of three radionuclides, 22⁶Ra, 228Ra, and 4⁰K in 33 species of vegetables commonly used in Koya district, the Iraqi Kurdistan region. The analysis ... 详细信息
来源: 评论
A Novel Approach on Advanced Fruit Disease Identification Using RCNN
A Novel Approach on Advanced Fruit Disease Identification Us...
收藏 引用
2025 International Conference on Multi-Agent Systems for Collaborative Intelligence, ICMSCI 2025
作者: Kumar, R. Boopathi, P. Rajan, M. Sundar Bangalore India Shri Nehru College of Arts and Science Department of Computer Science Tamil Nadu Coimbatore India Arba Minch Institute of Technology Arba Minch University Faculty of Electrical and Computer Engineering Ethiopia
The early diagnosis of diseases in fruits holds immense importance for agricultural industries, as it directly impacts production quality and quantity. This study introduces a novel approach utilizing Recursive Convol... 详细信息
来源: 评论
Liberated Arabic Handwritten Text Recognition using Convolutional Recurrent Neural Networks
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer science and Mathematics 2025年 第2期6卷 72-81页
作者: AlRababah, Ahmad AbdulQadir Aljahdali, Mohammed Khalid Al jahdali, Abdulrahim Abdulhamid AlGhanmi, Mohammed Saleh Al Barazanchi, Israa Ibraheem Department of Computer Science Faculty of Computing and Information Technology in Rabigh King Abdulaziz University Saudi Arabia College of Engineering University of Warith Al-Anbiyaa Karbala Iraq
Arabic script is exhibited in a cursive style, which is a departure from the norm in many common languages, and the shapes of letters are contingent on their positions within words. The form of the first letter is inf... 详细信息
来源: 评论
Deep learning and ensemble methods for anomaly detection in ICS security
收藏 引用
International Journal of Information Technology (Singapore) 2025年 第3期17卷 1761-1775页
作者: Hossain, Md. Alamgir Hasan, Tahmid Karovic, jr, Vincent Abdeljaber, Hikmat A. M. Haque, Md. Alimul Ahmad, Sultan Zafar, Aasim Nazeer, Jabeen Mishra, B.K. Department of Computer Science and Engineering State University of Bangladesh South Purbachal Kanchan Dhaka 1461 Bangladesh Department of Computer Science and Engineering Prime University Dhaka Bangladesh Department of Information Systems Faculty of Management Comenius Bratislava Odbojárov 10 Bratislava 25 82005 Slovakia Department of Computer Science Faculty of Information Technology Applied Science Private University Amman 11931 Jordan MEU Research Unit Middle East University Amman 11831 Lebanon Department of Computer Science Veer Kunwar Singh University Bihar Ara India Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Alkharj 11942 Saudi Arabia University Center for Research and Development (UCRD) Department of Computer Science and Engineering Chandigarh University Gharuan Punjab Mohali 140413 India Department of Computer Science Aligarh Muslim University U.P Aligarh 202002 India P.G. Department of Physics Veer Kunwar Singh University Bihar Ara India
This research addresses the escalating threats to industrial control systems by introducing a novel approach that combines deep learning for feature selection with a robust ensemble-based classification technique to e... 详细信息
来源: 评论
Hybrid-Optimized Model for Deepfake Detection
收藏 引用
International Journal of Advanced computer science and Applications 2025年 第4期16卷 148-160页
作者: Mancy, H. Elpeltagy, Marwa Eldahshan, Kamal Ismail, Aya Department of Computer Science College of Engineering and Computer Sciences Prince Sattam Bin Abdulaziz University Alkharj11942 Saudi Arabia Al-Azhar University Cairo Egypt Systems and Computers Department Al-Azhar University Egypt Mathematics Department Faculty of Science Al-Azhar University Egypt Mathematics Department Tanta University Egypt
The advancement of deep learning models has led to the creation of novel techniques for image and video synthesis. One such technique is the deepfake, which swaps faces among persons and then produces hyper-realistic ... 详细信息
来源: 评论
Improving Software Defects Detection: An In-Depth Analysis of Machine Learning Methods and Static Analysis Tools for Greater Accuracy  2
Improving Software Defects Detection: An In-Depth Analysis o...
收藏 引用
2nd International Conference on Machine Learning and Autonomous Systems, ICMLAS 2025
作者: Bobade, Veer Puri, Chetan DMIHER Faculty of Engineering And Technology Department of Artificial Intelligence and Machine Learning Maharashtra Wardha India DMIHER Faculty of Engineering And Technology Department of Computer Science and Engineering Maharashtra Wardha India
Enhancing software quality and reducing testing expenses requires better software fault detection. To guarantee the dependability and usability of software, Software Defect Prediction (SDP) uses machine learning appro... 详细信息
来源: 评论
Tree search hyper-heuristic with application to combinatorial optimization
收藏 引用
Journal of Heuristics 2025年 第2期31卷 1-42页
作者: Gil-Gala, Francisco Javier Ɖurasevic, Marko Sierra, Maria R. Varela, Ramiro Department of Computer Science University of Oviedo Gijón 33213 Spain Faculty of Electrical Engineering and Computing University of Zagreb Zagreb 10000 Croatia
In this study, we investigate using the state space search paradigm to construct heuristics in the form of Priority Rules for combinatorial optimisation problems. This is an alternative to Genetic Programming (GP) and... 详细信息
来源: 评论
Scalable Subspace Clustering via Purity Kernel Tensor Learning  3
Scalable Subspace Clustering via Purity Kernel Tensor Learni...
收藏 引用
3rd International Conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Adhvaryu, Rachit Kannan, S. Rajes Sanjay, C.P. Dange, Pravin Parul University Department of Computer Science and Engineering Faculty of Engineering and Technology Gujarat India Chennai Institute of Technology Department of Computer Science and Engineering Kundrathur India Sri Balaji University Pune India Pune India
Subspace clustering is a fundamental task in machine learning, particularly for high-dimensional datasets where the goal is to group data points that lie in distinct subspaces. Traditional methods, such as Sparse Subs... 详细信息
来源: 评论