咨询与建议

限定检索结果

文献类型

  • 30,363 篇 会议
  • 18,983 篇 期刊文献
  • 631 册 图书

馆藏范围

  • 49,977 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28,692 篇 工学
    • 18,023 篇 计算机科学与技术...
    • 14,584 篇 软件工程
    • 6,165 篇 信息与通信工程
    • 4,715 篇 控制科学与工程
    • 4,336 篇 电气工程
    • 3,773 篇 电子科学与技术(可...
    • 3,220 篇 生物工程
    • 2,826 篇 生物医学工程(可授...
    • 2,281 篇 机械工程
    • 2,110 篇 光学工程
    • 1,998 篇 化学工程与技术
    • 1,824 篇 仪器科学与技术
    • 1,762 篇 动力工程及工程热...
    • 1,399 篇 材料科学与工程(可...
    • 972 篇 安全科学与工程
    • 955 篇 交通运输工程
  • 18,397 篇 理学
    • 8,558 篇 数学
    • 6,922 篇 物理学
    • 3,822 篇 生物学
    • 2,697 篇 统计学(可授理学、...
    • 2,108 篇 化学
    • 2,006 篇 系统科学
  • 7,250 篇 管理学
    • 4,498 篇 管理科学与工程(可...
    • 3,008 篇 图书情报与档案管...
    • 2,269 篇 工商管理
  • 2,834 篇 医学
    • 2,396 篇 临床医学
    • 2,075 篇 基础医学(可授医学...
    • 1,298 篇 药学(可授医学、理...
    • 1,012 篇 公共卫生与预防医...
  • 1,197 篇 法学
    • 1,003 篇 社会学
  • 884 篇 经济学
  • 667 篇 农学
  • 642 篇 教育学
  • 147 篇 文学
  • 91 篇 军事学
  • 66 篇 艺术学
  • 9 篇 哲学
  • 6 篇 历史学

主题

  • 1,291 篇 computer science
  • 956 篇 deep learning
  • 940 篇 accuracy
  • 858 篇 machine learning
  • 775 篇 computational mo...
  • 760 篇 feature extracti...
  • 722 篇 training
  • 640 篇 artificial intel...
  • 584 篇 internet of thin...
  • 527 篇 optimization
  • 512 篇 support vector m...
  • 420 篇 predictive model...
  • 405 篇 neural networks
  • 390 篇 data mining
  • 373 篇 data models
  • 354 篇 mathematical mod...
  • 324 篇 convolutional ne...
  • 313 篇 testing
  • 300 篇 monitoring
  • 300 篇 real-time system...

机构

  • 1,097 篇 cavendish labora...
  • 1,026 篇 department of ph...
  • 986 篇 physikalisches i...
  • 975 篇 oliver lodge lab...
  • 646 篇 infn laboratori ...
  • 630 篇 infn sezione di ...
  • 611 篇 infn sezione di ...
  • 609 篇 infn sezione di ...
  • 603 篇 fakultät physik ...
  • 569 篇 university of ch...
  • 557 篇 school of physic...
  • 543 篇 horia hulubei na...
  • 541 篇 department of ph...
  • 535 篇 school of physic...
  • 530 篇 iccub universita...
  • 525 篇 imperial college...
  • 520 篇 nikhef national ...
  • 517 篇 h.h. wills physi...
  • 515 篇 stfc rutherford ...
  • 510 篇 school of physic...

作者

  • 264 篇 barter w.
  • 261 篇 a. gomes
  • 250 篇 beiter a.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 243 篇 g. bella
  • 242 篇 j. strandberg
  • 240 篇 c. amelung
  • 238 篇 d. calvet
  • 237 篇 bellee v.
  • 236 篇 g. spigo
  • 236 篇 s. chen
  • 231 篇 bowcock t.j.v.
  • 230 篇 f. siegert
  • 228 篇 brundu d.
  • 227 篇 blake t.
  • 218 篇 y. tayalati
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 r. ströhmer

语言

  • 47,809 篇 英文
  • 1,696 篇 其他
  • 347 篇 中文
  • 109 篇 日文
  • 14 篇 德文
  • 11 篇 法文
  • 3 篇 荷兰文
  • 3 篇 俄文
  • 3 篇 斯洛文尼亚文
  • 2 篇 葡萄牙文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 泰文
检索条件"机构=Faculty of Computer Science and Computer Engineering"
49977 条 记 录,以下是31-40 订阅
排序:
Toward AI-Augmented Formal Verification: A Preliminary Investigation of ENGRU and Its Challenges
收藏 引用
IEEE Access 2025年 13卷 84357-84379页
作者: Dechsupa, Chanon Panboonyuen, Teerapong Vatanawood, Wiwat Padungweang, Praisan So-In, Chakchai Khon Kaen University College of Computing Department of Computer Science Khon Kaen400002 Thailand Chulalongkorn University Faculty of Engineering Department of Computer Engineering Bangkok10300 Thailand
State-space graphs and automata serve as fundamental tools for modeling and analyzing the behavior of computational systems. Recurrent neural networks (RNNs) and language models are deeply intertwined, as RNNS provide... 详细信息
来源: 评论
Photovoltaic Fault Detection in Remote Areas Using Fuzzy-Based Multiple Linear Regression (FMLR)
收藏 引用
International Journal of Advanced computer science and Applications 2025年 第4期16卷 243-249页
作者: Ardianto, Feby Ermatita, Ermatita Sofijan, Armin Doctoral Program in Engineering Science Universitas Sriwijaya Palembang Indonesia Faculty of Computer Science Universitas Sriwijaya Palembang Indonesia Faculty of Engineering Universitas Sriwijaya Palembang Indonesia
This research focused on developing and implementing a fault detection model for photovoltaic (PV) systems in remote areas, utilizing a Fuzzy-Based Multiple Linear Regression (FMLR) approach. The study aimed to addres... 详细信息
来源: 评论
Fuzzy clustering for electric field characterization and its application to thunderstorm interpretability
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 299-307页
作者: Xu Yang Hongyan Xing Xinyuan Ji Wei Xu Witold Pedrycz School of Electronics and Information Engineering Nanjing University of Information Science and Technology Department of Electrical and Computer Engineering University of Alberta Systems Research Institute Polish Academy of Sciences Department of Computer Engineering Faculty of Engineering and Natural Sciences Istinye University
Changes in the Atmospheric Electric Field Signal(AEFS) are highly correlated with weather changes, especially with thunderstorm activities. However, little attention has been paid to the ambiguous weather information ... 详细信息
来源: 评论
Mathematical Model for Delay Locked Loop Discriminator for 5G Demodulation Reference Signal
收藏 引用
IEEE Access 2025年 13卷 69513-69519页
作者: Amjad, Freeha M. Yusof, Kamaludin Mohamad Bouallegue, Belgacem Gasouma, Amir A. A. Universiti Teknologi Malaysia Faculty of Electrical Engineering School of Engineering Skudai81310 Malaysia King Khalid University College of Computer Science Department of Computer Engineering Abha61421 Saudi Arabia
The vulnerable nature of satellite-based positioning systems under certain conditions such as urban canyons and indoors has given rise to the need for alternative positioning system. Cellular signal based positioning ... 详细信息
来源: 评论
A Review of Anonymization Algorithms and Methods in Big Data
收藏 引用
Annals of Data science 2025年 第1期12卷 253-279页
作者: Shamsinejad, Elham Banirostam, Touraj Pedram, Mir Mohsen Rahmani, Amir Masoud Department of Computer Engineering Central Tehran Branch Islamic Azad University Tehran Iran Department of Electrical and Computer Engineering Faculty of Engineering Kharazmi University Tehran Iran Department of Computer Engineering Science and Research Branch Islamic Azad University Tehran Iran
In the era of big data, with the increase in volume and complexity of data, the main challenge is how to use big data while preserving the privacy of users. This study was conducted with the aim of finding a solution ... 详细信息
来源: 评论
Rethinking the Design of Backdoor Triggers and Adversarial Perturbations: A Color Space Perspective
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2823-2840页
作者: Jiang, Wenbo Li, Hongwei Xu, Guowen Ren, Hao Yang, Haomiao Zhang, Tianwei Yu, Shui University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Sichuan University School of Cyber Science and Engineering Chengdu610017 China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore University of Technology Sydney School of Computer Science in the Faculty of Engineering and Information Technology SydneyNSW2007 Australia
Deep neural networks (DNNs) are known to be susceptible to various malicious attacks, such as adversarial and backdoor attacks. However, most of these attacks utilize additive adversarial perturbations (or backdoor tr... 详细信息
来源: 评论
Representing a Model for the Anonymization of Big Data Stream Using In-Memory Processing
收藏 引用
Annals of Data science 2025年 第1期12卷 223-252页
作者: Shamsinejad, Elham Banirostam, Touraj Pedram, Mir Mohsen Rahmani, Amir Masoud Department of Computer Engineering Central Tehran Branch Islamic Azad University Tehran Iran Department of Electrical and Computer Engineering Faculty of Engineering Kharazmi University Tehran Iran Department of Computer Engineering Science and Research Branch Islamic Azad University Tehran Iran
In light of the escalating privacy risks in the big data era, this paper introduces an innovative model for the anonymization of big data streams, leveraging in-memory processing within the Spark framework. The approa... 详细信息
来源: 评论
Optimizing Stand-Alone PV Systems:A Metaheuristic-Enhanced Fuzzy Approach for Adaptive MPPT
收藏 引用
China Communications 2025年 第1期22卷 61-74页
作者: Tina Samavat Mostafa Nazari Lin Fuhong Lei Yang Department of Computer Science and Engineering University of NevadaRenoNVUSA Faculty of Mechanical Engineering Shahrood University of TechnologyShahroodIran School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China
This paper introduces a simple yet effective approach for developing fuzzy logic controllers(FLCs)to identify the maximum power point(MPP)and optimize the photovoltaic(PV)system to extract the maximum power in differe... 详细信息
来源: 评论
Robust security risk estimation for android apps using nearest neighbor approach and hamming distance
收藏 引用
Soft Computing 2025年 第2期29卷 593-611页
作者: Deypir, Mahmood Zoughi, Toktam Faculty of Computer Engineering Shahid Sattari Aeronautical University of Science and Technology Tehran Iran Tehran Iran
Nowadays, Android-based devices such as smart phones, tablets, smart watches, and virtual reality headsets have found increasing use in our daily lives. Along with the development of various applications for these dev... 详细信息
来源: 评论
Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第2期106卷 459-473页
作者: Ponnuviji, N.P. Nirmala, G. Kokila, M. L. Sworna Priyadharshini, S. Indra Department of Computer Science and Engineering RMK College of Engineering and Technology Puduvoyal Thiruvallur India Department of Computer Science and Engineering RMD Engineering College Chennai India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nādu Kattankulathur Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c... 详细信息
来源: 评论