咨询与建议

限定检索结果

文献类型

  • 3,262 篇 会议
  • 2,582 篇 期刊文献
  • 120 册 图书

馆藏范围

  • 5,964 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,491 篇 工学
    • 2,231 篇 计算机科学与技术...
    • 1,757 篇 软件工程
    • 704 篇 控制科学与工程
    • 678 篇 信息与通信工程
    • 486 篇 电气工程
    • 417 篇 电子科学与技术(可...
    • 364 篇 生物工程
    • 345 篇 生物医学工程(可授...
    • 296 篇 机械工程
    • 253 篇 光学工程
    • 219 篇 仪器科学与技术
    • 194 篇 动力工程及工程热...
    • 161 篇 化学工程与技术
    • 156 篇 材料科学与工程(可...
    • 134 篇 交通运输工程
    • 119 篇 网络空间安全
  • 1,972 篇 理学
    • 933 篇 数学
    • 607 篇 物理学
    • 471 篇 生物学
    • 302 篇 统计学(可授理学、...
    • 292 篇 系统科学
    • 194 篇 化学
  • 939 篇 管理学
    • 631 篇 管理科学与工程(可...
    • 338 篇 图书情报与档案管...
    • 305 篇 工商管理
  • 406 篇 医学
    • 345 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 155 篇 药学(可授医学、理...
    • 143 篇 公共卫生与预防医...
  • 155 篇 法学
    • 128 篇 社会学
  • 114 篇 经济学
  • 74 篇 农学
  • 70 篇 教育学
  • 19 篇 文学
  • 19 篇 艺术学
  • 10 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 159 篇 deep learning
  • 157 篇 computer science
  • 145 篇 machine learning
  • 117 篇 artificial intel...
  • 104 篇 computational mo...
  • 92 篇 feature extracti...
  • 88 篇 accuracy
  • 83 篇 systems engineer...
  • 73 篇 internet of thin...
  • 72 篇 optimization
  • 67 篇 neural networks
  • 66 篇 training
  • 61 篇 control systems
  • 61 篇 mathematical mod...
  • 52 篇 computational in...
  • 52 篇 educational inst...
  • 52 篇 predictive model...
  • 50 篇 support vector m...
  • 50 篇 robustness
  • 49 篇 security

机构

  • 45 篇 faculty of compu...
  • 32 篇 department of co...
  • 26 篇 department of in...
  • 24 篇 institute for sy...
  • 24 篇 faculty of engin...
  • 21 篇 graduate school ...
  • 20 篇 inesc tec - inst...
  • 20 篇 computer enginee...
  • 19 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 faculty of engin...
  • 17 篇 faculty of compu...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 ieee
  • 16 篇 department of co...
  • 15 篇 department of el...
  • 15 篇 department of in...
  • 15 篇 faculty of compu...
  • 15 篇 rt-rk institute ...

作者

  • 37 篇 pedrycz witold
  • 27 篇 tao dacheng
  • 26 篇 el-sayed m.el-ke...
  • 24 篇 xin xin
  • 21 篇 abdelwahed motwa...
  • 17 篇 abdelaziz a.abde...
  • 16 篇 hayashi eiji
  • 16 篇 tomio watanabe
  • 15 篇 gallegos luis en...
  • 15 篇 anwer mustafa hi...
  • 13 篇 k. inoue
  • 13 篇 watanabe tomio
  • 13 篇 fahd n.al-wesabi
  • 12 篇 ahmed bestoun s.
  • 12 篇 mesfer al duhayy...
  • 12 篇 shunsuke araki
  • 12 篇 abdelhameed ibra...
  • 11 篇 m. ishikawa
  • 11 篇 nengkun yu
  • 11 篇 witold pedrycz

语言

  • 5,613 篇 英文
  • 278 篇 其他
  • 41 篇 中文
  • 29 篇 日文
  • 4 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Computer Science and Systems Engineering"
5964 条 记 录,以下是701-710 订阅
排序:
Wind Driven Optimization-Based Medical Image Encryption for Blockchain-Enabled Internet of Things Environment
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3219-3233页
作者: C.S.S.Anupama Raed Alsini N.Supriya E.Laxmi Lydia Seifedine Kadry Sang-Soo Yeo Yongsung Kim Department of Electronics&Instrumentation Engineering V.R.Siddhartha Engineering CollegeVijayawada520007India Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science and Engineering Malla Reddy Engineering College(A)Hyderabad500100India Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Applied Data Science Noroff University College4612KristiansandNorway Department of Computer Engineering Mokwon UniversityDaejeon35349Korea Department of Technology Education Chungnam National University 99Daehak-roYuseong-guDaejeon34134Korea
Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,*** image security and privacy become a critical... 详细信息
来源: 评论
Analysis of Approaches for Identifying Key Skills in Vacancies
Analysis of Approaches for Identifying Key Skills in Vacanci...
收藏 引用
International Conference on Soft Computing and Measurements (SCM)
作者: Pavel V. Korytov Ivan I. Kholod Yan Yu. Gribetskiy Ekaterina A. Andreeva Department of Computer Science and Engineering Faculty of Computer Science and Technology Saint Petersburg Electrotechnical University “LETI” Saint-Petersburg Russia Department of Information systems Faculty of Computer Science and Technology Saint Petersburg Electrotechnical University “LETI” Saint-Petersburg Russia
The task of identifying key skills from job vacancies descriptions is considered in the article. The source data consists of vacancy texts from the “Jobs in Russia” portal, in which skill-related entities were manua... 详细信息
来源: 评论
Support Vector Machine Based Handwritten Hindi Character Recognition and Summarization
收藏 引用
computer systems science & engineering 2022年 第10期43卷 397-412页
作者: Sunil Dhankhar Mukesh Kumar Gupta Fida Hussain Memon Surbhi Bhatia Pankaj Dadheech Arwa Mashat Department of Computer Science&Engineering Swami Keshvanand Institute of TechnologyManagement&GramothanJaipurRajasthan302017India Department of Electrical Engineering Sukkur IBA UniversityPakistan Department of Mechatronics Engineering Jeju National UniversityJeju63243Korea Department of Information Systems College of Computer Science and Information TechnologyKing Faisal UniversitySaudi Arabia Faculty of Computing&Information Technology King Abdulaziz UniversityRabigh21911Saudi Arabia
In today’s digital era,the text may be in form of *** research aims to deal with the problem by recognizing such text and utilizing the support vector machine(SVM).A lot of work has been done on the English language ... 详细信息
来源: 评论
Comparative Evaluation of Machine Learning-Based Controller Area Network Intrusion Detection systems  14
Comparative Evaluation of Machine Learning-Based Controller ...
收藏 引用
14th International Conference on Information and Communication systems, ICICS 2023
作者: Al-Jarrah, Omar Y. Ramadan, Omar A. Alsaify, Baha Alkhushayni, Suboh Jordan University of Science and Technology Faculty of Computer and Information Technology Dept. Network Engineering and Security P.O. Box 3030 Irbid22110 Jordan Jordan University of Science and Technology Faculty of Engineering Dept. Mechanical Engineering P.O. Box 3030 Irbid22110 Jordan Yarmouk University Dept. Information Systems Irbid Jordan
The controller area network (CAN) protocol is widely used in vehicle networks. However, it lacks essential security features like confidentiality and authentication. To enhance vehicle security, researchers have propo... 详细信息
来源: 评论
Image Captioning with Reinforcement Learning  2
Image Captioning with Reinforcement Learning
收藏 引用
2nd IEEE International Conference on computer Vision and Machine Intelligence, CVMI 2023
作者: Verma, Anand Agarwal, Saurabh Arya, K.V. Petrlik, Ivan Esparza, Roberto Rodriguez, Ciro ABV-IIITM Gwalior Department of Information Technology Madhya Pradesh 474015 India ABV-Indian Institute of Information Technology and Management Multimedia and Information Security Research Group Department of Computer Science and Engineering Gwalior474015 India National University Federico Villarreal Faculty of Industrial and Systems Engineering Lima Peru National University Mayor de San Marcos Faculty of Systems Engineering and Informatics Peru
Image captioning involves generating a natural language description that accurately represents the content and context of an image. To achieve this, image captioning utilises various machine learning techniques and fi... 详细信息
来源: 评论
Prediction of Dental Fluorosis Infection based on Particle Optimized Scored KNN Approach  1
Prediction of Dental Fluorosis Infection based on Particle O...
收藏 引用
1st International Conference of Intelligent Methods, systems and Applications, IMSA 2023
作者: Montasser, Reem Kadry Ismael, Osama El-Kholy, Moataz October University for Modern Sciences and Arts Faculty of Computer Science Software Engineering Department Giza Egypt Cairo University Faculty of Computers and Artificial Intelligence Information Systems Department Giza Egypt October University for Modern Sciences and Arts Faculty of Dentistry Oral Pathology Department Giza Egypt
Due to its simplicity of usage across a variety of applications, the K-Nearest Neighbor algorithm is usually utilized as a classification approach. The K-Nearest Neighbor algorithm's accuracy is greatly impacted b... 详细信息
来源: 评论
Thermal Simulation for Magnetic Coupler of Wireless Power Transfer Electric Vehicles by Using Heat Sink and Thermoelectric Cooler
收藏 引用
Progress In Electromagnetics Research M 2024年 126卷 89-98页
作者: Farooq, Umar Shafique, Shahryar Asif, Muhammad Arslan, Muhammad Wongjom, Poramed Ullah, Rizwan Zhilenkov, Anton Mobayen, Saleh Pijitrojana, Wanchai Electrical and Computer Engineering Department Thammasat School of Engineering Thammasat University Rangsit Campus Klong Luang Pathum Thani 12120 Thailand Ministry of IT & Telecommunications Islamabad Pakistan Department of Electrical Engineering University of Science and Technology Main Campus Bannu23200 Pakistan Department of Mechanical Engineering University of Engineering and Technology Lahore Pakistan Division of Physics Faculty of Science and Technology Thammasat University Rangsit Campus Klongluang Pathum Thani 12120 Thailand Department of Electrical Engineering Chulalongkorn University Bangkok10330 Thailand Department of Cyber-Physical Systems St. Petersburg State Marine Technical University Saint-Petersburg190121 Russia Graduate School of Intelligent Data Science National Yunlin University of Science and Technology 123 University Road Section 3 Yunlin Douliou640301 Taiwan
In challenging operational environments such as underground buildings beneath roadways, reliability and performance of wireless power transfer (WPT) systems for electric vehicles (EVs) heavily hinge on the operating t... 详细信息
来源: 评论
AraDS: Arabic Datasets for Text Mining Approaches
AraDS: Arabic Datasets for Text Mining Approaches
收藏 引用
Smart Computing and Application (ICSCA), International Conference on
作者: Wael M.S. Yafooz Abdullah Alsaeedi Abdel-Hamid M. Emara Computer Science Department College of Computer Science and Engineering Taibah University Medina Department of Computers and Systems Engineering Faculty of Engineering Al-Azhar University Cairo Egypt
With the digital transformation, life started depending on the digital world. Hence, there is a massive amount of unstructured textual data produced and accumulated faster. Such data used in many applications such sen... 详细信息
来源: 评论
Real-Time Data-Driven Maintenance Logistics: A Public-Private Collaboration
Real-Time Data-Driven Maintenance Logistics: A Public-Privat...
收藏 引用
2024 Commit2Data, C2D 2024
作者: van Jaarsveld, Willem Bliek, Laurens de Weerdt, Mathijs Kapodistria, Stella Pronk, Verus Verleijsdonk, Peter Voorberg, Simon Akçay, Alp da Costa, Paulo Eshuis, Rik Kaymak, Uzay van Houtum, Geert-Jan Verwer, Sicco Zhang, Yingqian Department of Industrial Engineering and Innovation Sciences Eindhoven University of Technology Netherlands Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Netherlands Department of Mathematics and Computer Science Eindhoven University of Technology Netherlands Philips Research Laboratories Eindhoven Netherlands Department of Information Systems Supply Chain Management and Decision Analysis NEOMA Business School Rouen France Etsy Inc. Dublin Ireland Jheronimus Academy of Data Science Eindhoven University of Technology Netherlands
The project "Real-time data-driven maintenance logistics" was initiated with the purpose of bringing innovations in data-driven decision making to maintenance logistics, by bringing problem owners in the for... 详细信息
来源: 评论
Influence of Local Lag on Reaction Force in Networked Virtual Environment with Haptic Sense
Influence of Local Lag on Reaction Force in Networked Virtua...
收藏 引用
computer Applications (ICCA), IEEE Conference on
作者: Khaing Zar Win Yutaka Ishibashi Khaing Htet Win Faculty of Computer Science University of Computer Studies Yangon Yangon Myanmar Graduate School of Engineering Nagoya Institute of Technology Nagoya Japan Faculty of Computer Systems and Technologies University of Computer Studies Yangon Yangon Myanmar
This paper investigates the influence of local lag on the reaction forces in a networked virtual maze system incorporating haptic feedback by experiment. In the experiment, participants move a box from the starting po... 详细信息
来源: 评论