咨询与建议

限定检索结果

文献类型

  • 22,395 篇 会议
  • 14,009 篇 期刊文献
  • 458 册 图书

馆藏范围

  • 36,862 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,122 篇 工学
    • 12,702 篇 计算机科学与技术...
    • 10,203 篇 软件工程
    • 4,857 篇 信息与通信工程
    • 3,631 篇 电气工程
    • 3,557 篇 控制科学与工程
    • 3,236 篇 电子科学与技术(可...
    • 2,292 篇 生物工程
    • 2,001 篇 生物医学工程(可授...
    • 1,775 篇 机械工程
    • 1,606 篇 光学工程
    • 1,548 篇 化学工程与技术
    • 1,445 篇 仪器科学与技术
    • 1,414 篇 动力工程及工程热...
    • 1,099 篇 材料科学与工程(可...
    • 718 篇 交通运输工程
    • 707 篇 安全科学与工程
  • 13,684 篇 理学
    • 6,050 篇 数学
    • 5,644 篇 物理学
    • 2,690 篇 生物学
    • 1,921 篇 统计学(可授理学、...
    • 1,643 篇 化学
    • 1,431 篇 系统科学
  • 5,244 篇 管理学
    • 3,348 篇 管理科学与工程(可...
    • 2,043 篇 图书情报与档案管...
    • 1,644 篇 工商管理
  • 2,007 篇 医学
    • 1,690 篇 临床医学
    • 1,456 篇 基础医学(可授医学...
    • 920 篇 药学(可授医学、理...
    • 724 篇 公共卫生与预防医...
  • 854 篇 法学
    • 714 篇 社会学
  • 688 篇 经济学
  • 498 篇 农学
  • 410 篇 教育学
  • 115 篇 文学
  • 73 篇 军事学
  • 47 篇 艺术学
  • 4 篇 历史学
  • 2 篇 哲学

主题

  • 805 篇 deep learning
  • 789 篇 accuracy
  • 593 篇 machine learning
  • 587 篇 feature extracti...
  • 496 篇 training
  • 480 篇 computational mo...
  • 471 篇 internet of thin...
  • 459 篇 computer science
  • 458 篇 artificial intel...
  • 420 篇 support vector m...
  • 374 篇 optimization
  • 327 篇 predictive model...
  • 252 篇 data models
  • 243 篇 reliability
  • 242 篇 convolutional ne...
  • 238 篇 neural networks
  • 225 篇 real-time system...
  • 224 篇 covid-19
  • 218 篇 mathematical mod...
  • 217 篇 simulation

机构

  • 1,096 篇 cavendish labora...
  • 1,027 篇 department of ph...
  • 979 篇 physikalisches i...
  • 974 篇 oliver lodge lab...
  • 642 篇 infn laboratori ...
  • 621 篇 infn sezione di ...
  • 605 篇 fakultät physik ...
  • 604 篇 infn sezione di ...
  • 598 篇 infn sezione di ...
  • 567 篇 university of ch...
  • 560 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 538 篇 iccub universita...
  • 536 篇 department of ph...
  • 535 篇 school of physic...
  • 519 篇 imperial college...
  • 516 篇 h.h. wills physi...
  • 516 篇 nikhef national ...
  • 510 篇 stfc rutherford ...
  • 507 篇 school of physic...

作者

  • 266 篇 barter w.
  • 258 篇 a. gomes
  • 250 篇 beiter a.
  • 247 篇 c. alexa
  • 245 篇 j. m. izen
  • 242 篇 g. bella
  • 240 篇 j. strandberg
  • 239 篇 c. amelung
  • 237 篇 d. calvet
  • 237 篇 bellee v.
  • 234 篇 g. spigo
  • 232 篇 bowcock t.j.v.
  • 232 篇 blake t.
  • 231 篇 f. siegert
  • 231 篇 s. chen
  • 229 篇 brundu d.
  • 220 篇 betancourt c.
  • 218 篇 borsato m.
  • 218 篇 amato s.
  • 217 篇 r. ströhmer

语言

  • 34,507 篇 英文
  • 1,959 篇 其他
  • 309 篇 中文
  • 72 篇 日文
  • 12 篇 德文
  • 10 篇 法文
  • 5 篇 俄文
  • 5 篇 斯洛文尼亚文
  • 4 篇 土耳其文
  • 3 篇 西班牙文
  • 2 篇 阿拉伯文
  • 2 篇 荷兰文
  • 2 篇 葡萄牙文
  • 1 篇 意大利文
  • 1 篇 朝鲜文
  • 1 篇 泰文
检索条件"机构=Faculty of Computer Technology Engineering"
36862 条 记 录,以下是201-210 订阅
排序:
An LSTM-Based Method for Automatic Reliability Prediction of Cognitive Radio Vehicular Ad Hoc Networks
收藏 引用
SN computer Science 2024年 第3期5卷 291页
作者: Bahramnejad, Somayeh Movahhedinia, Naser Naseri, Amineh Department of Computer Engineering Sirjan University of Technology Sirjan 78137-33385 Iran Faculty of Computer Engineering University of Isfahan Hezarjarib Isfahan Isfahan *** Iran
Reliability is a critical issue in vehicular networks. A deep learning (DL) method is proposed in this study to automatically predict the reliability of cognitive radio vehicular networks (CR-VANETs) ignored in t... 详细信息
来源: 评论
Dielectric Material Characterization for Reflectarray Antennas Designed at Sub-6GHz and Millimeter Wave Bands of 5G  16
Dielectric Material Characterization for Reflectarray Antenn...
收藏 引用
16th IEEE Malaysia International Conference on Communication, MICC 2023
作者: Khan, Sher Dali Abbasi, Muhammad Inam Ibrahim, Imran Mohd Sohu, Izhar Ahmed Khan, Sanaullah Faculty of Electrical and Electronic Engineering Technology Malaysia Faculty of Electronic and Computer Engineering Malaysia
The future compliance of reflectarray antenna necessitates a methodical examination of its primary traditional configurations to anticipate improvements. The current design, which utilizes microwave and millimeter wav... 详细信息
来源: 评论
Mobility-Aware Power Control and User Scheduling for Downlink V2I Networks  100
Mobility-Aware Power Control and User Scheduling for Downlin...
收藏 引用
100th IEEE Vehicular technology Conference, VTC 2024-Fall
作者: Wang, Yujie Zhou, Momiao Sun, Yanshi Wang, Kan Hefei University of Technology School of Computer Science and Information Engineering Hefei China Xi'an University of Technology Faculty of Computer Science and Engineering Xi'an China
Vehicle-to-infrastructure (V2I) network is a new paradigm of wireless system with special topology where roadside units (RSUs) are linearly deployed along the roadside and vehicles linearly move on the road. For such ... 详细信息
来源: 评论
Intrusion Detection in WSN with Optimal Trained Hybrid Model: Introduction to Self-Improved Beluga Whale Optimization  4
Intrusion Detection in WSN with Optimal Trained Hybrid Model...
收藏 引用
4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Chandan, Madhavarapu Santhi, S.G. Rao, T. Srinivasa Annamalai University Faculty of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Annamalainagar India Faculty of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Annamalainagar608002 India Gudlavalleru Engineering College Department of Computer Science and Engineering Andhra Pradesh Gudlavalleru India
WSN security is a current area of research for many scientists. One of the best security tools for defending the network from malicious assaults or the unauthenticated access is IDS. In this article, we suggest an opt... 详细信息
来源: 评论
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones  15
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key...
收藏 引用
15th International Conference on Information and Knowledge technology, IKT 2024
作者: Toghraee, Neda Mala, Hamid Dept. of Information Technology Engineering Faculty of Computer Engineering University of Isfahan Isfahan Iran
Drones have evolved into sophisticated autonomous systems with a multitude of applications, including military operations, environmental monitoring, traffic oversight, data transmission, package delivery, fire targeti... 详细信息
来源: 评论
Two dimensional cuckoo search optimization algorithm based despeckling filter for the real ultrasound images
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第1期15卷 921-942页
作者: Gupta, Pradeep K. Lal, Shyam Kiran, Mustafa Servet Husain, Farooq Department of Electronics and Communication Engineering Moradabad Institute of Technology Uttar Pradesh Moradabad244001 India Department of Electronics and Communication Engineering National Institute of Technology Karnataka Surathkal Karnataka Mangaluru575025 India Department of Computer Engineering Faculty of Engineering Konya Technical University Konya Turkey Department of Computer Engineering Faculty of Engineering Selcuk University Konya Turkey
A clinical ultrasound imaging plays a significant role in the proper diagnosis of patients because, it is a cost-effective and non-invasive technique in comparison with other methods. The speckle noise contamination c... 详细信息
来源: 评论
Recommendation systems-based software requirements elicitation process—a systematic literature review
收藏 引用
Journal of engineering and Applied Science 2024年 第1期71卷 29页
作者: Akram, Faiz Ahmad, Tanvir Sadiq, Mohd. Department of Computer Engineering Faculty of Engineering and Technology Jamia Millia Islamia A Central University New Delhi110025 India Software Engineering Lab. Computer Engineering Section UPFET Jamia Millia Islamia A Central University New Delhi110025 India
Requirements elicitation is one of the fundamental sub-processes of requirements engineering which is used to find the needs of stakeholders. There are several activities in this sub-process, i.e., identification of s... 详细信息
来源: 评论
An ultra efficient 2:1 multiplexer using bar-shaped pattern in atomic silicon dangling bond technology
收藏 引用
Journal of Supercomputing 2024年 第13期80卷 18347-18364页
作者: Rasmi, Hadi Mosleh, Mohammad Jafari Navimipour, Nima Kheyrandish, Mohammad Department of Computer Engineering Dezful Branch Islamic Azad University Dezful Iran Department of Computer Engineering Tabriz Branch Islamic Azad University Tabriz Iran Department of Computer Engineering Faculty of Engineering and Natural Sciences Kadir Has University Istanbul Turkey Future Technology Research Center National Yunlin University of Science and Technology Douliou64002 Taiwan
As CMOS technology approaches its physical and technical limits, alternative technologies such as nanotechnology or quantum computing are needed to overcome the challenges of lithography, transistor scaling, interconn... 详细信息
来源: 评论
Exploring Innovation: Artificial Intelligence (AI) in Pharmacy  7
Exploring Innovation: Artificial Intelligence (AI) in Pharma...
收藏 引用
7th International Conference on Inventive Computation Technologies, ICICT 2024
作者: Raymond, David Mankar, Divyani Gudadhe, Amit Faculty of Engineering And Technology Department of Computer Science And Medical Engineering Maharashtra Wardha India Faculty of Engineering And Technology Department of Basic Science And Humanities Maharashtra Wardha India
Artificial Intelligence (AI) has emerged as a disruptive force in the pharmaceutical industry, driving unprecedented breakthroughs across various domains. This article provides a comprehensive overview of the cutting-... 详细信息
来源: 评论
Leveraging Context for Enhanced Emotion Recognition: A Study Using SSD with ResNet  1
Leveraging Context for Enhanced Emotion Recognition: A Study...
收藏 引用
1st International Conference on Software, Systems and Information technology, SSITCON 2024
作者: Oza, Yash Shah, Rushank Singh, Arhya Kanikar, Prashasti Nmims Mukesh Patel School of Technology Management and Engineering Computer Engineering Mumbai India Nmims Mukesh Patel School of Technology Management and Engineering Faculty Computer Engineering Mumbai India
The increasing interest in automated emotional state recognition systems presents significant potential for applications in human-machine interactions and monitoring. Nonetheless, conventional methods that concentrate... 详细信息
来源: 评论