咨询与建议

限定检索结果

文献类型

  • 3,938 篇 会议
  • 3,674 篇 期刊文献
  • 101 册 图书

馆藏范围

  • 7,713 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,714 篇 工学
    • 2,849 篇 计算机科学与技术...
    • 2,315 篇 软件工程
    • 875 篇 信息与通信工程
    • 669 篇 控制科学与工程
    • 588 篇 电气工程
    • 572 篇 生物工程
    • 506 篇 生物医学工程(可授...
    • 490 篇 电子科学与技术(可...
    • 446 篇 光学工程
    • 404 篇 化学工程与技术
    • 388 篇 机械工程
    • 366 篇 仪器科学与技术
    • 300 篇 材料科学与工程(可...
    • 293 篇 动力工程及工程热...
    • 182 篇 环境科学与工程(可...
    • 176 篇 安全科学与工程
  • 3,075 篇 理学
    • 1,335 篇 物理学
    • 1,148 篇 数学
    • 670 篇 生物学
    • 425 篇 化学
    • 384 篇 统计学(可授理学、...
    • 265 篇 系统科学
    • 254 篇 地球物理学
  • 1,181 篇 管理学
    • 780 篇 管理科学与工程(可...
    • 405 篇 图书情报与档案管...
    • 369 篇 工商管理
  • 579 篇 医学
    • 489 篇 临床医学
    • 403 篇 基础医学(可授医学...
    • 242 篇 药学(可授医学、理...
    • 239 篇 公共卫生与预防医...
  • 207 篇 法学
  • 161 篇 经济学
  • 137 篇 农学
  • 126 篇 教育学
  • 23 篇 艺术学
  • 21 篇 军事学
  • 17 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 226 篇 deep learning
  • 217 篇 machine learning
  • 173 篇 accuracy
  • 152 篇 feature extracti...
  • 129 篇 internet of thin...
  • 128 篇 computational mo...
  • 119 篇 artificial intel...
  • 114 篇 real-time system...
  • 105 篇 predictive model...
  • 105 篇 training
  • 80 篇 support vector m...
  • 79 篇 security
  • 76 篇 optimization
  • 73 篇 convolutional ne...
  • 71 篇 neural networks
  • 70 篇 monitoring
  • 70 篇 data models
  • 67 篇 semantics
  • 66 篇 covid-19
  • 65 篇 cloud computing

机构

  • 107 篇 university of sc...
  • 94 篇 institut univers...
  • 93 篇 north-west unive...
  • 92 篇 tianfu cosmic ra...
  • 90 篇 department of ph...
  • 90 篇 national centre ...
  • 87 篇 infn sezione di ...
  • 87 篇 hebei normal uni...
  • 84 篇 tno technical sc...
  • 83 篇 state key labora...
  • 81 篇 yunnan observato...
  • 80 篇 université de st...
  • 79 篇 infn sezione di ...
  • 79 篇 nikhef national ...
  • 78 篇 university of jo...
  • 74 篇 ncsr demokritos ...
  • 70 篇 key laboratory f...
  • 70 篇 university würzb...
  • 66 篇 università di ca...
  • 66 篇 university moham...

作者

  • 113 篇 bastieri d.
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 chen a.
  • 94 篇 calvo d.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 díaz a.f.
  • 83 篇 gozzini s.r.
  • 82 篇 boumaaza j.
  • 82 篇 coleiro a.
  • 80 篇 dallier r.
  • 76 篇 enzenhöfer a.
  • 75 篇 boettcher m.
  • 74 篇 axikegu
  • 73 篇 fang j.
  • 73 篇 feng c.f.
  • 70 篇 celli s.
  • 69 篇 jiang k.
  • 69 篇 kalekin o.

语言

  • 7,141 篇 英文
  • 512 篇 其他
  • 53 篇 中文
  • 5 篇 德文
  • 3 篇 法文
  • 3 篇 日文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Faculty of Computing Engineering and Science"
7713 条 记 录,以下是171-180 订阅
排序:
An EfficientNet to Classify Monkeypox-Comparable Skin Lesions Using Transfer Learning
An EfficientNet to Classify Monkeypox-Comparable Skin Lesion...
收藏 引用
2023 IEEE International Conference on Omni-Layer Intelligent Systems, COINS 2023
作者: Hossen, Md. Rifat Alfaz, Nazia Sami, Adnan Tanim, Sharia Arfin Bin Sarwar, Talha Islam, Md. Kamrul Department of Computer Science and Engineering Dhaka Bangladesh Department of Computer Science Dhaka Bangladesh College of Computing and Applied Science Universiti Malaysia Pahang Faculty of Computing Pekan Malaysia
Monkeypox is an infectious illness caused by the DNA-based monkeypox virus, which has raised public health concerns due to its rapid transmission to over 50 countries. Direct physical interaction with infected humans ... 详细信息
来源: 评论
An advanced security model for fog computing to tackle various attacks on the data link layer using the QQL-FHES scheme
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第5期16卷 3093-3100页
作者: Balaji, V. Selvaraj, P. Department of Computing Technologies College of Engineering and Technology Faculty of Engineering and Technology SRM Institute of Science and Technology SRM Nagar Kattankulathur Chengalpattu Dt TN Chennai 603203 India
Fog computing provides maximum flexibility and low latency by divesting the usage of cloud resources and amenities to the end users. In rendering the services to the cloud environment, Fog computing encounters critica... 详细信息
来源: 评论
Optimizing Household Energy Consumption: A Web-Based Tool for Real-Time Carbon Footprint Calculation and Sustainable Benchmarking  1
Optimizing Household Energy Consumption: A Web-Based Tool fo...
收藏 引用
1st International Conference on Advances in Computer science, Electrical, Electronics, and Communication Technologies, CE2CT 2025
作者: Raja, Harsh Kishore, Jayaditya Kalaivani, J. Angayarkanni, V. Rama, P. Srm Institute Of Science And Technology Faculty Of Engineering And Technology Department Of Computing Technologies Kattankulathur Chengalpattu District Tamil Nadu 603203 India
This is an innovative project from an energy-saving perspective. This project ensures that users become in control of their energy consumption and able to take an actively reducing their carbon footprints. It provides... 详细信息
来源: 评论
Analysis of the Impact of Data Augmentation on the Performance of Deep Learning Models in Multispectral Food Authenticity Identification  18
Analysis of the Impact of Data Augmentation on the Performan...
收藏 引用
18th Conference on Computer science and Intelligence Systems, FedCSIS 2023
作者: Zhang, Yaru Yilmaz, Arif Popa, Mirela Brewster, Christopher Maastricht University Faculty of Science and Engineering Department of Advanced Computing Sciences MD 6200 Netherlands
Food authenticity is a significant concern in the meat industry, demanding effective detection methods. This study explores the use of multispectral imaging (MSI) and deep learning for meat adulteration detection. We ... 详细信息
来源: 评论
Predictive Analytics in Hotel Recommendations Using Machine Learning  5
Predictive Analytics in Hotel Recommendations Using Machine ...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Singh, Siddharth Dey, Shayan Sharma, Shreyanshi Prathaban, Banu Priya School of Computing College of Engineering and Technology SRM Institute of Science and Technology Department of Networking and Communications Kattankulathur603203 India School of Computing SRM Institute of Science and Technology Faculty of Engineering and Technology Department of Networking and Communications Kattankulathur603203 India
In a world where travellers want the perfect stay, a new system emerges as the one that goes beyond simple hotel recommendations. By analysing details like interaction words and prices, it predicts hotel ratings using... 详细信息
来源: 评论
Towards Blockchain-Based Secure BGP Routing,Challenges and Future Research Directions
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2035-2062页
作者: Qiong Yang Li Ma Shanshan Tu Sami Ullah MuhammadWaqas Hisham Alasmary Faculty of Information Technology Beijing University of TechnologyBeijing100124China School of Information Science and Technology North China University of TechnologyBeijing100144China Department of Computer Science Shaheed Benazir Bhutto UniversitySheringal18050Pakistan School of Computing and Mathematical Science Faculty of Engineering and ScienceUniversity of GreenwichLondonSE109LSUK School of Engineering Edith Cowan UniversityPerth6027Australia Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig... 详细信息
来源: 评论
Development of Adaptive Fuzzy PID Controller Integrated with Slide Mode Control for Brushless Direct Current Motors  6
Development of Adaptive Fuzzy PID Controller Integrated with...
收藏 引用
6th IEEE Conference on Energy Conversion, CENCON 2023
作者: Xinyue, Dai Nordin, Norjulia Binti Mohamad Afrouzi, Hadi Nabipour Geach, Chen Rui Xingye, Wang Tavalaei, Jalal Universiti Teknologi Malaysia Faculty of Electrical Engineering Johor Bahru Malaysia Swinburne University of Technology Faculty of Engineering Computing and Science Kuching Malaysia
The relationship between magnetic flux and speed in a BLDC motor is complex and will show different trends under different control methods. Add the gap, other research has been done but still this issue is there. This... 详细信息
来源: 评论
YOLOCSP-PEST for Crops Pest Localization and Classification
收藏 引用
Computers, Materials & Continua 2025年 第2期82卷 2373-2388页
作者: Farooq Ali Huma Qayyum Kashif Saleem Iftikhar Ahmad Muhammad Javed Iqbal Department of Software Engineering University of Engineering and TechnologyTaxila47050Pakistan Department of Computer Science&Engineering College of Applied Studies&Community ServiceKing Saud UniversityRiyadh11362Saudi Arabia Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science University of Engineering and TechnologyTaxila47050Pakistan
Preservation of the crops depends on early and accurate detection of pests on crops as they cause several diseases decreasing crop production and quality. Several deep-learning techniques have been applied to overcome... 详细信息
来源: 评论
Secure Channel Estimation Using Norm Estimation Model for 5G Next Generation Wireless Networks
收藏 引用
Computers, Materials & Continua 2025年 第1期82卷 1151-1169页
作者: Khalil Ullah Song Jian Muhammad Naeem Ul Hassan Suliman Khan Mohammad Babar Arshad Ahmad Shafiq Ahmad Faculty of Information Engineering and Automation Kunming University of Science and TechnologyKunming650500China Department of Computer Science Abbottabad University of Science and TechnologyHavelianAbbottabad22500Pakistan Department of Computing and Electronics Engineering Middle East CollegeMuscat124Oman Department of CS&IT Pak-Austria Fachhochschule Institute of Applied Sciences and Technology MangHaripur22621Pakistan Industrial Engineering Department College of EngineeringKing Saud UniversityRiyadh11421Saudi Arabia
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile *** networks are sufficiently scaled to interconnect billions of users and *** i... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论