咨询与建议

限定检索结果

文献类型

  • 3,952 篇 会议
  • 3,678 篇 期刊文献
  • 101 册 图书

馆藏范围

  • 7,731 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,739 篇 工学
    • 2,830 篇 计算机科学与技术...
    • 2,299 篇 软件工程
    • 872 篇 信息与通信工程
    • 668 篇 控制科学与工程
    • 587 篇 电气工程
    • 571 篇 生物工程
    • 504 篇 生物医学工程(可授...
    • 493 篇 电子科学与技术(可...
    • 444 篇 光学工程
    • 399 篇 化学工程与技术
    • 383 篇 机械工程
    • 365 篇 仪器科学与技术
    • 309 篇 材料科学与工程(可...
    • 290 篇 动力工程及工程热...
    • 182 篇 环境科学与工程(可...
    • 176 篇 安全科学与工程
  • 3,055 篇 理学
    • 1,329 篇 物理学
    • 1,144 篇 数学
    • 670 篇 生物学
    • 422 篇 化学
    • 391 篇 统计学(可授理学、...
    • 263 篇 系统科学
    • 254 篇 地球物理学
  • 1,172 篇 管理学
    • 775 篇 管理科学与工程(可...
    • 403 篇 图书情报与档案管...
    • 365 篇 工商管理
  • 580 篇 医学
    • 487 篇 临床医学
    • 401 篇 基础医学(可授医学...
    • 242 篇 药学(可授医学、理...
    • 239 篇 公共卫生与预防医...
  • 204 篇 法学
  • 160 篇 经济学
  • 137 篇 农学
  • 128 篇 教育学
  • 23 篇 艺术学
  • 21 篇 军事学
  • 17 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 229 篇 deep learning
  • 220 篇 machine learning
  • 183 篇 accuracy
  • 159 篇 feature extracti...
  • 130 篇 internet of thin...
  • 129 篇 computational mo...
  • 122 篇 artificial intel...
  • 120 篇 real-time system...
  • 106 篇 predictive model...
  • 106 篇 training
  • 82 篇 security
  • 81 篇 support vector m...
  • 78 篇 optimization
  • 75 篇 convolutional ne...
  • 72 篇 monitoring
  • 72 篇 data models
  • 71 篇 neural networks
  • 70 篇 semantics
  • 69 篇 cloud computing
  • 67 篇 covid-19

机构

  • 110 篇 university of sc...
  • 96 篇 tianfu cosmic ra...
  • 94 篇 institut univers...
  • 93 篇 north-west unive...
  • 91 篇 hebei normal uni...
  • 90 篇 department of ph...
  • 90 篇 national centre ...
  • 87 篇 infn sezione di ...
  • 87 篇 state key labora...
  • 85 篇 yunnan observato...
  • 84 篇 tno technical sc...
  • 80 篇 université de st...
  • 79 篇 infn sezione di ...
  • 79 篇 nikhef national ...
  • 75 篇 university of jo...
  • 73 篇 key laboratory f...
  • 72 篇 ncsr demokritos ...
  • 68 篇 university würzb...
  • 66 篇 università di ca...
  • 63 篇 university moham...

作者

  • 113 篇 bastieri d.
  • 96 篇 ferrara g.
  • 96 篇 ardid m.
  • 95 篇 chen a.
  • 94 篇 calvo d.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 díaz a.f.
  • 83 篇 gozzini s.r.
  • 82 篇 boumaaza j.
  • 82 篇 coleiro a.
  • 80 篇 dallier r.
  • 76 篇 enzenhöfer a.
  • 75 篇 axikegu
  • 75 篇 boettcher m.
  • 73 篇 fang j.
  • 73 篇 feng c.f.
  • 69 篇 jiang k.
  • 69 篇 kalekin o.
  • 69 篇 celli s.

语言

  • 6,660 篇 英文
  • 1,016 篇 其他
  • 56 篇 中文
  • 6 篇 德文
  • 3 篇 法文
  • 3 篇 日文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
检索条件"机构=Faculty of Computing Engineering and Science"
7731 条 记 录,以下是731-740 订阅
排序:
Vision-Based Automated Parking Monitoring Using Geo-Tagged UAV Images
Vision-Based Automated Parking Monitoring Using Geo-Tagged U...
收藏 引用
Green Energy, computing and Sustainable Technology (GECOST), International Conference on
作者: Chung Yi Lai Hudyjaya Siswoyo Jo Chean Hung Lai Michelle Dunn Faculty of Engineering Computing and Science Swinburne University of Technology Sarawak Campus Kuching Malaysia School of Science Computing and Engineering Technologies Swinburne University of Technology Hawthorn Campus Melbourne Australia
This paper proposes an automated solution for parking monitoring using geo-tagged UAV (Unmanned Aerial Vehicle) images. The parking monitoring system utilizes a UAV to patrol the parking lot. The UAV captures video fo...
来源: 评论
Cloud-Enhanced Machine Learning Models for Predictive Maintenance in Industrial IoT  2
Cloud-Enhanced Machine Learning Models for Predictive Mainte...
收藏 引用
2nd IEEE International Conference on Trends in Quantum computing and Emerging Business Technologies, TQCEBT 2024
作者: Usharani, R. Sivagami, V.M. Saravanan, K. Pushparani, S. Rekha, K. Sashi Department of Computational Intelligence School of Computing Faculty of Engineering and Technology Srm Institute of Science and Technology Tamil Nadu Kattankulathur India Department of Information Technology Sri Venkateswara College of Engineering Sriperumbudur Tamil Nadu Chennai India Department of Artificial Intelligence and Data Science Care College of Engineering Tamil Nadu Trichy India Department of Computer Science and Engineering Meenakshi College of Engineering Tamil Nadu Chennai India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India
This study examines the implementation and impact of Cloud-Enhanced Machine Learning Models in the realm of Predictive Maintenance within Industrial Internet of Things (IIoT) settings. Emphasizing the integration of c... 详细信息
来源: 评论
A real-time system for detecting personal protective equipment compliance using deep learning model YOLOv5  9th
A real-time system for detecting personal protective equipme...
收藏 引用
9th International Conference on Computer science and Computational Intelligence, ICCSCI 2024
作者: Nazli, Nur Amielia Natasha Mohamad Sabri, Nurbaity Aminuddin, Raihah Ibrahim, Shafaf Yusof, Syafiq Nasir, Siti Diana Nabilah Mohd College of Computing Informatics & Mathematics MARA University of Technology Malacca Branch Jasin Campus Malacca77300 Malaysia Yus Industries Sdn Bhd Malaysia Faculty of Science and Engineering University of Hull Hull United Kingdom
The manufacturing and construction sectors report high rates of occupational accidents and diseases. In response, many countries, including Malaysia, have incorporated the use of Personal Protective Equipment (PPE) in... 详细信息
来源: 评论
Grasshopper Optimization Algorithm Based Spam Detection System Using Multi-Objective Wrapper Feature Selection and Neural Network Classification  2nd
Grasshopper Optimization Algorithm Based Spam Detection Syst...
收藏 引用
2nd International Conference on Emerging Technologies and Intelligent Systems, ICETIS 2022
作者: Ghaleb, Sanaa A. A. Mohamad, Mumtazimah Ghanem, Waheed A. H. M. Abdullahi, Akibu Mahmoud Nasser, Abdullah B. Saleh, Sami Abdulla Mohsen Arshad, Humaira Omolara, Abiodun Esther Abiodun, Oludare Isaac Ghetas, Mohamed Faculty of Informatics and Computing Universiti Sultan Zainal Abidin Terengganu Malaysia Faculty of Ocean Engineering Technology and Informatics Universiti Malaysia Terengganu Terengganu Malaysia Faculty of Education Saber University of Lahej Lahej Yemen Faculty of Engineering University of Aden Aden Yemen Faculty of Education Aden University of Aden Aden Yemen Faculty of Computing and Informatics Albukhary International University Kedah Malaysia School of Technology and Innovation University of Vaasa Vaasa Finland School of Electrical and Electronic Engineering Universiti Sains Malaysia Nilai Malaysia Department of Computer Science Islamia University of Bahawalpur Bahawalpur Pakistan Department of Computer Science University of Abuja Abuja Nigeria Department of Computer Science Bingham University Nasarawa Nigeria Faculty of Computer Science Nahda University New Beni Seuf City Egypt
Email classification is essential to the trouble of email and pattern recognition. Nowadays, a number of unsolicited messages are circulated over the internet. While plenty of machine learning techniques are a success... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Meta-heuristics for Feature Selection and Classification in Diagnostic Breast Cancer
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 749-765页
作者: Doaa Sami Khafaga Amel Ali Alhussan El-Sayed M.El-kenawy Ali E.Takieldeen Tarek M.Hassan Ehab A.Hegazy Elsayed Abdel Fattah Eid Abdelhameed Ibrahim Abdelaziz A.Abdelhamid Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Communications and Computers Engineering Department Faculty of EngineeringDelta University for Science and TechnologyInternational Coastal RoadGamasa CityDakhliyaEgypt Faculty of Applied Health Science Technology Delta University for Science and TechnologyMansoura35712Egypt Faculty of Medicine Head of Internal Medicine DepartmentDelta University for Science and TechnologyMansouraEgypt Computer Engineering and Control Systems Department Faculty of EngineeringMansoura University35516MansouraEgypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams University11566CairoEgypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia
One of the most common kinds of cancer is breast *** early detection of it may help lower its overall rates of *** this paper,we robustly propose a novel approach for detecting and classifying breast cancer regions in... 详细信息
来源: 评论
Data secure transmission intelligent prediction algorithm for mobile industrial IoT networks
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 400-410页
作者: Lingwei Xu Hao Yin Hong Jia Wenzhong Lin Xinpeng Zhou Yong Fu Xu Yu Department of Information Science and Technology Qingdao University of Science and TechnologyQingdao266061China Fujian Key Laboratory of Sensing and Computing for Smart Cities Xiamen UniversityXiamen361005China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control(Minjiang University) Fuzhou350121China Faculty of Information Science and Engineering Ocean University of ChinaQingdao266100China Shandong Provincial Key Laboratory of Computer Networks Shandong Computer Science Center(National Supercomputer Center in Jinan)JinanChina
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent *** mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnect... 详细信息
来源: 评论
Exploring the Effectiveness of Deep Learning in Audio Compression and Restoration  2
Exploring the Effectiveness of Deep Learning in Audio Compre...
收藏 引用
2nd IEEE International Conference on Trends in Quantum computing and Emerging Business Technologies, TQCEBT 2024
作者: Pushparani, S. Rekha, K. Sashi Sivagami, V.M. Usharani, R. Jothi, M. Meenakshi College of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Sri Venkateswara College of Engineering Department of Information Technology SriperumbudurTamil Nadu Chennai India Srm Institute of Science and Technology Faculty of Engineering and Technology Department of Computational Intelligence School of Computing Tamil Nadu Kattankulathur India Care College of Engineering Department of Artificial Intelligence & Data Science Tamil Nadu Trichy India
Modern audio processing requires compression and restoration for streaming services and data storage and transmission. This study examines how deep learning can address these difficulties and includes an architecture ... 详细信息
来源: 评论
Process Modelling and Experimental Analysis of Optimal Specimen Selection in Organic CMCs
收藏 引用
Computers, Materials & Continua 2022年 第2期70卷 2415-2433页
作者: P.V.Rajesh Kanak Kalita Xiao-Zhi Gao Faculty of Mechanical Engineering Saranathan College of EngineeringTrichy620012India Department of Mechanical Engineering Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and TechnologyChennai600062India School of Computing University of Eastern FinlandKuopioFI-70211Finland
Bone grafting is a surgical restructuring procedure of replacing broken bones and reconstructing missing bone pieces so that complex bone fractures can be repaired to avoid any serious health risk as well as permanent... 详细信息
来源: 评论
LI4 : Label-Infused Iterative Information Interacting based Fact Verification in Question-answering Dialogue  30
LI4 : Label-Infused Iterative Information Interacting based ...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Zhang, Xiaocheng Wang, Chang Zhao, Guoping Su, Xiaohong Faculty of Computing Harbin Institute of Technology Harbin China School of Computer Science Engineering South China University of Technology Guangzhou China Zhengzhou Esunny Information Technology Co. Ltd. Zhengzhou China
Fact verification constitutes a pivotal application in the effort to combat the dissemination of disinformation, a concern that has recently garnered considerable attention. However, previous studies in the field of f... 详细信息
来源: 评论