咨询与建议

限定检索结果

文献类型

  • 30,355 篇 会议
  • 18,622 篇 期刊文献
  • 635 册 图书

馆藏范围

  • 49,612 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28,395 篇 工学
    • 17,856 篇 计算机科学与技术...
    • 14,502 篇 软件工程
    • 6,056 篇 信息与通信工程
    • 4,655 篇 控制科学与工程
    • 4,201 篇 电气工程
    • 3,711 篇 电子科学与技术(可...
    • 3,210 篇 生物工程
    • 2,813 篇 生物医学工程(可授...
    • 2,240 篇 机械工程
    • 2,085 篇 光学工程
    • 1,963 篇 化学工程与技术
    • 1,800 篇 仪器科学与技术
    • 1,737 篇 动力工程及工程热...
    • 1,335 篇 材料科学与工程(可...
    • 961 篇 安全科学与工程
    • 944 篇 交通运输工程
  • 18,204 篇 理学
    • 8,501 篇 数学
    • 6,821 篇 物理学
    • 3,787 篇 生物学
    • 2,678 篇 统计学(可授理学、...
    • 2,061 篇 化学
    • 2,000 篇 系统科学
  • 7,202 篇 管理学
    • 4,472 篇 管理科学与工程(可...
    • 2,986 篇 图书情报与档案管...
    • 2,265 篇 工商管理
  • 2,790 篇 医学
    • 2,375 篇 临床医学
    • 2,055 篇 基础医学(可授医学...
    • 1,296 篇 药学(可授医学、理...
    • 1,000 篇 公共卫生与预防医...
  • 1,188 篇 法学
    • 996 篇 社会学
  • 879 篇 经济学
  • 662 篇 农学
  • 633 篇 教育学
  • 145 篇 文学
  • 91 篇 军事学
  • 65 篇 艺术学
  • 9 篇 哲学
  • 6 篇 历史学

主题

  • 1,290 篇 computer science
  • 938 篇 accuracy
  • 935 篇 deep learning
  • 841 篇 machine learning
  • 771 篇 computational mo...
  • 754 篇 feature extracti...
  • 716 篇 training
  • 624 篇 artificial intel...
  • 581 篇 internet of thin...
  • 524 篇 optimization
  • 513 篇 support vector m...
  • 415 篇 predictive model...
  • 402 篇 neural networks
  • 388 篇 data mining
  • 371 篇 data models
  • 354 篇 mathematical mod...
  • 325 篇 convolutional ne...
  • 313 篇 testing
  • 300 篇 monitoring
  • 300 篇 real-time system...

机构

  • 1,094 篇 cavendish labora...
  • 1,024 篇 department of ph...
  • 981 篇 physikalisches i...
  • 972 篇 oliver lodge lab...
  • 647 篇 infn laboratori ...
  • 624 篇 infn sezione di ...
  • 604 篇 infn sezione di ...
  • 604 篇 infn sezione di ...
  • 601 篇 fakultät physik ...
  • 567 篇 university of ch...
  • 555 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 538 篇 department of ph...
  • 535 篇 school of physic...
  • 530 篇 iccub universita...
  • 522 篇 imperial college...
  • 518 篇 nikhef national ...
  • 516 篇 h.h. wills physi...
  • 512 篇 stfc rutherford ...
  • 509 篇 school of physic...

作者

  • 264 篇 barter w.
  • 261 篇 a. gomes
  • 250 篇 beiter a.
  • 249 篇 c. alexa
  • 247 篇 j. m. izen
  • 243 篇 g. bella
  • 242 篇 j. strandberg
  • 240 篇 c. amelung
  • 238 篇 d. calvet
  • 237 篇 bellee v.
  • 236 篇 g. spigo
  • 236 篇 s. chen
  • 231 篇 bowcock t.j.v.
  • 230 篇 f. siegert
  • 228 篇 brundu d.
  • 227 篇 blake t.
  • 218 篇 y. tayalati
  • 218 篇 amato s.
  • 217 篇 betancourt c.
  • 216 篇 r. ströhmer

语言

  • 47,518 篇 英文
  • 1,628 篇 其他
  • 345 篇 中文
  • 109 篇 日文
  • 14 篇 德文
  • 11 篇 法文
  • 3 篇 荷兰文
  • 3 篇 俄文
  • 3 篇 斯洛文尼亚文
  • 2 篇 葡萄牙文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 泰文
检索条件"机构=Faculty of Engineering and Computer Science"
49612 条 记 录,以下是4961-4970 订阅
排序:
Development of software for design ontological representations of production technologies  12
Development of software for design ontological representatio...
收藏 引用
12th International Scientific and Practical Conference on Environment. Technology. Resources
作者: Andreev, Dmitry Lyokhin, Sergey Nikolaev, Victor Poletaeva, Olga Faculty of Computer Science and Electrical Power Engineering Pskov State University Pskov Russia
The features of the progressive methodological basis for the construction of formalized descriptions of technologies for their subsequent analysis are discussed. The existing possibilities of ontological knowledge eng... 详细信息
来源: 评论
Automation of hob design
Automation of hob design
收藏 引用
World Congress on Software engineering
作者: Nieszporek, Tadeusz Piotrowski, Andrzej Czestochowa University of Technology Faculty of Mechanical Engineering and Computer Science Czȩstochowa Poland
Hobs are used for making cylindrical gears by the hobbing method. Their construction and technology are complex, and their accuracy directly influences the accuracy of gears being machined. The developed program is in... 详细信息
来源: 评论
Enhancing Image Security with Rossler Attractor-Based Encryption  2
Enhancing Image Security with Rossler Attractor-Based Encryp...
收藏 引用
2nd International Conference on Cyber Resilience, ICCR 2024
作者: Al-Najjar, Hazem Al-Rousan, Nadia University Of Petra Faculty Of Information Technology Department Of Computer Science Amman Jordan German Jordanian University Faculty Of Electrical Engineering And Information Systems Department Of Computer Engineering Jordan
we introduced image encryption algorithms with high sensitivity, such that even a single alteration in a plain-text image would result in a complete transformation of the ciphered image. The first algorithm employed p... 详细信息
来源: 评论
Simulation and Optimization of Axial Two-Dimensional SQUID Gradiometer
Simulation and Optimization of Axial Two-Dimensional SQUID G...
收藏 引用
2023 IEEE International Conference on Applied Superconductivity and Electromagnetic Devices, ASEMD 2023
作者: Wu, Wenqi Zhang, Zhidan Li, Shuxiang Xu, Zihan Kong, Xiangyan Ningbo China Ningbo University Faculty of Electrical Engineering and Computer Science Ningbo China
Superconducting QUantum Interference Device (SQUID) axial gradiometer can replace magnetic shielding rooms (MSRs) for environmental noise suppression as a way to improve the signal-to-noise ratio (SNR) in weak magneti... 详细信息
来源: 评论
The method of automated building of domain ontology  12
The method of automated building of domain ontology
收藏 引用
12th International Scientific and Practical Conference on Environment. Technology. Resources
作者: Antonov, Igor Bruttan, Iuliia Andreev, Dmitry Motaylenko, Lilia Faculty of Computer Science and Electrical Power Engineering Pskov State University Pskov Russia
This article is devoted to the tasks of automating the construction of domain ontologies. In the beginning, the limitations and problems of constructing the ontology of the domain using the well-known methods are disc... 详细信息
来源: 评论
An improved message capacity and security using divide and modulus function in spatial domain steganography  1
An improved message capacity and security using divide and m...
收藏 引用
1st International Conference on Information and Communications Technology, ICOIACT 2018
作者: Setiadi, De Rosal Ignatius Moses Santoso, Heru Agus Rachmawanto, Eko Hari Sari, Christy Atika Department of Informatics Engineering Computer Science Faculty Dian Nuswantoro University Semarang Indonesia
Image Steganography is a technique for hiding messages into digital images, so messages cannot be perceived by the human senses. The two most important aspects of steganography techniques are the payload capacity and ... 详细信息
来源: 评论
DDoS Attack Detection and Mitigation in Software-Defined Networking-Based 5G Mobile Networks with Multiple Controllers  9
DDoS Attack Detection and Mitigation in Software-Defined Net...
收藏 引用
9th International Conference on Future Internet of Things and Cloud, FiCloud 2022
作者: Sheibani, Morteza Konur, Savas Awan, Irfan University of Bradford Faculty of Engineering and Informatics Department of Computer Science Bradford United Kingdom
The increased risk of Distributed Denial-of Service (DDoS) attacks is one of the crucial security issues for 5G networks. Software defined networking (SDN) is one of the key solutions for the centralised control of ne... 详细信息
来源: 评论
GPR Acquisition Methods Comparison  16
GPR Acquisition Methods Comparison
收藏 引用
16th International Conference on Advanced Technologies, Systems and Services in Telecommunications, TELSIKS 2023
作者: Gleich, Dusan Vovk, Marko Smogavec, Primoz Kafedziski, Venceslav Doncov, Nebojsa Faculty of Electrical Engineering and Computer Science Maribor Slovenia Faculty of Electrical Engineering and Information Technologies 1000 Macedonia University of Nis Faculty of Electronic Engineering Nis18000 Serbia
This paper presents a study for subsurface object detection using different scanning acquisition paths. The air coupled system is considered, which can be easily attached to the unnamed aerial vehicle (UAV). The objec... 详细信息
来源: 评论
Bearing only mobile robots' localization: Observability and formulation using SIS particle filters
Bearing only mobile robots' localization: Observability and ...
收藏 引用
2011 International Conference on Communications, Computing and Control Applications, CCCA 2011
作者: Hossein Mirabdollah, M. Mertsching, Baerbel Faculty of Electrical Engineering Mathematics and Computer Science University of Paderborn Paderborn 33098 Germany
In this paper the localization problem of mobile robots using bearing only measurement which is mostly used for mono vision robot, is investigated. Firstly the observability of the problem is discussed and then the po... 详细信息
来源: 评论
computer-related attributions: An intercultural comparison
Computer-related attributions: An intercultural comparison
收藏 引用
International Conference on The Human Side of Service engineering, 2016
作者: Janneck, Monique Xiao, Jianqing Niels, Adelka Faculty of Electrical Engineering and Computer Science Luebeck University of Applied Sciences Luebeck Germany
Attribution theory deals with the causal explanations people find for things happening around them, and also with the extent of control people feel they have over external events. When applied to computer use, specifi... 详细信息
来源: 评论