咨询与建议

限定检索结果

文献类型

  • 22,258 篇 会议
  • 14,038 篇 期刊文献
  • 457 册 图书

馆藏范围

  • 36,753 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,021 篇 工学
    • 12,645 篇 计算机科学与技术...
    • 10,142 篇 软件工程
    • 4,829 篇 信息与通信工程
    • 3,607 篇 电气工程
    • 3,507 篇 控制科学与工程
    • 3,219 篇 电子科学与技术(可...
    • 2,290 篇 生物工程
    • 1,993 篇 生物医学工程(可授...
    • 1,756 篇 机械工程
    • 1,587 篇 光学工程
    • 1,549 篇 化学工程与技术
    • 1,428 篇 仪器科学与技术
    • 1,421 篇 动力工程及工程热...
    • 1,095 篇 材料科学与工程(可...
    • 715 篇 交通运输工程
    • 704 篇 安全科学与工程
  • 13,635 篇 理学
    • 6,021 篇 数学
    • 5,629 篇 物理学
    • 2,690 篇 生物学
    • 1,905 篇 统计学(可授理学、...
    • 1,647 篇 化学
    • 1,432 篇 系统科学
  • 5,215 篇 管理学
    • 3,333 篇 管理科学与工程(可...
    • 2,030 篇 图书情报与档案管...
    • 1,633 篇 工商管理
  • 2,010 篇 医学
    • 1,687 篇 临床医学
    • 1,451 篇 基础医学(可授医学...
    • 921 篇 药学(可授医学、理...
    • 713 篇 公共卫生与预防医...
  • 851 篇 法学
    • 714 篇 社会学
  • 687 篇 经济学
  • 491 篇 农学
  • 408 篇 教育学
  • 117 篇 文学
  • 74 篇 军事学
  • 48 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 798 篇 deep learning
  • 793 篇 accuracy
  • 597 篇 machine learning
  • 588 篇 feature extracti...
  • 499 篇 training
  • 473 篇 internet of thin...
  • 472 篇 computational mo...
  • 459 篇 computer science
  • 451 篇 artificial intel...
  • 414 篇 support vector m...
  • 374 篇 optimization
  • 327 篇 predictive model...
  • 246 篇 data models
  • 242 篇 reliability
  • 237 篇 neural networks
  • 233 篇 convolutional ne...
  • 224 篇 real-time system...
  • 223 篇 covid-19
  • 218 篇 mathematical mod...
  • 217 篇 data mining

机构

  • 1,094 篇 cavendish labora...
  • 1,025 篇 department of ph...
  • 979 篇 physikalisches i...
  • 972 篇 oliver lodge lab...
  • 643 篇 infn laboratori ...
  • 623 篇 infn sezione di ...
  • 606 篇 infn sezione di ...
  • 603 篇 fakultät physik ...
  • 598 篇 infn sezione di ...
  • 567 篇 university of ch...
  • 558 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 538 篇 iccub universita...
  • 538 篇 department of ph...
  • 535 篇 school of physic...
  • 521 篇 imperial college...
  • 518 篇 nikhef national ...
  • 516 篇 h.h. wills physi...
  • 512 篇 stfc rutherford ...
  • 509 篇 school of physic...

作者

  • 266 篇 barter w.
  • 260 篇 a. gomes
  • 250 篇 beiter a.
  • 248 篇 c. alexa
  • 245 篇 j. m. izen
  • 242 篇 g. bella
  • 240 篇 j. strandberg
  • 239 篇 c. amelung
  • 237 篇 d. calvet
  • 237 篇 bellee v.
  • 234 篇 g. spigo
  • 233 篇 s. chen
  • 232 篇 bowcock t.j.v.
  • 232 篇 blake t.
  • 231 篇 f. siegert
  • 229 篇 brundu d.
  • 220 篇 betancourt c.
  • 218 篇 borsato m.
  • 218 篇 amato s.
  • 216 篇 boettcher t.

语言

  • 35,168 篇 英文
  • 1,201 篇 其他
  • 298 篇 中文
  • 72 篇 日文
  • 8 篇 德文
  • 8 篇 法文
  • 4 篇 土耳其文
  • 3 篇 荷兰文
  • 3 篇 斯洛文尼亚文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 泰文
检索条件"机构=Faculty of Engineering and Computer Technology"
36753 条 记 录,以下是4691-4700 订阅
排序:
Unit Commitment and Load Dispatch Problems Considering Inertial Response of Dispatchable Generators
Unit Commitment and Load Dispatch Problems Considering Inert...
收藏 引用
2022 IEEE Power and Energy Society General Meeting, PESGM 2022
作者: Shigenobu, Ryuto Ito, Yuhi Ito, Masakazu Takano, Hirotaka Orihara, Dai Goda, Tadahiro Taoka, Hisao University of Fukui Faculty of Engineering Dept. of Electrical Electronic and Computer Engineering Fukui Japan Gifu University Faculty of Engineering Dept. of Electrical Electronic and Computer Engineering Gifu Japan Fukushima Renewable Energy Institute Aist National Institute of Advanced Industrial Science and Technology Fukushima Japan
The growth in penetration of renewable energy sources leads to reduction in the number of grid-tied dis-patchable synchronous generators. Since the contributions of non-dispatchable, renewable energy-based generators ... 详细信息
来源: 评论
Multi-Scale Continuity-Aware Refinement Network for Weakly Supervised Video Anomaly Detection
Multi-Scale Continuity-Aware Refinement Network for Weakly S...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Gong, Yiling Wang, Chong Dai, Xinmiao Yu, Shenghao Xiang, Lehong Wu, Jiafei Ningbo University Faculty of Electrical Engineering and Computer Science China Loctek Ergonomic Technology Corporation China SenseTime Research China
In many previous work, weakly supervised video anomaly detection is formulated as a multiple instance learning (MIL) problem, which represents the video as a bag of multiple instances. However, most MIL-based framewor... 详细信息
来源: 评论
Improving Lithium-Ion Battery Life Prediction using CEEMDAN Decomposition and Machine Learning  5
Improving Lithium-Ion Battery Life Prediction using CEEMDAN ...
收藏 引用
5th International Symposium on computer engineering and Intelligent Communications, ISCEIC 2024
作者: Li, Xinxin Xie, Kun An, Ziliang Zuo, Yiwen School of Rail Transportation Shanghai Institute of Technology Shanghai China Shanghai Urban Construction Vocational College Faculty of Urban Operations and Management Shanghai China School of computer and Information Engineering Shanghai Polytechnic University Shanghai China
The remaining useful life (RUL) of lithium-ion batteries is a key indicator for the optimal design of battery management systems and ensuring equipment safety. Most existing RUL prediction methods retain only the tren... 详细信息
来源: 评论
Visual Quality Inspection of Rotors and Stators  5
Visual Quality Inspection of Rotors and Stators
收藏 引用
5th IEEE International Conference on Smart Systems and Technologies, SST 2022
作者: Rekić, Tomislav Beissmann, Ian Ćebo, Aldin Novoselnik, Filip Protostar Labs Ltd Belišce Croatia Faculty of Electrical Engineering Computer Science and Information Technology Osijek Osijek Croatia
Automated visual quality inspection using machine vision is now widely used to reduce wastage and ensure better quality of products. Numerous algorithms using computer vision were made to solve specific issues in the ... 详细信息
来源: 评论
Crowd-Counting of Images in Rainy Weather Based on GAN-U-Net Model and Multi-column CNN Counting Approaches  3
Crowd-Counting of Images in Rainy Weather Based on GAN-U-Net...
收藏 引用
3rd IEEE International Conference on Electronic engineering, ICEEM 2023
作者: Saad, Rasha A. Abd El-Samie, Fathi E. Abdel-Azim, Mohammed El-Hoseny, Heba M. Obour Higher Institute for Engineering and Technology Department of Electronics and Electrical Communications Egypt Menoufia University Faculty of Electronic Engineering Department of Electronics and Electrical Communications Egypt Mansoura University Faculty of Engineering Department of Electronics and Electrical Communications Egypt The Higher Future Institute for Specialized Technological Studies Department of Computer Science Egypt
A count of crowds tries to determine the total number of persons in crowded places in order to avoid disruption of the safety system and maintain crowd safety. Accurate estimation of the size of crowds is a challengin... 详细信息
来源: 评论
A routing method with the approach of reducing energy consumption in WSNs with the Jellyfish Search (JS) optimizer algorithm and unequal clustering
A routing method with the approach of reducing energy consum...
收藏 引用
International eConference on computer and Knowledge engineering (ICCKE)
作者: Ehsan Gholami Javad Hamidzadeh Faculty of Computer Engineering and Information Technology Sadjad University Mashhad Iran
Wireless sensor networks are among the most common communication tools used in military and civilian fields. These networks consist of many tiny devices called sensor nodes. Each node has processing capability and dif...
来源: 评论
A Real-Time Obstacle Detection and Classification System for Assisting Blind and Visually Impaired People Based on Yolo Model  5
A Real-Time Obstacle Detection and Classification System for...
收藏 引用
5th International Conference on Information and Communication technology for Development for Africa, ICT4DA 2023
作者: Erdaw, Helawe Behailu Taye, Yesuneh Getachew Lemma, Dereje Teferi Bahir Dar Institute of Technology Bahir Dar University Faculty of Computing Bahir Dar Ethiopia Bahir Dar Institute of Technology Bahir Dar University Faculty of Electrical and Computer Engineering Bahir Dar Ethiopia Addis Ababa University Department of Information Science Addis Ababa Ethiopia
computer vision is one of the state-of-The-Art technologies for object detection problems. Accurate detection of obstacles could assist blind and visually impaired people to n avigate safely while they walk. However, ... 详细信息
来源: 评论
A Comparative Analysis of SMS Spam Detection employing Machine Learning Methods  6
A Comparative Analysis of SMS Spam Detection employing Machi...
收藏 引用
6th International Conference on Computing Methodologies and Communication, ICCMC 2022
作者: Aliza, Humaira Yasmin Nagary, Kazi Aahala Ahmed, Eshtiak Puspita, Kazi Mumtahina Rimi, Khadiza Akter Khater, Ankit Faisal, Fahad Daffodil International University Department of Computer Science and Engineering Dhaka Bangladesh Tampere University Faculty of Information Technology and Communication Sciences Tampere Finland Jadavpur University Department of Computer Science and Engineering India
In recent times, the increment of mobile phone usage has resulted in a huge number of spam messages. Spammers continuously apply more and more new tricks that cause managing or preventing spam messages a challenging t... 详细信息
来源: 评论
Surveillance and Intruder Detection using Pyramid Vision Transformer You Only Look Once Enhanced with Gradient Weighted Class Activation Mapping  4
Surveillance and Intruder Detection using Pyramid Vision Tra...
收藏 引用
4th IEEE International Conference on Mobile Networks and Wireless Communications, ICMNWC 2024
作者: Arunachalam, Sripriya Almusawi, Muntather Rafikiran, Shaik. Sivagami, S. Praveena, Hirald Dwaraka Srm Institute of Science and Technology Faculty of Science and Humanities Department of Computer Science and Applications Vadapalani City Campus Chennai India College of Technical Engineering The Islamic University of Al Diwaniyah Department of Computers Techniques Engineering Al Diwaniyah Iraq Sri Venkateswara College of Engineering Department of Electrical & Electronics Engineering Tirupati India New Prince Shri Bhavani College of Engineering and Technology Department of Chemistry Chennai India Department of Electronics and Communication Engineering Tirupati India
In this era, wireless networks are economically feasible and flexible to establish in healthcare, defense, surveillance, and traffic monitoring, fire detection. Effective intruder detection systems utilize advanced te... 详细信息
来源: 评论
Efficient Data Compression on Healthcare Images Using Improved Hadamard Transform Based Filter
Efficient Data Compression on Healthcare Images Using Impro...
收藏 引用
International Conference on Intelligent Systems and Networks, ICISN 2024
作者: Thi, Thu Nguyen Haridoss, G. Rubia, Jency Dilipkumar, S. Chowdhury, Subrata Nguyen, Anh Phuong Duc, Tan Tran Faculty of Electronic Engineering Hanoi University of Industry Hanoi10000 Viet Nam Department of Electronics and Communication Engineering M.A.M College of Engineering and Technology Tiruchirappalli India Department of Electronics and Communication Engineering Vel Tech University Chennai India Department of Analytics SCOPE Vit Vellore Vellore India Department of Computer Sciences and Engineering Sreenivasa Institute of Technology and Management Studies AP Chittoor India Foreign Language Specialized School University of Languages and International Studies Hanoi Viet Nam Faculty of Electrical and Electronic Engineering Phenikaa University Hanoi Viet Nam
The Hadamard transform is an ancient method for efficient data compression, especially for medical image data. Thus, the proposed work consists of analyzing the filter performance using a novel Hadamard transform to a... 详细信息
来源: 评论