咨询与建议

限定检索结果

文献类型

  • 9,293 篇 会议
  • 5,798 篇 期刊文献
  • 296 册 图书

馆藏范围

  • 15,387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,802 篇 工学
    • 6,066 篇 计算机科学与技术...
    • 4,945 篇 软件工程
    • 2,045 篇 信息与通信工程
    • 1,279 篇 控制科学与工程
    • 1,202 篇 生物工程
    • 1,194 篇 生物医学工程(可授...
    • 954 篇 电气工程
    • 856 篇 电子科学与技术(可...
    • 766 篇 光学工程
    • 565 篇 机械工程
    • 491 篇 仪器科学与技术
    • 387 篇 化学工程与技术
    • 360 篇 动力工程及工程热...
    • 310 篇 安全科学与工程
    • 265 篇 交通运输工程
    • 258 篇 建筑学
  • 5,597 篇 理学
    • 2,617 篇 数学
    • 1,908 篇 物理学
    • 1,387 篇 生物学
    • 864 篇 统计学(可授理学、...
    • 604 篇 系统科学
    • 439 篇 化学
  • 2,354 篇 管理学
    • 1,354 篇 管理科学与工程(可...
    • 1,102 篇 图书情报与档案管...
    • 743 篇 工商管理
  • 1,162 篇 医学
    • 994 篇 临床医学
    • 889 篇 基础医学(可授医学...
    • 580 篇 药学(可授医学、理...
    • 409 篇 公共卫生与预防医...
  • 406 篇 法学
    • 345 篇 社会学
  • 250 篇 经济学
  • 218 篇 教育学
  • 211 篇 农学
  • 51 篇 文学
  • 21 篇 军事学
  • 21 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 477 篇 informatics
  • 250 篇 computational mo...
  • 214 篇 computer archite...
  • 212 篇 deep learning
  • 198 篇 machine learning
  • 187 篇 computer science
  • 182 篇 data mining
  • 160 篇 artificial intel...
  • 157 篇 image segmentati...
  • 157 篇 optimization
  • 153 篇 internet of thin...
  • 141 篇 feature extracti...
  • 139 篇 quality of servi...
  • 131 篇 wireless sensor ...
  • 127 篇 support vector m...
  • 127 篇 resource managem...
  • 125 篇 neural networks
  • 125 篇 bandwidth
  • 123 篇 monitoring
  • 122 篇 accuracy

机构

  • 411 篇 department for p...
  • 404 篇 faculty of scien...
  • 401 篇 department of ph...
  • 393 篇 kirchhoff-instit...
  • 385 篇 department of ph...
  • 384 篇 department of ph...
  • 358 篇 fakultät für phy...
  • 339 篇 institute of phy...
  • 329 篇 institute of phy...
  • 305 篇 department of ph...
  • 280 篇 department of ph...
  • 273 篇 instituto de fís...
  • 268 篇 graduate school ...
  • 268 篇 universidade fed...
  • 267 篇 department of ph...
  • 264 篇 ictp trieste
  • 254 篇 yerevan physics ...
  • 252 篇 department of ph...
  • 248 篇 department of ph...
  • 246 篇 nikhef national ...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 331 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 324 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 317 篇 s. mohapatra
  • 305 篇 s. guindon
  • 299 篇 y. tayalati
  • 299 篇 a. kaczmarska
  • 283 篇 m. klein
  • 281 篇 j. schaarschmidt
  • 267 篇 a. d. pilkington
  • 259 篇 f. pastore

语言

  • 14,571 篇 英文
  • 710 篇 其他
  • 98 篇 中文
  • 13 篇 日文
  • 4 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 爱沙尼亚文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Informatics and Computer Engineering Department"
15387 条 记 录,以下是4421-4430 订阅
排序:
Pedometers for Smartphones: Analysis and Comparison of Real-Time Algorithms
Pedometers for Smartphones: Analysis and Comparison of Real-...
收藏 引用
IEEE World Forum on Internet of Things (WF-IoT)
作者: Giacomo Neri Federico Montori Lorenzo Gigli Luca Bedogni Marco Di Felice Luciano Bononi Department of Computer Science and Engineering University of Bologna Italy Advanced Research Center in Electronic Systems University of Bologna Italy Department of Physics Informatics and Mathematics University of Modena and Reggio Emilia Italy
The recent years have witnessed the rise of an enormous number of software algorithms that implement pe-dometers (or step counters), which led to the development of several context-aware IoT-based smartphone apps for ...
来源: 评论
Comparative Analysis of Network Congestion on IP and Named Data Network
Comparative Analysis of Network Congestion on IP and Named D...
收藏 引用
International Conference on Telecommunication Systems, Services, and Applications (TSSA)
作者: Hasan Nur Arifin Nana Rachmana Syambas Jupriyadi Adi Sucipto Eki Ahmad Zaki Hamidi School of Electrical and Informatics Engineering Institut Teknologi Bandung Bandung Indonesia Faculty of Engineering and Computer Science Universitas Teknokrat Indonesia Bandarlampung Indonesia Electrical Engineering Department UIN Sunan Gunung Djati Bandung Bandung Indonesia
Today's data communication needs have shifted from client-server data communication to peer-to-peer. The user's focus is currently on the immediately requested data or the so-called Named Data Network (NDN). C... 详细信息
来源: 评论
Vehicular Ad-hoc Network (VANET) – A Review
Vehicular Ad-hoc Network (VANET) – A Review
收藏 引用
Communication and Information Technologies (IICCIT), Iraqi International Conference on
作者: Ahmed Ghassan Hameed Mahmoud Shuker Mahmoud Computer Sciences Department of Informatics Institute for Postgraduate Studies Al-Khawarizmi College of Engineering University of Baghdad Baghdad Iraq Al-Mansour University College Baghdad Iraq
This paper explores VANET topics: architecture, characteristics, security, routing protocols, applications, simulators, and 5G integration. We update, edit, and summarize some of the published data as we analyze each ... 详细信息
来源: 评论
Seeking the Necessary and Sufficient Causal Features in Multimodal Representation Learning
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Boyu Liu, Junjie Li, Zhu Yang, Mengyue Institute of Health Informatics University College London United Kingdom Department of Aeronautics Imperial College London United Kingdom Gatsby Computational Neuroscience Unit University College London United Kingdom Department of Computer Science University College London United Kingdom School of Engineering Mathematics and Technology University of Bristol United Kingdom
Probability of necessity and sufficiency (PNS) measures the likelihood of a feature set being both necessary and sufficient for predicting an outcome. It has proven effective in guiding representation learning for uni... 详细信息
来源: 评论
By Machine Learning Techniques Predicting Post-COVID-19 Condition
By Machine Learning Techniques Predicting Post-COVID-19 Cond...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Pei-Rong Huang Chih-Hung Chang Wen-Ching Chen Che-Lun Hung Po-Yu Liu Ting-Kuang Yeh Hsiu-Wen Wang Yu-Chun Yen William Cheng-Chung Chu Dept. of Computer Science and Communication Engineering Providence University Taiwan Institute of Biomedical Informatics National Yang Ming Chiao Tung University Taiwan Division of Infectious Diseases Taichung Veterans General Hospital Taiwan Clinical Information Department Quality Management Center Taichung Veterans General Hospital Dept. of Computer Science Tunghai University Taiwan
As the COVID-19 pandemic continues, a growing number of recovered patients report persistent symptoms such as fatigue, muscle weakness, sleep issues, anxiety, and depression, lasting months or even over a year. Severe... 详细信息
来源: 评论
Identification of Images in Mechatronics through a Neural Network
Identification of Images in Mechatronics through a Neural Ne...
收藏 引用
2020 International Multi-Conference on Industrial engineering and Modern Technologies, FarEastCon 2020
作者: Soldatov, G. Ruchkin, V. Solovev, Denis B. Ryazan State University Department of Informatics Computer Engineering and Informatics Teaching Methods Ryazan Russia Vladivostok Branch of Russian Customs Academy City of Vladivostok Russia
The article is a continuation of the study of the use of neural networks and image identification for work in industries using conveyor means for transporting and sorting goods. Optimization of production, namely the ... 详细信息
来源: 评论
Theoretical and Numerical Investigation of Acoustic Cavitation Bubble Based on the Impact of Ultrasound Frequency
收藏 引用
Bulletin of the Russian Academy of Sciences: Physics 2023年 第Suppl 3期87卷 S341-S347页
作者: Ahmed K. Abu-Nab Abu-Bakr, Ali F. Zain Abu Shaeer Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom32511 Egypt Phystech School of Applied Mathematics and Informatics Moscow Institute of Physics and Technology Moscow oblast Dolgoprudny141700 Russia Department of Basic Science Higher Institute of Engineering and Technology Kafr El Sheikh33511 Egypt
Abstract: Acoustic cavitation is the expansion and contraction of existing microbubbles in liquids brought on by an ultrasonic field. The dynamics of oscillations at higher pressures and temperatures when the cavitati... 详细信息
来源: 评论
3D Modeling Surveying Tasks in Photogrammetry
3D Modeling Surveying Tasks in Photogrammetry
收藏 引用
2020 International Russian Automation Conference, RusAutoCon 2020
作者: Izvozchikova, V.V. Shardakov, V.M. Mezhenin, A.V. Orenburg State University Department of Informatics Orenburg Russia Itmo University Faculty of Software Engineering and Computer Engineering Saint-Petersburg Russia
The research is aimed at the development of virtual environments of various configurations created by means of 3D computer modeling in such areas as photogrammetry, computer vision systems, robotics at the design stag... 详细信息
来源: 评论
Detection of Railroad Anomalies using Machine Learning Approach  8
Detection of Railroad Anomalies using Machine Learning Appro...
收藏 引用
8th International Conference on ICT for Smart Society, ICISS 2021
作者: Nugraha, Ade Chandra Supangkat, Suhono Harso Nugraha, Igb Baskara Trimadi, Harno Purwadinata, Awan Hermawan Sumarni Sundari, Santi School of Electrical Engineering and Informatics Bandung Institute of Technology Department of Computer Engineering and Informatics Bandung State of Polytechnic Bandung Indonesia Smart City and Community Innovation Center Bandung Institute of Technology Bandung Indonesia Director of Railway Infrastructure Directorate of Railway Infrastructure Ministry of Transportation Jakarta Indonesia PT Kereta Api Indonesia Managing Director of Infrastructure Bandung Indonesia
Maintenance of assets owned by an organization or company is an activity that will never stop. From the time of implementation, maintenance will be more optimal if it is carried out before the asset is in a damaged co... 详细信息
来源: 评论
Strategic Signaling for Utility Control in Audit Games
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Jianan Hu, Qin Jiang, Honglu The Department of Computer and Information Science Indiana University Purdue University IndianapolisIN United States The Department of Informatics and Engineering Systems The University of Texas Rio Grande Valley BrownsvilleTX United States
As an effective method to protect the daily access to sensitive data against malicious attacks, the audit mechanism has been widely deployed in various practical fields. In order to examine security vulnerabilities an... 详细信息
来源: 评论