咨询与建议

限定检索结果

文献类型

  • 112,054 篇 会议
  • 53,002 篇 期刊文献
  • 1,544 册 图书

馆藏范围

  • 166,600 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 96,756 篇 工学
    • 63,200 篇 计算机科学与技术...
    • 51,332 篇 软件工程
    • 23,317 篇 信息与通信工程
    • 15,454 篇 控制科学与工程
    • 13,893 篇 电气工程
    • 13,493 篇 电子科学与技术(可...
    • 11,738 篇 生物工程
    • 9,537 篇 生物医学工程(可授...
    • 9,079 篇 光学工程
    • 6,725 篇 机械工程
    • 6,385 篇 化学工程与技术
    • 5,543 篇 仪器科学与技术
    • 5,436 篇 材料科学与工程(可...
    • 5,350 篇 动力工程及工程热...
    • 4,098 篇 网络空间安全
    • 3,877 篇 安全科学与工程
  • 58,053 篇 理学
    • 26,786 篇 数学
    • 21,236 篇 物理学
    • 13,462 篇 生物学
    • 8,952 篇 统计学(可授理学、...
    • 7,167 篇 化学
    • 5,988 篇 系统科学
  • 24,210 篇 管理学
    • 14,972 篇 管理科学与工程(可...
    • 10,296 篇 图书情报与档案管...
    • 7,045 篇 工商管理
  • 9,473 篇 医学
    • 7,864 篇 临床医学
    • 7,074 篇 基础医学(可授医学...
    • 4,427 篇 药学(可授医学、理...
    • 3,911 篇 公共卫生与预防医...
  • 4,509 篇 法学
    • 3,723 篇 社会学
  • 2,798 篇 经济学
  • 2,640 篇 农学
  • 1,489 篇 教育学
  • 674 篇 文学
  • 371 篇 军事学
  • 193 篇 艺术学
  • 23 篇 哲学
  • 13 篇 历史学

主题

  • 5,499 篇 accuracy
  • 4,893 篇 computer science
  • 4,433 篇 deep learning
  • 4,102 篇 feature extracti...
  • 3,792 篇 computational mo...
  • 3,715 篇 machine learning
  • 3,428 篇 training
  • 2,740 篇 convolutional ne...
  • 2,574 篇 real-time system...
  • 2,565 篇 predictive model...
  • 2,538 篇 support vector m...
  • 2,196 篇 internet of thin...
  • 2,034 篇 artificial intel...
  • 2,032 篇 optimization
  • 1,909 篇 data models
  • 1,870 篇 neural networks
  • 1,704 篇 data mining
  • 1,576 篇 security
  • 1,563 篇 computer archite...
  • 1,497 篇 wireless sensor ...

机构

  • 2,177 篇 chitkara univers...
  • 1,085 篇 cavendish labora...
  • 1,037 篇 university of ch...
  • 1,009 篇 department of ph...
  • 957 篇 physikalisches i...
  • 945 篇 oliver lodge lab...
  • 598 篇 infn sezione di ...
  • 585 篇 infn laboratori ...
  • 573 篇 infn sezione di ...
  • 546 篇 infn sezione di ...
  • 545 篇 department of el...
  • 535 篇 fakultät physik ...
  • 534 篇 horia hulubei na...
  • 532 篇 school of physic...
  • 517 篇 school of comput...
  • 517 篇 department of ph...
  • 516 篇 school of physic...
  • 511 篇 h.h. wills physi...
  • 509 篇 imperial college...
  • 495 篇 institute of inf...

作者

  • 260 篇 barter w.
  • 250 篇 a. gomes
  • 241 篇 c. alexa
  • 239 篇 j. m. izen
  • 234 篇 j. wang
  • 234 篇 s. chen
  • 233 篇 blake t.
  • 231 篇 c. amelung
  • 230 篇 g. bella
  • 230 篇 j. strandberg
  • 230 篇 d. calvet
  • 226 篇 bellee v.
  • 225 篇 beiter a.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 221 篇 boettcher t.
  • 220 篇 borsato m.
  • 219 篇 bowcock t.j.v.
  • 218 篇 brundu d.
  • 213 篇 bencivenni g.

语言

  • 142,854 篇 英文
  • 21,964 篇 其他
  • 1,886 篇 中文
  • 153 篇 日文
  • 35 篇 德文
  • 22 篇 法文
  • 22 篇 朝鲜文
  • 16 篇 斯洛文尼亚文
  • 4 篇 阿拉伯文
  • 3 篇 荷兰文
  • 3 篇 俄文
  • 2 篇 波兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
检索条件"机构=Institute of Computer Aided Engineering and Computer Science"
166600 条 记 录,以下是111-120 订阅
排序:
Seizure Prediction on EEG Signals using Feature Augmentation based Multi Model Ensemble
收藏 引用
Recent Patents on engineering 2025年 第1期19卷 41-49页
作者: Anandaraj, A. Alphonse, P.J.A. Department of Computer Science and Engineering Sri Eshwar College of Engineering Coimbatore India Department of Computer Applications National Institute of Technology Tamilnadu Tiruchirappalli India
Background: Epilepsy is a neurological disorder that leads to seizures. This occurs due to excessive electrical discharge by the brain cells. An effective seizure prediction model can aid in improving the lifestyle of... 详细信息
来源: 评论
ER-Net:Efficient Recalibration Network for Multi-ViewMulti-Person 3D Pose Estimation
收藏 引用
computer Modeling in engineering & sciences 2023年 第8期136卷 2093-2109页
作者: Mi Zhou Rui Liu Pengfei Yi Dongsheng Zhou National and Local Joint Engineering Laboratory of Computer Aided Design School of Software EngineeringDalian UniversityDalian116622China School of Computer Science and Technology Dalian University of TechnologyDalian116024China
Multi-view multi-person 3D human pose estimation is a hot topic in the field of human pose estimation due to its wide range of application *** the introduction of end-to-end direct regression methods,the field has ent... 详细信息
来源: 评论
Dual modality prompt learning for visual question-grounded answering in robotic surgery
收藏 引用
Visual Computing for Industry,Biomedicine,and Art 2024年 第1期7卷 316-328页
作者: Yue Zhang Wanshu Fan Peixi Peng Xin Yang Dongsheng Zhou Xiaopeng Wei National and Local Joint Engineering Laboratory of Computer Aided Design School of Software EngineeringDalian UniversityDalian 116622LiaoningChina School of Computer Science and Technology Dalian University of TechnologyDalian 116081LiaoningChina
With recent advancements in robotic surgery,notable strides have been made in visual question answering(VQA).Existing VQA systems typically generate textual answers to questions but fail to indicate the location of th... 详细信息
来源: 评论
Building a Robust and Efficient Defensive System Using Hybrid Adversarial Attack
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第9期5卷 4470-4478页
作者: Dhanaraj, Rachel Selva Sridevi, M. Goa College of Engineering Computer Engineering Department Goa 403401 India National Institute of Technology Department of Computer Science and Engineering Tiruchirappalli620015 India
Adversarial attack is a method used to deceive machine learning models, which offers a technique to test the robustness of the given model, and it is vital to balance robustness with accuracy. Artificial intelligence ... 详细信息
来源: 评论
Secure vehicular data communication in Named Data Networking
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 203-210页
作者: Xiaonan Wang Xilan Chen Xingwei Wang School of Computer Science and Engineering Changshu Institute of TechnologyChangshu215500China School of Computer Science and Technology Northeastern UniversityShenyang110169China
Vehicular data misuse may lead to traffic accidents and even loss of life,so it is crucial to achieve secure vehicular data *** paper focuses on secure vehicular data communications in the Named Data Networking(NDN).I... 详细信息
来源: 评论
A State-Migration Particle Swarm Optimizer for Adaptive Latent Factor Analysis of High-Dimensional and Incomplete Data
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2220-2235页
作者: Jiufang Chen Kechen Liu Xin Luo Ye Yuan Khaled Sedraoui Yusuf Al-Turki MengChu Zhou IEEE the College of Computer Science and Technology Chongqing University of Posts and Telecommunications the Department of Computer Science Columbia University the College of Computer and Information Science Southwest University the Department of Electrical and Computer Engineering Faculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Center of Research Excellence in Renewable Energy and Power Systems the Department of Electrical and Computer EngineeringFaculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Department of Electrical and Computer Engineering New Jersey Institute of Technology
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation lear... 详细信息
来源: 评论
Monitoring COVID-19 environment: a real-time facial mask detection using YOLO models
收藏 引用
Research on Biomedical engineering 2025年 第1期41卷 1-18页
作者: Pandiyan, P. Thangaraj, Rajasekaran V, Balasubramanian V. K, Manavalasundaram S, Balakrishnan Department of Electrical and Electronics Engineering KPR Institute of Engineering and Technology Coimbatore India Department of Computer Science and Engineering Nandha Engineering College Erode India Department of Information Technology Velalar College of Engineering and Technology Erode India Department of Computer Science and Engineering Aarupadai Veedu Institute of Technology Chennai India Department of Computer Science and Engineering Sri Ramakrishna Institute of Technology Coimbatore India
Purpose: The rapid spread of COVID-19 has resulted in significant harm and impacted tens of millions of people globally. In order to prevent the transmission of the virus, individuals often wear masks as a protective ... 详细信息
来源: 评论
EPASAD:ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
收藏 引用
Cybersecurity 2024年 第3期7卷 32-48页
作者: Vikas Maurya Rachit Agarwal Saurabh Kumar Sandeep Shukla Department of Computer Science and Engineering Indian Institute of Technology KanpurkanpurIndia Merkle Science BangaloreIndia
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and se... 详细信息
来源: 评论
Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第2期106卷 459-473页
作者: Ponnuviji, N.P. Nirmala, G. Kokila, M. L. Sworna Priyadharshini, S. Indra Department of Computer Science and Engineering RMK College of Engineering and Technology Puduvoyal Thiruvallur India Department of Computer Science and Engineering RMD Engineering College Chennai India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nādu Kattankulathur Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c... 详细信息
来源: 评论
An efficient schedulability analysis based on worst-case interference time for real-time systems
收藏 引用
science China(Information sciences) 2024年 第9期67卷 88-104页
作者: Hongbiao LIU Mengfei YANG Lei QIAO Xi CHEN Jian GONG School of Computer Science and Technology Xidian University China Academy of Space Technology Beijing Institute of Control Engineering
Real-time systems are widely implemented in the Internet of Things(IoT) and safety-critical systems, both of which have generated enormous social value. Aiming at the classic schedulability analysis problem in real-ti... 详细信息
来源: 评论