咨询与建议

限定检索结果

文献类型

  • 4,866 篇 会议
  • 3,171 篇 期刊文献
  • 24 册 图书

馆藏范围

  • 8,061 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,650 篇 工学
    • 2,299 篇 计算机科学与技术...
    • 1,810 篇 软件工程
    • 869 篇 电子科学与技术(可...
    • 853 篇 电气工程
    • 841 篇 信息与通信工程
    • 612 篇 控制科学与工程
    • 594 篇 生物工程
    • 592 篇 生物医学工程(可授...
    • 535 篇 光学工程
    • 516 篇 化学工程与技术
    • 484 篇 材料科学与工程(可...
    • 334 篇 动力工程及工程热...
    • 332 篇 机械工程
    • 325 篇 仪器科学与技术
    • 201 篇 土木工程
    • 159 篇 力学(可授工学、理...
    • 147 篇 冶金工程
  • 3,264 篇 理学
    • 1,439 篇 物理学
    • 1,096 篇 数学
    • 782 篇 生物学
    • 603 篇 化学
    • 435 篇 统计学(可授理学、...
    • 219 篇 系统科学
  • 935 篇 管理学
    • 602 篇 管理科学与工程(可...
    • 357 篇 图书情报与档案管...
    • 345 篇 工商管理
  • 615 篇 医学
    • 486 篇 临床医学
    • 403 篇 基础医学(可授医学...
    • 237 篇 药学(可授医学、理...
  • 301 篇 教育学
    • 282 篇 教育学
  • 164 篇 法学
  • 142 篇 经济学
  • 130 篇 农学
  • 12 篇 军事学
  • 11 篇 文学
  • 6 篇 艺术学

主题

  • 130 篇 computational mo...
  • 108 篇 training
  • 107 篇 accuracy
  • 102 篇 computer science
  • 98 篇 deep learning
  • 98 篇 feature extracti...
  • 95 篇 students
  • 94 篇 machine learning
  • 85 篇 optimization
  • 79 篇 neural networks
  • 71 篇 predictive model...
  • 70 篇 computer archite...
  • 64 篇 visualization
  • 62 篇 testing
  • 59 篇 neurons
  • 59 篇 support vector m...
  • 59 篇 real-time system...
  • 58 篇 educational inst...
  • 58 篇 monitoring
  • 57 篇 image segmentati...

机构

  • 49 篇 department of el...
  • 48 篇 department of el...
  • 41 篇 renewable and su...
  • 35 篇 department of ph...
  • 35 篇 interdisciplinar...
  • 34 篇 ieee
  • 33 篇 department of el...
  • 31 篇 department of ph...
  • 31 篇 department of el...
  • 30 篇 photonics initia...
  • 29 篇 photonics initia...
  • 28 篇 department of ma...
  • 25 篇 school of electr...
  • 25 篇 physics program ...
  • 23 篇 department of in...
  • 23 篇 renewable and su...
  • 21 篇 department of el...
  • 20 篇 chemical enginee...
  • 20 篇 department of el...
  • 20 篇 electrical and c...

作者

  • 41 篇 andrea alù
  • 33 篇 ivan i. smalyukh
  • 32 篇 mohamed-slim alo...
  • 31 篇 smalyukh ivan i.
  • 29 篇 kono junichiro
  • 29 篇 zhang byoung-tak
  • 28 篇 heryadi yaya
  • 25 篇 yaya heryadi
  • 24 篇 mansouri majdi
  • 24 篇 lukas
  • 23 篇 pardamean bens
  • 23 篇 bens pardamean
  • 21 篇 alù andrea
  • 19 篇 hazem nounou
  • 19 篇 nounou hazem
  • 19 篇 yoon sungroh
  • 18 篇 kargar fariborz
  • 18 篇 karim oweiss
  • 17 篇 niyato dusit
  • 16 篇 tay fuyang

语言

  • 7,646 篇 英文
  • 329 篇 其他
  • 60 篇 中文
  • 11 篇 日文
  • 8 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Program of Computer Engineering"
8061 条 记 录,以下是211-220 订阅
排序:
Hotel Information System Management Audit Using COBIT 2019 - APO12  2
Hotel Information System Management Audit Using COBIT 2019 -...
收藏 引用
2nd International Conference for Innovation in Technology, INOCON 2023
作者: Utamajaya, Joy Nashar Supangat, Suhono Harso Gaol, Ford Lumban Ranti, Benny BINUS University BINUS Graduate Program School of Information System Jakarta Indonesia Bandung Institute of Technology School of Electrical Engineering and Informatic Bandung Indonesia Bina Nusantara University Computer Science Department BINUS Graduate Program Computer Science Jakarta Indonesia University of Indonesia Computer Science Department Faculty of Computer Science Depok Indonesia
In general, public or private organizations or companies have used information-based technology as a support to improve business performance to be more effective and efficient in order to achieve a company's busin... 详细信息
来源: 评论
Hybrid Encryption Based on Fernet and Rivest Shamir Adleman (RSA)
Hybrid Encryption Based on Fernet and Rivest Shamir Adleman ...
收藏 引用
2023 International Seminar on Application for Technology of Information and Communication, iSemantic 2023
作者: Hisbullah, Muhammad Dafi Sari, Christy Atika Rachmawanto, Eko Hari Handoko, Lekso Budi Umam, Chaerul Isinkaye, Folasade University of Dian Nuswantoro Study Program in Informatics Engineering Semarang Indonesia Ekiti State University Department of Computer Science Ekiti Nigeria
RSA is an asymmetric encryption algorithm that uses two different keys, a public key to encrypt the plain text and a private key to decrypt the cipher text. Fernet is a symmetric encryption algorithm that uses a singl... 详细信息
来源: 评论
3D Facial Reconstruction Applied to Medical Cosmetology  5
3D Facial Reconstruction Applied to Medical Cosmetology
收藏 引用
5th IEEE Eurasia Conference on Biomedical engineering, Healthcare and Sustainability, ECBIOS 2023
作者: Hsieh, Sheng-Hsien Lin, Ming-Yi Chen, Ching-Han National Pingtung University of Science and Technology Program of Artificial Intelligence and Mechatronics Pingtung Taiwan Yuan Ze University Department of Computer Science and Engineering Taoyuan Taiwan National Central University Department of Computer Science and Engineering Taoyuan Taiwan
We present a high-accuracy 3D facial reconstruction system with the following features: real-time 3D facial reconstruction using exposure synchronization multi-camera, feature alignment to quantify facial differences,... 详细信息
来源: 评论
Leveraging Recurrent Neural Networks in Virtual Reality-based Digital Twin Models for Enhanced Predictive Maintenance of Industrial Machines
Leveraging Recurrent Neural Networks in Virtual Reality-base...
收藏 引用
IEEE International Conference on Multi Topic
作者: Hamad Abdul Razzaq Muhammad Jazzel Mehmood Farhan Khan Computer Engineering Program DSSE Habib University Karachi Pakistan
Digital twin technology has given rise to smart manufacturing in Industry 4.0. Especially with the help of virtual reality, digital twin technology aims to provide an immersive experience by integrating the physical a... 详细信息
来源: 评论
Diversity-Optimized Group Extraction in Social Networks
收藏 引用
IEEE Transactions on Computational Social Systems 2024年 第1期11卷 756-769页
作者: Hsu, Bay-Yuan Chen, Yi-Ling Ho, Ya-Chi Chang, Po-Yuan Chang, Chih-Chieh Shia, Ben-Chang Shen, Chih-Ya National Tsing Hua University Department of Industrial Engineering and Engineering Management Hsinchu30013 Taiwan National Taiwan University of Science and Technology Department of Computer Science and Information Engineering Taipei10607 Taiwan Hsinchu31040 Taiwan Fu Jen Catholic University Department of Business Administration New Taipei City24205 Taiwan National Taiwan University of Science and Technology Management Undergraduate Program Taipei10607 Taiwan National Tsing Hua University Department of Computer Science Hsinchu30013 Taiwan
In this article, we propose to study a novel research problem to boost group performance, that is, social-aware diversity-optimized group extraction (SDGE), which takes into consideration the two important factors: 1)... 详细信息
来源: 评论
Assessing Distributed Energy Resource Hosting Capacity Under Different Grid-Tie Inverter Control Strategies  8
Assessing Distributed Energy Resource Hosting Capacity Under...
收藏 引用
8th Workshop on Communication Networks and Power Systems, WCNPS 2023
作者: Santos, Brenda L. M. Barros, Luciano S. Barbosa, Daniel Moreira, Fernando A. Federal University of Bahia Graduate Program in Electrical Engineering Salvador Brazil Federal University of Paraíba Computer Systems Department João Pessoa Brazil Federal University of Bahia Department of Electrical and Computer Engineering Salvador Brazil
Despite the potential benefits that the integration of distributed energy resources (DERs) can bring to the system, it may cause problems related to power quality constraints, such $as$ reverse power flow in substatio... 详细信息
来源: 评论
Exploring the Impact of Early Detection on DL-Based NIDSs Models  14
Exploring the Impact of Early Detection on DL-Based NIDSs Mo...
收藏 引用
14th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference, UEMCON 2023
作者: Wang, Minxiao Yang, Ning Weng, Ning Southern Illinois University Computer Engineering Program School of ECBE CarbondaleIL United States Southern Illinois University Information Technology Program School of Computing CarbondaleIL United States
Deep learning (DL) has been proposed as a promising solution for network intrusion detection systems (NIDSs). While most DL-based NIDSs focus on high accuracy, they often overlook the critical issue of NIDSs response ... 详细信息
来源: 评论
Meal Image Recognition and Healthy Meal Combination Recommendation System Integrated with Generative Artificial Intelligence  6
Meal Image Recognition and Healthy Meal Combination Recommen...
收藏 引用
6th IEEE Eurasia Conference on Biomedical engineering, Healthcare and Sustainability, ECBIOS 2024
作者: Chang, Chin-Chih Wei, Chi-Hung Hsiao, Sean Yang, Chyuan-Huei Thomas Chung Hua University Department of Computer Science and Information Engineering Hsinchu Taiwan Chung Hua University Ph.D. Program in Engineering Science Hsinchu Taiwan Chung Hua University Program in Applied Foreign Language and Smart Commerce Hsinchu Taiwan School of Information Engineering Shandong Vocational and Technical University of International Studies Shandong China
People increasingly prioritize a balanced diet to enhance well-being, yet making informed dietary choices remains challenging amidst the abundance of options. To address this, we developed a meal image recognition and... 详细信息
来源: 评论
Stunting Classification in Toddlers: Implementation and Evaluation of the Decision Tree Algorithm
Stunting Classification in Toddlers: Implementation and Eval...
收藏 引用
2024 International Conference on Information Technology and Computing, ICITCOM 2024
作者: Alita, Debby Ahmad, Imam Jafar Rumandan, Rhaishudin Erkamim, Moh Widyasmoro Universitas Teknokrat Indonesia Faculty of Engineering and Computer Science Bandarlampung Indonesia Institut Agama Islam Negeri Ambon Islamic Education Management Study Program Ambon Indonesia Universitas Tunas Pembangunan Smart City Information Systems Study Program Surakarta Indonesia Universitas Muhammadiyah Yogyakarta Faculty of Engineering Department of Electrical Engineering Yogyakarta Indonesia
Stunting in toddlers is a chronic nutritional issue that affects the physical and cognitive development of children, with serious long-term consequences such as reduced cognitive function and an increased risk of chro... 详细信息
来源: 评论
Real-time Computation of E-field in Transcranial Magnetic Stimulation for Neuronavigation and Optimization
Real-time Computation of E-field in Transcranial Magnetic St...
收藏 引用
2025 United States National Committee of URSI National Radio Science Meeting, USNC-URSI NRSM 2025
作者: Hasan, Nahian I. Dannhauer, Moritz Wang, Dezhi Deng, Zhi-De Gomez, Luis J. Elmore Family School of Electrical and Computer Engineering Purdue University WLIN United States National Institute of Mental Health Intramural Research Program National Institutes of Health United States
Transcranial Magnetic Stimulation (TMS) is a non-invasive brain stimulation technique used for the treatment of depression, as well as various neurological and psychiatric disorders. There has been ongoing interest in... 详细信息
来源: 评论