咨询与建议

限定检索结果

文献类型

  • 51,299 篇 会议
  • 32,480 篇 期刊文献
  • 900 册 图书
  • 10 篇 学位论文

馆藏范围

  • 84,689 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 53,221 篇 工学
    • 35,829 篇 计算机科学与技术...
    • 28,854 篇 软件工程
    • 13,258 篇 信息与通信工程
    • 8,899 篇 控制科学与工程
    • 6,485 篇 电气工程
    • 6,281 篇 电子科学与技术(可...
    • 5,724 篇 生物工程
    • 4,189 篇 机械工程
    • 3,914 篇 光学工程
    • 3,896 篇 生物医学工程(可授...
    • 2,969 篇 仪器科学与技术
    • 2,515 篇 化学工程与技术
    • 2,466 篇 动力工程及工程热...
    • 2,003 篇 交通运输工程
    • 1,889 篇 安全科学与工程
    • 1,786 篇 网络空间安全
    • 1,674 篇 材料科学与工程(可...
  • 28,595 篇 理学
    • 15,216 篇 数学
    • 7,971 篇 物理学
    • 6,456 篇 生物学
    • 4,910 篇 统计学(可授理学、...
    • 3,438 篇 系统科学
    • 2,695 篇 化学
  • 14,534 篇 管理学
    • 9,076 篇 管理科学与工程(可...
    • 6,021 篇 图书情报与档案管...
    • 3,981 篇 工商管理
  • 3,877 篇 医学
    • 3,186 篇 临床医学
    • 2,775 篇 基础医学(可授医学...
    • 1,652 篇 药学(可授医学、理...
  • 2,321 篇 法学
    • 1,908 篇 社会学
  • 1,512 篇 经济学
  • 994 篇 教育学
  • 950 篇 农学
  • 325 篇 文学
  • 234 篇 军事学
  • 183 篇 艺术学
  • 17 篇 哲学
  • 12 篇 历史学

主题

  • 1,945 篇 computer science
  • 1,870 篇 feature extracti...
  • 1,562 篇 deep learning
  • 1,496 篇 computational mo...
  • 1,469 篇 accuracy
  • 1,424 篇 training
  • 1,323 篇 machine learning
  • 1,113 篇 data mining
  • 1,097 篇 optimization
  • 995 篇 semantics
  • 929 篇 artificial intel...
  • 909 篇 educational inst...
  • 870 篇 predictive model...
  • 785 篇 neural networks
  • 765 篇 internet of thin...
  • 704 篇 support vector m...
  • 676 篇 wireless sensor ...
  • 661 篇 data models
  • 618 篇 security
  • 617 篇 real-time system...

机构

  • 695 篇 school of comput...
  • 538 篇 school of comput...
  • 476 篇 maharishi school...
  • 476 篇 school of inform...
  • 399 篇 school of comput...
  • 275 篇 department of ph...
  • 275 篇 school of comput...
  • 258 篇 faculté des scie...
  • 245 篇 department of ph...
  • 242 篇 school of comput...
  • 229 篇 school of comput...
  • 220 篇 department of ph...
  • 217 篇 faculty of scien...
  • 216 篇 physics division...
  • 214 篇 school of comput...
  • 197 篇 department of ph...
  • 185 篇 departamento de ...
  • 181 篇 department of ph...
  • 167 篇 school of comput...
  • 166 篇 school of comput...

作者

  • 290 篇 niyato dusit
  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 259 篇 g. spigo
  • 257 篇 h. a. gordon
  • 253 篇 f. siegert
  • 253 篇 a. c. könig
  • 248 篇 m. klein
  • 245 篇 r. ströhmer
  • 238 篇 y. tayalati
  • 235 篇 h. sakamoto
  • 213 篇 m. rijssenbeek
  • 200 篇 f. pastore
  • 200 篇 n. orlando
  • 191 篇 d. guest
  • 191 篇 s. jin

语言

  • 78,328 篇 英文
  • 4,891 篇 其他
  • 1,347 篇 中文
  • 169 篇 日文
  • 17 篇 德文
  • 8 篇 法文
  • 7 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 2 篇 俄文
  • 1 篇 西班牙文
检索条件"机构=School of Computer Science and Engineering and Information Systems"
84689 条 记 录,以下是4751-4760 订阅
排序:
Exploring the Challenge of Controller Placement in Software-Defined Networking: A Comprehensive Review  2
Exploring the Challenge of Controller Placement in Software-...
收藏 引用
2nd International Conference on Automation, Computing and Renewable systems, ICACRS 2023
作者: Gunavathie, M.A. Jacophine Susmi, S. Sivasankari, S.S. Venkatesh, M. Information Technology Panimalar Engineering College Chennai India Information Technology University College of Engineering Tindivanam India Electronics and Communication Engineering Dayananda Sagar University Bangalore India Computer Science and Business Systems Thiagarajar College of Engineering Madurai India
The placement of controllers is a critical issue that can significantly impact network performance and efficiency in Software DefinedNetworking (SDN). The optimal placement of controllers should take into account vari... 详细信息
来源: 评论
Simultaneous Speech Extraction for Multiple Target Speakers Under Meeting Scenarios
收藏 引用
Journal of Shanghai Jiaotong University (science) 2024年 1-7页
作者: Zeng, Bang Suo, Hongbin Wan, Yulong Li, Ming School of Computer Science Wuhan University Wuhan430027 China Suzhou Municipal Key Laboratory of Multimodal Intelligent Systems Duke Kunshan University Kunshan Jiangsu215316 China Data & amp AI Engineering System OPPO Beijing100125 China
The common target speech separation directly estimates the target source, ignoring the interrelationship between different speakers at each frame. We propose a multiple-target speech separation (MTSS) model to simulta... 详细信息
来源: 评论
Automation 5.0: The Key to systems Intelligence and Industry 5.0
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第8期11卷 1723-1727页
作者: Ljubo Vlacic Hailong Huang Mariagrazia Dotoli Yutong Wang Petros A.Ioannou Lili Fan Xingxia Wang Raffaele Carli Chen Lv Lingxi Li Xiaoxiang Na Qing-Long Han Fei-Yue Wang Institute of Intelligent and Integrated Systems and the School of Engineering and Built Environment Griffith UniversityNathanQLD 4111Australia Department of Aeronautical and Aviation Engineering The Hong Kong Polytechnic UniversityHong KongChina Department of Electrical and Information Engineering Polytechnic of Bari70126 BariItaly State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of AutomationChinese Academy of SciencesBeijing 100190and also with the Qingdao Academy of Intelligent IndustriesQingdao 266114China Department of Electrical Engineering-Systems University of Southern CaliforniaLos AngelesCA 90007 USA School of Automation Beijing Institute of TechnologyBeijing 100081China State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of AutomationChinese Academy of SciencesBeijing 100190 School of Artificial Intelligence University of Chinese Academy of SciencesBeijing 100049 Beijing Huairou Academy of Parallel Sensing Beijing 101499China School of Mechanical and Aerospace Engineering Nanyang Technological UniversitySingapore 639798Singapore Department of Electrical and Computer Engineering Purdue School of Engineering and TechnologyIndiana University-Purdue University IndianapolisIndianapolisIN 46202 USA Department of Engineering University of CambridgeCB21TN CambridgeU.K. School of Science Computing and Engineering TechnologiesSwinburne University of TechnologyMelbourne VIC 3122Australia State Key Laboratory for Management and Control of Complex Systems Chinese Academy of SciencesBeijing 100190 School of Artificial Intelligence University of Chinese Academy of SciencesBeijing 100049China Dazhou Artificial Intelligence Institute Dazhouand the Faculty of Innovation EngineeringMacao University of Science and TechnologyMacao 999078China
AUTOMATION has come a long way since the early days of mechanization,i.e.,the process of working exclusively by hand or using animals to work with *** rise of steam engines and water wheels represented the first gener... 详细信息
来源: 评论
Differential Evolution with Arithmetic Optimization Algorithm Enabled Multi-Hop Routing Protocol
收藏 引用
computer systems science & engineering 2023年 第5期45卷 1759-1773页
作者: Manar Ahmed Hamza Haya Mesfer Alshahrani Sami Dhahbi Mohamed K Nour Mesfer Al Duhayyim ElSayed M.Tag El Din Ishfaq Yaseen Abdelwahed Motwakel Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversityAbha62529Saudi Arabia Department of Computer Science College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia Department of Electrical Engineering Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11845Egypt
Wireless Sensor Networks(WSN)has evolved into a key technology for ubiquitous living and the domain of interest has remained active in research owing to its extensive range of *** spite of this,it is challenging to de... 详细信息
来源: 评论
Feature selection using modified chaotic satin bowerbird algorithm with deep transfer learning for Multispectral Image Classification
收藏 引用
International Journal of information Technology (Singapore) 2024年 1-13页
作者: Rajakani, M. Kavitha, R.J. Rajesh, S. Department of Data Science and Business Systems School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology SRM Nagar Kattankulathur Chennai India Department of Electronics and Communication Engineering University College of Engineering Panruti Panruti 607106 India Department of Information Technology Mepco Schlenk Engineering College Sivakasi India
Multispectral image classification has received significant attention among research communities and academicians. Recently, several artificial intelligence (AI) models can be used for the extraction of prominent feat... 详细信息
来源: 评论
Combinational Backdoor Attack against Customized Text-to-Image Models
arXiv
收藏 引用
arXiv 2024年
作者: Jiang, Wenbo He, Jiaming Li, Hongwei Xu, Guowen Zhang, Rui Chen, Hanxiao Hao, Meng Yang, Haomiao The School of Computer Science and Engineering University of Electronic Science and Technology of China China The School of Computing and Information Systems Singapore Management University Singapore
Recently, Text-to-Image (T2I) synthesis technology has made tremendous strides. Numerous representative T2I models have emerged and achieved promising application outcomes, such as DALL-E, Stable Diffusion, Imagen, et... 详细信息
来源: 评论
Movement Impacts on Eyeblink Detection Using FMCW Radar  9
Movement Impacts on Eyeblink Detection Using FMCW Radar
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Zhang, Xinze Brahim, Walid Ma, Jianhua Apduhan, Bernady O. Hosei University Graduate School of Computer and Information Sciences Tokyo184-8584 Japan Kyushu Sangyo University Faculty of Science and Engineering Department of Information Science Fukuoka813-0004 Japan
Eyeblink detection is essential for assessing physiological and psychological states in various applications. Radar technology offers a promising solution for non-intrusive and reliable eyeblink detection. This ongoin... 详细信息
来源: 评论
Evaluation of Different Network Coding Algorithm Strategies for Wireless systems  5th
Evaluation of Different Network Coding Algorithm Strategies ...
收藏 引用
5th International Conference on Data science, Machine Learning and Applications, ICDSMLA 2023
作者: Parameswaran, Murali Savita Kannagi, A. Panwar, Rahul School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bangalore India Department of Electrical Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India
These research objectives are to evaluate and compare distinct community coding algorithms that can be applied in wireless networks to maximize network efficiency, throughput, and facts switch velocity. Special proced... 详细信息
来源: 评论
Optimizing Fabric Welding Using Image Processed Laser Inspection  5th
Optimizing Fabric Welding Using Image Processed Laser Inspec...
收藏 引用
5th International Conference on Data science, Machine Learning and Applications, ICDSMLA 2023
作者: Ansari, Tabish Sekhar, Malepati Chandra Alam, Intekhab Bargavi, Manju Department of Civil Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bengaluru India
Material welding is used in expanding industrial and industrial applications and depends on accuracy and precision to ensure satisfaction and protection. Laser inspection technology has been developed to help enhance ... 详细信息
来源: 评论
Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm
收藏 引用
computer systems science & engineering 2023年 第8期46卷 2401-2414页
作者: Mohammed S.Alshehri Sultan Almakdi Mimonah Al Qathrady Jawad Ahmad Department of Computer Science Najran UniversityNajran55461Saudi Arabia Department of Information Systems Najran UniversityNajran55461Saudi Arabia School of Computing Edinburgh Napier UniversityEdinburghEH105DTUK
Chaos-based cryptosystems are considered a secure mode of communication due to their *** maps are associated with the other domains to construct robust encryption *** exist numerous encryption schemes in the literatur... 详细信息
来源: 评论