咨询与建议

限定检索结果

文献类型

  • 12,926 篇 会议
  • 8,181 篇 期刊文献
  • 296 册 图书

馆藏范围

  • 21,403 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,750 篇 工学
    • 7,599 篇 计算机科学与技术...
    • 6,111 篇 软件工程
    • 2,823 篇 信息与通信工程
    • 2,470 篇 控制科学与工程
    • 1,973 篇 电气工程
    • 1,826 篇 电子科学与技术(可...
    • 1,304 篇 生物工程
    • 1,086 篇 机械工程
    • 1,025 篇 光学工程
    • 1,017 篇 生物医学工程(可授...
    • 753 篇 动力工程及工程热...
    • 709 篇 仪器科学与技术
    • 614 篇 化学工程与技术
    • 525 篇 材料科学与工程(可...
    • 449 篇 交通运输工程
    • 442 篇 安全科学与工程
  • 7,189 篇 理学
    • 3,689 篇 数学
    • 2,050 篇 物理学
    • 1,523 篇 生物学
    • 1,212 篇 统计学(可授理学、...
    • 1,128 篇 系统科学
    • 685 篇 化学
  • 3,129 篇 管理学
    • 2,089 篇 管理科学与工程(可...
    • 1,117 篇 图书情报与档案管...
    • 1,045 篇 工商管理
  • 1,003 篇 医学
    • 825 篇 临床医学
    • 725 篇 基础医学(可授医学...
    • 422 篇 药学(可授医学、理...
    • 398 篇 公共卫生与预防医...
  • 530 篇 法学
    • 461 篇 社会学
  • 388 篇 经济学
  • 220 篇 教育学
  • 201 篇 农学
  • 59 篇 文学
  • 42 篇 军事学
  • 30 篇 艺术学
  • 4 篇 哲学
  • 3 篇 历史学

主题

  • 420 篇 computer science
  • 345 篇 deep learning
  • 316 篇 computational mo...
  • 260 篇 systems engineer...
  • 234 篇 computer archite...
  • 208 篇 optimization
  • 202 篇 neural networks
  • 185 篇 application soft...
  • 180 篇 machine learning
  • 179 篇 accuracy
  • 174 篇 artificial intel...
  • 173 篇 internet of thin...
  • 165 篇 feature extracti...
  • 164 篇 educational inst...
  • 164 篇 control systems
  • 156 篇 reinforcement le...
  • 154 篇 training
  • 151 篇 support vector m...
  • 145 篇 simulation
  • 145 篇 bandwidth

机构

  • 103 篇 school of comput...
  • 98 篇 school of comput...
  • 86 篇 school of comput...
  • 83 篇 department of sy...
  • 83 篇 school of comput...
  • 82 篇 graduate school ...
  • 80 篇 school of comput...
  • 77 篇 school of comput...
  • 75 篇 state key labora...
  • 72 篇 department of sy...
  • 67 篇 department of el...
  • 51 篇 school of comput...
  • 42 篇 information syst...
  • 41 篇 department of sy...
  • 41 篇 ieee
  • 40 篇 hubei key labora...
  • 40 篇 school of inform...
  • 39 篇 school of electr...
  • 38 篇 academy of mathe...
  • 36 篇 department of la...

作者

  • 129 篇 niyato dusit
  • 49 篇 johansson karl h...
  • 48 篇 guo hong
  • 47 篇 pedrycz witold
  • 46 篇 hisao ishibuchi
  • 31 篇 xiong zehui
  • 28 篇 tsiftsis theodor...
  • 27 篇 shen xuemin
  • 27 篇 e. rogers
  • 26 篇 rajkumar buyya
  • 24 篇 yang yang
  • 23 篇 stamou giorgos
  • 23 篇 li li
  • 23 篇 kang jiawen
  • 21 篇 xu mingliang
  • 21 篇 wu guohua
  • 21 篇 chen xiaowu
  • 21 篇 xu minrui
  • 21 篇 witold pedrycz
  • 20 篇 li yang

语言

  • 19,982 篇 英文
  • 1,112 篇 其他
  • 273 篇 中文
  • 34 篇 日文
  • 8 篇 德文
  • 3 篇 葡萄牙文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer and Systems Engineering"
21403 条 记 录,以下是41-50 订阅
排序:
Speed Harmonic based Saturation Free Inductance Modeling and Estimation of Interior PMSM Using Measurements Under One Load Condition
收藏 引用
CES Transactions on Electrical Machines and systems 2025年 第1期9卷 91-99页
作者: Guodong Feng Yuting Lu Zhe Tong Beichen Ding Guishan Yan Chunyan Lai the School of Intelligent Systems Engineering Sun Yat-sen UniversityShenzhenChina the School of Advanced Manufacturing Sun Yat-sen University the Southern Marine Science and Engineering Guangdong Laboratory(Zhuhai) China the Department of Electrical and Computer Engineering Concordia UniversityQCCanada
For permanent magnet synchronous machines(PMSMs),accurate inductance is critical for control design and condition *** to magnetic saturation,existing methods require nonlinear saturation model and measurements from mu... 详细信息
来源: 评论
Transfer Learning based Framework of VGG16 to Detect Breast Cancer using Histopathological Images  6
Transfer Learning based Framework of VGG16 to Detect Breast ...
收藏 引用
6th Doctoral Symposium on Intelligence Enabled Research, DoSIER 2024
作者: Divya, Zion G. Tripathy, B.K. School of Computer Science and Engineering VIT TN Vellore632014 India School of Computer Science Engineering and Information Systems VIT TN Vellore632014 India
Breast Cancer Detection introduces a prominent confrontation for researchers and clinical experts as it is one of the major public health issues and is weighed as a leading root for cancer correlated deaths among wome... 详细信息
来源: 评论
A Novel Predictive Model for Edge Computing Resource Scheduling Based on Deep Neural Network
收藏 引用
computer Modeling in engineering & Sciences 2024年 第4期139卷 259-277页
作者: Ming Gao Weiwei Cai Yizhang Jiang Wenjun Hu Jian Yao Pengjiang Qian School of Artificial Intelligence and Computer Science Jiangnan UniversityWuxi214122China The Center for Intelligent Systems and Applications Research School of Artificial Intelligence and Computer ScienceJiangnan UniversityWuxi214122China School of Information Engineering Huzhou UniversityHuzhou313000China
Currently,applications accessing remote computing resources through cloud data centers is the main mode of operation,but this mode of operation greatly increases communication latency and reduces overall quality of se... 详细信息
来源: 评论
Supervised learning techniques for blood product prediction in patients with hematologic diseases: a multi-centre study in Western Algeria
收藏 引用
International Journal of Information Technology (Singapore) 2024年 1-12页
作者: Ykhlef, Amel Labri, Nedjla Selma Brahami, Menaouer LABAB Laboratory Computer Systems Engineering Department National Polytechnic School of Oran Oran Algeria
Blood transfusion is a medical procedure that involves transfusing blood or one of its components from one or more donors into a patient. Digital technology and machine learning have played a crucial role in the blood... 详细信息
来源: 评论
Deepfake Detection: Emerging Techniques and Evolving Challenges  12
Deepfake Detection: Emerging Techniques and Evolving Challen...
收藏 引用
12th International Conference on Internet of Everything, Microwave, Embedded, Communication and Networks, IEMECON 2024
作者: Natarajan, Krishnaraj Mathur, Abeer Bhargava, Kshitiz Singh, Manvendra Tejpal, Moulik Department of Database Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India Department of Software Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India
Several newly developed techniques and tools for manipulating images, audio, and videos have been introduced as an outcome of the recent and rapid breakthroughs in AI, machine learning, and deep learning. While most a... 详细信息
来源: 评论
Countering Deepfakes using an Improved Advanced CNN and its Ensemble with Pretrained Models  3
Countering Deepfakes using an Improved Advanced CNN and its ...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Mathur, Abeer Tejpal, Moulik Bhargava, Kshitiz Natarajan, Krishnaraj Singh, Manvendra Vellore Institute of Technology School of Computer Science & Engineering Department of Software Systems Vellore India Vellore Institute of Technology School of Computer Science & Engineering Department of Database Systems Vellore India
The extensive spread of DeepFake images on the internet has emerged as a significant challenge, with applications ranging from harmless entertainment to harmful acts like blackmail, misinformation, and spreading false... 详细信息
来源: 评论
Enhancing Security by Using GIFT and ECC Encryption Method in Multi-Tenant Datacenters
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3849-3865页
作者: Jin Wang Ying Liu Shuying Rao R.Simon Sherratt Jinbin Hu School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410004China School of Systems Engineering The University of ReadingRG66AYUK
Data security and user privacy have become crucial elements in multi-tenant data *** traffic types in the multi-tenant data center in the cloud environment have their characteristics and *** the data center network(DC... 详细信息
来源: 评论
Unsupervised Log Anomaly Detection Method Based on Multi-Feature
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 517-541页
作者: Shiming He Tuo Deng Bowen Chen R.Simon Sherratt Jin Wang School of Computer&Communication Engineering Changsha University of Science&TechnologyChangsha410114China School of Systems Engineering The University of ReadingRG66AYUK
Log anomaly detection is an important paradigm for system *** log anomaly detection based on Long Short-Term Memory(LSTM)networks is time-consuming to handle long *** model is introduced to promote ***,most existing T... 详细信息
来源: 评论
Recommendation System using Emotion Detection  3
Recommendation System using Emotion Detection
收藏 引用
3rd International Conference on Intelligent Data Communication Technologies and Internet of Things, IDCIoT 2025
作者: Susindra, S. Sweta, B. Keerthikha Shri, R. Brindha, K. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
The need for a personalized user experience brought recommendation systems to the forefront of digital innovation. However, traditional approaches tend to often forget human emotions, which represent a critical driver... 详细信息
来源: 评论
Deep Learning-Based Enhanced Object Detection for Humanoid Robots  1
Deep Learning-Based Enhanced Object Detection for Humanoid R...
收藏 引用
1st International Conference on Sustainable Energy Technologies and Computational Intelligence, SETCOM 2025
作者: Negi, Akshit Patel, Harshita Vellore Institute of Technology School of Computer Science Engineering & Information Systems Vellore India
In the contemporary world, humanoid robots are likely to play a key role in various fields, including health care, domestic service, hospitality, business, and military and security activities. The robots are employed... 详细信息
来源: 评论