咨询与建议

限定检索结果

文献类型

  • 6,213 篇 期刊文献
  • 6,053 篇 会议
  • 179 册 图书

馆藏范围

  • 12,445 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,521 篇 工学
    • 4,687 篇 计算机科学与技术...
    • 3,728 篇 软件工程
    • 1,508 篇 信息与通信工程
    • 1,252 篇 控制科学与工程
    • 870 篇 电气工程
    • 831 篇 生物工程
    • 780 篇 电子科学与技术(可...
    • 615 篇 生物医学工程(可授...
    • 576 篇 光学工程
    • 537 篇 机械工程
    • 426 篇 化学工程与技术
    • 409 篇 仪器科学与技术
    • 369 篇 动力工程及工程热...
    • 328 篇 材料科学与工程(可...
    • 298 篇 力学(可授工学、理...
    • 242 篇 安全科学与工程
  • 5,930 篇 理学
    • 3,304 篇 数学
    • 1,902 篇 物理学
    • 985 篇 生物学
    • 963 篇 统计学(可授理学、...
    • 714 篇 系统科学
    • 477 篇 化学
    • 268 篇 地球物理学
  • 1,788 篇 管理学
    • 1,137 篇 管理科学与工程(可...
    • 700 篇 图书情报与档案管...
    • 522 篇 工商管理
  • 583 篇 医学
    • 490 篇 临床医学
    • 443 篇 基础医学(可授医学...
    • 271 篇 药学(可授医学、理...
  • 329 篇 法学
    • 276 篇 社会学
  • 220 篇 经济学
  • 151 篇 农学
  • 99 篇 教育学
  • 51 篇 文学
  • 31 篇 军事学
  • 21 篇 艺术学
  • 1 篇 哲学

主题

  • 279 篇 computer science
  • 239 篇 deep learning
  • 212 篇 mathematics
  • 205 篇 machine learning
  • 198 篇 computational mo...
  • 182 篇 feature extracti...
  • 174 篇 accuracy
  • 138 篇 optimization
  • 126 篇 educational inst...
  • 118 篇 predictive model...
  • 115 篇 neural networks
  • 106 篇 support vector m...
  • 106 篇 artificial intel...
  • 104 篇 data mining
  • 96 篇 training
  • 95 篇 image segmentati...
  • 91 篇 internet of thin...
  • 86 篇 decision making
  • 84 篇 authentication
  • 77 篇 semantics

机构

  • 411 篇 department for p...
  • 407 篇 faculty of scien...
  • 395 篇 department of ph...
  • 394 篇 kirchhoff-instit...
  • 387 篇 department of ph...
  • 386 篇 department of ph...
  • 359 篇 fakultät für phy...
  • 343 篇 institute of phy...
  • 327 篇 institute of phy...
  • 307 篇 department of ph...
  • 281 篇 department of ph...
  • 274 篇 instituto de fís...
  • 272 篇 department of ph...
  • 271 篇 graduate school ...
  • 268 篇 universidade fed...
  • 268 篇 ictp trieste
  • 252 篇 department of ph...
  • 251 篇 department of ph...
  • 248 篇 department of ph...
  • 248 篇 school of physic...

作者

  • 332 篇 c. alexa
  • 332 篇 g. bella
  • 332 篇 d. calvet
  • 332 篇 c. amelung
  • 331 篇 g. spigo
  • 330 篇 j. m. izen
  • 330 篇 j. strandberg
  • 329 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 319 篇 s. mohapatra
  • 304 篇 y. tayalati
  • 303 篇 s. guindon
  • 293 篇 a. kaczmarska
  • 286 篇 m. klein
  • 276 篇 j. schaarschmidt
  • 261 篇 f. pastore
  • 261 篇 a. d. pilkington

语言

  • 11,517 篇 英文
  • 794 篇 其他
  • 133 篇 中文
  • 2 篇 西班牙文
  • 2 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Engineering Computer Science and Mathematics"
12445 条 记 录,以下是61-70 订阅
排序:
A retailer’s inventory model for deteriorating items under power pattern demand with shortages partially backlogged in both crisp and fuzzy environments
收藏 引用
International Journal of Industrial and Systems engineering 2025年 第1期49卷 96-118页
作者: Patra, Sourav Kumar Paikray, Susanta Kumar Tripathy, Rudra Mohan Department of Mathematics Veer Surendra Sai University of Technology Odisha Burla768018 India School of Computer Science and Engineering XIM University Odisha Bhubaneswar752050 India
An inventory predicament can be resolved with numerous techniques, starting from the trial-and-error manner of mathematical and simulation methods. Mathematical methods always serve as powerful tools for minimising to... 详细信息
来源: 评论
An Advanced Clustering with Toeplitz and Circulant Matrices and a Comparison Against Spectral Clustering, and K-Means  3
An Advanced Clustering with Toeplitz and Circulant Matrices ...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Saragadam, Sneha Rohan, Gamidi Manideep, Thotapalli Sri Surya Jayan, Sarada Amrita School of Computing Department of Computer Science and Engineering Bengaluru India Amrita School of Engineering Department of Mathematics Bengaluru India
In an effort to increase computing efficiency, this work presents an improved spectral clustering technique that approximates the affinity matrix using Toeplitz and Circulant matrices. To preserve the quality of the c... 详细信息
来源: 评论
Reinforcement Learning Approach for Improving Platform Performance in Two-Sided Mobility Markets  27
Reinforcement Learning Approach for Improving Platform Perfo...
收藏 引用
27th IEEE International Conference on Intelligent Transportation Systems, ITSC 2024
作者: Ghasemi, Farnoud Tabatabaei, Seyed Hassan Ghanadbashi, Saeedeh Kucharski, Rafal Golpayegani, Fatemeh Jagiellonian University Faculty of Mathematics and Computer Science Poland School of Computer Engineering Iran University of Science and Technology Tehran Iran School of Computer Science University College Dublin Dublin Ireland
Two-sided mobility markets, with platforms like Uber and Lyft, are complex systems by nature due to intricate, non-linear interactions between the platform and the involved parties including travelers and drivers. The... 详细信息
来源: 评论
Voice assistance to blind people by detection of surrounding objects, activities, and humans
Voice assistance to blind people by detection of surrounding...
收藏 引用
2024 International Conference on Computing and Intelligent Reality Technologies, ICCIRT 2024
作者: Kambham, Suhas Preetham Varman, Raahul Ramya, Tadepalli Sri Valli Eniyan, M.K. Tangavel, Senthil Kaumar Somasundaram, K. Shanmugam, Selvanayaki Kolandapalayam Department of Computer Science and Engineering Amrita School of Computing Coimbatore India Department of Mathematics and Computer Science Ashland University United States
Various systems were developed to assist those with vision impairments and enhance their standard of life. Regrettably, the majority of these systems have restricted functionality. We decided to build a model that det... 详细信息
来源: 评论
Improved Bounds on the Size of Permutation Codes Under Kendall τ-Metric
收藏 引用
IEEE Transactions on Information Theory 2025年 第6期71卷 4156-4166页
作者: Parvaresh, Farzad Sobhani, Reza Abdollahi, Alireza Bagherian, Javad Jafari, Fatemeh Khatami, Maryam University of Isfahan Faculty of Engineering Department of Electrical Engineering Isfahan81746-73441 Iran School of Mathematics Tehran19395-5746 Iran University of Isfahan Faculty of Mathematics and Statistics Department of Applied Mathematics and Computer Science Isfahan81746-73441 Iran University of Isfahan Faculty of Mathematics and Statistics Department of Pure Mathematics Isfahan81746-73441 Iran
In order to overcome the challenges caused by flash memories and also to protect against errors related to reading information stored in DNA molecules in the shotgun sequencing method, the rank modulation method has b... 详细信息
来源: 评论
Generalized Extended Welch Bound for Multi-Cell Non-Orthogonal Sequence Sets
收藏 引用
IEEE Communications Letters 2025年 第6期29卷 1176-1180页
作者: Shen, Bingsheng Liu, Kaiqiang Gu, Zhi Yang, Yang Zhou, Zhengchun Southwest Jiaotong University School of Information Science and Technology Chengdu China Southwest Jiaotong University School of Mathematics Chengdu China Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Hong Kong
Sequence sets with minimum total squared correlation (TSC) have important application in communications. In a multi-cell system, due to the difference in channel strength between the home cell and the neighboring cell... 详细信息
来源: 评论
Analysis of environmental impact factors in urban road traffic accidents: logistic regression model
Advances in Transportation Studies
收藏 引用
Advances in Transportation Studies 2024年 第Special issue期3卷 39-50页
作者: Zhao, X.J. Li, S.Y. Guan, H.B. College of Mathematics and Information Science Anyang institute of Technology Anyang455000 China School of Computer Science and Information Engineering Anyang Institute of Technology Anyang455000 China College of Mathematics and Information Science Zhengzhou University of Light Industry Zhengzhou450002 China
The traditional methods for analyzing environmental impact factors in urban road traffic accidents suffer from issues such as low recall, poor precision, and time-consuming processes. To address these challenges, a no... 详细信息
来源: 评论
Accurate threat hunting in industrial internet of things edge devices
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1123-1130页
作者: Abbas Yazdinejad Behrouz Zolfaghari Ali Dehghantanha Hadis Karimipour Gautam Srivastava Reza M.Parizi Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Electrical and Software Engineering University of CalgaryAlbertaCanada Department of Mathematics and Computer Science Brandon UniversityBrandonCanada College of Computing and Software Engineering Kennesaw State UniversityGAUSA Research Center for Interneural Computing China Medical UniversityTaichungTaiwanChina Department of Computer Science and Mathematics Lebanese American UniversityBeirut1102Lebanon
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e... 详细信息
来源: 评论
Physical Layer Security for CR-NOMA Network with Cooperative Jamming
收藏 引用
Tsinghua science and Technology 2025年 第2期30卷 708-720页
作者: Meiling Li Peng Xue Hu Yuan Yuxing Han School of Electronics Information Engineering Taiyuan University of Science and TechnologyTaiyuan 030024China School of Computer Science and Mathematics Kingston UniversityLondonKT12EEUK Shenzhen International Graduate School Tsinghua UniversityShenzhen 518055China
Cooperative jamming can effectively combat eavesdropping in physical layer security communication without affecting the legal receiver and improve the security performance of the *** paper introduces cooperative jammi... 详细信息
来源: 评论
Analyzing Artificial Intelligence Based Intrusion Detection System in Detecting DDoS Attack  4th
Analyzing Artificial Intelligence Based Intrusion Detection ...
收藏 引用
4th International Conference on Smart IoT Systems: Innovations and Computing, SSIC 2023
作者: Kurra, Sai Suchith Rayana, Likhitha Yoosuf, Mohamed Sirajudeen School of Computer Science and Engineering VIT-AP University Andhra Pradesh Amaravati India Department of Mathematics and Computer Science Modern College of Business and Science Muscat Oman
With the increasing complexity of the cyber-attacks, traditional intrusion systems have become inadequate in effectively detecting and preventing network attacks. Modern machine learning techniques have the capability... 详细信息
来源: 评论