咨询与建议

限定检索结果

文献类型

  • 3,222 篇 期刊文献
  • 2,888 篇 会议
  • 97 册 图书

馆藏范围

  • 6,207 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,745 篇 工学
    • 1,966 篇 计算机科学与技术...
    • 1,619 篇 软件工程
    • 630 篇 控制科学与工程
    • 598 篇 信息与通信工程
    • 440 篇 电气工程
    • 374 篇 生物工程
    • 353 篇 电子科学与技术(可...
    • 339 篇 力学(可授工学、理...
    • 308 篇 动力工程及工程热...
    • 301 篇 生物医学工程(可授...
    • 273 篇 化学工程与技术
    • 270 篇 机械工程
    • 268 篇 材料科学与工程(可...
    • 241 篇 光学工程
    • 215 篇 仪器科学与技术
    • 178 篇 土木工程
    • 156 篇 建筑学
  • 3,094 篇 理学
    • 1,720 篇 数学
    • 1,136 篇 物理学
    • 505 篇 统计学(可授理学、...
    • 442 篇 生物学
    • 407 篇 系统科学
    • 310 篇 化学
  • 817 篇 管理学
    • 543 篇 管理科学与工程(可...
    • 292 篇 图书情报与档案管...
    • 273 篇 工商管理
  • 339 篇 医学
    • 290 篇 临床医学
    • 254 篇 基础医学(可授医学...
    • 148 篇 公共卫生与预防医...
    • 145 篇 药学(可授医学、理...
  • 142 篇 法学
  • 133 篇 经济学
  • 109 篇 农学
  • 55 篇 教育学
  • 26 篇 文学
  • 17 篇 艺术学
  • 8 篇 军事学

主题

  • 106 篇 machine learning
  • 100 篇 accuracy
  • 92 篇 mathematics
  • 87 篇 computational mo...
  • 84 篇 artificial intel...
  • 80 篇 deep learning
  • 72 篇 feature extracti...
  • 71 篇 training
  • 65 篇 predictive model...
  • 60 篇 convolutional ne...
  • 59 篇 computer science
  • 59 篇 data models
  • 56 篇 educational inst...
  • 56 篇 optimization
  • 53 篇 mathematical mod...
  • 50 篇 internet of thin...
  • 48 篇 neural networks
  • 47 篇 nuclear structur...
  • 44 篇 decision making
  • 43 篇 data mining

机构

  • 110 篇 hubei key labora...
  • 102 篇 school of comput...
  • 96 篇 school of mathem...
  • 95 篇 institut univers...
  • 94 篇 north-west unive...
  • 94 篇 school of comput...
  • 92 篇 national centre ...
  • 88 篇 infn sezione di ...
  • 86 篇 tno technical sc...
  • 86 篇 université de st...
  • 81 篇 nikhef national ...
  • 81 篇 university of jo...
  • 80 篇 infn sezione di ...
  • 79 篇 ncsr demokritos ...
  • 76 篇 infn sezione di ...
  • 75 篇 school of mathem...
  • 73 篇 infn sezione di ...
  • 72 篇 university würzb...
  • 69 篇 university moham...
  • 66 篇 università di ca...

作者

  • 98 篇 ferrara g.
  • 98 篇 ardid m.
  • 96 篇 calvo d.
  • 95 篇 chen a.
  • 86 篇 gal t.
  • 86 篇 bozza c.
  • 84 篇 díaz a.f.
  • 84 篇 boumaaza j.
  • 84 篇 gozzini s.r.
  • 83 篇 coleiro a.
  • 82 篇 dallier r.
  • 82 篇 enzenhöfer a.
  • 79 篇 celli s.
  • 78 篇 boettcher m.
  • 76 篇 carretero v.
  • 76 篇 bendahman m.
  • 75 篇 dornic d.
  • 75 篇 brunner j.
  • 72 篇 ardid s.
  • 71 篇 cherubini s.

语言

  • 5,906 篇 英文
  • 270 篇 其他
  • 32 篇 中文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=School of Engineering Computing and Mathematics"
6207 条 记 录,以下是101-110 订阅
排序:
A VARIATIONAL ANALYSIS FOR THE MOVING FINITE ELEMENT METHOD FOR GRADIENTFLOWS
收藏 引用
Journal of Computational mathematics 2023年 第2期41卷 191-210页
作者: Xianmin Xu LSEC Institute of Computational Mathematics and Scientific/Engineering ComputingNCMISAMSSChinese Academy of SciencesBeijing 100190China School of Mathematical Sciences University of Chinese Academy of SciencesBeijing 100049China
By using the Onsager principle as an approximation tool,we give a novel derivation for the moving finite element method for gradient flow *** show that the discretized problem has the same energy dissipation structure... 详细信息
来源: 评论
Accurate threat hunting in industrial internet of things edge devices
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1123-1130页
作者: Abbas Yazdinejad Behrouz Zolfaghari Ali Dehghantanha Hadis Karimipour Gautam Srivastava Reza M.Parizi Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Electrical and Software Engineering University of CalgaryAlbertaCanada Department of Mathematics and Computer Science Brandon UniversityBrandonCanada College of Computing and Software Engineering Kennesaw State UniversityGAUSA Research Center for Interneural Computing China Medical UniversityTaichungTaiwanChina Department of Computer Science and Mathematics Lebanese American UniversityBeirut1102Lebanon
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e... 详细信息
来源: 评论
Statistical and Machine Learning Perspectives on Exoplanets Prediction and Classification  1
Statistical and Machine Learning Perspectives on Exoplanets ...
收藏 引用
1st International Conference on Innovations in Communications, Electrical and Computer engineering, ICICEC 2024
作者: Priya, M. Yagnasri Shendre, Sanjivani P. Kamble, Samrudhi S. Sridhar, Swetha Jayan, Sarada Amrita Vishwa Vidyapeetham Amrita School of Computing Dept. of Computer Science and Engineering Bengaluru India Amrita Vishwa Vidyapeetham Amrita School of Engineering Dept. of Mathematics Bengaluru India
Exoplanets are the planets orbiting stars out of our solar system. The exploration of such planets has become a growing field in astronomy but the analysis of the data related to such planets involves many challenges ... 详细信息
来源: 评论
Pairing-Free Blockchain-Assisted Certificateless Aggregation Signcryption Scheme for VANETs
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15545-15557页
作者: Wang, Yahui Peng, Cong Jia, Xiaoying Wen, Jiaming Zhang, Yuanyuan Xinyang Normal University School of Computer and Information Technology School of Software Xinyang464000 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China South-Central Minzu University School of Mathematics and Statistics Wuhan430074 China Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China University of Wollongong Institute of Cybersecurity and Cryptology School of Computing and Information Technology WollongongNSW2522 Australia Hubei University of Technology School of computer science Wuhan430072 China
Smart vehicle applications play a crucial role in intelligent transportation systems, enabling sensor-equipped vehicles to establish dynamic networks for efficient collection, sharing, and aggregation. This significan... 详细信息
来源: 评论
An Effective Hybrid Metaheuristic Algorithm for Solving Global Optimization Algorithms
收藏 引用
Multimedia Tools and Applications 2024年 第37期83卷 85103-85138页
作者: Seyyedabbasi, Amir Tareq Tareq, Wadhah Zeyad Bacanin, Nebojsa Computer Engineering Deptartment Faculty of Engineering and Natural Sciences Istinye University Istanbul Turkey Department of Mathematics Saveetha School of Engineering SIMATS Thandalam Tamilnadu India Faculty of Informatics and Computing Singidunum University Belgrade Serbia MEU Research Unit Middle East University Amman Jordan
Recently, the Honey Badger Algorithm (HBA) was proposed as a metaheuristic algorithm. Honey badger hunting behaviour inspired the development of this algorithm. In the exploitation phase, HBA performs poorly and stagn... 详细信息
来源: 评论
Twitching Control for Pneumatic Artificial Muscle Actuators
Twitching Control for Pneumatic Artificial Muscle Actuators
收藏 引用
2023 IEEE International Conference on Robotics and Biomimetics, ROBIO 2023
作者: Bogdan, Piotr A. Smith, Oliver Klein, Frederico B. Gianni, Mario University of Plymouth School of Engineering Computing and Mathematics Faculty of Science and Engineering United Kingdom University of Liverpool School of Electrical Engineering Electronics and Computer Science United Kingdom
In this work we present the design and development of a twitching control system for pneumatic artificial muscle (PAM) actuators. In this system, a shape memory alloy (SMA) poppet valve is used to control the flow of ...
来源: 评论
Maximizing Submodular+Supermodular Functions Subject to a Fairness Constraint
收藏 引用
Tsinghua Science and Technology 2024年 第1期29卷 46-55页
作者: Zhenning Zhang Kaiqiao Meng Donglei Du Yang Zhou Beijing Institute for Scientific and Engineering Computing Beijing University of TechnologyBeijing 100124China Faculty of Management University of New BrunswickFredericton E3B 5A3Canada School of Mathematics and Statistics Shandong Normal UniversityJinan 250014China
We investigate the problem of maximizing the sum of submodular and supermodular functions under a fairness *** sum function is non-submodular in *** an offline model,we introduce two approximation algorithms:A greedy ... 详细信息
来源: 评论
Phase-field-based lattice Boltzmann method for containerless freezing
收藏 引用
Physical Review E 2024年 第3期110卷 035301页
作者: Jiangxu Huang Lei Wang Zhenhua Chai Baochang Shi School of Mathematics and Statistics School of Mathematics and Physics Institute of Interdisciplinary Research for Mathematics and Applied Science Hubei Key Laboratory of Engineering Modeling and Scientific Computing
In this paper we first propose a phase-field model for the containerless freezing problems, in which the volume expansion or shrinkage of the liquid caused by the density change during the phase change process is cons... 详细信息
来源: 评论
Helmet Detection for Motorcycle Ignition: A Computer Vision and Android-Based Approach  1
收藏 引用
8th International Conference on Innovative Technologies in Intelligent Systems and Industrial Applications, CITISIA 2023
作者: Hutabarat, Daniel Patricko Saleh, Robby Mae, Johannes Prasad, P.W.C. Computer Engineering Department Faculty of Engineering Bina Nusantara University West Jakarta Indonesia School of Computing Mathematics and Engineering Charles Sturt University Wagga WaggaNSW2678 Australia
To enhance safety and combat the motorcycle accident fatality rate, this research introduces a motorbike user authorization system that integrates computer vision technology and an Android application. The system is d... 详细信息
来源: 评论
Secure Data Embedding using Fourier Transform-based Watermarking  15
Secure Data Embedding using Fourier Transform-based Watermar...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Jaya Amruth, S. Sai Shruthik, V. Jayan, Sarada Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science Bengaluru India Amrita Vishwa Vidyapeetham Amrita School of Engineering Department of Mathematics Bengaluru India
The process of watermarking involves the incorporation of a distinct identifier into digital media. By embedding a watermark one can prevent unauthorized access and establish ownership. The main aim of this paper is t... 详细信息
来源: 评论