咨询与建议

限定检索结果

文献类型

  • 94,711 篇 会议
  • 55,207 篇 期刊文献
  • 44 册 图书
  • 2 篇 科技报告

馆藏范围

  • 149,962 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 89,443 篇 工学
    • 54,297 篇 计算机科学与技术...
    • 44,162 篇 软件工程
    • 21,547 篇 信息与通信工程
    • 14,936 篇 控制科学与工程
    • 14,026 篇 电气工程
    • 13,846 篇 电子科学与技术(可...
    • 10,762 篇 生物工程
    • 9,432 篇 生物医学工程(可授...
    • 8,470 篇 光学工程
    • 6,523 篇 机械工程
    • 5,726 篇 化学工程与技术
    • 5,469 篇 仪器科学与技术
    • 5,466 篇 动力工程及工程热...
    • 4,750 篇 材料科学与工程(可...
    • 3,355 篇 安全科学与工程
    • 3,210 篇 交通运输工程
  • 55,334 篇 理学
    • 25,892 篇 数学
    • 20,084 篇 物理学
    • 12,478 篇 生物学
    • 8,792 篇 统计学(可授理学、...
    • 6,400 篇 化学
    • 6,344 篇 系统科学
  • 21,577 篇 管理学
    • 13,839 篇 管理科学与工程(可...
    • 8,407 篇 图书情报与档案管...
    • 6,736 篇 工商管理
  • 9,680 篇 医学
    • 7,844 篇 临床医学
    • 6,924 篇 基础医学(可授医学...
    • 4,213 篇 药学(可授医学、理...
    • 3,721 篇 公共卫生与预防医...
  • 4,041 篇 法学
    • 3,458 篇 社会学
  • 2,711 篇 经济学
  • 1,940 篇 农学
  • 1,609 篇 教育学
  • 719 篇 文学
  • 310 篇 军事学
  • 179 篇 艺术学
  • 29 篇 哲学
  • 18 篇 历史学

主题

  • 3,596 篇 accuracy
  • 2,920 篇 deep learning
  • 2,831 篇 computational mo...
  • 2,718 篇 machine learning
  • 2,699 篇 computer science
  • 2,658 篇 feature extracti...
  • 2,468 篇 training
  • 1,886 篇 optimization
  • 1,805 篇 predictive model...
  • 1,669 篇 internet of thin...
  • 1,586 篇 support vector m...
  • 1,584 篇 real-time system...
  • 1,411 篇 neural networks
  • 1,377 篇 wireless sensor ...
  • 1,377 篇 convolutional ne...
  • 1,287 篇 data mining
  • 1,272 篇 data models
  • 1,224 篇 educational inst...
  • 1,162 篇 computer archite...
  • 1,124 篇 robustness

机构

  • 1,750 篇 cavendish labora...
  • 1,099 篇 school of physic...
  • 1,050 篇 physikalisches i...
  • 1,017 篇 department for p...
  • 1,001 篇 institute of phy...
  • 993 篇 department of el...
  • 946 篇 department of ph...
  • 916 篇 institute of phy...
  • 886 篇 fakultät physik ...
  • 866 篇 physics departme...
  • 849 篇 department of ph...
  • 835 篇 department of ph...
  • 830 篇 niels bohr insti...
  • 820 篇 oliver lodge lab...
  • 819 篇 institute of hig...
  • 791 篇 cern geneva
  • 787 篇 horia hulubei na...
  • 780 篇 dipartimento di ...
  • 762 篇 department of ph...
  • 732 篇 west university ...

作者

  • 562 篇 bachacou h.
  • 547 篇 annovi a.
  • 512 篇 akimov a.v.
  • 503 篇 aad g.
  • 499 篇 alonso f.
  • 495 篇 alexopoulos t.
  • 494 篇 amidei d.
  • 493 篇 argyropoulos s.
  • 492 篇 anastopoulos c.
  • 492 篇 adelman j.
  • 491 篇 arnaez o.
  • 489 篇 alimonti g.
  • 487 篇 alexa c.
  • 486 篇 amelung c.
  • 483 篇 arnold h.
  • 483 篇 abulaiti y.
  • 481 篇 azuelos g.
  • 480 篇 aloisio a.
  • 480 篇 adye t.
  • 479 篇 augsten k.

语言

  • 142,386 篇 英文
  • 5,804 篇 其他
  • 1,592 篇 中文
  • 205 篇 日文
  • 16 篇 德文
  • 16 篇 法文
  • 15 篇 朝鲜文
  • 7 篇 斯洛文尼亚文
  • 7 篇 土耳其文
  • 6 篇 荷兰文
  • 5 篇 葡萄牙文
  • 2 篇 西班牙文
  • 2 篇 俄文
  • 1 篇 爱沙尼亚文
检索条件"机构=School of Engineering Department of Computer Engineering and Informatics"
149964 条 记 录,以下是4901-4910 订阅
排序:
Touch Pointer Movement-Based PIN Entry in Smartphones to Assist Persons with Visual Impairments  3rd
Touch Pointer Movement-Based PIN Entry in Smartphones to A...
收藏 引用
3rd International Conference on "Emerging Trends and Technologies on Intelligent Systems" (ETTIS-2023)
作者: Balayogi, G. Kuppusamy, K.S. Department of Computer Science School of Engineering and Technology Pondicherry University Puducherry India
Usable security is an area of active research. Several factors needs to be considered while making the security usable. As the digital platforms have evolved into the primary source of information and service consumpt... 详细信息
来源: 评论
Streamlined Data Pipeline for Real-Time Threat Detection and Model Inference  17
Streamlined Data Pipeline for Real-Time Threat Detection and...
收藏 引用
17th International Conference on COMmunication Systems and NETworkS, COMSNETS 2025
作者: Singh, Rajkanwar Aravindan, V. Mishra, Sanket Singh, Sunil Kumar VIT-AP University School of Computer Science & Engineering Andhra Pradesh Amaravati India Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Department of Computer Science and Engineering Karnataka Manipal India
Real-time threat detection in streaming data is crucial yet challenging due to varying data volumes and speeds. This paper presents an architecture designed to manage large-scale, high-speed data streams using deep le... 详细信息
来源: 评论
Automated Regional Language News Article Classification System for Kannada and Telugu  5
Automated Regional Language News Article Classification Syst...
收藏 引用
5th IEEE International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2025
作者: Gupta, Deepa Thejaa, K. Nair, Aarathi Rajagopalan Katti, Panduranga Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Bengaluru India
The increasing amount of digital news content has created a pressing need for automated systems that can efficiently organize and categorize articles. This study focuses on developing an automated classification syste... 详细信息
来源: 评论
Revolutionizing Brain Stroke Classification with Neuro-Xception and ELM Integration in Deep Learning  2
Revolutionizing Brain Stroke Classification with Neuro-Xcept...
收藏 引用
2nd International Conference on Computing and Data Analytics, ICCDA 2024
作者: Jagadeesan, S. Ramalingam, Venkadeshan Abinash, P. Ilayaraja, V. Masood, Jafar Ali Ibrahim Syed Tamil Priya, D. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India UTAS-Shinas branch Department of Computing and Information Sciences Oman School of Computer Science and Engineering Vellore Institute of Technology Vellore India
Stroke and related neurological disorders are difficult to classify accurately, hence new computational approaches are needed to enhance diagnosis. In order to transform the categorization of brain strokes, this study... 详细信息
来源: 评论
Sequential Signal Mixing Aggregation for Message Passing Graph Neural Networks  38
Sequential Signal Mixing Aggregation for Message Passing Gra...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Taraday, Mitchell Keren David, Almog Baskin, Chaim Department of Computer Science Technion Haifa Israel School of Electrical and Computer Engineering Ben-Gurion University of the Negev Be'er Sheva Israel
Message Passing Graph Neural Networks (MPGNNs) have emerged as the preferred method for modeling complex interactions across diverse graph entities. While the theory of such models is well understood, their aggregatio...
来源: 评论
Simultaneous improving luminescence intensity and stability of CsPbBr_(3):SCN−@Eu/Zr-Uio-66-NH_(2) with tunable emissions from blue to green and applications in indoor photovoltaics
收藏 引用
Nano Research 2024年 第8期17卷 6879-6887页
作者: Minze Li Yao Sun Honglai Lu Peifen Zhu Ruihong Wang Guofeng Wang Key Laboratory of Functional Inorganic Material Chemistry Ministry of EducationSchool of Chemistry and Materials ScienceHeilongjiang UniversityHarbin 150080China Department of Electrical Engineering and Computer Science University of MissouriColumbiaMO 65211USA
The construction of stable and efficient materials that emit blue and green light remains a *** the blue light materials reported,metal-organic framework(MOF)materials are rarely reported as blue phosphors due to thei... 详细信息
来源: 评论
Fingerprint Identification of Generative Models Using a MultiFormer Ensemble Approach  25
Fingerprint Identification of Generative Models Using a Mult...
收藏 引用
25th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF 2024
作者: Emon, Md Ismail Siddiqi Hoque, Mahmudul Hasan, Md Rakibul Khalifa, Fahmi Rahman, Md Mahmudur Department of Computer Science SCMNS School Morgan State University BaltimoreMD21251 United States Electrical & Computer Engineering Dept. School of Engineering Morgan State University BaltimoreMD21251 United States
In the ever-changing realm of medical image processing, ImageCLEF brought a new dimension with the Identifying GAN Fingerprint task, catering to the advancement of visual media analysis. This year, the author presente... 详细信息
来源: 评论
IoT-Enabled Sleep Monitoring Wearables: Advancements in Tracking and Analysis  2
IoT-Enabled Sleep Monitoring Wearables: Advancements in Trac...
收藏 引用
2nd International Conference on computer, Communication and Control, IC4 2024
作者: Thinakaran, K. Baskar, V. Vijaya Shariff, M. Ahsan Chervith, Manduva Raghavendra, G. Velmurugan, S. Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India Sathyabama Institute of Science and Technology School of Electrical and Electronics Engineering Tamil Nadu Chennai India Sri Sai Ram Engineering College M.Tech Computer Science and Engineering Tamil Nadu Chennai India Srm Institute of Science and Technology Department of Computer Science and Engineering Tamil NaduKattankulathur Chennai India Mother Theresa Institute of Engineering and Technology Department of Electronics and Communication Engineering Andhra Pradesh Palamaner India T.J.S. Engineering College Department of Electronics and Communication Engineering Tamil Nadu Chennai India
The importance of sleep to a person's health and well-being cannot be overstated. Sleep monitoring and analysis control has been transformed by the combination of Internet of Things (IoT) technologies and wearable... 详细信息
来源: 评论
Detection of Cyber Attacks in Smart Grid Using Optimization and Deep Learning Techniques  14
Detection of Cyber Attacks in Smart Grid Using Optimization ...
收藏 引用
14th International Conference on Computing Communication and Networking Technologies, ICCCNT 2023
作者: Simonthomas, S. Subramanian, R. Pondicherry University School of Engineering and Technology Department of Computer Science Pondicherry India
Smart Grids are complex and interconnected systems that are vulnerable to cyber-attacks, which can result in severe consequences such as equipment damage, data theft, and power outages. Therefore, developing effective... 详细信息
来源: 评论
Comparing the Effectiveness of Machine Learning and Deep Learning Techniques for Feature Envy Detection in Software Systems  1
Comparing the Effectiveness of Machine Learning and Deep Lea...
收藏 引用
1st International Conference of Intelligent Methods, Systems and Applications, IMSA 2023
作者: Menshawy, Rana S. Yousef, Ahmed H. Salem, Ashraf Faculty of Engineering Computer and System Department Ain Shams University Cairo Egypt Egypt University of Informatics Cairo Egypt
Code smells are common in poorly designed software that can hinder code maintainability. Automatic detection of design flaws assists developers in identifying code smells in theirsoftware programs to avoid low-quality... 详细信息
来源: 评论