咨询与建议

限定检索结果

文献类型

  • 95,505 篇 会议
  • 56,006 篇 期刊文献
  • 1,465 册 图书
  • 2 篇 科技报告

馆藏范围

  • 152,976 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 90,628 篇 工学
    • 54,986 篇 计算机科学与技术...
    • 44,493 篇 软件工程
    • 21,776 篇 信息与通信工程
    • 15,262 篇 控制科学与工程
    • 14,239 篇 电气工程
    • 14,035 篇 电子科学与技术(可...
    • 10,825 篇 生物工程
    • 9,546 篇 生物医学工程(可授...
    • 8,536 篇 光学工程
    • 6,569 篇 机械工程
    • 5,780 篇 化学工程与技术
    • 5,521 篇 动力工程及工程热...
    • 5,506 篇 仪器科学与技术
    • 4,853 篇 材料科学与工程(可...
    • 3,393 篇 安全科学与工程
    • 3,248 篇 交通运输工程
  • 55,848 篇 理学
    • 26,086 篇 数学
    • 20,316 篇 物理学
    • 12,548 篇 生物学
    • 8,845 篇 统计学(可授理学、...
    • 6,510 篇 化学
    • 6,359 篇 系统科学
  • 21,729 篇 管理学
    • 13,936 篇 管理科学与工程(可...
    • 8,464 篇 图书情报与档案管...
    • 6,784 篇 工商管理
  • 9,839 篇 医学
    • 7,994 篇 临床医学
    • 6,998 篇 基础医学(可授医学...
    • 4,217 篇 药学(可授医学、理...
    • 3,780 篇 公共卫生与预防医...
  • 4,062 篇 法学
    • 3,475 篇 社会学
  • 2,726 篇 经济学
  • 1,971 篇 农学
  • 1,635 篇 教育学
  • 720 篇 文学
  • 310 篇 军事学
  • 181 篇 艺术学
  • 30 篇 哲学
  • 18 篇 历史学

主题

  • 3,663 篇 accuracy
  • 3,011 篇 deep learning
  • 2,859 篇 computational mo...
  • 2,831 篇 machine learning
  • 2,703 篇 computer science
  • 2,691 篇 feature extracti...
  • 2,506 篇 training
  • 1,935 篇 optimization
  • 1,832 篇 predictive model...
  • 1,748 篇 artificial intel...
  • 1,664 篇 internet of thin...
  • 1,628 篇 real-time system...
  • 1,600 篇 support vector m...
  • 1,419 篇 neural networks
  • 1,414 篇 convolutional ne...
  • 1,378 篇 wireless sensor ...
  • 1,300 篇 data mining
  • 1,299 篇 data models
  • 1,224 篇 educational inst...
  • 1,171 篇 computer archite...

机构

  • 1,754 篇 cavendish labora...
  • 1,104 篇 school of physic...
  • 1,047 篇 physikalisches i...
  • 1,018 篇 department for p...
  • 1,017 篇 department of el...
  • 1,006 篇 institute of phy...
  • 946 篇 department of ph...
  • 916 篇 institute of phy...
  • 892 篇 fakultät physik ...
  • 865 篇 physics departme...
  • 849 篇 department of ph...
  • 830 篇 niels bohr insti...
  • 830 篇 department of ph...
  • 822 篇 oliver lodge lab...
  • 819 篇 institute of hig...
  • 794 篇 horia hulubei na...
  • 793 篇 cern geneva
  • 782 篇 dipartimento di ...
  • 764 篇 department of ph...
  • 732 篇 west university ...

作者

  • 562 篇 bachacou h.
  • 549 篇 annovi a.
  • 519 篇 akimov a.v.
  • 506 篇 aad g.
  • 502 篇 alonso f.
  • 498 篇 alexopoulos t.
  • 497 篇 amidei d.
  • 496 篇 argyropoulos s.
  • 495 篇 anastopoulos c.
  • 495 篇 adelman j.
  • 494 篇 arnaez o.
  • 494 篇 alimonti g.
  • 492 篇 alexa c.
  • 489 篇 amelung c.
  • 488 篇 abulaiti y.
  • 486 篇 azuelos g.
  • 486 篇 arnold h.
  • 485 篇 aloisio a.
  • 482 篇 augsten k.
  • 481 篇 asai s.

语言

  • 141,735 篇 英文
  • 9,442 篇 其他
  • 1,635 篇 中文
  • 205 篇 日文
  • 32 篇 德文
  • 17 篇 法文
  • 16 篇 朝鲜文
  • 9 篇 斯洛文尼亚文
  • 7 篇 土耳其文
  • 5 篇 西班牙文
  • 5 篇 葡萄牙文
  • 4 篇 俄文
  • 3 篇 荷兰文
  • 2 篇 意大利文
  • 1 篇 爱沙尼亚文
检索条件"机构=School of Engineering Department of Computer Engineering and Informatics"
152978 条 记 录,以下是931-940 订阅
排序:
IensNet: A novel and efficient approach for iris spoof detection via ensemble of deep models
收藏 引用
Multimedia Tools and Applications 2025年 1-30页
作者: Sharma, Deepika Selwal, Arvind School of Computer Science Engineering and Technology Bennett University Greater Noida201310 India Department of Computer Science and Information Technology Central University of Jammu Samba India
Iris biometrics allow contactless authentication, which makes it widely deployed human recognition mechanisms since the couple of years. Susceptibility of iris identification systems remains a challenging task due to ... 详细信息
来源: 评论
User-Centered Phishing Detection through Personalized Edge Computing  24
User-Centered Phishing Detection through Personalized Edge C...
收藏 引用
27th ACM Conference on computer-Supported Cooperative Work and Social Computing, CSCW Companion 2024
作者: Das, Sanchari Kim, DongInn Abbott, Jacob Jean Camp, L. Ritchie School of Engineering and Computer Science University of Denver DenverCO United States Luddy School of Informatics Computing and Engineering Indiana University Bloomington BloomingtonIN United States
Ensuring user-centered phishing detection is a significant challenge due to the difficulty in distinguishing threats. To address this, we propose a personalized tool - Holistic User-Centered Identification of Threats ... 详细信息
来源: 评论
Quantum illumination with high-dimensional Bell states
收藏 引用
Physical Review A 2024年 第5期110卷 L050603-L050603页
作者: Armanpreet Pannu Amr S. Helmy Hesham El Gamal The Edward S. Rogers Department of Electrical and Computer Engineering University of Toronto Toronto Canada M5S 3G4 School of Electrical and Information Engineering Faculty of Engineering The University of Sydney Sydney 2008 Australia
We propose a protocol in quantum illumination (QI) leveraging entanglement in discrete-variable states. Our investigation shows that, as M→∞, the M-mode Bell state matches the 6 dB advantage of the two-mode squeezed... 详细信息
来源: 评论
Serendipity-Oriented Recommender System with Dynamic Unexpectedness Prediction
Serendipity-Oriented Recommender System with Dynamic Unexpec...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Tokutake, Yu Okamoto, Kazushi Graduate School of Informatics and Engineering The University of Electro-Communications Department of Informatics Tokyo Japan
With unexpectedness as a component of serendipity, many previous studies on serendipity-oriented recommender systems have quantified the degree of unexpectedness of items for users as a score. A user's browsing an... 详细信息
来源: 评论
Deep Neural Network and GAN-Based Reversible Data Hiding in Encrypted Images: A Privacy-Preserving Approach
收藏 引用
SN computer Science 2024年 第1期5卷 45页
作者: Nalavade, Jagannath E. Patil, Akshta Buchade, Amar Jadhav, Nagesh Department of Computer Science and Engineering MIT Art Design and Technology University School of Computing Pune India Department of Computer Engineering Rajarambapu Institute of Technology Sakharale Sangli India
In light of recent incidents involving the leakage of private photographs of Hollywood celebrities from iCloud, the need for robust methods to safeguard image content has gained paramount importance. This paper addres... 详细信息
来源: 评论
Direction-of-Arrival Estimation with Arbitrary Linear Array: A Turbo-HS Approach  5
Direction-of-Arrival Estimation with Arbitrary Linear Array:...
收藏 引用
5th IEEE International Conference on Power, Electronics and computer Applications, ICPECA 2025
作者: Chen, Zhendong Huang, Yongfeng Li, Dingzhao Lu, Xicheng Sun, Haixin School of Informatics Xiamen University Xiamen China School of Electronic Engineering and Computer Science Queen Mary University of London London United Kingdom
Conventional subspace-based direction-of-arrival (DOA) estimation algorithms require optimal environments to achieve satisfactory estimation accuracy. With the advancement of sparse signal recovery theory, sparse opti... 详细信息
来源: 评论
Using Eye-Tracking for Adaptive Human-Machine Interfaces for Pilots: A Literature Review and Sample Cases  13
Using Eye-Tracking for Adaptive Human-Machine Interfaces for...
收藏 引用
13th EASN International Conference on Innovation in Aviation and Space for Opening New Horizons
作者: Xenos, Michalis Mallas, Andreas Minas, Dimosthenis Computer Engineering and Informatics Department Patras University Rio Campus RioGR26500 Greece
This paper explores the potential of eye-tracking technology in adaptive human-machine interfaces for pilots in aviation. We argue that an interface able to adjust its layout and elements based on pilots' real-tim... 详细信息
来源: 评论
Automated Classification and Segmentation of Brain Tumor Images using Backboned ResUNet Framework  6
Automated Classification and Segmentation of Brain Tumor Ima...
收藏 引用
6th International Conference on Mobile Computing and Sustainable informatics, ICMCSI 2025
作者: Prasanalakshmi, B. Anitha, Cuddapah Balamanigandan, R. Mahaveerakannan, R. Gade, N.V. Ratnakishor Adjunct Faculty Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India Department of Computer Science and Engineering School of Computing Mohan Babu University Andhra Pradesh Tirupati India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India
One of the most challenging issues in computer imaging is the automated segmentation of brain tumors using Magnetic Resonance Images (MRI). Several approaches are explored using Deep Neural Networks in image segmentat... 详细信息
来源: 评论
A Novel Drone-Station Matching model in Smart Cities based on Strict Preferences
收藏 引用
无人系统(英文) 2023年 第3期11卷 261-271页
作者: Debolina Nath Anjan Bandyopadhyay Ankit Rana Tarek Gaber Aboul Ella Hassanien Department of Computer Science and Engineering Amity University Kolkata KolkataWest BengalIndia Department of Computer Science and Engineering Gitam University BangaloreKarnatakaIndia School of Science Engineeringand Environment University of SalfordUK Faculty of Computers and Informatics Suez Canal UniversityIsmailiaEgypt Scientific Research Group in Egypt(SRGE) Egypt Faculty of Computer and Artificial Intelligence Cairo UniversityCairoEgypt Scientific Research Group in Egypt(SRGE) Egypt
There has been a considerable increase in the use of drones,or unmanned aerial vehicles(UAVs),in recent times,for a wide variety of purposes such as security,surveillance,delivery,search and rescue operations,penetrat... 详细信息
来源: 评论
A Cyber-Attack Detection System Using Late Fusion Aggregation Enabled Cyber-Net
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3101-3119页
作者: P.Shanmuga Prabha S.Magesh Kumar Department of Computer Science and Engineering Saveetha School of EngineeringSaveetha Institute of Medical and Technical Sciences(Deemed to be University)ChennaiTamilnaduIndia
Today,securing devices connected to the internet is challenging as security threats are generated through various *** protection of cyber-physical systems from external attacks is a primary *** presented method is pla... 详细信息
来源: 评论