咨询与建议

限定检索结果

文献类型

  • 12,477 篇 会议
  • 10,238 篇 期刊文献
  • 208 册 图书
  • 1 篇 科技报告

馆藏范围

  • 22,924 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,599 篇 工学
    • 8,004 篇 计算机科学与技术...
    • 6,533 篇 软件工程
    • 3,034 篇 信息与通信工程
    • 2,496 篇 控制科学与工程
    • 2,217 篇 电子科学与技术(可...
    • 2,051 篇 电气工程
    • 1,547 篇 生物工程
    • 1,371 篇 机械工程
    • 1,361 篇 光学工程
    • 1,122 篇 仪器科学与技术
    • 1,089 篇 生物医学工程(可授...
    • 1,076 篇 化学工程与技术
    • 930 篇 材料科学与工程(可...
    • 758 篇 动力工程及工程热...
    • 518 篇 交通运输工程
    • 423 篇 安全科学与工程
    • 412 篇 航空宇航科学与技...
  • 8,576 篇 理学
    • 3,771 篇 数学
    • 3,111 篇 物理学
    • 1,755 篇 生物学
    • 1,303 篇 统计学(可授理学、...
    • 1,067 篇 化学
    • 1,043 篇 系统科学
  • 3,397 篇 管理学
    • 2,252 篇 管理科学与工程(可...
    • 1,219 篇 图书情报与档案管...
    • 1,040 篇 工商管理
  • 1,092 篇 医学
    • 911 篇 临床医学
    • 745 篇 基础医学(可授医学...
    • 428 篇 药学(可授医学、理...
  • 556 篇 法学
    • 471 篇 社会学
  • 408 篇 经济学
  • 264 篇 农学
  • 217 篇 教育学
  • 94 篇 军事学
  • 65 篇 文学
  • 46 篇 艺术学
  • 4 篇 哲学
  • 2 篇 历史学

主题

  • 392 篇 deep learning
  • 240 篇 machine learning
  • 224 篇 feature extracti...
  • 196 篇 computational mo...
  • 192 篇 internet of thin...
  • 190 篇 training
  • 178 篇 optimization
  • 177 篇 computer science
  • 168 篇 simulation
  • 167 篇 neural networks
  • 164 篇 wireless communi...
  • 160 篇 reinforcement le...
  • 158 篇 information syst...
  • 153 篇 support vector m...
  • 149 篇 accuracy
  • 142 篇 computer archite...
  • 139 篇 routing
  • 130 篇 image segmentati...
  • 129 篇 systems engineer...
  • 124 篇 object detection

机构

  • 196 篇 science and tech...
  • 70 篇 center of materi...
  • 66 篇 information syst...
  • 65 篇 department of la...
  • 63 篇 nagoya universit...
  • 63 篇 school of comput...
  • 63 篇 college of infor...
  • 58 篇 tsinghua univers...
  • 51 篇 school of comput...
  • 50 篇 school of comput...
  • 47 篇 center for space...
  • 43 篇 national univers...
  • 41 篇 academy of mathe...
  • 40 篇 university of sc...
  • 40 篇 school of gradua...
  • 40 篇 university of ch...
  • 39 篇 department of ph...
  • 38 篇 center for astro...
  • 38 篇 department of ph...
  • 38 篇 school of comput...

作者

  • 121 篇 niyato dusit
  • 88 篇 ozawa s.
  • 82 篇 uchihori y.
  • 81 篇 katayose y.
  • 67 篇 jui c.c.h.
  • 67 篇 oshima a.
  • 66 篇 kim j.h.
  • 64 篇 bergman d.r.
  • 61 篇 tamura t.
  • 61 篇 allen m.
  • 58 篇 ishii t.
  • 56 篇 tsuda r.
  • 54 篇 shiomi a.
  • 53 篇 kawakubo y.
  • 52 篇 matsuyama t.
  • 51 篇 binns w.r.
  • 51 篇 cherry m.l.
  • 51 篇 wong t.
  • 50 篇 castellini g.
  • 50 篇 ohnishi m.

语言

  • 21,609 篇 英文
  • 802 篇 其他
  • 427 篇 中文
  • 82 篇 日文
  • 6 篇 法文
  • 4 篇 德文
  • 3 篇 朝鲜文
  • 3 篇 斯洛文尼亚文
  • 1 篇 荷兰文
检索条件"机构=Science and Technology on Information Systems Engineering Lab"
22924 条 记 录,以下是471-480 订阅
排序:
Bidirectional Polarization-Multiplexing Fiber Laser Enabling Tunable-Repetition-Rate Dual Combs  8
Bidirectional Polarization-Multiplexing Fiber Laser Enabling...
收藏 引用
8th Optoelectronics Global Conference, OGC 2023
作者: Liu, Bowen Dai, Maolin Shirahata, Takuma Yamashita, Shinji Set, Sze Yun The University of Tokyo Research Center for Advanced Science and Technology Department of Electrical Engineering and Information Systems Tokyo Japan The University of Tokyo Department of Electrical Engineering and Information Systems Tokyo Japan The University of Tokyo Research Center for Advanced Science and Technology Tokyo Japan
Ultrafast laser is an ideal playground for the study of precise spectroscopy and microscopy that heavily rely on the high-performance optical frequency combs, which is the unique nature of mode-locked fiber lasers. In... 详细信息
来源: 评论
Fractal dimension analysis for improved decision-making in non-stationary multi-arm bandit problems: a machine learning approach
收藏 引用
The European Physical Journal Special Topics 2025年 1-16页
作者: Nandhini, S. Kala Pandian, J. Arun Department of Computer Applications School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
In this research, we propose a novel approach to addressing the exploration–exploitation dilemma in multi-armed bandit (MAB) algorithms using fractal dimensions. The fractal dimension is used in the algorithms to rep...
来源: 评论
Deepfake Detection using XAI based Deep Fusion Models  2
Deepfake Detection using XAI based Deep Fusion Models
收藏 引用
2nd International Conference on Computational Intelligence, Communication technology and Networking, CICTN 2025
作者: Anitha, A. Saju, Lis Maria Kamaraj, Balakrishnan School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Madurai Medical College Tamilnadu Madurai India
Deepfake technology has rapidly evolved, posing a serious threat to the authenticity of digital media and contributing to the spread of misinformation. The manipulation of media content raises significant concerns acr... 详细信息
来源: 评论
Utilizing Automatic Number Plate Recognition for an Intelligent Campus Gate Security System  6
Utilizing Automatic Number Plate Recognition for an Intellig...
收藏 引用
6th IEEE Symposium on Computers and Informatics, ISCI 2024
作者: Limon, John Christopher Botangen, Khavee Agustus Malaca, Marc Joel Bermoza, Ryan Vidania, Noli Central Luzon State University Department of Information Technology Science City of Muñoz Philippines Central Luzon State University Cyber-Physical Systems and IoT Lab Department of Information Technology Science City of Muñoz Philippines
The Central Luzon State University (CLSU) campus, covering 658 hectares, experiences thousands of vehicle entries and exits daily. Ensuring campus safety and security is of utmost importance, and efficient monitoring ... 详细信息
来源: 评论
Suitable is the Best: Task-Oriented Knowledge Fusion in Vulnerability Detection  38
Suitable is the Best: Task-Oriented Knowledge Fusion in Vuln...
收藏 引用
38th Conference on Neural information Processing systems, NeurIPS 2024
作者: Wang, Jingjing Huang, Minhuan Nie, Yuanpin Li, Xiang Du, Qianjin Kong, Wei Deng, Huan Kuang, Xiaohui Institute of Systems Engineering Academy of Military Sciences PLA China Department of Computer Science and Technology Tsinghua University China School of Information Science and Engineering Zhejiang Sci-Tech University China
Deep learning technologies have demonstrated remarkable performance in vulnerability detection. Existing works primarily adopt a uniform and consistent feature learning pattern across the entire target set. While desi...
来源: 评论
Fusion of speech and handwritten signatures biometrics for person identification
收藏 引用
International Journal of Speech technology 2023年 第4期26卷 833-850页
作者: Abushariah, Ahmad A. M. Abushariah, Mohammad A. M. Gunawan, Teddy Surya Chebil, J. Alqudah, Assal A. M. Ting, Hua-Nong Mustafa, Mumtaz Begum Peer Faculty of Engineering University of Malaya Kuala Lumpur50603 Malaysia Department of Computer Information Systems King Abdullah II School of Information Technology The University of Jordan Amman Jordan ECE Department Faculty of Engineering International Islamic University Malaysia Kuala Lumpur53100 Malaysia Department of Computer Science Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan Department of Biomedical Engineering Faculty of Engineering University of Malaya Kuala Lumpur50603 Malaysia Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur50603 Malaysia
Automatic person identification (API) using human biometrics is essential and highly demanded compared to traditional API methods, where a person is automatically identified using his/her distinct characteristics incl... 详细信息
来源: 评论
Comprehensive Overview and Analytical Study on Automatic Bird Repellent Laser System for Crop Protection
收藏 引用
Journal of Harbin Institute of technology(New Series) 2024年 第1期31卷 38-53页
作者: Sireesha Abotula Srinivas Gorla Prasad Reddy PVGD Mohankrishna S Department of Computer Science and Engineering GITAM Deemed to be UniversityVisakhapatnam 530045India Department of Information Technology Andhra UniversityVisakhapatnam 530003India Department of Computer Science and Systems Engineering Andhra UniversityVisakhapatnam 530003India
Birds are a huge hazard to agriculture all around the world,causing harm to profitable field *** use a variety of techniques to keep them away,including visual,auditory,tactile,and olfactory deterrents. This study pre... 详细信息
来源: 评论
CSST Dense Star Field Preparation:A Framework for Astrometry and Photometry for Dense Star Field Images Obtained by the China Space Station Telescope(CSST)
收藏 引用
Research in Astronomy and Astrophysics 2024年 第7期24卷 158-169页
作者: Yining Wang Rui Sun Tianyuan Deng Chenghui Zhao Peixuan Zhao Jiayi Yang Peng Jia Huigen Liu Jilin Zhou College of Electronic Information and Optical Engineering Taiyuan University of TechnologyTaiyuan 030024China School of Astronomy&Space Science Nanjing UniversityNanjing 210093China Peng Cheng Lab Shenzhen 518066China
The China Space Station Telescope(CSST)is a telescope with 2 m diameter,obtaining images with high quality through wide-field *** its first observation cycle,to capture time-domain observation data,the CSST is propose... 详细信息
来源: 评论
Autism Detection using InceptionV3 and Security using Blockchain  8
Autism Detection using InceptionV3 and Security using Blockc...
收藏 引用
8th International Conference on Electronics, Communication and Aerospace technology, ICECA 2024
作者: Annie Silviya, S.H. Seetha, R. Raja, S. Sriman, B. Rupesh, S. Gopala Krishnan, J. Rajalakshmi Institute of Technology Computer Science Engineering Chennai India Vellore Institute of Technology Computer Science Engineering and Information Systems Vellore India Panimalar Engineering College Computer Science and Engineering Chennai India Institute of Science and Technology Computer Science and Engineering Vel Tech Rangarajan Dr Sagunthala R&d Chennai India Rajalakshmi Institute of Technology Computer and Communication Engineering Chennai India
The mental health and well-being of children are critical components of their overall development and future success. In India, only 1 in 6 8 children are diagnosed with autism, since monitoring and addressing the men... 详细信息
来源: 评论
The impact of information dissemination on vaccination in multiplex networks
收藏 引用
science China(information sciences) 2022年 第7期65卷 185-196页
作者: Xiao-Jie LI Cong LI Xiang LI Adaptive Networks and Control Lab Department of Electronic EngineeringFudan University Research Center of Smart Networks and Systems School of Information Science and EngineeringFudan University MOE Frontiers Center for Brain Science Institutes of Brain Science Fudan University
The impact of information dissemination on epidemic control is essentially subject to individual behaviors. Vaccination is one of the most effective strategies against the epidemic spread, whose correlation with the i... 详细信息
来源: 评论