咨询与建议

限定检索结果

文献类型

  • 35,957 篇 会议
  • 16,227 篇 期刊文献
  • 567 册 图书

馆藏范围

  • 52,751 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 28,572 篇 工学
    • 16,071 篇 计算机科学与技术...
    • 12,804 篇 软件工程
    • 6,470 篇 信息与通信工程
    • 6,093 篇 控制科学与工程
    • 5,140 篇 电气工程
    • 4,511 篇 电子科学与技术(可...
    • 2,572 篇 生物工程
    • 2,443 篇 机械工程
    • 2,109 篇 生物医学工程(可授...
    • 1,839 篇 动力工程及工程热...
    • 1,836 篇 光学工程
    • 1,701 篇 仪器科学与技术
    • 1,350 篇 化学工程与技术
    • 1,245 篇 材料科学与工程(可...
    • 985 篇 交通运输工程
    • 925 篇 安全科学与工程
  • 16,007 篇 理学
    • 8,114 篇 数学
    • 4,813 篇 物理学
    • 3,024 篇 生物学
    • 2,814 篇 系统科学
    • 2,683 篇 统计学(可授理学、...
    • 1,480 篇 化学
  • 6,192 篇 管理学
    • 4,243 篇 管理科学与工程(可...
    • 2,202 篇 工商管理
    • 2,180 篇 图书情报与档案管...
  • 2,064 篇 医学
    • 1,710 篇 临床医学
    • 1,446 篇 基础医学(可授医学...
    • 859 篇 药学(可授医学、理...
  • 1,136 篇 法学
    • 963 篇 社会学
  • 817 篇 经济学
    • 807 篇 应用经济学
  • 513 篇 教育学
  • 454 篇 农学
  • 168 篇 文学
  • 109 篇 军事学
  • 64 篇 艺术学
  • 9 篇 哲学
  • 4 篇 历史学

主题

  • 1,398 篇 systems engineer...
  • 1,279 篇 control systems
  • 1,126 篇 computer science
  • 1,016 篇 computational mo...
  • 665 篇 application soft...
  • 635 篇 bandwidth
  • 633 篇 laboratories
  • 620 篇 costs
  • 598 篇 computer archite...
  • 568 篇 testing
  • 564 篇 deep learning
  • 552 篇 optimization
  • 549 篇 machine learning
  • 542 篇 accuracy
  • 541 篇 feature extracti...
  • 538 篇 robustness
  • 532 篇 neural networks
  • 520 篇 artificial intel...
  • 513 篇 switches
  • 503 篇 hardware

机构

  • 510 篇 department of sy...
  • 403 篇 department of el...
  • 402 篇 department of sy...
  • 362 篇 department of sy...
  • 166 篇 electrical compu...
  • 118 篇 department of sy...
  • 105 篇 department of el...
  • 94 篇 department of co...
  • 80 篇 computer and sys...
  • 75 篇 ieee
  • 73 篇 center for power...
  • 66 篇 department of el...
  • 62 篇 department of el...
  • 61 篇 department of el...
  • 53 篇 department of sy...
  • 49 篇 department of el...
  • 48 篇 department of co...
  • 46 篇 computer and sys...
  • 46 篇 department of el...
  • 45 篇 department of la...

作者

  • 142 篇 halim yanikomero...
  • 104 篇 yanikomeroglu ha...
  • 96 篇 niyato dusit
  • 55 篇 bernhard schölko...
  • 52 篇 hisao ishibuchi
  • 50 篇 d.g. holmes
  • 42 篇 f. richard yu
  • 40 篇 paolo mattavelli
  • 40 篇 gabriel wainer
  • 40 篇 m. zahn
  • 37 篇 sofotasios pasch...
  • 32 篇 kurt gunes karab...
  • 32 篇 pedrycz witold
  • 31 篇 venayagamoorthy ...
  • 30 篇 sreeraman rajan
  • 30 篇 jiang liu
  • 28 篇 hong choong seon
  • 28 篇 john s. baras
  • 27 篇 a.u.h. sheikh
  • 26 篇 el-sayed m.el-ke...

语言

  • 46,698 篇 英文
  • 5,400 篇 其他
  • 638 篇 中文
  • 39 篇 日文
  • 13 篇 德文
  • 8 篇 法文
  • 5 篇 葡萄牙文
  • 5 篇 俄文
  • 5 篇 斯洛文尼亚文
  • 3 篇 阿拉伯文
  • 3 篇 西班牙文
  • 2 篇 朝鲜文
  • 1 篇 芬兰文
  • 1 篇 荷兰文
  • 1 篇 土耳其文
检索条件"机构=Systems Engineering and Computer Department"
52751 条 记 录,以下是211-220 订阅
排序:
Smart Business with Intelligent Business Cards (SBIBC)
Smart Business with Intelligent Business Cards (SBIBC)
收藏 引用
2024 International Conference on System, Computation, Automation and Networking, ICSCAN 2024
作者: Kirubakaran, N. Preethi, S.T. Parijatham, R. Pramithi, R. Chennai Institute of Technology Department of Computer Science and Business Systems Chennai India S.A. Engineering College Department of Computer Science and Engineering Chennai India Madha Institute Engineering and Technology Department of Computer Science and Engineering Chennai India
The research emphasizes the creation of a powerful and efficient system for the automaticextraction of contact information from physical calling cards through computer vision and information extraction techniques. Thi... 详细信息
来源: 评论
Optimizing Deepfake Detection with Transfer Learning Methods  1
Optimizing Deepfake Detection with Transfer Learning Methods
收藏 引用
1st International Conference on Innovations in Communications, Electrical and computer engineering, ICICEC 2024
作者: Kingsy Grace, R. Ragavan, M. Karthikeyan, N. Prakalathan, M. Saveetha, V. Sri Ramakrishna Engineering College Department of Computer Science and Engineering Coimbatore India KGiSL Institute of Technology Department of Computer Science & Business Systems Coimbatore India
The goal of the proposed system is to identify whether a video has endured software manipulation or not. This system specially deals with identifying deepfake videos from real ones. As new techniques emerged to make d... 详细信息
来源: 评论
SeRTS: Self-Rewarding Tree Search for Biomedical Retrieval-Augmented Generation
SeRTS: Self-Rewarding Tree Search for Biomedical Retrieval-A...
收藏 引用
2024 Findings of the Association for Computational Linguistics, EMNLP 2024
作者: Hu, Minda Zong, Licheng Wang, Hongru Zhou, Jingyan Li, Jingjing Gao, Yichen Wong, Kam-Fai Li, Yu King, Irwin Department of Computer Science and Engineering Hong Kong Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong Hong Kong
Large Language Models (LLMs) have shown great potential in the biomedical domain with the advancement of retrieval-augmented generation (RAG). However, existing retrieval-augmented approaches face challenges in addres...
来源: 评论
A novel deep learning approach for automated grading of knee osteoarthritis severity
收藏 引用
Multimedia Tools and Applications 2024年 1-20页
作者: Kaur, PrabSimran Kohli, Guneet Singh Bedi, Jatin Wasly, Saud Department of Computer Science and Engineering Thapar Institute of Engineering and Technology Punjab Patiala India Electrical and Computer Engineering Department King Abdulaziz University Jeddah22254 Saudi Arabia Center of Excellence in Intelligent Engineering Systems King Abdulaziz University Jeddah22254 Saudi Arabia
Knee Osteoarthritis (OA) is a prevalent musculoskeletal disorder that affects the knee joint that causes pain, stiffness, and reduced mobility. It is also known as "Degenerative Joint Disease" and is caused ... 详细信息
来源: 评论
An Intelligent Privacy Protection Scheme for Efficient Edge Computation Offloading in IoV
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 910-919页
作者: Liang YAO Xiaolong XU Wanchun DOU Muhammad Bilal School of Software Nanjing University of Information Science and Technology State Key Laboratory for Novel Software Technology Nanjing University Department of Computer and Electronics Systems Engineering Hankuk University of Foreign Studies
As a pivotal enabler of intelligent transportation system(ITS), Internet of vehicles(Io V) has aroused extensive attention from academia and industry. The exponential growth of computation-intensive, latency-sensitive... 详细信息
来源: 评论
Enhancing Automated Android Application Security through Hybrid Static and Dynamic Analysis Techniques  6
Enhancing Automated Android Application Security through Hyb...
收藏 引用
6th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2024
作者: Manukulasooriya, G.E. Munasingha, R.S.I. Fernando, Harinda Uthpali, H.K.I. Yeshani, A.V.S.H. Siriwardana, Deemantha Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
The rapid growth of mobile applications has led to serious security challenges, resulting in vulnerabilities. Automation in security testing methods is becoming popular, with the Automated Vulnerability Detection meth... 详细信息
来源: 评论
Banking in the Digital Age: Predicting Eligible Customers through Machine Learning and AWS  1
Banking in the Digital Age: Predicting Eligible Customers th...
收藏 引用
1st IEEE Karachi Section Humanitarian Technology Conference, Khi-HTC 2024
作者: Ali, Asfand Irfan, Asim Raza, Ali Memon, Zainab Mehran University of Engineering and Technology Department of Telecommunication Engineering Jamshoro Pakistan Mehran University of Engineering and Technology Computer Systems Engineering Jamshoro Pakistan Quaid-e-Awam University of Engineering Science and Technology Computer Systems Engineering Nawabshah Pakistan
This research project focuses on utilizing machine learning techniques to predict loan default among applicants in the context of financial organizations. Loan approval decisions carry substantial risks, and not all a... 详细信息
来源: 评论
Theoretical Approach to Backdoor Attack on CRYSTALS-Dilithium  19thth
Theoretical Approach to Backdoor Attack on CRYSTALS-Dilith...
收藏 引用
19th International Conference on computer Aided systems Theory, EUROCAST 2024
作者: Pérez-Ramos, É. Caballero-Gil, P. Department of Computer Engineering and Systems University of La Laguna Tenerife La Laguna38271 Spain
Post-quantum cryptography has recently witnessed the emergence of new and prominent representatives, such as the new standard for quantum-safe digital signatures, called CRYSTALS-Dilithium. This work presents a theore... 详细信息
来源: 评论
Survey of road anomalies detection methods
收藏 引用
International Journal of Intelligent systems Technologies and Applications 2023年 第3期21卷 280-302页
作者: Saffarini, Rasha Khamayseh, Faisal Daraghmi, Yousef-Awwad Elyan, Derar Sabha, Muath Department of Natural Engineering and Technology Sciences Arab American University Jenin Palestine Department of Computer Systems Engineering Palestine Polytechnic University Hebron Palestine Department of Computer Systems Engineering Palestine Technical University Tulkarm Palestine Department of Applied Computing Palestine Technical University Tulkarm Palestine Department of Multimedia Technology Arab American University Jenin Palestine
Automatic road anomaly detection and recognition systems are essential due to their effect on the comfort and safety of drivers and passengers. Drivers should be aware of bad road conditions and the existence of anoma... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, Sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论