咨询与建议

限定检索结果

文献类型

  • 6,702 篇 会议
  • 6,533 篇 期刊文献
  • 263 册 图书

馆藏范围

  • 13,498 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,265 篇 工学
    • 5,702 篇 计算机科学与技术...
    • 4,463 篇 软件工程
    • 1,636 篇 信息与通信工程
    • 1,384 篇 控制科学与工程
    • 1,046 篇 生物工程
    • 935 篇 生物医学工程(可授...
    • 861 篇 电气工程
    • 681 篇 电子科学与技术(可...
    • 586 篇 光学工程
    • 577 篇 机械工程
    • 401 篇 仪器科学与技术
    • 351 篇 动力工程及工程热...
    • 349 篇 化学工程与技术
    • 311 篇 核科学与技术
    • 286 篇 安全科学与工程
    • 270 篇 网络空间安全
  • 4,894 篇 理学
    • 2,246 篇 数学
    • 1,545 篇 物理学
    • 1,265 篇 生物学
    • 776 篇 统计学(可授理学、...
    • 527 篇 系统科学
    • 407 篇 化学
  • 2,385 篇 管理学
    • 1,489 篇 管理科学与工程(可...
    • 982 篇 图书情报与档案管...
    • 758 篇 工商管理
  • 1,161 篇 医学
    • 970 篇 临床医学
    • 806 篇 基础医学(可授医学...
    • 464 篇 公共卫生与预防医...
    • 450 篇 药学(可授医学、理...
  • 422 篇 法学
    • 351 篇 社会学
  • 269 篇 经济学
  • 258 篇 教育学
  • 215 篇 农学
  • 47 篇 文学
  • 35 篇 艺术学
  • 25 篇 军事学
  • 16 篇 哲学
  • 10 篇 历史学

主题

  • 404 篇 deep learning
  • 333 篇 machine learning
  • 322 篇 computer science
  • 284 篇 educational inst...
  • 207 篇 internet of thin...
  • 193 篇 artificial intel...
  • 191 篇 computational mo...
  • 162 篇 feature extracti...
  • 144 篇 optimization
  • 143 篇 predictive model...
  • 142 篇 accuracy
  • 138 篇 real-time system...
  • 130 篇 support vector m...
  • 122 篇 wireless sensor ...
  • 119 篇 security
  • 116 篇 neural networks
  • 112 篇 computer archite...
  • 112 篇 data mining
  • 108 篇 semantics
  • 106 篇 covid-19

机构

  • 410 篇 department for p...
  • 407 篇 faculty of scien...
  • 398 篇 department of ph...
  • 388 篇 department of ph...
  • 388 篇 kirchhoff-instit...
  • 384 篇 department of ph...
  • 348 篇 fakultät für phy...
  • 334 篇 institute of phy...
  • 310 篇 institute of phy...
  • 309 篇 department of ph...
  • 280 篇 instituto de fís...
  • 279 篇 department of ph...
  • 271 篇 department of ph...
  • 270 篇 universidade fed...
  • 266 篇 graduate school ...
  • 261 篇 ictp trieste
  • 254 篇 yerevan physics ...
  • 253 篇 department of ph...
  • 250 篇 nikhef national ...
  • 250 篇 department of ph...

作者

  • 338 篇 c. alexa
  • 335 篇 j. m. izen
  • 333 篇 g. bella
  • 333 篇 d. calvet
  • 333 篇 c. amelung
  • 331 篇 j. strandberg
  • 326 篇 g. spigo
  • 325 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 318 篇 s. mohapatra
  • 301 篇 s. guindon
  • 300 篇 y. tayalati
  • 296 篇 a. kaczmarska
  • 289 篇 m. klein
  • 282 篇 j. schaarschmidt
  • 263 篇 a. d. pilkington
  • 261 篇 f. pastore

语言

  • 11,850 篇 英文
  • 1,567 篇 其他
  • 89 篇 中文
  • 10 篇 德文
  • 9 篇 日文
  • 9 篇 斯洛文尼亚文
  • 4 篇 法文
  • 1 篇 西班牙文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=College of Computer Science Informatics and Computer Systems Department"
13498 条 记 录,以下是4201-4210 订阅
排序:
An STL-based Approach to Resilient Control for Cyber-Physical systems
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Hongkai Paoletti, Nicola Smolka, Scott A. Lin, Shan Department of Electrical and Computer Engineering Stony Brook University Stony Brook United States Department of Informatics King’s College London London United Kingdom Department of Computer Science Stony Brook University Stony Brook United States
We present ResilienC, a framework for resilient control of Cyber-Physical systems subject to STL-based requirements. ResilienC utilizes a recently developed formalism for specifying CPS resiliency in terms of sets of ... 详细信息
来源: 评论
Deformation Adjustment with Single Real Signature Image for Biometric Verification Using CNN
收藏 引用
Computational Intelligence and Neuroscience 2022年 2022卷 4406101页
作者: Kumar, Rakesh Saraswat, Mala Ather, Danish Mumtaz Bhutta, Muhammad Nasir Basheer, Shakila Thakur, R.N. Department of Computer Engineering & Applications GLA University Mathura Mathura281406 India Department of Computer Science and Engineering ABES Engineering College Ghaziabad India Department of Computer Science & Engineering School of Engineering & Technology Sharda University Grater Noida India College of Engineering Abu Dhabi University P.O. Box 5991 Abu Dhabi United Arab Emirates Department of Information Systems College of Computer and Information Science Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia LBEF Campus Kathmandu Nepal
Signature verification is the widely used biometric verification method for maintaining individual privacy. It is generally used in legal documents and in financial transactions. A vast range of research has been done... 详细信息
来源: 评论
The Use of Covariate Adjustment in Randomized Controlled Trials: An Overview
arXiv
收藏 引用
arXiv 2023年
作者: Van Lancker, Kelly Bretz, Frank Dukes, Oliver Department of Applied Mathematics Computer Science and Statistics Ghent University Ghent Belgium Novartis Pharma AG Basel Switzerland Section for Medical Statistics Center for Medical Statistics Informatics and Intelligent Systems Medical University of Vienna Vienna Austria
There has been a growing interest in covariate adjustment in the analysis of randomized controlled trials in past years. For instance, the U.S. Food and Drug Administration recently issued guidance that emphasizes the... 详细信息
来源: 评论
Correction: Harnessing AI for sustainable higher education: ethical considerations, operational efficiency, and future directions
收藏 引用
Discover Sustainability 2025年 第1期6卷 1-2页
作者: Khan, Sunawar Mazhar, Tehseen Shahzad, Tariq Khan, Muhammad Amir Rehman, Ateeq Ur Saeed, Mamoon M. Hamam, Habib Department of Software Engineering Islamia University of Bahawalpur Bahawalnagar Pakistan School of Computer Science National College of Business Administration and Economics Lahore Pakistan Department of Computer Science School Education Department Government of Punjab Layyah Pakistan Department of Computer Engineering COMSATS University Islamabad Sahiwal Pakistan School of Computing Sciences College of Computing Informatics and Mathematics Universiti Teknologi MARA Shah Alam Malaysia School of Computing Gachon University Seongnam Republic of Korea Department of Communications and Electronics Engineering Faculty of Engineering University of Modern Sciences (UMS) Sana’a Yemen Faculty of Engineering Uni de Moncton Moncton Canada School of Electrical Engineering University of Johannesburg Johannesburg South Africa International Institute of Technology and Management (IITG) Av. Grandes Ecoles Libreville BP 1989 Gabon Bridges for Academic Excellence-Spectrum Tunis Tunisia
来源: 评论
Advancing SQL Injection Detection for High-Speed Data Centers: A Novel Approach Using Cascaded NLP
arXiv
收藏 引用
arXiv 2023年
作者: Tasdemir, Kasim Khan, Rafiullah Siddiqui, Fahad Sezer, Sakir Kurugollu, Fatih Yengec-Tasdemir, Sena Busra Bolat, Alperen Centre for Secure Information Technologies Queen's University Belfast Belfast United Kingdom NVIDIA Corporation Belfast United Kingdom Department of Computer Science College of Computing and Informatics University of Sharjah United Arab Emirates
Detecting SQL Injection (SQLi) attacks is crucial for web-based data center security, but it's challenging to balance accuracy and computational efficiency, especially in high-speed networks. Traditional methods s... 详细信息
来源: 评论
ON THE GCD GRAPHS OVER POLYNOMIAL RINGS AND RELATED TOPICS
arXiv
收藏 引用
arXiv 2024年
作者: Mináč, Ján Nguyen, Tung T. Tân, Nguyên Duy Department of Mathematics Western University LondonONN6A 5B7 Canada Department of Mathematics and Computer Science Lake Forest College Lake ForestIL United States Faculty Mathematics and Informatics Hanoi University of Science and Technology 1 Dai Co Viet Road Hanoi Viet Nam
Gcd-graphs over the ring of integers modulo n are a natural generalization of unitary Cayley graphs. The study of these graphs has foundations in various mathematical fields, including number theory, ring theory, and ... 详细信息
来源: 评论
Risk Management in Robotic Process Automation
Risk Management in Robotic Process Automation
收藏 引用
Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI), IEEE Conference on
作者: Dileep Kumar Yendluri Ramya Thatikonda Reshmi Thatikonda Jainath Ponnala M. Kempanna A. Bhuvanesh Department of Computer Science University of the Cumberlands Williamsburg USA Department of Information Technology University of the Cumberlands Williamsburg USA Department of Computer Information Systems University of Central Missouri Williamsburg USA Department of Electronics and Communication Engineering Jawaharlal Technological University Hyderbad India Department of Artificial Intelligence and Machine Learning Bangalore Institute of Technology Bangalore India Department of Electrical and Electronics Engineering PSN College of Engineering and Technology Tirunelveli India
The paper investigates the nuances of RPA risk management, detailing the difficulties, tendencies, and approaches organizations must adopt to integrate RPA into their operations successfully. From automation to optimi...
来源: 评论
Online Scheduling in Virtualized TSN Networks via Joint Admission Control and VNF Embedding
Online Scheduling in Virtualized TSN Networks via Joint Admi...
收藏 引用
IEEE International Conference on Communications in China (ICCC)
作者: Yajing Zhang Cailian Chen Chaoqun You Mingyan Li Xinping Guan Tony Q. S. Quek Department of Automation Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai Jiao Tong University Shanghai P. R. China School of Computer Science Fudan University College of Computer Science Chongqing University Chongqing P. R. China Information Systems Technology and Design Singapore University of Technology and Design Singapore
Introducing virtualization enhances the flexibility of time-sensitive networking (TSN), wherein applications manifest as service function chains comprising a series of virtual network functions (VNFs). However, such v... 详细信息
来源: 评论
Selecting Machine Learning Models for Student Performance Prediction Aligned with Pedagogical Objectives
Selecting Machine Learning Models for Student Performance Pr...
收藏 引用
Computing (ICOCO), IEEE International Conference on
作者: Ijaz Khan Mohammed Hazli Mohamed Zabil Abdul Rahim Ahmad Nafaa Jabeur Department of Computing College of Computing and Informatics Univsiti Tenaga Nasional Kajang Malaysia Information Technology Dept. Buraimi University College Al-Buraimi Oman Deparment of Computing and Informatics' Universiti Tenaga Nasional (UniTen) Kajang Malaysia Computer Science Dept. German University of Technology Muscat Oman
Machine learning classifiers emerge as productive tools to develop prediction models which forecast the final outcome of the students, in a course, and provide an opportunity to the instructor to take appropriate meas...
来源: 评论
Three-Filters-to-Normal+: Revisiting Discontinuity Discrimination in Depth-to-Normal Translation
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Jingwei Xue, Bohuan Feng, Yi Wang, Deming Fan, Rui Chen, Qijun The College of Electronics & Information Engineering Shanghai Research Institute for Intelligent Autonomous Systems The State Key Laboratory of Intelligent Autonomous Systems Frontiers Science Center for Intelligent Autonomous Systems Tongji University Shanghai201804 China The Department of Computer Science & Engineering The Hong Kong University of Science and Technology Hong Kong SAR Hong Kong
This article introduces three-filters-to-normal+ (3F2N+), an extension of our previous work three-filters-to-normal (3F2N), with a specific focus on incorporating discontinuity discrimination capability into surface n... 详细信息
来源: 评论