咨询与建议

限定检索结果

文献类型

  • 2,402 篇 会议
  • 1,336 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 3,775 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,311 篇 工学
    • 1,658 篇 计算机科学与技术...
    • 1,351 篇 软件工程
    • 626 篇 信息与通信工程
    • 379 篇 控制科学与工程
    • 302 篇 生物工程
    • 291 篇 电气工程
    • 230 篇 生物医学工程(可授...
    • 217 篇 电子科学与技术(可...
    • 182 篇 光学工程
    • 160 篇 网络空间安全
    • 158 篇 机械工程
    • 139 篇 化学工程与技术
    • 129 篇 安全科学与工程
    • 113 篇 动力工程及工程热...
    • 107 篇 交通运输工程
    • 104 篇 仪器科学与技术
    • 94 篇 核科学与技术
  • 1,360 篇 理学
    • 609 篇 数学
    • 479 篇 物理学
    • 329 篇 生物学
    • 217 篇 统计学(可授理学、...
    • 158 篇 化学
    • 113 篇 系统科学
  • 696 篇 管理学
    • 436 篇 管理科学与工程(可...
    • 293 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 220 篇 医学
    • 162 篇 基础医学(可授医学...
    • 160 篇 临床医学
    • 111 篇 公共卫生与预防医...
  • 127 篇 法学
    • 106 篇 社会学
  • 66 篇 经济学
  • 65 篇 农学
  • 36 篇 教育学
  • 34 篇 文学
  • 20 篇 军事学
  • 5 篇 艺术学
  • 1 篇 哲学

主题

  • 171 篇 accuracy
  • 140 篇 deep learning
  • 102 篇 feature extracti...
  • 100 篇 hadron colliders
  • 99 篇 machine learning
  • 89 篇 computational mo...
  • 89 篇 training
  • 85 篇 convolutional ne...
  • 70 篇 real-time system...
  • 66 篇 support vector m...
  • 64 篇 predictive model...
  • 62 篇 artificial intel...
  • 54 篇 optimization
  • 53 篇 internet of thin...
  • 49 篇 reliability
  • 46 篇 genetic algorith...
  • 45 篇 security
  • 45 篇 cloud computing
  • 45 篇 data models
  • 44 篇 semantics

机构

  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 charles universi...
  • 125 篇 infn sezione di ...
  • 124 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 123 篇 irfu cea univers...
  • 122 篇 infn sezione di ...
  • 121 篇 university of de...
  • 121 篇 department of ph...
  • 119 篇 imperial college...
  • 119 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 3,438 篇 英文
  • 291 篇 其他
  • 47 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science Engineering and Application"
3775 条 记 录,以下是311-320 订阅
排序:
Evaluation of Contingency-Based Learning Strategies for Precision Medicine  15
Evaluation of Contingency-Based Learning Strategies for Prec...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Kaushik, Harshita Rajendran, Naveen Kumar Kumar, Ashwini Vivekananda Global University Department of Computer Science& Application Jaipur India Department of Aerospace Engineering Karnataka Bangalore India Arka Jain University Department of Mechnical Engineering Jharkhand Jamshedpur India
Contingency-based learning strategies primarily based on synthetic intelligence (AI) are being hired within the area of precision remedy to enable greater powerful selection-making when treating patients. The overall ... 详细信息
来源: 评论
A Collaborative Framework for Intrusion Detection in Cloud Computing Based on HLA-CNN-BiLSTM-SVM Model
A Collaborative Framework for Intrusion Detection in Cloud C...
收藏 引用
Intelligent Technologies (ACOIT), Asian Conference on
作者: Amit K. Mogal Vaibhav P. Sonaje Department of Computer Science & Application School of Computer Science and Engineering Sandip University Nashik India
In addition to describing a way to make better use of preexisting computer infrastructures, the phrase “cloud computing” describes a technology that facilitates the sale of access to shared computer resources and se... 详细信息
来源: 评论
Automatic Image Acquisition and Matching in Control System of Near-Field Beam Shaping
Automatic Image Acquisition and Matching in Control System o...
收藏 引用
International Symposium on computer science and Intelligent Controls (ISCSIC)
作者: Suicheng Li Wenwen Shen Zizhou He Chen Zhou Li Li Jun Luo Department of Computer Engineering and Science Institute of Computer Application CAEP Mianyang China
In the high power laser system of inertial Confinement fusion (ICF), in order to improve the safe operation flux of the system, near-field beam shaping is necessary to output the laser beam with uniform and smooth int... 详细信息
来源: 评论
Comparative Analysis of Node-Dependent and Node-Independent Graph Matrices for Brain Connectivity Network  1
收藏 引用
4th International Conference on Machine Intelligence and Signal Processing, MISP 2022
作者: Kose, Mangesh Ramaji Ahirwal, Mitul Kumar Atulkar, Mithilesh Department of Computer Application NIT C.G. Raipur492010 India Department of Computer Science and Engineering MANIT M.P. Bhopal462003 India
Brain connectivity network (BCN) represents an advanced approach for brain functionality analysis. In BCN, the human brain is modeled as a graph, containing vertices and connectivity links. The electroencephalogram (E... 详细信息
来源: 评论
Utilizing Machine Learning to Aid in Type 2 Diabetes Diagnosis  4
Utilizing Machine Learning to Aid in Type 2 Diabetes Diagnos...
收藏 引用
4th IEEE International Conference on Applied Electromagnetics, Signal Processing, and Communication, AESPC 2024
作者: Pattnayak, Parthasarathi Mishra, Debaswapna Patnaik, Sanghamitra Mohanty, Arpeeta School of Computer Applications KIIT Deemed to Be University Bhubaneswar India OUAT Department of Computer Science and Application Bhubaneswar India School of Law KIIT Deemed to Be University Bhubaneswar India School of Computer Engineering KIIT Deemed to Be University Bhubaneswar India
High blood glucose levels are a defining characteristic of diabetes, with type 2 diabetes being the most prevalent form. Early detection and treatment can prevent or delay complications. To precisely anticipate type 2... 详细信息
来源: 评论
Surface flashover in 50 years:Theoretical models and competing mechanisms
收藏 引用
High Voltage 2023年 第5期8卷 853-877页
作者: Zhen Li Ji Liu Yoshimichi Ohki George Chen He Gao Shengtao Li Key Laboratory of Engineering Dielectrics and Its Application Ministry of EducationHarbin University of Science and TechnologyHarbinChina State Key Laboratory of Electrical Insulation and Power Equipment Xi'an Jiaotong UniversityXi'anChina Research Institute for Materials Science and Technology Waseda UniversityShinjuku‐kuJapan School of Electronics and Computer Science University of SouthamptonSouthamptonUK
Surface flashover is a devastating electronic avalanche along the gas–solid interface when a high electric field is applied,which is a potential issue that threatens the safe operations of advanced power electronic,e... 详细信息
来源: 评论
Dynamic performance and energy efficiency of reflective and insulative composite coating on building exterior wall
收藏 引用
Building Simulation 2023年 第12期16卷 2245-2259页
作者: Guangpeng Zhang Huijun Wu Jia Liu Jianming Yang Huakun Huang Yujie Ding Lei Xie School of Civil Engineering Guangzhou UniversityGuangzhou 510006China Guangdong Provincial Key Laboratory of Building Energy Efficiency and Application Technologies Guangzhou 510006China School of Automation Guangdong Polytechnic Normal UniversityGuangzhou 510665China School of Computer Science and Cyber Engineering Guangzhou UniversityGuangzhou 510006China
Reflective and insulative composite coatings are a new energy-saving material with high solar reflectance and extremely low thermal conductivity for *** optimization and impact of high solar reflectance and low therma... 详细信息
来源: 评论
Using Hybrid Penalty and Gated Linear Units to Improve Wasserstein Generative Adversarial Networks for Single-Channel Speech Enhancement
收藏 引用
computer Modeling in engineering & sciences 2023年 第6期135卷 2155-2172页
作者: Xiaojun Zhu Heming Huang School of Computer Science Qinghai Normal UniversityXining810008China The State Key Laboratory of Tibetan Intelligent Information Processing and Application Xining810008China School of Electronic and Information Engineering Lanzhou City UniversityLanzhou730000China
Recently,speech enhancement methods based on Generative Adversarial Networks have achieved good performance in time-domain noisy ***,the training of Generative Adversarial Networks has such problems as convergence dif... 详细信息
来源: 评论
Inculcating Algebra Properties in the Context of Image Processing
Inculcating Algebra Properties in the Context of Image Proce...
收藏 引用
2023 International Conference on Power Energy, Environment and Intelligent Control, PEEIC 2023
作者: Agarwal, Trapty Raja Praveen, K.N. Asif Iqbal, Mohammad Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh India Computer Science Department Bangalore India Vivekananda Global University Department of Computer Science & Application Jaipur India
Strong detection with mitigation systems are crucial given the growing danger of computer cluster breaches and worldwide assaults. Given the rising frequency and magnitude of network assaults and abnormalities, the in... 详细信息
来源: 评论
Exploring the Power of Deep Learning in Anomaly Detection: A Comprehensive Review and Analysis  12th
Exploring the Power of Deep Learning in Anomaly Detection: A...
收藏 引用
12th International Conference on Soft Computing for Problem Solving, SocProS 2023
作者: Kumar, Gaurav Kumar, Ankit Pandy, Saroj Kumar Singh, Kamred Udham Singh, Teekam Kumar, Lalan Choudhury, Tanupriya Department of Computer Engineering and Applications GLA University UP Mathura India School of Computing Graphic Era Hill University Dehradun India Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India Department of Master of Computer Application GL Bajaj Institute of Technology and Management Greater Noida India Department of Computer Science and Engineering University of Petroleum and Energy Studies Dehradun India
This paper aims to provide a comprehensive overview of existing and state-of-the-art fraud and intrusion detection strategies, specifically focusing on incorporating neural networks. We begin by discussing the fundame... 详细信息
来源: 评论