咨询与建议

限定检索结果

文献类型

  • 5,962 篇 会议
  • 3,414 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 9,416 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,593 篇 工学
    • 3,458 篇 计算机科学与技术...
    • 2,766 篇 软件工程
    • 1,096 篇 信息与通信工程
    • 969 篇 控制科学与工程
    • 742 篇 电气工程
    • 740 篇 电子科学与技术(可...
    • 572 篇 生物工程
    • 491 篇 机械工程
    • 443 篇 光学工程
    • 412 篇 生物医学工程(可授...
    • 394 篇 仪器科学与技术
    • 297 篇 动力工程及工程热...
    • 294 篇 化学工程与技术
    • 223 篇 交通运输工程
    • 209 篇 材料科学与工程(可...
    • 199 篇 土木工程
    • 167 篇 安全科学与工程
  • 2,965 篇 理学
    • 1,422 篇 数学
    • 877 篇 物理学
    • 639 篇 生物学
    • 457 篇 统计学(可授理学、...
    • 355 篇 系统科学
    • 300 篇 化学
  • 1,470 篇 管理学
    • 960 篇 管理科学与工程(可...
    • 559 篇 图书情报与档案管...
    • 401 篇 工商管理
  • 387 篇 医学
    • 329 篇 临床医学
    • 259 篇 基础医学(可授医学...
    • 171 篇 药学(可授医学、理...
  • 205 篇 法学
    • 171 篇 社会学
  • 157 篇 经济学
  • 93 篇 农学
  • 83 篇 教育学
  • 32 篇 文学
  • 23 篇 军事学
  • 16 篇 艺术学
  • 1 篇 哲学

主题

  • 302 篇 computer science
  • 185 篇 feature extracti...
  • 175 篇 deep learning
  • 170 篇 computational mo...
  • 147 篇 data mining
  • 145 篇 systems engineer...
  • 127 篇 optimization
  • 123 篇 machine learning
  • 117 篇 neural networks
  • 106 篇 control systems
  • 106 篇 accuracy
  • 101 篇 semantics
  • 94 篇 computer archite...
  • 87 篇 laboratories
  • 85 篇 educational inst...
  • 85 篇 predictive model...
  • 85 篇 training
  • 83 篇 costs
  • 78 篇 bandwidth
  • 78 篇 real-time system...

机构

  • 102 篇 national enginee...
  • 99 篇 college of compu...
  • 80 篇 school of comput...
  • 72 篇 department of co...
  • 70 篇 national enginee...
  • 56 篇 college of infor...
  • 46 篇 school of comput...
  • 41 篇 the key laborato...
  • 40 篇 school of optica...
  • 38 篇 school of comput...
  • 38 篇 school of comput...
  • 36 篇 school of inform...
  • 31 篇 national enginee...
  • 31 篇 university of ch...
  • 30 篇 faculty of compu...
  • 28 篇 huazhong univers...
  • 27 篇 school of comput...
  • 27 篇 hubei province k...
  • 26 篇 school of comput...
  • 25 篇 hubei key labora...

作者

  • 72 篇 hai jin
  • 37 篇 jin hai
  • 31 篇 yang yang
  • 29 篇 xiaofei liao
  • 28 篇 shen linlin
  • 24 篇 mei-ling shyu
  • 21 篇 chen shu-ching
  • 21 篇 abdelwahed motwa...
  • 21 篇 hu shengshan
  • 21 篇 shu-ching chen
  • 20 篇 ji zhen
  • 19 篇 jianchao zeng
  • 19 篇 dutta paramartha
  • 18 篇 wang xingjun
  • 17 篇 zhen ji
  • 15 篇 wang lei
  • 15 篇 long zheng
  • 15 篇 zhuang songlin
  • 15 篇 tomio watanabe
  • 15 篇 wang wei

语言

  • 8,390 篇 英文
  • 778 篇 其他
  • 221 篇 中文
  • 32 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=Computer Science and System Engineering"
9416 条 记 录,以下是751-760 订阅
排序:
Revolutionizing Healthcare: AI-Powered Solutions, Technological Integration for Accessible and Effective Medical Service
Revolutionizing Healthcare: AI-Powered Solutions, Technologi...
收藏 引用
Advances in Computing Research on science engineering and Technology (ACROSET), International Conference on
作者: Almas Jafar Shaikh Sakshi Bharat Takbhate Shailesh Gawai Altaf Mainoddin Limbore Vaidehi Avinash Patil Department of Computer Science and Business System JSPM's Rajarshi Shahu College of Engineering Tathawade India
The main characteristics of the healthcare platform that this study suggests for rural areas are User ID or image-based recognition, Options for consultation, Disease Prediction, Integration with Aasha Workers, Techni... 详细信息
来源: 评论
Grammar Error Correction in Indonesian Sports News: Comparing the Performance of Pre-Trained T5 and BART Models
Grammar Error Correction in Indonesian Sports News: Comparin...
收藏 引用
2024 Beyond Technology Summit on Informatics International Conference, BTS-I2C 2024
作者: Adnan, Muh Prakasa, Esa Yuyun Umar, Najirah Nasrullah Sadli, Adi Anatasya, A. Edeth Fuari Hazriani Razak, Mashur Handayani University of Makassar Dept. of informatics engineering Makassar Indonesia Research center for data and information science National Research and Innovation Agency Bandung Indonesia Handayani University Makassar Dept. of computer system Makassar Indonesia
This research compares the performance of two pre-trained models based on the transformer, namely text-to-text transfer transformer (T5) and bidirectional and auto-regressive transformer (BART), through a fine-tuned f... 详细信息
来源: 评论
DUCK: A Drone-Urban Cyber-Defense Framework Based on Pareto-Optimal Deontic Logic Agents  37
DUCK: A Drone-Urban Cyber-Defense Framework Based on Pareto-...
收藏 引用
37th AAAI Conference on Artificial Intelligence, AAAI 2023
作者: Deb, Tonmoay Dix, Jürgen Jeong, Mingi Molinaro, Cristian Pugliese, Andrea Li, Alberto Quattrini Santos, Eugene Subrahmanian, V.S. Yang, Shanchieh Zhang, Youzhi Department of Computer Science Northwestern University EvanstonIL United States Department of Computer Science Dartmouth College HanoverNH United States Department of Informatics Modeling Electronics and System Engineering University of Calabria Rende Italy Department of Informatics Technical University of Clausthal Clausthal Germany Department of Computer Engineering Rochester Institute of Technology RochesterNY United States CAIR Hong Kong Institute of Science and Innovation Hong Kong
Drone based terrorist attacks are increasing daily. It is not expected to be long before drones are used to carry out terror attacks in urban areas. We have developed the DUCK multiagent testbed that security agencies... 详细信息
来源: 评论
Scavenger: Better Space-Time Trade-Offs for Key-Value Separated LSM-trees  40
Scavenger: Better Space-Time Trade-Offs for Key-Value Separa...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Zhang, Jianshun Wang, Fang Qiu, Sheng Wang, Yi Ou, Jiaxin Huang, Junxun Li, Baoquan Fang, Peng Feng, Dan School of Computer Science and Technology Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China China Shenzhen Huazhong University of Science and Technology Research Institute China Bytefrance Inc.
Key-Value Stores (KVS) implemented with log-structured merge-tree (LSM-tree) have gained widespread ac-ceptance in storage systems. Nonetheless, a significant challenge arises in the form of high write amplification d... 详细信息
来源: 评论
Effective Heart Attack Prediction method using Machine Learning Algorithm
Effective Heart Attack Prediction method using Machine Learn...
收藏 引用
International Conference on Communications and Signal Processing
作者: M.G. Chitra Ramya Govindaraj School of Computer Science Engineering and Information System (SCORE) Vellore Institute of Technology Vellore TN India
In today’s era development cardiovascular disease is the most common disease that cause a heart attack. So, diagnosing heart disease patients on time is the most challenging task in the medical field. Due to expensiv... 详细信息
来源: 评论
Q-learning Based Meta-Heuristics for Scheduling Bi-Objective Surgery Problems with Setup Time
收藏 引用
Complex system Modeling and Simulation 2024年 第4期4卷 321-338页
作者: Ruixue Zhang Hui Yu Adam Slowik Kaizhou Gao School of Computer Science Liaocheng UniversityLiaocheng 252000China Macao Institute of System Engineering Macao University of Science and TechnologyMacao 999078China the Department of Electronics and Computer Science Koszalin University of TechnologyKoszalin 75-453Poland
Since the increasing demand for surgeries in hospitals,the surgery scheduling problems have attracted extensive *** study focuses on solving a surgery scheduling problem with setup *** a mathematical model is created ... 详细信息
来源: 评论
Scaffolding Process-Aware Information systems with the AKIP Platform  1
收藏 引用
18th International Conference on Web Information systems and Technologies, WEBIST 2022
作者: Telemaco Neto, Ulisses Oliveira, Toacy Pillat, Raquel Alencar, Paulo Cowan, Don Melo, Glaucia David R. Cheriton School of Computer Science University of Waterloo Waterloo Canada System Engineering and Computing Program Federal University of Rio de Janeiro Rio de Janeiro Brazil
Business Process Automation (BPA) refers to the automation of business processes through technology, with the goal of improving efficiency, reducing errors, and increasing productivity by eliminating manual and repeti... 详细信息
来源: 评论
Machine Learning Techniques with LowDimensional Feature Extraction for Improving the Generalizability of Cardiac Arrhythmia
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2021年 第2期48卷 1-10页
作者: Nurmaini, Siti Tutuko, Bambang Rachmatullah, Muhammad Naufal Darmawahyuni, Annisa Firdaus, Firdaus A Professor of Computer Engineering Intelligent System Research Group Universitas Sriwijaya Palembang30139 Indonesia A lecturer of Computer Engineering Department Faculty of Computer Science Universitas Sriwijaya Palembang30139 Indonesia A research assistant of Intelligent System Research Group Universitas Sriwijaya Palembang30139 Indonesia
Automatic heartbeat classification is an important stage in identifying cardiac arrhythmia. Several machine learning (ML) techniques have been proposed to perform this, but they produce an accuracy result of below 99%... 详细信息
来源: 评论
RGraph: Asynchronous graph processing based on asymmetry of remote direct memory access
RGraph: Asynchronous graph processing based on asymmetry of ...
收藏 引用
作者: Chen, Hanhua Yuan, Jie Jin, Hai Wang, Yonghui Wu, Sijie Jiang, Zhihao National Engineering Research Center for Big Data Technology and System Cluster and Grid Computing Lab Services Computing Technology and System Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
The scale of real-world graphs is constantly growing. To deal with large-scale graphs, distributed graph processing has attracted much research efforts. Existing distributed graph processing systems are commonly built... 详细信息
来源: 评论
Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2677-2693页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Manal Abdullah Alohali Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Information Systems Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Applications of internet-of-things(IoT)are increasingly being used in many facets of our daily life,which results in an enormous volume of *** computing and fog computing,two of the most common technologies used in Io... 详细信息
来源: 评论