咨询与建议

限定检索结果

文献类型

  • 1,174 篇 期刊文献
  • 941 篇 会议
  • 40 册 图书

馆藏范围

  • 2,155 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,240 篇 工学
    • 736 篇 计算机科学与技术...
    • 562 篇 软件工程
    • 261 篇 信息与通信工程
    • 187 篇 生物工程
    • 185 篇 生物医学工程(可授...
    • 144 篇 电子科学与技术(可...
    • 143 篇 控制科学与工程
    • 142 篇 电气工程
    • 116 篇 光学工程
    • 87 篇 机械工程
    • 85 篇 化学工程与技术
    • 79 篇 仪器科学与技术
    • 61 篇 材料科学与工程(可...
    • 56 篇 动力工程及工程热...
    • 48 篇 核科学与技术
  • 942 篇 理学
    • 356 篇 物理学
    • 338 篇 数学
    • 244 篇 生物学
    • 122 篇 统计学(可授理学、...
    • 121 篇 地球物理学
    • 98 篇 化学
    • 47 篇 系统科学
  • 313 篇 管理学
    • 164 篇 管理科学与工程(可...
    • 125 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 266 篇 医学
    • 191 篇 临床医学
    • 161 篇 基础医学(可授医学...
    • 91 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 60 篇 法学
    • 57 篇 社会学
  • 54 篇 农学
  • 35 篇 教育学
  • 32 篇 经济学
  • 6 篇 艺术学
  • 4 篇 文学
  • 2 篇 哲学
  • 2 篇 历史学
  • 2 篇 军事学

主题

  • 50 篇 feature extracti...
  • 44 篇 deep learning
  • 42 篇 machine learning
  • 41 篇 computer science
  • 39 篇 artificial intel...
  • 37 篇 galaxies
  • 35 篇 data mining
  • 34 篇 image segmentati...
  • 33 篇 training
  • 32 篇 support vector m...
  • 27 篇 accuracy
  • 26 篇 hadron colliders
  • 24 篇 optimization
  • 21 篇 cosmological par...
  • 19 篇 covid-19
  • 19 篇 cosmology
  • 19 篇 large scale stru...
  • 19 篇 intelligent syst...
  • 18 篇 computational mo...
  • 17 篇 surveys

机构

  • 69 篇 school of mathem...
  • 58 篇 department of ph...
  • 57 篇 inaf-osservatori...
  • 56 篇 fermi national a...
  • 55 篇 institute of cos...
  • 52 篇 university of sc...
  • 51 篇 madrid
  • 50 篇 national and kap...
  • 49 篇 yerevan physics ...
  • 49 篇 department of ph...
  • 46 篇 centro brasileir...
  • 45 篇 department of ph...
  • 45 篇 istanbul technic...
  • 45 篇 center for astro...
  • 43 篇 universidad iber...
  • 43 篇 high energy phys...
  • 42 篇 brunel universit...
  • 42 篇 university of sp...
  • 41 篇 infn sezione di ...
  • 41 篇 department of ph...

作者

  • 58 篇 miquel r.
  • 54 篇 tarle g.
  • 52 篇 aguena m.
  • 51 篇 smith m.
  • 51 篇 sanchez e.
  • 45 篇 gruendl r.a.
  • 45 篇 gruen d.
  • 45 篇 carretero j.
  • 43 篇 palmese a.
  • 43 篇 doel p.
  • 41 篇 flaugher b.
  • 38 篇 to c.
  • 38 篇 garcía-bellido j...
  • 38 篇 james d.j.
  • 37 篇 diehl h.t.
  • 37 篇 romer a.k.
  • 36 篇 costanzi m.
  • 35 篇 gschwend j.
  • 35 篇 dimitrios i. fot...
  • 34 篇 ogando r.l.c.

语言

  • 2,070 篇 英文
  • 62 篇 其他
  • 21 篇 中文
  • 2 篇 法文
  • 1 篇 俄文
检索条件"机构=Computer Science and Technology Unit"
2155 条 记 录,以下是1-10 订阅
排序:
A Game-Theoretic Approach to Safe Crowd Evacuation in Emergencies
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1631-1657页
作者: Maria Gul Imran Ali Khan Gohar Zaman Atta Rahman Jamaluddin Mir Sardar Asad Ali Biabani May IssaAldossary Mustafa Youldash Ashraf Saadeldeen Maqsood Mahmud Asiya Abdus Salam Dania Alkhulaifi Abdullah AlTurkey31Department of Computer Science COMSATS University IslamabadAbbottabad CampusAbbottabad22010Pakistan Department of Computer Science Abbottabad University of Science and TechnologyAbbottabad22010Pakistan Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Science and Technology Unit Umm Al-Qura UniversityMakkah21955Saudi Arabia Deanship of Scientific Research Umm Al-Qura UniversityMakkah21955Saudi Arabia Department of Computer Information Systems College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Engineering College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam31441Saudi Arabia Department of Computer Science Faculty of Computer Science and Information TechnologyOmdurman Islamic UniversityOmdurman14415Sudan Business Analytic Program Department of Management and MarketingCollege of Business AdministrationUniversity of BahrainSakhir32038Bahrain
Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoret... 详细信息
来源: 评论
Efficiency-optimized 6G:A virtual network resource orchestration strategy by enhanced particle swarm optimization
收藏 引用
Digital Communications and Networks 2024年 第5期10卷 1221-1233页
作者: Sai Zou Junrui Wu Haisheng Yu Wenyong Wang Lisheng Huang Wei Ni Yan Liu College of Big Data and Information Engineering Guizhou UniversityGuiyangChina Prospective Technology Lab of the China Future Internet Engineering Center BeijingChina College of Computer Science and Engineering University of Electronic Science and TechnologyChengduChina International Institute for Next Generation Internet Macao University of Science and TechnologyMacaoChina Data61 Business Unit CSIROAustralia
The future Sixth-Generation (6G) wireless systems are expected to encounter emerging services with diverserequirements. In this paper, 6G network resource orchestration is optimized to support customized networkslicin... 详细信息
来源: 评论
Intrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model
收藏 引用
computer Modeling in Engineering & sciences 2025年 第4期143卷 639-671页
作者: Noveela Iftikhar Mujeeb Ur Rehman Mumtaz Ali Shah Mohammed J.F.Alenazi Jehad Ali Knowledge Unit of Systems and Technology University of Management and TechnologySialkot51310Pakistan Department of Computer Science University ofWahWah Cantt47010Pakistan Department of Computer Engineering College of Computer and Information Sciences(CCIS)King Saud UniversityRiyadh11451Saudi Arabia Department of AI Convergence Network Ajou UniversitySuwon16499Republic of Korea
Intrusion attempts against Internet of Things(IoT)devices have significantly increased in the last few *** devices are now easy targets for hackers because of their built-in security *** a Self-Organizing Map(SOM)hybr... 详细信息
来源: 评论
Improved Manta Ray Foraging Optimizer-based SVM for Feature Selection Problems:A Medical Case Study
收藏 引用
Journal of Bionic Engineering 2024年 第1期21卷 409-425页
作者: Adel Got Djaafar Zouache Abdelouahab Moussaoui Laith Abualigah Ahmed Alsayat Faculty of informatics University of Science and Technology Houari BoumedieneAlgiersAlgeria LRIA Laboratory University of Science and Technology Houari BoumedieneAlgiersAlgeria Computer Science Department University of Mohamed El Bachir El IbrahimiBordj Bou ArreridjAlgeria Computer Science Department University of Ferhat AbbasSetifAlgeria Computer Science Department Prince Hussein Bin Abdullah Faculty for Information TechnologyAl al-Bayt UniversityMafraq 25113Jordan Department of Computer Science College of Computer and Information SciencesJouf UniversityJoufSaudi Arabia Department of Electrical and Computer Engineering Lebanese American University13-5053ByblosLebanon Hourani Center for Applied Scientific Research Al-Ahliyya Amman UniversityAmman 19328Jordan MEU Research Unit Middle East UniversityAmman 11831Jordan Applied science research center Applied science private universityAmman 11931Jordan School of Computer Sciences Universiti Sains Malaysia11800 PenangMalaysia School of Engineering and Technology Sunway University Malaysia27500 Petaling JayaMalaysia
Support Vector Machine(SVM)has become one of the traditional machine learning algorithms the most used in prediction and classification ***,its behavior strongly depends on some parameters,making tuning these paramete... 详细信息
来源: 评论
An Overview of Event Extraction Methods based on Semantic Disambiguation  24
An Overview of Event Extraction Methods based on Semantic Di...
收藏 引用
2nd International Conference on Artificial Intelligence, Systems and Network Security, AISNS 2024
作者: Li, Haili Wang, Xiaodong Zhou, Yunyan Liu, Weijie Pan, Shilong College of Computer Science and Technology National University of Defense Technology Hunan Changsha China Unit 63893 of PLA Henan Luoyang China Unit 63891 of PLA Henan Luoyang China
Event extraction is a fundamental and complex task in information extraction, aiming at automatically identifying and extracting structured event information from unstructured text. However, the same word may have dif... 详细信息
来源: 评论
EVONChain: A Public Blockchain Architecture with Bi-tiered Network for Edge Computing  10
EVONChain: A Public Blockchain Architecture with Bi-tiered N...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud Computing and 9th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Kong, Yihan Chen, Qinyang Li, Jing Xiong, Ting Xie, Tao National University of Defense Technology College of Computer Science and Technology Changsha China Guangdong University of Technology School of Computer Science and Technology Guangzhou China PLA Unit 96890 Jilin China
This paper introduces EVONChain, a nature-inspired evolvable blockchain that addresses scalability issues in large-scale blockchain applications. EVONChain decouples the functions of a full blockchain node into two co... 详细信息
来源: 评论
Efficient Multi-Instance Hashing for Large-scale Image Retrieval  4
Efficient Multi-Instance Hashing for Large-scale Image Retri...
收藏 引用
4th International Conference on computer Vision and Data Mining, ICCVDM 2023
作者: Yang, Yao Xiao, Yajuan Liu, Yonghai Wang, Kuikui Unit 92020 of PLA Qingdao China School of Computer Science and Technology Shandong Jianzhu University Jinan China
Hashing has recently received excellent performance for similarity search on large-scale data set. In many scenarios, most image contains multi-instance features, and how to hash multi-instance image is an important t... 详细信息
来源: 评论
Deep learning at the service of metaheuristics for solving numerical optimization problems
收藏 引用
Neural Computing and Applications 2025年 1-36页
作者: Oyelade, Olaide N. Ezugwu, Absalom E. Saha, Apu K. Thieu, Nguyen V. Gandomi, Amir H. School of Electronics Electrical Engineering and Computer Science Queen’s University Belfast Bangladesh Unit for Data Science and Computing North-West University 11 Hoffman Street Potchefstroom2520 United States Department of Mathematics National Institute of Technology Agartala Tripura Agartala799046 India Faculty of Computer Science Phenikaa University Yen Nghia Hanoi Ha Dong12116 Viet Nam Department of Engineering and Information Technology University of Technology Sydney UltimoNSW2007 Australia
Integrating deep learning methods into metaheuristic algorithms has gained attention for addressing design-related issues and enhancing performance. The primary objective is to improve solution quality and convergence... 详细信息
来源: 评论
Combining Event Segment Classification and Graph Self-Encoder for Event Prediction  2
Combining Event Segment Classification and Graph Self-Encode...
收藏 引用
2nd International Conference on Big Data, Information and computer Network, BDICN 2023
作者: Yuan, Yewen Wang, Yongli Gong, Xiaoze Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing China Unit Baicheng63850 China
Scripted event prediction is the automatic learning of knowledge from unstructured text to predict subsequent events based on a given sequence of events. Existing work has mainly been based on event pairs or entire ev... 详细信息
来源: 评论
Combining Feature Fusion Link Prediction with Graph Neural Networks  2
Combining Feature Fusion Link Prediction with Graph Neural N...
收藏 引用
2022 2nd Conference on High Performance Computing and Communication Engineering, HPCCE 2022
作者: Zheng, Yamin Wang, Yongli Gong, Xiaoze School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China Unit Baicheng63850 China
At present, Graph Neural Network (GNN) methods usually follow the node centered message passing process, and rely heavily on smooth node characteristics rather than graph structure. In view of this limitation, based o... 详细信息
来源: 评论