咨询与建议

限定检索结果

文献类型

  • 3,336 篇 会议
  • 2,031 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 5,386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,342 篇 工学
    • 2,323 篇 计算机科学与技术...
    • 1,856 篇 软件工程
    • 725 篇 信息与通信工程
    • 545 篇 控制科学与工程
    • 350 篇 电子科学与技术(可...
    • 333 篇 电气工程
    • 322 篇 生物工程
    • 294 篇 机械工程
    • 208 篇 仪器科学与技术
    • 208 篇 生物医学工程(可授...
    • 195 篇 光学工程
    • 163 篇 化学工程与技术
    • 130 篇 动力工程及工程热...
    • 124 篇 交通运输工程
    • 104 篇 安全科学与工程
    • 101 篇 材料科学与工程(可...
    • 94 篇 网络空间安全
  • 1,776 篇 理学
    • 914 篇 数学
    • 499 篇 物理学
    • 357 篇 生物学
    • 296 篇 统计学(可授理学、...
    • 214 篇 系统科学
    • 170 篇 化学
  • 943 篇 管理学
    • 574 篇 管理科学与工程(可...
    • 408 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 225 篇 医学
    • 188 篇 临床医学
    • 149 篇 基础医学(可授医学...
  • 147 篇 法学
    • 120 篇 社会学
  • 102 篇 经济学
    • 101 篇 应用经济学
  • 65 篇 农学
  • 63 篇 教育学
  • 21 篇 文学
  • 16 篇 艺术学
  • 15 篇 军事学

主题

  • 135 篇 feature extracti...
  • 133 篇 deep learning
  • 104 篇 accuracy
  • 90 篇 training
  • 88 篇 computer science
  • 87 篇 computational mo...
  • 86 篇 semantics
  • 78 篇 optimization
  • 78 篇 machine learning
  • 74 篇 data mining
  • 62 篇 predictive model...
  • 56 篇 internet of thin...
  • 52 篇 support vector m...
  • 51 篇 information syst...
  • 51 篇 neural networks
  • 50 篇 security
  • 50 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 testing
  • 47 篇 visualization

机构

  • 184 篇 hubei province k...
  • 135 篇 school of comput...
  • 108 篇 college of compu...
  • 99 篇 department of co...
  • 60 篇 hubei province k...
  • 58 篇 college of infor...
  • 54 篇 school of softwa...
  • 47 篇 national enginee...
  • 46 篇 national key lab...
  • 45 篇 tsinghua nationa...
  • 43 篇 school of comput...
  • 41 篇 the key laborato...
  • 37 篇 school of inform...
  • 37 篇 department of co...
  • 31 篇 college of infor...
  • 30 篇 university of ch...
  • 30 篇 shandong provinc...
  • 25 篇 college of compu...
  • 25 篇 key laboratory f...
  • 21 篇 guangdong provin...

作者

  • 25 篇 shen linlin
  • 25 篇 ren jiadong
  • 22 篇 liu jun
  • 21 篇 abdelwahed motwa...
  • 21 篇 zhang xiaolong
  • 21 篇 gaol ford lumban
  • 20 篇 li peng
  • 19 篇 dan feng
  • 19 篇 ishfaq yaseen
  • 19 篇 mesfer al duhayy...
  • 19 篇 jin hai
  • 18 篇 mohamed k.nour
  • 18 篇 xiaolong zhang
  • 17 篇 manar ahmed hamz...
  • 17 篇 zhang kai
  • 16 篇 xu xin
  • 16 篇 wang wei
  • 16 篇 matsuo tokuro
  • 16 篇 hai jin
  • 15 篇 liu zhe

语言

  • 5,006 篇 英文
  • 255 篇 其他
  • 124 篇 中文
  • 6 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer System and Information Technology"
5386 条 记 录,以下是301-310 订阅
排序:
Continual Learning with a Memory of Non-similar Samples  1
收藏 引用
17th International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2022
作者: Min, Qilang He, Juanjuan Yang, Liuyan Fu, Yue College of Computer Science and Technology Wuhan University of Science and Technology Wuhan430081 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China
The replay method is an effective strategy to address the problem of catastrophic forgetting, a key challenge for continuous learning. However, the sample sets obtained by replay-based methods generally suffer from lo... 详细信息
来源: 评论
GAN-Based Unsupervised Learning Approach to Generate and Detect Fake News
GAN-Based Unsupervised Learning Approach to Generate and Det...
收藏 引用
International Conference on Cyber Security, Privacy and Networking, ICSPN 2022
作者: Bhardwaj, Pranjal Yadav, Krishna Alsharif, Hind Aboalela, Rania Anwar VIT Vellore Vellore India National Institute of Technology Kurukshetra Kurukshetra India Faculty of Computer and Information Technology Umm AL-Qura University Makkah Saudi Arabia Department of Information System King Abdulaziz University Rabigh Saudi Arabia
Social media has grown into an increasingly popular means of disseminating information. Its massive growth has given evolution to fake news in misinformation and rumors, spreading very quickly. These days the generati... 详细信息
来源: 评论
Critical Factors of Immersive Learning in Higher Education: A systematic Literature Review  10
Critical Factors of Immersive Learning in Higher Education: ...
收藏 引用
10th International Conference on ICT for Smart Society, ICISS 2023
作者: Sunardi Meyliana Ramadhan, Arief Rosmansyah, Yusep Bina Nusantara University BINUS Graduate Program Doctor of Computer Science Computer Science Department Jakarta Indonesia School of Information System Bina Nusantara University Information System Departement Jakarta Indonesia School of Computing Telkom University Bandung Indonesia School of Electrical Engineering and Informatics Bandung Institute of Technology Bandung Indonesia
Immersive learning has gained significant attention with the rising trend of spatial computing, particularly in the after-pandemic era. Numerous research has explored the potential of immersive learning in higher educ... 详细信息
来源: 评论
Performance Analysis of IDS_MDL Algorithm to Predict Intrusion Detection for IoT Applications  40
Performance Analysis of IDS_MDL Algorithm to Predict Intrusi...
收藏 引用
40th National Radio Science Conference, NRSC 2023
作者: Mahmoud, Walaa Adel Fathi, Mohamad El-Badawy, Hesham Sadek, Rowayda Coll. of Comp. Information Technology Arab Academy for Science Technology and Maritime Transport Information System Department Cairo Egypt National Telecommunication Institute Cairo Egypt Helwan University Faculty of Computer and Artificial Intelligence Cairo Egypt
In the last year, many modern attacks have targeted Internet of Things (IoT) devices. IoT botnet attacks are the most common. Despite the plethora of detection and prevention systems for cyberattacks, a security mecha... 详细信息
来源: 评论
Optimizing Steering Angle Predictive Convolutional Neural Network for Autonomous Car
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2285-2302页
作者: Hajira Saleem Faisal Riaz Asadullah Shaikh Khairan Rajab Adel Rajab Muhammad Akram Mana Saleh Al Reshan Control Automotive and Robotics Lab Affiliated lab of National Center of Robotics and Automation(NCRA HEC Pakistan)and with the Department of Computer Science and Information TechnologyMirpur University of Science and Technology(MUST)Mirpur Azad Kashmir10250Pakistan College of Computer Science and Information System Najran UniversityNajran61441Saudi Arabia College of Computer Science and Engineering University of South FloridaTampa33620United States
Deep learning techniques,particularly convolutional neural networks(CNNs),have exhibited remarkable performance in solving visionrelated problems,especially in unpredictable,dynamic,and challenging *** autonomous vehi... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Deep Learning-Based Real-Time Face Mask Detection for Human Using Novel YOLOv2 with Higher Accuracy  5th
Deep Learning-Based Real-Time Face Mask Detection for Human ...
收藏 引用
5th International Conference on computer and Communication Technologies, IC3T 2023
作者: Tun, Nay Kyi Myat, Aye Min Oo, Htet Ne Thu, Amar Myo Win, Kyaw Thu Faculty of Computer System and Technology Myanmar Information Institute of Technology Mandalay Myanmar Pyin Oo Lwin Myanmar Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura India Electronic Department Defence Services Academy Pyin Oo Lwin Myanmar
A novel deep learning-based face mask detection system is designed to enhance public safety in various environments. With the ongoing global health concerns, the need for efficient and accurate methods to identify ind... 详细信息
来源: 评论
BHJO: A Novel Hybrid Metaheuristic Algorithm Combining the Beluga Whale, Honey Badger, and Jellyfish Search Optimizers for Solving Engineering Design Problems
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第10期141卷 219-265页
作者: Farouq Zitouni Saad Harous Abdulaziz S.Almazyad Ali Wagdy Mohamed Guojiang Xiong Fatima Zohra Khechiba Khadidja  Kherchouche Department of Computer Science and Information Technology Kasdi Merbah UniversityP.O.Box 30000OuarglaAlgeria Department of Computer Science College of Computing and InformaticsUniversity of SharjahP.O.Box 27272SharjahUnited Arab Emirates Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmman11937Jordan Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China
Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization *** approach aims to leverage the strengths of mult... 详细信息
来源: 评论
A Hierarchical Scheme for Video-Based Person Re-identification Using Lightweight PCANet and Handcrafted LOMO Features
收藏 引用
Chinese Journal of Electronics 2021年 第2期30卷 289-295页
作者: LI Youjiao ZHUO Li LI Jiafeng ZHANG Jing Beijing Key Laboratory of Computational Intelligence and Intelligent System Beijing University of Technology Faculty of Information Technology College of Micro-electronics Beijing University of Technology College of Computer Science and Technology Shandong University of Technology
A two-level hierarchical scheme for video-based person re-identification(re-id) is presented, with the aim of learning a pedestrian appearance model through more complete walking cycle extraction. Specifically,given a... 详细信息
来源: 评论
DD-Net: Dynamic Network Architecture for Optimized Curve Segmentation and Reduce Computational Redundancy  27th
DD-Net: Dynamic Network Architecture for Optimized Curve Seg...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Cao, Yunxiang Chen, Li Wang, Yubo Feng, Zhida Tian, Jing School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology Wuhan China Institute of Systems Science National University of Singapore Singapore Singapore
Curvilinear Structure segmentation has numerous applications in various fields, including providing a better understanding of defects such as cracks on roads or walls, thereby assessing the structural safety of buildi... 详细信息
来源: 评论