咨询与建议

限定检索结果

文献类型

  • 3,336 篇 会议
  • 2,031 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 5,386 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,342 篇 工学
    • 2,323 篇 计算机科学与技术...
    • 1,856 篇 软件工程
    • 725 篇 信息与通信工程
    • 545 篇 控制科学与工程
    • 350 篇 电子科学与技术(可...
    • 333 篇 电气工程
    • 322 篇 生物工程
    • 294 篇 机械工程
    • 208 篇 仪器科学与技术
    • 208 篇 生物医学工程(可授...
    • 195 篇 光学工程
    • 163 篇 化学工程与技术
    • 130 篇 动力工程及工程热...
    • 124 篇 交通运输工程
    • 104 篇 安全科学与工程
    • 101 篇 材料科学与工程(可...
    • 94 篇 网络空间安全
  • 1,776 篇 理学
    • 914 篇 数学
    • 499 篇 物理学
    • 357 篇 生物学
    • 296 篇 统计学(可授理学、...
    • 214 篇 系统科学
    • 170 篇 化学
  • 943 篇 管理学
    • 574 篇 管理科学与工程(可...
    • 408 篇 图书情报与档案管...
    • 231 篇 工商管理
  • 225 篇 医学
    • 188 篇 临床医学
    • 149 篇 基础医学(可授医学...
  • 147 篇 法学
    • 120 篇 社会学
  • 102 篇 经济学
    • 101 篇 应用经济学
  • 65 篇 农学
  • 63 篇 教育学
  • 21 篇 文学
  • 16 篇 艺术学
  • 15 篇 军事学

主题

  • 135 篇 feature extracti...
  • 133 篇 deep learning
  • 104 篇 accuracy
  • 90 篇 training
  • 88 篇 computer science
  • 87 篇 computational mo...
  • 86 篇 semantics
  • 78 篇 optimization
  • 78 篇 machine learning
  • 74 篇 data mining
  • 62 篇 predictive model...
  • 56 篇 internet of thin...
  • 52 篇 support vector m...
  • 51 篇 information syst...
  • 51 篇 neural networks
  • 50 篇 security
  • 50 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 testing
  • 47 篇 visualization

机构

  • 184 篇 hubei province k...
  • 135 篇 school of comput...
  • 108 篇 college of compu...
  • 99 篇 department of co...
  • 60 篇 hubei province k...
  • 58 篇 college of infor...
  • 54 篇 school of softwa...
  • 47 篇 national enginee...
  • 46 篇 national key lab...
  • 45 篇 tsinghua nationa...
  • 43 篇 school of comput...
  • 41 篇 the key laborato...
  • 37 篇 school of inform...
  • 37 篇 department of co...
  • 31 篇 college of infor...
  • 30 篇 university of ch...
  • 30 篇 shandong provinc...
  • 25 篇 college of compu...
  • 25 篇 key laboratory f...
  • 21 篇 guangdong provin...

作者

  • 25 篇 shen linlin
  • 25 篇 ren jiadong
  • 22 篇 liu jun
  • 21 篇 abdelwahed motwa...
  • 21 篇 zhang xiaolong
  • 21 篇 gaol ford lumban
  • 20 篇 li peng
  • 19 篇 dan feng
  • 19 篇 ishfaq yaseen
  • 19 篇 mesfer al duhayy...
  • 19 篇 jin hai
  • 18 篇 mohamed k.nour
  • 18 篇 xiaolong zhang
  • 17 篇 manar ahmed hamz...
  • 17 篇 zhang kai
  • 16 篇 xu xin
  • 16 篇 wang wei
  • 16 篇 matsuo tokuro
  • 16 篇 hai jin
  • 15 篇 liu zhe

语言

  • 5,006 篇 英文
  • 255 篇 其他
  • 124 篇 中文
  • 6 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer System and Information Technology"
5386 条 记 录,以下是371-380 订阅
排序:
FedEdge: Accelerating Edge-Assisted Federated Learning  23
FedEdge: Accelerating Edge-Assisted Federated Learning
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Wang, Kaibin He, Qiang Chen, Feifei Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Federated learning (FL) has been widely acknowledged as a promising solution to training machine learning (ML) model training with privacy preservation. To reduce the traffic overheads incurred by FL systems, edge ser... 详细信息
来源: 评论
Medical Image Analysis of Lung Tumor Diagnosis Based on Generalized Fuzzy C-Means Clustering Algorithm
Medical Image Analysis of Lung Tumor Diagnosis Based on Gene...
收藏 引用
International Conference on Emerging Electronic and Automation technology 2022, ICEEAT 2022
作者: Zwaid, Jassim Mohammed Ahmed Murad, Masrah Azrifah Azmi Khalid, Fatimah Binti Manshor, Noridayu Al-Jumaily, Abdulmajeed Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Affiliated to University of Anbar Ramadi Iraq Department of Software Engineering and Information System Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Multimedia Department Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Department of Signal Theory and Communications Universidad Carlos III de Madrid Leganés Madrid28911 Spain
In recent years, the rapid development of medical imaging technology has brought medical image analysis into the era of big data. CT imaging technology is one of the most common imaging methods for disease screening. ... 详细信息
来源: 评论
The Study of Multi-type Computing Power Trading Mechanism in Computing Power Network Based on Blockchain and Combinatorial Double Auction  24
The Study of Multi-type Computing Power Trading Mechanism in...
收藏 引用
4th International Conference on Artificial Intelligence, Big Data and Algorithms, CAIBDA 2024
作者: Zhao, Yue Wang, Jizhi Kong, Lingrui Sui, Tongtong Shandong Computer Science Center National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Industrial Network and Information System Security Qilu University of Technology Shandong Academy of Sciences Jinan Shandong China Quancheng Laboratory Jinan Key Laboratory of Digital Security Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong China
The advancement of 5G and mobile internet technologies has propelled the development of emerging businesses and applications, demanding higher requirements for network bandwidth and computational resources. To address... 详细信息
来源: 评论
Extending and Evaluating Usability Heuristics for Educational Website in Fiji
Extending and Evaluating Usability Heuristics for Educationa...
收藏 引用
2023 IEEE Asia-Pacific Conference on computer Science and Data Engineering, CSDE 2023
作者: Sami, Monesh Devi, Pritika Ali, A. B. M. Shawkat Kumar, Anal Fiji National University Department of Computer Science and Information Systems Nadi Fiji Fiji National University Department of Office Administration/Library and Information System Nadi Fiji School of Science and Technology The University of Fiji Saweni Fiji
Learning Management systems (LMS) has recently gained a lot of popularity as an effective tool for improving education while promoting distance and flexible learning in Fiji. eLearning platforms should be able to poss... 详细信息
来源: 评论
Hunter Prey Optimization with Hybrid Deep Learning for Fake News Detection on Arabic Corpus
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4255-4272页
作者: Hala J.Alshahrani Abdulkhaleq Q.A.Hassan Khaled Tarmissi Amal S.Mehanna Abdelwahed Motwakel Ishfaq Yaseen Amgad Atta Abdelmageed Mohamed I.Eldesouki Department of Applied Linguistics College of LanguagesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of English College of Science and Arts at MahayilKing Khalid UniversityMuhayil63763Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversityMakkah24211Saudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Information System College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Nowadays,the usage of socialmedia platforms is rapidly increasing,and rumours or false information are also rising,especially among Arab *** false information is harmful to society and *** and detecting the spread of ... 详细信息
来源: 评论
Solving Constrained Multi-objective Optimization Problems with Passive Archiving Mechanism  1
收藏 引用
17th International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2022
作者: Jia, Huijuan Zhang, Kai Shen, Chaonan School of Computer Science and Technology Wuhan University of Science and Technology Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan University of Science and Technology Wuhan430065 China
During these years, many advanced constrained multi-objective evolutionary algorithms (CMOEAs) have been developed to solve constrained multi-objective optimization problems (CMOPs). However, some existing constrained... 详细信息
来源: 评论
Intelligent Deep Convolutional Neural Network Based Object DetectionModel for Visually Challenged People
收藏 引用
computer systems Science & Engineering 2023年 第9期46卷 3191-3207页
作者: S.Kiruthika Devi Amani Abdulrahman Albraikan Fahd N.Al-Wesabi Mohamed K.Nour Ahmed Ashour Anwer Mustafa Hilal Department of Computing Technology SRM Institute of Science and TechnologyIndia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Department of Computer Science College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Engineering Mathematics and Physics Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Artificial Intelligence(AI)and computer Vision(CV)advancements have led to many useful methodologies in recent years,particularly to help visually-challenged *** detection includes a variety of challenges,for example,... 详细信息
来源: 评论
Machine Learning-based Evaluation of Heart Rate Variability Response in Children with Autism Spectrum Disorder  3
Machine Learning-based Evaluation of Heart Rate Variability ...
收藏 引用
3rd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2023
作者: Mohammed, Vazeer Ali Mohammed, Mehmood Ali Mohammed, Murtuza Ali Logeshwaran, J. Jiwani, Nasmin Lewis University Department of Computer and Information System IL United States University of the Cumberlands Department of Information Technology WilliamsburgKY United States Sri Eshwar College of Engineering Department of Electronics and Communication Engineering Coimbatore India
At present, various electronic devices are used to monitor human heart rates. However, its functions are to avoid predicting the problems caused by heart rate variability in advance and analyzing its implications. It ... 详细信息
来源: 评论
Energy Aware Secure Cyber-Physical systems with Clustered Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 5499-5513页
作者: Masoud Alajmi Mohamed K.Nour Siwar Ben Haj Hassine Mimouna Abdullah Alkhonaini Manar Ahmed Hamza Ishfaq Yaseen Abu Sarwar Zamani Mohammed Rizwanullah Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Science College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversityAbha62529Saudi Arabia Department of Computer Science College of Computer and Information SciencesPrince Sultan UniversitySaudi Arabia Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Recently,cyber physical system(CPS)has gained significant attention which mainly depends upon an effective collaboration with computation and physical *** greatly interrelated and united characteristics of CPS resulti... 详细信息
来源: 评论
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability in Binary Programs: Precision in Vulnerability Detection: Advanced Slicing Techniques for Binary Program Analysis  7
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability ...
收藏 引用
7th International Conference on computer Science and Artificial Intelligence, CSAI 2023
作者: Chukkol, Abdulrahman Hamman Adama Luo, Senlin Yunusa, Haruna Yusuf, Abdulganiyu Abdu Mohammed, Abulfatahi School of Information and Electronics Beijing Institute of Technology Beijing China Information System and Security and Countermeasures Experimental Center Beijing Institute of Technology Beijing China School of Automation Science and Electrical Engineering Beihang University Beijing China School of Computer Science Beijing Institute of Technology Beijing China School of Management and Information Technology Modibbo Adama University Yola Nigeria
Identifying vulnerabilities in binary code with precision is a critical area of study in the field of software security. Most existing techniques fail to pinpoint the vulnerability's exact location, due to the ext... 详细信息
来源: 评论