咨询与建议

限定检索结果

文献类型

  • 3,332 篇 会议
  • 2,016 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 5,368 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,323 篇 工学
    • 2,307 篇 计算机科学与技术...
    • 1,859 篇 软件工程
    • 721 篇 信息与通信工程
    • 531 篇 控制科学与工程
    • 343 篇 电子科学与技术(可...
    • 328 篇 电气工程
    • 320 篇 生物工程
    • 292 篇 机械工程
    • 208 篇 仪器科学与技术
    • 205 篇 生物医学工程(可授...
    • 197 篇 光学工程
    • 162 篇 化学工程与技术
    • 130 篇 动力工程及工程热...
    • 124 篇 交通运输工程
    • 104 篇 安全科学与工程
    • 100 篇 材料科学与工程(可...
    • 94 篇 网络空间安全
  • 1,777 篇 理学
    • 915 篇 数学
    • 502 篇 物理学
    • 356 篇 生物学
    • 295 篇 统计学(可授理学、...
    • 214 篇 系统科学
    • 169 篇 化学
  • 942 篇 管理学
    • 573 篇 管理科学与工程(可...
    • 408 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 224 篇 医学
    • 188 篇 临床医学
    • 147 篇 基础医学(可授医学...
  • 147 篇 法学
    • 120 篇 社会学
  • 103 篇 经济学
    • 102 篇 应用经济学
  • 65 篇 教育学
  • 65 篇 农学
  • 21 篇 文学
  • 16 篇 艺术学
  • 15 篇 军事学

主题

  • 134 篇 feature extracti...
  • 131 篇 deep learning
  • 103 篇 accuracy
  • 90 篇 training
  • 88 篇 computer science
  • 87 篇 computational mo...
  • 86 篇 semantics
  • 79 篇 machine learning
  • 77 篇 optimization
  • 74 篇 data mining
  • 62 篇 predictive model...
  • 55 篇 internet of thin...
  • 52 篇 support vector m...
  • 51 篇 information syst...
  • 51 篇 neural networks
  • 50 篇 security
  • 50 篇 artificial intel...
  • 50 篇 data models
  • 48 篇 testing
  • 47 篇 genetic algorith...

机构

  • 184 篇 hubei province k...
  • 135 篇 school of comput...
  • 107 篇 college of compu...
  • 99 篇 department of co...
  • 60 篇 hubei province k...
  • 58 篇 college of infor...
  • 54 篇 school of softwa...
  • 47 篇 national enginee...
  • 46 篇 national key lab...
  • 45 篇 tsinghua nationa...
  • 43 篇 school of comput...
  • 41 篇 the key laborato...
  • 37 篇 department of co...
  • 36 篇 school of inform...
  • 31 篇 college of infor...
  • 30 篇 shandong provinc...
  • 28 篇 university of ch...
  • 25 篇 college of compu...
  • 25 篇 key laboratory f...
  • 21 篇 guangdong provin...

作者

  • 25 篇 shen linlin
  • 24 篇 ren jiadong
  • 21 篇 abdelwahed motwa...
  • 21 篇 zhang xiaolong
  • 21 篇 liu jun
  • 21 篇 gaol ford lumban
  • 20 篇 li peng
  • 19 篇 ishfaq yaseen
  • 19 篇 mesfer al duhayy...
  • 19 篇 jin hai
  • 18 篇 mohamed k.nour
  • 18 篇 xiaolong zhang
  • 18 篇 dan feng
  • 17 篇 manar ahmed hamz...
  • 16 篇 xu xin
  • 16 篇 wang wei
  • 16 篇 matsuo tokuro
  • 16 篇 hai jin
  • 16 篇 zhang kai
  • 15 篇 liu zhe

语言

  • 5,006 篇 英文
  • 237 篇 其他
  • 123 篇 中文
  • 6 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer System and Information Technology"
5368 条 记 录,以下是561-570 订阅
排序:
Perioperative Anesthesia Data: Visualization, Effects, Analysis with Artificial Intelligence  4
Perioperative Anesthesia Data: Visualization, Effects, Analy...
收藏 引用
4th IEEE International Conference on Electronic Communications, Internet of Things and Big Data, ICEIB 2024
作者: Liu, Xiaoxiao McGrath, Sean Flanagan, Colin Lei, Yiming Zeng, Liaoyuan Electronic and Computer Engineering University of Limerick Limerick Ireland School of Mathematics and Information HeBei University HeBei China Mobile Digital Hospital System School of Electronics Peking University Ministry of Education Engineering Research Center Beijing China University of Electronic Science and Technology of China Department of Information and Communication Engineering Chengdu China
A comprehensive understanding of physiological data is essential for anesthesiologists to monitor and maintain the health of surgical patients. Understanding anesthetic signals is essential to improve over the past te... 详细信息
来源: 评论
Fuzzing DBMS via NNLM  7
Fuzzing DBMS via NNLM
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Li, Yabin Nie, Yuanping Kuang, Xiaohui Beijing University of Posts and Telecommunications School of Computer Science Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Vulnerabilities in database management system (DBMS) can cause serious security problems affecting hundreds of millions of software systems. Fuzzing is an effective vulnerability mining technology, but few studies uti... 详细信息
来源: 评论
Multimodal Aspect-Based Sentiment Analysis under Conditional Relation  31
Multimodal Aspect-Based Sentiment Analysis under Conditional...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Liu, Xinjing Li, Ruifan Ye, Shuqin Zhang, Guangwei Wang, Xiaojie School of Artificial Intelligence Beijing University of Posts and Telecommunications China School of Computer Science Beijing University of Posts and Telecommunications China Engineering Research Center of Information Networks Ministry of Education China Key Laboratory of Interactive Technology and Experience System Ministry of Culture and Tourism China
Multimodal Aspect-Based Sentiment Analysis (MABSA) aims to extract aspect terms from text-image pairs and identify their sentiments. Previous methods are based on the premise that the image contains the objects referr... 详细信息
来源: 评论
i-Know: Revolutionizing Knowledge Management with Interactive Quizzes
i-Know: Revolutionizing Knowledge Management with Interactiv...
收藏 引用
Humanitarian technology Conference (KHI-HTC), IEEE Karachi Section
作者: Zahidah Zulkifli Muhammad Darwish Bin Abdul Halim Arief Iskandar Bin Shaffei Nisrin AlSaiari Department of Information System Kulliyyah of Information and Communication Technology International Islamic University Malaysia Faculty of Computer Studies Arab Open University Saudi Arabia
This project focuses on the development of a website system designed to facilitate knowledge acquisition for students enrolled in the Kulliyyah of information Communication and technology (KICT) at the International I...
来源: 评论
A New Perspective of Deep Learning Testing Framework: Human-computer Interaction Based Neural Network Testing
A New Perspective of Deep Learning Testing Framework: Human-...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Wei Kong Hu Li Qianjin Du Huayang Cao Xiaohui Kuang National Key Laboratory of Science and Technology on Information System Security Beijing China Department of Computer Science and Technology Tsinghua University Beijing China
Deep learning models have revolutionized various domains but have also raised concerns regarding their security and reliability. Adversarial attacks and coverage-based testing have been extensively studied to assess a... 详细信息
来源: 评论
technology Integration in Cultural Heritage Preservation Enhancing Community Engagement and Effectiveness  3
Technology Integration in Cultural Heritage Preservation Enh...
收藏 引用
3rd International Conference on Creative Communication and Innovative technology, ICCIT 2024
作者: Lukita, Chandra Lutfiani, Ninda Salam, Rahmat Pangilinan, Greian April Setiani Rafika, Ageng Ahsanitaqwim, Ridhuan University of Catur Insan Cendekia Master of Management Cirebon Indonesia University of Raharja Master of Information System Tangerang Indonesia University of Muhamadiyah Jakarta Master of Administrative Sciences Jakarta Indonesia Centro Escolar University Medical Technology Manila Philippines University of Raharja Department of Computer System Tangerang Indonesia Kreatif Desain Department of Engineering Tangerang Indonesia
In the digital era, the preservation of cultural heritage faces unique challenges and opportunities. This research explores the integration of technology with traditional cultural practices, aiming to ensure sustainab... 详细信息
来源: 评论
An authenticated spectrum acquirement and transmission of encrypted images over fusion centre
收藏 引用
Multimedia Tools and Applications 2024年 1-24页
作者: V, Thanikaiselvan Y, PiyaDessi S, Renuga devi Shanthini, S. Suba Mahalingam, Hemalatha S, Aashiq Banu R, Dhivya V.M, Padmapriya Amirtharajan, Rengarajan School of Electronics Engineering Vellore Institute of Technology Vellore Vellore India School of Information Technology Vellore Institute of Technology Vellore India Department of Electrical and Computer Engineering Faculty of Engineering King Abdulaziz University Jeddah22254 Saudi Arabia System Engineering Department Military Technological College Muscat Oman Department of Electronics and Communication Engineering Mepco Schlenk Engineering College Tamilnadu Sivakasi626005 India Department of Computer Sciences Marquette University MilwaukeeWI53233 United States School of Electrical & amp Electronics Engineering SASTRA Deemed University 613 401 Thanjavur India
These days, spectrum insufficiency is the most common issue. If the number of smartphone users who access the radio spectrum grows, the radio spectrum becomes increasingly scarce. Certain types of technology equipment... 详细信息
来源: 评论
A third-party platoon coordination service: Pricing under government subsidies
A third-party platoon coordination service: Pricing under go...
收藏 引用
作者: Bai, Ting Johansson, Alexander Li, Shaoyuan Johansson, Karl Henrik Mårtensson, Jonas School of Electrical Engineering and Computer Science KTH Royal Institute of Technology Stockholm Sweden KTH Royal Institute of Technology Stockholm Sweden Department of Automation Shanghai Jiao Tong University Shanghai China Key Laboratory of System Control and Information Processing Shanghai Jiao Tong University Shanghai China Digital Futures Stockholm Sweden
This paper models a platooning system consisting of trucks and a third-party service provider (TPSP), which performs platoon coordination, distributes the platooning profit in platoons, and charges trucks in exchange ... 详细信息
来源: 评论
Internet of Things-based pregnancy tracking and monitoring service
Internet of Things-based pregnancy tracking and monitoring s...
收藏 引用
2022 International Conference Automatics and Informatics, ICAI 2022
作者: Ivanov, Rosen Yordanov, Stanimir Dinev, Dinko Technical University - Gabrovo Department Computer System and Technologies Gabrovo Bulgaria Technical University - Gabrovo Department Automation Information and Control Technology Gabrovo Bulgaria
This paper presents the architecture and implementation of a service for pregnancy tracking and monitoring. The main goal of the service is to analyze the behavior of pregnant women in order to proactively decide to n... 详细信息
来源: 评论
Drug-Target Interaction Prediction Based on Drug Subgraph Fingerprint Extraction Strategy and Subgraph Attention Mechanism  9th
Drug-Target Interaction Prediction Based on Drug Subgraph Fi...
收藏 引用
19th International Conference on Advanced Data Mining and Applications, ADMA 2023
作者: Wang, Lizhi Zhang, Xiaolong Lin, Xiaoli Hu, Jing College of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan China Hubei Key Laboratory of Intelligent Information Processing and Realtime Industrial System Hubei Wuhan China Institute of Big Data Science and Engineering Wuhan University of Science and Technology Hubei Wuhan China
Drug discovery is a major focus of modern research, and predicting drug-target interactions is one of the strategies to facilitate this research process. Traditional laboratory methods have long time cycles and are re... 详细信息
来源: 评论