咨询与建议

限定检索结果

文献类型

  • 3,332 篇 会议
  • 2,016 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 5,368 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,323 篇 工学
    • 2,307 篇 计算机科学与技术...
    • 1,859 篇 软件工程
    • 721 篇 信息与通信工程
    • 531 篇 控制科学与工程
    • 343 篇 电子科学与技术(可...
    • 328 篇 电气工程
    • 320 篇 生物工程
    • 292 篇 机械工程
    • 208 篇 仪器科学与技术
    • 205 篇 生物医学工程(可授...
    • 197 篇 光学工程
    • 162 篇 化学工程与技术
    • 130 篇 动力工程及工程热...
    • 124 篇 交通运输工程
    • 104 篇 安全科学与工程
    • 100 篇 材料科学与工程(可...
    • 94 篇 网络空间安全
  • 1,777 篇 理学
    • 915 篇 数学
    • 502 篇 物理学
    • 356 篇 生物学
    • 295 篇 统计学(可授理学、...
    • 214 篇 系统科学
    • 169 篇 化学
  • 942 篇 管理学
    • 573 篇 管理科学与工程(可...
    • 408 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 224 篇 医学
    • 188 篇 临床医学
    • 147 篇 基础医学(可授医学...
  • 147 篇 法学
    • 120 篇 社会学
  • 103 篇 经济学
    • 102 篇 应用经济学
  • 65 篇 教育学
  • 65 篇 农学
  • 21 篇 文学
  • 16 篇 艺术学
  • 15 篇 军事学

主题

  • 134 篇 feature extracti...
  • 131 篇 deep learning
  • 103 篇 accuracy
  • 90 篇 training
  • 88 篇 computer science
  • 87 篇 computational mo...
  • 86 篇 semantics
  • 79 篇 machine learning
  • 77 篇 optimization
  • 74 篇 data mining
  • 62 篇 predictive model...
  • 55 篇 internet of thin...
  • 52 篇 support vector m...
  • 51 篇 information syst...
  • 51 篇 neural networks
  • 50 篇 security
  • 50 篇 artificial intel...
  • 50 篇 data models
  • 48 篇 testing
  • 47 篇 genetic algorith...

机构

  • 184 篇 hubei province k...
  • 135 篇 school of comput...
  • 107 篇 college of compu...
  • 99 篇 department of co...
  • 60 篇 hubei province k...
  • 58 篇 college of infor...
  • 54 篇 school of softwa...
  • 47 篇 national enginee...
  • 46 篇 national key lab...
  • 45 篇 tsinghua nationa...
  • 43 篇 school of comput...
  • 41 篇 the key laborato...
  • 37 篇 department of co...
  • 36 篇 school of inform...
  • 31 篇 college of infor...
  • 30 篇 shandong provinc...
  • 28 篇 university of ch...
  • 25 篇 college of compu...
  • 25 篇 key laboratory f...
  • 21 篇 guangdong provin...

作者

  • 25 篇 shen linlin
  • 24 篇 ren jiadong
  • 21 篇 abdelwahed motwa...
  • 21 篇 zhang xiaolong
  • 21 篇 liu jun
  • 21 篇 gaol ford lumban
  • 20 篇 li peng
  • 19 篇 ishfaq yaseen
  • 19 篇 mesfer al duhayy...
  • 19 篇 jin hai
  • 18 篇 mohamed k.nour
  • 18 篇 xiaolong zhang
  • 18 篇 dan feng
  • 17 篇 manar ahmed hamz...
  • 16 篇 xu xin
  • 16 篇 wang wei
  • 16 篇 matsuo tokuro
  • 16 篇 hai jin
  • 16 篇 zhang kai
  • 15 篇 liu zhe

语言

  • 5,006 篇 英文
  • 237 篇 其他
  • 123 篇 中文
  • 6 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer System and Information Technology"
5368 条 记 录,以下是671-680 订阅
排序:
On a new fractional integral operator convoluted with a fractional k-symbol Raina function: stability
On a new fractional integral operator convoluted with a frac...
收藏 引用
International Conference on Fractional Differentiation and Its Applications (ICFDA)
作者: Suzan J. Obaiys Rabha W. Ibrahim Department of Computer System & Technology Faculty of Computer Science and Information Technology University of Malaya KL Malaysia Department of Computer Science and Mathematics Lebanese American University Beirut Lebanon
The fractional k-symbol Raina function (k-FRF) is convoluted with a class of analytic functions in a complex domain to build a new fractional integral operator (FIO) in this attempt. We research the polynomials produc...
来源: 评论
Natural Language Processing Studies in Humancomputer Interaction: A Bibliometric Analysis and Future Research Framework
Natural Language Processing Studies in HumanComputer Interac...
收藏 引用
Student Conference on Research and Development (SCOReD)
作者: Farah Syazwani Binti Mohd Rashid Amirrudin Bin Kamsin Nurul Fazmidar Binti Mohd Noor Department of Computer System Technology Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia College of Computing Informatics and Mathematics Universiti Teknologi MARA Shah Alam Selangor Malaysia
This study conducts a bibliometric analysis of Natural Language Processing (NLP) within Human-computer Interaction (HCI) to identify trends, challenges, and future directions. Analyzing 1,710 SCOPUS-indexed documents ... 详细信息
来源: 评论
Harnessing The Power of Random Forest in Predicting Startup Partnership Success  8
Harnessing The Power of Random Forest in Predicting Startup ...
收藏 引用
8th International Conference on Informatics and Computing, ICIC 2023
作者: Lukita, Chandra Lutfiani, Ninda Panjaitan, Arop Ria Saulina Bhima Rahardja, Untung Huzaifah, Muhamad Lutfi University of Catur Insan Cendekia Faculty of Information Systems Cirebon Indonesia University of Raharja Faculty of Economics and Business Tangerang Indonesia University of Esa Unggul Faculty of Management Jakarta Indonesia University of Raharja Faculty of System Computer Tangerang Indonesia University of Raharja Faculty of Information Technology Tangerang Indonesia
Startups are an important element in innovation and economic growth. However, startup failure is very high, so investors, governments, and startups need to predict startup success. This research develops a startup suc... 详细信息
来源: 评论
Disentangle Nighttime Lens Flares: Self-supervised Generation-based Lens Flare Removal  39
Disentangle Nighttime Lens Flares: Self-supervised Generatio...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: He, Yuwen Wang, Wei Wu, Wanyu Jiang, Kui Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology China School of Computer Science and Technology Harbin Institute of Technology China
Lens flares arise from light reflection and refraction within sensor arrays, whose diverse types include glow, veiling glare, reflective flare and so on. Existing methods are specialized for one specific type only, an... 详细信息
来源: 评论
Machine Learning for Intrusion Detection in Vehicular Ad-hoc Networks (VANETs): A Survey
Machine Learning for Intrusion Detection in Vehicular Ad-hoc...
收藏 引用
Emerging Smart Technologies and Applications (eSmarTA), International Conference on
作者: Nesmah A. Al-Khulaidi Ammar T. Zahary Asma A. Al-Shargabi Muneer A. S Hazaa Department of Computer Networks Yemen Academy for Graduate Studies Sana'a Yemen Department of Computer Science Faculty of Computing and IT University of Science and Technology Sana'a Yemen Department of Information Technology College of Computer Qassim University Buraydah Saudi Arabia Department of Computer Science Faculty of Computer and Information System Thamar University Thamar Yemen
Intrusion Detection systems (IDSs) have become a key security problem due to the increasing number of connected automobiles and the sensitive nature of the data transferred in Vehicular Ad-hoc Networks (VANETs). By ke... 详细信息
来源: 评论
An Efficient Hybrid PAPR Reduction for 5G NOMA-FBMC Waveforms
收藏 引用
computers, Materials & Continua 2021年 第12期69卷 2967-2981页
作者: Arun Kumar Sivabalan Ambigapathy Mehedi Masud Emad Sami Jaha Sumit Chakravarty Kanchan Sengar Department of Electronics and Communication Engineering JECRC UniversityJaipur303905India Center for System Design Chennai Institute of TechnologyIndia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Electrical and Computer Engineering Kennesaw State UniversityGAUSA
The article introduces Non-Orthogonal Multiple Access(NOMA)and Filter Bank Multicarrier(FBMC),known as hybrid waveform(NOMAFBMC),as two of the most deserving contenders for fifth-generation(5G)*** spectrum access and ... 详细信息
来源: 评论
Congestion Control Mechanisms and Techniques in computer Network: A Review
Congestion Control Mechanisms and Techniques in Computer Net...
收藏 引用
Data Science and Intelligent Computing (ICDSIC), International Conference on
作者: Ahmed Malik Altameemi Khulood A. Nassar Department of Computer Information System College of Computer Science and Information Technology University of Basrah Basrah Iraq
One of the most important and most pioneering topics in the field of networks is congestion and how to control it or avoid its occurrence because this topic has a huge impact on the network and the quality of service ... 详细信息
来源: 评论
A belief rule-based fault diagnosis method for Multi-UAVs under missing attribute data
A belief rule-based fault diagnosis method for Multi-UAVs un...
收藏 引用
2023 International Conference on Cyber-Physical Social Intelligence, ICCSI 2023
作者: Zhao, ErKai Hao, MingRui Yang, RuoHan Yue, KeYuan Yu, DeLin Harbin Normal University School of Computer Science and Information Engineering Harbin China Science and Technology on Complex System Control and Intelligent Agent Cooperation Laboratory Beijing China Northwestern Polytechnical University School of Electronics and Information Xi'an China Northwestern Polytechnical University School of Mathematics and Statistics Xi'an China
To reasonably improve the missing attribute data and effectively integrate sample data and uncertain expert knowledge, this paper proposes a new fault diagnosis method based on a belief rule base (BRB). In the case of... 详细信息
来源: 评论
Few-Shot Gearbox Fault Diagnosis Based on Semi-Supervised Prototypical Network and Contrastive Learning
Few-Shot Gearbox Fault Diagnosis Based on Semi-Supervised Pr...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Cheng, Shulie Liang, Yingjie Ping, Zuowei Liao, Xuechao Wang, Maolin Zhang, Yong School of Information Science and Engineering Wuhan University of Science and Technology Wuhan China Naval University of Engineering National Key Laboratory of Science and Technology on Vessel Integrated Power System Wuhan China School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan China
Due to the scarcity of labeled faulty data in industrial practice, fault diagnosis models often face challenges related to overfitting and limited accuracy. This article introduces a novel solution to tackle the probl... 详细信息
来源: 评论
Automated Software Vulnerability Detection via Curriculum Learning
Automated Software Vulnerability Detection via Curriculum Le...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Qianjin Du Wei Kun Xiaohui Kuang Xiang Li Gang Zhao Department of Computer Science and Technology Tsinghua University China National Key Laboratory of Science and Technology on Information System Security China
With the development of deep learning, software vulnerability detection methods based on deep learning have achieved great success, which outperform traditional methods in efficiency and precision. At the training sta...
来源: 评论