咨询与建议

限定检索结果

文献类型

  • 2,359 篇 期刊文献
  • 1,222 篇 会议
  • 9 册 图书

馆藏范围

  • 3,590 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,330 篇 工学
    • 1,535 篇 计算机科学与技术...
    • 1,252 篇 软件工程
    • 569 篇 信息与通信工程
    • 360 篇 电气工程
    • 314 篇 生物工程
    • 244 篇 控制科学与工程
    • 240 篇 电子科学与技术(可...
    • 219 篇 生物医学工程(可授...
    • 174 篇 光学工程
    • 158 篇 化学工程与技术
    • 127 篇 机械工程
    • 105 篇 动力工程及工程热...
    • 87 篇 仪器科学与技术
    • 86 篇 交通运输工程
    • 68 篇 土木工程
    • 65 篇 材料科学与工程(可...
  • 1,707 篇 理学
    • 746 篇 数学
    • 657 篇 物理学
    • 404 篇 生物学
    • 272 篇 统计学(可授理学、...
    • 185 篇 化学
    • 120 篇 系统科学
  • 594 篇 管理学
    • 334 篇 管理科学与工程(可...
    • 273 篇 图书情报与档案管...
    • 164 篇 工商管理
  • 219 篇 医学
    • 181 篇 临床医学
    • 151 篇 基础医学(可授医学...
    • 90 篇 药学(可授医学、理...
    • 65 篇 公共卫生与预防医...
  • 98 篇 法学
    • 79 篇 社会学
  • 63 篇 经济学
  • 46 篇 农学
  • 29 篇 教育学
  • 13 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 74 篇 hadrons
  • 68 篇 deep learning
  • 65 篇 data mining
  • 64 篇 machine learning
  • 60 篇 training
  • 56 篇 feature extracti...
  • 55 篇 semantics
  • 50 篇 hadron colliders
  • 46 篇 hadronic decays
  • 44 篇 computational mo...
  • 44 篇 fractals
  • 38 篇 bottom mesons
  • 37 篇 reinforcement le...
  • 36 篇 artificial intel...
  • 35 篇 laboratories
  • 34 篇 branching fracti...
  • 33 篇 accuracy
  • 31 篇 object detection
  • 31 篇 federated learni...
  • 30 篇 image segmentati...

机构

  • 426 篇 department of ph...
  • 411 篇 horia hulubei na...
  • 406 篇 van swinderen in...
  • 405 篇 school of physic...
  • 403 篇 cavendish labora...
  • 400 篇 iccub universita...
  • 399 篇 h.h. wills physi...
  • 386 篇 university of ch...
  • 379 篇 yandex school of...
  • 372 篇 department of ph...
  • 365 篇 imperial college...
  • 350 篇 stfc rutherford ...
  • 347 篇 center for high ...
  • 342 篇 institute of par...
  • 321 篇 henryk niewodnic...
  • 312 篇 nikhef national ...
  • 300 篇 school of physic...
  • 299 篇 physik-institut ...
  • 298 篇 oliver lodge lab...
  • 291 篇 departamento de ...

作者

  • 252 篇 barter w.
  • 249 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 bowcock t.j.v.
  • 223 篇 casse g.
  • 217 篇 blake t.
  • 215 篇 borsato m.
  • 215 篇 betancourt c.
  • 213 篇 bediaga i.
  • 213 篇 amato s.
  • 211 篇 boettcher t.
  • 210 篇 brundu d.
  • 210 篇 braun s.
  • 209 篇 baryshnikov f.
  • 207 篇 borisyak m.
  • 204 篇 bizzeti a.
  • 196 篇 bencivenni g.
  • 188 篇 back j.j.
  • 186 篇 bay a.
  • 174 篇 bursche a.

语言

  • 3,253 篇 英文
  • 312 篇 其他
  • 27 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Department of Computer Engineering and Data mining laboratory"
3590 条 记 录,以下是101-110 订阅
排序:
h5bench: A unified benchmark suite for evaluating HDF5 I/O performance on pre-exascale platforms
h5bench: A unified benchmark suite for evaluating HDF5 I/O p...
收藏 引用
作者: Bez, Jean Luca Tang, Houjun Breitenfeld, Scot Zheng, Huihuo Liao, Wei-Keng Hou, Kaiyuan Huang, Zanhua Byna, Suren Scientific Data Division Lawrence Berkeley National Laboratory BerkeleyCA United States HDF Group ChampaignIL United States Data Science Group Argonne National Laboratory LemontIL United States Electrical and Computer Engineering Department Northwestern University EvanstonIL United States Computer Science Department Northwestern University EvanstonIL United States Department of Computer Science and Engineering The Ohio State University OH United States
Parallel I/O is a critical technique for moving data between compute and storage subsystems of supercomputers. With massive amounts of data produced or consumed by compute nodes, high-performant parallel I/O is essent... 详细信息
来源: 评论
Research on Metaverse Security and Forensics
收藏 引用
computers, Materials & Continua 2023年 第10期77卷 799-825页
作者: Guangjun Liang Jianfang Xin Qun Wang Xueli Ni Xiangmin Guo Pu Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjingChina Engineering Research Center of Electronic Data Forensics Analysis NanjingChina Key Laboratory of Digital Forensics Department of Public Security of Jiangsu ProvinceNanjingChina School of Intelligent Engineering Nanjing Institute of Railway TechnologyNanjingChina
As a subversive concept,the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic,industrial,and investment ***,while the metaverse brings unprecedente... 详细信息
来源: 评论
Spatio-Temporal Graph Neural Networks for Accurate Crime Prediction
Spatio-Temporal Graph Neural Networks for Accurate Crime Pre...
收藏 引用
International eConference on computer and Knowledge engineering (ICCKE)
作者: Rojan Roshankar Mohammad Reza Keyvanpour Department of Computer Engineering Faculty of Engineering Data Mining Laboratory Alzahra University Tehran Iran Department of Computer Engineering Faculty of Engineering Alzahra University Tehran Iran
As a matter of public safety and resource allocation, crime prediction is of paramount importance. As a result of applying data preprocessing techniques and a graph-based approach, this paper presents a crime predicti...
来源: 评论
Fuzzy-ID3 Algorithm for Breast Cancer Disease Classification
Fuzzy-ID3 Algorithm for Breast Cancer Disease Classification
收藏 引用
International Conference on Web Research (ICWR)
作者: Zahra Sadat Hosseini Alast Mohammad Reza Keyvanpour Data Mining Laboratory Department of Computer Engineering Faculty of Engineering Alzahra University Tehran Iran Department of Computer Engineering Faculty of Engineering Alzahra University Tehran Iran
In terms of death rates, breast cancer comes in second, among women with cancer. Despite the fact that cancer cells grow in a multistep process involving a number of different types of cells, prevention of breast canc...
来源: 评论
A Comprehensive Approach to SMS Spam Filtering Integrating Embedded and Statistical Features
A Comprehensive Approach to SMS Spam Filtering Integrating E...
收藏 引用
International eConference on computer and Knowledge engineering (ICCKE)
作者: Shaghayegh Hosseinpour Mohammad Reza Keyvanpour Data Mining Laboratory Department of Computer Engineering Faculty of Engineering Alzahra University Tehran Iran Department of Computer Engineering Faculty of Engineering Alzahra University Tehran Iran
Modern society relies heavily on mobile phones to communicate. One of the most valuable mobile phone services is SMS (Short Message Service), which simplifies communication greatly. There have been spammers who have m...
来源: 评论
Evaluation of Supervised Machine Learning Algorithms for Credit Card Fraud Detection: A Comparison
Evaluation of Supervised Machine Learning Algorithms for Cre...
收藏 引用
International Conference on Web Research (ICWR)
作者: Qazaleh Sadat Mirhashemi Negar Nasiri Mohammad Reza Keyvanpour Data Mining Laboratory Department of Computer Engineering Faculty of Engineering Alzahra University Tehran Iran Department of Computer Engineering Faculty of Engineering Alzahra University Tehran Iran
Every day the modern world is moving towards digitalization and cashless transactions are becoming more common, credit cards are rapidly becoming more popular. Online and offline purchases using credit cards have beco...
来源: 评论
P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes  5th
P-TECS: An Energy Balance Algorithm for Opportunistic Netwo...
收藏 引用
5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022
作者: Xu, Gang Yang, Xiaoying Chen, Jingjian Huang, Baoqi College of Computer Science Inner Mongolia University Hohhot010021 China Inner Mongolia A.R. Key Laboratory of Data Mining and Knowledge Engineering Inner Mongolia University Hohhot010021 China
This paper proposes an energy balance opportunistic networks routing algorithm P-TECS. The P-TECS solves the problems of energy consumption of key nodes in existing opportunistic routing algorithms. This paper defines... 详细信息
来源: 评论
Few-Shot Object Detection Based on the Transformer and High-Resolution Network
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3439-3454页
作者: Dengyong Zhang Huaijian Pu Feng Li Xiangling Ding Victor S.Sheng Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and TechnologyChangsha410114China School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China School of Computer Science and Engineering Hunan University of Science and TechnologyXiangtan411004China Department of Computer Science Texas Tech UniversityLubbock79409TXUSA
Now object detection based on deep learning tries different *** uses fewer data training networks to achieve the effect of large dataset ***,the existing methods usually do not achieve the balance between network para... 详细信息
来源: 评论
Enhancing QSAR Modeling: A Fusion of Sequential Feature Selection and Support Vector Machine
Enhancing QSAR Modeling: A Fusion of Sequential Feature Sele...
收藏 引用
Conference on Information and Knowledge Technology
作者: Farzaneh Khajehgili-Mirabadi Mohammad Reza Keyvanpour Department of Computer Engineering Faculty of Engineering Data Mining Laboratory Alzahra University Tehran Iran Department of Computer Engineering Faculty of Engineering Alzahra University Tehran Iran
Quantitative Structure-Activity Relationship (QSAR) modeling is an approach employed to predict the biological response of chemical compounds by considering their structural attributes. Classification machine learning...
来源: 评论
Aerial Reliable Collaborative Communications for Terrestrial Mobile Users via Evolutionary Multi-Objective Deep Reinforcement Learning
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 5731-5748页
作者: Sun, Geng Xiao, Jian Li, Jiahui Wang, Jiacheng Kang, Jiawen Niyato, Dusit Mao, Shiwen the College of Computer Science and Technology Jilin University Changchun130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun130012 China the College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore the School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore the School of Automation Guangdong University of Technology Guangzhou510641 China the Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States
—Unmanned aerial vehicles (UAVs) have emerged as the potential aerial base stations (BSs) to improve terrestrial communications. However, the limited onboard energy and antenna power of a UAV restrict its communicati... 详细信息
来源: 评论