咨询与建议

限定检索结果

文献类型

  • 1,081 篇 期刊文献
  • 931 篇 会议
  • 26 册 图书

馆藏范围

  • 2,038 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,234 篇 工学
    • 806 篇 计算机科学与技术...
    • 662 篇 软件工程
    • 257 篇 信息与通信工程
    • 222 篇 生物医学工程(可授...
    • 220 篇 生物工程
    • 203 篇 控制科学与工程
    • 137 篇 电气工程
    • 129 篇 光学工程
    • 117 篇 电子科学与技术(可...
    • 113 篇 机械工程
    • 66 篇 仪器科学与技术
    • 58 篇 化学工程与技术
    • 46 篇 动力工程及工程热...
    • 36 篇 材料科学与工程(可...
    • 31 篇 建筑学
    • 31 篇 安全科学与工程
  • 732 篇 理学
    • 344 篇 数学
    • 246 篇 生物学
    • 191 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 89 篇 系统科学
    • 64 篇 化学
  • 352 篇 管理学
    • 225 篇 管理科学与工程(可...
    • 116 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 269 篇 医学
    • 216 篇 临床医学
    • 170 篇 基础医学(可授医学...
    • 109 篇 药学(可授医学、理...
    • 80 篇 公共卫生与预防医...
  • 50 篇 法学
    • 43 篇 社会学
  • 32 篇 农学
  • 29 篇 经济学
  • 20 篇 教育学
  • 8 篇 文学
  • 2 篇 哲学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 60 篇 deep learning
  • 58 篇 machine learning
  • 43 篇 feature extracti...
  • 43 篇 artificial intel...
  • 37 篇 accuracy
  • 35 篇 computational mo...
  • 34 篇 computer science
  • 33 篇 intelligent syst...
  • 32 篇 data mining
  • 32 篇 semantics
  • 32 篇 training
  • 29 篇 support vector m...
  • 29 篇 mcda
  • 27 篇 image segmentati...
  • 26 篇 optimization
  • 23 篇 internet of thin...
  • 23 篇 decision making
  • 22 篇 medical services
  • 22 篇 laboratories
  • 22 篇 visualization

机构

  • 72 篇 state key labora...
  • 44 篇 department of co...
  • 37 篇 state key labora...
  • 25 篇 unit of medical ...
  • 20 篇 research team on...
  • 14 篇 tsinghua nationa...
  • 14 篇 school of intell...
  • 13 篇 state key labora...
  • 13 篇 school of inform...
  • 12 篇 google
  • 12 篇 school of comput...
  • 11 篇 department of co...
  • 11 篇 beijing national...
  • 11 篇 mpi for intellig...
  • 11 篇 department of au...
  • 10 篇 department of el...
  • 10 篇 meu research uni...
  • 9 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 department of co...

作者

  • 82 篇 dimitrios i. fot...
  • 41 篇 sun maosong
  • 41 篇 fotiadis dimitri...
  • 36 篇 huang minlie
  • 26 篇 fuchun sun
  • 25 篇 zhidong deng
  • 19 篇 liu yang
  • 18 篇 d.i. fotiadis
  • 17 篇 sun fuchun
  • 17 篇 bo zhang
  • 16 篇 salabun wojciech
  • 16 篇 xu hua
  • 16 篇 zhu xiaoyan
  • 15 篇 fotiadis d.i.
  • 15 篇 bernhard schölko...
  • 15 篇 wojciech sałabun
  • 15 篇 liu zhiyuan
  • 15 篇 runyao duan
  • 15 篇 gong chen
  • 14 篇 antonis i. sakel...

语言

  • 1,790 篇 英文
  • 220 篇 其他
  • 29 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science Unit of Medical Technology and Intelligent Information Systems"
2038 条 记 录,以下是21-30 订阅
排序:
Semantic association rules for data interestingness using domain ontology
收藏 引用
International Journal of Metadata, Semantics and Ontologies 2022年 第1期16卷 47-67页
作者: Abhilash, C.B. Mahesh, Kavi Department of Computer Science and Engineering Indian Institute of Information Technology Dharwad Karnataka Dharwad India Department of Data Science and Intelligent Systems Indian Institute of Information Technology Dharwad Karnataka Dharwad India
The COVID-19 pandemic is a major public health crisis threatening people’s health, well-being, freedom to travel and the global economy. Understanding COVID-19 symptoms for determining the severity of cases is critic... 详细信息
来源: 评论
Outage Prediction and Improvement in 6G for UAV Swarm Relays Using Machine Learning
收藏 引用
Progress In Electromagnetics Research B 2024年 107卷 33-45页
作者: Khalil, Hisham Ali, Gauhar Rahman, Saeed Ur Asim, Muhammad Affendi, Mohammed El Department of Intelligent Systems Faculty of Information Technology University of Lahore Pakistan EIAS Data Science and Block chain Lab College of Computer and Information Sciences Prince Sultan University Riyadh11586 Saudi Arabia School of Electronic Engineering Xidian University Xi’an China
The issue of signal outages in sub-THz frequency communication for future 6G networks is addressed by this research. A machine learning method is proposed, employing Random Forest and K-Means algorithms to predict the... 详细信息
来源: 评论
Analyzing and Mitigating Common Vulnerabilities in Smart Contracts in Web3 Ecosystem: A Comprehensive Study  2
Analyzing and Mitigating Common Vulnerabilities in Smart Con...
收藏 引用
2nd IEEE International Conference on Data, Decision and systems, ICDDS 2023
作者: Hegadi, Rajendra Akella, Syam Sankar Karthik Reddy, Koushik Kumar Pavan, C. Indian Institute of Information Technology Dharwad Department of Data Science and Intelligent Systems Karnataka India Indian Institute of Information Technology Dharwad Department of Computer Science and Engineering Karnataka India
As we enter a new era of decentralized applications and blockchain technology, the issue of Web3 security becomes crucial and requires immediate attention. Given the growing popularity of using smart contracts in web3... 详细信息
来源: 评论
Investigation of the significance of the plaque morphology evolution in plaque rupture events using computational biomechanics  46
Investigation of the significance of the plaque morphology e...
收藏 引用
46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2024
作者: Pleouras, Dimitrios S. Siogkas, Panagiotis K. Potsika, Vassiliki T. Tsakanikas, Vasilis D. Dimos, Sokratis S. Mantzaris, Michalis D. Koncar, Igor Fotiadis, Dimitrios I. University of Ioannina Unit of Medical Technology and Intelligent Information Systems Dept. of Materials Science and Engineering IoanninaGR45110 Greece University of Belgrade Faculty of Medicine Department of Vascular and Endovascular Surgery Belgrade Serbia University of Ioannina Unit of Medical Technology and Intelligent Information Systems Biomedical Research Institute Forth Dept. of Materials Science and Engineering IoanninaGR45110 Greece
Forwarded by the technological urge of this era, several computational methods are implemented to give further insights into possible outcomes of diseases. In this context, atherosclerosis, which is one of the most fa... 详细信息
来源: 评论
Automated analysis of fundus images for the diagnosis of retinal diseases: a review
收藏 引用
Research on Biomedical Engineering 2024年 第1期40卷 225-251页
作者: Berto, Alexa Scarpa, Fabio Tsiknakis, Nikos Manikis, Georgios Fotiadis, Dimitrios I. Marias, Kostas Scarpa, Alberto D-Eye s.r.l. Padua Italy Department of Information Engineering University of Padova Padua35131 Italy Heraklion70013 Greece Department of Biomedical Research Institute of Molecular Biology and Biotechnology FORTH Ioannina45115 Greece Department of Materials Science and Engineering Unit of Medical Technology and Intelligent Information Systems University of Ioannina Ioannina45110 Greece Department of Electrical and Computer Engineering Hellenic Mediterranean University Heraklion71004 Greece
Purpose: Colour fundus images are widely used in diagnosis treatment decision of several retinal diseases such as diabetic retinopathy (DR), glaucoma and age-related macular degeneration (AMD). These very common condi... 详细信息
来源: 评论
Drone Gesture Control using OpenCV and Tello  8
Drone Gesture Control using OpenCV and Tello
收藏 引用
8th Conference on information Communication technology and Society, ICTAS 2024
作者: Khoza, Nokuthula Owolawi, Pius Malele, Vusumuzi Soshanguve Campus Tshwane University of Technology Faculty of Information and Communication Technology Department of Computer Systems Engineering Pretoria South Africa North-West University Unit for Data Science and Computing School of Computer Science and Information Systems Vanderbijlpark Campus Vanderbijlpark South Africa
Tracking a person with an onboard camera is a very difficult and perhaps technically impossible if one camera is used. In this regard, real-life projects use a series of cameras to achieve the task. The advent of came... 详细信息
来源: 评论
AFuNet: an attention-based fusion network to classify texts in a resource-constrained language
收藏 引用
Neural Computing and Applications 2025年 第9期37卷 6725-6748页
作者: Hossain, Md. Rajib Hoque, Mohammed Moshiul Dewan, M. Ali Akber Hoque, Enamul Siddique, Nazmul Department of Computer Science & Engineering Chittagong University of Engineering & Technology Chittagong4349 Bangladesh School of Computing and Information Systems Faculty of Science and Technology Athabasca University AthabascaABT9S 3A3 Canada School of Information Technology York University TorontoONM3J 1P3 Canada School of Computing Engineering and Intelligent Systems Ulster University Coleraine United Kingdom
In the era of widespread Internet use and extensive social media interaction, the digital realm is accumulating vast amounts of unstructured text data. This unstructured data often contain undesirable information, nec... 详细信息
来源: 评论
Fractal Measurement of Images Human Brain from MRI
Fractal Measurement of Images Human Brain from MRI
收藏 引用
2024 Cognitive Models and Artificial Intelligence Conference, AICCONF 2024
作者: Anarova, Shahzoda Jabbarov, Jamoliddin Uralova, Iroda Tashkent University of Information Technologies Department of Convergence of digital technologies Computer Engineering Faculty Tashkent Uzbekistan Department of Computer science and technology Intelligent systems and computer technologies Faculty Samarkand State University Samarkand Uzbekistan
This article is devoted to the determination of the fractal size of the damaged part of the human brain on the basis of images obtained from MRI (magnetic resonance imaging). There are various mathematical methods for... 详细信息
来源: 评论
Secure-by-Construction Synthesis for Control systems
收藏 引用
IEEE Transactions on Automatic Control 2025年 第6期70卷 4170-4177页
作者: Zhong, Bingzhuo Liu, Siyuan Caccamo, Marco Zamani, Majid Thrust of Artificial Intelligence Information Hub The Thrust of Intelligent Transportation System Hub China KTH Royal Institute of Technology Division of Decision and Control Systems Stockholm Sweden Technical University of Munich TUM School of Engineering and Design Germany University of Colorado Boulder Department of Computer Science United States Ludwig Maximilian University Department of Computer Science Munich Germany
In this note, we present the synthesis of secure-by-construction controllers that address safety and security properties simultaneously in cyber-physical systems. Our focus is on studying a specific security property ... 详细信息
来源: 评论
A Novel Parallel Computing Confidentiality Scheme Based on Hindmarsh-Rose Model
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 1325-1341页
作者: Jawad Ahmad Mimonah Al Qathrady Mohammed SAlshehri Yazeed Yasin Ghadi Mujeeb Ur Rehman Syed Aziz Shah School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghEH105DTUK Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Computer Science Al Ain UniversityAbu Dhabi112612United Arab Emirates School of Science Technology and HealthYork St John UniversityYorkYO317EXUK Research Centre for Intelligent Healthcare Coventry UniversityCoventryCV15FBUK
Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this ***,given the limitations of computers,it becomes evenmore important to employ efficient and ... 详细信息
来源: 评论