咨询与建议

限定检索结果

文献类型

  • 1,116 篇 期刊文献
  • 1,106 篇 会议
  • 26 册 图书

馆藏范围

  • 2,248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,378 篇 工学
    • 977 篇 计算机科学与技术...
    • 743 篇 软件工程
    • 267 篇 信息与通信工程
    • 200 篇 控制科学与工程
    • 167 篇 电气工程
    • 152 篇 生物工程
    • 145 篇 电子科学与技术(可...
    • 140 篇 光学工程
    • 126 篇 生物医学工程(可授...
    • 93 篇 仪器科学与技术
    • 74 篇 化学工程与技术
    • 71 篇 机械工程
    • 66 篇 材料科学与工程(可...
    • 51 篇 网络空间安全
    • 47 篇 动力工程及工程热...
  • 986 篇 理学
    • 488 篇 数学
    • 384 篇 物理学
    • 183 篇 生物学
    • 150 篇 统计学(可授理学、...
    • 134 篇 化学
    • 106 篇 系统科学
    • 51 篇 地球物理学
  • 347 篇 管理学
    • 223 篇 管理科学与工程(可...
    • 132 篇 图书情报与档案管...
    • 116 篇 工商管理
  • 155 篇 医学
    • 126 篇 临床医学
    • 113 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
    • 55 篇 药学(可授医学、理...
  • 51 篇 法学
    • 47 篇 社会学
  • 41 篇 农学
  • 32 篇 经济学
  • 32 篇 教育学
  • 7 篇 文学
  • 6 篇 艺术学
  • 5 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 89 篇 deep learning
  • 76 篇 machine learning
  • 63 篇 computer science
  • 47 篇 artificial intel...
  • 45 篇 accuracy
  • 38 篇 computational mo...
  • 36 篇 convolutional ne...
  • 34 篇 internet of thin...
  • 34 篇 training
  • 30 篇 predictive model...
  • 30 篇 feature extracti...
  • 29 篇 neural networks
  • 28 篇 covid-19
  • 25 篇 computer archite...
  • 24 篇 laboratories
  • 24 篇 data mining
  • 24 篇 mathematics
  • 22 篇 data models
  • 21 篇 educational inst...
  • 21 篇 visualization

机构

  • 58 篇 infn sezione di ...
  • 58 篇 north-west unive...
  • 58 篇 université de st...
  • 57 篇 institut univers...
  • 56 篇 tno technical sc...
  • 55 篇 national centre ...
  • 51 篇 nikhef national ...
  • 50 篇 university of jo...
  • 49 篇 ncsr demokritos ...
  • 49 篇 infn sezione di ...
  • 48 篇 infn sezione di ...
  • 47 篇 university moham...
  • 47 篇 comenius univers...
  • 46 篇 lpc caen normand...
  • 46 篇 university of am...
  • 45 篇 infn sezione di ...
  • 43 篇 université de ha...
  • 42 篇 infn sezione di ...
  • 42 篇 western sydney u...
  • 42 篇 università la sa...

作者

  • 58 篇 chen a.
  • 58 篇 ferrara g.
  • 58 篇 ardid m.
  • 58 篇 calvo d.
  • 56 篇 benoit d.m.
  • 56 篇 eddymaoui a.
  • 52 篇 gagliardini s.
  • 52 篇 gal t.
  • 52 篇 bozza c.
  • 52 篇 díaz a.f.
  • 52 篇 boumaaza j.
  • 51 篇 coleiro a.
  • 51 篇 gozzini s.r.
  • 51 篇 dallier r.
  • 51 篇 boettcher m.
  • 50 篇 benhassi m.
  • 50 篇 enzenhöfer a.
  • 50 篇 celli s.
  • 50 篇 carretero v.
  • 50 篇 ardid s.

语言

  • 2,118 篇 英文
  • 127 篇 其他
  • 4 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computer Science and Applied Computing"
2248 条 记 录,以下是421-430 订阅
排序:
ML-based Modeling to Predict I/O Performance on Different Storage Sub-systems
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Yiheng Sivaraman, Pranav Devarajan, Hariharan Mohror, Kathryn Bhatele, Abhinav Department of Computer Science University of Maryland United States Center for Applied Scientific Computing Lawrence Livermore National Laboratory United States
Parallel applications can spend a significant amount of time performing I/O on large-scale supercomputers. Fast near-compute storage accelerators called burst buffers can reduce the time a processor spends performing ... 详细信息
来源: 评论
Optimizing a Distributed Graph Data Structure for K - Path Centrality Estimation on HPC
Optimizing a Distributed Graph Data Structure for K - Path C...
收藏 引用
IEEE Conference on High Performance Extreme computing (HPEC)
作者: Lance Fletcher Trevor Steil Roger Pearce Lawrence Livermore National Laboratory (LLNL) Center for Applied Scientific Computing Department of Computer Science and Engineering Texas A&M Univeristy
K-Path centrality is based on the flow of information in a graph along simple paths of length at most K. This work addresses the computational cost of estimating K-path centrality in large-scale graphs by introducing ...
来源: 评论
Novel vision transformer and data augmentation technique for efficient detection of monkeypox disease
收藏 引用
Multimedia Tools and Applications 2024年 1-19页
作者: Alarfaj, Aisha Ahmed Ahmad, Salman Hakeem, Abeer M. Alabdulqader, Ebtisam Abdullah PERO, Chiara Alsubai, Shtwai Innab, Nisreen Ashraf, Imran Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Post Graduate Resident Department of Urology Allama Iqbal Teaching Hospital Dera Ghazi Khan Pakistan Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia Department of Information Technology College of Computer and Information Sciences King Saud University P. O. Box 800 Riyadh11421 Saudi Arabia Department of Management & amp Innovation Systems University of Salerno Via Giovanni Paolo II 132 Fisciano Salerno Italy Department of Computer Science College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University P.O. Box 151 Al-Kharj11942 Saudi Arabia Department of Computer Science and Information Systems College of Applied Sciences AlMaarefa University Diriyah Riyadh13713 Saudi Arabia Department of Information and Communication Engineering Yeungnam University Gyeongsan Korea Republic of
Recent technological advancements have paved the way for the optimization of medical processes, particularly automated disease detection. Moreover, the adoption of machine learning (ML) has greatly helped in automatin... 详细信息
来源: 评论
Review the Challenges Associated with Steganography Using Artificial Intelligence Techniques
Review the Challenges Associated with Steganography Using Ar...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Mohammad Rasmi Al-Mousa Sultan Mohammed Albilasi Malak Hamad Al-mashagbeh Mahmoud Asassfeh Mahmoud Odeh Khaled AlQawasmi Ghassan Samara Dena Abu Laila Department of Cybersecurity Zarqa University Zarqa Jordan Department of Cybersecurity and Cloud Computing Applied Science Private University Amman Jordan Department of Computer Science Zarqa University Zarqa Jordan Department of Cybersecurity Faculty Zarqa Technical Intermediate College Zarqa Jordan
The importance of data masking techniques has increased due to the rapid expansion of covert communications and the mass sharing of multimedia content. Steganography is a technique that allows for the safe and covert ... 详细信息
来源: 评论
A news image captioning approach based on multimodal pointer-generator network
A news image captioning approach based on multimodal pointer...
收藏 引用
作者: Chen, Jingqiang Zhuge, Hai School of Computer Science Nanjing University of Posts and Telecommunications Nanjing China School of Computer Science and Network Engineering Guangzhou University Guangzhou China Department of Computer Science School of Engineering and Applied Science Aston University Birmingham United Kingdom Key Laboratory of Intelligent Information Processing Institute of Computing Technology University of Chinese Academy of Sciences Chinese Academy of Sciences Beijing China
News image captioning aims to generate captions or descriptions for news images automatically, serving as draft captions for creating news image captions manually. News image captions are different from generic captio... 详细信息
来源: 评论
Malaria Parasite Detection Using a Quantum-Convolutional Network
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 6023-6039页
作者: Javaria Amin Muhammad Almas Anjum Abida Sharif Mudassar Raza Seifedine Kadry Yunyoung Nam University of Wah Wah CanttPakistan National University of Technology(NUTECH) IslamabadPakistan COMSATS University Islamabad Vehari CampusVehariPakistan COMSATS University Islamabad Wah CampusPakistan Faculty of Applied Computing and Technology Noroff University CollegeKristiansandNorway Department of Computer Science and Engineering Soonchunhyang UniversityAsan31538Korea
Malaria is a severe illness triggered by parasites that spreads via mosquito *** underdeveloped nations,malaria is one of the top causes of mortality,and it is mainly diagnosed through ***-assisted malaria diagnosis i... 详细信息
来源: 评论
A Study of Optimized Proposed Model for Gateway Congestion Control  11
A Study of Optimized Proposed Model for Gateway Congestion C...
收藏 引用
11th International Conference on System Modeling and Advancement in Research Trends, SMART 2022
作者: Quraishi, Suhail Javed Khan, Rubina Liyakat Hussein, Tanvir Mahmoud Saxena, Vineet Chaudhury, Sushovan Rastogi, Ajay Mriirs Department: Computer Applications Faridabad India The Applied College Imam Abdulrahman Bin Faisal University Computer Science Department Dammam Saudi Arabia Imam Abdulrahman Bin Faisal University Saudi Arabia University of Engineering and Management Department of Computer Science and Engineering West Bengal Kolkata India College of Computing Sciences and Information Technology Teerthanker Mahaveer University Moradabad India
A congestion control mechanism is needed to balance the network load to prevent pack drops and avoid network deadlocks. The main purpose is to analyze efficient and reliable congestion control methods which will reduc... 详细信息
来源: 评论
Analysing Student Depression through Cyber-Activity Patterns Using Heterogeneous Graph Attention Networks  1
Analysing Student Depression through Cyber-Activity Patterns...
收藏 引用
1st International Conference on Software, Systems and Information Technology, SSITCON 2024
作者: Shukla, Tushar Dhar Vanyan, Diana Rizvi, Qaim Mehdi George, Geogen Bhosale, Aryaraj Dattatraya Bhoopathy, V. University Institute of Physical Education & Sports Chandigarh University Department of Physical Education Mohali India Kuban State University Krasnodar Russia Kolkata India University of Technology and Applied Sciences College of Computing and Information Sciences Middle East Ibri Oman Indian Institute of Information Technology Pune India Sree Rama Engineering College Department of Computer Science and Engineering Tirupathi India
This study focusses on the crucial matter of identifying student sadness by analysing patterns of cyberactivity. The technology utilizes Heterogeneous Graph Attention Networks (HGATs) to represent and examine intricat... 详细信息
来源: 评论
Supervised Machine Learning-Based Prediction of COVID-19
收藏 引用
computers, Materials & Continua 2021年 第10期69卷 21-34页
作者: Atta-ur-Rahman Kiran Sultan Iftikhar Naseer Rizwan Majeed Dhiaa Musleh Mohammed Abdul Salam Gollapalli Sghaier Chabani Nehad Ibrahim Shahan Yamin Siddiqui Muhammad Adnan Khan Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of Computer Information System College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityDammam31441Saudi Arabia Department of CIT Faculty of Applied StudiesKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Directorate of IT The Islamia University of BahawalpurBahawalpur63100Pakistan School of Computer Science National College of Business Administration and EconomicsLahore54000Pakistan Department of Computer Science Minhaj University LahoreLahore54000Pakistan Department of Computer Science Faculty of ComputingRiphah International University Lahore CampusLahore54000Pakistan
COVID-19 turned out to be an infectious and life-threatening viral disease,and its swift and overwhelming spread has become one of the greatest challenges for the *** yet,no satisfactory vaccine or medication has been... 详细信息
来源: 评论
On the Instance Optimality of Detecting Collisions and Subgraphs
arXiv
收藏 引用
arXiv 2023年
作者: Ben-Eliezer, Omri Grossman, Tomer Naor, Moni Simons Institute for the Theory of Computing University of California Berkeley United States Department of Computer Science and Applied Mathematics Weizmann Institute of Science Rehovot76100 Israel
Suppose you are given a function f : [n] → [n] via (black-box) query access to the function. You are looking to find something local, like a collision (a pair x ≠ y s.t. f(x) = f(y)). The question is whether knowing... 详细信息
来源: 评论