咨询与建议

限定检索结果

文献类型

  • 1,106 篇 会议
  • 1,105 篇 期刊文献
  • 26 册 图书

馆藏范围

  • 2,237 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,369 篇 工学
    • 972 篇 计算机科学与技术...
    • 739 篇 软件工程
    • 267 篇 信息与通信工程
    • 200 篇 控制科学与工程
    • 166 篇 电气工程
    • 152 篇 生物工程
    • 145 篇 电子科学与技术(可...
    • 140 篇 光学工程
    • 126 篇 生物医学工程(可授...
    • 93 篇 仪器科学与技术
    • 73 篇 化学工程与技术
    • 71 篇 机械工程
    • 65 篇 材料科学与工程(可...
    • 51 篇 网络空间安全
    • 47 篇 动力工程及工程热...
  • 984 篇 理学
    • 488 篇 数学
    • 383 篇 物理学
    • 183 篇 生物学
    • 150 篇 统计学(可授理学、...
    • 133 篇 化学
    • 105 篇 系统科学
    • 51 篇 地球物理学
  • 343 篇 管理学
    • 220 篇 管理科学与工程(可...
    • 130 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 153 篇 医学
    • 125 篇 临床医学
    • 112 篇 基础医学(可授医学...
    • 62 篇 公共卫生与预防医...
    • 55 篇 药学(可授医学、理...
  • 50 篇 法学
    • 46 篇 社会学
  • 41 篇 农学
  • 32 篇 教育学
  • 30 篇 经济学
  • 7 篇 文学
  • 6 篇 艺术学
  • 5 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 86 篇 deep learning
  • 76 篇 machine learning
  • 63 篇 computer science
  • 46 篇 artificial intel...
  • 45 篇 accuracy
  • 38 篇 computational mo...
  • 36 篇 convolutional ne...
  • 34 篇 internet of thin...
  • 34 篇 training
  • 30 篇 predictive model...
  • 30 篇 feature extracti...
  • 29 篇 neural networks
  • 28 篇 covid-19
  • 25 篇 computer archite...
  • 24 篇 laboratories
  • 24 篇 data mining
  • 24 篇 mathematics
  • 22 篇 data models
  • 21 篇 educational inst...
  • 21 篇 visualization

机构

  • 58 篇 infn sezione di ...
  • 58 篇 north-west unive...
  • 58 篇 université de st...
  • 57 篇 institut univers...
  • 56 篇 tno technical sc...
  • 55 篇 national centre ...
  • 51 篇 nikhef national ...
  • 50 篇 university of jo...
  • 49 篇 ncsr demokritos ...
  • 49 篇 infn sezione di ...
  • 47 篇 university moham...
  • 47 篇 infn sezione di ...
  • 46 篇 comenius univers...
  • 45 篇 lpc caen normand...
  • 45 篇 university of am...
  • 44 篇 infn sezione di ...
  • 43 篇 université de ha...
  • 42 篇 infn sezione di ...
  • 42 篇 università la sa...
  • 41 篇 department of ph...

作者

  • 58 篇 chen a.
  • 58 篇 ferrara g.
  • 58 篇 ardid m.
  • 58 篇 calvo d.
  • 56 篇 benoit d.m.
  • 56 篇 eddymaoui a.
  • 52 篇 gagliardini s.
  • 52 篇 gal t.
  • 52 篇 bozza c.
  • 52 篇 díaz a.f.
  • 52 篇 boumaaza j.
  • 51 篇 coleiro a.
  • 51 篇 gozzini s.r.
  • 51 篇 dallier r.
  • 51 篇 boettcher m.
  • 50 篇 benhassi m.
  • 50 篇 enzenhöfer a.
  • 50 篇 celli s.
  • 50 篇 carretero v.
  • 50 篇 ardid s.

语言

  • 2,110 篇 英文
  • 124 篇 其他
  • 4 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computer Science and Applied Computing"
2237 条 记 录,以下是741-750 订阅
排序:
Machine learning for Autopsy reports Forensic using Text Classification Techniques  2
Machine learning for Autopsy reports Forensic using Text Cla...
收藏 引用
2nd International Conference on computing and Information Technology, ICCIT 2022
作者: Shahid, Muhammad Rehman Munir, Asim Ifraheem, Layeba Aldabbas, Hamza Wadood, Abdul Alwada'n, Tariq University of Faisalabad Departmental of Computational Sciences Faislabad Pakistan International Islamic University Department of Computer Science and Software Engineering Islamabad Pakistan Al-Balqa Applied University Prince Abdullah Bin Ghazi Faculty of Information and Communication Technology Al-Salt Jordan School of Computing Engineering Digital Technologies Teesside University Middlesbrough United Kingdom
A forensic autopsy is a surgical process in which experts collect a deceased body's internal and external information. These death certificates are the source of timely warnings of an increase in disease activity.... 详细信息
来源: 评论
ICGNN: Graph Neural Network Enabled Scalable Beamforming for MISO Interference Channels
arXiv
收藏 引用
arXiv 2025年
作者: He, Changpeng Lu, Yang Ai, Bo Dobre, Octavia A. Ding, Zhiguo Niyato, Dusit School of Computer Science and Technology Beijing Jiaotong University Beijing100044 China School of Electronics and Information Engineering Beijing Jiaotong University Beijing100044 China Faculty of Engineering and Applied Science Memorial University St. John’sNLA1C 5S7 Canada Department of Electrical Engineering and Computer Science Khalifa University Abu Dhabi127788 United Arab Emirates College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore
This paper investigates the graph neural network (GNN)-enabled beamforming design for interference channels. We propose a model termed interference channel GNN (ICGNN) to solve a quality-of-service constrained energy ... 详细信息
来源: 评论
Bayesian optimization of one-dimensional convolutional neural networks (1D CNN) for early diagnosis of Autistic Spectrum Disorder
收藏 引用
Journal of Computational Mathematics and Data science 2024年 13卷
作者: Omotehinwa, Temidayo Oluwatosin Lawrence, Morolake Oladayo Oyewola, David Opeoluwa Dada, Emmanuel Gbenga Department of Mathematics and Computer Science Federal University of Health Sciences Otukpo P.M.B. 145 Nigeria Department of Computer Science Faculty of Computing & Applied Sciences Baze University Abuja Nigeria Department of Mathematics and Statistics Federal University Kashere Gombe P.M.B. 0182 Nigeria Department of Mathematical Sciences University of Maiduguri Maiduguri P.M.B. 1069 Nigeria
Autistic Spectrum Disorder (ASD) is a challenging neurological development disorder, which involves poor social interaction, communication, and repetitive behaviours. If autism is identified early enough it can be tre... 详细信息
来源: 评论
Forex exchange using big data analytics  1
Forex exchange using big data analytics
收藏 引用
1st International Conference on Advances in Computational science and Engineering, ICACSE 2020
作者: Sadhasivam, Jayakumar Arun, M. Deepa, R. Muthukumaran, V. Lokesh Kumar, R. Prasanna Kumar, R.B. Vellore Institute of Technology Vellore India School of Computing Kalasalingam Academy of Research and Education Tamilnadu 626128 India Telangana Hyderabad India Department of Mathematics School of Applied Science REVA University Bengaluru64 India Department of Analytics School of Computer Science and Engineering Vellore Institute of Technology Vellore632 014 India Department of Computer Science REVA University Bengaluru64 India
Analysis and Prediction of forex has gained immense value in today's economy. The stock price prediction is a difficult process owing to the irregularities in stock prices. Every trader wants to know if the patter... 详细信息
来源: 评论
Lightweight Authenticated Task Offloading in 6G-Cloud Vehicular Twin Networks
Lightweight Authenticated Task Offloading in 6G-Cloud Vehicu...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Sarah Al–Shareeda Fusun Ozguner Keith Redmill Trung Q. Duong Berk Canberk Electrical and Computer Engineering Department Center for Automotive Research (CAR) The Ohio State University USA BTS Group Turkey Department of AI and Data Engineering Istanbul Technical University Turkey School of Electronics Electrical Engineering and Computer Science Queen's University Belfast UK Faculty of Engineering and Applied Science Memorial University of Newfoundland St. John's NL Canada School of Computing Engineering and The Built Environment Edinburgh Napier University UK
Task offloading management in 6G vehicular net-works is crucial for maintaining network efficiency, particularly as vehicles generate substantial data. Integrating secure communication through authentication introduce... 详细信息
来源: 评论
Wind speed prediction and insight for generalized predictive modeling framework: a comparative study for different artificial intelligence models
收藏 引用
Neural computing and Applications 2024年 第23期36卷 14119-14150页
作者: Bhagat, Suraj Kumar Tiyasha, Tiyasha Shather, A.H. Jamei, Mehdi Kumar, Adarsh Al-Khafaji, Zainab Goliatt, Leonardo Shafik, Shafik S. Alawi, Omer A. Yaseen, Zaher Mundher Faculty of Civil Engineering Ton Duc Thang University Ho Chi Minh City Viet Nam Department of Computer Engineering Technology Al Kitab University Altun Kopru Kirkuk00964 Iraq Faculty of Civil Engineering and Architecture Shahid Chamran University of Ahvaz Ahvaz Iran Canadian Centre for Climate Change and Adaptation University of Prince Edward Island St PetersPE Canada Building and Construction Techniques Engineering Department College of Engineering and Engineering Techniques Al-Mustaqbal University Hillah Babylon51001 Iraq Department of Computational and Applied Mechanics Federal University of Juiz de Fora Juiz de Fora Brazil Experimental Nuclear Radiation Research Group Scientific Research Center Al-Ayen University Thi-Qar64001 Iraq Johor Bahru Skudai81310 Malaysia Civil and Environmental Engineering Department King Fahd University of Petroleum and Minerals Dhahran31261 Saudi Arabia Department of Civil Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Dehradun India Dept of Environmental Science Gitam School of Science GITAM University Visakhapatnam India
Wind speed (WS) has played a vital role in local urban and sub-urban weather, agriculture, and ecosystem. Several meteorological parameters are influencing WS such as relative humidity (at 2 m, %), surface pressure (k... 详细信息
来源: 评论
What Is Near?: Room Locality Learning for Enhanced Robot Vision-Language-Navigation in Indoor Living Environments
arXiv
收藏 引用
arXiv 2023年
作者: Gopinathan, Muraleekrishna Abu-Khalaf, Jumana Suter, David Paheding, Sidike Rawashdeh, Nathir A. School of Science Edith Cowan University JoondalupWA6027 Australia Department of Computer Science Fairfield University 1073 N Benson Rd FairfieldCT06824 United States Department of Applied Computing Michigan Technological University 1400 Townsend Drive HoughtonMI49931-1295 United States
Humans use their knowledge of common house layouts obtained from previous experiences to predict nearby rooms while navigating in new environments. This greatly helps them navigate previously unseen environments and l... 详细信息
来源: 评论
Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
arXiv
收藏 引用
arXiv 2024年
作者: McCully, Gary A. Hastings, John D. Xu, Shengjie Fortier, Adam The Beacom College of Computer and Cyber Sciences Dakota State University MadisonSD United States Department of Cyber Intelligence and Information Operations College of Applied Science & Technology University of Arizona TucsonAZ United States College of Computing Georgia Institute of Technology AtlantaGA United States
Ransomware and other forms of malware cause significant financial and operational damage to organizations by exploiting long-standing and often difficult-to-detect software vulnerabilities. To detect vulnerabilities s... 详细信息
来源: 评论
Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code
arXiv
收藏 引用
arXiv 2024年
作者: McCully, Gary A. Hastings, John D. Xu, Shengjie Fortier, Adam The Beacom College of Computer and Cyber Sciences Dakota State University MadisonSD United States Department of Cyber Intelligence and Information Operations College of Applied Science & Technology University of Arizona TucsonAZ United States College of Computing Georgia Institute of Technology AtlantaGA United States
Detecting vulnerabilities within compiled binaries is challenging due to lost high-level code structures and other factors such as architectural dependencies, compilers, and optimization options. To address these obst... 详细信息
来源: 评论
Generating and Analyzing Program Call Graphs using Ontology
Generating and Analyzing Program Call Graphs using Ontology
收藏 引用
IEEE/ACM International Workshop on Programming and Performance Visualization Tools (ProTools)
作者: Ethan Dorta Yonghong Yan Chunhua Liao Department of Computer Science University of North Carolina at Charlotte Charlotte North Carolina USA Lawrence Livermore National Laboratory Center for Applied Scientific Computing Livermore California USA
Call graph or caller-callee relationships have been used for various kinds of static program analysis, performance analysis and profiling, and for program safety or security analysis such as detecting anomalies of pro... 详细信息
来源: 评论