咨询与建议

限定检索结果

文献类型

  • 1,124 篇 期刊文献
  • 1,112 篇 会议
  • 26 册 图书

馆藏范围

  • 2,262 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,384 篇 工学
    • 984 篇 计算机科学与技术...
    • 743 篇 软件工程
    • 271 篇 信息与通信工程
    • 207 篇 控制科学与工程
    • 169 篇 电气工程
    • 153 篇 生物工程
    • 148 篇 电子科学与技术(可...
    • 141 篇 光学工程
    • 127 篇 生物医学工程(可授...
    • 95 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 72 篇 机械工程
    • 67 篇 材料科学与工程(可...
    • 52 篇 网络空间安全
    • 50 篇 动力工程及工程热...
  • 993 篇 理学
    • 489 篇 数学
    • 385 篇 物理学
    • 185 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 136 篇 化学
    • 105 篇 系统科学
    • 51 篇 地球物理学
  • 346 篇 管理学
    • 221 篇 管理科学与工程(可...
    • 132 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 154 篇 医学
    • 126 篇 临床医学
    • 112 篇 基础医学(可授医学...
    • 62 篇 公共卫生与预防医...
    • 55 篇 药学(可授医学、理...
  • 51 篇 法学
    • 47 篇 社会学
  • 41 篇 农学
  • 33 篇 教育学
  • 30 篇 经济学
  • 7 篇 文学
  • 6 篇 艺术学
  • 5 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 90 篇 deep learning
  • 78 篇 machine learning
  • 64 篇 computer science
  • 47 篇 artificial intel...
  • 45 篇 accuracy
  • 38 篇 computational mo...
  • 36 篇 convolutional ne...
  • 35 篇 internet of thin...
  • 34 篇 training
  • 30 篇 predictive model...
  • 30 篇 feature extracti...
  • 29 篇 neural networks
  • 28 篇 covid-19
  • 25 篇 computer archite...
  • 24 篇 laboratories
  • 24 篇 data mining
  • 24 篇 mathematics
  • 22 篇 data models
  • 21 篇 educational inst...
  • 21 篇 visualization

机构

  • 58 篇 infn sezione di ...
  • 58 篇 north-west unive...
  • 58 篇 université de st...
  • 57 篇 institut univers...
  • 56 篇 tno technical sc...
  • 55 篇 national centre ...
  • 51 篇 nikhef national ...
  • 50 篇 university of jo...
  • 49 篇 ncsr demokritos ...
  • 49 篇 infn sezione di ...
  • 47 篇 university moham...
  • 47 篇 infn sezione di ...
  • 46 篇 comenius univers...
  • 45 篇 lpc caen normand...
  • 45 篇 university of am...
  • 44 篇 infn sezione di ...
  • 43 篇 université de ha...
  • 42 篇 infn sezione di ...
  • 42 篇 università la sa...
  • 42 篇 tbilisi state un...

作者

  • 58 篇 chen a.
  • 58 篇 ferrara g.
  • 58 篇 ardid m.
  • 58 篇 calvo d.
  • 56 篇 benoit d.m.
  • 56 篇 eddymaoui a.
  • 52 篇 gagliardini s.
  • 52 篇 gal t.
  • 52 篇 bozza c.
  • 52 篇 díaz a.f.
  • 52 篇 boumaaza j.
  • 51 篇 coleiro a.
  • 51 篇 gozzini s.r.
  • 51 篇 dallier r.
  • 51 篇 boettcher m.
  • 50 篇 benhassi m.
  • 50 篇 enzenhöfer a.
  • 50 篇 celli s.
  • 50 篇 carretero v.
  • 50 篇 ardid s.

语言

  • 2,049 篇 英文
  • 210 篇 其他
  • 4 篇 中文
  • 1 篇 德文
检索条件"机构=Department of Computer Science and Applied Computing"
2262 条 记 录,以下是951-960 订阅
排序:
Nonfragile Observer-Based Event-Triggered Fuzzy Tracking Control for Fast-Sampling Singularly Perturbed Systems with Dual-Layer Switching Mechanism and Cyber-Attacks
SSRN
收藏 引用
SSRN 2023年
作者: Guo, Fang Luo, Mengzhuo Cheng, Jun Katib, Iyad Shi, Kaibo College of Science Guilin University of Technology Guangxi Guilin541004 China Guangxi Colleges and Universities Key Laboratory of Applied Statistics Guilin541004 China College of Mathematics and Statistics Guangxi Normal University Guangxi Guilin541006 China Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia School of Information Science and Engineering Chengdu University Sichuan Chengdu610106 China
This paper investigates the problem of nonfragile observer-based tracking control for a class of fuzzy fast-sampling singularly perturbed systems (SPSs) with sensor saturation, which subject to event-triggered scheme ... 详细信息
来源: 评论
EHands: Quantum Protocol for Polynomial Computation on Real-Valued Encoded States
arXiv
收藏 引用
arXiv 2025年
作者: Balewski, Jan Amankwah, Mercy G. Bethel, E. Wes Perciano, Talita Van Beeumen, Roel National Energy Research Scientific Computing Center Lawrence Berkeley National Laboratory BerkeleyCA94720 United States Department of Mathematics Applied Mathematics and Statistics Case Western Reserve University ClevelandOH44106 United States Computer Science Department San Francisco State University San FranciscoCA94132 United States Scientific Data Division Lawrence Berkeley National Laboratory BerkeleyCA94720 United States Applied Mathematics and Computational Research Division Lawrence Berkeley National Laboratory BerkeleyCA94720 United States
The novel constructive EHands protocol defines a universal set of quantum operations for multivariable polynomial transformations on quantum processors by introducing four basic subcircuits—multiplication, addition, ... 详细信息
来源: 评论
Application of Kronecker convolutions in deep learning technique for automated detection of kidney stones with coronal CT images
收藏 引用
Information sciences 2023年 640卷
作者: Patro, Kiran Kumar Allam, Jaya Prakash Neelapu, Bala Chakravarthy Tadeusiewicz, Ryszard Acharya, U Rajendra Hammad, Mohamed Yildirim, Ozal Plawiak, Pawel Department of Electronics and Communication Engineering Aditya Institute of Technology and Management AP Tekkali532201 India Department of Electronics and Communication Engineering National Institute of Technology Rourkela Odisha Rourkela769008 India Department of Biotechnology and Medical Engineering National Institute of Technology Rourkela Odisha Rourkela769008 India AGH University of Science and Technology Department of Biocybernetics and Biomedical Engineering Krakow Poland School of Mathematics Physics and Computing University of Southern Queensland Springfield Australia EIAS Data Science Lab College of Computer and Information Sciences Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology Faculty of Computers and Information Menoufia University Shibin El Kom32511 Egypt Department of Software Engineering Firat University Elazig Turkey Department of Computer Science Faculty of Computer Science and Telecommunications Cracow University of Technology Warszawska 24 Krakow31-155 Poland Institute of Theoretical and Applied Informatics Polish Academy of Sciences Baltycka 5 Gliwice44-100 Poland
Kidney stone disease is a serious public health concern that is getting worse with changes in diet, obesity, medical conditions, certain supplements etc. A kidney stone also called a renal calculus, is a hard buildup ... 详细信息
来源: 评论
Artificial Intelligence-Driven Lung Cancer Detection Model Using Chest Radiography Images
SSRN
收藏 引用
SSRN 2023年
作者: Malebary, Sharaf J. Abulfaraj, Anas W. Dutta, Ashit Kumar Sait, Abdul Rahaman Wahab Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University P.O. Box 344 Rabigh21911 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University P.O. Box 344 Rabigh21911 Saudi Arabia Department of Computer Science and Information Systems College of Applied Sciences AlMaarefa University Ad Diriyah Riyadh13713 Saudi Arabia Department of Archives and Communication King Faisal University Al Ahsa Hofuf31982 Saudi Arabia
In recent times, medical imaging techniques are widely applied for detecting lung cancer (LC) in the earlier stages. However, there is a lack of an effective LC detection model using chest radiography (CXR) images. Th... 详细信息
来源: 评论
Optimizing Handwritten Numeral Recognition for English and Devanagari Using MNIST and CPAR Data
Optimizing Handwritten Numeral Recognition for English and D...
收藏 引用
Innovative Approaches in Smart Technologies (ISAS), International Symposium on
作者: Kamred Udham Singh Ankit Kumar Gaurav Kumar Teekam Singh Tanupriya Choudhury Ketan Kotecha School of Computing Graphic Era Hill University Dehradun India Department of Computer Engineering & Applications GLA University Mathura UP India Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun CSE Dept. Symbiosis Institute of Technology Symbiosis International (Deemed University) Lavale Campus Pune India Symbiosis Centre for Applied Artificial Intelligence Symbiosis Institute of Technology Symbiosis International (Deemed University) Pune India
In this paper, a technique for the categorization of offline handwritten digits in the Devanagari script as well as the Roman script (English numbers) is presented. Finding out how to get the best possible recognition...
来源: 评论
Z-Inspection®: A Process to Assess Trustworthy AI
IEEE Transactions on Technology and Society
收藏 引用
IEEE Transactions on Technology and Society 2021年 第2期2卷 83-97页
作者: Zicari, Roberto V. Brodersen, John Brusseau, James Dudder, Boris Eichhorn, Timo Ivanov, Todor Kararigas, Georgios Kringen, Pedro McCullough, Melissa Moslein, Florian Mushtaq, Naveed Roig, Gemma Sturtz, Norman Tolle, Karsten Tithi, Jesmin Jahan Van Halem, Irmhild Westerlund, Magnus Frankfurt Big Data Lab Goethe University Frankfurt Frankfurt Germany Department of Public Health Section of General Practice and Research Unit for General Practice Faculty of Health and Medical Sciences University of Copenhagen Copenhagen Denmark Philosophy Department Pace University New YorkNY United States Department of Computer Science University of Copenhagen Copenhagen Denmark Department of Physiology Faculty of Medicine University of Iceland Iceland Institute of the Law and Regulation of Digitalization Philipps-University Marburg Marburg Germany Parallel Computing Labs Intel Labs Santa ClaraCA United States Department of Computer Science Arcada University of Applied Sciences Helsinki Finland Primary Health Care Research Unit Copenhagen1014 Denmark
The ethical and societal implications of artificial intelligence systems raise concerns. In this article, we outline a novel process based on applied ethics, namely, Z-Inspection®, to assess if an AI system is tr... 详细信息
来源: 评论
Automating gamification personalization: To the user and beyond
arXiv
收藏 引用
arXiv 2021年
作者: Rodrigues, Luiz Toda, Armando M. Oliveira, Wilk Palomino, Paula T. Vassileva, Julita Isotani, Seiji Laboratory of Applied Computing to Education and Advanced Social Technology Institute of Mathematics and Computer Science University of São Paulo São Carlos Brazil Lab Department of Computer Science University of Saskatchewan Saskatoon Canada
Personalized gamification explores knowledge about the users to tailor gamification designs to improve one-size-fits-all gamification. The tailoring process should simultaneously consider user and contextual character... 详细信息
来源: 评论
Mach–Zehnder-like interferometry with graphene nanoribbon networks
arXiv
收藏 引用
arXiv 2023年
作者: Sanz, Sofia Papior, Nick Giedke, Géza Sánchez-Portal, Daniel Brandbyge, Mads Frederiksen, Thomas Donostia-San SebastiánE-20018 Spain DTU Computing Center Department of Applied Mathematics and Computer Science Technical University of Denmark Kgs. LyngbyDK-2800 Denmark IKERBASQUE Basque Foundation for Science BilbaoE-48013 Spain CSIC-UPV/EHU Donostia-San SebastiánE-20018 Spain Department of Physics Technical University of Denmark Kgs. LyngbyDK-2800 Denmark
We study theoretically electron interference in a Mach–Zehnder-like geometry formed by four zigzag graphene nanoribbons (ZGNRs) arranged in parallel pairs, one on top of the other, such that they form intersection an... 详细信息
来源: 评论
ADiff4TPP: Asynchronous Diffusion Models for Temporal Point Processes
arXiv
收藏 引用
arXiv 2025年
作者: Mukherjee, Amartya Deng, Ruizhi Zhao, He Mao, Yuzhen Sigal, Leonid Tung, Frederick RBC Borealis Canada RBC Borealis Canada Department of Applied Mathematics University of Waterloo Canada School of Computing Science Simon Fraser University Canada Department of Computer Science University of British Columbia Canada
This work introduces a novel approach to modeling temporal point processes using diffusion models with an asynchronous noise schedule. At each step of the diffusion process, the noise schedule injects noise of varying...
来源: 评论
Real-Time Data Collection of Wsn Based on Trajectory Optimization of Laser-Charged Uav
SSRN
收藏 引用
SSRN 2023年
作者: Luo, Chuanwen Hong, Yi Hou, Yunan Zhu, Yuqing Li, Deying Yu, Dongxiao Wu, Weili School of Information Science and Technology Beijing Forestry University Beijing100083 China Engineering Research Center for Forestry-oriented Intelligent Information Processing of National Forestry and Grassland Administration Beijing100083 China Research Center of Applied Mathematics and Machine Intelligence Zhejiang Lab Zhejiang Hangzhou311121 China Department of Computer Science California State University Los AngelesCA90032 United States School of Information Renmin University of China Beijing100872 China School of Computer Science and Technology Institute of Intelligent Computing Shandong University Qingdao266510 China Department of Computer Science The University of Texas at Dallas RichardsonTX75080 United States
Unmanned Aerial Vehicle (UAV) can be used as wireless aerial mobile base station for collecting data from sensors in UAV-based Wireless Sensor Networks (WSNs), which is crucial for providing seamless services and impr... 详细信息
来源: 评论