咨询与建议

限定检索结果

文献类型

  • 69 篇 期刊文献
  • 51 篇 会议
  • 1 册 图书

馆藏范围

  • 121 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 81 篇 工学
    • 62 篇 计算机科学与技术...
    • 56 篇 软件工程
    • 20 篇 生物工程
    • 17 篇 信息与通信工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 电气工程
    • 7 篇 控制科学与工程
    • 6 篇 机械工程
    • 6 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 化学工程与技术
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
    • 4 篇 电子科学与技术(可...
  • 48 篇 理学
    • 23 篇 生物学
    • 16 篇 数学
    • 9 篇 统计学(可授理学、...
    • 8 篇 化学
    • 7 篇 物理学
    • 5 篇 系统科学
  • 36 篇 管理学
    • 24 篇 图书情报与档案管...
    • 13 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 10 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
    • 6 篇 药学(可授医学、理...
    • 5 篇 公共卫生与预防医...
  • 5 篇 法学
    • 5 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 教育学
    • 3 篇 教育学
  • 4 篇 农学

主题

  • 10 篇 machine learning
  • 7 篇 deep learning
  • 6 篇 artificial intel...
  • 4 篇 collaborative fi...
  • 4 篇 data mining
  • 4 篇 accuracy
  • 4 篇 data models
  • 4 篇 convolutional ne...
  • 3 篇 intrusion detect...
  • 3 篇 scalability
  • 3 篇 optimization
  • 3 篇 monitoring
  • 3 篇 real-time system...
  • 3 篇 decision making
  • 2 篇 internet of thin...
  • 2 篇 object detection
  • 2 篇 ensemble learnin...
  • 2 篇 deep neural netw...
  • 2 篇 long short-term ...
  • 2 篇 big data

机构

  • 6 篇 department of co...
  • 4 篇 leeds institute ...
  • 4 篇 center for psych...
  • 4 篇 department of in...
  • 4 篇 institute for pa...
  • 4 篇 department of st...
  • 4 篇 university of pi...
  • 4 篇 arnie charbonnea...
  • 4 篇 school of comput...
  • 4 篇 ilsbio llc bioba...
  • 4 篇 department of mo...
  • 4 篇 department of bi...
  • 4 篇 faculty of biosc...
  • 4 篇 osaka internatio...
  • 4 篇 tri-institutiona...
  • 4 篇 research departm...
  • 4 篇 department of ve...
  • 4 篇 royal stoke univ...
  • 4 篇 biomedical engin...
  • 4 篇 department of ex...

作者

  • 8 篇 gao zeyu
  • 8 篇 li chen
  • 8 篇 wang chunbao
  • 6 篇 gong tieliang
  • 6 篇 king irwin
  • 6 篇 wu jialun
  • 5 篇 zhao tong
  • 4 篇 liu jun
  • 4 篇 zhang haichuan
  • 4 篇 yu zeyun
  • 4 篇 minu m.s.
  • 4 篇 katarya rahul
  • 4 篇 sugumaran vijaya...
  • 3 篇 shi jiangbo
  • 3 篇 khan muazzam a.
  • 3 篇 lyu michael r.
  • 3 篇 band shahab s.
  • 3 篇 barzekar hosein
  • 3 篇 jia chang
  • 2 篇 h.m. al-aboudy

语言

  • 114 篇 英文
  • 6 篇 其他
  • 2 篇 中文
检索条件"机构=Department of Computer Science and Engineering with Specialization in Big Data Analytics"
121 条 记 录,以下是41-50 订阅
排序:
Improving latent factor models via personalized feature projection for one class recommendation  15
Improving latent factor models via personalized feature proj...
收藏 引用
24th ACM International Conference on Information and Knowledge Management, CIKM 2015
作者: Zhao, Tong McAuley, Julian King, Irwin Shenzhen Key Laboratory of Rich Media Big Data Analytics and Applications Shenzhen Research Institute Chinese University of Hong Kong Shenzhen China Department of Computer Science and Engineering Chinese University of Hong Kong Shatin N.T. Hong Kong Department of Computer Science and Engineering UC San Diego San DiegoCA United States
Latent Factor models, which transform both users and items into the same latent feature space, are one of the most successful and ubiquitous models in recommender systems. Most existing models in this paradigm define ... 详细信息
来源: 评论
Modeling the homophily effect between links and communities for overlapping community detection  25
Modeling the homophily effect between links and communities ...
收藏 引用
25th International Joint Conference on Artificial Intelligence, IJCAI 2016
作者: Zhang, Hongyi Zhao, Tong King, Irwin Lyu, Michael R. Shenzhen Key Laboratory of Rich Media Big Data Analytics and Applications Shenzhen Research Institute Chinese University of Hong Kong Shenzhen China Department of Computer Science and Engineering Chinese University of Hong Kong Shatin N.T. Hong Kong
Overlapping community detection has drawn much attention recently since it allows nodes in a network to have multiple community memberships. A standard framework to deal with overlapping community detection is Matrix ... 详细信息
来源: 评论
Machine Learning Techniques for Autism Spectrum Disorder: current trends and future directions
Machine Learning Techniques for Autism Spectrum Disorder: cu...
收藏 引用
Innovative Trends in Information Technology (ICITIIT), International Conference on
作者: Kainat Khan Rahul Katarya Department of Computer Science & Engineering Big Data Analytics and Web Intelligence Laboratory Delhi Technological University New Delhi India
ASD or autism spectrum disorder is a critical neuro-developmental disorder that hinders an individual's capability of social communication and interaction. This disorder has acquired considerable attention and imp... 详细信息
来源: 评论
Geo-teaser: Geo-temporal sequential embedding rank for point-of-interest recommendation  26
Geo-teaser: Geo-temporal sequential embedding rank for point...
收藏 引用
26th International World Wide Web Conference, WWW 2017 Companion
作者: Zhao, Shenglin Zhao, Tong King, Irwin Lyu, Michael R. Shenzhen Key Laboratory of Rich Media Big Data Analytics Application Shenzhen Research Institute Chinese University of Hong Kong Nanshan District Shenzhen China Department of Computer Science and Engineering Chinese University of Hong Kong Shatin N.T. Hong Kong
Point-of-interest (POI) recommendation is an important application for location-based social networks (LBSNs), which learns the user preference and mobility pattern from check-in sequences to recommend POIs. Previous ... 详细信息
来源: 评论
Estimating Smart Grid Stability with Hybrid RNN+LSTM Deep Learning Approach  12
Estimating Smart Grid Stability with Hybrid RNN+LSTM Deep Le...
收藏 引用
12th International Conference on Smart Grid, icSmartGrid 2024
作者: Oyucu, Saadin Sagiroglu, Seref Aksoz, Ahmet Bicer, Emre Faculty of Engineering Department of Computer Engineering Adiyaman Turkey Gazi University Artificial Intelligence and Big Data Analytics Security R&d Center Ankara Turkey Sivas Cumhuriyet University Mobilers Team Sivas Turkey Sivas University of Science and Technology Faculty of Engineering and Natural Sciences Battery Research Laboratory Sivas Turkey
Smart grids are faced with a range of challenges, such as the development of communication infrastructure, cybersecurity threats, data privacy, and the protection of user information, due to their complex structure. A... 详细信息
来源: 评论
Retraction notice to “Neural network-based optimization of hydrogen fuel production energy system with proton exchange electrolyzer supported nanomaterial” [Fuel 332 (2023) 125827]
收藏 引用
Fuel 2025年 391卷
作者: Tao Hai Kosar Hikmat Hama Aziz Jincheng Zhou Hayder A. Dhahad Kamal Sharma Sattam Fahad Almojil Abdulaziz Ibrahim Almohana Abdulrhman Fahmi Alali Teeba Ismail Kh Sadok Mehrez Anas Abdelrahman School of Computer and Information Qiannan Normal University for Nationalities Duyun Guizhou 558000 China Key Laboratory of Complex Systems and Intelligent Optimization of Guizhou Duyun Guizhou 558000 China Institute for Big Data Analytics and Artificial Intelligence (IBDAAI) Universiti Teknologi MARA Shah Alam Selangor 40450 Malaysia Department of Chemistry College of Science University of Sulaimani Qlyasan Street Kurdistan Region 46001 Iraq Department of Medical Laboratory of Science College of Health Sciences University of Human Development Sulaimaniyah Iraq Key Laboratory of Complex Systems and Intelligent Optimization of Qiannan Duyun 558000 China Mechanical Engineering Department University of Technology Baghdad Iraq Institute of Engineering and Technology GLA University Mathura Uttar Pradesh 281406 India Department of Civil Engineering College of Engineering King Saud University P.O. Box 800 Riyadh 11421 Saudi Arabia Department of Computer Engineering College of Engineering and Computer Science Lebanese French University Kurdistan Region Iraq Department of Mechanical Engineering College of Engineering at Al Kharj Prince Sattam bin Abdulaziz University 16273 Saudi Arabia Department of Mechanical Engineering University of Tunis El Manar ENIT BP 37 Le Belv’ed‘ere Tunis 1002 Tunisia Department of Chemical Engineering Faculty of Engineering & Technology Future University in Egypt New Cairo 11500 Tunisia
来源: 评论
Augmenting Cybersecurity in WSN: AI-Based Clone Attacks Recognition Framework  1
Augmenting Cybersecurity in WSN: AI-Based Clone Attacks Reco...
收藏 引用
1st Asian Conference on Communication and Networks, ASIANComNet 2024
作者: Bhaskar, Seelam Ch Vijaya Kalyani, Gedela Al-Fatlawy, Ramy Alsalamy, Fatima Kurdi, Waleed Hadi Madhloom Al-Aboudy, H.M. Sujatha, G. MVSR Engineering College Department of IT Telangana Hyderabad India Karpaga Vinayaga College of Engineering and Technology Big Data Analytics Tamil Nadu Chengalpattu India The Islamic University College of Technical Engineering Department of Computer Technical Engineering Najaf Iraq Al-Mustaqbal University Medical Laboratories Techniques Department Hillah Iraq Altoosi University College Department of Computer Science Iraq Mazaya University College Department of Computer Techniques Engineering DhiQar Iraq Arunai Engineering College Department of ECE Tamil Nadu Tiruvannamalai India
Applications such as industrial automation, healthcare, and environmental monitoring need the use of wireless sensor networks (WSNs). However, due to their dispersed organizational makeup, they have become vulnerable ... 详细信息
来源: 评论
A Review and Bibliometric Analysis of the Current Studies for the 6G Networks
收藏 引用
computer Modeling in engineering & sciences 2024年 第9期140卷 2165-2206页
作者: Qusay M.Salih Md.Arafatur Rahman Ahmad Firdaus Mohammed Rajih Jassim Hasan Kahtan Jasni Mohamad Zain Ahmed Hussein Ali Faculty of Computing Universiti Malaysia Pahang Al-Sultan Abdullah(UMPSA)PekanPahang26600Malaysia Department of Medical Equipment Technology Engineering Al Salam University CollegeBaghdadIraq School of Mathematics and Computer Science University of WolverhamptonWolverhampton01902UK Department of Production Engineering and Metallurgy University of TechnologyBaghdadIraq Cardiff School of Technologies Cardiff Metropolitan UniversityCardiffCF52YBUK Institute for Big Data Analytics and Artificial Intelligence(IBDAAI) Kompleks Al-KhawarizmiUniversiti Teknologi MARAShah AlamSelangor40450Malaysia Department Computer Science Al-Salam University CollegeBaghdadIraq
The race to develop the next generation of wireless networks,known as Sixth Generation(6G)wireless,which will be operational in 2030,has already *** realize its full potential over the next decade,6G will undoubtedly ... 详细信息
来源: 评论
Design of a Hybrid Brain-computer Interface and Virtual Reality System for Post-Stroke Rehabilitation
收藏 引用
IFAC-PapersOnLine 2020年 第2期53卷 16010-16015页
作者: Mengjie Huang Yuting Zheng Jingjing Zhang Bin’ao Guo Chenyu Song Rui Yang Department of Computer Science and Software Engineering Xi’an Jiaotong-Liverpool University Suzhou 215123 China Research Institute of Big Data Analytics Xi’an Jiaotong-Liverpool University Suzhou 215123 China
As one of common diseases among elderly, stroke often leads to motor impairment and even serious disability. Post-stroke rehabilitation is of great importance to restore the motor function and improve the life quality... 详细信息
来源: 评论
Improving Power Allocation and Installation in WSN Using Novel Nature-Inspired Optimization for Cyber Security Applications  1
Improving Power Allocation and Installation in WSN Using Nov...
收藏 引用
1st Asian Conference on Communication and Networks, ASIANComNet 2024
作者: Balamurugan, K.S. Kalyani, Gedela Al-Fatlawy, Ramy Kurdi, Waleed Hadi Madhloom Alsalamy, Fatima Al-Aboudy, H.M. Manikandan, K. Karpaga Vinayaga College of Engineering and Technology Department of ECE Tamil Nadu Chengalpattu India Karpaga Vinayaga College of Engineering and Technology Big Data Analytics Tamil Nadu Chengalpattu India The Islamic University College of Technical Engineering Department of Computer Technical Engineering Najaf Iraq Altoosi University College Department of Computer Science Najaf Iraq Al-Mustaqbal University Medical Laboratories Techniques Department Hillah Iraq Mazaya University College DhiQar Department of Computer Techniques Engineering Iraq Sona College of Technology Department of Biomedical Engineering Tamil Nadu Salem India
Wireless sensor network (WSN) installation and power allocation optimization for cybersecurity purposes are difficult tasks which include a well-thought-out method that strikes a balance between goals such as the ener... 详细信息
来源: 评论