咨询与建议

限定检索结果

文献类型

  • 6,220 篇 期刊文献
  • 6,159 篇 会议
  • 85 册 图书

馆藏范围

  • 12,464 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,736 篇 工学
    • 5,062 篇 计算机科学与技术...
    • 3,951 篇 软件工程
    • 1,892 篇 信息与通信工程
    • 1,068 篇 电气工程
    • 998 篇 电子科学与技术(可...
    • 987 篇 生物工程
    • 969 篇 控制科学与工程
    • 778 篇 光学工程
    • 757 篇 生物医学工程(可授...
    • 507 篇 机械工程
    • 413 篇 仪器科学与技术
    • 363 篇 化学工程与技术
    • 330 篇 动力工程及工程热...
    • 300 篇 材料科学与工程(可...
    • 227 篇 网络空间安全
    • 221 篇 安全科学与工程
  • 4,915 篇 理学
    • 2,143 篇 物理学
    • 2,005 篇 数学
    • 1,165 篇 生物学
    • 684 篇 统计学(可授理学、...
    • 464 篇 化学
    • 377 篇 系统科学
  • 1,887 篇 管理学
    • 1,148 篇 管理科学与工程(可...
    • 764 篇 图书情报与档案管...
    • 512 篇 工商管理
  • 865 篇 医学
    • 728 篇 临床医学
    • 597 篇 基础医学(可授医学...
    • 342 篇 药学(可授医学、理...
    • 304 篇 公共卫生与预防医...
  • 357 篇 法学
    • 281 篇 社会学
  • 192 篇 农学
  • 187 篇 教育学
  • 179 篇 经济学
  • 55 篇 文学
  • 54 篇 军事学
  • 20 篇 艺术学

主题

  • 348 篇 computer science
  • 257 篇 deep learning
  • 207 篇 machine learning
  • 172 篇 computational mo...
  • 163 篇 feature extracti...
  • 156 篇 data mining
  • 135 篇 semantics
  • 121 篇 optimization
  • 121 篇 hadron colliders
  • 116 篇 educational inst...
  • 112 篇 bandwidth
  • 109 篇 servers
  • 108 篇 internet
  • 104 篇 wireless sensor ...
  • 104 篇 predictive model...
  • 102 篇 internet of thin...
  • 98 篇 wireless communi...
  • 97 篇 quality of servi...
  • 97 篇 accuracy
  • 96 篇 computer archite...

机构

  • 376 篇 yerevan physics ...
  • 279 篇 faculty of scien...
  • 275 篇 department for p...
  • 273 篇 departamento de ...
  • 273 篇 department of ph...
  • 268 篇 department of ph...
  • 260 篇 department of ph...
  • 259 篇 department of ph...
  • 251 篇 faculté des scie...
  • 244 篇 kirchhoff-instit...
  • 218 篇 department of ph...
  • 218 篇 fakultät für phy...
  • 216 篇 department of ph...
  • 216 篇 institute of phy...
  • 211 篇 physics division...
  • 204 篇 department of ph...
  • 194 篇 institut für ast...
  • 191 篇 department of ph...
  • 187 篇 department of ph...
  • 187 篇 institute of phy...

作者

  • 264 篇 c. alexa
  • 263 篇 j. m. izen
  • 254 篇 g. bella
  • 254 篇 d. calvet
  • 253 篇 j. strandberg
  • 252 篇 c. amelung
  • 233 篇 g. spigo
  • 230 篇 f. siegert
  • 230 篇 a. c. könig
  • 230 篇 m. klein
  • 229 篇 r. ströhmer
  • 228 篇 h. a. gordon
  • 227 篇 m. rijssenbeek
  • 225 篇 h. sakamoto
  • 225 篇 s. jin
  • 224 篇 g. gaudio
  • 224 篇 s. mohapatra
  • 221 篇 y. nagasaka
  • 219 篇 s. guindon
  • 213 篇 y. tayalati

语言

  • 11,856 篇 英文
  • 438 篇 其他
  • 168 篇 中文
  • 8 篇 日文
  • 3 篇 法文
  • 2 篇 德文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Information Engineering/Computer and Network Center"
12464 条 记 录,以下是1-10 订阅
排序:
FSCIL-EACA: Few-Shot Class-Incremental Learning network Based on Embedding Augmentation and Classifier Adaptation for Image Classification
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 139-152页
作者: Ruru ZHANG Haihong E Meina SONG School of Computer Science Beijing University of Posts and Telecommunications Education Department Information Network Engineering Research Center Beijing University of Posts and Telecommunications
The ability to learn incrementally is critical to the long-term operation of AI systems. Benefiting from the power of few-shot class-incremental learning(FSCIL), deep learning models can continuously recognize new cla... 详细信息
来源: 评论
Tensor Factorization for Accurate Anomaly Detection in Dynamic networks
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable Computing 2024年 第03期10卷 439-450页
作者: Li, Xiaocan Wen, Jigang Xie, Kun Xie, Gaogang Liang, Wei Hunan University College of Computer Science and Electronics Engineering Changsha China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan China Chinese Academy of Sciences Computer Network Information Center China
Accurately detecting traffic anomalies becomes increasingly crucial in network management. Algorithms that model the traffic data as a matrix suffers from low detection accuracy, while the work using the tensor model ... 详细信息
来源: 评论
A State-Migration Particle Swarm Optimizer for Adaptive Latent Factor Analysis of High-Dimensional and Incomplete Data
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2220-2235页
作者: Jiufang Chen Kechen Liu Xin Luo Ye Yuan Khaled Sedraoui Yusuf Al-Turki MengChu Zhou IEEE the College of Computer Science and Technology Chongqing University of Posts and Telecommunications the Department of Computer Science Columbia University the College of Computer and Information Science Southwest University the Department of Electrical and Computer Engineering Faculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Center of Research Excellence in Renewable Energy and Power Systems the Department of Electrical and Computer EngineeringFaculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Department of Electrical and Computer Engineering New Jersey Institute of Technology
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation lear... 详细信息
来源: 评论
Deep Learning Based Signal Detection for Quadrature Spatial Modulation System
收藏 引用
China Communications 2024年 第10期21卷 78-85页
作者: Shu Dingyun Peng Yuyang Yue Ming Fawaz AL-Hazemi Mohammad Meraj Mirza School of Computer Science and Engineering Macao University of Science and TechnologyMacaoChina Department of Computer and Network Engineering University of JeddahSaudi Arabia Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia
With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. ... 详细信息
来源: 评论
Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning
收藏 引用
Tsinghua science and Technology 2024年 第4期29卷 948-958页
作者: A.E.M.Eljialy Mohammed Yousuf Uddin Sultan Ahmad Department of Information Systems College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabia Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabiaand also with University Center for Research and Development(UCRD)Department of Computer Science and EngineeringChandigarh UniversityPunjabIndia
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i... 详细信息
来源: 评论
Segmentation of Head and Neck Tumors Using Dual PET/CT Imaging:Comparative Analysis of 2D,2.5D,and 3D Approaches Using UNet Transformer
收藏 引用
computer Modeling in engineering & sciences 2024年 第12期141卷 2351-2373页
作者: Mohammed A.Mahdi Shahanawaj Ahamad Sawsan A.Saad Alaa Dafhalla Alawi Alqushaibi Rizwan Qureshi Information and Computer Science Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Software Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Computer Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Department of Computer and Information Sciences Universiti Teknologi PetronasSeri Iskandar32610Malaysia Center for Research in Computer Vision(CRCV) University of Central FloridaOrlandoFL 32816USA
The segmentation of head and neck(H&N)tumors in dual Positron Emission Tomography/Computed Tomogra-phy(PET/CT)imaging is a critical task in medical imaging,providing essential information for diagnosis,treatment p... 详细信息
来源: 评论
Arrhythmia Detection by Using Chaos Theory with Machine Learning Algorithms
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 3855-3875页
作者: Maie Aboghazalah Passent El-kafrawy Abdelmoty M.Ahmed Rasha Elnemr Belgacem Bouallegue Ayman El-sayed Math and Computer Science Department Faculty of ScienceMenoufia UniversityShebin El-komEgypt College of Engineering Computer Science DepartmentEffat UniversityJeddahKingdom of Saudi Arabia Department of Computer Engineering College of Computer ScienceKing Khalid UniversityAbha61421Saudi Arabia Computer Science and Engineering Department Faculty of Electronic EngineeringMenoufia UniversityShebin El-komEgypt Climate Change Information Center and Expert Systems Agriculture Research CenterGizaEgypt
Heart monitoring improves life ***(ECGs or EKGs)detect heart *** learning algorithms can create a few ECG diagnosis processing *** first method uses raw ECG and time-series *** second method classifies the ECG by pati... 详细信息
来源: 评论
Deep Learning Based Side-Channel Attack Detection for Mobile Devices Security in 5G networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1012-1026页
作者: Amjed A.Ahmed Mohammad Kamrul Hasan Ali Alqahtani Shayla Islam Bishwajeet Pandey Leila Rzayeva Huda Saleh Abbas Azana Hafizah Mohd Aman Nayef Alqahtani Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Imam Alkadhim University College Department of Computer Techniques EngineeringBaghdad 10066Iraq Center for Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangi 43600Malaysia Department of Networks and Communications Engineering College of Computer Science and Information SystemsNajran UniversityNajran 61441Saudi Arabia Institute of Computer Science and Digital Innovation UCSI UniversityKuala Lumpur 56000Malaysia Department of Intelligent Systems and Cyber Security Astana IT UniversityAstana 20000Kazakstan Department of Computer Science College of Computer Science and EngineeringTaibah UniversityMadinah 42353Saudi Arabia Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Hofuf 31982Saudi Arabia
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v... 详细信息
来源: 评论
AI-enabled dental caries detection using transfer learning and gradient-based class activation mapping
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第7期15卷 3009-3033页
作者: Inani, Hardik Mehta, Veerangi Bhavsar, Drashti Gupta, Rajeev Kumar Jain, Arti Akhtar, Zahid Department of Computer Science and Engineering Pandit Deendayal Energy University Gujarat Gandhinagar India Department of Computer Science and Engineering and Information Technology Jaypee Institute of Information Technology Uttar Pradesh Noida India Department of Network and Computer Security State University of New York Polytechnic Institute NY United States
Dental caries detection holds the key to unlocking brighter smiles and healthier lives by identifying one of the most common oral health issues early on. This vital topic sheds light on innovative ways to combat tooth... 详细信息
来源: 评论
Intrusion Detection System with Customized Machine Learning Techniques for NSL-KDD Dataset
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 4025-4054页
作者: Mohammed Zakariah Salman A.AlQahtani Abdulaziz M.Alawwad Abdullilah A.Alotaibi Department of Computer Science College of Computer and Information ScienceKing Saud UniversityRiyadh11495Saudi Arabia New Emerging Technologies and 5G Network and Beyond Research Chair Department of Computer EngineeringCollege of Computer and Information SciencesKing Saud UniversityRiyadh11495Saudi Arabia Department of Computer Engineering College of Computer and Information ScienceKing Saud UniversityRiyadh11495Saudi Arabia
Modern networks are at risk from a variety of threats as a result of the enormous growth in internet-based *** consuming time and resources,intrusive traffic hampers the efficient operation of network *** effective st... 详细信息
来源: 评论