咨询与建议

限定检索结果

文献类型

  • 916 篇 会议
  • 548 篇 期刊文献
  • 60 册 图书

馆藏范围

  • 1,524 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 970 篇 工学
    • 785 篇 计算机科学与技术...
    • 650 篇 软件工程
    • 194 篇 信息与通信工程
    • 142 篇 控制科学与工程
    • 107 篇 生物工程
    • 96 篇 电气工程
    • 81 篇 生物医学工程(可授...
    • 68 篇 电子科学与技术(可...
    • 65 篇 化学工程与技术
    • 62 篇 光学工程
    • 51 篇 机械工程
    • 45 篇 动力工程及工程热...
    • 44 篇 建筑学
    • 38 篇 土木工程
    • 34 篇 材料科学与工程(可...
    • 29 篇 仪器科学与技术
  • 500 篇 理学
    • 289 篇 数学
    • 121 篇 生物学
    • 92 篇 物理学
    • 84 篇 统计学(可授理学、...
    • 57 篇 化学
    • 55 篇 系统科学
  • 340 篇 管理学
    • 194 篇 图书情报与档案管...
    • 157 篇 管理科学与工程(可...
    • 68 篇 工商管理
  • 101 篇 医学
    • 82 篇 临床医学
    • 66 篇 基础医学(可授医学...
    • 43 篇 药学(可授医学、理...
    • 33 篇 公共卫生与预防医...
  • 35 篇 法学
    • 30 篇 社会学
  • 20 篇 教育学
  • 20 篇 农学
  • 17 篇 经济学
  • 7 篇 文学
  • 3 篇 哲学
  • 2 篇 历史学
  • 1 篇 军事学

主题

  • 68 篇 artificial intel...
  • 60 篇 computer science
  • 59 篇 knowledge engine...
  • 42 篇 data mining
  • 42 篇 semantics
  • 33 篇 deep learning
  • 31 篇 machine learning
  • 29 篇 computational mo...
  • 29 篇 accuracy
  • 28 篇 training
  • 27 篇 ontologies
  • 25 篇 feature extracti...
  • 25 篇 information stor...
  • 21 篇 information syst...
  • 21 篇 support vector m...
  • 21 篇 knowledge manage...
  • 21 篇 technological in...
  • 20 篇 educational inst...
  • 19 篇 computational in...
  • 19 篇 optimization

机构

  • 86 篇 college of compu...
  • 73 篇 lovely professio...
  • 42 篇 key laboratory o...
  • 30 篇 institute of aer...
  • 26 篇 beijing key labo...
  • 25 篇 lloyd institute ...
  • 22 篇 institute of aer...
  • 21 篇 school of comput...
  • 17 篇 department of co...
  • 16 篇 school of comput...
  • 16 篇 global knowledge...
  • 15 篇 lloyd institute ...
  • 15 篇 department of da...
  • 13 篇 school of inform...
  • 13 篇 school of artifi...
  • 13 篇 department of co...
  • 12 篇 key laboratory o...
  • 12 篇 department of co...
  • 12 篇 lloyd law colleg...
  • 12 篇 department of ma...

作者

  • 21 篇 sun geng
  • 19 篇 niyato dusit
  • 17 篇 olfa nasraoui
  • 17 篇 nürnberger andre...
  • 16 篇 nasraoui olfa
  • 15 篇 amit joshi
  • 15 篇 praveen
  • 15 篇 li jiahui
  • 13 篇 liang yanchun
  • 13 篇 wang jiacheng
  • 12 篇 chang yi
  • 12 篇 wu xindong
  • 12 篇 chatterjee soumi...
  • 11 篇 he jun
  • 11 篇 nijhawan ginni
  • 11 篇 du xiaoyong
  • 11 篇 asha v.
  • 11 篇 ginni nijhawan
  • 11 篇 nilanjan dey
  • 11 篇 fürnkranz johann...

语言

  • 1,413 篇 英文
  • 95 篇 其他
  • 15 篇 中文
  • 1 篇 日文
检索条件"机构=Department of Computer Science and Knowledge Engineering"
1524 条 记 录,以下是11-20 订阅
排序:
Static Analysis Approach of Malware Using Machine Learning  1
收藏 引用
International Conference on Recent Developments in Cyber Security, ReDCySec 2023
作者: Pandey, Aman Raj Sharma, Tushar Basnet, Subarna Setia, Sonia Department of Computer Science Engineering Sharda University Knowledge Park III Greater Noida India
The malware is continually changing in today’s Internet-dependent environment, with an estimated 560,000 new cases being produced each day. As a result, conventional detection technologies are no longer adequate, whi... 详细信息
来源: 评论
Exploring Deep Insights from Vast Data: An Overview of Deep Learning Techniques for Big Data  4
Exploring Deep Insights from Vast Data: An Overview of Deep ...
收藏 引用
4th International Conference on Electrical engineering and computer science, ICECOS 2024
作者: Baez Hasan, Sarhad Kareem, Shahab Wahhab Ameen, Didar Dlshad Hamad Soran University Faculty of Science Computer Science Department Soran Iraq Erbil Polytechnic University College of Engineering Knowledge University Department of Information System Engineering Department of Computer Engineering Erbil Iraq
Big data has emerged very fast, and this has brought both opportunities and problems that are related to the application of deep learning. This paper explores how deep learning can be implemented using big data and in... 详细信息
来源: 评论
Fine-Grained Cross-Modal Fusion Based Refinement for Text-to-Image Synthesis
收藏 引用
Chinese Journal of Electronics 2023年 第6期32卷 1329-1340页
作者: SUN Haoran WANG Yang LIU Haipeng QIAN Biao Department of Computer Science and Information Engineering Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of EducationHefei University of Technology
Text-to-image synthesis refers to generating visual-realistic and semantically consistent images from given textual descriptions. Previous approaches generate an initial low-resolution image and then refine it to be h... 详细信息
来源: 评论
Security challenges and defense approaches for blockchain-based services from a full-stack architecture perspective
收藏 引用
Blockchain(Research and Applications) 2023年 第3期4卷 18-38页
作者: Hongsong Chen Xietian Luo Lei Shi Yongrui Cao Yongpeng Zhang Department of Computer Science University of Science and Technology Beijing(USTB)Beijing100083China Beijing Key Laboratory of Knowledge Engineering for Materials Science Beijing100083China
As an advantageous technique and service,the blockchain has shown great development and application ***,its security has also met great challenges,and many security vulnerabilities and attack issues in blockchain-base... 详细信息
来源: 评论
Classification with ensembles and case study on functional magnetic resonance imaging
收藏 引用
Digital Communications and Networks 2022年 第1期8卷 80-86页
作者: Adnan OM.Abuassba Zhang Dezheng Hazrat Ali Fan Zhang Khan Ali Department of Computer Science Arab Open University-PalestineRamallahPalestine Department of Computer Science and Communication Engineering University of Science and Technology BeijingChina and Beijing Key Laboratory of Knowledge Engineering for Materials ScienceBeijing100083China Department of Electrical and Computer Engineering COMSATS University IslamabadAbbottabad CampusAbbottabadPakistan
The ensemble is a technique that strategically combines basic models to achieve better accuracy ***,combination methods,and selection topology are the main factors determining ensemble ***,it is a challenging task to ... 详细信息
来源: 评论
An Investigational Study of Detecting Acute Lymphoblastic Leukemia using computer Vision  2
An Investigational Study of Detecting Acute Lymphoblastic Le...
收藏 引用
2nd International Conference on Smart Technologies and Systems for Next Generation Computing, ICSTSN 2023
作者: Ashok, M. Tharani, K. Venkatasriram, S. Ramasamy, Kumar Rajalakshmi Institute of Technology Department of Computer Science and Engineering Chennai India Knowledge Institute of Technology Department of Computer Science and Engineering Salem India
Among all divesting cancers, Hematologists predict that the Leukemia is mostly occur on the children, teenagers, and young adults. Moreover 85% of cancer cases are detected younger than the age of 15. Due to a Genetic... 详细信息
来源: 评论
SUSTEM: An Improved Rule-based Sundanese Stemmer
收藏 引用
ACM Transactions on Asian and Low-Resource Language Information Processing 2024年 第6期23卷 1-29页
作者: Setiawan, Irwan Kao, Hung-Yu Department of Computer and Informatics Engineering Politeknik Negeri Bandung Bandung Indonesia Intelligent Knowledge Management Lab Department of Computer Science and Information Engineering National Cheng Kung University No. 1 Daxue Rd. East Dist. Tainan City701 Taiwan
Current Sundanese stemmers either ignore reduplication words or define rules to handle only affixes. There is a significant amount of reduplication words in the Sundanese language. Because of that, it is impossible to... 详细信息
来源: 评论
Intrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model
收藏 引用
computer Modeling in engineering & sciences 2025年 第4期143卷 639-671页
作者: Noveela Iftikhar Mujeeb Ur Rehman Mumtaz Ali Shah Mohammed J.F.Alenazi Jehad Ali Knowledge Unit of Systems and Technology University of Management and TechnologySialkot51310Pakistan Department of Computer Science University ofWahWah Cantt47010Pakistan Department of Computer Engineering College of Computer and Information Sciences(CCIS)King Saud UniversityRiyadh11451Saudi Arabia Department of AI Convergence Network Ajou UniversitySuwon16499Republic of Korea
Intrusion attempts against Internet of Things(IoT)devices have significantly increased in the last few *** devices are now easy targets for hackers because of their built-in security *** a Self-Organizing Map(SOM)hybr... 详细信息
来源: 评论
Fast and Accurate Community Detection in Social Media Networks with a Multi-Algorithmic Approach
Fast and Accurate Community Detection in Social Media Networ...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Pabitha, P. Petchiammal, G. Eswari Anna University Department of Computer Technology MIT Campu Chromepet600044 India Knowledge Institute of Technology Department of Computer Science and Engineering Salem637504 India
Community detection is an essential technique for uncovering structural patterns in complex networks, such as social, biological, and information networks. In this paper to explore a hybrid approach to community detec... 详细信息
来源: 评论
A Novel Approach for Sign Language Video Generation Using Deep Networks  2
A Novel Approach for Sign Language Video Generation Using De...
收藏 引用
2nd IEEE International Conference on Data science and Network Security, ICDSNS 2024
作者: Kumar, Sachin Deepa, B. Kavitha, T. Tamilselvi, M. Sathiyapriya, V. Natarajan, B. Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Chennai India Srmist Ramapuram Campus Department of Electroncis and Communication Engineering Ramapuram India MA.M College of Engineering and Technology Department of Computer Science and Engineering Trichy India Roever Engineering College Department of Computer Science and Engineering Perambalur India Knowledge Institute of Technology Department of Computer Science and Engineering Salem India School of Computer Science and Engineering Vellore Institue of Technology Chennai Campus Chennai India
Sign language enhances the communication capabilities of the deaf-mute community, allowing for a deeper understanding of their needs and emotions. These languages are highly structured and visual, using gestures and v... 详细信息
来源: 评论