咨询与建议

限定检索结果

文献类型

  • 423 篇 会议
  • 336 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 773 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 429 篇 工学
    • 268 篇 计算机科学与技术...
    • 212 篇 软件工程
    • 66 篇 信息与通信工程
    • 65 篇 控制科学与工程
    • 57 篇 生物医学工程(可授...
    • 49 篇 生物工程
    • 45 篇 电气工程
    • 33 篇 光学工程
    • 32 篇 电子科学与技术(可...
    • 24 篇 机械工程
    • 24 篇 土木工程
    • 24 篇 化学工程与技术
    • 21 篇 动力工程及工程热...
    • 19 篇 材料科学与工程(可...
    • 15 篇 船舶与海洋工程
  • 319 篇 理学
    • 166 篇 数学
    • 71 篇 生物学
    • 61 篇 统计学(可授理学、...
    • 58 篇 物理学
    • 43 篇 系统科学
    • 25 篇 化学
  • 108 篇 管理学
    • 64 篇 管理科学与工程(可...
    • 47 篇 工商管理
    • 40 篇 图书情报与档案管...
  • 55 篇 医学
    • 47 篇 临床医学
    • 34 篇 基础医学(可授医学...
    • 23 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 22 篇 法学
    • 21 篇 社会学
  • 15 篇 经济学
    • 15 篇 应用经济学
  • 12 篇 教育学
  • 10 篇 农学
  • 3 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 68 篇 computer science
  • 16 篇 software enginee...
  • 16 篇 humans
  • 15 篇 application soft...
  • 14 篇 feature extracti...
  • 14 篇 artificial intel...
  • 13 篇 performance anal...
  • 13 篇 testing
  • 12 篇 support vector m...
  • 12 篇 machine learning
  • 11 篇 educational inst...
  • 11 篇 robustness
  • 10 篇 information anal...
  • 10 篇 computational mo...
  • 10 篇 costs
  • 10 篇 decision making
  • 10 篇 algorithm design...
  • 10 篇 mathematics
  • 10 篇 fault detection
  • 10 篇 computer vision

机构

  • 23 篇 department of co...
  • 9 篇 department of co...
  • 9 篇 institute for sy...
  • 7 篇 research center ...
  • 7 篇 institute of sys...
  • 7 篇 karolinska insti...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 6 篇 department of ma...
  • 5 篇 department of co...
  • 5 篇 health managemen...
  • 5 篇 royal stoke univ...
  • 5 篇 department of bi...
  • 5 篇 department of in...
  • 5 篇 department of co...
  • 5 篇 department of co...
  • 5 篇 university colle...
  • 5 篇 cambridge univer...
  • 5 篇 julius centre fo...
  • 5 篇 national researc...

作者

  • 16 篇 napoli christian
  • 11 篇 pedrycz witold
  • 10 篇 paola paci
  • 9 篇 sung andrew h.
  • 9 篇 v. cross
  • 9 篇 russo samuele
  • 9 篇 liu qingzhong
  • 9 篇 gerald c. gannod
  • 9 篇 giulia fiscon
  • 8 篇 giovanni felici
  • 8 篇 bakas spyridon
  • 8 篇 stepney susan
  • 8 篇 paci paola
  • 8 篇 ponzi valerio
  • 8 篇 qingzhong liu
  • 8 篇 andrew h. sung
  • 7 篇 kofler florian
  • 7 篇 qiao mengyu
  • 7 篇 a.h. sung
  • 7 篇 s. mukkamala

语言

  • 751 篇 英文
  • 16 篇 其他
  • 5 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Department of Computer Science and Systems Analysis"
773 条 记 录,以下是1-10 订阅
排序:
Unveiling drug-induced side effects through network-based analysis: An update
Unveiling drug-induced side effects through network-based an...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Funari, Alessio Conte, Federica Paci, Paola Sapienza University of Rome Institute for Systems Analysis and Computer Science 'Antonio Ruberti' National Research Council Department of Translational and Precision Medicine Rome Italy National Research Council Institute for Systems Analysis and Computer Science 'Antonio Ruberti' Rome Italy Sapienza University of Rome Department of Computer Control and Management Engineering Rome17177 Italy
In this article, we propose an updated version of our previously developed model for predicting drug-side effect associations, applied to two case studies: long QT syndrome and asthma. The classifier accepts the name ... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
A Two-Phase Quantum Algorithm for the Partial Max-CSP  2
A Two-Phase Quantum Algorithm for the Partial Max-CSP
收藏 引用
2nd International Workshop on AI for Quantum and Quantum for AI, AIQxQIA 2024
作者: Baioletti, Marco Fagiolo, Fabrizio Oddi, Angelo Rasconi, Riccardo University of Perugia Department of Mathematics and Computer Science Via Luigi Vanvitelli 1 Perugia06123 Italy Institute of Systems Analysis and Computer Science Piazzale Aldo Moro 7 Rome00185 Italy
In this paper, we present a novel two-phase quantum algorithm designed to analyze a variant of the Maximum Constraint Satisfaction Problem (Max-CSP), denominated Partial Binary Max-CSP. The goal of Partial Binary Max-... 详细信息
来源: 评论
Phishing Attacks Detection Using EnsembleMachine Learning Algorithms
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 1325-1345页
作者: Nisreen Innab Ahmed Abdelgader Fadol Osman Mohammed Awad Mohammed Ataelfadiel Marwan Abu-Zanona Bassam Mohammad Elzaghmouri Farah H.Zawaideh Mouiad Fadeil Alawneh Department of Computer Science and Information Systems College of Applied SciencesAlmaarefa UniversityDiriyahRiyadh13713Saudi Arabia Applied College King Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Computer Science Faculty of Computer Science and Information TechnologyJerash UniversityJerash26110Jordan Department of Business Intelligence and Data Analysis Faculty of Financial Sciences and BusinessIrbid National UniversityIrbid21110Jordan Faculty of Information Technology Ajloun National UniversityAjloun26767Jordan
Phishing,an Internet fraudwhere individuals are deceived into revealing critical personal and account information,poses a significant risk to both consumers and web-based *** indicates a persistent rise in phishing **... 详细信息
来源: 评论
Cross-Modality Gait Recognition: Bridging LiDAR and Camera Modalities for Human Identification  18
Cross-Modality Gait Recognition: Bridging LiDAR and Camera M...
收藏 引用
18th IEEE International Joint Conference on Biometrics, IJCB 2024
作者: Wang, Rui Shen, Chuanfu Marin-Jimenez, Manuel J. Huang, George Q. Yu, Shiqi Southern University of Science and Technology Department of Computer Science and Engineering China The University of Hong Kong Department of Industrial and Manufacturing Systems Engineering Hong Kong University of Cordoba Department of Computing and Numerical Analysis Spain The Hong Kong Polytechnic University Department of Industrial and Systems Engineering Hong Kong
Current gait recognition research mainly focuses on identifying pedestrians captured by the same type of sensor, neglecting the fact that individuals may be captured by different sensors in order to adapt to various e... 详细信息
来源: 评论
Beyond the network-based multi-omics data integration in COPD: A pathway-centric analysis
Beyond the network-based multi-omics data integration in COP...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Sibilio, Pasquale Conte, Federica Paci, Paola Sapienza University of Rome Department of Computer Control and Management Engineering Rome Italy National Research Council Institute for Systems Analysis and Computer Science 'Antonio Ruberti' Rome Italy Karolinska Institutet Stockholm17177 Sweden
Chronic obstructive pulmonary disease (COPD) is a lung disease causing hundred thousand of death each year worldwide and defined as a respiratory and airflow impairment majorly due to large and small airways dysfuncti... 详细信息
来源: 评论
A Novel Hybrid Architecture for Superior IoT Threat Detection through Real IoT Environments
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2299-2316页
作者: Bassam Mohammad Elzaghmouri Yosef Hasan Fayez Jbara Said Elaiwat Nisreen Innab Ahmed Abdelgader Fadol Osman Mohammed Awad Mohammed Ataelfadiel Farah H.Zawaideh Mouiad Fadeil Alawneh Asef Al-Khateeb Marwan Abu-Zanona Department of Computer Science Faculty of Computer Science and Information TechnologyJerash UniversityJerash26150Jordan Computer Engineering Department College of Engineering&Information Technology Buraydah CollegesBuraydah51418Saudi Arabia Faculty of Architecture and Design Al-Zaytoonah University of JordanAmman11733Jordan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityDiriyahRiyadh13713Saudi Arabia Applied College King Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Business Intelligence and Data Analysis Faculty of Financial Sciences and BusinessIrbid National UniversityIrbid21110Jordan Faculty of Information Technology Ajloun National UniversityAjlun26810Jordan Department of Management Information Systems College of Business AdministrationKing Faisal UniversityAl-Ahsa31982Saudi Arabia
As the Internet of Things(IoT)continues to expand,incorporating a vast array of devices into a digital ecosystem also increases the risk of cyber threats,necessitating robust defense *** paper presents an innovative h... 详细信息
来源: 评论
Text Sentiment analysis using Different Types of Recurrent Neural Networks  5
Text Sentiment Analysis using Different Types of Recurrent N...
收藏 引用
5th International Conference on Image Processing and Capsule Networks, ICIPCN 2024
作者: Filimonova, Tetyana Pursky, Oleg Babenko, Vitalina Nechepourenko, Andrey Shvets, Victoria Gamaliy, Volodymyr State university of trade and economics Kyiv department of computer science and information technology Ukraine Kharkiv national automobile and highway university department of computer systems Kharkiv Ukraine State university of trade and economics Kyiv department of digital economy and system analysis Ukraine
This work presents the results of research aimed at comparing and analyzing Recurrent Neural Networks (RNNs), specifically LSTM (Long Short-Term Memory) and GRU (Gated Recurrent Unit) models to identify the effectiven... 详细信息
来源: 评论
Distinguishing subsampled power laws from other heavy-tailed distributions
收藏 引用
Physical Review E 2024年 第5期109卷 054308-054308页
作者: Silja Sormunen Lasse Leskelä Jari Saramäki Department of Computer Science Aalto University 00076 Espoo Finland Department of Mathematics and Systems Analysis Aalto University 00076 Espoo Finland
Distinguishing power-law distributions from other heavy-tailed distributions is challenging, and this task is often further complicated by subsampling effects. In this work, we evaluate the performance of two commonly... 详细信息
来源: 评论
A Non-Parametric Identification Scheme of SISO-LTI systems Using Blaschke-Products∗  32
A Non-Parametric Identification Scheme of SISO-LTI Systems U...
收藏 引用
32nd Mediterranean Conference on Control and Automation, MED 2024
作者: Ungvari, Gergo Soumelidis, Alexandros Dozsa, Tamas Eötvös Loránd University Faculty of Informatics Department of Numerical Analysis Budapest Hungary HUN-REN Institute for Computer Science and Control Systems and Control Laboratory Budapest Hungary
In this manuscript, a novel algorithm is presented for the identification of single input single output linear time invariant (SISO-LTI) systems. The proposed method is able to find poles of the transfer function desc... 详细信息
来源: 评论