咨询与建议

限定检索结果

文献类型

  • 3,138 篇 会议
  • 2,847 篇 期刊文献
  • 87 册 图书

馆藏范围

  • 6,072 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,722 篇 工学
    • 2,355 篇 计算机科学与技术...
    • 1,923 篇 软件工程
    • 831 篇 控制科学与工程
    • 731 篇 信息与通信工程
    • 525 篇 电气工程
    • 463 篇 生物工程
    • 450 篇 电子科学与技术(可...
    • 423 篇 生物医学工程(可授...
    • 337 篇 机械工程
    • 321 篇 光学工程
    • 278 篇 仪器科学与技术
    • 160 篇 动力工程及工程热...
    • 154 篇 化学工程与技术
    • 141 篇 交通运输工程
    • 122 篇 安全科学与工程
    • 111 篇 网络空间安全
  • 2,110 篇 理学
    • 952 篇 数学
    • 705 篇 物理学
    • 540 篇 生物学
    • 305 篇 系统科学
    • 294 篇 统计学(可授理学、...
    • 190 篇 化学
  • 917 篇 管理学
    • 615 篇 管理科学与工程(可...
    • 325 篇 图书情报与档案管...
    • 267 篇 工商管理
  • 468 篇 医学
    • 391 篇 临床医学
    • 318 篇 基础医学(可授医学...
    • 203 篇 药学(可授医学、理...
    • 168 篇 公共卫生与预防医...
  • 136 篇 法学
    • 113 篇 社会学
  • 98 篇 经济学
  • 82 篇 教育学
  • 80 篇 农学
  • 16 篇 艺术学
  • 15 篇 文学
  • 11 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 195 篇 deep learning
  • 185 篇 machine learning
  • 123 篇 control systems
  • 119 篇 accuracy
  • 118 篇 artificial intel...
  • 103 篇 feature extracti...
  • 102 篇 computational mo...
  • 86 篇 internet of thin...
  • 75 篇 optimization
  • 75 篇 training
  • 70 篇 real-time system...
  • 63 篇 predictive model...
  • 62 篇 neural networks
  • 58 篇 support vector m...
  • 56 篇 computer science
  • 55 篇 robustness
  • 54 篇 genetic algorith...
  • 54 篇 convolutional ne...
  • 52 篇 image segmentati...
  • 51 篇 testing

机构

  • 95 篇 institut univers...
  • 94 篇 north-west unive...
  • 92 篇 national centre ...
  • 90 篇 tno technical sc...
  • 88 篇 infn sezione di ...
  • 88 篇 université de st...
  • 80 篇 infn sezione di ...
  • 80 篇 nikhef national ...
  • 79 篇 university of jo...
  • 79 篇 ncsr demokritos ...
  • 74 篇 infn sezione di ...
  • 72 篇 infn sezione di ...
  • 71 篇 university würzb...
  • 69 篇 university moham...
  • 66 篇 università di ca...
  • 62 篇 infn sezione di ...
  • 58 篇 western sydney u...
  • 56 篇 university moham...
  • 55 篇 leiden universit...
  • 54 篇 university of am...

作者

  • 97 篇 ferrara g.
  • 97 篇 ardid m.
  • 96 篇 calvo d.
  • 94 篇 chen a.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 85 篇 díaz a.f.
  • 85 篇 boumaaza j.
  • 84 篇 coleiro a.
  • 84 篇 gozzini s.r.
  • 84 篇 dallier r.
  • 83 篇 enzenhöfer a.
  • 81 篇 boettcher m.
  • 81 篇 celli s.
  • 78 篇 carretero v.
  • 77 篇 dornic d.
  • 76 篇 bendahman m.
  • 75 篇 brunner j.
  • 74 篇 cherubini s.
  • 73 篇 di palma i.

语言

  • 5,673 篇 英文
  • 358 篇 其他
  • 31 篇 中文
  • 9 篇 日文
  • 4 篇 德文
  • 2 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Control and Computer Engineering Faculty of Engineering and Computing"
6072 条 记 录,以下是291-300 订阅
排序:
Improving graph collaborative filtering with network motifs
收藏 引用
Neural computing and Applications 2025年 第16期37卷 9413-9432页
作者: Zhang, Yuqi Yu, Jian Liu, Zhizhong Wang, Guiling Nguyen, Minh Sheng, Quan Z. Wang, Nancy Department of Computer and Information Sciences Auckland University of Technology Auckland Central1010 New Zealand School of Computer and Control Engineering Yantai University Shandong Yantai264005 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Computing Macquarie University SydneyNSW2109 Australia
Deep learning on graphs, specifically graph convolutional networks (GCNs), has exhibited exceptional efficacy in the domain of recommender systems. Most GCNs have a message-passing architecture that enables nodes to a... 详细信息
来源: 评论
Comparative study of IoT- and AI-based computing disease detection approaches
收藏 引用
Data Science and Management 2025年 第1期8卷 94-106页
作者: Rhmann, Wasiur Khan, Jalaluddin Khan, Ghufran Ahmad Ashraf, Zubair Pandey, Babita Khan, Mohammad Ahmar Ali, Ashraf Ishrat, Amaan Alghamdi, Abdulrahman Abdullah Ahamad, Bilal Shaik, Mohammad Khaja Department of Computer Application Lovely Professional University Punjab Phagwara144411 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Guntur522502 India School of Computing Science and Engineering VIT Bhopal University Kothrikalan MP Sehore466114 India Babasaheb Bhimrao Ambedkar University Lucknow226025 India College of Commerce and Business Administration Dhofar University Salalah211 Oman Faculty of Computer Studies Arab Open University 18211 Bahrain Department of Computer Application Shri Ramswaroop Memorial University Lucknow225003 India College of Computing and Information Technology Shaqra University Shaqra11961 Saudi Arabia
The emergence of different computing methods such as cloud-, fog-, and edge-based Internet of Things (IoT) systems has provided the opportunity to develop intelligent systems for disease detection. Compared to other m... 详细信息
来源: 评论
Selective feature-based ovarian cancer prediction using MobileNet and explainable AI to manage women healthcare
收藏 引用
Multimedia Tools and Applications 2024年 1-22页
作者: Almujally, Nouf Abdullah Alzahrani, Abdulrahman Hakeem, Abeer M. Attiah, Afraa Umer, Muhammad Alsubai, Shtwai Polsinelli, Matteo Ashraf, Imran Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Department of Computer Science and Engineering College of Computer Science and Engineering University of Hafr Al Batin Hafr Al Batin39524 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Computer Science The Islamia University of Bahawalpur Bahawalpur Pakistan Department of Computer Science College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University P.O. Box 151 Al-Kharj11942 Saudi Arabia Department of Management & amp Innovation Systems University of Salerno Fisciano84084 Italy Department of Information and Communication Engineering Yeungnam University Gyeongsan38541 Korea Republic of
Ovarian cancer is a global health concern due to the unavailability of an effective screening strategy and is often diagnosed at a late stage with approximately 70% of the case which reduces the survival chances of pa... 详细信息
来源: 评论
Tekele Zemamie Action Recognition in Ethiopia Orthodox Tewahedo Church Using CNN-Bi-LSTM
Tekele Zemamie Action Recognition in Ethiopia Orthodox Tewah...
收藏 引用
2024 International Conference on Information and Communication Technology for Development for Africa, ICT4DA 2024
作者: Fikirie, Tenagne Azmeraw, Emiyamrew Tesfay, Wakjira Debasu, Abrham Bahir Dar University Faculty of Electrical and Computer Engineering Bahir Dar Institute of Technology P.O.Box 26 Bahir Dar Ethiopia University of Gondar College of Engineering Department of Computer Engineering Gondar Ethiopia Assosa University Department of Computer Engineering Assosa Ethiopia Bahir Dar University Faculty of Computing Bahir Dar Institute of Technology P.O.Box 26 Bahir Dar Ethiopia
Human action recognition (HAR) is a computer vision technique used to understand the activity of the action performed in the scene. computer vision technology has become popular and is applied in various areas like su... 详细信息
来源: 评论
Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2497-2513页
作者: Mohammad Alamgeer Fahd N.Al-Wesabi Huda G.Iskandar Imran Khan Nadhem Nemri Mohammad Medani Mohammed Abdullah Al-Hagery Ali Mohammed Al-Sharafi Department of Information Systems King Khalid UniversityMuhayel AseerKingdom of Saudi Arabia Department of Computer Science King Khalid UniversityMuhayel AseerKingdom of Saudi Arabia Faculty of Computer and IT Sana’a UniversitySana’aYemen School of Computing Faculty of EngineeringUniversiti Teknologi MalaysiaMalaysia Department of Electrical Engineering University of Engineering and Technology PeshawarPakistan Department of Computer Science College of ComputerQassim UniversitySaudi Arabia Department of Computer Science College of Computers and Information TechnologyUniversity of BishaKSA
Content authentication,integrity verification,and tampering detection of digital content exchanged via the internet have been used to address a major concern in information and communication *** this paper,a text zero... 详细信息
来源: 评论
A Comparative Evaluation of GA and PSO Tuned PID controllers for the Quadruple Tank System
A Comparative Evaluation of GA and PSO Tuned PID Controllers...
收藏 引用
2024 International Conference on Information and Communication Technology for Development for Africa, ICT4DA 2024
作者: Hailu, Gashaye L. Yetayew, Tefera T. Bahir Dar University Electrical and Computer Engineering Faculty Bahir Dar Institute of Technology Bahir Dar Ethiopia Adama Science and Technology University Department of Power and Control Engineering Adama Ethiopia
In this research, nature inspired metaheuristic optimization algorithms: Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) Techniques are formulated to tune optimal combinations of PID controller parameters... 详细信息
来源: 评论
Hamiltonian learning using machine-learning models trained with continuous measurements
收藏 引用
Physical Review Applied 2024年 第4期22卷 044080页
作者: Kris Tucker Amit Kiran Rege Conor Smith Claire Monteleoni Tameem Albash Department of Applied Mathematics Department of Computer Science Center for Quantum Information and Control Department of Electrical and Computer Engineering Paris France Center for Computing Research
We build upon recent work on the use of machine-learning models to estimate Hamiltonian parameters using continuous weak measurement of qubits as input. We consider two settings for the training of our model: (1) supe... 详细信息
来源: 评论
Road Traffic Accident Pattern Analysis with Data Mining  12
Road Traffic Accident Pattern Analysis with Data Mining
收藏 引用
12th International Conference on Awareness Science and Technology, iCAST 2023
作者: Zhe Chai, Albe Bing Lau, Bee Theng Tsun Tee, Mark Kit McCarthy, Chris Faculty of Engineering Computing & Science Swinburne University of Technology Sarawak Campus Kuching Malaysia Department of Computer Science & Software Engineering Swinburne University of Technology Melbourne Australia
The discovery of Road Traffic Accident (RTA) patterns is vital to formulate mitigation strategies based on the characteristics of RTA. Various studies have applied association rule mining for RTA pattern discovery. Ho... 详细信息
来源: 评论
Estimating the AGV load and a battery lifetime based on the current measurement and random forest application
Estimating the AGV load and a battery lifetime based on the ...
收藏 引用
2023 IEEE International Conference on Big Data, BigData 2023
作者: Hanzel, Krzysztof Grzechca, Damian Ziebinski, Adam Chruszczyk, Lukas Janus, Artur Silesian University of Technology Faculty of Automatic Control Electronics and Computer Science Department of Telecommunications and Teleinformatics Gliwice Poland Silesian University of Technology Faculty of Automatic Control Electronics and Computer Science Department of Electronics Electrical Engineering and Microelectronics Gliwice Poland Silesian University of Technology Faculty of Automatic Control Electronics and Computer Science Department of Distributed Systems and Informatics Devices Gliwice Poland Silesian University of Technology Student of Electrical EngineeringFaculty of Electrical Engineering Gliwice Poland
The paper describes the energy consumption from the battery based on the current measurements for various cases, i.e., speed (PWL adjustment) and loads. The main purpose of the research is to have additional and relia... 详细信息
来源: 评论
A Novel Cyber Threat Intelligence (CTI) Framework for Detecting Android Malware: Work on Progress
A Novel Cyber Threat Intelligence (CTI) Framework for Detect...
收藏 引用
2024 International Conference on Information Technology Systems and Innovation, ICITSI 2024
作者: Wijaya, Andri Stiawan, Deris Abdiansah Suprapto, Bhakti Yudho Saputra, Iwan Pahendra Anto Rini, Dian Palupi Sayfudin Idris, Mohd.Yazid Budiarto, Rahmat Universitas Katolik Musi Charitas Faculty of Engineering Universitas Sriwijaya Department of Information System Indonesia Universitas Sriwijaya Faculty of Computer Science Indonesia Sriwijaya University Faculty of Engineering Electrical Engineering Dept. Palembang Indonesia Sriwijaya University Faculty of Comp.Science Informatic Engineering Dept. Palembang Indonesia Universitas Muhammadiyah Palembang Indonesia Universiti Teknologi Malaysia School of Computing Faculty of Computing Johor81310 Malaysia Al-Baha University College of Computing and Information Al Aqiq Saudi Arabia
The latest approach in cyber threat intelligence (CTI) is becoming increasingly crucial in detecting evolving cyber threats, including malware on Android devices. This problem is getting deeper when the number of Andr... 详细信息
来源: 评论