咨询与建议

限定检索结果

文献类型

  • 1,164 篇 期刊文献
  • 797 篇 会议
  • 12 册 图书

馆藏范围

  • 1,973 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,234 篇 工学
    • 783 篇 计算机科学与技术...
    • 641 篇 软件工程
    • 255 篇 信息与通信工程
    • 209 篇 控制科学与工程
    • 174 篇 生物工程
    • 148 篇 电气工程
    • 146 篇 生物医学工程(可授...
    • 129 篇 电子科学与技术(可...
    • 120 篇 光学工程
    • 94 篇 仪器科学与技术
    • 81 篇 化学工程与技术
    • 63 篇 安全科学与工程
    • 59 篇 交通运输工程
    • 57 篇 机械工程
    • 55 篇 网络空间安全
  • 889 篇 理学
    • 386 篇 数学
    • 245 篇 生物学
    • 210 篇 物理学
    • 152 篇 统计学(可授理学、...
    • 125 篇 系统科学
    • 98 篇 化学
    • 83 篇 地球物理学
  • 314 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 117 篇 工商管理
    • 101 篇 图书情报与档案管...
  • 203 篇 医学
    • 158 篇 临床医学
    • 134 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 78 篇 药学(可授医学、理...
  • 81 篇 法学
    • 72 篇 社会学
  • 54 篇 农学
  • 48 篇 经济学
  • 16 篇 教育学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 64 篇 machine learning
  • 57 篇 deep learning
  • 56 篇 accuracy
  • 43 篇 predictive model...
  • 39 篇 feature extracti...
  • 36 篇 real-time system...
  • 36 篇 convolutional ne...
  • 35 篇 internet of thin...
  • 32 篇 computational mo...
  • 32 篇 training
  • 31 篇 decision making
  • 31 篇 artificial intel...
  • 28 篇 reinforcement le...
  • 26 篇 data models
  • 25 篇 covid-19
  • 24 篇 optimization
  • 22 篇 support vector m...
  • 22 篇 security
  • 20 篇 cloud computing
  • 19 篇 adaptation model...

机构

  • 20 篇 sjtu-pinghu inst...
  • 15 篇 data observatory...
  • 15 篇 hiroshima astrop...
  • 15 篇 university of ch...
  • 14 篇 space science da...
  • 14 篇 millennium insti...
  • 13 篇 state key labora...
  • 13 篇 musketeers found...
  • 11 篇 shanghai institu...
  • 11 篇 nasa ames resear...
  • 11 篇 nasa goddard spa...
  • 11 篇 nasa marshall sp...
  • 11 篇 shenzhen researc...
  • 10 篇 department of da...
  • 10 篇 department of ea...
  • 10 篇 institute for da...
  • 10 篇 istituto naziona...
  • 10 篇 department of da...
  • 10 篇 department of da...
  • 10 篇 research institu...

作者

  • 30 篇 chen jianping
  • 20 篇 enoto teruaki
  • 19 篇 zhou linjie
  • 17 篇 rajeswari d.
  • 15 篇 linjie zhou
  • 14 篇 dhatterwal jagji...
  • 14 篇 mizuno tsunefumi
  • 14 篇 lu liangjun
  • 14 篇 jianping chen
  • 12 篇 doroshenko victo...
  • 12 篇 jenkins jon m.
  • 12 篇 marscher alan p.
  • 12 篇 seager sara
  • 11 篇 omodei nicola
  • 11 篇 niyato dusit
  • 11 篇 iwakiri wataru
  • 11 篇 bianchi stefano
  • 11 篇 perri matteo
  • 11 篇 muleri fabio
  • 11 篇 liodakis ioannis

语言

  • 1,346 篇 英文
  • 606 篇 其他
  • 28 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Department of Data and Systems Engineering and Musketeers Foundation Institute of Data Science"
1973 条 记 录,以下是701-710 订阅
排序:
Automated and Decentralized Cloud based water level audit system with loT
Automated and Decentralized Cloud based water level audit sy...
收藏 引用
International Conference on science Technology engineering and Management (ICONSTEM)
作者: S. Selvakumar C. Geetha R. Vidhya Muthulakshmi Sreevardhan Cheerla Ashok Kumar Sudhir Joshi Department of Computer Science and Engineering AarupadiVeedu Institute of Technology Vinayaka Mission Research Foundation Paiyanur Tamil Nadu India Department of Computer Science and Engineering R. M. K. Engineering College Kavaraipettai Tamil Nadu India Department of Artificial Intelligence and Data Science Panimalar Engineering College Poonamallee Chennai Tamil Nadu Deportmem of Electronics and Communications Engineering KoneruLakshmaiah Education Foundation Vaddeswaram Andhra Pradesh India Department of Computer Science Banasthali Vidyapith Rajasthan India Department of Mechanical Engineering Graphic Era Deemed to be University Dehradun Uttarakhand India
Water bodies play a fundamental role in the development of society. The construction of dams for water storage has been carried out since ancient civilizations and, along with the development of modern society, new fo... 详细信息
来源: 评论
Intra-datacenter Load Balancing in a Federated Cloud with Throttled Algorithm
Intra-Datacenter Load Balancing in a Federated Cloud with Th...
收藏 引用
2024 International Conference on science, engineering and Business for Driving Sustainable Development Goals, SEB4SDG 2024
作者: Akinola, Damola Gideon Adetiba, Emmanuel Abayomi, Abdultaofeek Nnaji, Uche Thakur, Surendra Moyo, Sibusiso Covenant University Covenant Applied Informatics and Communications African Center of Excellence Department of Electrical and Information Engineering Ota Nigeria Durban University of Technology HRA Institute for Systems Science Durban South Africa Mangosuthu University of Technology Department of Information and Communication Technology Durban South Africa Covenant University Dept. of Computer and Information Science Covenant Applied Informatics and Communications African Center of Excellence Ota Nigeria Durban University of Technology KZN E-Skills CoLab Durban South Africa Stellenbosch University School for Data Science and Computational Thinking Department of Mathematical Sciences Stellenbosch7602 South Africa
The emergence of cloud computing technology has motivated a very high number of users in different organizations to access its services in running and delivering their various operations and services. However, this su... 详细信息
来源: 评论
Butler Matrix Enabled Multi-Beam Optical Phased Array for Two-Dimensional Beam-Steering  27
Butler Matrix Enabled Multi-Beam Optical Phased Array for Tw...
收藏 引用
27th OptoElectronics and Communications Conference/International Conference on Photonics in Switching and Computing, OECC/PSC 2022
作者: Zhou, Zuoyu Xu, Weihan Li, Xinhang Lu, Liangjun Chen, Jianping Zhou, Linjie Shanghai Institute for Advanced Communication and Data Science State Key Laboratory of Advanced Optical Communication Systems and Networks Shanghai Jiao Tong University Shanghai Key Lab of Navigation and Location Services Department of Electronic Engineering Shanghai200240 China SJTU-Pinghu Institute of Intelligent Optoelectronics Pinghu314200 China
We demonstrate a multi-beam optical phased array based on a 4×4 Butler matrix. The device shows the capability of two-dimensional multi-beam steering with a pm 30^{circ}×8^{circ} field-of-view through a shar... 详细信息
来源: 评论
Testing the Inference Accuracy of Accelerator-Friendly Approximate Phylogeny Tracking
Testing the Inference Accuracy of Accelerator-Friendly Appro...
收藏 引用
2025 IEEE Symposium on Computational Intelligence in Artificial Life and Cooperative Intelligent systems, ALIFE-CIS 2025
作者: Moreno, Matthew Andres Ranjan, Anika Dolson, Emily Zaman, Luis University of Michigan Department of Ecology and Evolutionary Biology Ann Arbor United States Center for the Study of Complex Systems University of Michigan Ann Arbor United States Michigan Institute for Data and Ai in Society University of Michigan Ann Arbor United States Undergraduate Research Opportunities Program University of Michigan Ann Arbor United States Michigan State University Department of Computer Science and Engineering East Lansing United States Program in Ecology Evolution and Behavior Michigan State University East Lansing United States
Computer simulations are an important tool for studying the mechanics of biological evolution. In particular, agent-based approaches provide an opportunity to collect high-quality records of ancestry relationships. Su... 详细信息
来源: 评论
Clarifying Assumptions about Artificial Intelligence before Revolutionising Patent Law
收藏 引用
GRUR International 2022年 第4期71卷 295-321页
作者: Kim, Daria Alber, Maximilian Kwok, Man Wai Mitrovic, Jelena Ramirez-Atencia, Cristian Perez, Jesus Alberto Rodriguez Zille, Heiner Max Planck Institute for Innovation and Competition Munich Germany Charite Institute of Pathology Berlin Germany Chinese University of Hong Kong Department of Physics (Formerly) Hong Kong BMBF Program for Women in AI Faculty of Computer Science and Mathematics Chair of Data Science University of Passau Germany Department of Computer Systems Universidad Politecnica de Madrid Spain School of Computing Science College of Science and Engineering University of Glasgow United Kingdom Faculty of Computer Science Otto von Guericke University Magdeburg Germany
This paper examines several widespread assumptions about artificial intelligence, particularly machine learning, that are often taken as factual premises in discussions on the future of patent law in the wake of '...
来源: 评论
Cybernated Watermarking Approach on Image with Cryptographic Encryption
Cybernated Watermarking Approach on Image with Cryptographic...
收藏 引用
Computer, Communication and Control (IC4), International Conference on
作者: R. Sivasankari T Veeramakali S M Mustafa Nawaz P. Prakash P Umadevi A Alvin Ancy Dept. of Computer Science and Engineering B.S.Abdur Rahman Crescent Institute of Science and Technology Dept of Data Science and Business Systems School of Computing SRM Institute of Science and Technology Kattankulathur Tamilnadu Dept of Computer Science and Engineering Sri Sai Ram Institute of Technology Dept of Electronics and Communication Engineering Sri Sai Ram Engineering College Department of S & H KPR Institute of Engineering and Technology Coimbatore Dept of Electronics and Communication Engineering Anna University Chennai
Digital watermarking of interactive media content has become an active experimentation field in recent years. In addition to reviewing some of the methods that have been developed for various media types; a general st...
来源: 评论
Enhanced prairie dog optimization with Levy flight and dynamic opposition-based learning for global optimization and engineering design problems
收藏 引用
Neural Computing and Applications 2024年 第19期36卷 11137-11170页
作者: Biswas, Saptadeep Shaikh, Azharuddin Ezugwu, Absalom El-Shamir Greeff, Japie Mirjalili, Seyedali Bera, Uttam Kumar Abualigah, Laith Department of Mathematics National Institute of Technology Agartala Tripura Agartala India Unit for Data Science and Computing North-West University 11 Hoffman Street Potchefstroom2520 South Africa Faculty of Natural and Agricultural Sciences School of Computer Science and Information Systems North-West University Vanderbijlpark South Africa Centre for Artificial Intelligence Research and Optimization Torrens University Australia Fortitude Valley BrisbaneQLD4006 Australia Research Center University of Tabuk Tabuk71491 Saudi Arabia Computer Science Department Al al-Bayt University Mafraq25113 Jordan Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman19328 Jordan Applied Science Research Center Applied Science Private University Amman11931 Jordan Department of Electrical and Computer Engineering Lebanese American University Byblos13-5053 Lebanon School of Engineering and Technology Sunway University Malaysia Petaling Jaya27500 Malaysia College of Engineering Yuan Ze University Taoyuan32003 Taiwan MEU Research Unit Middle East University Amman11831 Jordan
This study proposes a new prairie dog optimization algorithm version called EPDO. This new version aims to address the issues of premature convergence and slow convergence that were observed in the original PDO algori... 详细信息
来源: 评论
Adaptive Contextual Caching for Mobile Edge Large Language Model Service
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Guangyuan Liu, Yinqiu Wang, Jiacheng Du, Hongyang Niyato, Dusit Kang, Jiawen Xiong, Zehui College of Computing and Data Science The Energy Research Institute @ NTU Interdisciplinary Graduate Program Nanyang Technological University Singapore College of Computing and Data Science Nanyang Technological University Singapore Department of Electrical and Electronic Engineering University of Hong Kong Hong Kong School of Automation Guangdong University of Technology China Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore
Mobile edge Large Language Model (LLM) deployments face inherent constraints, such as limited computational resources and network bandwidth. Although Retrieval-Augmented Generation (RAG) mitigates some challenges by i... 详细信息
来源: 评论
Successful Integration of IoT and Blockchain Technologies Using Several Machine Learning Algorithms
Successful Integration of IoT and Blockchain Technologies Us...
收藏 引用
Computing, Power and Communication Technologies (IC2PCT), IEEE International Conference on
作者: C. Calarany M Indumathy P. Senthilraja D. Suganya V Gopi Vardhan Yelisetty Shanmukh Rahul Department of Computer Science Tagore Government Arts and Science College Puducherry India Department of Information Technology Rajiv Gandhi College of Engineering & Technology Kirumampakkam India Department of Computer Science K.S.Rangasamy College of Technology Tamil Nadu India Department of Computer Science Rajiv Gandhi College of Engineering & technology Kirumampakkam Data science and business systems SRM Institute of Science and Technology Kattankulathur India
Internet of Things (IoT) produces massive amounts of data that need to be processed and saved securely. The strong features of Blockchain makes it as a best candidate for storing the data received from IoT sensors. Ho...
来源: 评论
Capability-based IoT access control using blockchain
收藏 引用
Digital Communications and Networks 2021年 第4期7卷 463-469页
作者: Yue Liu Qinghua Lu Shiping Chen Qiang Qu Hugo’Connor Kim-Kwang Raymond Choo He Zhang School of Computer Science and Engineering University of New South WalesAustralia Data61 CSIROAustralia Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesChina Department of Information Systems and Cyber Security University of Texas at San AntonioUSA Software Institute Nanjing UniversityChina
Internet of Things(IoT)devices facilitate intelligent service delivery in a broad range of settings,such as smart offices,homes and ***,the existing IoT access control solutions are mainly based on conventional identi... 详细信息
来源: 评论