咨询与建议

限定检索结果

文献类型

  • 909 篇 会议
  • 559 篇 期刊文献
  • 59 册 图书

馆藏范围

  • 1,527 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 968 篇 工学
    • 783 篇 计算机科学与技术...
    • 648 篇 软件工程
    • 194 篇 信息与通信工程
    • 134 篇 控制科学与工程
    • 107 篇 生物工程
    • 103 篇 电气工程
    • 83 篇 生物医学工程(可授...
    • 69 篇 电子科学与技术(可...
    • 64 篇 光学工程
    • 63 篇 化学工程与技术
    • 51 篇 机械工程
    • 44 篇 动力工程及工程热...
    • 43 篇 建筑学
    • 37 篇 土木工程
    • 32 篇 交通运输工程
    • 31 篇 材料科学与工程(可...
  • 501 篇 理学
    • 292 篇 数学
    • 122 篇 生物学
    • 92 篇 物理学
    • 86 篇 统计学(可授理学、...
    • 59 篇 化学
    • 55 篇 系统科学
  • 339 篇 管理学
    • 194 篇 图书情报与档案管...
    • 157 篇 管理科学与工程(可...
    • 69 篇 工商管理
  • 104 篇 医学
    • 84 篇 临床医学
    • 65 篇 基础医学(可授医学...
    • 44 篇 药学(可授医学、理...
    • 34 篇 公共卫生与预防医...
  • 35 篇 法学
    • 30 篇 社会学
  • 20 篇 教育学
  • 20 篇 农学
  • 17 篇 经济学
  • 7 篇 文学
  • 3 篇 哲学
  • 2 篇 历史学
  • 1 篇 军事学

主题

  • 67 篇 artificial intel...
  • 60 篇 computer science
  • 59 篇 knowledge engine...
  • 43 篇 data mining
  • 42 篇 semantics
  • 33 篇 deep learning
  • 32 篇 machine learning
  • 29 篇 computational mo...
  • 29 篇 accuracy
  • 27 篇 ontologies
  • 27 篇 training
  • 25 篇 information stor...
  • 23 篇 feature extracti...
  • 21 篇 information syst...
  • 21 篇 knowledge manage...
  • 21 篇 technological in...
  • 20 篇 support vector m...
  • 20 篇 educational inst...
  • 19 篇 image segmentati...
  • 19 篇 computational in...

机构

  • 87 篇 college of compu...
  • 73 篇 lovely professio...
  • 45 篇 key laboratory o...
  • 30 篇 institute of aer...
  • 26 篇 beijing key labo...
  • 25 篇 lloyd institute ...
  • 22 篇 institute of aer...
  • 21 篇 school of comput...
  • 17 篇 department of co...
  • 16 篇 school of comput...
  • 16 篇 global knowledge...
  • 15 篇 department of da...
  • 14 篇 lloyd institute ...
  • 14 篇 school of artifi...
  • 13 篇 school of inform...
  • 13 篇 department of co...
  • 12 篇 key laboratory o...
  • 12 篇 lloyd law colleg...
  • 12 篇 department of ma...
  • 11 篇 knowledge park i...

作者

  • 22 篇 sun geng
  • 20 篇 niyato dusit
  • 18 篇 nürnberger andre...
  • 17 篇 olfa nasraoui
  • 16 篇 li jiahui
  • 16 篇 nasraoui olfa
  • 15 篇 amit joshi
  • 15 篇 praveen
  • 14 篇 chang yi
  • 14 篇 wang jiacheng
  • 13 篇 wu xindong
  • 13 篇 liang yanchun
  • 13 篇 chatterjee soumi...
  • 11 篇 he jun
  • 11 篇 nijhawan ginni
  • 11 篇 du xiaoyong
  • 11 篇 asha v.
  • 11 篇 nilanjan dey
  • 11 篇 fürnkranz johann...
  • 10 篇 liu hongyan

语言

  • 1,459 篇 英文
  • 53 篇 其他
  • 14 篇 中文
  • 1 篇 日文
检索条件"机构=Department of Knowledge Engineering and Computer Science"
1527 条 记 录,以下是151-160 订阅
排序:
A New Embedded Surveillance System for Reducing COVID-19 Outbreak in Elderly Based on Deep Learning and IoT
A New Embedded Surveillance System for Reducing COVID-19 Out...
收藏 引用
2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy, ICDABI 2020
作者: Othman, Nashwan Adnan Al-Dabagh, Mustafa Zuhaer Nayef Aydin, Ilhan Knowledge University College of Science Department of Computer Science Erbil Kurdistan Region446015 Iraq Firat University Computer Engineering Department Elazig Turkey
As a result of the fast spread of Coronavirus disease (COVID-19) throughout the world, it became urgent to evolve an aided-intelligent system to help healthcare organizations to control and early detect COVID-19 outbr... 详细信息
来源: 评论
Cloud based automated irrigation and plant leaf disease detection system using an android application
Cloud based automated irrigation and plant leaf disease dete...
收藏 引用
2017 International Conference on Electronics, Communication and Aerospace Technology, ICECA 2017
作者: Ranjith Anas, Saheer Badhusha, Ibrahim Ot, Zaheema Faseela, K. Shelly, Minnuja Department of Computer Science Engineering Eranad Knowledge City Technical Campus ManjeriKerala India
Due to drastic climatic changes and scarcity of water, the need for proper and sustainable irrigation methods is of high demand. The water demand for plants varies from place to place with the changes in soil content,... 详细信息
来源: 评论
Processing noisy structured textual data using a fuzzy matching approach: Application to postal address errors
收藏 引用
Soft Computing 2000年 第4期4卷 195-205页
作者: Buckley, J.P. Buckles, B.P. Petry, F.E. University of Dayton Computer Science Department 300 College Park Drive DaytonOH45469-2160 United States Department of Electrical Engineering and Computer Science Center for Intelligent and Knowledge-based Systems New OrleansLA70118 United States
A multiparadigm approach is developed and demonstrated for exploiting knowledge about structure for the purpose of extracting information from noisy textual data. A motivating example of a potential application would ... 详细信息
来源: 评论
Exploring Deep Insights from Vast Data: An Overview of Deep Learning Techniques for Big Data  4
Exploring Deep Insights from Vast Data: An Overview of Deep ...
收藏 引用
4th International Conference on Electrical engineering and computer science, ICECOS 2024
作者: Baez Hasan, Sarhad Kareem, Shahab Wahhab Ameen, Didar Dlshad Hamad Soran University Faculty of Science Computer Science Department Soran Iraq Erbil Polytechnic University College of Engineering Knowledge University Department of Information System Engineering Department of Computer Engineering Erbil Iraq
Big data has emerged very fast, and this has brought both opportunities and problems that are related to the application of deep learning. This paper explores how deep learning can be implemented using big data and in... 详细信息
来源: 评论
Size-fixed group discovery via multi-constrained graph pattern matching
收藏 引用
Information sciences 2025年 690卷
作者: Guliu Liu Lei Li Guanfeng Liu Xindong Wu Key Laboratory of Knowledge Engineering with Big Data (Hefei University of Technology) Ministry of Education 230601 Hefei China School of Computer Science and Information Engineering Hefei University of Technology 230601 Hefei China Department of Computing Macquarie University Sydney 2122 Australia
Multi-Constrained Graph Pattern Matching (MC-GPM) aims to match a pattern graph with multiple attribute constraints on its nodes and edges, and has garnered significant interest in various fields, including social-bas...
来源: 评论
Cryptosystem using Facial Landmark for Authentication Pairing and Key Generation in Bluetooth Security  2
Cryptosystem using Facial Landmark for Authentication Pairin...
收藏 引用
2nd Global Conference for Advancement in Technology, GCAT 2021
作者: Mondal, Asif Ikbal Mandal, Bijoy Kumar Choudhury, Amitava Dumkal Institute of Engineering and Technology Department of Computer Science and Engineering India Nshm Knowledge Campus Department of Computer Science and Engineering West Bengal Durgapur India University of Petroleum and Energy Studies School of Computer Science Dehrdaun India
In this paper, the whole system starts with a real time picture of the sender and the receiver. The pairing is done utilizing the image of the sender and the receiver at the place of the pin used for pairing. The key ... 详细信息
来源: 评论
Hybrid Threshold Speech Enhancement Scheme Using TEO and Wavelet Coefficients  2
Hybrid Threshold Speech Enhancement Scheme Using TEO and Wav...
收藏 引用
2nd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2023
作者: Latha, R. Suhas, A.R. Pradeep Kumar, B.P. Ibrahim, M.Mohammed Sathiyapriya, V. HKBK College of Engineering Department of Electronics and Communication Engineering Bangalore India Sona College of Technology Department of Computer Science and Engineering Salem India Knowledge Institute of Technology Department of Computer Science and Engineering Salem India
Speech Enhancement (SE) aims to improve the quality of degraded speech while maintaining its intelligibility. The Wavelet Transform (WT) has become a powerful tool of signal analysis thereby widely used in signal dete... 详细信息
来源: 评论
Recurring comparison faults: Sorting and finding the minimum  20th
Recurring comparison faults: Sorting and finding the minimum
收藏 引用
20th International Symposium on Fundamentals of Computation Theory, FCT 2015
作者: Geissmann, Barbara Mihalák, Matúš Widmayer, Peter Department of Computer Science ETH Zurich Zurich Switzerland Department of Knowledge Engineering Maastricht University Maastricht Netherlands
In a faulty environment, comparisons between two elements with respect to an underlying linear order can come out right or go wrong. A wrong comparison is a recurring comparison fault if comparing the same two element... 详细信息
来源: 评论
ML Based Intrusion Detection Scheme for various types of attacks in a WSN using C4.5 and CART classifiers
收藏 引用
Materials Today: Proceedings 2023年 80卷 3769-3776页
作者: Gite, Pratik Chouhan, Kuldeep Murali Krishna, K. Kumar Nayak, Chinmaya Soni, Mukesh Shrivastava, Amit Department of Computer Science and Engineering IPSA-IES Indore AB Road MP Indore India Department of Computer Science and Engineering I.T.S Engineering College Greater Noida India Department of Electronics and Communication Engineering Vignan's Institute of Information Technology Duvvada Andhra Pradesh Visakhapatnam India Faculty of Emerging Technology Sri Sri University Odisha751001 India Department of Computer Science & Engineering Jagran Lakecity University Bhopal India Department of Computer Science Engineering Swami Vivekanand College of Engineering Khandwa Road Near Tolnaka Vivekanand Knowledge City Indore India
A key component for preserving a WSN's integrity is designing an intrusion detection system (IDS). This article covers several sorts of security threats that may occur in a WSN. It proposes a detection of maliciou... 详细信息
来源: 评论
Common sub-space transfer for reinforcement learning tasks
Common sub-space transfer for reinforcement learning tasks
收藏 引用
23rd Benelux Conference on Artificial Intelligence, BNAIC 2011
作者: Ammar, Haitham Bou Taylor, Mathew E. Tuyls, Karl Weiss, Gerhard Department of Knowledge of Engineering Maastricht University Netherlands Department of Computer Science Lafayette College PA United States
来源: 评论