咨询与建议

限定检索结果

文献类型

  • 1,891 篇 会议
  • 1,790 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,739 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,327 篇 工学
    • 1,396 篇 计算机科学与技术...
    • 1,128 篇 软件工程
    • 627 篇 信息与通信工程
    • 458 篇 控制科学与工程
    • 378 篇 电气工程
    • 315 篇 电子科学与技术(可...
    • 248 篇 生物工程
    • 194 篇 生物医学工程(可授...
    • 170 篇 机械工程
    • 169 篇 光学工程
    • 128 篇 动力工程及工程热...
    • 112 篇 仪器科学与技术
    • 96 篇 交通运输工程
    • 92 篇 材料科学与工程(可...
    • 91 篇 安全科学与工程
    • 68 篇 核科学与技术
  • 1,407 篇 理学
    • 709 篇 数学
    • 474 篇 物理学
    • 280 篇 统计学(可授理学、...
    • 267 篇 生物学
    • 221 篇 系统科学
    • 77 篇 化学
  • 551 篇 管理学
    • 378 篇 管理科学与工程(可...
    • 213 篇 工商管理
    • 190 篇 图书情报与档案管...
  • 203 篇 医学
    • 175 篇 临床医学
    • 141 篇 基础医学(可授医学...
    • 84 篇 药学(可授医学、理...
  • 101 篇 法学
    • 92 篇 社会学
  • 69 篇 经济学
    • 69 篇 应用经济学
  • 34 篇 教育学
  • 19 篇 农学
  • 10 篇 军事学
  • 6 篇 文学
  • 5 篇 艺术学

主题

  • 86 篇 computer science
  • 66 篇 deep learning
  • 63 篇 machine learning
  • 61 篇 laboratories
  • 59 篇 artificial intel...
  • 57 篇 feature extracti...
  • 54 篇 computational mo...
  • 53 篇 information syst...
  • 53 篇 optimization
  • 43 篇 internet of thin...
  • 42 篇 reinforcement le...
  • 41 篇 throughput
  • 41 篇 control systems
  • 40 篇 data mining
  • 38 篇 wireless communi...
  • 38 篇 accuracy
  • 36 篇 costs
  • 35 篇 wireless sensor ...
  • 35 篇 training
  • 34 篇 routing

机构

  • 99 篇 department of ph...
  • 99 篇 faculty of scien...
  • 99 篇 departamento de ...
  • 98 篇 department for p...
  • 98 篇 department of ph...
  • 97 篇 dipartimento di ...
  • 97 篇 yerevan physics ...
  • 95 篇 kirchhoff-instit...
  • 95 篇 graduate school ...
  • 94 篇 institute of phy...
  • 93 篇 faculté des scie...
  • 93 篇 institute of phy...
  • 92 篇 department of ph...
  • 91 篇 centre de calcul...
  • 90 篇 institut für ast...
  • 88 篇 department of ph...
  • 88 篇 department of ph...
  • 88 篇 department of ph...
  • 88 篇 physikalisches i...
  • 86 篇 fakultät für phy...

作者

  • 86 篇 f. buehrer
  • 86 篇 a. t. law
  • 86 篇 c. alexa
  • 86 篇 j. m. izen
  • 86 篇 s. veneziano
  • 86 篇 d. di valentino
  • 86 篇 g. bella
  • 86 篇 j. strandberg
  • 86 篇 d. calvet
  • 86 篇 c. amelung
  • 86 篇 n. orlando
  • 86 篇 c. gumpert
  • 86 篇 h. a. gordon
  • 86 篇 y. tayalati
  • 86 篇 g. spigo
  • 86 篇 v. chiarella
  • 86 篇 f. siegert
  • 86 篇 a. c. könig
  • 86 篇 a. dimitrievska
  • 86 篇 f. deliot

语言

  • 3,249 篇 英文
  • 445 篇 其他
  • 44 篇 中文
  • 5 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Departments of Electrical and Systems Engineering and Computer and Information Science"
3739 条 记 录,以下是81-90 订阅
排序:
An optimal hybrid cascade regional convolutional network for cyberattack detection
An optimal hybrid cascade regional convolutional network for...
收藏 引用
作者: Alqahtani, Ali Khan, Surbhi Bhatia Department of Networks and Communications Engineering College of Computer Science and Information Systems Najran University Najran Saudi Arabia Department of Data Science School of Science Engineering and Environment University of Salford Salford United Kingdom Department of Electrical and Computer Engineering Lebanese American University Byblos Lebanon
Cyber-physical systems (CPS) and the Internet of Things (IoT) technologies link urban systems through networks and improve the delivery of quality services to residents. To enhance municipality services, information a... 详细信息
来源: 评论
Towards the New XAI: A Hypothesis-Driven Approach to Decision Support Using Evidence  27
Towards the New XAI: A Hypothesis-Driven Approach to Decisio...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Le, Thao Miller, Tim Sonenberg, Liz Singh, Ronal School of Computing and Information Systems The University of Melbourne Australia School of Electrical Engineering and Computer Science The University of Queensland Australia CSIRO's Data61 Australia
Prior research on AI-assisted human decision-making has explored several different explainable AI (XAI) approaches. A recent paper has proposed a paradigm shift calling for hypothesis-driven XAI through a conceptual f...
来源: 评论
A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1607-1621页
作者: Federica Uccello Marek Pawlicki Salvatore D'Antonio RafałKozik MichałChoras Centro Direzionale Department of EngineeringUniversity of Naples‘Parthenope’Isola C4Napoli80133Italy Department of Computer and Information Science Software and SystemsLinköping UniversityLinköping58183Sweden ITTI Sp.z o.o. Pozna´n61-612Poland Faculty of Telecommunications Computer Science and Electrical EngineeringBydgoszcz University of Science and TechnologyBydgoszcz85-796Poland
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security information and Event Management *** machine learning–based... 详细信息
来源: 评论
An IoMT-Based Incremental Learning Framework with a Novel Feature Selection Algorithm for Intelligent Diagnosis in Smart Healthcare
IEEE Transactions on Machine Learning in Communications and ...
收藏 引用
IEEE Transactions on Machine Learning in Communications and Networking 2024年 2卷 370-383页
作者: Sai, Siva Bhandari, Kartikey Singh Nawal, Aditya Chamola, Vinay Sikdar, Biplab Department of Computer Science and Information Systems Pilani Campus Pilani333031 India Microsoft Campus Gachibowli Telangana Hyderabad500032 India Department of Electrical and Electronics Engineering Pilani Campus Pilani333031 India Pilani Campus Pilani333031 India National University of Singapore Department of Electrical and Computer Engineering Cluny Road Singapore117583 Singapore
Several recent research papers in the Internet of Medical Things (IoMT) domain employ machine learning techniques to detect data patterns and trends, identify anomalies, predict and prevent adverse events, and develop... 详细信息
来源: 评论
Heart Disease Prediction Using Machine Learning Algorithms
Heart Disease Prediction Using Machine Learning Algorithms
收藏 引用
2023 Innovations in Power and Advanced Computing Technologies, i-PACT 2023
作者: Priya, M. Anitha, A. Nallakaruppan, M.K. Raju, J. Raghavan, R. Srivastava, Divyansh School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India School of Electrical Engineering Vellore Institute of Technology Vellore India
Heart disease is one of the destructive infections that an enormous populace of individuals all over the planet grieves. The prediction of heart disease is very much urged because of increasing death rates. The conven... 详细信息
来源: 评论
Investigating the Determinants of Compliance Intention in Behavior Change Support systems  29
Investigating the Determinants of Compliance Intention in Be...
收藏 引用
29th Annual Americas Conference on information systems: Diving into Uncharted Waters, AMCIS 2023
作者: Ekpezu, Akon Obu Oinas-Kukkonen, Harri Wiafe, Isaac Faculty of Information Technology and Electrical Engineering Oulu Advanced Research on Service and Information Systems University of Oulu Finland Department of Computer Science University of Ghana Ghana
The effectiveness of behavior change support systems (BCSS) in promoting health and well-being is unflinching. However, its long-term effectiveness is hindered by non-compliance. Research in BCSS that focuses on compl... 详细信息
来源: 评论
Medical Reports Simplification Using Large Language Models  23th
Medical Reports Simplification Using Large Language Models
收藏 引用
23rd International Conference on Intelligent systems Design and Applications, ISDA 2023
作者: Almezhghwi, Khaled Hassan, Morad Ali Ghadedo, Adel Belhaj, Fairouz Shwehdi, Rabei Electrical and Electronics Engineering College of Electronics Technology Tripoli Tripoli Libya Computer Science Bani Waleed University Bani Waleed Libya Computer Science College of Electronics Technology Tripoli Tripoli Libya Computer Information Systems Higher Institute of Science and Technology Tripoli Libya Electrical and Electronics Engineering College of Electronics Technology Tripoli Tripoli Libya
Making medical reports easily understandable for a wider audience is a significant endeavor, and the recent advancements in deep learning and large language models offer a promising solution. In our research, we have ... 详细信息
来源: 评论
Tolerant Tracking Control Protocol for PMSM Based on Policy Iteration Algorithm and Fault Compensation  16th
Tolerant Tracking Control Protocol for PMSM Based on Polic...
收藏 引用
16th International Conference on Social Robotics, ICSR + InnoBiz 2024
作者: Yan, Shuya Li, Xiaocong Qian, Huaming Ma, Jun Al Mamun, Abdullah College of Intelligent Systems Science and Engineering Harbin Engineering University Harbin150001 China Department of Electrical and Computer Engineering National University of Singapore Singapore117583 Singapore Guangzhou China Information Science and Technology Eastern Institute of Technology Ningbo China
In robotics applications, ensuring reliable performance in the presence of actuator faults is essential for maintaining system safety and reliability. This paper presents a tolerant tracking control method for permane... 详细信息
来源: 评论
DaC-GANSAEBF:Divide and Conquer-Generative Adversarial Network-Squeeze and Excitation-Based Framework for Spam Email Identification
收藏 引用
computer Modeling in engineering & sciences 2025年 第3期142卷 3181-3212页
作者: Tawfeeq Shawly Ahmed A.Alsheikhy Yahia Said Shaaban M.Shaaban Husam Lahza Aws I.Abu Eid Abdulrahman Alzahrani Department of Electrical Engineering Faculty of Engineering at RabighKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Electrical Engineering College of EngineeringNorthern Border UniversityArar91431Saudi Arabia Center for Scientific Research and Entrepreneurship Northern Border UniversityArar73213Saudi Arabia Department of Information Technology College of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information and Communication Technology College of Computing StudiesArab Open UniversityKuwait BranchKuwait City13033Al-SafatState of Kuwait Department of Information Systems and Technology College of Computer Science and EngineeringUniversity of JeddahJeddah23218Saudi Arabia
Email communication plays a crucial role in both personal and professional contexts;however,it is frequently compromised by the ongoing challenge of spam,which detracts from productivity and introduces considerable se... 详细信息
来源: 评论
Protecting Your Attention during Distributed Graph Learning: Efficient Privacy-Preserving Federated Graph Attention Network
收藏 引用
IEEE Transactions on information Forensics and Security 2025年 20卷 1949-1964页
作者: Zhou, Jinhao Wu, Jun Ni, Jianbing Wang, Yuntao Pan, Yanghe Su, Zhou Waseda University Graduate School of Information Production and Systems Fukuoka808-0135 Japan Queen's University Department of Electrical and Computer Engineering KingstonONK7L 3N6 Canada Xi'An Jiaotong University School of Cyber Science and Engineering Xi'an710049 China
Federated graph attention networks (FGATs) are gaining prominence for enabling collaborative and privacy-preserving graph model training. The attention mechanisms in FGATs enhance the focus on crucial graph features f... 详细信息
来源: 评论