咨询与建议

限定检索结果

文献类型

  • 2,021 篇 会议
  • 505 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,568 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,614 篇 工学
    • 992 篇 计算机科学与技术...
    • 829 篇 软件工程
    • 343 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 228 篇 电气工程
    • 226 篇 电子科学与技术(可...
    • 144 篇 仪器科学与技术
    • 137 篇 生物医学工程(可授...
    • 134 篇 生物工程
    • 126 篇 光学工程
    • 102 篇 机械工程
    • 95 篇 动力工程及工程热...
    • 82 篇 化学工程与技术
    • 72 篇 建筑学
    • 63 篇 航空宇航科学与技...
    • 62 篇 交通运输工程
    • 62 篇 安全科学与工程
  • 914 篇 理学
    • 480 篇 数学
    • 284 篇 物理学
    • 159 篇 生物学
    • 137 篇 统计学(可授理学、...
    • 128 篇 系统科学
    • 104 篇 化学
    • 85 篇 地球物理学
  • 401 篇 管理学
    • 277 篇 管理科学与工程(可...
    • 166 篇 工商管理
    • 143 篇 图书情报与档案管...
  • 131 篇 医学
    • 114 篇 临床医学
    • 103 篇 基础医学(可授医学...
    • 65 篇 药学(可授医学、理...
  • 62 篇 法学
  • 61 篇 经济学
  • 40 篇 教育学
  • 24 篇 农学
  • 7 篇 文学
  • 5 篇 军事学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 62 篇 accuracy
  • 45 篇 training
  • 44 篇 optimization
  • 43 篇 computational mo...
  • 35 篇 feature extracti...
  • 33 篇 predictive model...
  • 33 篇 artificial intel...
  • 32 篇 computer archite...
  • 32 篇 software
  • 31 篇 neural networks
  • 30 篇 machine learning
  • 29 篇 internet of thin...
  • 26 篇 costs
  • 25 篇 servers
  • 24 篇 support vector m...
  • 24 篇 hardware
  • 24 篇 estimation
  • 23 篇 computer science
  • 23 篇 neutrons
  • 23 篇 real-time system...

机构

  • 89 篇 infn sezione di ...
  • 87 篇 université de st...
  • 87 篇 nikhef national ...
  • 87 篇 infn sezione di ...
  • 86 篇 ncsr demokritos ...
  • 85 篇 institut univers...
  • 85 篇 tno technical sc...
  • 85 篇 infn sezione di ...
  • 83 篇 north-west unive...
  • 83 篇 university würzb...
  • 83 篇 university of jo...
  • 82 篇 infn sezione di ...
  • 82 篇 national centre ...
  • 80 篇 university moham...
  • 80 篇 università la sa...
  • 79 篇 western sydney u...
  • 76 篇 infn sezione di ...
  • 73 篇 università di sa...
  • 70 篇 university of am...
  • 69 篇 tbilisi state un...

作者

  • 95 篇 ardid m.
  • 94 篇 díaz a.f.
  • 94 篇 coleiro a.
  • 94 篇 enzenhöfer a.
  • 94 篇 celli s.
  • 93 篇 ferrara g.
  • 93 篇 boumaaza j.
  • 93 篇 brunner j.
  • 92 篇 kalekin o.
  • 91 篇 dornic d.
  • 91 篇 di palma i.
  • 90 篇 coniglione r.
  • 89 篇 calvo d.
  • 89 篇 eberl t.
  • 87 篇 bendahman m.
  • 83 篇 gal t.
  • 83 篇 bozza c.
  • 83 篇 gozzini s.r.
  • 83 篇 dallier r.
  • 83 篇 carretero v.

语言

  • 2,212 篇 英文
  • 312 篇 其他
  • 25 篇 日文
  • 17 篇 中文
  • 2 篇 朝鲜文
检索条件"机构=Dept. of Computer Systems Architecture and Technology"
2568 条 记 录,以下是331-340 订阅
排序:
Authentic Learning Approach for Data Poisoning Vulnerability in LLMs
Authentic Learning Approach for Data Poisoning Vulnerability...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Mst Shapna Akter Md Abdur Rahman Md Mostafizur Rahman Juanjose Rodriguez-Cardenas Hossain Shahriar Fan Wu Muhammad Rahman Dept. of Intelligent Systems and Robotics University of West Florida Florida USA Dept of Cybersecurity and Information Technology University of West Florida Florida USA Dept. of Information Systems and Security Kennesaw State University Kennesaw USA Center for Cybersecurity University of West Florida Florida USA Dept of Computer Science Tuskegee University Tuskegee USA Dept. of Computer Science and Information Technology Clayton State University Georgia USA
The primary goal of authentic learning is to provide students with an engaging learning environment that offers hands-on experiences in solving real-world security challenges. Each educational theme consists of prelab... 详细信息
来源: 评论
Cascaded Deep CNN Network for Breast Cancer Screening from Ultrasound Images Using Differential Evolution Algorithm  4
Cascaded Deep CNN Network for Breast Cancer Screening from U...
收藏 引用
4th International Conference on Digital Society and Intelligent systems, DSInS 2024
作者: Rahman, Wahidur Sakib, Md Shadman Hosen, Md Solaiman Azad, Mir Mohammad Alshahrani, Hani Sulaiman, Adel Al Reshan, Mana Saleh Shaikh, Asadullah Uttara University Dept. of Computer Science and Engineering Uttara Dhaka Bangladesh University of Information Technology and Sciences Dept. of Computer Science and Engineering Dhaka Bangladesh Iowa State University Department of Computer Science United States Department of Computer Science and Engineering Dhaka Bangladesh College of Computer Science and Information Systems Najran University Department of Computer Science Saudi Arabia Saudi Arabia College of Computer Science and Information Systems Najran University Department of Information Systems Saudi Arabia
Because of poor blood flow and susceptibility to infections, breast cancer can be challenging to heal and, if not treated, might cause major problems, including limb amputation and a lowered quality of life. Though se... 详细信息
来源: 评论
Constrained Obnoxious Facility Location on a Line Segment  33
Constrained Obnoxious Facility Location on a Line Segment
收藏 引用
33rd Canadian Conference on Computational Geometry, CCCG 2021
作者: Singireddy, Vishwanath R. Basappa, Manjanna Computer Science & Information Systems Dept. Birla Institute of Technology & Science Pilani Hyderabad Campus India
In this paper we study two restricted variations of the obnoxious facility location problem in the plane, given as follows. Given a line segment pq and a set P = {p1, p2, p3, . . ., pn} of n demand points in the plane... 详细信息
来源: 评论
Improving E-commerce Fraud Detection via Machine Learning: Comparative Evaluation of Model Effectiveness
Improving E-commerce Fraud Detection via Machine Learning: C...
收藏 引用
2023 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical systems, ICSES 2023
作者: Gangalakshmi, T. Sathya, V. Vinodhini, S. Chandralekha, E. Usha, V. Ravikumar, S. Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Dept.of CSE Chennai India Veltech Multitech Dr.Rangarajan Dr.Sakunthala Engineering College Dept.of Computer Science and Business Systems Chennai India Velammal Engineering College Dept. of Information Technology Chennai India
In the fast-growing E-commerce world, fraud has become a major concern, causing economic losses and eroding consumer trust. This work aimed to detect E-commerce fraud using machine learning on a customer dataset. The ... 详细信息
来源: 评论
Robust Active and Reactive Power Control by using Single-Phase Grid connected H-Bridge Inverter
Robust Active and Reactive Power Control by using Single-Pha...
收藏 引用
International Smart Grid Workshop and Certificate Program (ISGWCP)
作者: Resul Coteli Korhan Kayisli Ruhi Zafer Caglayan Dept. of Energy Systems Engineering Technology Faculty Firat University Elazig Turkiye Dept. of Electrical- Electronic Engineering Engineering Faculty Gazi University Ankara Turkiye Dept. of Computer Engineering Engineering Faculty TED University Ankara Turkiye
In a single-phase power network, inverters can be used to control the active and reactive power between sources. This task can be achieved by proper control of the current of the single-phase inverter. The current con... 详细信息
来源: 评论
Enhancing Cybersecurity Through Advanced Fraud and Anomaly Detection Techniques: A Systematic Review
Enhancing Cybersecurity Through Advanced Fraud and Anomaly D...
收藏 引用
Science, Engineering and Business for Sustainable Development Goals (SEB-SDG), International Conference on
作者: Oluwambo Tolulope Olowe Ayodele A. Adebiyi Adebiyi O. Marion Olowe Mofiyinfoluwa Tobi Deborah Olaniyan Julius Olaniyan Aderemi Emmanuel Kayode Akindeji Dept of Computer Science Landmark University Omuaran Nigeria Dept. of Industrial & Systems Engineering University of Pretoria Pretoria South Africa Dept. of Power Electric Engineering Durban University of Technology Durban South Africa
Fraud and anomaly detection in cybersecurity have become critical areas of research, prompting a comprehensive review of recent developments and model effectiveness. This study investigates prevalent trends and challe... 详细信息
来源: 评论
Exploiting Partial Observability and Optimized Simple State Representations in Deep Q-Learning  20
Exploiting Partial Observability and Optimized Simple State ...
收藏 引用
20th International Conference on Frontiers of Information technology, FIT 2023
作者: Mahmood, Danyaal Arshad, Usama Ali, Raja Hashim Ul Abideen, Zain Shah, Muhammad Huzaifa Khan, Talha Ali Ijaz, Ali Zeeshan Ali, Nisar Siddique, Abu Bakar Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany Applications & Nanostructure BCMaterials Basque Center for Materials Spain University of Regina Faculty of Electronic Systems Engineering Regina Canada
The advent of deep Q-learning has opened up new possibilities in training autonomous agents to perform intelligently in intricate settings. This research work examines the potential of deep Q-learning in the paradigma... 详细信息
来源: 评论
Prediction of Polycystic Ovary Syndrome Using Genetic Algorithm-driven Feature Selection
Prediction of Polycystic Ovary Syndrome Using Genetic Algori...
收藏 引用
2023 International Conference on IT and Industrial Technologies, ICIT 2023
作者: Faridoon, Fatima Ali, Raja Hashim Ul Abideen, Zain Shahzadi, Nazia Ijaz, Ali Zeeshan Arshad, Usama Ali, Nisar Imad, Muhammad Nabi, Said Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany BCMaterials Basque Center for Materials Applications & Nanostructure Spain University of Regina Faculty of Electronic Systems Engineering Regina Canada
PolyCystic Ovary Syndrome (PCOS) is a hormonal disorder frequently found in women of reproductive age having a significant impact on the cause of infertility. It is an endocrine condition characterized by abnormalitie... 详细信息
来源: 评论
Investigating novel machine learning based intrusion detection models for NSL-KDD data sets
Investigating novel machine learning based intrusion detecti...
收藏 引用
2023 International Conference on IT and Industrial Technologies, ICIT 2023
作者: Shah, Muhammad Huzaifa Abu Bakar, Muhammad Ali, Raja Hashim Ul Abideen, Zain Arshad, Usama Ijaz, Ali Zeeshan Ali, Nisar Imad, Muhammad Nabi, Said Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany BCMaterials Basque Center for Materials Applications & Nanostructure Spain University of Regina Faculty of Electronic Systems Engineering Regina Canada
This study investigates the application of the Mutual Information (MI) feature selection technique to improve the accuracy of Machine Learning (ML) models on NSL-KDD datasets, building upon prior research. Six ML mode... 详细信息
来源: 评论
AIX Implementation in Image-Based PM2.5 Estimation: Toward an AI Model for Better Understanding
AIX Implementation in Image-Based PM2.5 Estimation: Toward a...
收藏 引用
15th International Conference on Knowledge and Smart technology, KST 2023
作者: Utomo, Sapdo John, A. Pratap, Ayush Jiang, Zhi-Sheng Karthikeyan, P. Hsiung, Pao-Ann National Chung Cheng University Grad. Ins. Ambient Intelligence and Smart Systems Chiayi County Taiwan National Chung Cheng University Dept. of Computer Science and Information Engineering Chiayi County Taiwan Indian Institute of Technology Dept. of Metallurgical and Materials Engineering Ropar Rupnagar India
In accordance with the Sustainable Development Goals, the exponential expansion of machine learning (ML) and artificial intelligence (AI) presents an excellent chance to build more effective tools and solutions and ge... 详细信息
来源: 评论