咨询与建议

限定检索结果

文献类型

  • 3,886 篇 期刊文献
  • 3,442 篇 会议
  • 88 册 图书

馆藏范围

  • 7,416 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,546 篇 工学
    • 2,755 篇 计算机科学与技术...
    • 2,224 篇 软件工程
    • 1,036 篇 信息与通信工程
    • 766 篇 控制科学与工程
    • 713 篇 电气工程
    • 591 篇 电子科学与技术(可...
    • 476 篇 生物工程
    • 421 篇 机械工程
    • 402 篇 光学工程
    • 363 篇 生物医学工程(可授...
    • 343 篇 仪器科学与技术
    • 222 篇 化学工程与技术
    • 219 篇 动力工程及工程热...
    • 181 篇 材料科学与工程(可...
    • 167 篇 航空宇航科学与技...
    • 151 篇 交通运输工程
    • 150 篇 网络空间安全
  • 2,939 篇 理学
    • 1,248 篇 物理学
    • 1,154 篇 数学
    • 572 篇 生物学
    • 406 篇 统计学(可授理学、...
    • 301 篇 系统科学
    • 263 篇 化学
    • 202 篇 地球物理学
  • 1,129 篇 管理学
    • 740 篇 管理科学与工程(可...
    • 428 篇 图书情报与档案管...
    • 320 篇 工商管理
  • 424 篇 医学
    • 362 篇 临床医学
    • 274 篇 基础医学(可授医学...
    • 167 篇 药学(可授医学、理...
  • 153 篇 法学
  • 106 篇 农学
  • 96 篇 经济学
  • 63 篇 教育学
  • 28 篇 文学
  • 18 篇 艺术学
  • 17 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 201 篇 deep learning
  • 147 篇 machine learning
  • 140 篇 feature extracti...
  • 120 篇 laboratories
  • 115 篇 computational mo...
  • 114 篇 accuracy
  • 110 篇 artificial intel...
  • 95 篇 training
  • 90 篇 optimization
  • 88 篇 information tech...
  • 87 篇 semantics
  • 74 篇 internet of thin...
  • 66 篇 computer science
  • 66 篇 image segmentati...
  • 66 篇 predictive model...
  • 63 篇 reinforcement le...
  • 62 篇 data mining
  • 58 篇 neural networks
  • 54 篇 wireless communi...
  • 51 篇 visualization

机构

  • 287 篇 faculty of scien...
  • 286 篇 department for p...
  • 285 篇 department of ph...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 267 篇 department of ph...
  • 266 篇 department of ph...
  • 265 篇 kirchhoff-instit...
  • 259 篇 faculté des scie...
  • 255 篇 institute of phy...
  • 242 篇 fakultät für phy...
  • 232 篇 institut für ast...
  • 230 篇 yerevan physics ...
  • 228 篇 institute of phy...
  • 223 篇 department of ph...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 211 篇 department of ph...
  • 206 篇 department of ph...
  • 198 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 262 篇 m. klein
  • 260 篇 r. ströhmer
  • 259 篇 h. a. gordon
  • 256 篇 h. sakamoto
  • 256 篇 m. rijssenbeek
  • 256 篇 s. jin
  • 256 篇 g. gaudio
  • 256 篇 s. mohapatra
  • 255 篇 y. nagasaka
  • 246 篇 s. guindon
  • 243 篇 d. guest

语言

  • 6,246 篇 英文
  • 1,079 篇 其他
  • 90 篇 中文
  • 11 篇 日文
  • 5 篇 德文
  • 4 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 俄文
检索条件"机构=Faculty of Information Technology and Systems Computer Engineering Laboratory"
7416 条 记 录,以下是871-880 订阅
排序:
Continual Machine Reading Comprehension via Uncertainty-aware Fixed Memory and Adversarial Domain Adaptation
Continual Machine Reading Comprehension via Uncertainty-awar...
收藏 引用
2022 Findings of the Association for Computational Linguistics: NAACL 2022
作者: Wu, Zhijing Xu, Hua Fang, Jingliang Gao, Kai State Key Laboratory of Intelligent Technology and Systems Department of Computer Science and Technology Tsinghua University Beijing100084 China China School of Information Science and Engineering Hebei University of Science and Technology China
Continual Machine Reading Comprehension aims to incrementally learn from a continuous data stream across time without access the previous seen data, which is crucial for the development of real-world MRC systems. Howe... 详细信息
来源: 评论
A survey of script learning
收藏 引用
Frontiers of information technology & Electronic engineering 2021年 第3期22卷 341-373页
作者: Yi HAN Linbo QIAO Jianming ZHENG Hefeng WU Dongsheng LI Xiangke LIAO Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense TechnologyChangsha 410000China Science and Technology on Information Systems Engineering Laboratory National University of Defense TechnologyChangsha 410000China School of Data and Computer Science Sun Yat-sen UniversityGuangzhou 510006China
Script is the structured knowledge representation of prototypical real-life event *** the commonsense knowledge inside the script can be helpful for machines in understanding natural language and drawing commonsensibl... 详细信息
来源: 评论
Differential Evolution with Arithmetic Optimization Algorithm Enabled Multi-Hop Routing Protocol
收藏 引用
computer systems Science & engineering 2023年 第5期45卷 1759-1773页
作者: Manar Ahmed Hamza Haya Mesfer Alshahrani Sami Dhahbi Mohamed K Nour Mesfer Al Duhayyim ElSayed M.Tag El Din Ishfaq Yaseen Abdelwahed Motwakel Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversityAbha62529Saudi Arabia Department of Computer Science College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia Department of Electrical Engineering Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11845Egypt
Wireless Sensor Networks(WSN)has evolved into a key technology for ubiquitous living and the domain of interest has remained active in research owing to its extensive range of *** spite of this,it is challenging to de... 详细信息
来源: 评论
Empowering Cybersecurity: Unveiling the Art of Identifying and Thwarting Malicious Tactics Within the Sandbox Environment
Empowering Cybersecurity: Unveiling the Art of Identifying a...
收藏 引用
International Conference on Electrical engineering/Electronics, computer, Telecommunications and information technology, ECTI-CON
作者: Tharaniyawarma Kumaralingam Sanika K. Wijayasekara Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka CIET - SLIIT Discovery Lab Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka
In order to combat typical cyber-security concerns, malware analysis is essential. As highly sophisticated malware develops, it calls for a technique to install and study behavioral software properties. In order to le... 详细信息
来源: 评论
Image Classification Analysis to Identify the Tourism Potential Sukabumi on Instagram Using A Deep Learning Approach
Image Classification Analysis to Identify the Tourism Potent...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Falentino Sembiring Rieska Rahayu Ayuningsih Muhamad Muslih Muhammad Andy Maulana Gina Wahdayani Futri Mohd Zainuri Saringat Rachma Siva Ainunnisa Anggun Fergina Information Systems Nusa Putra University Sukabumi Indonesia Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia
This research focuses on image classification, grouping images based on shared characteristics. The study aims to identify the highest-potential category within various fields, from high to low potential. By understan... 详细信息
来源: 评论
Enhancing Traffic engineering Policy in SDN Addressing TCAM limitations using Bloom Filters  4
Enhancing Traffic Engineering Policy in SDN Addressing TCAM ...
收藏 引用
4th IEEE Global Conference for Advancement in technology, GCAT 2023
作者: Ghosh, Akash Barik, Lalbihari Rout, Suchismita Rawat, Bhupender Singh Jena, Prakash Chandra Patra, Sudhansu Shekhar School of Computer Applications KIIT Deemed To be University Bhubaneswar India Department of Information Systems Faculty of Computing and Information Technology in Rabigh King Abdul Aziz University Saudi Arabia College of Smart Computing COER University Roorkee India Department of Computer Sc and Engg. Hi-Tech College of Engineering Bhubaneswar India
With the increasing demand for new technologies, the speed of delivering a packet is becoming the major focus of various industries. The generation of huge traffic is becoming the bottleneck of the current scenario. B... 详细信息
来源: 评论
A Parallelizable Counterfactual Generation Method Based on Gradient Optimization  29
A Parallelizable Counterfactual Generation Method Based on G...
收藏 引用
29th IEEE International Conference on Parallel and Distributed systems, ICPADS 2023
作者: Ding, Haorun Jiang, Xuesong Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China State Key Laboratory of High-end Server and Storage Technology Jinan China
Post-hoc explanations are important for people to understand the predictions of explanation models. One class of methods in post-hoc explanation is the generation of counterfactuals, where a hypothetical example is ob... 详细信息
来源: 评论
A Novel Peak-to-Average Power Ratio Reduction for 5G Advanced Waveforms
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 1637-1648页
作者: Rajneesh Pareek Karthikeyan Rajagopal Himanshu Sharma Nidhi Gour Arun Kumar Sami Althahabi Haya Mesfer Alshahrani Mohamed Mousa Manar Ahmed Hamza Department of Computer Science&Engineering JECRC UniversityJaipur303905India Centre for Nonlinear Systems Chennai Institute of TechnologyChennaiIndia Department of Electronics and Communication JECRC UniversityJaipur303905India Department of Computer Science College of Science&Art at MahayilKing Khalid UniversityAbhaSaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Electrical Engineering Department Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11845Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Multi and single carrier waveforms are utilized in cellular systems for high-speed data *** The Fifth Generation(5G)system,several waveform techniques based on multi carrier waveforms are ***,the Peak to Average Power... 详细信息
来源: 评论
Object Identification and Localization of Visual Explanation for Weapon Detection
Object Identification and Localization of Visual Explanation...
收藏 引用
2022 Research, Invention, and Innovation Congress: Innovative Electricals and Electronics, RI2C 2022
作者: Hnoohom, Narit Chotivatunyu, Pitchaya Yuenyong, Sumeth Wongpatikaseree, Konlakorn Mekruksavanich, Sakorn Jitpattanakul, Anuchit Mahidol University Image Information and Intelligence Laboratory Department of Computer Engineering Faculty of Engineering Nakorn Pathom Thailand Mahidol University Faculty of Engineering Department of Computer Engineering Nakorn Pathom Thailand University of Phayao School of Information and Communication Technology Department of Computer Engineering Phayao Thailand King Mongkut's University of Technology North Bangkok Intelligent and Nonlinear Dynamic Innovations Research Center Department of Mathematics Faculty of Applied Science Bangkok Thailand
Weapon detection is a difficult task that requires accurate identification of weapon objects in images. The object localization approach is mostly used because it combines a gradient with a convolutional layer to crea... 详细信息
来源: 评论
An Analysis of Machine Learning Algorithms for Smart Healthcare systems  1
收藏 引用
International Conference on Cyber Security, Privacy and Networking, ICSPN 2022
作者: Alduailij, Mai Mishra, Anupama Zamzami, Ikhlas Fuad Psannis, Konstantinos Department of Information Systems College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh Saudi Arabia Department of Computer Science and Engineering Himalayan School of Science and Technology Swami Rama Himalayan University Dehradun India Faculty of Business King Abdulaziz University Rabigh Saudi Arabia University of Macedonia Thessaloniki Greece
The epidemic taught us to keep digital health records. It also showed us how wearable observing gear, video conferences, and AI-powered chatbots may give good treatment remotely. Real-time data from health care device... 详细信息
来源: 评论