咨询与建议

限定检索结果

文献类型

  • 5,682 篇 会议
  • 3,373 篇 期刊文献
  • 147 册 图书

馆藏范围

  • 9,202 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,242 篇 工学
    • 3,313 篇 计算机科学与技术...
    • 2,645 篇 软件工程
    • 1,104 篇 信息与通信工程
    • 1,027 篇 控制科学与工程
    • 750 篇 电气工程
    • 705 篇 电子科学与技术(可...
    • 519 篇 生物工程
    • 503 篇 生物医学工程(可授...
    • 438 篇 机械工程
    • 373 篇 光学工程
    • 336 篇 仪器科学与技术
    • 316 篇 动力工程及工程热...
    • 264 篇 化学工程与技术
    • 224 篇 材料科学与工程(可...
    • 186 篇 交通运输工程
    • 179 篇 安全科学与工程
  • 2,883 篇 理学
    • 1,392 篇 数学
    • 905 篇 物理学
    • 653 篇 生物学
    • 445 篇 统计学(可授理学、...
    • 411 篇 系统科学
    • 277 篇 化学
  • 1,385 篇 管理学
    • 934 篇 管理科学与工程(可...
    • 494 篇 图书情报与档案管...
    • 470 篇 工商管理
  • 538 篇 医学
    • 460 篇 临床医学
    • 362 篇 基础医学(可授医学...
    • 220 篇 药学(可授医学、理...
    • 192 篇 公共卫生与预防医...
  • 223 篇 法学
    • 186 篇 社会学
  • 160 篇 经济学
  • 122 篇 教育学
  • 106 篇 农学
  • 23 篇 文学
  • 22 篇 艺术学
  • 14 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 185 篇 deep learning
  • 166 篇 machine learning
  • 160 篇 computer science
  • 159 篇 computational mo...
  • 156 篇 systems engineer...
  • 140 篇 feature extracti...
  • 128 篇 artificial intel...
  • 113 篇 optimization
  • 112 篇 accuracy
  • 100 篇 control systems
  • 97 篇 neural networks
  • 95 篇 internet of thin...
  • 88 篇 computer archite...
  • 88 篇 monitoring
  • 81 篇 data mining
  • 79 篇 mathematical mod...
  • 77 篇 support vector m...
  • 77 篇 predictive model...
  • 77 篇 visualization
  • 75 篇 software enginee...

机构

  • 52 篇 computer and sys...
  • 39 篇 faculty of compu...
  • 35 篇 department of co...
  • 27 篇 department of in...
  • 26 篇 ieee
  • 24 篇 department of el...
  • 24 篇 institute for sy...
  • 24 篇 faculty of engin...
  • 21 篇 graduate school ...
  • 20 篇 inesc tec - inst...
  • 20 篇 department of co...
  • 19 篇 department of co...
  • 19 篇 computer enginee...
  • 19 篇 department of co...
  • 19 篇 faculty of engin...
  • 17 篇 faculty of compu...
  • 17 篇 department of in...
  • 16 篇 department of sy...
  • 16 篇 faculty of compu...
  • 15 篇 department of co...

作者

  • 58 篇 pedrycz witold
  • 28 篇 tao dacheng
  • 27 篇 el-sayed m.el-ke...
  • 23 篇 abdelwahed motwa...
  • 18 篇 frank knoefel
  • 17 篇 abdelaziz a.abde...
  • 17 篇 nor kamariah noo...
  • 17 篇 chee kyun ng
  • 16 篇 hayashi eiji
  • 16 篇 hamid d. taghira...
  • 16 篇 xin xin
  • 15 篇 witold pedrycz
  • 15 篇 gallegos luis en...
  • 15 篇 anwer mustafa hi...
  • 14 篇 noraziah a.
  • 14 篇 tomio watanabe
  • 13 篇 borhanuddin mohd...
  • 13 篇 k. inoue
  • 13 篇 ahmed bestoun s.
  • 13 篇 watanabe tomio

语言

  • 8,713 篇 英文
  • 386 篇 其他
  • 70 篇 中文
  • 32 篇 日文
  • 5 篇 德文
  • 2 篇 法文
  • 2 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Systems and Computer Engineering"
9202 条 记 录,以下是791-800 订阅
排序:
Analysis of Sensor Signals with Machine and Deep Learning Algorithms  11
Analysis of Sensor Signals with Machine and Deep Learning Al...
收藏 引用
11th International Scientific Conference on computer Science, COMSCI 2023
作者: Yotov, Ognyan Borislavov Aleksieva-Petrova, Adelina Plamenova Technical University of Sofia German Engineering and Industrial Management Faculty 8 Kliment Ohridski blvd Sofia1000 Bulgaria Technical University of Sofia Faculty of Computer Systems and Technologies 8 Kliment Ohridski blvd Sofia1000 Bulgaria
Industry 4.0 relies heavily on data generation and analysis. Sensor signals are difficult for analysis using traditional methods and mathematical techniques. Machine and Deep Learning algorithms in combination with ma... 详细信息
来源: 评论
Zero-Day Malware Detection through Unsupervised Deep Learning  3
Zero-Day Malware Detection through Unsupervised Deep Learnin...
收藏 引用
3rd International Mobile, Intelligent, and Ubiquitous Computing Conference, MIUCC 2023
作者: Mousa, Mohammad Bahaa-Eldin, Ayman M. Sobh, Mohamed Taha, Ayman Ain Shams University Faculty of Engineering Computers and Systems Eng. Dept. Cairo Egypt Misr International University Ain Shams University Cairo Egypt Misr International University Faculty of Computer Science Cairo Egypt
This paper investigates the problem of zero-day malicious software (Malware) detection through unsupervised deep learning. We built a sequence-to-sequence auto-encoder model for learning the behavior of normal softwar... 详细信息
来源: 评论
Utilizing Genetic Programming to Enhance Polygenic Risk Score Calculation
Utilizing Genetic Programming to Enhance Polygenic Risk Scor...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Hurta, Martin Schwarzerova, Jana Naegele, Thomas Weckwerth, Wolfram Provaznik, Valentine Sekanina, Lukas Brno University of Technology Faculty of Information Technology Department of Computer Systems Brno Czech Republic Brno University of Technology Faculty of Electrical Engineering and Communication Department of Biomedical Engineering Brno Czech Republic Vienna Austria Lmu Munich Plant Evolutionary Cell Biology Faculty of Biology Munich Germany Vienna Austria
The polygenic risk score has proven to be a valuable tool for assessing an individual's genetic predisposition to phenotype (disease) within biomedicine in recent years. However, traditional regression-based metho... 详细信息
来源: 评论
A Continual Learning System with Self Domain Shift Adaptation for Fake News Detection  10
A Continual Learning System with Self Domain Shift Adaptatio...
收藏 引用
10th IEEE International Conference on Data Science and Advanced Analytics, DSAA 2023
作者: Basterrech, Sebastian Kasprzak, Andrzej Platos, Jan Wozniak, Michal Technical University of Denmark Department of Applied Mathematics and Computer Science Kongens Lyngby Denmark Wroclaw University of Science and Technology Department of Systems and Computer Networks Wroclaw Poland VŠB-Technical University of Ostrava Faculty of Electrical Engineering and Computer Science Ostrava Czech Republic
Detecting fake news is currently one of the critical challenges facing modern societies. The problem is particularly relevant, as disinformation is readily used for political warfare but can also cause significant har... 详细信息
来源: 评论
Investigating novel machine learning based intrusion detection models for NSL-KDD data sets
Investigating novel machine learning based intrusion detecti...
收藏 引用
2023 International Conference on IT and Industrial Technologies, ICIT 2023
作者: Shah, Muhammad Huzaifa Abu Bakar, Muhammad Ali, Raja Hashim Ul Abideen, Zain Arshad, Usama Ijaz, Ali Zeeshan Ali, Nisar Imad, Muhammad Nabi, Said Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany BCMaterials Basque Center for Materials Applications & Nanostructure Spain University of Regina Faculty of Electronic Systems Engineering Regina Canada
This study investigates the application of the Mutual Information (MI) feature selection technique to improve the accuracy of Machine Learning (ML) models on NSL-KDD datasets, building upon prior research. Six ML mode... 详细信息
来源: 评论
Towards a Longitudinal Comparison Between Different Strategies for Android Malware Detection  3
Towards a Longitudinal Comparison Between Different Strategi...
收藏 引用
3rd International Conference on Theoretical and Applicative Aspects of computer Science, ICTAACS 2023
作者: Mesbah, Abdelhak Baddari, Ibtihel Riahla, Mohamed Amine University m'Hamed Bougara of Boumerdes Faculty of Sciences Limose Laboratory Department of Computer Science Boumerdes Algeria University m'Hamed Bougara of Boumerdes Faculty of Technology Limose Laboratory Department of Electrical Systems Engineering Boumerdes Algeria
The growing popularity of the Android platform makes it a target of malware authors. The effective identification of such malware is an ongoing challenge. Several methods using machine learning have been proposed to p... 详细信息
来源: 评论
Intelligent Energy Management Energy Storage systems Using Machine Learning
Intelligent Energy Management Energy Storage Systems Using M...
收藏 引用
2024 International Conference on Intelligent systems for Cybersecurity, ISCS 2024
作者: Govindasamy, Chinnaraj Dayana, T.R Nisha Adkar, Siddhika Dilip Prakash, D. Shyam Gupta, A. Shilpa Trivedi, Sanjeev Kumar Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Tamilnadu Chennai602105 India Vels Institute of Science Technology and Advance Studies Department of Computer Science Chennai India School of Computer Science Engineering and Applications D y Patil International University Akurdi India Department of Computer Science and Business Systems Sri Eshwar College of Engineering Coimbatore India Department of Electrical and Electronics Engineering Aurora's Technological Research Institute Uppal Hyderabad India Khwaja Moinuddin Chishti Language University Faculty of Engineering and Technology Department of Electronics Lucknow India
A nevertheless-emerging generation called cloud computing permits customers to pay for services on a usage-based foundation. Internet-primarily based IT offerings are supplied through cloud computing, at the same time... 详细信息
来源: 评论
The Impact of Class Weight Optimization on Improving Machine Learning Outcomes in Identifying COVID-19 Specific ECG Patterns
The Impact of Class Weight Optimization on Improving Machine...
收藏 引用
17th International Joint Conference on Biomedical engineering systems and Technologies, BIOSTEC 2024
作者: Khan, Sara Ismail, Walaa N. Alsalamah, Shada Mohamed, Ebtesam Alsalamah, Hessah A. Department of Information Systems and Technology Management George Washington University WashingtonDC United States Management Information Systems Department College of Business Al Yamamah University Riyadh Saudi Arabia Information Systems Department King Saud University Riyadh Saudi Arabia Faculty of Computer Science Minia University Minia Egypt Computer Engineering Department College of Engineering and Architecture Al Yamamah University Riyadh Saudi Arabia
The Covid-19 pandemic has resulted in 550 million cases and 6.3 million fatalities, with the virus severely affecting the lungs and cardiovascular system. A study utilizes a VGG16 model adapted for a 12-Lead ECG Image... 详细信息
来源: 评论
Hands and Palms Recognition by Transfer Learning for Forensics: A Comparative Study  23
Hands and Palms Recognition by Transfer Learning for Forensi...
收藏 引用
23rd International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 2024
作者: Fattahi, Jaouhar Fkiri, Obeb Mejri, Mohamed Ghayoula, Ridha Department of Computer Science and Software Engineering Laval University 2325 rue de l'Université QuebecQCG1V 0A6 Canada Department of Computer Science National School of Engineers of Carthage University of Carthage Tunis Tunisia Faculty of Engineering Information Systems Department University of Moncton New Brunswick Canada
In the realm of forensic science, precise identification of individuals holds paramount importance in both investigative procedures and legal proceedings. Hands and palms recognition has emerged as a valuable biometri... 详细信息
来源: 评论
Performance Comparison of the Invasive Weed Optimization K-Means Algorithm with Particle Swarm Optimization K-Means for Banking Data
Performance Comparison of the Invasive Weed Optimization K-M...
收藏 引用
International Conference on Cybernetics and Intelligent System (ICORIS)
作者: Ni Luh Gede Pivin Suwirmayanti I Ketut Gede Darma Putra Made Sudarma I Made Sukarsa Emy Setyaningsih Department of Computer Systems Faculty of Informatics and Computer Institut Teknologi dan Bisnis STIKOM Bali Bali Indonesia Department of Information Technology Faculty of Engineering Udayana University Jimbaran Hill Bali Indonesia Department of Electrical Engineering Faculty of Engineering Udayana University Jimbaran Hill Bali Indonesia Department of Computer Systems Engineering Faculty of Applied Science Universitas AKPRIND Indonesia Yogyakarta Indonesia
Banking produces extensive and diverse data, so a clustering process is needed to understand customer behavior patterns and transactions more effectively. This clustering has been widely utilized with the K-Means algo... 详细信息
来源: 评论