咨询与建议

限定检索结果

文献类型

  • 1,029 篇 期刊文献
  • 991 篇 会议
  • 13 册 图书

馆藏范围

  • 2,033 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,199 篇 工学
    • 757 篇 计算机科学与技术...
    • 602 篇 软件工程
    • 296 篇 信息与通信工程
    • 183 篇 控制科学与工程
    • 162 篇 生物工程
    • 149 篇 电气工程
    • 148 篇 电子科学与技术(可...
    • 138 篇 生物医学工程(可授...
    • 108 篇 光学工程
    • 85 篇 网络空间安全
    • 76 篇 化学工程与技术
    • 73 篇 材料科学与工程(可...
    • 67 篇 机械工程
    • 57 篇 动力工程及工程热...
    • 56 篇 仪器科学与技术
    • 51 篇 交通运输工程
    • 48 篇 安全科学与工程
  • 829 篇 理学
    • 323 篇 物理学
    • 290 篇 数学
    • 228 篇 生物学
    • 107 篇 化学
    • 107 篇 统计学(可授理学、...
  • 329 篇 管理学
    • 201 篇 管理科学与工程(可...
    • 130 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 188 篇 医学
    • 133 篇 临床医学
    • 120 篇 基础医学(可授医学...
    • 75 篇 公共卫生与预防医...
    • 50 篇 药学(可授医学、理...
  • 76 篇 法学
    • 67 篇 社会学
  • 54 篇 农学
  • 44 篇 教育学
  • 35 篇 经济学
  • 19 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 65 篇 deep learning
  • 59 篇 accuracy
  • 50 篇 machine learning
  • 40 篇 artificial intel...
  • 36 篇 feature extracti...
  • 31 篇 training
  • 29 篇 internet of thin...
  • 29 篇 convolutional ne...
  • 27 篇 computational mo...
  • 25 篇 optimization
  • 23 篇 predictive model...
  • 22 篇 real-time system...
  • 21 篇 computer science
  • 21 篇 data mining
  • 20 篇 security
  • 19 篇 support vector m...
  • 18 篇 data models
  • 17 篇 scalability
  • 17 篇 magnetic resonan...
  • 17 篇 education

机构

  • 48 篇 vivekananda glob...
  • 44 篇 west university ...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 42 篇 maharishi school...
  • 41 篇 kirchhoff-instit...
  • 41 篇 department of co...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 ochanomizu unive...
  • 38 篇 graduate school ...
  • 38 篇 department physi...
  • 37 篇 fakultät für phy...
  • 37 篇 deutsches elektr...

作者

  • 37 篇 m. lu
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 34 篇 m. klein
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo
  • 33 篇 v. chiarella
  • 33 篇 f. siegert
  • 33 篇 a. e. c. coimbra

语言

  • 1,816 篇 英文
  • 190 篇 其他
  • 26 篇 中文
  • 4 篇 日文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Mobile Application & Technology Program Computer Science Department School of Computer Science"
2033 条 记 录,以下是981-990 订阅
排序:
Quadratic stabilisation of switched affine systems
收藏 引用
Journal of Control and Decision 2020年 第1期7卷 1-23页
作者: Minqing Xiao Guisheng Zhai Chi Huang College of Mathematics and Informatics Fujian Key Laboratory of Mathematical Analysis and ApplicationFujian Normal UniversityFuzhouPeople’s Republic of China Department of Mathematical Sciences College of Systems Engineering and ScienceShibaura Institute of TechnologyTokyoJapan Department of Computer Science and Technology School of Economic Information EngineeringSouthwestern University of Finance and EconomicsChengduPeople’s Republic of China
Minqing Xiao received the *** from Chongqing University,Chongqing,China,in *** is currently a Professor with the College of Mathematics and Informatics,Fujian Normal University,Fuzhou,*** current research interests in... 详细信息
来源: 评论
A Multi-Task Based Deep Learning Framework for MRI Couinaud Segmentation
SSRN
收藏 引用
SSRN 2023年
作者: Miao, Dong Zhao, Ying Ren, Xue Dou, Meng Yao, Yu Xu, Yiran Cui, Yingchao Liu, Ailian Chengdu Institute of Computer Application Chinese Academy of Sciences Sichuan Chengdu610200 China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China Department of Radiology The First Affiliated Hospital of Dalian Medical University Liaoning Dalian116000 China Dalian Engineering Research Center for Artificial Intelligence in Medical Imaging Liaoning Dalian116000 China School of Medical Imaging Dalian Medical University Liaoning Dalian116044 China
Bacground and Objectibve: The delineation of the liver into Couinaud segments constitutes an essential aspect of preoperative planning in hepatic surgery, given its complexity and the significantBacground and Objectib... 详细信息
来源: 评论
Latent Regression and Ordination Risk of Infectious Disease and Climate
收藏 引用
Procedia computer science 2021年 179卷 25-32页
作者: Rezzy Eko Caraka Rung Ching Chen Youngjo Lee Prana Ugiana Gio Arif Budiarto Bens Pardamean College of Informatics Chaoyang University of Technology 168 Jifong East Road Wufong Dist. Taichung City 41349 Taiwan (R.O.C.). Department of Statistics College of Natural Science Seoul National University Gwanak-gu Seoul 08826 Korea Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta Indonesia Department of Mathematics Universitas Sumatera Utara Medan 20222 Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia 11480 Computer Science Department BINUS Graduate Program - Master of Computer Science Program Bina Nusantara University Indonesia.
Global warming arising from climate change can increase the spread of deadly diseases. Effort is needed to develop a set of policies for the government to stem or reduce health risks from global warming. The purpose o... 详细信息
来源: 评论
Digital Forensics Investigation and Incident Response in Internet of Things (IoT-DFIR): Challenges and Models  9
Digital Forensics Investigation and Incident Response in Int...
收藏 引用
9th International Conference on Wireless and Telematics, ICWT 2023
作者: Ahdan, Syaiful Zaki Hamidi, Eki Ahmad Riskiono, Sampurna Dadi Negara, Ridha Muldina Mayasari, Ratna Ramadona, Suci Nurhayati, Ade Sucipto, Adi Jupriyadi Nurkahfi, Galih Nugraha Farahiyah, Dzata Naseer, Muchammad Universitas Teknokrat Indonesia Faculty of Engineering & Computer Science Lampung35132 Indonesia Uin Sunan Gunung Djati Bandung Electrical Engineering Department Bandung40614 Indonesia School of Electrical Engineering Telkom University Bandung40257 Indonesia Elearical Engineering Study Program Politeknik Caltex Riau Riau28265 Indonesia Institut Teknologi Telkom Jakarta Faculty of Engineering Jakarta11710 Indonesia Bandung40135 Indonesia Universitas Islam Indonesia Yogyakarta Faculty of Industrial Technology Yogyakarta55584 Indonesia Sekolah Tinggi Teknologi Bandung Informatics Department Bandung40235 Indonesia
Many different industries are currently making substantial use of the Internet of Things (IoT). IoT is the process through which electronic devices communicate with their surrounding virtual environment by continuousl... 详细信息
来源: 评论
CONVERGENCE SPEED AND APPROXIMATION ACCURACY OF NUMERICAL MCMC
arXiv
收藏 引用
arXiv 2022年
作者: Cui, Tiangang Dong, Jing Jasra, Ajay Tong, Xin T. School of Mathematics Monash University Australia Graduate School of Business Columbia University United States Applied Mathematics and Computational Science Program Computer Electrical Mathematical Sciences and Engineering Division King Abdullah University of Science and Technology Saudi Arabia Department of Mathematics National University of Singapore Singapore
When implementing Markov Chain Monte Carlo (MCMC) algorithms, perturbation caused by numerical errors is sometimes inevitable. This paper studies how perturbation of MCMC affects the convergence speed and Monte Carlo ... 详细信息
来源: 评论
Accessible Authentication Using Keyword Search through Homomorphic Encryption
Accessible Authentication Using Keyword Search through Homom...
收藏 引用
Interdisciplinary Humanitarian Conference for Sustainability (IIHC), International
作者: Vipul Vekariya Manjunath. R Jasmeen Gill M Gopianand Avneesh Kumar Amaresh Jha Department of CSE PIET Parul University Vadodara Gujarat India Department of Data Science & Mathamatics Jain (Deemed to be University) Bangalore India Department of CSE RIMT University Mandi Godindgarh India Department of Computer Applications PSNA College of Engineering and Technology Dindigul Department of Computer Application Galgotias University Greater Noida Uttar Pradesh India School of Modern Media UPES Dehradun
Data storage presents substantial issues due to concerns about data security and privacy. In this study, we provide a search-based, interoperable, verified public key cryptography system. The searchability is signific... 详细信息
来源: 评论
Correction: Shielding effectiveness performance of polyaniline-NiFe2O4:Cu composites for sub-8 GHz applications
收藏 引用
Optical and Quantum Electronics 2023年 第9期55卷 1-2页
作者: Şahin, Ethem İlhan Emek, Mehriban Ibrahim, Jamal Eldin F. M. Yumuşak, Görkem Kartal, Mesut Advanced Technology Research and Application Center Adana Alparslan Türkeş Science and Technology University Adana Turkey Department of Physics Computer Technologies Golbasi Vocational School Adiyaman University Gölbaşi Adıyaman Turkey Department of Materials Technology University of Bahri Khartoum Sudan Institute of Ceramic and Polymer Engineering University of Miskolc Egyetemvaros Miskolc Hungary Department of Metallurgical and Materials Engineering Marmara University Göztepe Istanbul Turkey Department of Electronics and Communication Engineering İstanbul Technical University Maslak Istanbul Turkey
来源: 评论
Mathematical representation of emotion using multimodal recognition model with deep multitask learning
IEEJ Transactions on Electronics, Information and Systems
收藏 引用
IEEJ Transactions on Electronics, Information and Systems 2020年 第12期140卷 1343-1351页
作者: Harata, Seiichi Sakuma, Takuto Kato, Shohei Computer Science Program Department of Engineering Graduate School of Engineering Nagoya Institute of Technology Gokiso-cho Showa-ku Nagoya-city Aichi466-8555 Japan Frontier Research Institute for Information Science Nagoya Institute of Technology Gokiso-cho Showa-ku Nagoya-city Aichi466-8555 Japan
To emulate human emotions in robots, the mathematical representation of emotion is important for each component of affective computing, such as emotion recognition, generation, and expression. In a method that learns ... 详细信息
来源: 评论
CKD-TransBTS: Clinical Knowledge-Driven Hybrid Transformer with Modality-Correlated Cross-Attention for Brain Tumor Segmentation
arXiv
收藏 引用
arXiv 2022年
作者: Lin, Jianwei Lin, Jiatai Lu, Cheng Chen, Hao Lin, Huan Zhao, Bingchao Shi, Zhenwei Qiu, Bingjiang Pan, Xipeng Xu, Zeyan Huang, Biao Liang, Changhong Han, Guoqiang Liu, Zaiyi Han, Chu The School of Computer Science and Engineering South China University of Technology Guangzhou510006 China The Department of Radiology Guangdong Provincial People’s Hospital Guangdong Academy of Medical Sciences Guangzhou510080 China Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application Guangdong Provincial People’s Hospital Guangdong Academy of Medical Sciences Guangzhou510080 China The Department of Computer Science and Engineering The Hong Kong University of Science and Technology Clear Water Bay Hong Kong
Brain tumor segmentation (BTS) in magnetic resonance image (MRI) is crucial for brain tumor diagnosis, cancer management and research purposes. With the great success of the ten-year BraTS challenges as well as the ad... 详细信息
来源: 评论
Cyber-Physical Threat Identification for Smart Systems
Cyber-Physical Threat Identification for Smart Systems
收藏 引用
Communication, Computing and Energy Efficient Technologies (I3CEET), International Conference on
作者: Kumaran U J. Angeljulie Yogendra Kumar Madhav Dua Anita Soni Mohammed I. Habelalmateen Department of CSE Amrita School of Computing Amrita Vishwa Vidyapeetham Bengaluru India Department of Cyber Security Karpagam Academy of Higher Education Coimbatore Department of Electrical Engineering GLA University Mathura India Department of Computer Application Chandigarh Engineering College Chandigarh Group of Colleges Mohali Punjab India Department of Computer Science & Engineering IES Institute of Technology and Management IES University Bhopal M.P. India Department of Computers Techniques Engineering College of Technical Engineering The Islamic University Najaf Iraq Department of Computers Techniques Engineering College of Technical Engineering The Islamic University of Al Diwaniyah Al Diwaniyah Iraq
The constantly evolving nature of technology, the discovery of new vulnerabilities that are frequently disregarded, the variety of ways that users use their devices and perceive the threat of cyberattacks make today&#... 详细信息
来源: 评论