咨询与建议

限定检索结果

文献类型

  • 1,682 篇 会议
  • 1,064 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 2,756 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,773 篇 工学
    • 1,289 篇 计算机科学与技术...
    • 1,076 篇 软件工程
    • 446 篇 信息与通信工程
    • 263 篇 控制科学与工程
    • 255 篇 生物工程
    • 180 篇 电气工程
    • 179 篇 生物医学工程(可授...
    • 168 篇 光学工程
    • 142 篇 电子科学与技术(可...
    • 131 篇 机械工程
    • 106 篇 网络空间安全
    • 92 篇 化学工程与技术
    • 78 篇 交通运输工程
    • 73 篇 仪器科学与技术
    • 65 篇 安全科学与工程
    • 63 篇 动力工程及工程热...
  • 946 篇 理学
    • 466 篇 数学
    • 297 篇 物理学
    • 276 篇 生物学
    • 172 篇 统计学(可授理学、...
    • 95 篇 化学
    • 69 篇 系统科学
  • 511 篇 管理学
    • 308 篇 管理科学与工程(可...
    • 230 篇 图书情报与档案管...
    • 106 篇 工商管理
  • 144 篇 医学
    • 107 篇 临床医学
    • 104 篇 基础医学(可授医学...
    • 62 篇 公共卫生与预防医...
    • 62 篇 药学(可授医学、理...
  • 105 篇 法学
    • 92 篇 社会学
  • 45 篇 经济学
  • 39 篇 教育学
  • 34 篇 农学
  • 18 篇 文学
  • 8 篇 军事学
  • 7 篇 艺术学

主题

  • 97 篇 deep learning
  • 85 篇 accuracy
  • 72 篇 feature extracti...
  • 69 篇 training
  • 61 篇 machine learning
  • 57 篇 computational mo...
  • 54 篇 semantics
  • 51 篇 convolutional ne...
  • 48 篇 predictive model...
  • 47 篇 data models
  • 44 篇 real-time system...
  • 42 篇 artificial intel...
  • 40 篇 optimization
  • 35 篇 data mining
  • 30 篇 internet of thin...
  • 30 篇 forecasting
  • 29 篇 support vector m...
  • 29 篇 security
  • 28 篇 graph neural net...
  • 27 篇 education

机构

  • 70 篇 school of comput...
  • 58 篇 tianjin key labo...
  • 50 篇 department of co...
  • 48 篇 vivekananda glob...
  • 44 篇 west university ...
  • 44 篇 maharishi school...
  • 43 篇 department of mo...
  • 43 篇 infn e laborator...
  • 43 篇 faculty of scien...
  • 43 篇 department for p...
  • 43 篇 department of ph...
  • 43 篇 kirchhoff-instit...
  • 42 篇 department of ph...
  • 42 篇 research center ...
  • 40 篇 department of ph...
  • 40 篇 department of ph...
  • 40 篇 department physi...
  • 40 篇 deutsches elektr...
  • 40 篇 institute of phy...
  • 39 篇 ochanomizu unive...

作者

  • 43 篇 zhang yanning
  • 41 篇 xia yong
  • 37 篇 m. lu
  • 37 篇 liu qi
  • 35 篇 c. alexa
  • 35 篇 g. bella
  • 35 篇 d. calvet
  • 35 篇 c. amelung
  • 35 篇 a. grummer
  • 34 篇 j. m. izen
  • 34 篇 j. gao
  • 34 篇 j. strandberg
  • 34 篇 b. konya
  • 34 篇 f. pastore
  • 34 篇 chen enhong
  • 33 篇 s. barsov
  • 33 篇 n. orlando
  • 33 篇 y. tayalati
  • 33 篇 t. pham
  • 33 篇 g. spigo

语言

  • 2,504 篇 英文
  • 215 篇 其他
  • 40 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Application and Technology"
2756 条 记 录,以下是341-350 订阅
排序:
Solar Observation with the Fourier Transform *** Results of Solar Spectrum near the CO 4.66μm and Mg I 12.32μm
收藏 引用
Research in Astronomy and Astrophysics 2023年 第12期23卷 128-137页
作者: Xianyong Bai Zhiwei Feng Zhiyong Zhang Yuanyong Deng Xiaoming Zhu Kaifan Ji Song Feng Xiao Yang Yongliang Song National Astronomical Observatories Chinese Academy of SciencesBeijing 100101China School of Astronomy and Space Science University of Chinese Academy of SciencesBeijing 101408China Yunnan Observatories Chinese Academy of SciencesKunming 650011China Faculty of Information Engineering and Automation/Yunnan Key Laboratory of Computer Technology Application Kunming University of Science and TechnologyKunming 650500China
An infrared solar spectrum observed by ground-based telescopes is seriously affected by the background radiation both from the telescope and sky,relative to the visible *** accuracy is also influenced by the spectral ... 详细信息
来源: 评论
Supervised and Unsupervised Coupled Generative Adversarial Networks in Multivariate Time Series  4
Supervised and Unsupervised Coupled Generative Adversarial N...
收藏 引用
4th International Conference on Information Science, Parallel and Distributed Systems, ISPDS 2023
作者: Wang, Qinfen Li, Yifei Xia, Yong School of Computer Science and Engineering Northwestern Polytechnical University Natl. Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Xi'an710072 China
Generative adversarial networks (GAN) have been successful in demonstrating the efficiency of generative time series. In this paper, we proposed a novel end-to-end supervised and unsupervised coupled generative advers... 详细信息
来源: 评论
Long-Term and Short-Term Perception in Knowledge Tracing  1
收藏 引用
11th CCF Big Data Conference, BigData 2023
作者: Chen, Zihang Zhu, Mengxiao Wang, Fei Shen, Shuanghong Huang, Zhenya Liu, Qi Anhui Province Key Laboratory of Science Education and Communication Institute of Advanced Technology and School of Humanities and Social Sciences University of Science and Technology of China Hefei China Anhui Province Key Laboratory of Big Data Analysis and Application School of Data Science and School of Computer Science and Technology University of Science and Technology of China Hefei China
Knowledge Tracing (KT) is a fundamental task in contemporary intelligent educational systems, which tracks the knowledge states of the learners based on their response sequences. KT is crucial for the effectiveness of... 详细信息
来源: 评论
Rankings vs Realities: Exploring Competency Differences in Graduate Data Science Programs  53
Rankings vs Realities: Exploring Competency Differences in G...
收藏 引用
53rd IEEE ASEE Frontiers in Education International Conference, FIE 2023
作者: Li, Duo Milonas, Elizabeth Zhang, Qiping Shenyang Institute of Technology Department of Big Data Management and Application Fushun China Computer Systems Technology Brooklyn United States Palmer School of Library and Information Science Long Island University Brookville United States
Numerous educational institutions, including those specializing in computer science, engineering, business, and science, now offer graduate programs in data science. However, it remains uncertain whether the data scie... 详细信息
来源: 评论
Database Availability Security: Handling Denial of Service (DoS) Attacks
Database Availability Security: Handling Denial of Service (...
收藏 引用
International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)
作者: Jeffrey Surianto Irma Kartika Wairooy Sandy Wirananda Brilly Andro Makalew Computer Science Department School of Computer Science Jakarta Indonesia Computer Science Department Mobile Application & Technology Program Jakarta Indonesia
In the data based digital age, there are risks of attacks that cause denial of service (DoS) or distributed denial of service (DDoS) which pose threats to the security and availability of databases especially with tho... 详细信息
来源: 评论
HyperCalm Sketch: One-Pass Mining Periodic Batches in Data Streams  39
HyperCalm Sketch: One-Pass Mining Periodic Batches in Data S...
收藏 引用
39th IEEE International Conference on Data Engineering, ICDE 2023
作者: Liu, Zirui Kong, Chaozhe Yang, Kaicheng Yang, Tong Miao, Ruijie Chen, Qizhi Zhao, Yikai Tu, Yaofeng Cui, Bin Peking University School of Computer Science National Engineering Laboratory for Big Data Analysis Technology and Application Beijing China Peng Cheng Laboratory Shenzhen China Zte Corporation China
Batch is an important pattern in data streams, which refers to a group of identical items that arrive closely. We find that some special batches that arrive periodically are of great value. In this paper, we formally ... 详细信息
来源: 评论
GCFuzz: An Intelligent Method for Generating IoT Protocols Test Cases Using GAN with CVAE  7th
GCFuzz: An Intelligent Method for Generating IoT Protocols ...
收藏 引用
7th International Conference on Attacks and Defenses for Internet-of-Things, ADIoT 2024
作者: Zhong, Ming Zeng, Zisheng Guo, Yijia Zhao, Dandan Zhang, Bo Li, Shenghong Peng, Hao Ding, Zhiguo School of Computer Science and Technology Zhejiang Normal University Zhejiang Jinhua China Key Laboratory of Intelligent Educational Technology and Application in Zhejiang Normal University Jinhua321004 China School of Cyber Science and Engineering Shanghai Jiao Tong University Shanghai China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai200240 China
The importance of Internet of Things (IoT) systems security cannot be ignored, particularly in the realm of communication. IoT protocols serve as standards for communication and interaction among devices in IoT enviro... 详细信息
来源: 评论
WorkEv: Development and Evaluation of a Web Based Electronic Human Resource Management using Delphi Method  4
WorkEv: Development and Evaluation of a Web Based Electronic...
收藏 引用
4th International Conference on Cybernetics and Intelligent System, ICORIS 2022
作者: Niccosan Tommy, Ray Kurniawan, Christian Makalew, Brilly Andro Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Mobile Application & Technology Program School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
This research is aimed to develop and evaluate an Electronic Human Resource Management (E-HRM) system called WorkEv to assist in monitoring and improving employee's performance. The application was developed based... 详细信息
来源: 评论
Cooperative Carrier Aircraft Support Operation Scheduling via Multi-Agent Reinforcement Learning  24
Cooperative Carrier Aircraft Support Operation Scheduling vi...
收藏 引用
24th IEEE International Conference on Mobile Data Management, MDM 2023
作者: Hao, Hongjie Zhang, Xueqin Chi, Yuan Gao, Rongxin Xie, Anke Xu, Mingliang Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou China Beihang University Yunnan Innovation Institute Kunming China Yunnan Key Laboratory of Blockchain Application Technology Kunming China
Carrier Aircraft support operation is an important component of the carrier aviation support system, and its efficiency is closely related to the aircraft sortie rate. However, the carrier deck faces significant chall... 详细信息
来源: 评论
Advancing Intrusion Detection Systems Innovative Approaches for Prevention and Response
Advancing Intrusion Detection Systems Innovative Approaches ...
收藏 引用
2024 International Conference on Communication, computer Sciences and Engineering, IC3SE 2024
作者: Reddy, M. Siva Swetha Krishna, B.S.S. Murali Asha, V. Nijhawan, Ginni Rana, Ajay Jabbar, Ahmed Sabah Abed Al-Zahra Institute Of Aeronautical Engineering Department Of Computer Science And Engineering Telangana Hyderabad India Mlr Institute Of Technology Department Of Computer Science And Engineering Telangana Hyderabad India Computer Application New Horizon College Of Engineering Bangalore India Lovely Professional University Phagwara India Amity School Of Engineering And Technology Amity University Greater Noida India The Islamic University Medical Laboratory Technology Department Najaf Iraq
A group intruder detection system built on K-Nearest Neighbors, Decision Trees, Neural Networks, Support Vector Machines, and Random Forests is shown in this study. A thorough study on ablation shows how the algorithm... 详细信息
来源: 评论