咨询与建议

限定检索结果

文献类型

  • 6,207 篇 期刊文献
  • 6,064 篇 会议
  • 177 册 图书

馆藏范围

  • 12,448 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,665 篇 工学
    • 4,671 篇 计算机科学与技术...
    • 3,709 篇 软件工程
    • 1,503 篇 信息与通信工程
    • 1,245 篇 控制科学与工程
    • 868 篇 电气工程
    • 832 篇 生物工程
    • 780 篇 电子科学与技术(可...
    • 615 篇 生物医学工程(可授...
    • 558 篇 光学工程
    • 534 篇 机械工程
    • 426 篇 化学工程与技术
    • 406 篇 仪器科学与技术
    • 367 篇 动力工程及工程热...
    • 352 篇 材料科学与工程(可...
    • 313 篇 核科学与技术
    • 295 篇 力学(可授工学、理...
  • 5,906 篇 理学
    • 3,307 篇 数学
    • 1,892 篇 物理学
    • 983 篇 生物学
    • 980 篇 统计学(可授理学、...
    • 715 篇 系统科学
    • 480 篇 化学
    • 268 篇 地球物理学
  • 1,781 篇 管理学
    • 1,131 篇 管理科学与工程(可...
    • 698 篇 图书情报与档案管...
    • 520 篇 工商管理
  • 588 篇 医学
    • 491 篇 临床医学
    • 444 篇 基础医学(可授医学...
    • 273 篇 药学(可授医学、理...
  • 328 篇 法学
    • 275 篇 社会学
  • 219 篇 经济学
  • 148 篇 农学
  • 98 篇 教育学
  • 50 篇 文学
  • 31 篇 军事学
  • 21 篇 艺术学
  • 1 篇 哲学

主题

  • 279 篇 computer science
  • 242 篇 deep learning
  • 212 篇 mathematics
  • 208 篇 machine learning
  • 199 篇 computational mo...
  • 182 篇 feature extracti...
  • 168 篇 accuracy
  • 139 篇 optimization
  • 126 篇 educational inst...
  • 124 篇 predictive model...
  • 114 篇 neural networks
  • 106 篇 support vector m...
  • 105 篇 data mining
  • 104 篇 artificial intel...
  • 101 篇 training
  • 96 篇 image segmentati...
  • 95 篇 internet of thin...
  • 87 篇 decision making
  • 85 篇 authentication
  • 80 篇 semantics

机构

  • 413 篇 department for p...
  • 409 篇 faculty of scien...
  • 396 篇 department of ph...
  • 396 篇 kirchhoff-instit...
  • 387 篇 department of ph...
  • 385 篇 department of ph...
  • 358 篇 fakultät für phy...
  • 345 篇 institute of phy...
  • 326 篇 institute of phy...
  • 309 篇 department of ph...
  • 281 篇 department of ph...
  • 277 篇 instituto de fís...
  • 272 篇 department of ph...
  • 271 篇 graduate school ...
  • 270 篇 universidade fed...
  • 268 篇 ictp trieste
  • 254 篇 department of ph...
  • 251 篇 department of ph...
  • 249 篇 nikhef national ...
  • 248 篇 department of ph...

作者

  • 333 篇 c. alexa
  • 333 篇 g. bella
  • 333 篇 d. calvet
  • 333 篇 c. amelung
  • 331 篇 j. strandberg
  • 331 篇 g. spigo
  • 330 篇 j. m. izen
  • 330 篇 f. siegert
  • 322 篇 r. ströhmer
  • 322 篇 m. rijssenbeek
  • 322 篇 s. jin
  • 322 篇 g. gaudio
  • 321 篇 s. mohapatra
  • 307 篇 s. guindon
  • 305 篇 y. tayalati
  • 293 篇 a. kaczmarska
  • 287 篇 m. klein
  • 281 篇 j. schaarschmidt
  • 263 篇 a. d. pilkington
  • 262 篇 f. pastore

语言

  • 10,784 篇 英文
  • 1,530 篇 其他
  • 138 篇 中文
  • 2 篇 西班牙文
  • 2 篇 日文
  • 2 篇 俄文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science Engineering and Mathematics"
12448 条 记 录,以下是121-130 订阅
排序:
Applications of Topological Data Analysis with Morphology Operators on Hypergraphs
Applications of Topological Data Analysis with Morphology Op...
收藏 引用
International Conference on mathematics of Intelligent Computing and Data science, ICMICDS 2022
作者: Ramkumar, P.B. Dhanya, P.M. Department of Mathematics Rajagiri School of Engineering and Technology Kerala Kakkanad India Department of Computer Science and Business Systems Rajagiri School of Engineering and Technology Kerala Kakkanad India
A hypergraph is a type of graph, H=(V,E) where V  is the set of nodes and E is the set of hyperedges;where one edge consists of may nodes. Morphological operators are nonlinear operators which can be applied on images... 详细信息
来源: 评论
An Explainable Recommendation Method for Artificial Intelligence of Things Based on Reinforcement Learning With Knowledge Graph Inference
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 1980-1991页
作者: Chen, Yunliang Li, Yuqi Huang, Xiaohui Wang, Yuewei Zhu, Guishui Min, Geyong Li, Jianxin China University of Geosciences School of Computer Science Wuhan430070 China University of Exeter College of Engineering Mathematics and Physical Sciences Department of Computer Science ExeterEX4 4QF United Kingdom Deakin University School of Information Technology GeelongVIC3220 Australia
In the realm of consumer electronics, the integration of knowledge graphs with causal inference significantly advances recommendation systems within the Artificial Intelligence of Things (AIoT). This paper introduces ... 详细信息
来源: 评论
Fuzzing:Progress,Challenges,and Perspectives
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1-29页
作者: Zhenhua Yu Zhengqi Liu Xuya Cong Xiaobo Li Li Yin Institute of Systems Security and Control College of Computer Science and TechnologyXi'an University of Science and TechnologyXi'an710054China School of Mathematics and Information Science Baoji University of Arts and SciencesBaoji721013China Institute of Systems Engineering Macao University of Science and TechnologyTaipaMacaoChina
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mi... 详细信息
来源: 评论
Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology
收藏 引用
computer Modeling in engineering & sciences 2024年 第6期139卷 3387-3415页
作者: Nazik Alturki Raed Alharthi Muhammad Umer Oumaima Saidani Amal Alshardan Reemah M.Alhebshi Shtwai Alsubai Ali Kashif Bashir Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia Department of Computer Science and Engineering University of Hafr Al-BatinHafar Al-BatinSaudi Arabia Department of Computer Science&Information Technology The Islamia University of BahawalpurBahawalpurPakistan Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-KharjSaudi Arabia Department of Computing and Mathematics Manchester Metropolitan UniversityManchesterUK Woxsen School of Business Woxsen UniversityHyderabadIndia Department of Computer Science and Mathematics Lebanese American UniversityBeirutLebanon
The concept of smart houses has grown in prominence in recent *** challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device **... 详细信息
来源: 评论
Internships' Impact on Recognition for First-Generation and/or Low-Income Students  129
Internships' Impact on Recognition for First-Generation and/...
收藏 引用
129th ASEE Annual Conference and Exposition: Excellence Through Diversity, ASEE 2022
作者: Yang, Jerry Austin Towles, Joseph Sheppard, Sheri Atwood, Sara A. School of Engineering Mathematics and Computer Science Phy
This qualitative research paper explores how internship experiences impact the recognition component of engineering professional identity for first-generation, low-income (FGLI) engineering students, drawing on the pe... 详细信息
来源: 评论
Simulation of Social Media-Driven Bubble Formation in Financial Markets using an Agent-Based Model with Hierarchical Influence Network  36
Simulation of Social Media-Driven Bubble Formation in Financ...
收藏 引用
36th European Modeling and Simulation Symposium, EMSS 2024, Held at the 21st International Multidisciplinary Modeling and Simulation Multiconference, I3M 2024
作者: Bohorquez, Gonzalo Cartlidge, John School of Computer Science University of Bristol Bristol United Kingdom School of Engineering Mathematics and Technology University of Bristol Bristol United Kingdom
We propose that a tree-like hierarchical structure represents a simple and effective way to model the emergent behaviour of financial markets, especially markets where there exists a pronounced intersection between so... 详细信息
来源: 评论
Image Hiding with High Robustness Based on Dynamic Region Attention in the Wavelet Domain
收藏 引用
computer Modeling in engineering & sciences 2024年 第10期141卷 847-869页
作者: Zengxiang Li Yongchong Wu Alanoud Al Mazroa Donghua Jiang Jianhua Wu Xishun Zhu Department of Information Engineering Gongqing CollegeNanchang UniversityJiujiang332020China School of Information Engineering Gongqing Institute of Science and TechnologyJiujiang332020China Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia School of Computer Science and Engineering Sun Yat-sen UniversityGuangzhou511400China School of Information Engineering Nanchang UniversityNanchang330031China School of Mathematics and Statistics Hainan Normal UniversityHaikou571158China
Hidden capacity,concealment,security,and robustness are essential indicators of hiding ***,hiding algorithms tend to focus on algorithmic capacity,concealment,and security but often overlook the robustness of the *** ... 详细信息
来源: 评论
Dual-task enhanced global–local temporal–spatial network for depression recognition from facial videos
Dual-task enhanced global–local temporal–spatial network f...
收藏 引用
作者: Shen, Jinjie Wu, Jing Xing, Yan Hu, Min Wang, Xiaohua Li, Daolun Zha, Wenshu School of Mathematics Hefei University of Technology Hefei China School of Computer Science and Information Engineering Hefei University of Technology Heifei China
In previous studies on facial video depression recognition, although convolutional neural network (CNN) has become a mainstream method, its performance still has room for improvement due to the insufficient extraction... 详细信息
来源: 评论
TSFeatLIME: An Online User Study in Enhancing Explainability in Univariate Time Series Forecasting  36
TSFeatLIME: An Online User Study in Enhancing Explainability...
收藏 引用
36th IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2024
作者: Ma, Hongnan McAreavey, Kevin Liu, Weiru School of Computer Science University of Bristol Bristol United Kingdom School of Engineering Mathematics and Technology University of Bristol Bristol United Kingdom
Time series forecasting, while vital in various applications, often employs complex models that are difficult for humans to understand. Effective explainable AI techniques are crucial to bridging the gap between model... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论