咨询与建议

限定检索结果

文献类型

  • 51,369 篇 会议
  • 32,218 篇 期刊文献
  • 898 册 图书
  • 10 篇 学位论文

馆藏范围

  • 84,495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52,936 篇 工学
    • 35,483 篇 计算机科学与技术...
    • 28,702 篇 软件工程
    • 13,136 篇 信息与通信工程
    • 8,677 篇 控制科学与工程
    • 6,355 篇 电气工程
    • 6,237 篇 电子科学与技术(可...
    • 5,714 篇 生物工程
    • 4,172 篇 机械工程
    • 3,881 篇 生物医学工程(可授...
    • 3,838 篇 光学工程
    • 2,964 篇 仪器科学与技术
    • 2,506 篇 化学工程与技术
    • 2,442 篇 动力工程及工程热...
    • 1,988 篇 交通运输工程
    • 1,876 篇 安全科学与工程
    • 1,765 篇 网络空间安全
    • 1,708 篇 材料科学与工程(可...
  • 28,402 篇 理学
    • 15,180 篇 数学
    • 7,902 篇 物理学
    • 6,436 篇 生物学
    • 4,952 篇 统计学(可授理学、...
    • 3,424 篇 系统科学
    • 2,677 篇 化学
  • 14,445 篇 管理学
    • 9,024 篇 管理科学与工程(可...
    • 5,986 篇 图书情报与档案管...
    • 3,965 篇 工商管理
  • 3,834 篇 医学
    • 3,154 篇 临床医学
    • 2,752 篇 基础医学(可授医学...
    • 1,651 篇 药学(可授医学、理...
  • 2,319 篇 法学
    • 1,912 篇 社会学
  • 1,506 篇 经济学
  • 998 篇 教育学
  • 938 篇 农学
  • 323 篇 文学
  • 233 篇 军事学
  • 183 篇 艺术学
  • 17 篇 哲学
  • 12 篇 历史学

主题

  • 1,942 篇 computer science
  • 1,870 篇 feature extracti...
  • 1,551 篇 deep learning
  • 1,507 篇 computational mo...
  • 1,497 篇 accuracy
  • 1,431 篇 training
  • 1,309 篇 machine learning
  • 1,112 篇 data mining
  • 1,105 篇 optimization
  • 995 篇 semantics
  • 930 篇 artificial intel...
  • 908 篇 educational inst...
  • 889 篇 predictive model...
  • 788 篇 neural networks
  • 779 篇 internet of thin...
  • 707 篇 support vector m...
  • 676 篇 wireless sensor ...
  • 672 篇 data models
  • 631 篇 real-time system...
  • 628 篇 security

机构

  • 694 篇 school of comput...
  • 544 篇 school of comput...
  • 475 篇 maharishi school...
  • 475 篇 school of inform...
  • 399 篇 school of comput...
  • 276 篇 department of ph...
  • 269 篇 school of comput...
  • 258 篇 faculté des scie...
  • 249 篇 department of ph...
  • 246 篇 school of comput...
  • 233 篇 school of comput...
  • 222 篇 department of ph...
  • 219 篇 school of comput...
  • 218 篇 physics division...
  • 217 篇 faculty of scien...
  • 199 篇 department of ph...
  • 185 篇 department of ph...
  • 184 篇 departamento de ...
  • 169 篇 school of comput...
  • 164 篇 school of comput...

作者

  • 289 篇 niyato dusit
  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 264 篇 g. spigo
  • 259 篇 h. a. gordon
  • 257 篇 f. siegert
  • 255 篇 a. c. könig
  • 250 篇 m. klein
  • 247 篇 r. ströhmer
  • 242 篇 y. tayalati
  • 237 篇 h. sakamoto
  • 215 篇 m. rijssenbeek
  • 201 篇 f. pastore
  • 201 篇 n. orlando
  • 195 篇 d. guest
  • 194 篇 s. jin

语言

  • 73,729 篇 英文
  • 9,333 篇 其他
  • 1,360 篇 中文
  • 169 篇 日文
  • 22 篇 德文
  • 14 篇 法文
  • 7 篇 朝鲜文
  • 5 篇 斯洛文尼亚文
  • 2 篇 俄文
  • 1 篇 捷克文
  • 1 篇 西班牙文
检索条件"机构=School of Computer Science and Engineering and Information Systems"
84495 条 记 录,以下是4441-4450 订阅
排序:
Efficient Overshadowed Entity Disambiguation by Mitigating Shortcut Learning
Efficient Overshadowed Entity Disambiguation by Mitigating S...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Tasawong, Panuthep Limkonchotiwat, Peerat Manakul, Potsawee Udomcharoenchaikit, Can Chuangsuwanich, Ekapol Nutanong, Sarana School of Information Science and Technology VISTEC Thailand AI Singapore Singapore SCB 10X Thailand Department of Computer Engineering Chulalongkorn University Thailand
Entity disambiguation (ED) is crucial in natural language processing (NLP) for tasks such as question-answering and information extraction. A major challenge in ED is handling overshadowed entities-uncommon entities s... 详细信息
来源: 评论
Ensemble Text Classification with TF-IDF Vectorization for Hate Speech Detection in Social Media
Ensemble Text Classification with TF-IDF Vectorization for H...
收藏 引用
2023 International Conference on System, Computation, Automation and Networking, ICSCAN 2023
作者: Sathishkumar, R. Karthikeyan, T. Praveen, Kumar P Shamsundar, S.M. Manakula Vinayagar Institute of Technology Department of Computer Science and Engineering Puducherry India Sri Manakula Vinayagar Engineering College Department of Computer Science and Business Systems Puducherry India Sri Manakula Vinayagar Engineering College Department of Information Technology Puducherry India
The development of artificial intelligence (AI) has changed how hate speech is detected. In hate speech identification using machine learning, a number of methods are used to automatically find text that uses vocabula... 详细信息
来源: 评论
Character Recognition System Based on Depth Residual Network and YOLO V2  3
Character Recognition System Based on Depth Residual Network...
收藏 引用
3rd International Conference on Artificial Intelligence, Automation, and High-Performance Computing, AIAHPC 2023
作者: Li, Fulin Wu, Huanqin Nie, Jun Cao, Hanhua Computer College Guangdong University of Science and Technology Dongguan China School of Information and Intelligent Engineering Guangzhou Xinhua University China
Improve capitation accuracy by residual network and multiscale image training, There are two methods to detect caphead characteristics, Previously based on pre-described head characteristics, And methods based on the ... 详细信息
来源: 评论
An Adaptive Density Spatial Clustering Algorithm Based on Tuna Swarm Optimization for Image Segmentation
An Adaptive Density Spatial Clustering Algorithm Based on Tu...
收藏 引用
2022 International Conference on Electronic information engineering and computer science, EIECS 2022
作者: Zhou, Wei Wang, Limin Han, Xuming Wang, Yizhang School of Computer Science and Technology Changchun University of Science and Technology Changchun China School of Information Guangdong University of Finance & Economics Guangzhou China College of Information Science and Technology Jinan University Guangzhou China College of Information Engineering Yangzhou University Yangzhou China
The density-based spatial clustering of applications with noise (DBSCAN) method is exceptionally sensitive to the selection of parameters, making it difficult to obtain more accurate clustering results. To solve the a... 详细信息
来源: 评论
Exploratory Research on Blockchain-based Lost and Found Platform  7
Exploratory Research on Blockchain-based Lost and Found Plat...
收藏 引用
7th International Conference on Intelligent Informatics and Biomedical sciences, ICIIBMS 2022
作者: Xue, Qingshui Ma, Haifeng Sun, Chenxi Shanghai Institute of Technology School of Computer Science and Information Engineering Shanghai China
The comprehensive popularity of the Internet has gradually made it possible for blockchain technology to be applied to different industry sectors. The use of blockchain technology in lost and found platforms is conduc... 详细信息
来源: 评论
Deep Intra-Class Similarity Measured Semi-Supervised Learning  7
Deep Intra-Class Similarity Measured Semi-Supervised Learnin...
收藏 引用
7th International Conference on Intelligent Computing and Signal Processing, ICSP 2022
作者: Yang, Yang Hefei University of Technology School of Computer Science and Information Engineering Hefei China
Recently, how to handle the situation where only a few samples in the dataset are labeled has become a hot academic topic. Semi-Supervised Learning (SSL) has shown its great capacity and potential in this topic. Howev... 详细信息
来源: 评论
Deep Reinforcement Learning for Addressing Disruptions in Traffic Light Control
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2225-2247页
作者: Faizan Rasheed Kok-Lim Alvin Yau Rafidah Md Noor Yung-Wey Chong School of Engineering and Computer Science University of HertfordshireHatfieldAL109ABUK Department of Computing and Information Systems Sunway UniversitySubang Jaya47500Malaysia Faculty of Computer Science and Information Technology University of MalayaKuala Lumpur50603Malaysia National Advanced IPv6 Centre Universiti Sains MalaysiaUSMPenang11800Malaysia
This paper investigates the use of multi-agent deep Q-network(MADQN)to address the curse of dimensionality issue occurred in the traditional multi-agent reinforcement learning(MARL)*** proposed MADQN is applied to tra... 详细信息
来源: 评论
Quantum Annealing-Based Sum Rate Maximization for Multi-UAV-Aided Wireless Networks
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21225-21239页
作者: Jeong, Seon-Geun Duc, Pham Dang Anh Do, Quang Vinh Noh, Dae-Il Tung, Nguyen Xuan Chien, Trinh Van Pham, Quoc-Viet Hasegawa, Mikio Sekiya, Hiroo Hwang, Won-Joo Department of Information Convergence Engineering Pusan National University Pusan National University Busan46241 Korea Republic of Wireless Communications Research Group Faculty of Electrical and Electronics Engineering Ton Duc Thang University Ho Chi Minh City Viet Nam Graduate School of Engineering Chiba University Chiba263-8522 Japan Hanoi100000 Viet Nam School of Computer Science and Statistics Trinity College Dublin DublinD02PN40 Ireland Department of Electrical Engineering Tokyo University of Science Tokyo162-8601 Japan School of Computer Science and Engineering Center for Artificial Intelligence Research Pusan National University Busan46241 Korea Republic of
In wireless communication networks, it is difficult to solve many NP-hard problems owing to computational complexity and high cost. Recently, quantum annealing (QA) based on quantum physics was introduced as a key ena... 详细信息
来源: 评论
Design and Implementation of the Crib Monitoring System
Design and Implementation of the Crib Monitoring System
收藏 引用
2023 International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2023
作者: Hu, ZhiJie Chang, Chih-Yung Shen, RuiBing Wu, Shih-Jung Hou, Di Xi'an Eurasia University School of Information Engineering Xi'an China Tamkang University Dept. of Computer Science and Information Engineering Taiwan Xi'an ShiYou University Dept. of Electronic Engineering China
This paper designs a crib monitoring system based on the STM32 microcontroller. The system uses temperature and humidity sensors to collect the ambient temperature and humidity. The microcontroller processes and analy... 详细信息
来源: 评论
CPABE Scheme with Real-time Changes of User Permissions  7
CPABE Scheme with Real-time Changes of User Permissions
收藏 引用
7th International Conference on Intelligent Informatics and Biomedical sciences, ICIIBMS 2022
作者: Xue, Qingshui Ma, Haifeng Shi, Xuelei Xue, Zhen Shanghai Institute of Technology School of Computer Science & Information Engineering Shanghai China
The problem of attribute revocation exists in attribute encryption schemes, and with attribute revocation, user permissions will change accordingly. Aiming at the problem of user permissions and shared data verificati... 详细信息
来源: 评论