咨询与建议

限定检索结果

文献类型

  • 6,029 篇 期刊文献
  • 5,211 篇 会议
  • 49 册 图书

馆藏范围

  • 11,289 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,229 篇 工学
    • 5,376 篇 计算机科学与技术...
    • 4,519 篇 软件工程
    • 1,773 篇 信息与通信工程
    • 1,136 篇 生物工程
    • 914 篇 电气工程
    • 903 篇 控制科学与工程
    • 721 篇 生物医学工程(可授...
    • 651 篇 光学工程
    • 618 篇 电子科学与技术(可...
    • 403 篇 机械工程
    • 362 篇 化学工程与技术
    • 283 篇 动力工程及工程热...
    • 280 篇 交通运输工程
    • 253 篇 仪器科学与技术
    • 247 篇 网络空间安全
    • 238 篇 安全科学与工程
  • 4,278 篇 理学
    • 2,132 篇 数学
    • 1,301 篇 生物学
    • 1,176 篇 物理学
    • 799 篇 统计学(可授理学、...
    • 442 篇 化学
    • 385 篇 系统科学
  • 2,085 篇 管理学
    • 1,214 篇 管理科学与工程(可...
    • 966 篇 图书情报与档案管...
    • 587 篇 工商管理
  • 698 篇 医学
    • 577 篇 临床医学
    • 502 篇 基础医学(可授医学...
    • 295 篇 药学(可授医学、理...
    • 286 篇 公共卫生与预防医...
  • 356 篇 法学
    • 301 篇 社会学
  • 231 篇 经济学
  • 165 篇 农学
  • 115 篇 教育学
  • 44 篇 文学
  • 21 篇 军事学
  • 16 篇 艺术学
  • 1 篇 哲学

主题

  • 372 篇 deep learning
  • 300 篇 feature extracti...
  • 270 篇 accuracy
  • 246 篇 semantics
  • 238 篇 machine learning
  • 238 篇 training
  • 213 篇 computational mo...
  • 179 篇 predictive model...
  • 155 篇 internet of thin...
  • 146 篇 real-time system...
  • 138 篇 optimization
  • 136 篇 data models
  • 132 篇 data mining
  • 123 篇 reinforcement le...
  • 120 篇 convolutional ne...
  • 115 篇 neural networks
  • 106 篇 image segmentati...
  • 105 篇 convolution
  • 103 篇 object detection
  • 102 篇 artificial intel...

机构

  • 426 篇 department of ph...
  • 403 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 387 篇 h.h. wills physi...
  • 360 篇 van swinderen in...
  • 334 篇 yandex school of...
  • 309 篇 school of physic...
  • 308 篇 cavendish labora...
  • 308 篇 university of ch...
  • 293 篇 nikhef national ...
  • 289 篇 center for high ...
  • 288 篇 imperial college...
  • 286 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 244 篇 bellee v.
  • 241 篇 beiter a.
  • 222 篇 casse g.
  • 216 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 212 篇 borsato m.
  • 212 篇 betancourt c.
  • 208 篇 brundu d.
  • 201 篇 bediaga i.
  • 195 篇 amato s.
  • 185 篇 baryshnikov f.
  • 179 篇 boettcher t.
  • 160 篇 braun s.
  • 158 篇 baker s.
  • 158 篇 borisyak m.
  • 146 篇 bizzeti a.
  • 145 篇 bjørn m.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery

语言

  • 10,445 篇 英文
  • 767 篇 其他
  • 83 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer and Data Engineering"
11289 条 记 录,以下是271-280 订阅
排序:
Forensic Investigation of Malicious Activities in Digital Environments  4
Forensic Investigation of Malicious Activities in Digital En...
收藏 引用
4th IEEE International Conference on data engineering and Communication Systems, ICDECS 2024
作者: Pasumpon Pandian, A. Anakath, A.S. Kannadasan, R. Ravikumar, K. Abdul Kareem, D. Care College of Engineering Department of Computer Science and Engineering Trichy India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India School of Computer Science and Engineering Department of Software Systems Tamil Nadu Vellore India Rrase College of Engineering Padappai Department of Computer Science & Engineering Chennai India Grt Institute of Engineering and Technology Department of Artificial Intelligence and Data Science Tamil Nadu Tiruttani India
Several digital dangers were investigated. Malware dominated analysis with 45 attacks. We found 30 phishing attacks. 22 data breaches, 15 cyber espionage, 18 identity theft. This indicates the kind and frequency of ha... 详细信息
来源: 评论
BDGAN: Boundary and Diversity-aware Generative Adversarial Network for Imbalanced Medical Image Augmentation
BDGAN: Boundary and Diversity-aware Generative Adversarial N...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Ding, Hongwei Tao, Qi Huang, Nana School of Computer and Communication Engineering Northeastern University Qinhuangdao Qinhuangdao China School of Data Science & Engineering South China Normal University Guangzhou China School of Cyberspace Hangzhou Dianzi University Hangzhou China
Current deep learning-based medical image classification methods face challenges in effectively learning correct classification boundaries when dealing with imbalanced data. Traditional data augmentation methods often... 详细信息
来源: 评论
Fortifying Smart Grids: A Holistic Assessment Strategy against Cyber Attacks and Physical Threats for Intelligent Electronic Devices
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2579-2609页
作者: Yangrong Chen June Li Yu Xia Ruiwen Zhang Lingling Li Xiaoyu Li Lin Ge School of Computer Science Zhengzhou University of AeronauticsZhengzhou450046China Henan Xin’an Century Technology Co. Ltd.Henan Data Security Engineering Technology Research CenterZhengzhou450046China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of EducationSchool of Cyber Science and EngineeringWuhan UniversityWuhan430072China
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control *** the context of the heightened security c... 详细信息
来源: 评论
Feasibility analysis for conversion of existing traditional watermills in Western Himalayan region of India to micro-hydropower plants using a low head Archimedes screw turbine for rural electrification
收藏 引用
International Journal of Ambient Energy 2022年 第1期43卷 7463-7473页
作者: Kashyap, Kamal Thakur, Robin Kumar, Raj Kumar, Sunil School of Mechanical Engineering Bahra University Solan India School of Mechanical & Civil Engineering Shoolini University Solan India Yogananda School of AI Computer & Data Sciences Shoolini University Solan India
Traditional watermills are being used by the people of hilly terrains of Western Himalayan region from centuries for grinding grains. Using these watermills for generating electricity could be an effective and sustain... 详细信息
来源: 评论
Application of improved virtual sample and sparse representation in face recognition
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第4期8卷 1391-1402页
作者: Yongjun Zhang Zewei Wang Xuexue Zhang Zhongwei Cui Bob Zhang Jinrong Cui Lamin LJanneh College of Computer Science and Technology Guizhou UniversityGuiyangChina Big Data Science and Intelligent Engineering Research Institute Guizhou Education UniversityGuiyangChina School of Mathematics and Big Data Guizhou Education UniversityGuiyangChina Department of Computer and Information Science University of MacaoAvenida da UniversidadeTaipaMacaoChina School of Mathematics and Information South China Agricultural UniversityGuangzhouChina
Sparse representation plays an important role in the research of face *** a deformable sample classification task,face recognition is often used to test the performance of classification *** face recognition,differenc... 详细信息
来源: 评论
Real-Time Road Damage Detection Using an Optimized YOLOv9s-Fusion in IoT Infrastructure
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17649-17660页
作者: Waseem Khan, Muhammad Obaidat, Mohammad S. Mahmood, Khalid Sadoun, Balqies Sanaullah Badar, Hafiz Muhammad Gao, Wu Center for Bio-inspired System-on-Chip School of Computer Science Northwestern Polytechnical University Xi’an China Sahiwal Campus Pakistan The King Abdullah II School of Information Technology The University of Jordan Amman11942 Jordan The School of Communication and Computing Engineering University of Science and Technology Beijing Beijing100083 China The Amity School of Engineering and Technology Amity University Uttar Pradesh Noida201301 India The Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Douliu Yunlin64002 Taiwan School of Computer and Information Engineering Henan University Kaifeng475001 China The College of Engineering Al-Balqa’ Applied University Al-Salt19117 Jordan
In IoT-enabled smart infrastructure, accurate and real-time road damage detection is crucial for enhancing road safety and optimizing maintenance processes. However, detecting road damage in complex and dynamic enviro... 详细信息
来源: 评论
Research on a Technology of Mail Anti-virus Gateway for Industrial Internet
Research on a Technology of Mail Anti-virus Gateway for Indu...
收藏 引用
2023 IEEE International Conference on Image Processing and computer Applications, ICIPCA 2023
作者: Wu, Yuhong Lv, Yunshan Zhang, Ling School of Big Data & Computer Science Engineering Chongqing College of Mobile Communication Key Laboratory of Public Big Data Security Technology Chongqing China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China
With the rapid rise of the Industrial Internet, emails that convey a large amount of information require a strong network security environment. Aiming at the increasingly complex mail virus prevention and control work... 详细信息
来源: 评论
On convergence of covariance matrix of empirical Bayes hyper-parameter estimator
收藏 引用
Control Theory and Technology 2024年 第2期22卷 149-162页
作者: Yue Ju Biqiang Mu Tianshi Chen School of Data Science and Shenzhen Research Institute of Big Data The Chinese University of Hong KongShenzhenShenzhen518172GuangdongChina Division of Decision and Control Systems School of Electrical Engineering and Computer ScienceKTH Royal Institute of Technology10044StockholmSweden Key Laboratory of Systems and Control Institute of Systems ScienceAcademy of Mathematics and System ScienceChinese Academy of SciencesBeijing100190China
Regularized system identification has become the research frontier of system identification in the past *** related core subject is to study the convergence properties of various hyper-parameter estimators as the samp... 详细信息
来源: 评论
Secret Sharing Based Key Agreement Protocol for Body Area Networks  18th
Secret Sharing Based Key Agreement Protocol for Body Area N...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Sheng, Weihong Cai, Bin Hu, Chunqiang Li, Ruinian School of Big Data and Software Engineering Chongqing University Chongqing China Computer Science Department Bowling Green State University Bowling Green United States
In order to provide more comprehensive medical services and personalized health monitoring according to individual needs, Body Area Networks (BANs) have been extensively studied by many researchers. As BANs involve th... 详细信息
来源: 评论
Hierarchical vectorization for facial images
收藏 引用
Computational Visual Media 2024年 第1期10卷 97-118页
作者: Qian Fu Linlin Liu Fei Hou Ying He School of Computer Science and Engineering Nanyang Technological University639798SingaporeSingapore Data61 Commonwealth Scientific and Industrial Research OrganisationSydney2015Australia Interdisciplinary Graduate School Nanyang Technological University and Alibaba Group639798SingaporeSingapore State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing100190China University of Chinese Academy of Sciences Beijing100049China
The explosive growth of social media means portrait editing and retouching are in high *** portraits are commonly captured and stored as raster images,editing raster images is non-trivial and requires the user to be h... 详细信息
来源: 评论