咨询与建议

限定检索结果

文献类型

  • 5,987 篇 期刊文献
  • 5,170 篇 会议
  • 49 册 图书

馆藏范围

  • 11,206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,206 篇 工学
    • 5,360 篇 计算机科学与技术...
    • 4,518 篇 软件工程
    • 1,773 篇 信息与通信工程
    • 1,136 篇 生物工程
    • 908 篇 电气工程
    • 903 篇 控制科学与工程
    • 720 篇 生物医学工程(可授...
    • 651 篇 光学工程
    • 619 篇 电子科学与技术(可...
    • 403 篇 机械工程
    • 362 篇 化学工程与技术
    • 281 篇 动力工程及工程热...
    • 280 篇 交通运输工程
    • 253 篇 仪器科学与技术
    • 249 篇 网络空间安全
    • 238 篇 安全科学与工程
  • 4,274 篇 理学
    • 2,131 篇 数学
    • 1,299 篇 生物学
    • 1,176 篇 物理学
    • 799 篇 统计学(可授理学、...
    • 442 篇 化学
    • 384 篇 系统科学
  • 2,082 篇 管理学
    • 1,211 篇 管理科学与工程(可...
    • 966 篇 图书情报与档案管...
    • 587 篇 工商管理
  • 694 篇 医学
    • 575 篇 临床医学
    • 501 篇 基础医学(可授医学...
    • 295 篇 药学(可授医学、理...
    • 286 篇 公共卫生与预防医...
  • 356 篇 法学
    • 301 篇 社会学
  • 231 篇 经济学
  • 162 篇 农学
  • 115 篇 教育学
  • 44 篇 文学
  • 21 篇 军事学
  • 16 篇 艺术学
  • 1 篇 哲学

主题

  • 366 篇 deep learning
  • 295 篇 feature extracti...
  • 266 篇 accuracy
  • 241 篇 semantics
  • 238 篇 machine learning
  • 232 篇 training
  • 210 篇 computational mo...
  • 176 篇 predictive model...
  • 155 篇 internet of thin...
  • 143 篇 real-time system...
  • 135 篇 optimization
  • 135 篇 data models
  • 130 篇 data mining
  • 122 篇 reinforcement le...
  • 120 篇 convolutional ne...
  • 114 篇 neural networks
  • 104 篇 image segmentati...
  • 104 篇 convolution
  • 102 篇 object detection
  • 102 篇 artificial intel...

机构

  • 426 篇 department of ph...
  • 403 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 387 篇 h.h. wills physi...
  • 361 篇 van swinderen in...
  • 336 篇 yandex school of...
  • 309 篇 cavendish labora...
  • 309 篇 school of physic...
  • 308 篇 university of ch...
  • 293 篇 nikhef national ...
  • 289 篇 imperial college...
  • 289 篇 center for high ...
  • 286 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 244 篇 bellee v.
  • 241 篇 beiter a.
  • 222 篇 casse g.
  • 216 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 212 篇 borsato m.
  • 212 篇 betancourt c.
  • 208 篇 brundu d.
  • 201 篇 bediaga i.
  • 195 篇 amato s.
  • 187 篇 baryshnikov f.
  • 179 篇 boettcher t.
  • 161 篇 braun s.
  • 159 篇 baker s.
  • 159 篇 borisyak m.
  • 146 篇 bizzeti a.
  • 145 篇 bjørn m.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery

语言

  • 10,360 篇 英文
  • 767 篇 其他
  • 85 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=School of Computer and Data Engineering"
11206 条 记 录,以下是381-390 订阅
排序:
MG-Net: Learn to Customize QAOA with Circuit Depth Awareness  38
MG-Net: Learn to Customize QAOA with Circuit Depth Awareness
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Qian, Yang Wang, Xinbiao Du, Yuxuan Luo, Yong Tao, Dacheng School of Computer Science Faculty of Engineering University of Sydney NSW2008 Australia Institute of Artificial Intelligence School of Computer Science Wuhan University Wuhan China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore
Quantum Approximate Optimization Algorithm (QAOA) and its variants exhibit immense potential in tackling combinatorial optimization challenges. However, their practical realization confronts a dilemma: the requisite c...
来源: 评论
Ancient Character Recognition: A Novel Image dataset of Shui Manuscript Characters and Classification Model
收藏 引用
Chinese Journal of Electronics 2023年 第1期32卷 64-75页
作者: TANG Minli XIE Shaomin LIU Xiangrong Department of Computer Science and Technology School of Informatics Xiamen University School of Big Data Engineering KaiLi University Key Laboratory of Digital Protection and Intelligent Processing of Intangible Cultural Heritage of Fujian and Taiwan Ministry of Culture and Tourism Xiamen University
Shui manuscripts are part of the national intangible cultural heritage of China. Owing to the particularity of text reading, the level of informatization and intelligence in the protection of Shui manuscript culture i... 详细信息
来源: 评论
Securing 3D Point and Mesh Fog data Using Novel Chaotic Cat Map
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6703-6717页
作者: K.Priyadarsini Arun Kumar Sivaraman Abdul Quadir Md Areej Malibari Department of Data Science and Business Systems School of ComputingCollege of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathurChennai603203India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India Department of Industrial and Systems Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of *** major concerns in this domain are security and ***,attaining a reliable level of confidentiality in... 详细信息
来源: 评论
Cancer Diseases Diagnosis Using Deep Transfer Learning Architectures  1st
Cancer Diseases Diagnosis Using Deep Transfer Learning Archi...
收藏 引用
1st International Conference on Machine Intelligence and Emerging Technologies, MIET 2022
作者: Promy, Tania Ferdousey Joya, Nadia Islam Turna, Tasfia Haque Sukhi, Zinia Nawrin Ashraf, Faisal Bin Uddin, Jia Department of Computer Science and Engineering School of Data Science Brac University Dhaka Bangladesh AI and Big Data Department Endicott College Woosong University Daejeon Korea Republic of
Cancer is a lethal disease among the diseases in the world. It is clinically known as ‘Malignant Neoplasm’ which is a vast group of diseases that encompasses unmonitored cell expansion. It can begin anywhere in the ... 详细信息
来源: 评论
A Novel Hybrid Approach-Based on Heartbeat and Accelerometer Signals for Enhanced Security in WBSNs
收藏 引用
IEEE Sensors Journal 2025年 第6期25卷 10295-10308页
作者: Yan, Guixiang Zhang, Guanghe Liu, Fanghua Williams Samuel, Oluwarotimi Aborokbah, Majed Guo, Jiquan Zhu, Liqing Wei, Sikang Jiangxi Normal University School of Computer and Information Engineering Nanchang330022 China University of Derby School of Computing and Data Science Research Centre DerbyDE22 3AW United Kingdom INTI International University Faculty of Data Science and Information Technology Nilai71800 Malaysia University of Tabuk Faculty of Computers and Information Technology Tabuk71491 Saudi Arabia Jiangxi Normal University School of Digital Industry Shangrao334000 China
In wireless body sensor networks (WBSNs), ensuring secure and efficient key distribution is critical, particularly given the limited computational and energy resources of the sensors. Existing methods often struggle t... 详细信息
来源: 评论
Distributed control for spatially interconnected time-varying delay systems under input saturation
收藏 引用
Journal of the Franklin Institute 2023年 第4期360卷 3137-3161页
作者: Wang, Hui Xu, Huiling Chen, Xuefeng Ge, Shuzhi Sam Aliyun School of Big Data Changzhou University Jiangsu Changzhou213164 China School of Mathematics and Statistics Nanjing University of Science and Technology Jiangsu Nanjing210094 China Department of Electrical and Computer Engineering National University of Singapore 117576 Singapore
This paper presents the distributed control design for a class of spatially interconnected continuous-time time-varying delay (SICTD) systems under input saturation. A distributed controller and distributed anti-windu... 详细信息
来源: 评论
Blockchain-Based Cognitive Computing Model for data Security on a Cloud Platform
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3305-3323页
作者: Xiangmin Guo Guangjun Liang Jiayin Liu Xianyi Chen Department of Computer Information and Cyber Security Jiangsu Police InstituteNanjing210031China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Jiangsu Police InstituteNanjing210031China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China
Cloud storage is widely used by large companies to store vast amounts of data and files,offering flexibility,financial savings,and ***,information shoplifting poses significant threats,potentially leading to poor perf... 详细信息
来源: 评论
Uncertainty propagation in the internet of things
收藏 引用
Discover Internet of Things 2024年 第1期4卷 1-20页
作者: Pal, Shantanu Khalifa, Sara Miller, Dimity Dedeoglu, Volkan Dorri, Ali Ramachandran, Gowri Moghadam, Peyman Kusy, Brano Jurdak, Raja The School of Information Technology Faculty of Science Engineering and Built Environment Deakin University MelbourneVIC 3125 Australia The School of Information Systems Faculty of Science Queensland University of Technology BrisbaneQLD4000 Australia The School of Electrical Engineering and Robotics Faculty of Engineering Queensland University of Technology BrisbaneQLD4000 Australia The Distributed Sensing Systems Group Data61 CSIRO PullenvaleQLD 4069 Australia The School of Computer Science Faculty of Science Queensland University of Technology BrisbaneQLD 4000 Australia The CSIRO Robotics Data61 CSIRO PullenvaleQLD 4069 Australia
The Internet of Things (IoT) detects context through sensors capturing data from dynamic physical environments, in order to inform automation decisions within cyber physical systems (CPS). Diverse types of uncertainty... 详细信息
来源: 评论
Harnessing Medical Big data: Integrating Computational Insights for Enhanced Patient Outcomes  24
Harnessing Medical Big Data: Integrating Computational Insig...
收藏 引用
7th International Conference on Digital Medicine and Image Processing, DMIP 2024
作者: Syed Masood, Jafar Ali Ibrahim Vinayagam, Jai Kumar Onteru, Ranjit Kumar Kopparapu, Umamaheswararao Parabathini, Bulah Pushpa Rani Department of IoT School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore632014 India Centre for Big Data Analytics QIS College of Engineering and Technology Andhra Pradesh Ongole India
The rapid proliferation of medical big data has opened unprecedented opportunities for enhancing patient outcomes through advanced computational analysis. This paper explores the integration of big data analytics with... 详细信息
来源: 评论
Revolutionizing power line asset detection: A YOLOv8-Driven lightweight algorithm for UAV image recognition  4
Revolutionizing power line asset detection: A YOLOv8-Driven ...
收藏 引用
4th International Conference on computer Vision, Application, and Algorithm, CVAA 2024
作者: Liu, Chunyao Chen, Zhiyu Guo, Jianwei Liu, Gang School of Computer Science and Engineering Changchun University of Technology Changchun130012 China Jilin Province Data Service Industry Public Technology Research Centre Changchun130012 China
The maintenance and inspection of power lines is key to ensuring their normal operation and maintaining an uninterrupted power supply for various human activities. Traditional methods to detect power line assets usual... 详细信息
来源: 评论