咨询与建议

限定检索结果

文献类型

  • 14,710 篇 会议
  • 10,249 篇 期刊文献
  • 217 册 图书

馆藏范围

  • 25,176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,735 篇 工学
    • 10,478 篇 计算机科学与技术...
    • 8,513 篇 软件工程
    • 3,652 篇 信息与通信工程
    • 2,586 篇 控制科学与工程
    • 2,193 篇 电气工程
    • 1,886 篇 生物工程
    • 1,813 篇 电子科学与技术(可...
    • 1,435 篇 生物医学工程(可授...
    • 1,294 篇 光学工程
    • 1,209 篇 机械工程
    • 1,037 篇 化学工程与技术
    • 970 篇 动力工程及工程热...
    • 894 篇 仪器科学与技术
    • 765 篇 材料科学与工程(可...
    • 654 篇 网络空间安全
    • 644 篇 交通运输工程
    • 624 篇 安全科学与工程
  • 9,040 篇 理学
    • 4,352 篇 数学
    • 3,112 篇 物理学
    • 2,081 篇 生物学
    • 1,469 篇 统计学(可授理学、...
    • 1,091 篇 化学
    • 963 篇 系统科学
  • 4,127 篇 管理学
    • 2,608 篇 管理科学与工程(可...
    • 1,684 篇 图书情报与档案管...
    • 1,177 篇 工商管理
  • 1,429 篇 医学
    • 1,194 篇 临床医学
    • 1,066 篇 基础医学(可授医学...
    • 639 篇 公共卫生与预防医...
    • 626 篇 药学(可授医学、理...
  • 741 篇 法学
  • 490 篇 经济学
  • 388 篇 农学
  • 286 篇 教育学
  • 71 篇 文学
  • 50 篇 军事学
  • 50 篇 艺术学
  • 6 篇 哲学
  • 2 篇 历史学

主题

  • 654 篇 deep learning
  • 607 篇 accuracy
  • 435 篇 training
  • 433 篇 machine learning
  • 432 篇 feature extracti...
  • 402 篇 computational mo...
  • 369 篇 internet of thin...
  • 283 篇 predictive model...
  • 277 篇 real-time system...
  • 272 篇 support vector m...
  • 234 篇 optimization
  • 231 篇 data models
  • 203 篇 neural networks
  • 199 篇 convolutional ne...
  • 193 篇 image segmentati...
  • 192 篇 reliability
  • 176 篇 semantics
  • 173 篇 artificial intel...
  • 169 篇 computer science
  • 169 篇 computer archite...

机构

  • 242 篇 institute of com...
  • 182 篇 university of ch...
  • 125 篇 university of sc...
  • 112 篇 school of comput...
  • 96 篇 department of co...
  • 95 篇 national enginee...
  • 93 篇 school of comput...
  • 91 篇 tianfu cosmic ra...
  • 87 篇 department of ph...
  • 86 篇 north-west unive...
  • 80 篇 infn sezione di ...
  • 80 篇 department of co...
  • 79 篇 infn sezione di ...
  • 79 篇 hebei normal uni...
  • 77 篇 institut univers...
  • 74 篇 state key labora...
  • 72 篇 yunnan observato...
  • 71 篇 national centre ...
  • 69 篇 faculty of compu...
  • 66 篇 università di ca...

作者

  • 134 篇 niyato dusit
  • 105 篇 bastieri d.
  • 88 篇 ferrara g.
  • 88 篇 ardid m.
  • 87 篇 calvo d.
  • 86 篇 chen a.
  • 76 篇 li xin
  • 76 篇 gal t.
  • 76 篇 bozza c.
  • 75 篇 fang j.
  • 75 篇 feng c.f.
  • 71 篇 díaz a.f.
  • 69 篇 jiang k.
  • 69 篇 li cheng
  • 68 篇 kuleshov d.
  • 67 篇 kalekin o.
  • 66 篇 liu d.
  • 65 篇 chen m.j.
  • 62 篇 boumaaza j.
  • 61 篇 min z.

语言

  • 22,858 篇 英文
  • 2,095 篇 其他
  • 243 篇 中文
  • 7 篇 日文
  • 3 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=School of Computing Engineering and Technology"
25176 条 记 录,以下是4921-4930 订阅
排序:
EagerLog: Active Learning Enhanced Retrieval Augmented Generation for Log-based Anomaly Detection
EagerLog: Active Learning Enhanced Retrieval Augmented Gener...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Duan, Chiming Jia, Tong Yang, Yong Liu, Guiyang Liu, Jinbu Zhang, Huxing Zhou, Qi Li, Ying Huang, Gang School of Software and Microelectronics Peking University Beijing China Institute for Artificial Intelligence Peking University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China National Key Laboratory of Data Space Technology and System Beijing China Alibaba Cloud Computing Company Hangzhou China
Logs record essential information about system operations and serve as a critical source for anomaly detection, which has generated growing research interest. Utilizing large language models (LLMs) within a retrieval-... 详细信息
来源: 评论
SMART UI: Crop Classification in Karnataka Nippani Using Ensemble Random Forest
SMART UI: Crop Classification in Karnataka Nippani Using Ens...
收藏 引用
Advances in Computation, Communication and Information technology (ICAICCIT), International Conference on
作者: Jagarlamudi Susanth Soubraylu Sivakumar Selvanayaki Kolandapalayam Shanmugam R. Sivakumar S. S. Sridhar S. Ganesh Kumar Computing Technologies School of Computing SRM Institute of Science and Technology Kattankulathur Chennai India Mathematics and Computer Science Ashland University OH United States of America Earthquake Research Cell Civil Engineering SRM Institute of Science and Technology Kattankulathur Chennai India Data Science and Business Systems School of Computing SRM Institute of Science and Technology Kattankulathur Chennai India
This study helped in enhancing agricultural management, predicting yields, tracking crop health which are all dependent on accurate crop classification. But the conventional methods are labor intensive and time consum... 详细信息
来源: 评论
A Multi-Source Domain Generalization Network for Rotating Machinery Fault Diagnosis under Unseen Operating Conditions
A Multi-Source Domain Generalization Network for Rotating Ma...
收藏 引用
IEEE International Conference on Industrial Informatics (INDIN)
作者: Tianyu Gao Jingli Yang Weiwei Hao Xiaopeng Fan School of Electronics and Information Engineering Harbin Institute of Technology Harbin China China Institute of Marine Technology and Economy Beijing China Faculty of Computing Harbin Institute of Technology Harbin China
With the rapid development or industrial intelligence, domain adaptation technology depending on the availability of the target domain has gradually become a reliable solution to address the performance degradation of... 详细信息
来源: 评论
System Architecture and Software Design of a Handheld High Throughput Phenotyping Device: AgRECA
System Architecture and Software Design of a Handheld High T...
收藏 引用
Applied Sensing Conference (APSCON), IEEE
作者: Kartik E. Cholachgudda Rajashekhar C. Biradar Kouame Yann Olivier Akansie Aditya A. Sannabhadti Geetha D. Devanagavi School of Electronics and Communication Engineering REVA University Bengaluru India School of Computing and Information Technology REVA University Bengaluru India
High-throughput phenotyping using imaging techniques allows for non-destructive, automated assessments of plant morphological and physiological traits. Currently, these techniques require intricate hardware and softwa... 详细信息
来源: 评论
Learning to Predict Short-Term Volatility with Order Flow Image Representation
arXiv
收藏 引用
arXiv 2023年
作者: Lensky, Artem Hao, Mingyu School of Engineering and Technology University of New South Wales Canberra Australia School of Computing Australian National University Canberra Australia
Introduction: The paper addresses the challenging problem of predicting the short-term realized volatility of the Bitcoin price using order flow information. The inherent stochastic nature and anti-persistence of pric... 详细信息
来源: 评论
A Survey on Cyber Attack Detection: Techniques, Datasets, and Challenge
A Survey on Cyber Attack Detection: Techniques, Datasets, an...
收藏 引用
Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication engineering (RMKMATE), International Conference on
作者: G Geetha Manjula Rajagopal K Purna Chand Department of Computing Technologies School of Computing (Research Scholor) SRM Institute of Science and Technology Kattankulathur Tamilnadu Department of Computing Technologies School of Computing (Assistant Professor) SRM Institute of Science and Technology Kattankulathur Tamilnadu Department of Computer Science and Engineering(Data Science) (Professor) B V Raju Institute of Technology Narsapur India
Networking technology is expanded along with cyber threats. Cyber threats are the instances which adversely influences the functional operations of the system or network. It results in various issues such as illegal a...
来源: 评论
Unconditionally optimal convergence of an energy-conserving and linearly implicit scheme for nonlinear wave equations
收藏 引用
Science China Mathematics 2022年 第8期65卷 1731-1748页
作者: Waixiang Cao Dongfang Li Zhimin Zhang School of Mathematical Sciences Beijing Normal UniversityBeijing 100875China School of Mathematics and Statistics Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and TechnologyWuhan 430074China Beijing Computational Science Research Center Beijing 100193China Department of Mathematics Wayne State UniversityDetroitMI 48202USA
In this paper,we present and analyze an energy-conserving and linearly implicit scheme for solving the nonlinear wave *** error estimates in time and superconvergent error estimates in space are established without ce... 详细信息
来源: 评论
Networked Active Suspension Control of In-Wheel Motor Driven Electric Vehicles Under Aperiodic Sampling and Transmission Delays  7th
Networked Active Suspension Control of In-Wheel Motor Driven...
收藏 引用
7th International Conference on Life System Modeling and Simulation, LSMS 2021, and 7th International Conference on Intelligent computing for Sustainable Energy and Environment, ICSEE 2021
作者: Ahmad, Iftikhar Ge, Xiaohua Han, Qing-Long Cao, Zhenwei School of Science Computing and Engineering Technologies Swinburne University of Technology HawthornVIC3122 Australia
This paper addresses the networked H∞ control problem for active suspension systems equipped with dynamic dampers. First, a networked active suspension control model of a 6-DOF half in-wheel motor driven electric veh... 详细信息
来源: 评论
Cryptographic Protocols for Securing Internet of Things (IoT)  15
Cryptographic Protocols for Securing Internet of Things (IoT...
收藏 引用
15th International Conference on computing Communication and Networking Technologies, ICCCNT 2024
作者: Manimekala, B. Aravind, T. Sounderrajan, T. Rajakumareswaran, V. Kondreddi, Krishnaveni Mohanambal, K. Christ University Department of Computer Science Yeshwanthpur Bengaluru India Vel TecRangarajanDr.Sagunthala R&d Institute of Science and Technology Department of Cse School of Computing India Erode Sengunthar Engineering College Department of Ai and Data Science Tamil Nadu Thuduppathi India Erode Sengunthar Engineering College Department of Computer Science and Design Tamil Nadu Thuduppathi India Chaitanya Bharathi Institute of Technology Electrical and Electronics Engineering Ranga Reddy Telangana Gandipet500075 India Bannariamman Institute of Technology Department of Computer Science and Engineering Sathyamangalam India
Cryptographic protocols are used to relax the ever-developing quantity of linked gadgets that make up the net of things (IoT). Those cryptographic protocols have been designed to make certain that IoT tool traffic sta... 详细信息
来源: 评论
How learning evolved from offline classroom to online platforms with its amplifier, Edu-KOLs: A systematic literature review  32
How learning evolved from offline classroom to online platfo...
收藏 引用
32nd Australasian Conference on Information Systems: Information Systems for a Sustainable Future, Connectedness, and Social Good, ACIS 2021
作者: Zhang, Susan Shen, Jun Yan, Jun School of Computing & Information Technology Faculty of Engineering and Information Sciences University of Wollongong Wollongong Australia
Key Opinion Leaders (KOLs) gradually emerged on e-commerce platforms with their influencing power on global audience. E-learning platforms followed suit on drawing the influence of educational KOLs (Edu-KOLs) for perc... 详细信息
来源: 评论