咨询与建议

限定检索结果

文献类型

  • 2,166 篇 期刊文献
  • 1,791 篇 会议
  • 17 册 图书

馆藏范围

  • 3,974 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,630 篇 工学
    • 1,949 篇 计算机科学与技术...
    • 1,608 篇 软件工程
    • 632 篇 信息与通信工程
    • 398 篇 电气工程
    • 385 篇 生物工程
    • 362 篇 控制科学与工程
    • 254 篇 电子科学与技术(可...
    • 246 篇 生物医学工程(可授...
    • 239 篇 光学工程
    • 152 篇 机械工程
    • 122 篇 化学工程与技术
    • 118 篇 交通运输工程
    • 106 篇 网络空间安全
    • 104 篇 动力工程及工程热...
    • 99 篇 仪器科学与技术
    • 90 篇 安全科学与工程
  • 1,424 篇 理学
    • 730 篇 数学
    • 434 篇 生物学
    • 353 篇 物理学
    • 255 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 135 篇 化学
  • 747 篇 管理学
    • 468 篇 管理科学与工程(可...
    • 320 篇 图书情报与档案管...
    • 225 篇 工商管理
  • 258 篇 医学
    • 221 篇 临床医学
    • 192 篇 基础医学(可授医学...
    • 121 篇 公共卫生与预防医...
    • 107 篇 药学(可授医学、理...
  • 122 篇 法学
    • 101 篇 社会学
  • 75 篇 经济学
  • 50 篇 农学
  • 38 篇 教育学
  • 8 篇 文学
  • 6 篇 军事学
  • 3 篇 艺术学

主题

  • 135 篇 deep learning
  • 123 篇 accuracy
  • 107 篇 machine learning
  • 104 篇 feature extracti...
  • 93 篇 semantics
  • 93 篇 training
  • 91 篇 computational mo...
  • 77 篇 data models
  • 71 篇 real-time system...
  • 69 篇 internet of thin...
  • 68 篇 predictive model...
  • 61 篇 convolutional ne...
  • 57 篇 federated learni...
  • 55 篇 reinforcement le...
  • 51 篇 graph neural net...
  • 47 篇 deep neural netw...
  • 46 篇 artificial intel...
  • 45 篇 data mining
  • 43 篇 optimization
  • 40 篇 convolution

机构

  • 177 篇 college of compu...
  • 103 篇 national enginee...
  • 101 篇 beijing advanced...
  • 77 篇 nanyang technolo...
  • 69 篇 school of comput...
  • 61 篇 national enginee...
  • 50 篇 school of big da...
  • 50 篇 school of comput...
  • 46 篇 school of comput...
  • 45 篇 school of cyber ...
  • 39 篇 national enginee...
  • 35 篇 university of ch...
  • 33 篇 college of compu...
  • 33 篇 college of intel...
  • 32 篇 services computi...
  • 32 篇 school of comput...
  • 32 篇 hubei engineerin...
  • 31 篇 school of comput...
  • 30 篇 school of data a...
  • 28 篇 hubei key labora...

作者

  • 161 篇 niyato dusit
  • 104 篇 hai jin
  • 99 篇 jin hai
  • 32 篇 kang jiawen
  • 31 篇 xiaofei liao
  • 27 篇 tao dacheng
  • 27 篇 shen linlin
  • 25 篇 hu shengshan
  • 25 篇 li jianxin
  • 24 篇 rajeswari d.
  • 23 篇 sun geng
  • 23 篇 xiong zehui
  • 22 篇 peng hao
  • 22 篇 li tianrui
  • 20 篇 wang jiacheng
  • 20 篇 du hongyang
  • 19 篇 haikun liu
  • 19 篇 dusit niyato
  • 19 篇 xiwang dong
  • 18 篇 yang yang

语言

  • 3,416 篇 英文
  • 530 篇 其他
  • 35 篇 中文
检索条件"机构=School of Computing and Data Engineering"
3974 条 记 录,以下是621-630 订阅
排序:
Synthesis of Decoherence-Free Modes in Linear Quantum Passive Systems via Robust Pole Placement
Synthesis of Decoherence-Free Modes in Linear Quantum Passiv...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Miao, Zibo Pan, Yu Gao, Qing School of Mechanical Engineering and Automation Adaptive Robotics Harbin Institute of Technology Guangdong Key Laboratory of Intelligent Morphing Mechanisms Shenzhen518055 China The Institute of Cyber-Systems and Control College of Control Science and Engineering Zhejiang University State Key Laboratory of Industrial Control Technology Hangzhou310027 China The School of Automation Science and Electrical Engineering Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China
In this paper we extend our previous research on coherent observer-based pole placement approach to study the synthesis of robust decoherence-free (DF) modes for linear quantum passive systems, which is aimed at prese... 详细信息
来源: 评论
A Review of State-of-Art Methods for Passive Driver Fatigue Detection: Progress and Prospect
A Review of State-of-Art Methods for Passive Driver Fatigue ...
收藏 引用
Artificial Intelligence and Autonomous Robot Systems (AIARS), International Conference on
作者: Dong Wang Pianhui Wu Big Data and Computing Institute Guangdong Baiyun University Guangzhou China School of Mechatornic Engineering Guangdong Polytechnic Normal University Guangzhou China
In recent years, there has been a noticeable rise in traffic accidents attributed to driver fatigue, sparking increased interest among researchers. Current research on fatigue driving is broadly categorized into two a... 详细信息
来源: 评论
Calligraphy Alphabet Perception Using Artificial Intelligence
Calligraphy Alphabet Perception Using Artificial Intelligenc...
收藏 引用
International Conference on Science Technology engineering and Management (ICONSTEM)
作者: Venkatesh S D. Jeevitha J. Anitha Gnanaselvi Department of Data Science and Business Systems School of Computing SRM Institute of Science and Technology Kattankulathur Chennai Department of Computer Science and Engineering Jeppiaar Engineering College Chennai
The human brain has a simple time analyzing and processing images. The brain is able to rapidly deconstruct and distinguish an image's various components when the eye perceives it. With the Convolutional Neural Ne... 详细信息
来源: 评论
SeiAttentionNet: An Epilepsy Detection Model Using Attention-based Graph Convolutional Network
SeiAttentionNet: An Epilepsy Detection Model Using Attention...
收藏 引用
International Conference on Computers, Communications, and Systems (ICCCS)
作者: Yanhao Chen Peng Zheng Shamini Raja Kumaran School of Computing & Data Science Xiamen University Malaysia Sepang Selangor Malaysia School of Electrical Engineering & Artificial Intelligence Xiamen University Malaysia Sepang Selangor Malaysia
Accurate and timely prediction of epileptic seizures is crucial in preventing unintended harm to patients. To enhance the precision of seizure prediction, a self-supervised attention-based graph convolution network mo... 详细信息
来源: 评论
Online Multi-Object Tracking Based On Global Feature Enhancement Network And Historical Feature Complement Iteration
Online Multi-Object Tracking Based On Global Feature Enhance...
收藏 引用
Cognitive computing and Complex data (ICCD), International Conference on the
作者: Zunwang Ke Puping An Gang Wang Yugui Zhang School of Software Xinjiang University Urumqi China School of Computing and Data Engineering NingboTech University Ningbo China Institute of Semiconductors Chinese Academy of Sciences Beijing China
Multi-object tracking is an important part of computer vision and plays a crucial role in many real-world application scenarios. The existing integrated tracking framework loses the key features of the target when fus... 详细信息
来源: 评论
Load Prediction in Edge computing Using Deep Auto-Regressive Recurrent Networks
Load Prediction in Edge Computing Using Deep Auto-Regressive...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Zhanghui Liu Lixian Chen Zheyi Chen Yifan Huang Jie Liang Zhengxin Yu Wang Miao College of Computer and Data Science Fuzhou University China School of Computing and Communications University of Lancaster Lancaster UK School of Engineering Computing and Mathematics University of Plymouth Plymouth UK
Load prediction is an essential technique to improve edge system performance by proactively configuring and allocating system resources. Traditional load prediction methods obtain high prediction when handling loads e...
来源: 评论
Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
arXiv
收藏 引用
arXiv 2024年
作者: Chu, Zhaoyang Wan, Yao Li, Qian Wu, Yang Zhang, Hongyu Sui, Yulei Xu, Guandong Jin, Hai School of Computer Science and Technology Huazhong University of Science and Technology China School of Electrical Engineering Computing and Mathematical Sciences Curtin University Australia School of Big Data and Software Engineering Chongqing University China School of Computer Science and Engineering University of New South Wales Australia School of Computer Science University of Technology Sydney Australia National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Vulnerability detection is crucial for ensuring the security and reliability of software systems. Recently, Graph Neural Networks (GNNs) have emerged as a prominent code embedding approach for vulnerability detection,... 详细信息
来源: 评论
Optimizing AoI in RIS-Aided Wireless Powered Communication Networks
Optimizing AoI in RIS-Aided Wireless Powered Communication N...
收藏 引用
IEEE International Conference on Communications in China Workshops (ICCC)
作者: Huimin Hu Qiuyu Yu Haizhou Tang Ruichen Zhang YuanQing Li School of Communications and Information Engineering Xi’an University of Posts and Telecommunications Xi’an China College of Computing and Data Science Nanyang Technological University Singapore
This study investigates in depth the expected sum age of information (AoI) in a wireless powered communication network (WPCN) incorporating reconfigurable intelligent surfaces (RIS). In this network, a sensor harvests... 详细信息
来源: 评论
Understanding Graph databases: A Comprehensive Tutorial and Survey
arXiv
收藏 引用
arXiv 2024年
作者: Anuyah, Sydney Bolade, Emmanuel Agbaakin, Oluwatosin Luddy School of Informatics Computing and Engineering Indiana University IndianapolisIN United States Data Science Department Edyah Consulting Anthony Lagos Nigeria
This tutorial is curated as a one-stop shop for understanding graph databases, as it emphasizes the foundations of graph theory and explores practical applications across multiple fields. The paper begins with foundat... 详细信息
来源: 评论
The Evolution of Zero Trust Architecture (ZTA) from Concept to Implementation
The Evolution of Zero Trust Architecture (ZTA) from Concept ...
收藏 引用
International Scientific-Professional Conference on Information Technology (IT)
作者: Md Nasiruzzaman Maaruf Ali Iftekhar Salam Mahdi H. Miraz School of Computing and Data Science Xiamen University Malaysia Malaysia Faculty of Computer Science and IT Universiteti Metropolitan Tirana Albania The Doctoral College University of Wales Trinity Saint David (UWTSD) Wales UK Mahdi H. Miraz is with the School of Computing and Data Science Xiamen University Malaysia Malaysia School of Computing Faculty of Arts Science and Technology Wrexham University UK Faculty of Computing Engineering and Science University of South Wales UK
Zero Trust Architecture (ZTA) is one of the paradigm changes in cybersecurity, from the traditional perimeter-based model to perimeterless. This article studies the core concepts of ZTA, its beginning, a few use cases... 详细信息
来源: 评论