咨询与建议

限定检索结果

文献类型

  • 6,150 篇 会议
  • 5,208 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 11,484 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,436 篇 工学
    • 5,354 篇 计算机科学与技术...
    • 4,415 篇 软件工程
    • 1,755 篇 信息与通信工程
    • 1,070 篇 控制科学与工程
    • 905 篇 生物工程
    • 891 篇 电气工程
    • 682 篇 电子科学与技术(可...
    • 601 篇 生物医学工程(可授...
    • 577 篇 光学工程
    • 541 篇 机械工程
    • 366 篇 仪器科学与技术
    • 347 篇 化学工程与技术
    • 320 篇 动力工程及工程热...
    • 315 篇 网络空间安全
    • 265 篇 交通运输工程
    • 250 篇 安全科学与工程
  • 4,131 篇 理学
    • 2,041 篇 数学
    • 1,310 篇 物理学
    • 1,014 篇 生物学
    • 682 篇 统计学(可授理学、...
    • 416 篇 系统科学
    • 379 篇 化学
  • 2,072 篇 管理学
    • 1,227 篇 管理科学与工程(可...
    • 925 篇 图书情报与档案管...
    • 578 篇 工商管理
  • 611 篇 医学
    • 528 篇 临床医学
    • 465 篇 基础医学(可授医学...
    • 291 篇 公共卫生与预防医...
    • 257 篇 药学(可授医学、理...
  • 398 篇 法学
    • 309 篇 社会学
  • 189 篇 经济学
  • 156 篇 教育学
  • 142 篇 农学
  • 36 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 298 篇 deep learning
  • 261 篇 machine learning
  • 260 篇 feature extracti...
  • 221 篇 computational mo...
  • 192 篇 accuracy
  • 185 篇 semantics
  • 171 篇 predictive model...
  • 168 篇 internet of thin...
  • 168 篇 training
  • 144 篇 real-time system...
  • 117 篇 data mining
  • 110 篇 support vector m...
  • 110 篇 artificial intel...
  • 109 篇 neural networks
  • 109 篇 security
  • 108 篇 computer science
  • 108 篇 optimization
  • 95 篇 visualization
  • 88 篇 data models
  • 87 篇 cloud computing

机构

  • 172 篇 university of ch...
  • 122 篇 key laboratory o...
  • 113 篇 university of sc...
  • 97 篇 tianfu cosmic ra...
  • 96 篇 school of comput...
  • 91 篇 hebei normal uni...
  • 89 篇 state key labora...
  • 87 篇 department of ph...
  • 87 篇 school of comput...
  • 86 篇 yunnan observato...
  • 73 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 56 篇 school of inform...
  • 56 篇 school of inform...
  • 54 篇 school of comput...
  • 54 篇 college of compu...
  • 54 篇 school of comput...
  • 54 篇 college of intel...
  • 48 篇 institute for nu...
  • 47 篇 department of co...

作者

  • 97 篇 niyato dusit
  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 71 篇 kuleshov d.
  • 71 篇 li cheng
  • 70 篇 li xin
  • 70 篇 liu d.
  • 69 篇 chen m.j.
  • 69 篇 liu s.m.
  • 68 篇 huang d.h.
  • 67 篇 dai h.l.
  • 63 篇 min z.
  • 61 篇 guo y.q.
  • 58 篇 liu b.
  • 57 篇 bao y.w.
  • 56 篇 heller m.
  • 56 篇 hu h.b.

语言

  • 10,384 篇 英文
  • 959 篇 其他
  • 127 篇 中文
  • 13 篇 日文
  • 2 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11484 条 记 录,以下是471-480 订阅
排序:
Comparative Analysis of Face Emotion Detection based on Deep Learning Techniques
Comparative Analysis of Face Emotion Detection based on Deep...
收藏 引用
2023 IEEE World Conference on Communication and computing, WCONF 2023
作者: Balla, Sahithya Guru Prasad, M.S. Balla, Sahithi Madhu Krishna, K. Kiran, J. Ram, Mangey Dept. of Computer Science and Engg Dehradun India Reva University School of Computing and Information Technology Bengaluru India
This research paper presents a comparative analysis of emotion recognition using deep learning techniques. The aim of the study was to compare the performance of state-of-the-art deep learning models, namely Convoluti... 详细信息
来源: 评论
MuLAD: Multimodal Aggression Detection from Social Media Memes Exploiting Visual and Textual Features  27th
MuLAD: Multimodal Aggression Detection from Social Media Me...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Hasan, Md. Maruf Ahsan, Shawly Hoque, Mohammed Moshiul Dewan, M. Ali Akber Chittagong University of Engineering and Technology Chittagong4349 Bangladesh School of Computing and Information Systems Faculty of Science and Technology Athabasca University AthabascaABT9S 3A3 Canada
Aggression detection from memes is challenging due to their region-specific interpretation and multimodal nature. Detecting or classifying aggressive memes is complicated in low-resource languages (including... 详细信息
来源: 评论
MEVTR: A Multilingual Model Enhanced With Visual Text Representations  30
MEVTR: A Multilingual Model Enhanced With Visual Text Repres...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Wang, Xiaohua Fei, Wenlong Hu, Min Zhang, Qingyu Zhu, Aoqiang School of Computer Science and Information Engineering HeFei University of Technology China Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine China
The goal of multilingual modelling is to generate multilingual text representations for various downstream tasks in different languages. However, some state-of-the-art pre-trained multilingual models perform poorly on... 详细信息
来源: 评论
A New Method for Predefined-Time Synchronization Control of Memristive Cohen-Grossberg Neural Networks
A New Method for Predefined-Time Synchronization Control of ...
收藏 引用
2023 IEEE International Conference on Memristive computing and Applications, ICMCA 2023
作者: Liu, Aidi Yu, Wenyue Huang, Lili Guo, Jian Lei, Tengfei Zhao, Hui School of Computer and Information Engineering Qilu Institute of Technology Jinan China School of Computer and Information Engineering Qilu Institute of Technology China Collaborative Innovation Center of Memristive Computing Application School of Computer and Information Engineering Qilu Institute of Technology China School of Information Science and Engineering University of Jinan Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan China
This article mainly conducts a series of research on the synchronization control of Cohen-Grossberg neural networks. Firstly, a memristive Cohen-Grossberg neural network model with time-varying delay was constructed, ... 详细信息
来源: 评论
Practical Byzantine fault-tolerant consensus algorithm based on k-Nearest Neighbor  7
Practical Byzantine fault-tolerant consensus algorithm based...
收藏 引用
7th IEEE information technology and Mechatronics Engineering Conference, ITOEC 2023
作者: Liu, Qingtai Yu, Jingang Shenyang Ligong University School of Information Science and Engineering Liaoning China Shenyang Institute of Computing Technology Liaoning China
In response to the traditional Byzantine fault-tolerant consensus algorithm, which suffers from performance bottleneck and improper selection of master nodes when the number of nodes increases, this paper proposes a k... 详细信息
来源: 评论
Comparison of CNN-based deep learning architectures for rice diseases classification
收藏 引用
Artificial Intelligence in Agriculture 2023年 第3期9卷 22-35页
作者: Md Taimur Ahad Yan Li Bo Song Touhid Bhuiyan Department of Computer Science and Engineering Daffodil International UniversitySavarBangladesh School of Mathematics Physics and Computing University of Southern QueenslandToowoombaAustralia School of Engineering University of Southern Queensland ToowoombaAustralia Department of Computer Science and Engineering Faculty of Science and Information TechnologyDaffodil International UniversityBangladesh
Although convolutional neural network(CNN)paradigms have expanded to transfer learning and ensemble models from original individual CNN architectures,few studies have focused on the performance comparison of the appli... 详细信息
来源: 评论
A Knowledge-Based System to Predict Crime from Criminal Records in the Case of Hossana Police Commission  5
A Knowledge-Based System to Predict Crime from Criminal Reco...
收藏 引用
5th International Conference on information and Communication technology for Development for Africa, ICT4DA 2023
作者: Wubineh, Betelhem Zewdu Metekiya, Biniyam Yirsaw Wroclaw University of Science and Technology Faculty of Information and Communication Technology Wroclaw Poland School of Computing and Informatics Wachemo University Department of Information Technology Hossana Ethiopia College of Informatics Department of Information System University of Gondar Gondar Ethiopia
Crime is a complex social phenomenon, and its cost continues to rise over time. Police have collected a large amount of data on criminals every day for different crimes. However, extracting valuable information from t... 详细信息
来源: 评论
NeuVSA: A Unified and Efficient Accelerator for Neural Vector Search  31
NeuVSA: A Unified and Efficient Accelerator for Neural Vecto...
收藏 引用
31st IEEE International Symposium on High Performance Computer Architecture, HPCA 2025
作者: Yuan, Ziming Dai, Lei Li, Wen Zhang, Jie Liang, Shengwen Wang, Ying Liu, Cheng Li, Huawei Li, Xiaowei Guo, Jiafeng Wang, Peng Chen, Renhai Zhang, Gong Shanxi University School of Computer and Information Technology China Peking University School of Computer Science China Institute of Computing Technology CAS State Key Lab of Processors China University of Chinese Academy of Sciences China Zhongguancun National Laboratory Beijing China Institute of Computing Technology CAS Key Lab of Network Data Science and Technology China Huawei Technologies Co. Ltd. China
Neural Vector Search (NVS) has exhibited superior search quality over traditional key-based strategies for information retrieval tasks. An effective NVS architecture requires high recall, low latency, and high through... 详细信息
来源: 评论
Applications of electromagnetic metamaterials in reducing the size of antennas  9
Applications of electromagnetic metamaterials in reducing th...
收藏 引用
9th International Conference on Energy Materials and Electrical Engineering, ICEMEE 2023
作者: Pang, Xudong Wu, Liping Yuan, Shanshan Zhu, Shouzheng Department of Computing Center Shanghai Publishing and Printing College Shanghai China School of Information Science and Technology East China Normal University Shanghai China
Metamaterials are artificially designed materials with special electromagnetic properties that can manipulate the propagation paths of electromagnetic waves. The fabrication of metamaterials involves various physical ... 详细信息
来源: 评论
Android Malware Detection System using Machine Learning  2024
Android Malware Detection System using Machine Learning
收藏 引用
16th International Conference on Contemporary computing, IC3 2024
作者: Kaur, Amanpreet Lal, Sangeeta Goel, Shruti Pandey, Mrinal Agarwal, Astha Department of Computer Science and Engineering & IT Jaypee Institute of Information Technology India School of computing and mathematics Keele University Newcastle-under-Lyme United Kingdom
Detecting Android malware is imperative for safeguarding user privacy, securing data, and preserving device performance. Consequently, numerous studies have underscored the complexities associated with Android malware... 详细信息
来源: 评论