咨询与建议

限定检索结果

文献类型

  • 6,228 篇 会议
  • 5,287 篇 期刊文献
  • 125 册 图书

馆藏范围

  • 11,640 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,526 篇 工学
    • 5,437 篇 计算机科学与技术...
    • 4,443 篇 软件工程
    • 1,819 篇 信息与通信工程
    • 1,120 篇 控制科学与工程
    • 930 篇 电气工程
    • 905 篇 生物工程
    • 691 篇 电子科学与技术(可...
    • 607 篇 生物医学工程(可授...
    • 575 篇 光学工程
    • 544 篇 机械工程
    • 373 篇 仪器科学与技术
    • 345 篇 化学工程与技术
    • 343 篇 网络空间安全
    • 326 篇 动力工程及工程热...
    • 280 篇 交通运输工程
    • 263 篇 安全科学与工程
  • 4,151 篇 理学
    • 2,055 篇 数学
    • 1,315 篇 物理学
    • 1,014 篇 生物学
    • 684 篇 统计学(可授理学、...
    • 417 篇 系统科学
    • 383 篇 化学
  • 2,101 篇 管理学
    • 1,249 篇 管理科学与工程(可...
    • 940 篇 图书情报与档案管...
    • 578 篇 工商管理
  • 622 篇 医学
    • 533 篇 临床医学
    • 465 篇 基础医学(可授医学...
    • 297 篇 公共卫生与预防医...
    • 259 篇 药学(可授医学、理...
  • 398 篇 法学
    • 310 篇 社会学
  • 192 篇 经济学
  • 162 篇 教育学
  • 142 篇 农学
  • 35 篇 文学
  • 35 篇 艺术学
  • 27 篇 军事学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 317 篇 deep learning
  • 267 篇 machine learning
  • 261 篇 feature extracti...
  • 225 篇 computational mo...
  • 210 篇 accuracy
  • 187 篇 semantics
  • 178 篇 internet of thin...
  • 176 篇 predictive model...
  • 163 篇 training
  • 154 篇 real-time system...
  • 119 篇 data mining
  • 116 篇 neural networks
  • 116 篇 optimization
  • 113 篇 support vector m...
  • 110 篇 security
  • 110 篇 artificial intel...
  • 106 篇 computer science
  • 95 篇 visualization
  • 88 篇 cloud computing
  • 87 篇 data models

机构

  • 176 篇 university of ch...
  • 127 篇 key laboratory o...
  • 116 篇 university of sc...
  • 101 篇 tianfu cosmic ra...
  • 101 篇 school of comput...
  • 95 篇 hebei normal uni...
  • 93 篇 state key labora...
  • 90 篇 yunnan observato...
  • 87 篇 department of ph...
  • 87 篇 school of comput...
  • 78 篇 key laboratory f...
  • 59 篇 karnataka bangal...
  • 57 篇 school of inform...
  • 57 篇 school of comput...
  • 57 篇 school of inform...
  • 57 篇 college of compu...
  • 52 篇 school of comput...
  • 52 篇 college of intel...
  • 51 篇 institute for nu...
  • 51 篇 school of physic...

作者

  • 97 篇 niyato dusit
  • 83 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 jiang k.
  • 76 篇 bastieri d.
  • 71 篇 kuleshov d.
  • 71 篇 li cheng
  • 70 篇 li xin
  • 70 篇 liu d.
  • 69 篇 chen m.j.
  • 69 篇 liu s.m.
  • 68 篇 huang d.h.
  • 67 篇 dai h.l.
  • 63 篇 min z.
  • 61 篇 guo y.q.
  • 58 篇 liu b.
  • 57 篇 bao y.w.
  • 56 篇 heller m.
  • 56 篇 hu h.b.

语言

  • 9,084 篇 英文
  • 2,435 篇 其他
  • 143 篇 中文
  • 14 篇 日文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 法文
检索条件"机构=School of Computing and Information Technology Feculty of Science and Technology"
11640 条 记 录,以下是891-900 订阅
排序:
Sustainability Forecasting for Deep Learning Packages  31
Sustainability Forecasting for Deep Learning Packages
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Han, Junxiao Wang, Yunkun Liu, Zhongxin Bao, Lingfeng Liu, Jiakun Lo, David Deng, Shuiguang School of Computer & Computing Science Hangzhou City University Hangzhou China College of Computer Science and Technology Zhejiang University Hangzhou China Zhejiang University The State Key Laboratory of Blockchain and Data Security Hangzhou China School of Computing and Information Systems Singapore Management University Singapore Singapore
Deep Learning (DL) technologies have been widely adopted to tackle various tasks. In this process, through software dependencies, a multi-layer DL supply chain (SC) is formed, with DL frameworks acting as the root, DL... 详细信息
来源: 评论
A GTFS data acquisition and processing framework and its application to train delay prediction
收藏 引用
International Journal of Transportation science and technology 2023年 第1期12卷 201-216页
作者: Jianqing Wu Bo Du Zengyang Gong Qiang Wu Jun Shen Luping Zhou Chen Cai School of Computing and Information Technology University of WollongongNSW 2522Australia SMART Infrastructure Facility University of WollongongNSW 2522Australia School of Civil Mining and EnvironmentalUniversity of WollongongNSW 2522Australia Department of Computer Science and Engineering Hong Kong University of Science and TechnologyHong Kong 999077China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of ChinaChengdu 611731China School of Electrical and Information Engineering University of SydneyNSW 2006Australia CSIRO’s Data61 NSW 2015Australia
With advanced artificial intelligence and deep learning techniques, a growing number of data sources are playing more and more critical roles in planning and operating transportation services. The General Transit Feed... 详细信息
来源: 评论
Hybrid genetic algorithm with rank sorting for obtaining bijective S-boxes with good cryptographic properties  4
Hybrid genetic algorithm with rank sorting for obtaining bij...
收藏 引用
4th International Conference on Network Communication and information Security, ICNCIS 2024
作者: Li, Xin Liu, Zhenghong Zhao, Haixia School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin541004 China Guilin541004 China Guangxi Colleges Universities Key Laboratory of Data Analysis and Computation Guilin541004 China School of Information and Communication Guilin University of Electronic Technology Guilin541004 China
An S-box is an essential component in block ciphers, and its cryptography properties play a significant role in the security of the cipher. A good S-box must have high nonlinearity (NLF ) and low differential uniformi... 详细信息
来源: 评论
A Heuristic-based Dynamic Scheduling and Routing Method for Industrial TSN Networks  10
A Heuristic-based Dynamic Scheduling and Routing Method for ...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud computing and 9th IEEE International Conference on Edge computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Chen, Honglong Liu, Mindong Huang, Jing Zheng, Zhiling Huang, Weihong Xiao, Yufeng Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Xiangtan411201 China Hunan Industry Polytechnic Information Center Changsha410125 China
In the industrial environment, machines often need to reflect the anomaly detection results to the total control center in time, and the general industrial network can not achieve high real-time. In order to solve suc... 详细信息
来源: 评论
EPIMR:Prediction of Enhancer-Promoter Interactions by Multi-Scale ResNet on Image Representation
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 668-681页
作者: Qiaozhen Meng Yinuo Lyu Xiaoqing Peng Junhai Xu Jijun Tang Fei Guo School of Computer Science and Technology College of Intelligence and ComputingTianjin UniversityTianjin 300350China Aeronautical Information Service Center of the Civil Aviation Administration of China(AISC.ATMB.CAAC) Beijing 100015China Center for Medical Genetics&Hunan Key Laboratory of Medical Genetics School of Life SciencesCentral South UniversityChangsha 410038China Shenzhen Institute of Advanced Technology Chinese Academy of SciencesShenzhen 518000China School of Computer Science and Engineering Central South UniversityChangsha 410083China
Prediction of enhancer-promoter interactions(EPIs)is key to regulating gene expression and diagnosing genetic *** to limited resolution,biological experiments perform not as well as expected while precisely identifyin... 详细信息
来源: 评论
Air Quality Prediction Using Adaboost
Air Quality Prediction Using Adaboost
收藏 引用
2023 Intelligent computing and Control for Engineering and Business Systems, ICCEBS 2023
作者: Thamizhselvi, D. Kasi, Baskar Kamalakkannan, K. Bharath, S. Gowtham, S. Kishore, M.A. Sri Sairam Engineering College Department of Information Technology Chennai India School of Computing Science and Engineering Galgotias University Greater Noida India Srm Institute of Science and Technology Department of Automobile Engineering Chennai India
The survival of human beings is contingent upon the presence of air. The detrimental impact of contemporary culture on air quality is seen in nearly all regions. Pollution of the environment is caused by activities in... 详细信息
来源: 评论
A Modified Feature Selection Algorithm for Intrusion Detection System Based on Student Psychology-Based Optimization with Explainable AI
A Modified Feature Selection Algorithm for Intrusion Detecti...
收藏 引用
2023 IEEE Asia-Pacific Conference on Computer science and Data Engineering, CSDE 2023
作者: Evan, Md. Raisul Islam Motiur Rahman, Mohammad Tanzir Mehedi, Sk. Nazib, Abdullah Islam, Rafiqul Rahman, Ziaur Mawlana Bhashani Science and Technology University Computer Science and Engineering Tangail1902 Bangladesh Mawlana Bhashani Science and Technology University Information and Communication Technology Tangail1902 Bangladesh School of Electrical Engineering and Robotics Queensland University of Technology BrisbaneQLD Australia School of Computing Mathematics and Engineering Charles Sturt University Bathurst Australia School of Computer Science Queensland University of Technology BrisbaneQLD Australia
Intrusion Detection Systems (IDS) play a vital role in safeguarding network security by monitoring and identifying both normal and intrusive activities. However, constructing an effective IDS from extensive datasets p... 详细信息
来源: 评论
Automatic Title Generation with Attention-Based LSTM  3rd
Automatic Title Generation with Attention-Based LSTM
收藏 引用
3rd International Conference on information technology, InCITe 2023
作者: Dhilsath Fathima, M. Seeni Syed Raviyathu Ammal, M. Singh, Prashant Kumar Shome, Sachi Kharsyienlieh, Manbha Hariharan, R. Department of Computational Intelligence School of Computing SRM Institute of Science and Technology Tamil Nadu Kattankulathur India Department of Information Technology Mohamed Sathak Engineering College Tamil Nadu Kilakarai India Department of Information Technology Veltech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India
The objective of this article is to develop a generalised architecture that can generate headings for any type of document, including articles, book paragraphs, newspaper articles, and legal documents. The title of a ... 详细信息
来源: 评论
A survey on deep learning for polyp segmentation: techniques, challenges and future trends
收藏 引用
Visual Intelligence 2025年 第1期3卷 1-20页
作者: Mei, Jiaxin Zhou, Tao Huang, Kaiwen Zhang, Yizhe Zhou, Yi Wu, Ye Fu, Huazhu PCA Lab Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Nanjing China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China School of Computer Science and Engineering Southeast University Nanjing China Institute of High Performance Computing A*STAR Singapore Singapore
Early detection and assessment of polyps play a crucial role in the prevention and treatment of colorectal cancer (CRC). Polyp segmentation provides an effective solution to assist clinicians in accurately locating an... 详细信息
来源: 评论
Generative Adversarial Network-Based Network Intrusion Detection System for Supervisory Control and Data Acquisition System
Generative Adversarial Network-Based Network Intrusion Detec...
收藏 引用
2024 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2024
作者: Nguyen, Hong Nhung Lan-Phan, Thi Song, Chai-Jong School of Computing Gachon University Department of AI and Software Engineering Gyeonggi-do Seongnam-si1342 Korea Republic of Viet Nam - Korea Institute of Science and Technology Division of Information Technology Thach That Ha Noi Viet Nam Korea Electronics Technology Institute Information Media Research Center Seoul03924 Korea Republic of
In the context of burgeoning cyber threats targeting Supervisory Control and Data Acquisition (SCADA) systems, this paper presents a pioneering Intrusion Detection System (IDS) grounded in Generative Adversarial Netwo... 详细信息
来源: 评论