咨询与建议

限定检索结果

文献类型

  • 3,201 篇 期刊文献
  • 2,879 篇 会议
  • 2 册 图书

馆藏范围

  • 6,082 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,726 篇 工学
    • 1,958 篇 计算机科学与技术...
    • 1,618 篇 软件工程
    • 629 篇 控制科学与工程
    • 598 篇 信息与通信工程
    • 439 篇 电气工程
    • 374 篇 生物工程
    • 351 篇 电子科学与技术(可...
    • 339 篇 力学(可授工学、理...
    • 306 篇 动力工程及工程热...
    • 301 篇 生物医学工程(可授...
    • 272 篇 化学工程与技术
    • 270 篇 机械工程
    • 268 篇 材料科学与工程(可...
    • 241 篇 光学工程
    • 215 篇 仪器科学与技术
    • 174 篇 土木工程
    • 152 篇 建筑学
  • 3,086 篇 理学
    • 1,716 篇 数学
    • 1,134 篇 物理学
    • 505 篇 统计学(可授理学、...
    • 441 篇 生物学
    • 407 篇 系统科学
    • 309 篇 化学
  • 813 篇 管理学
    • 539 篇 管理科学与工程(可...
    • 292 篇 图书情报与档案管...
    • 271 篇 工商管理
  • 338 篇 医学
    • 290 篇 临床医学
    • 254 篇 基础医学(可授医学...
    • 148 篇 公共卫生与预防医...
    • 145 篇 药学(可授医学、理...
  • 142 篇 法学
  • 133 篇 经济学
  • 109 篇 农学
  • 55 篇 教育学
  • 26 篇 文学
  • 17 篇 艺术学
  • 8 篇 军事学

主题

  • 104 篇 machine learning
  • 98 篇 accuracy
  • 92 篇 mathematics
  • 87 篇 computational mo...
  • 80 篇 deep learning
  • 72 篇 training
  • 71 篇 feature extracti...
  • 64 篇 predictive model...
  • 60 篇 convolutional ne...
  • 59 篇 computer science
  • 58 篇 data models
  • 56 篇 educational inst...
  • 55 篇 optimization
  • 53 篇 mathematical mod...
  • 49 篇 internet of thin...
  • 49 篇 nuclear structur...
  • 48 篇 neural networks
  • 44 篇 decision making
  • 43 篇 data mining
  • 42 篇 artificial intel...

机构

  • 110 篇 hubei key labora...
  • 101 篇 school of comput...
  • 96 篇 school of mathem...
  • 95 篇 institut univers...
  • 95 篇 school of comput...
  • 94 篇 north-west unive...
  • 92 篇 national centre ...
  • 88 篇 infn sezione di ...
  • 86 篇 tno technical sc...
  • 86 篇 université de st...
  • 81 篇 nikhef national ...
  • 81 篇 university of jo...
  • 80 篇 infn sezione di ...
  • 79 篇 ncsr demokritos ...
  • 77 篇 school of mathem...
  • 76 篇 infn sezione di ...
  • 73 篇 infn sezione di ...
  • 72 篇 university würzb...
  • 69 篇 university moham...
  • 66 篇 università di ca...

作者

  • 98 篇 ferrara g.
  • 98 篇 ardid m.
  • 96 篇 calvo d.
  • 95 篇 chen a.
  • 86 篇 gal t.
  • 86 篇 bozza c.
  • 84 篇 díaz a.f.
  • 84 篇 boumaaza j.
  • 84 篇 gozzini s.r.
  • 83 篇 coleiro a.
  • 82 篇 dallier r.
  • 82 篇 enzenhöfer a.
  • 79 篇 celli s.
  • 78 篇 boettcher m.
  • 76 篇 carretero v.
  • 76 篇 bendahman m.
  • 75 篇 dornic d.
  • 75 篇 brunner j.
  • 72 篇 ardid s.
  • 71 篇 cherubini s.

语言

  • 5,781 篇 英文
  • 270 篇 其他
  • 32 篇 中文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=School of Engineering Computing and Mathematics"
6082 条 记 录,以下是11-20 订阅
排序:
Relative humidity prediction across the Indian subcontinent using Kumaraswamy distribution based non-Gaussian model
收藏 引用
Environmental Science and Pollution Research 2024年 第59期31卷 66780-66795页
作者: Shad, Mohammad Sharma, Yogeshver Dutt Narula, Pankaj Department of Mathematics and Scientific Computing National Institute of Technology Himachal Pradesh Hamirpur177005 India School of Mathematics Thapar Institute of Engineering & Technology Punjab Patiala147004 India
Relative humidity (RH) significantly influences various aspects of human life, including agriculture, weather prediction, indoor air quality, and energy consumption. Its intricate non-linear behavior poses a significa... 详细信息
来源: 评论
The Conway Circle Theorem: Equivalence and Generalization
收藏 引用
mathematics Magazine 2024年 第1期97卷 58-66页
作者: Ollerton, Richard School of Computing Mathematics and Engineering Charles Sturt University Port Macquarie 2444 NSW Australia
Summary: The elegant and surprising Conway Circle Theorem (CCT) for triangles has become more widely known following the death of its discoverer John Horton Conway (1938–2020). The logical equivalence of the CCT and ... 详细信息
来源: 评论
Multiscale method for identifying and marking the multiform fractures from visible-light rock-mass images
收藏 引用
Underground Space 2024年 第3期16卷 279-300页
作者: Yongbo Pan Junzhi Cui Zhenhao Xu School of Mathematics and Statistics Zhengzhou UniversityZhengzhou 450001China The State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of SciencesBeijing 100190China Geotechnical and Structural Engineering Research Center Shandong UniversityJinan 250100China
Multiform fractures have a direct impact on the mechanical performance of rock *** accurately identify multiform fractures,the distribution patterns of grayscale and the differential features of fractures in their nei... 详细信息
来源: 评论
Users’ Scenario-Base for Analysing Insider Threat Detection Based on User’s Downloads Activity Logs
Users’ Scenario-Base for Analysing Insider Threat Detection...
收藏 引用
Future of Information and Communication Conference, FICC 2024
作者: Padiet, Peter Islam, Rafiqul Khan, M. Arif School of Computing Mathematics and Engineering Charles Sturt University BathurstNSW Australia
The persistence and growth of insider threats pose a significant challenge to the information security community. Malicious insiders have been identified as one of the most detrimental threats to sensitive data includ... 详细信息
来源: 评论
Wireless Channel Estimation using Federated Learning  9
Wireless Channel Estimation using Federated Learning
收藏 引用
9th IEEE International Conference for Convergence in Technology, I2CT 2024
作者: Kaur, Jasneet Khan, M. Arif Charles Sturt University School of Computing Mathematics And Engineering NSW2678 Australia
Contemporary Machine Learning (ML) techniques can now be conveniently applied to the wireless channel estimation problem to reduce the estimation complexity and enhance the system's overall data rate. Traditionall... 详细信息
来源: 评论
Optimizing Zero-Knowledge Proofs for Secure Educational Data Storage on Blockchain  23
Optimizing Zero-Knowledge Proofs for Secure Educational Data...
收藏 引用
23rd International Conference on Machine Learning and Cybernetics, ICMLC 2024
作者: Warman, Dylan Tien, David Kabir, Muhammad Ashad School of Computing Mathematics and Engineering Charles Sturt University BathurstNSW Australia
The security of academic credentials is increasingly at risk due to cyberattacks and credential fraud. Traditional verification systems rely on centralised databases, creating single points of failure and privacy conc... 详细信息
来源: 评论
Feature extraction and learning approaches for cancellable biometrics:A survey
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第1期9卷 4-25页
作者: Wencheng Yang Song Wang Jiankun Hu Xiaohui Tao Yan Li School of Mathematics Physics and ComputingUniversity of Southern QueenslandToowoombaQueenslandAustralia School of Computing Engineering and Mathematical SciencesLa Trobe UniversityMelbourneVictoriaAustralia School of Engineering and Information Technology University of New South Wales at the Australian Defence Force Academy(UNSW@ADFA)CanberraAustralian Capital TerritoryAustralia
Biometric recognition is a widely used technology for user *** the application of this technology,biometric security and recognition accuracy are two important issues that should be *** terms of biometric security,can... 详细信息
来源: 评论
Enhancing Dark Web Surveillance Through Browser Fingerprinting for Monitoring Illegal Activities
Enhancing Dark Web Surveillance Through Browser Fingerprinti...
收藏 引用
2023 IEEE Asia-Pacific Conference on Computer Science and Data engineering, CSDE 2023
作者: Turen, Selahattin Hurol Islam, Rafiqul Eustace, Kenneth Fellows, Geoffrey School of Computing Mathematics & Engineering Charles Sturt University Wagga Wagga Australia School of Computing Mathematics & Engineering Charles Sturt University Albury Australia
This paper provides the latest information on browser fingerprinting issues in the Dark Web. The data analysis has been initiated, and the latest techniques for browser fingerprinting are included. A comparative analy... 详细信息
来源: 评论
Stabilization and Blow-up in an Infinite Memory Wave Equation with Logarithmic Nonlinearity and Acoustic Boundary Conditions
收藏 引用
Journal of Systems Science & Complexity 2024年 第4期37卷 1368-1391页
作者: PENG Qingqing ZHANG Zhifei School of Mathematics and Statistics Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and TechnologyWuhan 430074China
In this paper,the authors consider the stabilization and blow up of the wave equation with infinite memory,logarithmic nonlinearity and acoustic boundary *** authors discuss the existence of global solutions for the i... 详细信息
来源: 评论
SHARP POINTWISE-IN-TIME ERROR ESTIMATE OF L1 SCHEME FOR NONLINEAR SUBDIFFUSION EQUATIONS
收藏 引用
Journal of Computational mathematics 2024年 第3期42卷 662-678页
作者: Dongfang Li Hongyu Qin Jiwei Zhang School of Mathematics and Statistics Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Engineering Modeling and Scientific Computing Huazhong University of Science and TechnologyWuhan 430074China School of Mathematics and Statistics Wuhan UniversityWuhan 430072China
An essential feature of the subdiffusion equations with theα-order time fractional derivative is the weak singularity at the initial *** weak regularity of the solution is usually characterized by a regularity parame... 详细信息
来源: 评论