咨询与建议

限定检索结果

文献类型

  • 3,255 篇 期刊文献
  • 2,901 篇 会议
  • 98 册 图书

馆藏范围

  • 6,254 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,774 篇 工学
    • 1,981 篇 计算机科学与技术...
    • 1,627 篇 软件工程
    • 645 篇 控制科学与工程
    • 602 篇 信息与通信工程
    • 443 篇 电气工程
    • 375 篇 生物工程
    • 353 篇 电子科学与技术(可...
    • 341 篇 力学(可授工学、理...
    • 308 篇 动力工程及工程热...
    • 304 篇 生物医学工程(可授...
    • 276 篇 化学工程与技术
    • 275 篇 机械工程
    • 270 篇 材料科学与工程(可...
    • 244 篇 光学工程
    • 215 篇 仪器科学与技术
    • 181 篇 土木工程
    • 158 篇 建筑学
  • 3,116 篇 理学
    • 1,732 篇 数学
    • 1,146 篇 物理学
    • 505 篇 统计学(可授理学、...
    • 443 篇 生物学
    • 407 篇 系统科学
    • 314 篇 化学
  • 824 篇 管理学
    • 549 篇 管理科学与工程(可...
    • 293 篇 图书情报与档案管...
    • 276 篇 工商管理
  • 341 篇 医学
    • 291 篇 临床医学
    • 254 篇 基础医学(可授医学...
    • 149 篇 公共卫生与预防医...
    • 145 篇 药学(可授医学、理...
  • 141 篇 法学
  • 134 篇 经济学
  • 111 篇 农学
  • 54 篇 教育学
  • 26 篇 文学
  • 17 篇 艺术学
  • 8 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 108 篇 machine learning
  • 100 篇 accuracy
  • 92 篇 mathematics
  • 87 篇 computational mo...
  • 83 篇 artificial intel...
  • 81 篇 deep learning
  • 72 篇 feature extracti...
  • 71 篇 training
  • 65 篇 predictive model...
  • 63 篇 convolutional ne...
  • 59 篇 computer science
  • 59 篇 data models
  • 56 篇 educational inst...
  • 56 篇 optimization
  • 52 篇 mathematical mod...
  • 50 篇 internet of thin...
  • 48 篇 neural networks
  • 48 篇 nuclear structur...
  • 44 篇 decision making
  • 43 篇 data mining

机构

  • 113 篇 hubei key labora...
  • 102 篇 school of comput...
  • 96 篇 school of mathem...
  • 95 篇 institut univers...
  • 94 篇 north-west unive...
  • 94 篇 school of comput...
  • 92 篇 national centre ...
  • 88 篇 infn sezione di ...
  • 86 篇 tno technical sc...
  • 86 篇 université de st...
  • 81 篇 nikhef national ...
  • 81 篇 university of jo...
  • 80 篇 infn sezione di ...
  • 80 篇 school of mathem...
  • 79 篇 ncsr demokritos ...
  • 75 篇 infn sezione di ...
  • 73 篇 infn sezione di ...
  • 72 篇 university würzb...
  • 70 篇 university moham...
  • 66 篇 università di ca...

作者

  • 98 篇 ferrara g.
  • 98 篇 ardid m.
  • 96 篇 calvo d.
  • 95 篇 chen a.
  • 86 篇 gal t.
  • 86 篇 bozza c.
  • 84 篇 díaz a.f.
  • 84 篇 boumaaza j.
  • 84 篇 gozzini s.r.
  • 83 篇 coleiro a.
  • 82 篇 dallier r.
  • 82 篇 enzenhöfer a.
  • 79 篇 celli s.
  • 78 篇 boettcher m.
  • 76 篇 carretero v.
  • 76 篇 bendahman m.
  • 75 篇 dornic d.
  • 75 篇 brunner j.
  • 72 篇 ardid s.
  • 72 篇 cherubini s.

语言

  • 5,811 篇 英文
  • 406 篇 其他
  • 33 篇 中文
  • 2 篇 俄文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
检索条件"机构=School of Engineering Computing and Mathematics"
6254 条 记 录,以下是191-200 订阅
排序:
Global Attention-Guided Dual-Domain Point Cloud Feature Learning for Classification and Segmentation
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第10期5卷 5167-5178页
作者: Li, Zihao Gao, Pan You, Kang Yan, Chuan Paul, Manoranjan Nanjing University of Aeronautics and Astronautics College of Artificial Intelligence Nanjing211106 China George Mason University Creativity and Graphics Lab FairfaxVA22030 United States Charles Sturt University School of Computing Mathematics and Engineering BathurstNSW2795 Australia
Previous studies have demonstrated the effectiveness of point-based neural models on the point cloud analysis task. However, there remains a crucial issue on producing the efficient input embedding for raw point coord... 详细信息
来源: 评论
RSSI ESTIMATION FOR CONSTRAINED INDOOR WIRELESS NETWORKS USING ANN
arXiv
收藏 引用
arXiv 2024年
作者: Arif, Samrah Khan, M. Arif Rehman, Sabih ur School of Computing Mathematics and Engineering Charles Sturt University Australia
In the expanding field of the Internet of Things (IoT), wireless channel estimation is a significant challenge. This is specifically true for low-power IoT (LP-IoT) communication, where efficiency and accuracy are ext... 详细信息
来源: 评论
Cryptanalysis of the SIMON Cypher Using Neo4j
Cryptanalysis of the SIMON Cypher Using Neo4j
收藏 引用
Electrical, Computer and Energy Technologies (ICECET), International Conference on
作者: Jonathan Cook Sabih ur Rehman M. Arif Khan School of Computing Mathematics and Engineering Charles Sturt University Australia
The exponential growth in the number of Internet of Things (IoT) devices has seen the introduction of several Lightweight Encryption Algorithms (LEA). While LEAs are designed to enhance the integrity, privacy and secu... 详细信息
来源: 评论
CRYPTANALYSIS OF THE SIMON CYPHER USING NEO4J
arXiv
收藏 引用
arXiv 2024年
作者: Cook, Jonathan ur Rehman, Sabih Khan, M. Arif School of Computing Mathematics and Engineering Charles Sturt University Australia
The exponential growth in the number of Internet of Things (IoT) devices has seen the introduction of several Lightweight Encryption Algorithms (LEA). While LEAs are designed to enhance the integrity, privacy and secu... 详细信息
来源: 评论
LIGHTWEIGHT CRYPTANALYSIS OF IOT ENCRYPTION ALGORITHMS: IS QUOTA SAMPLING THE ANSWER?
arXiv
收藏 引用
arXiv 2024年
作者: Cook, Jonathan Rehman, Sabih ur Khan, M. Arif School of Computing Mathematics and Engineering Charles Sturt University Australia
Rapid growth in the number of small sensor devices known as the Internet of Things (IoT) has seen the development of lightweight encryption algorithms. Two well-known lightweight algorithms are SIMON and SIMECK which ... 详细信息
来源: 评论
DEEP LEARNING APPROACHES TO INDOOR WIRELESS CHANNEL ESTIMATION FOR LOW-POWER COMMUNICATION
arXiv
收藏 引用
arXiv 2024年
作者: Arif, Samrah Arif Khan, Muhammad Rehman, Sabih ur School of Computing Mathematics and Engineering Charles Sturt University Australia
In the rapidly growing development of the Internet of Things (IoT) infrastructure, achieving reliable wireless communication is a challenge. IoT devices operate in diverse environments with common signal interference ... 详细信息
来源: 评论
Ai-Powered Abnormal Behaviour Detection in Smart Aged Care: Incremental Learning with Minimal User Input
SSRN
收藏 引用
SSRN 2024年
作者: Rahman, Md Geaur ur Rehman, Sabih Debnath, Tanmoy Dahshan, Mostafa Khokhar, Rashid Fuskelay, Aayush Islam, Md Zahidul School of Computing Mathematics and Engineering Charles Sturt University Australia
Given the increasing number of elderly individuals, it's essential to implement multi-device monitoring to keep a record of older adults' Activities of Daily Living (ADL). This approach is crucial for supporti... 详细信息
来源: 评论
Missing Data Recovery for Downstream Learning in Low-Cost Environmental Sensor Networks  9
Missing Data Recovery for Downstream Learning in Low-Cost En...
收藏 引用
9th International Conference on Information Technology Trends, ITT 2023
作者: Agbo, Benjamin Al-Aqrabi, Hussain Alsboui, Tariq Hussain, Muhammad Hill, Richard Keele University School of Computing and Mathematics Keele United Kingdom Higher Colleges of Technology Faculty of Computer Information Science Sharjah United Arab Emirates University of Huddersfield School of Computing and Engineering Huddersfield United Kingdom
The development of low-cost sensor networks (LCSNs) has facilitated the generation of vast amounts of environmental monitoring data in air quality monitoring stations. State-of-the-art research has focused on developi... 详细信息
来源: 评论
Investigation of Heat exchanger performance with delta-wing tape inserts for high Reynolds Number using various machine learning techniques  14
Investigation of Heat exchanger performance with delta-wing ...
收藏 引用
14th International Conference on computing Communication and Networking Technologies, ICCCNT 2023
作者: Rodrigues, Gizelle Srivastava, Neetu Pati, Peeta Basa Amrita Vishwa Vidyapeetham Amrita School of Engineering Dept. of Mathematics Bengaluru India Amrita Vishwa Vidyapeetham Amrita School of Computing Dept. of Computer Science and Engineering Bengaluru India
The present study utilizes the support vector regression (SVR) technique with a cubic kernel to forecast the performance of a double-pipe heat exchanger using T-W tape inserts with wing-width ratios of 0.31, 0.47, and... 详细信息
来源: 评论
GPT-Enabled Cybersecurity Training: A Tailored Approach for Effective Awareness
arXiv
收藏 引用
arXiv 2024年
作者: Al-Dhamari, Nabil Clarke, Nathan School of Engineering Computing & Mathematics University of Plymouth United Kingdom
This study explores the limitations of traditional Cybersecurity Awareness and Training (CSAT) programs and proposes an innovative solution using Generative Pre-Trained Transformers (GPT) to address these shortcomings... 详细信息
来源: 评论