咨询与建议

限定检索结果

文献类型

  • 889 篇 会议
  • 675 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,566 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 973 篇 工学
    • 595 篇 计算机科学与技术...
    • 513 篇 软件工程
    • 210 篇 控制科学与工程
    • 174 篇 信息与通信工程
    • 137 篇 电气工程
    • 118 篇 生物工程
    • 113 篇 机械工程
    • 97 篇 生物医学工程(可授...
    • 92 篇 电子科学与技术(可...
    • 88 篇 光学工程
    • 72 篇 化学工程与技术
    • 72 篇 交通运输工程
    • 63 篇 仪器科学与技术
    • 48 篇 安全科学与工程
    • 40 篇 土木工程
    • 39 篇 动力工程及工程热...
  • 608 篇 理学
    • 283 篇 数学
    • 174 篇 物理学
    • 156 篇 生物学
    • 103 篇 统计学(可授理学、...
    • 79 篇 化学
    • 70 篇 系统科学
  • 263 篇 管理学
    • 167 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 127 篇 医学
    • 105 篇 临床医学
    • 80 篇 基础医学(可授医学...
    • 45 篇 公共卫生与预防医...
    • 44 篇 药学(可授医学、理...
  • 42 篇 经济学
    • 42 篇 应用经济学
  • 40 篇 法学
  • 28 篇 农学
  • 27 篇 教育学
  • 6 篇 军事学
  • 3 篇 文学
  • 3 篇 艺术学

主题

  • 39 篇 feature extracti...
  • 31 篇 training
  • 27 篇 computational mo...
  • 25 篇 accuracy
  • 24 篇 deep learning
  • 23 篇 object detection
  • 23 篇 image segmentati...
  • 23 篇 semantics
  • 22 篇 data mining
  • 19 篇 predictive model...
  • 18 篇 visualization
  • 17 篇 optimization
  • 16 篇 genetic algorith...
  • 16 篇 forecasting
  • 14 篇 reinforcement le...
  • 13 篇 support vector m...
  • 13 篇 three-dimensiona...
  • 13 篇 contrastive lear...
  • 13 篇 analytical model...
  • 13 篇 students

机构

  • 130 篇 school of comput...
  • 105 篇 hubei province k...
  • 47 篇 hubei province k...
  • 29 篇 science and tech...
  • 19 篇 wuhan university...
  • 19 篇 university of ch...
  • 19 篇 national enginee...
  • 17 篇 hubei key labora...
  • 16 篇 school of comput...
  • 15 篇 school of cyber ...
  • 15 篇 school of transp...
  • 14 篇 college of compu...
  • 12 篇 department of st...
  • 11 篇 school of system...
  • 11 篇 department of co...
  • 11 篇 school of contro...
  • 10 篇 institute of rob...
  • 10 篇 shenzhen institu...
  • 10 篇 department of au...
  • 10 篇 school of inform...

作者

  • 20 篇 zhang xiaolong
  • 19 篇 meyliana
  • 18 篇 xiaolong zhang
  • 17 篇 li peng
  • 16 篇 xu xin
  • 14 篇 xiaoli lin
  • 13 篇 liu jun
  • 13 篇 zhang kai
  • 13 篇 lin xiaoli
  • 12 篇 dina fitria mura...
  • 12 篇 gaol ford lumban
  • 12 篇 yang yang
  • 12 篇 yaya heryadi
  • 12 篇 gao fei
  • 12 篇 shen linlin
  • 12 篇 liu fan
  • 12 篇 peng li
  • 12 篇 guo shuxiang
  • 11 篇 druzdzel marek j...
  • 11 篇 ai bo

语言

  • 1,429 篇 英文
  • 103 篇 其他
  • 31 篇 中文
  • 2 篇 日文
检索条件"机构=School of Information Science and Intelligent System Program"
1566 条 记 录,以下是171-180 订阅
排序:
Task Priority Aware Incentive Mechanism with Reward Privacy-Preservation in Mobile Crowdsensing  25
Task Priority Aware Incentive Mechanism with Reward Privacy-...
收藏 引用
25th IEEE International Conference on Computer Supported Cooperative Work in Design, CSCWD 2022
作者: Wang, Jiahu Li, Peng Huang, Weiyi Chen, Zeqiang Nie, Lei Wuhan University of Science and Technology School of Computer Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing Real-Time Industrial System China
In mobile crowdsensing, there are generally two types of tasks, popular tasks, and unpopular tasks. For popular tasks, many people can perform that task, and the budget is overallocated. For unpopular tasks, fewer or ... 详细信息
来源: 评论
Cascaded mixed pyramid pooling for surface defect segmentation in solid oxide fuel cell  3
Cascaded mixed pyramid pooling for surface defect segmentati...
收藏 引用
3rd International Conference on Electronic information Engineering, Big Data, and Computer Technology, EIBDCT 2024
作者: Wang, Yaokun Fu, Xiaowei Li, Xi Xu, Wei College of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Hubei Wuhan430065 China School of Artificial Intelligence and Automation Huazhong University of Science and Technology Hubei Wuhan430074 China
To address the issues of defect leakage and mis-segmentation in the surface defect segmentation of solid oxide fuel cells, we propose a cascaded mixed pyramid pooling segmentation method. In the encoding part, attenti... 详细信息
来源: 评论
Detect Areas of Upward and Downward Fluctuations in Bitcoin Prices Using Patterned Datasets  9
Detect Areas of Upward and Downward Fluctuations in Bitcoin ...
收藏 引用
9th IEEE information Technology International Seminar, ITIS 2023
作者: Parlika, Rizky Mustafid Rahmat, Basuki Pascasarjana School Diponegoro University Department of Doctoral Program of Information System Semarang Indonesia University of Pembangunan Nasional 'Veteran' Jawa Timur Department of Informatics Faculty of Computer Science Surabaya Indonesia
Many researchers have proposed various theories and techniques to estimate the value of Bitcoin. However, there is still a great opportunity to suggest a new approach to Bitcoin forecasting. This research will examine... 详细信息
来源: 评论
Bibliometric Analysis of Trends and Directions in Machine Learning Applied to FinTech  4
Bibliometric Analysis of Trends and Directions in Machine Le...
收藏 引用
4th International Conference on Electronic and Electrical Engineering and intelligent system, ICE3IS 2024
作者: Arif, Erman Suherman, Suherman Widodo, Aris Puji Doctoral Program of Information System School of Postgraduate Studies Diponegoro University Semarang Indonesia Diponegoro University Faculty of Engineering Department of Chemical Engineering Semarang Indonesia Diponegoro University Faculty of Science and Mathematics Department of Informatics Semarang Indonesia
Our article presents a comprehensive analysis of trends and directions in the application of machine learning in the FinTech sector. By utilizing data from academic databases such as Scopus, our objective is to showca... 详细信息
来源: 评论
Use of E-Wallet as a Substitute for Physical Money in Transactions at Malls  4th
Use of E-Wallet as a Substitute for Physical Money in Transa...
收藏 引用
4th International Conference on Inventive Computation and information Technologies, ICICIT 2022
作者: Kurniawan, Achmad Rizky Imam, Rafif Zhalifunnas, Rifqi Farhan Putra, Armando Rama Gaol, Ford Lumban Matsuo, Tokuro School of Information System Bina Nusantara University Alam Sutera Jakarta Indonesia Binus Graduate Program—Doctor of Computer Science Jakarta Indonesia Advanced Institute of Industrial Technology Tokyo Japan
Several challenges have emerged as a result of the rapid spread of Covid-19 in Indonesia. To combat the pandemic, the government has also issued general guidelines for avoiding/limiting direct contact with common peop... 详细信息
来源: 评论
Differentiator-Based Adaptive H8 Tracking Control of Fully Actuated systems  3
Differentiator-Based Adaptive H8 Tracking Control of Fully A...
收藏 引用
3rd Conference on Fully Actuated system Theory and Applications, FASTA 2024
作者: Feng, Yuxin Li, Zhiqiang Liu, Yang He, Zhaoshui Li, Hongyi Guangdong University of Technology School of Automation Guangdong Provincial Key Laboratory of Intelligent Decision and Cooperative Control Guangzhou510006 China Qingdao University of Science and Technology School of Automation and Electronics Engineering Qingdao266061 China Guangdong University of Technology School of Automation Guangzhou510006 China Key Laboratory for IoT Intelligent Information Processing and System Integration of Ministry of Education Guangzhou510006 China
This article addresses an adaptive tracking control problem for uncertain high-order fully actuated (HOFA) systems with unknown parameters and disturbances. Under the framework of backstepping, the unknown parameter i... 详细信息
来源: 评论
Linkedin's Influence on User Success in The Professional World  9
Linkedin's Influence on User Success in The Professional Wor...
收藏 引用
9th International Conference on ICT for Smart Society, ICISS 2022
作者: Oktavia, Tanty Roekman, Faza Fakhriansyah Putera, Muhammad Ikhsan Hidayah, Muhammad Alif Rafi, Muhammad Hosoda, Takaaki Gaol, Ford Lumban BINUS Graduate Program Information System Management Bina Nusantara University Information System Management Department Jakarta Indonesia School of Information Systems Bina Nusantara University Information System Department Jakarta Indonesia Advanced Institute of Industrial Technology Decision Science Department Tokyo Japan BINUS Graduate Program Bina Nusantara University Computer Science Department Jakarta Indonesia
Social media has now become a place for others to exchange information in the form of writing, photos, videos, and audio. Social media has become a place for humans to interact from all over the world. In the use of s... 详细信息
来源: 评论
Robust tensor decomposition via orientation invariant tubal nuclear norms
收藏 引用
science China(Technological sciences) 2022年 第6期65卷 1300-1317页
作者: WANG AnDong ZHAO QiBin JIN Zhong LI Chao ZHOU GuoXu School of Automation Guangdong University of TechnologyGuangzhou 510006China School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China Tensor Learning Team RIKEN Center for Advanced Intelligence ProjectTokyo 103-0027Japan Key Laboratory of Intelligent Perception and System for High-Dimensional Information Ministry of EducationNanjing 210094China Key Laboratory of Intelligent Detection and the Internet of Things in Manufacturing Ministry of EducationGuangzhou 510006China
Aiming at recovering an unknown tensor(i.e.,multi-way array)corrupted by both sparse outliers and dense noises,robust tensor decomposition(RTD)serves as a powerful pre-processing tool for subsequent tasks like classif... 详细信息
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Interior Scene intelligent Generated for Smart Homes Based on GAN-ID Algorithms
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第2期9卷 1046-1055页
作者: Zhang, Fu-Quan Ma, Lin-Juan Zhou, Jun-Xian Wang, Run-Hong Zhang, Guang-Zhen College of Computer and Control Engineering Minjiang University Fuzhou China Digital Media Art Key Laboratory of Sichuan Province Sichuan Conservatory of Music Chengdu China Fuzhou Technology Innovation Center of Intelligent Manufacturing Information System Minjiang University Fuzhou China Fujian Province University Fuzhou China School of Computer Science and Technology Beijing Institute of Technology Beijing China Minjiang University Fuzhou China Information Media School of Tianjin Technician Institute of Mechanical & Electrical Technology Tianjin China
The purpose of this paper is to present a new GAN-ID algorithm to gener-ate interior scene intelligently based on Artificial Intelligence of Things (AIoT). Although great progress has been made when GAN algorithm appl... 详细信息
来源: 评论