咨询与建议

限定检索结果

文献类型

  • 235 篇 期刊文献
  • 200 篇 会议
  • 7 册 图书

馆藏范围

  • 442 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 294 篇 工学
    • 196 篇 计算机科学与技术...
    • 150 篇 软件工程
    • 50 篇 电气工程
    • 49 篇 信息与通信工程
    • 36 篇 电子科学与技术(可...
    • 36 篇 控制科学与工程
    • 30 篇 生物工程
    • 26 篇 化学工程与技术
    • 20 篇 生物医学工程(可授...
    • 19 篇 机械工程
    • 19 篇 材料科学与工程(可...
    • 15 篇 光学工程
    • 14 篇 动力工程及工程热...
    • 14 篇 安全科学与工程
    • 13 篇 土木工程
    • 11 篇 仪器科学与技术
    • 10 篇 冶金工程
  • 168 篇 理学
    • 92 篇 数学
    • 62 篇 物理学
    • 33 篇 生物学
    • 29 篇 统计学(可授理学、...
    • 21 篇 化学
    • 13 篇 系统科学
  • 85 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 34 篇 医学
    • 28 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
    • 12 篇 药学(可授医学、理...
  • 9 篇 经济学
  • 8 篇 法学
  • 6 篇 教育学
  • 4 篇 农学
  • 3 篇 军事学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 18 篇 deep learning
  • 13 篇 security
  • 11 篇 feature extracti...
  • 11 篇 machine learning
  • 10 篇 computational mo...
  • 10 篇 artificial intel...
  • 10 篇 accuracy
  • 7 篇 data models
  • 7 篇 training
  • 6 篇 covid-19
  • 6 篇 big data
  • 6 篇 convolution
  • 6 篇 algorithm design...
  • 5 篇 internet of thin...
  • 5 篇 computer science
  • 5 篇 intrusion detect...
  • 5 篇 data mining
  • 5 篇 predictive model...
  • 5 篇 decision making
  • 5 篇 sentiment analys...

机构

  • 14 篇 school of inform...
  • 8 篇 school of comput...
  • 7 篇 institute of app...
  • 7 篇 school of softwa...
  • 7 篇 school of softwa...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 school of softwa...
  • 5 篇 school of softwa...
  • 5 篇 school of comput...
  • 5 篇 state key labora...
  • 4 篇 department of so...
  • 4 篇 school of softwa...
  • 4 篇 institute of app...
  • 4 篇 department of so...
  • 4 篇 department of so...
  • 4 篇 institute of com...
  • 4 篇 department of ma...
  • 4 篇 college of appli...
  • 4 篇 department of co...

作者

  • 12 篇 liu risheng
  • 9 篇 zeng shangzhi
  • 9 篇 zhang jin
  • 8 篇 astrova irina
  • 7 篇 koschel arne
  • 6 篇 zhen liu
  • 5 篇 cai shaowei
  • 5 篇 sun le
  • 5 篇 jinfeng yang
  • 5 篇 vincent omollo n...
  • 5 篇 wang yiyuan
  • 4 篇 amlan chakrabart...
  • 4 篇 he jinyuan
  • 4 篇 kai shi
  • 4 篇 yang jinfeng
  • 4 篇 praschl christop...
  • 4 篇 leyi wei
  • 4 篇 valentina emilia...
  • 4 篇 fuqiang qiao
  • 4 篇 na lei

语言

  • 419 篇 英文
  • 21 篇 其他
  • 2 篇 中文
检索条件"机构=School of Software and Applied Science and Technology"
442 条 记 录,以下是171-180 订阅
排序:
A Generalized Non-local Quasicontinuum Approach for Efficient Modeling of Architected Truss-based Lattice Structures
arXiv
收藏 引用
arXiv 2025年
作者: Li, Zi Yang, Fan Yang, Qingcheng Shanghai Key Laboratory of Mechanics in Energy Engineering School of Mechanics and Engineering Science Shanghai Institute of Applied Mathematics and Mechanics Shanghai University Shanghai China School of Aerospace Engineering and Applied Mechanics Tongji University Shanghai China Key Laboratory of AI-Aided Airworthiness of Civil Aircraft Structures Civil Aviation Administration of China Tongji University Shanghai China State Key Laboratory of Structural Analysis Optimization and CAE Software for Industrial Equipment Dalian University of Technology Dalian China Shanghai Institute of Aircraft Mechanics and Control Shanghai China
To mitigate the substantial computational costs associated with modeling the mechanical behavior of large-scale architected lattice structures, this work introduces a concurrent multiscale approach: the Generalized No... 详细信息
来源: 评论
A Crossover Algebra for Solving Minimum Spanning Tree in Network Design with Diameter Constraints
A Crossover Algebra for Solving Minimum Spanning Tree in Net...
收藏 引用
作者: Ziyi Wang Kai Shi Fuqiang Qiao Huanran Li School of Computer Science and Engineering Tianjin University of Technology College of Software and Communications Tianjin Sino-German University of Applied Sciences Tianjin
The minimum spanning tree problem with diameter constraint is an important problem for many applications such as network design and reliability. The diameter constraint makes it be different from the common minimum sp...
来源: 评论
Optimization Design and Implementation of Intelligent Diagnosis System for AFC Equipment Fault Detection
Optimization Design and Implementation of Intelligent Diagno...
收藏 引用
作者: Zhao-cheng WANG School of Software and Applied Science and Technology Zhengzhou University
In view of the problems faced by the operation and maintenance of subway AFC system, such as the distribution of stations, the large number of equipment repairs and the difficulty of fault analysis and diagnosis. On t... 详细信息
来源: 评论
Intelligent predictor using cancer-related biologically information extraction from cancer transcriptomes  4
Intelligent predictor using cancer-related biologically info...
收藏 引用
4th IEEE International Symposium on Recent Advances in Electrical Engineering and Computer sciences, RAEE and CS 2020
作者: Shehzadi, Tahira Majid, Abdul Hameed, Madiha Farooq, Aqeel Yousaf, Aqsa Pakistan Institute of Engineering and Applied Sciences Department of computer science Islamabad Pakistan Swinburne University of Technology School of Software and Electrical Engineering VIC3122 Australia
This research includes cancer transcriptome which comprises of modifications in envoi RNAs while cancer genome involves DNA based alterations such as gene duplication and point mutations. Collectively, genome and tran... 详细信息
来源: 评论
Intrusion Detection Mechanism Based on Modular Neural Network  2
Intrusion Detection Mechanism Based on Modular Neural Networ...
收藏 引用
2nd International Conference on Machine Learning, Big Data and Business Intelligence, MLBDBI 2020
作者: Luo, Hongyu Shi, Kai Qiao, Fuqiang Li, Yinghao Tianjin University of Technology School of Computer Science and Engineering Tianjin China Tianjin Sino-German University of Applied Sciences College of Software and Communications Tianjin China
Nowadays, the complexity and diversity of network security issues have caused intrusion detection to become an important research topic. Aiming at the problems of traditional intrusion detection mechanisms, the modula... 详细信息
来源: 评论
Developing Eye Tracking Exercise System for Treatment of Lazy Eye
Developing Eye Tracking Exercise System for Treatment of Laz...
收藏 引用
Medical Technologies National Conference (TIPTEKNO)
作者: Kaan Kurtel Melahat Kizil Umuthan Ercan Suzan E. Ozsimsek Hasan Baris Mihci Department of Software Engineering Izmir University of Economics Balcova Izmir Turkey Izmir University of Economics Paramedic Program Vocational School of Health Services Luleå University of Technology MSc. Student in Applied Artificial Intelligence E-commerce Project Manager Macquarie University MSc. Student in Data Science
The aim of this study is to develop a fun and effective computer application game for children with amblyopia and to prevent eye strain in people whose work or lifestyle involves constantly looking at screens. The mai...
来源: 评论
〈qo|op〉: A quantum object optimizer
收藏 引用
softwareX 2024年 26卷
作者: Hai, Vu Tuan Viet, Nguyen Tan Ho, Le Bin Faculty of Software Engineering University of Information Technology Ho Chi Minh 70000 Viet Nam Vietnam National University Ho Chi Minh 70000 Viet Nam Nara Institute of Science and Technology 8916–5 Takayama-cho Ikoma Nara630-0192 Japan FPT University Hanoi Viet Nam Frontier Research Institute for Interdisciplinary Sciences Tohoku University Sendai 980-8578 Japan Department of Applied Physics Graduate School of Engineering Tohoku University Sendai 980-8578 Japan
The quantum object optimizer (〈qo|op〉) is a Python library that offers a framework for optimizing quantum circuits to represent quantum objects such as quantum states and Hamiltonians. This optimizer is a quantum comp... 详细信息
来源: 评论
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack Tree and Fuzzy Logic
Fuzzy Attack Tree: Assessing Cyberattack Risk Using Attack T...
收藏 引用
International Conference on ICT in Business Industry & Government (ICTBIG)
作者: Nitin Naik Paul Jenkins Paul Grace Dishita Naik Jingping Song Shaligram Prajapat Durgesh Mishra Longzhi Yang Tossapon Boongoen Natthakan Iam-On School of Informatics and Digital Engineering Aston University United Kingdom Cardiff School of Technologies Cardiff Metropolitan University United Kingdom Birmingham City University United Kingdom Software College Northeastern University China International Institute of Professional Studies Devi Ahilya University India School of Computer Science & Information Technology Symbiosis University of Applied Sciences India Department of Computer and Information Sciences Northumbria University United Kingdom Department of Computer Science Aberystwyth University United Kingdom
Organisations and users have been experiencing significant rises in cyberattacks and their severity, which means that they require a greater awareness and understanding of the anatomy of cyberattacks, to prevent and m...
来源: 评论
Assessing the magnetic order dependent γ-surface of Cr-Co-Ni alloys
收藏 引用
Journal of Materials science & technology 2021年 第21期80卷 66-74页
作者: Zhibiao Yang Song Lu Yanzhong Tian Zijian Gu Huahai Mao Jian Sun Levente Vitos Shanghai Key Laboratory of Advanced High-Temperature Materials and Precision Forming School of Materials Science and EngineeringShanghai Jiao Tong UniversityShanghai 200240China Applied Materials Physics Department of Materials Science and EngineeringRoyal Institute of TechnologyStockholm SE-10044Sweden Key Laboratory for Anisotropy and Texture of Materials(Ministry of Education) School of Materials Science and EngineeringNortheastern UniversityShenyang 110819China Unit of Structures Department of Materials Science and EngineeringKTHSE-10044StockholmSweden Thermo-Calc Software Råsundav.18SE-16767SolnaSweden Division of Materials Theory Department of Physics and Materials ScienceUppsala UniversityP.O.Box 516Uppsala SE-75120Sweden Research Institute for Solid State Physics and Optics Wigner Research Center for PhysicsBudapest H-1525P.O.Box 49Hungary
In order to efficiently explore the nearly infinite composition space in multicomponent solid solution alloys for reaching higher mechanical performance,it is important to establish predictive design strategies using ... 详细信息
来源: 评论
Fusion Dilated CNN for Encrypted Web Traffic Classification
收藏 引用
International Journal of Network Security 2022年 第4期24卷 733-740页
作者: Appiah, Benjamin Sackey, Anthony Kingsley Kwabena, Owusu-Agyemang Kanpogninge, Ansuura JohnBosco Aristotle Buah, Peter Antwi Department of Computer Science Ho Technical University1 Ho Volta Region Ghana School of Information and Software Engineering University of Electronic Science and Technology of China China C. K. Tedam University of Technology Applied Sciences Ghana Department of Civil Engineering Southwest Jiaotong University China
A Growing number of conventional Convolutional neural network (CNN) models have been employed for encrypted web traffic characterization. However, the application of CNN models is confronted with two significant chall... 详细信息
来源: 评论