咨询与建议

限定检索结果

文献类型

  • 235 篇 期刊文献
  • 200 篇 会议
  • 7 册 图书

馆藏范围

  • 442 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 294 篇 工学
    • 196 篇 计算机科学与技术...
    • 150 篇 软件工程
    • 50 篇 电气工程
    • 49 篇 信息与通信工程
    • 36 篇 电子科学与技术(可...
    • 36 篇 控制科学与工程
    • 30 篇 生物工程
    • 26 篇 化学工程与技术
    • 20 篇 生物医学工程(可授...
    • 19 篇 机械工程
    • 19 篇 材料科学与工程(可...
    • 15 篇 光学工程
    • 14 篇 动力工程及工程热...
    • 14 篇 安全科学与工程
    • 13 篇 土木工程
    • 11 篇 仪器科学与技术
    • 10 篇 冶金工程
  • 168 篇 理学
    • 92 篇 数学
    • 62 篇 物理学
    • 33 篇 生物学
    • 29 篇 统计学(可授理学、...
    • 21 篇 化学
    • 13 篇 系统科学
  • 85 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 34 篇 医学
    • 28 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
    • 12 篇 药学(可授医学、理...
  • 9 篇 经济学
  • 8 篇 法学
  • 6 篇 教育学
  • 4 篇 农学
  • 3 篇 军事学
  • 2 篇 艺术学
  • 1 篇 文学

主题

  • 18 篇 deep learning
  • 13 篇 security
  • 11 篇 feature extracti...
  • 11 篇 machine learning
  • 10 篇 computational mo...
  • 10 篇 artificial intel...
  • 10 篇 accuracy
  • 7 篇 data models
  • 7 篇 training
  • 6 篇 covid-19
  • 6 篇 big data
  • 6 篇 convolution
  • 6 篇 algorithm design...
  • 5 篇 internet of thin...
  • 5 篇 computer science
  • 5 篇 intrusion detect...
  • 5 篇 data mining
  • 5 篇 predictive model...
  • 5 篇 decision making
  • 5 篇 sentiment analys...

机构

  • 14 篇 school of inform...
  • 8 篇 school of comput...
  • 7 篇 institute of app...
  • 7 篇 school of softwa...
  • 7 篇 school of softwa...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 school of softwa...
  • 5 篇 school of softwa...
  • 5 篇 school of comput...
  • 5 篇 state key labora...
  • 4 篇 department of so...
  • 4 篇 school of softwa...
  • 4 篇 institute of app...
  • 4 篇 department of so...
  • 4 篇 department of so...
  • 4 篇 institute of com...
  • 4 篇 department of ma...
  • 4 篇 college of appli...
  • 4 篇 department of co...

作者

  • 12 篇 liu risheng
  • 9 篇 zeng shangzhi
  • 9 篇 zhang jin
  • 8 篇 astrova irina
  • 7 篇 koschel arne
  • 6 篇 zhen liu
  • 5 篇 cai shaowei
  • 5 篇 sun le
  • 5 篇 jinfeng yang
  • 5 篇 vincent omollo n...
  • 5 篇 wang yiyuan
  • 4 篇 amlan chakrabart...
  • 4 篇 he jinyuan
  • 4 篇 kai shi
  • 4 篇 yang jinfeng
  • 4 篇 praschl christop...
  • 4 篇 leyi wei
  • 4 篇 valentina emilia...
  • 4 篇 fuqiang qiao
  • 4 篇 na lei

语言

  • 419 篇 英文
  • 21 篇 其他
  • 2 篇 中文
检索条件"机构=School of Software and Applied Science and Technology"
442 条 记 录,以下是221-230 订阅
排序:
Ideal type-Ⅱ Weyl points in topological circuits
收藏 引用
National science Review 2021年 第7期8卷 205-210页
作者: Rujiang Li Bo Lv Huibin Tao Jinhui Shi Yidong Chong Baile Zhang Hongsheng Chen Interdisciplinary Center for Quantum Information State Key Laboratory of Modern Optical Instrumentation College of Information Science and Electronic Engineering Zhejiang University ZJU-Hangzhou Global Science and Technology Innovation Center Key Laboratory of Advanced Micro/Nano Electronic Devices & Smart Systems of Zhejiang Zhejiang University Key Laboratory of In-Fiber Integrated Optics of Ministry of Education College of Physics and Optoelectronic Engineering Harbin Engineering University School of Software Engineering Xi'an Jiaotong University Division of Physics and Applied Physics School of Physical and Mathematical Sciences Nanyang Technological University Centre for Disruptive Photonic Technologies Nanyang Technological University
Weyl points(WPs), nodal degenerate points in three-dimensional(3 D) momentum space, are said to be‘ideal' if they are symmetry-related and well-separated, and reside at the same energy and far from nontopological...
来源: 评论
Image-to-Image Translation Based Face Photo De-Meshing Using Gans
SSRN
收藏 引用
SSRN 2023年
作者: Jabbar, Abdul Assam, Muhammad Shloul, Tamara Al Hameed, Hala Abdel Al-Kahtani, Noor Alkahtani, Hend Khalid Ghamry, Nivin A. Tag El Din Bro, Wahii Elsayed M. Amin, Muhammad Shoib College of Computer Science and Technology Zhejiang University Hangzhou310027 China School of Software Engineering East China Normal University Shanghai200050 China Liwa College of Technology College of Business administration United Arab Emirates Khaybar Applied College Taibah University Saudi Arabia Department of Health Information Management and Technology College of Public Health Imam Abdulrahman Bin Faisal University Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh11671 Saudi Arabia Faculty of Computers and Artificial intelligence Cairo University Giza Egypt Faculty of Engineering and Technology Future University New Cairo11835 Egypt
Most of the existing face photo de-meshing methods have accomplished promising results;there are certain quality problems with these methods like the inpainted regions would appear blurry and unpleasant boundaries bec... 详细信息
来源: 评论
A Survey on Explainable Artificial Intelligence for Cybersecurity
arXiv
收藏 引用
arXiv 2023年
作者: Rjoub, Gaith Bentahar, Jamal Wahab, Omar Abdel Mizouni, Rabeb Song, Alyssa Cohen, Robin Otrok, Hadi Mourad, Azzam King Hussein School of Computing Sciences Princess Sumaya University for Technology Jordan Concordia Institute for Information Systems Engineering Concordia University Montreal Canada Department of Computer and Software Engineering Polytechnique Montréal Montréal Canada Electrical Engineering and Computer Science Department Khalifa University Abu Dhabi United Arab Emirates Department of EECS Khalifa University Abu Dhabi United Arab Emirates David R. Cheriton School of Computer Science University of Waterloo Canada Cyber Security Systems and Applied AI Research Center Dept. of CSM Lebanese American University Lebanon Division of Science New York University Abu Dhabi United Arab Emirates
The "black-box" nature of artificial intelligence (AI) models has been the source of many concerns in their use for critical applications. Explainable Artificial Intelligence (XAI) is a rapidly growing resea... 详细信息
来源: 评论
SCMC: Smart city measurement and control process for data security with data mining algorithms
收藏 引用
Measurement: Sensors 2024年 31卷
作者: Selvarajan, Shitharth Manoharan, Hariprasath Goel, Sonali Akili, Chiranjeevi Prakash Murugesan, S. Joshi, Vaishali School of Built Environment Engineering and Computing Leeds Beckett University Leeds LS1 3HE United Kingdom Department of Electronics and Communication Engineering Panimalar Engineering College Poonamallee Tamil Nadu Chennai 600123 India Department of Electrical Engineering ITERSOA Deemed to be University Odisha Bhubaneswar India Software Engineer US Technology International Pvt Ltd India Department of Computer Science and Engineering R.M.D Engineering College Kavaraipettai 601206 India School of CSIT Symbiosis University of Applied Sciences Indore India
In this paper the importance of monitoring smart city with integration of sensors and Internet of Things (IoT) is discussed with establishment of node control process. To describe the feature of smart cities time meas... 详细信息
来源: 评论
A biometric and physically unclonable function–Based authentication protocol for payload exchanges in internet of drones
收藏 引用
e-Prime - Advances in Electrical Engineering, Electronics and Energy 2024年 7卷
作者: Nyangaresi, Vincent Omollo Al-Joboury, Istabraq M. Al-sharhanee, Kareem Ali Najim, Ali Hamzah Abbas, Ali Hashim Hariz, Hussein Muhi Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and Technology Bondo 40601 Kenya Department of Applied Electronics Saveetha School of Engineering SIMATS Tamilnadu Chennai India Department of Medical Instruments Technical Engineering Al-Bayan University Technical College of Engineering Iraq Department of Communication Technical Engineering College of Engineering Techniques Al-Farahidi University Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Iraq College of Information Technology Imam Ja'afar Al-Sadiq University Al-Muthanna 66002 Iraq Department of Computer Techniques Engineering Mazaya University College Dhi-Qar Annasiriyah 64001 Iraq
Internet of Drones (IoD) has been deployed in numerous military and civilian domains to offer services such as target surveillance, traffic monitoring, disaster handling and environmental monitoring. However, message ... 详细信息
来源: 评论
A Feature Subset Selection Method Based on the Combination of PCA and Improved GA
A Feature Subset Selection Method Based on the Combination o...
收藏 引用
International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI)
作者: Yinghao Li Kai Shi Fuqiang Qiao Hongyu Luo School of Computer Science and Engineering Tianjin University of Technology China College of Software and Communication Tianjin Sino-German University of Applied Sciences China
Nowadays, intrusion detection data has redundant features, which leads to unsatisfactory detection results. This paper proposes a feature selection method based on the combination of principal component analysis (PCA)... 详细信息
来源: 评论
Text Mining A Decade Of Focal Development Trends In An African Country
Text Mining A Decade Of Focal Development Trends In An Afric...
收藏 引用
International Conference on Wavelet Active Media technology and Information Processing (ICWAMTIP)
作者: Opoku-Mensah Nelson Qin Zhiguang Gyamfi Enoch Opanin Danso Juliana Mantebea Nyame Gabriel School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu St. Monica's College of Education Mampong Ghana C.K. Tedam University of Technology and Applied Sciences Navrongo Ghana Akenten Appiah-Menka University of Skills Training and Entrepreneurial Development Kumasi Ghana
This paper identified the emerging developmental trends of Ghana, an African country, based on online and offline textual, video and audio data sources from 2008 to 2018. In all, about 9,501 text files were collected ... 详细信息
来源: 评论
Quantum Linear System Solvers: A Survey of Algorithms and Applications
arXiv
收藏 引用
arXiv 2024年
作者: Morales, Mauro E.S. Pira, Lirandë Schleich, Philipp Koor, Kelvin Costa, Pedro C.S. An, Dong Aspuru-Guzik, Alán Lin, Lin Rebentrost, Patrick Berry, Dominic W. Joint Center for Quantum Information and Computer Science University of Maryland United States Centre for Quantum Software and Information University of Technology Sydney Australia Centre for Quantum Technologies National University of Singapore Singapore Department of Computer Science University of Toronto Canada Vector Institute for Artificial Intelligence Toronto Canada ContinoQuantum Sydney Australia Beijing International Center for Mathematical Research Peking University Beijing China Department of Chemistry University of Toronto Canada Canadian Institute for Advanced Research Toronto Canada Acceleration Consortium Toronto Canada Department of Chemical Engineering & Applied Chemistry University of Toronto Toronto Canada Department of Materials Science & Engineering University of Toronto Toronto Canada Lebovic Fellow Canadian Institute for Advanced Research Toronto Canada Department of Mathematics University of California Berkeley United States Applied Mathematics and Computational Research Division Lawrence Berkeley National Laboratory Berkeley United States Department of Computer Science National University of Singapore Singapore School of Mathematical and Physical Sciences Macquarie University Sydney Australia
Solving linear systems of equations plays a fundamental role in numerous computational problems from different fields of science. The widespread use of numerical methods to solve these systems motivates investigating ... 详细信息
来源: 评论
Utilising physics-guided deep learning to overcome data scarcity
arXiv
收藏 引用
arXiv 2022年
作者: Bai, Jinshuai Alzubaidi, Laith Wang, Qingxia Kuhl, Ellen Bennamoun, Mohammed Gu, Yuantong School of Mechanical Medical and Process Engineering Queensland University of Technology BrisbaneQLD4000 Australia ARC Industrial Transformation Training Centre -Joint Biomechanics Queensland University of Technology BrisbaneQLD4000 Australia Centre for Applied Climate Sciences University of Southern Queensland ToowoombaQLD4305 Australia School of Civil Engineering The University of Queensland BrisbaneQLD4072 Australia Department of Mechanical Engineering Stanford University StanfordCA United States Department of Computer Science and Software Engineering The University of Western Australia PerthWA Australia
Deep learning (DL) relies heavily on data, and the quality of data influences its performance significantly. However, obtaining high-quality, well-annotated datasets can be challenging or even impossible in many real-... 详细信息
来源: 评论
Strong Shadow Removal of Text Document Images Based on Background Estimation and Shading Scale
Strong Shadow Removal of Text Document Images Based on Backg...
收藏 引用
International Conference on Informative and Cybernetics for Computational Social Systems (ICCSS)
作者: Bingshu Wang Shuang Feng C.L. Philip Chen School of Software Northwestern Polytechnical University Taicang Campus Suzhou China School of Applied Mathematics Research Center for Applied Mathematics and Interdisciplinary Science Beijing Normal University Zhuhai China School of Computer Science and Engineering South China University of Technology Guangzhou China Faculty of Science and Technology University of Macau Macau China
Shadows may bring uncomfortable perception when taking text document images. Previous work mainly focuses on weak shadow removal issue. However, strong shadow removal is still a challenging task. This paper proposes a... 详细信息
来源: 评论