咨询与建议

限定检索结果

文献类型

  • 3,622 篇 会议
  • 2,307 篇 期刊文献
  • 17 册 图书

馆藏范围

  • 5,946 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,595 篇 工学
    • 2,049 篇 计算机科学与技术...
    • 1,650 篇 软件工程
    • 716 篇 信息与通信工程
    • 600 篇 控制科学与工程
    • 571 篇 电气工程
    • 553 篇 电子科学与技术(可...
    • 405 篇 生物工程
    • 361 篇 光学工程
    • 332 篇 机械工程
    • 290 篇 生物医学工程(可授...
    • 259 篇 动力工程及工程热...
    • 253 篇 仪器科学与技术
    • 197 篇 化学工程与技术
    • 149 篇 材料科学与工程(可...
    • 145 篇 交通运输工程
    • 120 篇 土木工程
    • 109 篇 建筑学
  • 1,950 篇 理学
    • 926 篇 数学
    • 610 篇 物理学
    • 451 篇 生物学
    • 291 篇 统计学(可授理学、...
    • 215 篇 系统科学
    • 209 篇 化学
  • 869 篇 管理学
    • 577 篇 管理科学与工程(可...
    • 307 篇 图书情报与档案管...
    • 230 篇 工商管理
  • 281 篇 医学
    • 237 篇 临床医学
    • 180 篇 基础医学(可授医学...
    • 112 篇 药学(可授医学、理...
  • 128 篇 法学
    • 107 篇 社会学
  • 101 篇 经济学
  • 66 篇 农学
  • 50 篇 教育学
  • 19 篇 文学
  • 17 篇 军事学
  • 9 篇 艺术学

主题

  • 130 篇 feature extracti...
  • 97 篇 deep learning
  • 96 篇 computational mo...
  • 86 篇 data mining
  • 86 篇 accuracy
  • 86 篇 training
  • 83 篇 optimization
  • 82 篇 semantics
  • 74 篇 machine learning
  • 71 篇 computer science
  • 63 篇 mathematical mod...
  • 55 篇 neural networks
  • 53 篇 object detection
  • 52 篇 analytical model...
  • 51 篇 wireless sensor ...
  • 51 篇 predictive model...
  • 50 篇 bandwidth
  • 48 篇 reliability
  • 48 篇 computer archite...
  • 47 篇 support vector m...

机构

  • 101 篇 national enginee...
  • 80 篇 school of comput...
  • 75 篇 school of contro...
  • 53 篇 purdue universit...
  • 45 篇 school of comput...
  • 45 篇 national enginee...
  • 43 篇 school of comput...
  • 40 篇 school of optica...
  • 38 篇 school of comput...
  • 38 篇 school of cyber ...
  • 38 篇 state key labora...
  • 36 篇 school of inform...
  • 31 篇 national enginee...
  • 30 篇 department of el...
  • 29 篇 school of electr...
  • 28 篇 school of comput...
  • 27 篇 huazhong univers...
  • 26 篇 school of comput...
  • 26 篇 hubei province k...
  • 25 篇 hubei key labora...

作者

  • 101 篇 hai jin
  • 72 篇 jin hai
  • 31 篇 yang yang
  • 31 篇 mei-ling shyu
  • 31 篇 xiaofei liao
  • 30 篇 hamid soltanian-...
  • 30 篇 shu-ching chen
  • 26 篇 chen shu-ching
  • 26 篇 soltanian-zadeh ...
  • 26 篇 shen linlin
  • 25 篇 robbi rahim
  • 22 篇 f. malek
  • 22 篇 hu shengshan
  • 19 篇 wang xingjun
  • 19 篇 liao xiaofei
  • 19 篇 shyu mei-ling
  • 18 篇 xiao feng
  • 17 篇 deqing zou
  • 17 篇 ai bo
  • 16 篇 shen yulong

语言

  • 5,252 篇 英文
  • 533 篇 其他
  • 147 篇 中文
  • 11 篇 日文
  • 5 篇 朝鲜文
检索条件"机构=School of System and Computer Engineering"
5946 条 记 录,以下是661-670 订阅
排序:
Q-learning Based Meta-Heuristics for Scheduling Bi-Objective Surgery Problems with Setup Time
收藏 引用
Complex system Modeling and Simulation 2024年 第4期4卷 321-338页
作者: Ruixue Zhang Hui Yu Adam Slowik Kaizhou Gao School of Computer Science Liaocheng UniversityLiaocheng 252000China Macao Institute of System Engineering Macao University of Science and TechnologyMacao 999078China the Department of Electronics and Computer Science Koszalin University of TechnologyKoszalin 75-453Poland
Since the increasing demand for surgeries in hospitals,the surgery scheduling problems have attracted extensive *** study focuses on solving a surgery scheduling problem with setup *** a mathematical model is created ... 详细信息
来源: 评论
Comparison of Transformer Based and Traditional Models on Sentiment Analysis on Social Media Datasets
Comparison of Transformer Based and Traditional Models on Se...
收藏 引用
International Conference of computer and Informatics engineering (IC2IE)
作者: Arif Ridho Lubis Yulia Fatmi Deden Witarsyah Department of Computer Engineering and Informatics Politeknik Negeri Medan Medan Indonesia School of Industrial and System Engineering Telkom University Bandung Indonesia
In the field of computers and natural language processing, there is an interesting sub-field, namely sentiment analysis. Currently, the use of social media Twitter to actively communicate between individuals contains ...
来源: 评论
Multiple Sclerosis Detection with Reinforcement Learning and Differential Evolution
Multiple Sclerosis Detection with Reinforcement Learning and...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Yang, Jing Yang, Jin Wu, Chenwei Jiang, Gaozhe Lv, Yaning Liu, Bingyan Xu, Feng Department of Computer System and Technology Universiti Malaya Kuala Lumpur Malaysia Mallinckrodt Institute of Radiology Washington University School of Medicine St. Louis United States Evident Battery Inc. Massachusetts United States Institute of Operations Research and Analytics National University of Singapore Singapore School of Mathematics and Statistics Xi'an University of Electronic Science and Technology Beijing China School of Computer Science Beijing University of Posts and Telecommunications Beijing China School of Engineering and Design Technical University of Munich Munich Germany
Multiple Sclerosis (MS) disrupts nerve communication, potentially leading to permanent damage. Convolutional Neural Networks (CNNs) are commonly recommended to accelerate magnetic resonance imaging (MRI) analysis for ... 详细信息
来源: 评论
Bat Algorithm: A Review on Theory, Modifications and Applications
Bat Algorithm: A Review on Theory, Modifications and Applica...
收藏 引用
Intelligent Cybernetics Technology & Applications (ICICyTA), International Conference on
作者: Hakam Singh Deden Witarsyah Alok Misra Raj Gaurang Tiwari Department of Computer Science and Engineering School of Engineering and Technology Chitkara University Baddi Himachal Paradesh India Information System Departement School of Industrial and System Engineering Telkom University Bandung Indonesia School of Computer Application Lovely Professional University Phagwara Punjab India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
Due to its many applications in a variety of domains, including clustering, cloud computing, and power systems, metaheuristic algorithms have attracted a lot of interest from the scholarly community. By using their se...
来源: 评论
Active Deduction Heuristic Algorithm of Standard Contradiction Separation Rule Based on Reinforcement Learning
Active Deduction Heuristic Algorithm of Standard Contradicti...
收藏 引用
International Conference on Intelligent system and Knowledge engineering, ISKE
作者: Jian Zhong Peiyao Liu Shuwei Chen National-Local Joint Engineering Laboratory of System Credibility Automatic Verification School of Computer and Software Engineering Xihua University Chengdu China
Machine learning has been a prominent research focus in recent years, and integrating machine learning methods into automated theorem provers has become a current trend in theorem proving research. Standard contradict...
来源: 评论
Integration of SDN and Digital Twin for the Intelligent Detection of DoC Attacks in WRSNs
arXiv
收藏 引用
arXiv 2025年
作者: Qaisar, Muhammad Umar Farooq Yuan, Weijie Han, Guangjie Ahmed, Adeel Liu, Chang Piran, Md. Jalil School of Computer Science Northwestern Polytechnical University China School of System Design and Intelligent Manufacturing Southern University of Science and Technology China Department of Internet of Things Engineering Hohai University China School of Computer Science and Technology University of Science and Technology of China China School of Information Engineering Guangdong University of Technology Guangzhou China Department of Computer Science and Engineering Sejong University Seoul05006 Korea Republic of
Wireless rechargeable sensor networks (WRSNs), supported by recent advancements in wireless power transfer (WPT) technology, hold significant potential for extending network lifetime. However, traditional approaches o... 详细信息
来源: 评论
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability in Binary Programs: Precision in Vulnerability Detection: Advanced Slicing Techniques for Binary Program Analysis  7
VulPin: Finer-Grained Slicing for Pinpointing Vulnerability ...
收藏 引用
7th International Conference on computer Science and Artificial Intelligence, CSAI 2023
作者: Chukkol, Abdulrahman Hamman Adama Luo, Senlin Yunusa, Haruna Yusuf, Abdulganiyu Abdu Mohammed, Abulfatahi School of Information and Electronics Beijing Institute of Technology Beijing China Information System and Security and Countermeasures Experimental Center Beijing Institute of Technology Beijing China School of Automation Science and Electrical Engineering Beihang University Beijing China School of Computer Science Beijing Institute of Technology Beijing China School of Management and Information Technology Modibbo Adama University Yola Nigeria
Identifying vulnerabilities in binary code with precision is a critical area of study in the field of software security. Most existing techniques fail to pinpoint the vulnerability's exact location, due to the ext... 详细信息
来源: 评论
A new symbol timing and carrier frequency offset estimation algorithm for OTFS for B5G  2
A new symbol timing and carrier frequency offset estimation ...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational Science, ICERCS 2024
作者: Thangavel, Gunasekaran Rajan, Sheeba Subbulekshmi, S. Anthonisamy, Arun Ganapathi, Rohini Velankanni, Gowri University of Technology and Applied Sciences Department of Electronics and Communication Engineering Muscat Oman SRM Institute of Science and Technology School of Computing Tiruchirapalli India Prathyusha Engineering College Department of Electronics and Communication Engineering Chennai India Panimalar Engineering College Department of Computer Science and Business System Chennai India St. Joseph's Institute of Technology Department of Electronics and Communication Engineering Chennai India K. Ramakrishnan College of Technology Department of Electronics and Communication Engineering Trichy India
In B5G networks, accurate symbol timing estimate and estimation of the carrier frequency offset are both absolutely necessary. Particularly in highly mobile and interference-ridden settings, these factors are of param... 详细信息
来源: 评论
NARX Neural Network Modeling of Batch Distillation Process
NARX Neural Network Modeling of Batch Distillation Process
收藏 引用
11th IEEE International Conference on system engineering and Technology, ICSET 2021
作者: Putri, Adi Novitarini MacHbub, Carmadi Hidayat, Egi Muhammad Idris School of Electrical Engineering and Informatics Institut Teknologi Control Computer System Research Group Bandung Indonesia
The batch distillation model is highly nonlinear due to the influence of mass and composition of the initial material to be separated. It is also caused by the thermodynamics of the system which is not ideal. Therefor... 详细信息
来源: 评论
Optimal-Condition-Based Maintenance of Cold Standby system with Multiple Operating Units and Multiple Standby Units  14
Optimal-Condition-Based Maintenance of Cold Standby System w...
收藏 引用
14th International Conference on Reliability, Maintainability and Safety, ICRMS 2023
作者: Li, Yuxin Zhang, Yongfei Luo, Yuangeng He, Yugang Zhang, Xiaohong Wang, Jinhe School of Economics & Management Taiyuan University of Science & Technology Taiyuan Taiyuan China Division of Industrial and System Engineering Taiyuan University of Science & Technology 030024 China College of Computer Science and Technology Taiyuan University of Science & Technology Taiyuan030024 China
To ensure continuity and security in production processes, a redundancy structure involving multiple units for use and multiple units for standby (MUMS) is typically used. This paper proposes an offline state maintena... 详细信息
来源: 评论