咨询与建议

限定检索结果

文献类型

  • 705 篇 期刊文献
  • 528 篇 会议
  • 17 册 图书

馆藏范围

  • 1,250 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 793 篇 工学
    • 561 篇 计算机科学与技术...
    • 463 篇 软件工程
    • 194 篇 信息与通信工程
    • 111 篇 电气工程
    • 108 篇 生物工程
    • 106 篇 控制科学与工程
    • 73 篇 生物医学工程(可授...
    • 69 篇 电子科学与技术(可...
    • 57 篇 光学工程
    • 39 篇 仪器科学与技术
    • 38 篇 机械工程
    • 37 篇 安全科学与工程
    • 36 篇 化学工程与技术
    • 34 篇 网络空间安全
    • 27 篇 交通运输工程
    • 26 篇 动力工程及工程热...
  • 472 篇 理学
    • 231 篇 数学
    • 126 篇 生物学
    • 108 篇 物理学
    • 95 篇 统计学(可授理学、...
    • 48 篇 系统科学
    • 47 篇 化学
  • 253 篇 管理学
    • 157 篇 管理科学与工程(可...
    • 103 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 98 篇 医学
    • 79 篇 临床医学
    • 66 篇 基础医学(可授医学...
    • 43 篇 公共卫生与预防医...
    • 37 篇 药学(可授医学、理...
  • 43 篇 法学
    • 36 篇 社会学
  • 24 篇 经济学
  • 24 篇 农学
  • 5 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 40 篇 deep learning
  • 38 篇 machine learning
  • 35 篇 accuracy
  • 32 篇 predictive model...
  • 30 篇 training
  • 25 篇 computational mo...
  • 25 篇 artificial intel...
  • 24 篇 reinforcement le...
  • 21 篇 convolutional ne...
  • 20 篇 data models
  • 19 篇 forecasting
  • 18 篇 internet of thin...
  • 18 篇 optimization
  • 18 篇 data mining
  • 18 篇 feature extracti...
  • 18 篇 federated learni...
  • 17 篇 security
  • 16 篇 neural networks
  • 16 篇 analytical model...
  • 15 篇 decision making

机构

  • 24 篇 school of comput...
  • 20 篇 college of compu...
  • 19 篇 university of ch...
  • 16 篇 laboratory for b...
  • 14 篇 school of comput...
  • 13 篇 pillar of inform...
  • 13 篇 science and tech...
  • 12 篇 shenzhen researc...
  • 11 篇 school of comput...
  • 10 篇 college of infor...
  • 10 篇 school of data s...
  • 10 篇 school of comput...
  • 9 篇 national institu...
  • 9 篇 key laboratory o...
  • 9 篇 the pillar of in...
  • 9 篇 school of intell...
  • 9 篇 intelligent inte...
  • 8 篇 faculty of educa...
  • 8 篇 japan atomic ene...
  • 8 篇 shonan institute...

作者

  • 33 篇 niyato dusit
  • 27 篇 xiong zehui
  • 18 篇 kang jiawen
  • 17 篇 du hongyang
  • 11 篇 dan feng
  • 10 篇 brown donald e.
  • 9 篇 uchida hiroyuki
  • 9 篇 kilbourne caroli...
  • 9 篇 tamura keisuke
  • 9 篇 okajima takashi
  • 9 篇 pottschmidt katj...
  • 9 篇 murakami hiroshi
  • 9 篇 markevitch maxim
  • 9 篇 yamaguchi hiroya
  • 9 篇 watanabe shin
  • 9 篇 loewenstein mich...
  • 9 篇 hornschemeier an...
  • 9 篇 enoto teruaki
  • 9 篇 tanimoto atsushi
  • 9 篇 terashima yuichi

语言

  • 904 篇 英文
  • 333 篇 其他
  • 13 篇 中文
  • 3 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Systems and Information Engineering Data Science"
1250 条 记 录,以下是691-700 订阅
排序:
Efficient Meta Neural Heuristic for Multi-Objective Combinatorial Optimization
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Jinbiao Wang, Jiahai Zhang, Zizhen Cao, Zhiguang Ye, Te Chen, Siyuan School of Computer Science and Engineering Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Sun Yat-sen University China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China School of Computing and Information Systems Singapore Management University Singapore
Recently, neural heuristics based on deep reinforcement learning have exhibited promise in solving multi-objective combinatorial optimization problems (MOCOPs). However, they are still struggling to achieve high learn... 详细信息
来源: 评论
An Auto-Parallel Method for Deep Learning Models Based on Genetic Algorithm  29
An Auto-Parallel Method for Deep Learning Models Based on Ge...
收藏 引用
29th IEEE International Conference on Parallel and Distributed systems, ICPADS 2023
作者: Zeng, Yan Huang, Chengchuang Ni, Yijie Zhou, Chunbao Zhang, Jilin Wang, Jue Zhou, Mingyao Xue, Meiting Zhang, Yunquan Hangzhou Dianzi University School of Computer Science and Technology Hangzhou310018 China Ministry of Education Key Laboratory for Modeling and Simulation of Complex Systems Hangzhou310018 China Data Security Governance Zhejiang Engineering Research Center Hangzhou310018 China Hangzhou Dianzi University School of ITMO Joint Institute Hangzhou310018 China Institute of Computer Network Information Center of the Chinese Academy of Sciences Beijing100086 China HuaWei China Institute of Computing Technology of the Chinese Academy of Sciences State Key Laboratory of Computer Architecture Beijing100086 China
As the size of datasets and neural network models increases, automatic parallelization methods for models have become a research hotspot in recent years. The existing auto-parallel methods based on machine learning or... 详细信息
来源: 评论
Toward Mixture-of-Experts Enabled Trustworthy Semantic Communication for 6G Networks
arXiv
收藏 引用
arXiv 2024年
作者: He, Jiayi Luo, Xiaofeng Kang, Jiawen Du, Hongyang Xiong, Zehui Chen, Ci Niyato, Dusit Shen, Xuemin School of Automation Guangdong University of Technology Guangzhou510006 China The College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore The Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore487372 Singapore The Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada
Semantic Communication (SemCom) plays a pivotal role in 6G networks, offering a viable solution for future efficient communication. Deep Learning (DL)-based semantic codecs further enhance this efficiency. However, th... 详细信息
来源: 评论
Feature Selection for Robust Spoofing Detection: A Chi-Square-based Machine Learning Approach
Feature Selection for Robust Spoofing Detection: A Chi-Squar...
收藏 引用
Electrical, Energy, and Artificial Intelligence (EICEEAI), International engineering Conference on
作者: Qais Al-Na'amneh Mohammad Aljaidi Hasan Gharaibeh Ahmad Nasayreh Rabia Emhamed Al Mamlook Sattam Almatarneh Dalia Alzu'bi Abla Suliman Husien Dep. of Cyber Security Applied Science Private University Amman Jordan Dep. of Computer Science Zarqa University Zarqa Jordan Dep. Computer Science Yarmouk University Irbid Jordan Dep. of Business Administration Trine University Indiana USA Department of Industrial Engineering University of Zawia Tripoli Libia Dep. of Data Science and Artificial Intelligence Zarqa University Zarqa Jordan Dep. Information and Systems Engineering Concordia University Montreal Canada
Nowadays, the Internet of Things (IoT) system is vulnerable to spoofing attacks that can easily where attackers can easily pose as a legal entity of the network. A “spoofing attack” refers to a type of cyber-attack ... 详细信息
来源: 评论
Supervised Machine Learning Strategy for detection of covid19 patients
Supervised Machine Learning Strategy for detection of covid1...
收藏 引用
Artificial Intelligence and Knowledge Discovery in Concurrent engineering (ICECONF), International Conference on
作者: I. S. Hephzi Punithavathi K. Deepa Cheruku Poorna Venkata Srinivasa Rao S. Raja Gopal P. Rajasekar Ashok Kumar Department of Artificial Intelligence Vidya Jyothi Institute of Technology Hyderabad Telagana India Department of Computer Science and Artificial Intelligence SR University Kavaraipettai Hasanparthy Telangana India Department of Information Technology Laki Reddy Balireddy College of Engineering Mylavaram Andhra Pradesh India Department of Electronics and Communication Engineering KoneruLakshmaiah Education Foundation Vaddeswaram Andhra Pradesh India Department of Data Science and Business Systems SRM Institute of Science and Technology Kattankulathur Tamil Nadu Department of Computer Science Banasthali Vidyapith Rajasthan India
The current severe acute respiratory syndrome corona virus 2 (SARS-CoV-2) public health catastrophe, both human lives have been lost and the economy has disrupted severely the current scenario. In this paper, we devel... 详细信息
来源: 评论
Efficient Sampling Algorithms for Approximate Motif Counting in Temporal Graph Streams
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Jingjing Wang, Yanhao Jiang, Wenjun Li, Yuchen Tan, Kian-Lee Department of Mathematics and Computer Science Changsha University Changsha China School of Data Science and Engineering East China Normal University Shanghai China College of Computer Science and Electronic Engineering Hunan University Changsha China School of Computing and Information Systems Singapore Management University Singapore Singapore School of Computing National University of Singapore Singapore Singapore
A great variety of complex systems ranging from user interactions in communication networks to transactions in financial markets can be modeled as temporal graphs, which consist of a set of vertices and a series of ti... 详细信息
来源: 评论
Permutation polynomials x~(2k+1+3)+ax2k+2+bx over F_(22k) and their differential uniformity
收藏 引用
science China(information sciences) 2020年 第10期63卷 255-257页
作者: Jie PENG Lijing ZHENG Chunsheng WU Haibin KAN Mathematics and Science College Shanghai Normal University School of Mathematics and Physics University of South China Department of Mathematics Lianyungang Normal University Shanghai Key Laboratory of Intelligent Information Processing School of Computer ScienceFudan University Fudan-Zhongan Joint Laboratory of Blockchain and Information Security Shanghai Blockchain Engineering Research Center Shanghai Institute for Advanced Communication and Data Science Shanghai Institute of Intelligent Electronics & Systems
Dear editor,A polynomial f(x)∈Fq[x] is called a permutation polynomial (PP) over the finite field Fq if the associated mapping f:c (?) f(c) from Fq to itself is bijective.A PP f is called a complete permutati... 详细信息
来源: 评论
Real-Valued Group Testing for Quantitative Molecular Assays  26th
Real-Valued Group Testing for Quantitative Molecular Assays
收藏 引用
26th International Conference on Research in Computational Molecular Biology, RECOMB 2022
作者: Saeedi, Seyran Serrano, Myrna Yang, Dennis G. Brooks, J. Paul Buck, Gregory A. Arodz, Tomasz Department of Computer Science College of Engineering Virginia Commonwealth University RichmondVA United States Department of Microbiology and Immunology School of Medicine Virginia Commonwealth University RichmondVA United States Department of Mathematics College of Arts and Sciences Drexel University PhiladelphiaPA United States Department of Information Systems School of Business Virginia Commonwealth University RichmondVA United States Department of Electrical and Computer Engineering University of California Santa BarbaraCA United States Center for Microbiome Engineering and Data Analysis Virginia Commonwealth University RichmondVA United States
Combinatorial group testing and compressed sensing both focus on recovering a sparse vector of dimensionality n from a much smaller number m © 2022, The Author(s), under exclusive license to Springer Nature Switz... 详细信息
来源: 评论
The intersection of video capsule endoscopy and artificial intelligence: Addressing unique challenges using machine learning
arXiv
收藏 引用
arXiv 2023年
作者: Guleria, Shan Schwartz, Benjamin Sharma, Yash Fernandes, Philip Jablonski, James Adewole, Sodiq Srivastava, Sanjana Rhoads, Fisher Porter, Michael Yeghyayan, Michelle Hyatt, Dylan Copland, Andrew Ehsan, Lubaina Brown, Donald Syed, Sana Rush University Medical Center Department of Internal Medicine ChicagoIL60607 United States University of Virginia Systems and Information Engineering CharlottesvilleVA22903 United States University of Virginia Department of Pediatrics CharlottesvilleVA22903 United States University of Virginia Data Science Institute CharlottesvilleVA22903 United States
Introduction: Technical burdens and time-intensive review processes limit the practical utility of video capsule endoscopy (VCE). Artificial intelligence (AI) is poised to address these limitations, but the intersecti... 详细信息
来源: 评论
Research on recognition method of liner wear stage based on operation and vibration information of semi-autogenous mil
收藏 引用
Minerals engineering 2025年 232卷
作者: TianQing Li Dakuo He Shuiqing Yu College of Information Science and Engineering Northeastern University Shenyang 110819 China College of Information Science and Engineering National Frontiers Science Center for Industrial Intelligence and Systems Optimization Key Laboratory of Data Analytics and Optimization for Smart Industry Northeastern University Shenyang 110819 China
The wear stage of the liner is of great significance to the production and maintenance of the mill. However, it is difficult to monitor the wear stage of the liner in real time. Therefore, this study developed a metho...
来源: 评论