咨询与建议

限定检索结果

文献类型

  • 2,195 篇 期刊文献
  • 1,741 篇 会议
  • 88 册 图书

馆藏范围

  • 4,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,637 篇 工学
    • 2,081 篇 计算机科学与技术...
    • 1,692 篇 软件工程
    • 577 篇 信息与通信工程
    • 375 篇 控制科学与工程
    • 349 篇 生物工程
    • 340 篇 电气工程
    • 237 篇 生物医学工程(可授...
    • 200 篇 光学工程
    • 177 篇 机械工程
    • 172 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 99 篇 动力工程及工程热...
    • 98 篇 网络空间安全
    • 95 篇 化学工程与技术
    • 89 篇 安全科学与工程
    • 88 篇 仪器科学与技术
  • 1,339 篇 理学
    • 720 篇 数学
    • 380 篇 生物学
    • 288 篇 物理学
    • 245 篇 统计学(可授理学、...
    • 148 篇 系统科学
    • 113 篇 化学
  • 805 篇 管理学
    • 469 篇 管理科学与工程(可...
    • 360 篇 图书情报与档案管...
    • 262 篇 工商管理
  • 299 篇 医学
    • 256 篇 临床医学
    • 207 篇 基础医学(可授医学...
    • 136 篇 公共卫生与预防医...
    • 99 篇 药学(可授医学、理...
  • 153 篇 法学
    • 117 篇 社会学
  • 80 篇 经济学
  • 57 篇 教育学
  • 57 篇 农学
  • 10 篇 文学
  • 10 篇 艺术学
  • 5 篇 军事学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 133 篇 deep learning
  • 123 篇 machine learning
  • 90 篇 feature extracti...
  • 86 篇 artificial intel...
  • 76 篇 computational mo...
  • 76 篇 accuracy
  • 75 篇 semantics
  • 74 篇 training
  • 62 篇 predictive model...
  • 56 篇 data models
  • 53 篇 internet of thin...
  • 51 篇 data mining
  • 51 篇 federated learni...
  • 45 篇 cloud computing
  • 44 篇 computer science
  • 44 篇 reinforcement le...
  • 44 篇 convolutional ne...
  • 43 篇 optimization
  • 36 篇 visualization
  • 35 篇 security

机构

  • 171 篇 school of comput...
  • 72 篇 school of comput...
  • 71 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 school of data a...
  • 44 篇 school of comput...
  • 37 篇 school of comput...
  • 34 篇 nanyang technolo...
  • 32 篇 school of comput...
  • 32 篇 college of compu...
  • 31 篇 college of compu...
  • 30 篇 beijing advanced...
  • 29 篇 school of comput...
  • 27 篇 school of inform...
  • 26 篇 school of comput...
  • 26 篇 school of comput...
  • 25 篇 school of comput...
  • 24 篇 national enginee...
  • 24 篇 school of comput...
  • 21 篇 the school of co...

作者

  • 99 篇 niyato dusit
  • 47 篇 buyya rajkumar
  • 27 篇 rajkumar buyya
  • 26 篇 xiong zehui
  • 23 篇 jin hai
  • 21 篇 pardamean bens
  • 21 篇 huang qingming
  • 20 篇 yang yang
  • 20 篇 lo david
  • 19 篇 wu jia
  • 18 篇 bens pardamean
  • 17 篇 kang jiawen
  • 16 篇 tao dacheng
  • 16 篇 han zhu
  • 16 篇 chen mingzhe
  • 15 篇 wirth anthony
  • 15 篇 zheng baihua
  • 15 篇 shen linlin
  • 14 篇 zheng wei-shi
  • 14 篇 bailey james

语言

  • 3,533 篇 英文
  • 460 篇 其他
  • 31 篇 中文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information Systems"
4024 条 记 录,以下是121-130 订阅
排序:
Deep transfer learning technique to detect white blood cell classification in regular clinical practice using histopathological images
收藏 引用
Multimedia Tools and Applications 2025年 第9期84卷 5699-5723页
作者: Davamani, K. Anita Jawahar, Malathy Anbarasi, L. Jani Ravi, Vinayakumar Al Mazroa, Alanoud Robin, C. R. Rene Computer Science and Engineering Sathyabama Institute of Science and Technology Chennai India Leather Process Technology Division CSIR-Central Leather Research Institute Chennai India School of Computing Science and Engineering Vellore Institute of Technology Vellore India Computer Science and Engineering Sri Sairam Engineering College Sirukalathur India Center for Artificial Intelligence Prince Mohammad Bin Fahd University Khobar Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh11671 Saudi Arabia
Leukemia, a malignant disease characterized by the rapid proliferation of specific types of white blood cells (WBC), has prompted increased interest in leveraging automatic WBC classification system. This study presen... 详细信息
来源: 评论
COMPETING FAILURE MODELING AND ANALYSIS OF PHASED-MISSION UNMANNED AERIAL VEHICLES  14
COMPETING FAILURE MODELING AND ANALYSIS OF PHASED-MISSION UN...
收藏 引用
14th International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, QR2MSE 2024
作者: Wang, Sidi Zhao, Guilin Mandava, Lavanya Meng, Sa School of Computing & Artificial Intelligence Southwest Jiaotong University Chengdu China Computer Science & Information Systems Department Bradley University Peoria United States
Unmanned aerial vehicles (UAVs) can be outfitted with ground sensors to offer substantial benefits across a range of applications. Nonetheless, ensuring their reliability in delivering services throughout the designat... 详细信息
来源: 评论
Real-Time Road Damage Detection and Infrastructure Evaluation Leveraging Unmanned Aerial Vehicles and Tiny Machine Learning
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 21347-21358页
作者: Khan, Muhammad Waseem Obaidat, Mohammad S. Mahmood, Khalid Batool, Dania Badar, Hafiz Muhammad Sanaullah Aamir, Muhammad Gao, Wu Comsats University Islamabad Sahiwal Campus Department Of Computer Science Sahiwal57000 Pakistan Superior University Department Of Computer Science Lahore54000 Pakistan The University Of Jordan King Abdullah Ii School Of Information Technology Amman11942 Jordan University Of Science And Technology Beijing School Of Communication And Computing Engineering Beijing100083 China Amity University Amity School Of Engineering And Technology Uttar Pradesh Noida201301 India National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan University Of Palermo Department Of Engineering Palermo90133 Italy Emerson University Department Of Emerging Computing Technologies Multan60000 Pakistan Northwestern Polytechnical University Center For Bio-Inspired System-on-Chip School Of Computer Science Xi'an710060 China
Road damage detection (RDD) through computer vision and deep learning techniques can ensure the safety of vehicles and humans on the roads. Integrating unmanned aerial vehicles (UAVs) in RDD and infrastructure evaluat... 详细信息
来源: 评论
Kathakali Mudras: An AI-Enhanced Predictive Approach  11
Kathakali Mudras: An AI-Enhanced Predictive Approach
收藏 引用
11th International Conference on Soft computing and Machine Intelligence, ISCMI 2024
作者: Mulerikkal, Jaison Paul Janani, K. Sreelakshmi, P.S. James, Divya Lakshmi, K.S. Sajanraj, T.D. Binu, A. Department of Information Technology India Rajagiri School of Engineering & Technology Kochi India Department of Computer Science and Engineering India Department of Computer Science and Business Systems India Department of Artificial Intelligence and Data Science India Department of Computer Science Loughborough University Leicester United Kingdom
The goal of this research is to integrate an artificial intelligence framework for predicting Kathakali mudras, a crucial component of the traditional Indian dance style that is renowned for its complex hand and facia... 详细信息
来源: 评论
Responsibility Attribution in Human Interactions with Everyday AI systems  25
Responsibility Attribution in Human Interactions with Everyd...
收藏 引用
2025 CHI Conference on Human Factors in computing systems, CHI 2025
作者: Brailsford, Joe Vetere, Frank Velloso, Eduardo School of Computing and Information Systems The University of Melbourne Melbourne Australia School of Computer Science University of Sydney Sydney NSW Australia
How do individuals perceive AI systems as responsible entities in everyday collaborations between humans and AI? Drawing on psychological literature from attribution theory, praise-blame asymmetries and negativity bia... 详细信息
来源: 评论
Outage Prediction and Improvement in 6G for UAV Swarm Relays Using Machine Learning
收藏 引用
Progress In Electromagnetics Research B 2024年 107卷 33-45页
作者: Khalil, Hisham Ali, Gauhar Rahman, Saeed Ur Asim, Muhammad Affendi, Mohammed El Department of Intelligent Systems Faculty of Information Technology University of Lahore Pakistan EIAS Data Science and Block chain Lab College of Computer and Information Sciences Prince Sultan University Riyadh11586 Saudi Arabia School of Electronic Engineering Xidian University Xi’an China
The issue of signal outages in sub-THz frequency communication for future 6G networks is addressed by this research. A machine learning method is proposed, employing Random Forest and K-Means algorithms to predict the... 详细信息
来源: 评论
Augmenting IoT Intrusion Detection System Performance Using Deep Neural Network
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1351-1374页
作者: Nasir Sayed Muhammad Shoaib Waqas Ahmed Sultan Noman Qasem Abdullah M.Albarrak Faisal Saeed Department of Computer Science Islamia College PeshawarPeshawar25120Pakistan Department of Computer Science CECOS University of IT and Emerging SciencesPeshawar25000Pakistan Department of Electrical Engineering HITEC University TaxilaTaxila47080Pakistan Computer Science Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)Riyadh11432Saudi Arabia DAAI Research Group Department of Computing and Data ScienceSchool of Computing and Digital TechnologyBirmingham City UniversityBirminghamB47XGUK
Due to their low power consumption and limited computing power,Internet of Things(IoT)devices are difficult to ***,the rapid growth of IoT devices in homes increases the risk of *** detection systems(IDS)are commonly ... 详细信息
来源: 评论
Accountable Policy-Based Sanitizable Signature for Medical data Sharing  12
Accountable Policy-Based Sanitizable Signature for Medical D...
收藏 引用
12th International Conference on Communication and Network Security, ICCNS 2022
作者: Yang, Yang Wei, Zengtao Huang, Minming College of Computer and Data Science Fuzhou University China School of Computing and Information Systems Singapore Management University Singapore
With the Internet and cloud computing development, signed electronic medical data can be stored on the cloud server for flexible data sharing. However, the signed medical data contains much private information, and di... 详细信息
来源: 评论
Greening Large Language Models of Code  46
Greening Large Language Models of Code
收藏 引用
46th ACM/IEEE International Conference on Software Engineering: Software Engineering in Society, ICSE-SEIS 2024
作者: Shi, Jieke Yang, Zhou Kang, Hong Jin Xu, Bowen He, Junda Lo, David School Of Computing And Information Systems Singapore Management University Singapore Department Of Computer Science University Of California Los Angeles United States Department Of Computer Science North Carolina State University Raleigh United States
Large language models of code have shown remarkable effectiveness across various software engineering tasks. Despite the availability of many cloud services built upon these powerful models, there remain several scena... 详细信息
来源: 评论
Resource Exhaustion Attack Detection Scheme for WLAN Using Artificial Neural Network
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5607-5623页
作者: Abdallah Elhigazi Abdallah Mosab Hamdan Shukor Abd Razak Fuad A.Ghalib Muzaffar Hamzah Suleman Khan Siddiq Ahmed Babikir Ali Mutaz H.H.Khairi Sayeed Salih Faculty of Engineering Future UniversityKhartoum 10553Sudan Faculty of Computing and Informatics Universiti Malaysia SabahKota Kinabalu88400Malaysia Information Assurance and Security Research School of ComputingUniversiti Teknologi MalaysiaJohor81310Malaysia School of Psychology and Computer Science University of Central LancashirePreston PR12HEUK Deaptement of Management Information Systems College of Administrative ScienceApplied Science UniversityAl Eker623Bahrain Deaptement of Information Technology College of Computer and Information SciencesKing Saud UniversityRiyadh11461Saudi Arabia
IEEE 802.11 Wi-Fi networks are prone to many denial of service(DoS)attacks due to vulnerabilities at the media access control(MAC)layer of the 802.11 *** to the data transmission nature of the wireless local area netw... 详细信息
来源: 评论