咨询与建议

限定检索结果

文献类型

  • 2,195 篇 期刊文献
  • 1,741 篇 会议
  • 88 册 图书

馆藏范围

  • 4,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,637 篇 工学
    • 2,081 篇 计算机科学与技术...
    • 1,692 篇 软件工程
    • 577 篇 信息与通信工程
    • 375 篇 控制科学与工程
    • 349 篇 生物工程
    • 340 篇 电气工程
    • 237 篇 生物医学工程(可授...
    • 200 篇 光学工程
    • 177 篇 机械工程
    • 172 篇 电子科学与技术(可...
    • 101 篇 交通运输工程
    • 99 篇 动力工程及工程热...
    • 98 篇 网络空间安全
    • 95 篇 化学工程与技术
    • 89 篇 安全科学与工程
    • 88 篇 仪器科学与技术
  • 1,339 篇 理学
    • 720 篇 数学
    • 380 篇 生物学
    • 288 篇 物理学
    • 245 篇 统计学(可授理学、...
    • 148 篇 系统科学
    • 113 篇 化学
  • 805 篇 管理学
    • 469 篇 管理科学与工程(可...
    • 360 篇 图书情报与档案管...
    • 262 篇 工商管理
  • 299 篇 医学
    • 256 篇 临床医学
    • 207 篇 基础医学(可授医学...
    • 136 篇 公共卫生与预防医...
    • 99 篇 药学(可授医学、理...
  • 153 篇 法学
    • 117 篇 社会学
  • 80 篇 经济学
  • 57 篇 教育学
  • 57 篇 农学
  • 10 篇 文学
  • 10 篇 艺术学
  • 5 篇 军事学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 133 篇 deep learning
  • 123 篇 machine learning
  • 90 篇 feature extracti...
  • 86 篇 artificial intel...
  • 76 篇 computational mo...
  • 76 篇 accuracy
  • 75 篇 semantics
  • 74 篇 training
  • 62 篇 predictive model...
  • 56 篇 data models
  • 53 篇 internet of thin...
  • 51 篇 data mining
  • 51 篇 federated learni...
  • 45 篇 cloud computing
  • 44 篇 computer science
  • 44 篇 reinforcement le...
  • 44 篇 convolutional ne...
  • 43 篇 optimization
  • 36 篇 visualization
  • 35 篇 security

机构

  • 171 篇 school of comput...
  • 72 篇 school of comput...
  • 71 篇 college of compu...
  • 45 篇 school of comput...
  • 44 篇 school of data a...
  • 44 篇 school of comput...
  • 37 篇 school of comput...
  • 34 篇 nanyang technolo...
  • 32 篇 school of comput...
  • 32 篇 college of compu...
  • 31 篇 college of compu...
  • 30 篇 beijing advanced...
  • 29 篇 school of comput...
  • 27 篇 school of inform...
  • 26 篇 school of comput...
  • 26 篇 school of comput...
  • 25 篇 school of comput...
  • 24 篇 national enginee...
  • 24 篇 school of comput...
  • 21 篇 the school of co...

作者

  • 99 篇 niyato dusit
  • 47 篇 buyya rajkumar
  • 27 篇 rajkumar buyya
  • 26 篇 xiong zehui
  • 23 篇 jin hai
  • 21 篇 pardamean bens
  • 21 篇 huang qingming
  • 20 篇 yang yang
  • 20 篇 lo david
  • 19 篇 wu jia
  • 18 篇 bens pardamean
  • 17 篇 kang jiawen
  • 16 篇 tao dacheng
  • 16 篇 han zhu
  • 16 篇 chen mingzhe
  • 15 篇 wirth anthony
  • 15 篇 zheng baihua
  • 15 篇 shen linlin
  • 14 篇 zheng wei-shi
  • 14 篇 bailey james

语言

  • 3,533 篇 英文
  • 460 篇 其他
  • 31 篇 中文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Unit for Data Science and Computing School of Computer Science and Information Systems"
4024 条 记 录,以下是221-230 订阅
排序:
ASSESSING THE ACCURACY AND ETHICAL IMPLICATIONS OF AUTOMATED CRIMINAL DETECTION USING A DEEP LEARNING APPROACH
ASSESSING THE ACCURACY AND ETHICAL IMPLICATIONS OF AUTOMATED...
收藏 引用
2023 IEEE International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering, RMKMATE 2023
作者: Jagadeesan, S. Sujigarasharma, K. Manjula, R. Vetriselvi, T. School of Computer Science Engineering and Information Systems Vellore Institute of Technology Tamil Nadu Vellore India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Chennai India Department of IOT School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India
This study examines the accuracy and ethical implications of using convolutional neural networks (CNN) for automated crime detection. A CNN model was trained on a dataset of criminal mugshots to identify potential cri... 详细信息
来源: 评论
GENSIMO - A Generic Framework for Modelling Social Insurance systems  25th
GENSIMO - A Generic Framework for Modelling Social Insuranc...
收藏 引用
25th International Workshop on Multi-Agent-Based Simulation, MABS 2024
作者: de Haan, Fjalar J. Thompson, Jason School of Computing and Information Systems Faculty of Engineering and Information Technology The University of Melbourne Parkville Australia Melbourne Centre for Data Science The University of Melbourne Parkville Australia Department of Psychiatry Faculty of Medicine Dentistry and Health Sciences The University of Melbourne Parkville Australia
We report on the design, development and prototype testing of gensimo (GENeric Social Insurance MOdeling), a free and open-source software framework for modelling and simulation of social insurance systems. We discuss... 详细信息
来源: 评论
Beyond the Commute: Unlocking the Potential of Electric Vehicles as Future Energy Storage Solutions (Vision Paper)  24
Beyond the Commute: Unlocking the Potential of Electric Vehi...
收藏 引用
32nd ACM SIGSPATIAL International Conference on Advances in Geographic information systems, ACM SIGSPATIAL 2024
作者: Cheema, Muhammad Aamir Wang, Hao Wang, Wei Toosi, Adel N. Tanin, Egemen Qi, Jianzhong Samet, Hanan Faculty of Information Technology Monash University Australia Guangzhou China HKUST Hong Kong Hong Kong School of Computing and Information Systems The University of Melbourne Australia Department of Computer Science University of Maryland United States
Electric vehicles (EVs) have the potential to serve as energy storage solutions through bidirectional charging technology, which allows them to both draw power from and feed power back into the grid, homes, or other v... 详细信息
来源: 评论
Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm
收藏 引用
computer systems science & Engineering 2023年 第8期46卷 2401-2414页
作者: Mohammed S.Alshehri Sultan Almakdi Mimonah Al Qathrady Jawad Ahmad Department of Computer Science Najran UniversityNajran55461Saudi Arabia Department of Information Systems Najran UniversityNajran55461Saudi Arabia School of Computing Edinburgh Napier UniversityEdinburghEH105DTUK
Chaos-based cryptosystems are considered a secure mode of communication due to their *** maps are associated with the other domains to construct robust encryption *** exist numerous encryption schemes in the literatur... 详细信息
来源: 评论
An Efficient Automated Technique for Classification of Breast Cancer Using Deep Ensemble Model
收藏 引用
computer systems science & Engineering 2023年 第7期46卷 897-911页
作者: Muhammad Zia Ur Rehman Jawad Ahmad Emad Sami Jaha Abdullah Marish Ali Mohammed A.Alzain Faisal Saeed Department of Electrical Engineering HITEC UniversityTaxila47080Pakistan School of Computing Edinburgh Napier UniversityEdinburghEH105DTUK Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia DAAI Research Group Department of Computing and Data ScienceSchool of Computing and Digital TechnologyBirmingham City University15 Bartholomew RowBirminghamB55JUUK
Breast cancer is one of the leading cancers among *** has the second-highest mortality rate in women after lung *** detection,especially in the early stages,can help increase survival ***,manual diagnosis of breast ca... 详细信息
来源: 评论
Empirical Evaluation of Hyper-parameter Optimization Techniques for Deep Learning-based Malware Detectors  28th
Empirical Evaluation of Hyper-parameter Optimization Techniq...
收藏 引用
28th International Conference on Knowledge Based and Intelligent information and Engineering systems, KES 2024
作者: Shar, Lwin Khin Duong, Ta Nguyen Binh Yeo, Yao Cong Fan, Jiani School of Computing and Information Systems Singapore Management University 80 Stamford Rd Singapore178902 Singapore School of Computer Science and Engineering Nanyang Technological University 50 Nanyang Ave Singapore639798 Singapore
In machine learning, hyper-parameter optimization (HPO) aims to tune the set of parameters that controls the learning process. HPO could be time-consuming and resource-intensive due to the huge parameter search space ... 详细信息
来源: 评论
Provably Secure Conditional-Privacy Access Control Protocol for Intelligent Customers-Centric Communication in VANET
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 1747-1756页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Shamshad, Salman Ayub, Muhammad Faizan Bashir, Ali Kashif Omar, Marwan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan Manchester Metropolitan University Department of Computing and Mathematics ManchesterM15 6BH United Kingdom Woxsen University Woxsen School of Business Hyderabad502345 India Lebanese American University Department of Computer Science and Mathematics Beirut1102 2801 Lebanon Illinois Institute of Technology Information Technology and Management ChicagoIL60555 United States
Globally, the development of Intelligent Cyber-Physical Transportation systems (ICTS) aims to tackle several challenges, including reducing traffic accidents and fuel usage, alleviating congestion, shortening travel t... 详细信息
来源: 评论
Cryptocurrency Transaction Network Embedding From Static and Dynamic Perspectives: An Overview
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第5期10卷 1105-1121页
作者: Yue Zhou Xin Luo MengChu Zhou the School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing 400065 the Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Institute of Green and Intelligent TechnologyChinese Academy of SciencesChongqing 400714 the Chongqing School University of Chinese Academy of SciencesChongqing 400714China the College of Computer and Information Science Southwest UniversityChongqing 400715China the School of Information and Electronic Engineering Zhejiang Gongshang UniversityHangzhou 310018China the Helen and John C.Hartmann Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewark NJ 07102 USA
Cryptocurrency, as a typical application scene of blockchain, has attracted broad interests from both industrial and academic communities. With its rapid development, the cryptocurrency transaction network embedding(C... 详细信息
来源: 评论
Assessing Susceptibility Factors of Confirmation Bias in News Feed Reading  25
Assessing Susceptibility Factors of Confirmation Bias in New...
收藏 引用
2025 CHI Conference on Human Factors in computing systems, CHI 2025
作者: Boonprakong, Nattapat Pareek, Saumya Tag, Benjamin Goncalves, Jorge Dingler, Tilman School of Computing and Information Systems University of Melbourne Parkville VIC Australia School of Computing and Information Systems University of Melbourne Melbourne VIC Australia School of Computer Science and Engineering University of New South Wales Sydney NSW Australia School of Computing and Information Systems University of Melbourne Melbourne Australia Industrial Design Engineering Delft University of Technology Delft Netherlands
Individuals tend to apply preferences and beliefs as heuristics to effectively sift through the sheer amount of information available online. Such tendencies, however, often result in cognitive biases, which can skew ... 详细信息
来源: 评论
computer-Aided Potato Disease Detection by Using Deep Learning Techniques
Computer-Aided Potato Disease Detection by Using Deep Learni...
收藏 引用
International Conference on Green Energy, computing, and Intelligent Technology, GEn-CITy 2023
作者: Razaq, Fareeha Bilal, Muhammad Ramzan, Muhammad Naveed, Muhammad Razzaq, Samreen Department of Computer Science University of Sargodha Sargodha Pakistan Department of Computing and Information Systems School of Engineering and Technology Sunway University Petaling Jaya Malaysia Department of Software Engineering University of Sargodha Sargodha Pakistan School of Electronics and Computer Science University of Southampton Malaysia Iskandar Puteri Malaysia
Potato is the most widely grown and consumed food throughout the world. There are a number of potato crop diseases that affect production, and these diseases differ in symptoms, circumstances, and controls. Early dete... 详细信息
来源: 评论