咨询与建议

限定检索结果

文献类型

  • 309 篇 期刊文献
  • 167 篇 会议
  • 2 册 图书

馆藏范围

  • 478 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 294 篇 工学
    • 157 篇 计算机科学与技术...
    • 135 篇 软件工程
    • 53 篇 化学工程与技术
    • 37 篇 信息与通信工程
    • 37 篇 生物工程
    • 34 篇 光学工程
    • 30 篇 控制科学与工程
    • 30 篇 生物医学工程(可授...
    • 26 篇 电气工程
    • 21 篇 仪器科学与技术
    • 17 篇 机械工程
    • 16 篇 电子科学与技术(可...
    • 14 篇 力学(可授工学、理...
    • 12 篇 航空宇航科学与技...
    • 10 篇 网络空间安全
    • 9 篇 材料科学与工程(可...
  • 194 篇 理学
    • 79 篇 物理学
    • 58 篇 数学
    • 44 篇 生物学
    • 29 篇 统计学(可授理学、...
    • 24 篇 地球物理学
    • 22 篇 化学
    • 16 篇 系统科学
    • 10 篇 大气科学
  • 61 篇 管理学
    • 33 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 35 篇 医学
    • 31 篇 临床医学
    • 20 篇 基础医学(可授医学...
    • 13 篇 公共卫生与预防医...
  • 7 篇 经济学
  • 6 篇 法学
  • 6 篇 农学
  • 5 篇 教育学

主题

  • 12 篇 training
  • 11 篇 machine learning
  • 11 篇 accuracy
  • 10 篇 feature extracti...
  • 9 篇 convolutional ne...
  • 7 篇 internet of thin...
  • 7 篇 computer archite...
  • 7 篇 synchronization
  • 6 篇 support vector m...
  • 6 篇 deep learning
  • 6 篇 predictive model...
  • 6 篇 real-time system...
  • 6 篇 prediction algor...
  • 6 篇 artificial intel...
  • 6 篇 data models
  • 5 篇 object detection
  • 5 篇 deep neural netw...
  • 5 篇 software enginee...
  • 5 篇 optimization
  • 5 篇 graph neural net...

机构

  • 18 篇 beijing advanced...
  • 17 篇 columbia univers...
  • 17 篇 university of il...
  • 16 篇 helsinki institu...
  • 16 篇 stefan meyer ins...
  • 16 篇 blackett laborat...
  • 16 篇 lpthe
  • 16 篇 university of al...
  • 16 篇 university of vi...
  • 16 篇 royal holloway
  • 16 篇 institut de fisi...
  • 16 篇 syracuse univers...
  • 16 篇 university of lo...
  • 16 篇 inaf-oats
  • 16 篇 department of ph...
  • 16 篇 tokyo metropolit...
  • 16 篇 university of co...
  • 16 篇 weizmann institu...
  • 16 篇 college park
  • 16 篇 university of ed...

作者

  • 16 篇 v.i.belousov
  • 16 篇 j.beringer
  • 14 篇 g.raffelt
  • 14 篇 f.krauss
  • 14 篇 j.anderson
  • 14 篇 g.weiglein
  • 14 篇 h.murayama
  • 14 篇 j.parsons
  • 14 篇 j.d.jackson
  • 14 篇 g.d'ambrosio
  • 14 篇 r.s.chivukula
  • 14 篇 y.kwon
  • 14 篇 m.white
  • 14 篇 m.drees
  • 14 篇 s.pagan griso
  • 14 篇 p.de jong
  • 14 篇 o.dahl
  • 14 篇 b.foster
  • 14 篇 y.makida
  • 14 篇 k.terashi

语言

  • 428 篇 英文
  • 46 篇 其他
  • 5 篇 中文
检索条件"机构=Advanced Studies in Data Science and Software Engineering"
478 条 记 录,以下是131-140 订阅
排序:
Detection of Breast Cancer using Quasi-Cross Focused Transformer-Guided Quantum Network with Lotus Optimization
Detection of Breast Cancer using Quasi-Cross Focused Transfo...
收藏 引用
International Conference on ent Computing and Control Systems (ICICCS)
作者: Rajesh Munirathnam Vishal Shukla Deepashree Devaraj Chintan Thacker Ujwal Nandekar Natrayan L Data & Analytics Division TechnoGen Inc. Hillsborough New Jersey USA Department of Mechanical Engineering Ramdeobaba College of Engineering and Management Nagpur Maharashtra Electronics and Instrumentation Engineering RV College of Engineering Bengaluru Karnataka Computer Science and Engineering Faculty of Engineering and Technology Parul Institute of Engineering and Technology Parul University Post Limda Gujarat Symbiosis Centre for Advanced Legal Studies and Research (SCALSAR) Symbiosis Law School Pune Symbiosis International (Deemed University) Pune Department of Mechanical Engineering Saveetha School of Engineering SIMATS Chennai TamilNadu
Patient outcomes improve if breast cancer is discovered early. Although many deep learning methods have been studied for breast cancer identification, the efficacy of many has been limited. It presents a new method en... 详细信息
来源: 评论
Quantum reversible circuits for multiplicative inverse
收藏 引用
EPJ Quantum Technology 2022年 第1期9卷 1-17页
作者: Luo, Qing-bin Yang, Guo-wu Li, Xiao-yu Li, Qiang Department of Computer Science and Technology School of Information Engineering Hubei Minzu University Enshi China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Big data research Center & School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Technology Chengdu China
The synthesis of quantum circuits for multiplicative inverse over $\operatorname{GF}(2^{8})$ are discussed in this paper. We first convert the multiplicative inverse operation in $\operatorname{GF}(2^{8})$ to arithmet...
来源: 评论
Simulate the Machine Learning Algorithm to Organize the CRAHN Network System
Simulate the Machine Learning Algorithm to Organize the CRAH...
收藏 引用
Advancement in Electronics & Communication engineering (AECE), International Conference on
作者: P Prabakaran L. Chandra Sekhar Reddy LVD Ravikumar Manish Kumar Verma Department Of Computer Applications School of computing sciences Vels Institute of Science Technology and Advanced Studies Chennai India Department of CSE(Data Science) CMR College of Engineering & Technology Medchal Hyderabad India Department of Information Technology Shri Vishnu Engineering College For Women Bhimavaram India Department of Psychology Lovely Professional University Phagwara India
Using available channels in a wireless spectrum, cognitive radio (CR) may automatically adjust transmission settings to optimize radio operational behaviour. To function properly, a CR ad hoc network (CRAHN) has to be...
来源: 评论
Hyperbolic Geometric Latent Diffusion Model for Graph Generation
arXiv
收藏 引用
arXiv 2024年
作者: Fu, Xingcheng Gao, Yisen Wei, Yuecen Sun, Qingyun Peng, Hao Li, Jianxin Li, Xianxian Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Institute of Artificial Intelligence Beihang University Beijing China School of Software Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing School of Computer Science and Engineering Beihang University Beijing China
Diffusion models have made significant contributions to computer vision, sparking a growing interest in the community recently regarding the application of them to graph generation. Existing discrete graph diffusion m... 详细信息
来源: 评论
Uncovering Android Zero-Day Threats: The Zero-Vuln Approach with Deep and Zero-Shot Learning
Uncovering Android Zero-Day Threats: The Zero-Vuln Approach ...
收藏 引用
Computing and data Analytics (ICCDA), International Conference on
作者: Suresh Palarimath Pyingkodi Maran Wilfred Blessing N. R S. J Kavitha Cibi. A Subitha G. Sutherlin College of Computing and Information Sciences University of Technology and Applied Sciences Salalah Sultanate of Oman Department of Computer Applications Kongu Engineering College Erode India College of Computing and Information Sciences University of Technology and Applied Sciences Ibri Sultanate of Oman Department of Computer Science and Engineering Vels Institute of Science Technology and Advanced Studies (VISTAS) Pallavaram Chennai India Data & Analytics / Visualization - Delivery Virtusa Consulting Services Private Limited Chennai India Department of Computer Science and Engineering Stella Mary's College of Engineering Kanyakumari India
The growing occurrence of cybersecurity hazards, such as Android zero-day vulnerabilities, poses substantial difficulties because they are unattended and imperceptible. With the increasing popularity of Android smartp... 详细信息
来源: 评论
Biomedical data and AI
收藏 引用
science China Life sciences 2025年 第5期68卷 1536-1540页
作者: Hao Xu Shibo Zhou Zefeng Zhu Vincenzo Vitelli Liangyi Chen Ziwei Dai Ning Yang Luhua Lai Shengyong Yang Sergey Ovchinnikov Zhuoran Qiao Sirui Liu Chen Song Jianfeng Pei Han Wen Jianfeng Feng Yaoyao Zhang Zhengwei Xie Yang-Yu Liu Zhiyuan Li Fulai Jin Hao Li Mohammad Lotfollahi Xuegong Zhang Ge Yang Shihua Zhang Ge Gao Pulin Li Qi Liu Jing-Dong Jackie Han Peking-Tsinghua Center for Life Sciences (CLS) Academy for Advanced Interdisciplinary StudiesPeking University Center for Quantitative Biology (CQB) Academy for Advanced Interdisciplinary StudiesPeking University Peking University-Tsinghua University-National Institute of Biological Sciences Joint Graduate Program Academy for Advanced Interdisciplinary StudiesPeking University Department of Physics University of Chicago School of Life Sciences Southern University of Science and Technology Peking University Chengdu Academy for Advanced Interdisciplinary Biotechnologies College of Chemistry and Molecular Engineering Peking University Department of Biotherapy Cancer Center and State Key Laboratory of BiotherapyWest China HospitalSichuan University Department of Biology Massachusetts Institute of Technology Lambic Therapeutics Inc. Changping Laboratory Al for Science Institute Key Laboratory of Computational Neuroscience and Brain-Inspired Intelligence Fudan University Department of Obstetrics and Gynecology West China Second University HospitalSichuan University Peking University International Cancer Institute and Peking University-Yunnan Baiyao International Medical Institute and State Key Laboratory of Natural and Biomimetic Drugs Department of Molecular and Cellular PharmacologySchool of Pharmaceutical SciencesPeking University Health Science CenterPeking University Channing Division of Network Medicine Department of MedicineBrigham and Women's Hospital and Harvard Medical School Center for Artificial Intelligence and Modeling the Carl R.Woese Institute for Genomic BiologyUniversity of Illinois Urbana-Champaign Department of Genetics and Genome Sciences School of Medicine and Department of Computer and Data Sciences and Department of Population and Quantitative Health SciencesCase Western Reserve University Department of Biochemistry and Biophysics University of California Sanger Institute Department of Automation Tsinghua University State Key Laboratory of Multimodal Artificial Intelligence Systems I
The development of artificial intelligence(AI) and the mining of biomedical data complement each other. From the direct use of computer vision results to analyze medical images for disease screening, to now integratin...
来源: 评论
Goal-Modeling Privacy-by-Design Patterns for Supporting GDPR Compliance
Goal-Modeling Privacy-by-Design Patterns for Supporting GDPR...
收藏 引用
18th International Conference on software Technologies, ICSOFT 2023
作者: Al-Obeidallah, Mohammed Ghazi Piras, Luca Iloanugo, Onyinye Mouratidis, Haralambos Alkubaisy, Duaa Dellagiacoma, Daniele Department of Software Engineering Al Ain University Abu Dhabi United Arab Emirates School of Computing Middlesex University London United Kingdom School of Computing Robert Gordon University Aberdeen United Kingdom Institute for Analytics and Data Science University of Essex Colchester United Kingdom College of Applied Studies and Community Service Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia Centre for Secure Intelligent and Usable Systems University of Brighton Brighton United Kingdom
The introduction of the European General data Protection Regulation (GDPR) has imposed obligations on organisations collecting data in the EU. This has been beneficial to citizens due to rights reinforcement achieved ...
来源: 评论
Categorical data clustering: 25 years beyond K-modes
arXiv
收藏 引用
arXiv 2024年
作者: Dinh, Tai Hauchi, Wong Fournier-Viger, Philippe Lisik, Daniil Ha, Minh-Quyet Dam, Hieu-Chi Huynh, Van-Nam The Kyoto College of Graduate Studies for Informatics 7 Tanaka Monzencho Sakyo Ward Kyoto City Kyoto Japan College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen City China University of Gothenburg Medicinaregatan 1F Göteborg413 90 Sweden Japan Advanced Institute of Science and Technology 1-1 Asahidai Ishikawa Nomi Japan
The clustering of categorical data is a common and important task in computer science, offering profound implications across a spectrum of applications. Unlike purely numerical data, categorical data often lack inhere... 详细信息
来源: 评论
StyleGene: Crossover and Mutation of Region-level Facial Genes for Kinship Face Synthesis
StyleGene: Crossover and Mutation of Region-level Facial Gen...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Hao Li Xianxu Hou Zepeng Huang Linlin Shen Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University School of AI and Advanced Computing Xi'an Jiaotong-Liverpool University Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University
High-fidelity kinship face synthesis has many potential applications, such as kinship verification, missing child identification, and social media analysis. However, it is challenging to synthesize high-quality descen...
来源: 评论
Acupuncture State Detection at Zusanli (ST-36) Based on Scalp EEG and Transformer
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 第6期29卷 4023-4034页
作者: Wenhao Rao Meiyan Xu Haochen Wang Weicheng Hua Jiayang Guo Yongheng Zhang Haibin Zhu Ziqiu Zhou Jiawei Xiong Jianbin Zhang Yijie Pan Peipei Gu Duo Chen School of Artificial Intelligence and Information Technology Nanjing University of Chinese Medicine Nanjing China Department of Computer Science and the Institute of Human Factors Engineering Minnan Normal University Zhangzhou China National Institute for Data Science in Health and Medicine Xiamen University Xiamen China China Mobile Group Jiangsu Company Ltd Sihong Branch Suqian China Second Affiliated Hospital of Nanjing University of Chinese Medicine Nanjing University of Chinese Medicine Nanjing China Department of Computer Science and Technology Tsinghua University Beijing China Eastern Institute for Advanced Study Eastern Institute of Technology Ningbo China College of Software Engineering Zhengzhou University of Light Industry Zhengzhou China
In clinical acupuncture practice, needle twirling (NT) and needle retention (NR) are strategically combined to achieve different therapeutic effects, highlighting the importance of distinguishing between different acu... 详细信息
来源: 评论