咨询与建议

限定检索结果

文献类型

  • 14,646 篇 会议
  • 14,226 篇 期刊文献
  • 224 册 图书

馆藏范围

  • 29,096 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,992 篇 工学
    • 9,766 篇 计算机科学与技术...
    • 7,735 篇 软件工程
    • 3,096 篇 信息与通信工程
    • 2,427 篇 电气工程
    • 2,426 篇 电子科学与技术(可...
    • 2,048 篇 生物工程
    • 1,975 篇 控制科学与工程
    • 1,888 篇 光学工程
    • 1,881 篇 生物医学工程(可授...
    • 1,209 篇 化学工程与技术
    • 1,119 篇 材料科学与工程(可...
    • 1,010 篇 机械工程
    • 981 篇 仪器科学与技术
    • 747 篇 动力工程及工程热...
    • 606 篇 核科学与技术
  • 12,274 篇 理学
    • 5,605 篇 物理学
    • 4,700 篇 数学
    • 2,623 篇 生物学
    • 1,692 篇 统计学(可授理学、...
    • 1,468 篇 化学
    • 844 篇 系统科学
    • 816 篇 地球物理学
  • 3,760 篇 管理学
    • 2,128 篇 管理科学与工程(可...
    • 1,650 篇 图书情报与档案管...
    • 1,045 篇 工商管理
  • 2,096 篇 医学
    • 1,720 篇 临床医学
    • 1,328 篇 基础医学(可授医学...
    • 808 篇 药学(可授医学、理...
    • 615 篇 公共卫生与预防医...
  • 687 篇 法学
    • 590 篇 社会学
  • 450 篇 农学
  • 382 篇 经济学
  • 305 篇 教育学
  • 104 篇 文学
  • 56 篇 军事学
  • 49 篇 艺术学
  • 13 篇 哲学
  • 8 篇 历史学

主题

  • 1,357 篇 computer science
  • 422 篇 deep learning
  • 338 篇 computational mo...
  • 302 篇 application soft...
  • 285 篇 feature extracti...
  • 281 篇 machine learning
  • 275 篇 image segmentati...
  • 263 篇 computer archite...
  • 216 篇 data mining
  • 198 篇 training
  • 197 篇 artificial intel...
  • 194 篇 accuracy
  • 190 篇 throughput
  • 180 篇 support vector m...
  • 171 篇 routing
  • 160 篇 computer vision
  • 159 篇 internet of thin...
  • 157 篇 semantics
  • 155 篇 bandwidth
  • 153 篇 neural networks

机构

  • 955 篇 cavendish labora...
  • 896 篇 department of ph...
  • 829 篇 oliver lodge lab...
  • 825 篇 physikalisches i...
  • 579 篇 school of physic...
  • 506 篇 infn laboratori ...
  • 468 篇 infn sezione di ...
  • 457 篇 fakultät physik ...
  • 456 篇 university of ch...
  • 447 篇 infn sezione di ...
  • 440 篇 infn sezione di ...
  • 398 篇 horia hulubei na...
  • 394 篇 school of physic...
  • 392 篇 iccub universita...
  • 384 篇 department for p...
  • 380 篇 department of ph...
  • 370 篇 imperial college...
  • 368 篇 center for high ...
  • 367 篇 nikhef national ...
  • 366 篇 stfc rutherford ...

作者

  • 265 篇 a. gomes
  • 253 篇 c. alexa
  • 249 篇 j. m. izen
  • 242 篇 s. chen
  • 238 篇 c. amelung
  • 237 篇 g. bella
  • 237 篇 j. strandberg
  • 237 篇 d. calvet
  • 228 篇 g. spigo
  • 226 篇 f. siegert
  • 221 篇 j. wang
  • 213 篇 y. tayalati
  • 213 篇 r. ströhmer
  • 211 篇 m. rijssenbeek
  • 207 篇 s. jin
  • 202 篇 g. gaudio
  • 194 篇 s. mohapatra
  • 194 篇 d. golubkov
  • 190 篇 m. gandelman
  • 188 篇 t. gershon

语言

  • 26,033 篇 英文
  • 2,786 篇 其他
  • 260 篇 中文
  • 16 篇 日文
  • 12 篇 德文
  • 6 篇 俄文
  • 4 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 西班牙文
  • 1 篇 阿拉伯文
检索条件"机构=Center for Research in Computer Vision Department of Computer Science"
29096 条 记 录,以下是331-340 订阅
排序:
A Systematic Literature Review of CNN Approaches in Classifying Brain Tumor  6
A Systematic Literature Review of CNN Approaches in Classify...
收藏 引用
6th International Conference on computer and Informatics Engineering, IC2IE 2023
作者: Paulindino, Aedentrisa Yasmanda Pardamean, Bens Elwirehardja, Gregorius Natanael Bina Nusantara University Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta Indonesia Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta Indonesia
The ability of Convolutional Neural Networks (CNNs) to accurately discriminate between normal and tumorous brain tissues has been promising. The review focuses on the different CNN models, pre-processing methods, data... 详细信息
来源: 评论
Long Short-Term Memory-based Models for Sleep Quality Prediction from Wearable Device Time Series Data  8
Long Short-Term Memory-based Models for Sleep Quality Predic...
收藏 引用
8th International Conference on computer science and Computational Intelligence, ICCSCI 2023
作者: Hidayat, Alam Ahmad Budiarto, Arif Pardamean, Bens Mathematics Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta11480 Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Computer Science Department BINUS Graduate Program - Master of Computer Science Program Bina Nusantara University Jakarta11480 Indonesia
Several studies suggest that sleep quality is associated with physical activities. Moreover, deep sleep time can be used to determine the sleep quality of an individual. In this work, we aim to find the association be... 详细信息
来源: 评论
AcLGB: A Lightweight DDoS Attack Detection Method  7th
AcLGB: A Lightweight DDoS Attack Detection Method
收藏 引用
7th International Conference on Information science, Communication and Computing, ISCC 2023
作者: Zeng, Fantao Cheng, Jieren Cao, Zhuyun Yang, Yue Sheng, Victor S. School of Computer Science and Technology Hainan University Haikou570228 China Hainan Blockchain Technology Engineering Research Center Haikou570228 China Department of Computer Science Texas Tech University TX79409 United States
With the development of Internet technology, distributed denial of service(DDoS) attack has always been a hot and difficult point in network *** network infrastructure and information security is also becoming more an... 详细信息
来源: 评论
Systematic Literature Review of Transformer Model Implementations in Detecting Depression  6
Systematic Literature Review of Transformer Model Implementa...
收藏 引用
6th International Conference on computer and Informatics Engineering, IC2IE 2023
作者: Nanggala, Kenjovan Pardamean, Bens Elwirehardja, Gregorius Natanael Bina Nusantara University Binus Graduate Program - Master of Computer Science Computer Science Department Jakarta Indonesia Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta Indonesia
This systematic literature review explores the application of transformer models in early detection of human depression, encompassing text, audio, and video data modalities. Transformer architectures, notably BERT for... 详细信息
来源: 评论
Structured Analysis and Comparison of Alphabets in Historical Handwritten Ciphers
arXiv
收藏 引用
arXiv 2024年
作者: Méndez, Martín Torras, Pau Molina, Adrià Chen, Jialuo Ramos-Terrades, Oriol Fornés, Alicia Computer Vision Center Computer Science Department Universitat Autònoma de Barcelona Catalunya Spain
Historical ciphered manuscripts are documents that were typically used in sensitive communications within military and diplomatic contexts or among members of secret societies. These secret messages were concealed by ... 详细信息
来源: 评论
Decentralized Edge-Based Detection of Label Flipping Attacks in Federated Learning  17th
Decentralized Edge-Based Detection of Label Flipping Attack...
收藏 引用
17th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2024 and the 15th International Conference on EUropean Transnational Education, ICEUTE 2024
作者: AlOtaibi, Nourah Felemban, Muhamad Mahmood, Sajjad Information and Computer Science Department KFUPM Dhahran Saudi Arabia Dammam Saudi Arabia Computer Engineering Department KFUPM Dhahran Saudi Arabia Interdisciplinary Research Center for Intelligent Secure Systems Dhahran Saudi Arabia
Federated learning (FL) enhances data privacy by enabling decentralized model training without sharing local data. However, FL is vulnerable to Label-Flipping-Attacks (LFA), where malicious clients flip data labels. T... 详细信息
来源: 评论
Dynamic Optimal Power Flow Method Based on Reinforcement Learning for Offshore Wind Farms Considering Multiple Points of Common Coupling
收藏 引用
Journal of Modern Power Systems and Clean Energy 2024年 第6期12卷 1749-1759页
作者: Yang Fu Zixu Ren Shurong Wei Lingling Huang Fangxing Li Yang Liu Engineering Research Center of Offshore Wind Technology Ministry of Education(Shanghai University of Electric Power) Shanghai 200090China Department of Electrical Power Engineering Shanghai University of Electric PowerShanghai 200090China Department of Electrical Engineering and Computer Science The University of TennesseeKnoxvilleTN 37996USA
The widespread adoption of renewable energy sources presents significant challenges for power system *** paper proposes a dynamic optimal power flow(DOPF)method based on reinforcement learning(RL)to ad-dress the dispa... 详细信息
来源: 评论
Modeling and Clustering of Parabolic Granular Data
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第7期5卷 3728-3742页
作者: Tang, Yiming Gao, Jianwei Pedrycz, Witold Hu, Xianghui Xi, Lei Ren, Fuji Hu, Min Hefei University of Technology Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine School of Computer and Information Hefei230601 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6R 2V4 Canada Hefei University of Technology School of Computer and Information Hefei230601 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 2R3 Canada Polish Academy of Sciences Systems Research Institute Warsaw00-901 Poland Istinye University Research Center of Performance and Productivity Analysis Istanbul34010 Turkey Southeast University School of Computer Science and Engineering Nanjing211189 China University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China
At present, there exist some problems in granular clustering methods, such as lack of nonlinear membership description and global optimization of granular data boundaries. To address these issues, in this study, revol... 详细信息
来源: 评论
Hybrid intelligent system for channel allocation and packet transmission in CR-IoT networks
收藏 引用
International Journal of Hybrid Intelligent Systems 2024年 第2期20卷 101-117页
作者: Asuquo, Daniel E. Umoh, Uduak A. Robinson, Samuel A. Dan, Emmanuel A. Udoh, Samuel S. Attai, Kingsley F. Department of Information Systems Faculty of Computing University of Uyo TETFund Center of Excellence in Computational Intelligence Research University of Uyo Department of Cyber Security Faculty of Computing University of Uyo Department of Computer Science Faculty of Computing University of Uyo Department of Data Science Faculty of Computing University of Uyo Department of Mathematics and Computer Science Ritman University Ikot Ekpene
The proliferation of interconnected devices is driving a surge in the demand for wireless spectrum. Meeting the need for wireless channel access for every device, while also ensuring consistent quality of service (QoS... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论