咨询与建议

限定检索结果

文献类型

  • 5,412 篇 会议
  • 4,285 篇 期刊文献
  • 21 册 图书

馆藏范围

  • 9,718 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,788 篇 工学
    • 4,353 篇 计算机科学与技术...
    • 3,635 篇 软件工程
    • 1,451 篇 信息与通信工程
    • 856 篇 生物工程
    • 815 篇 控制科学与工程
    • 719 篇 电气工程
    • 648 篇 生物医学工程(可授...
    • 523 篇 光学工程
    • 440 篇 电子科学与技术(可...
    • 330 篇 机械工程
    • 322 篇 网络空间安全
    • 276 篇 化学工程与技术
    • 257 篇 仪器科学与技术
    • 251 篇 安全科学与工程
    • 231 篇 动力工程及工程热...
    • 226 篇 交通运输工程
  • 3,482 篇 理学
    • 1,630 篇 数学
    • 1,013 篇 生物学
    • 992 篇 物理学
    • 575 篇 统计学(可授理学、...
    • 386 篇 化学
    • 271 篇 系统科学
  • 1,751 篇 管理学
    • 1,001 篇 管理科学与工程(可...
    • 833 篇 图书情报与档案管...
    • 473 篇 工商管理
  • 712 篇 医学
    • 594 篇 临床医学
    • 531 篇 基础医学(可授医学...
    • 326 篇 公共卫生与预防医...
    • 294 篇 药学(可授医学、理...
  • 338 篇 法学
    • 271 篇 社会学
  • 177 篇 农学
  • 170 篇 经济学
  • 79 篇 教育学
  • 29 篇 文学
  • 16 篇 军事学
  • 16 篇 艺术学
  • 1 篇 历史学

主题

  • 453 篇 accuracy
  • 416 篇 deep learning
  • 318 篇 feature extracti...
  • 277 篇 machine learning
  • 242 篇 computational mo...
  • 240 篇 training
  • 235 篇 real-time system...
  • 227 篇 predictive model...
  • 189 篇 convolutional ne...
  • 171 篇 internet of thin...
  • 167 篇 data models
  • 164 篇 semantics
  • 162 篇 optimization
  • 128 篇 neural networks
  • 128 篇 security
  • 127 篇 artificial intel...
  • 120 篇 support vector m...
  • 108 篇 federated learni...
  • 107 篇 cloud computing
  • 103 篇 reinforcement le...

机构

  • 427 篇 department of ph...
  • 402 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 386 篇 h.h. wills physi...
  • 376 篇 van swinderen in...
  • 347 篇 yandex school of...
  • 347 篇 college of compu...
  • 320 篇 school of physic...
  • 318 篇 cavendish labora...
  • 305 篇 university of ch...
  • 292 篇 imperial college...
  • 292 篇 nikhef national ...
  • 291 篇 department of ph...
  • 289 篇 center for high ...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 283 篇 physikalisches i...

作者

  • 250 篇 barter w.
  • 246 篇 bellee v.
  • 241 篇 beiter a.
  • 222 篇 casse g.
  • 217 篇 bowcock t.j.v.
  • 216 篇 blake t.
  • 214 篇 borsato m.
  • 212 篇 betancourt c.
  • 209 篇 brundu d.
  • 198 篇 bediaga i.
  • 193 篇 amato s.
  • 187 篇 baryshnikov f.
  • 181 篇 boettcher t.
  • 166 篇 braun s.
  • 163 篇 borisyak m.
  • 158 篇 baker s.
  • 157 篇 bizzeti a.
  • 150 篇 bjørn m.
  • 146 篇 bencivenni g.
  • 145 篇 niyato dusit

语言

  • 8,599 篇 英文
  • 1,068 篇 其他
  • 73 篇 中文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 俄文
检索条件"机构=College of Computer Science and Data Science"
9718 条 记 录,以下是301-310 订阅
排序:
Successful Integration of IoT and Blockchain Technologies Using Several Machine Learning Algorithms  5
Successful Integration of IoT and Blockchain Technologies Us...
收藏 引用
5th IEEE International Conference on Computing, Power, and Communication Technologies, IC2PCT 2024
作者: Calarany, C. Indumathy, M. Senthilraja, P. Suganya, D. Gopi Vardhan, V. Rahul, Yelisetty Shanmukh Tagore Government Arts and Science College Department of Computer Science Puducherry India Rajiv Gandhi College of Engineering & Technology Department of Information Technology Kirumampakkam India K.S.Rangasamy College of Technology Department of Computer Science Tamil Nadu India Rajiv Gandhi College of Engineering & Technology Department of Computer Science Kirumampakkam India Data Science and Business Systems Srm Institute of Science and Technology Kattankulathur India
Internet of Things (IoT) produces massive amounts of data that need to be processed and saved securely. The strong features of Blockchain makes it as a best candidate for storing the data received from IoT sensors. Ho... 详细信息
来源: 评论
A Secure Approach to Avoid data Repetition in Cloud Storage Systems  2
A Secure Approach to Avoid Data Repetition in Cloud Storage ...
收藏 引用
2nd International Conference on Artificial Intelligence and Machine Learning Applications, AIMLA 2024
作者: Swedhaa, M.A. Sathya, V. Vanitha, M. Jothilakshmi, T. Kongunadu College of Engineering and Technology Artificial Intelligence and Data Science Trichy India Mohamed Sathak A.J. College of Engineering Computer Science and Engineering Tamilnadu Chennai India
Cloud Storage will be current data research and data management field in terms of security and elimination of repeated data-sets. In simple terms, this current research introduces a strong system called "Cloud-Se... 详细信息
来源: 评论
A Generative Approach for Treatment Effect Estimation under Collider Bias: From an Out-of-Distribution Perspective  41
A Generative Approach for Treatment Effect Estimation under ...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Li, Baohong Li, Haoxuan Wu, Anpeng Zhu, Minqin Peng, Shiyuan Cao, Qingyu Kuang, Kun College of Computer Science and Technology Zhejiang University Hangzhou China Center for Data Science Peking University Beijing China Alibaba Group Hangzhou China
Resulting from non-random sample selection caused by both the treatment and outcome, collider bias poses a unique challenge to treatment effect estimation using observational data whose distribution differs from that ... 详细信息
来源: 评论
Provably Efficient Multi-Cancer Image Segmentation Based on Multi-Class Fuzzy Entropy
收藏 引用
Informatica (Slovenia) 2023年 第8期47卷 77-88页
作者: Jasim, Hend Muslim Ghrabat, Mudhafar Jalil Jassim Abdulrahman, Luqman Qader Nyangaresi, Vincent Omollo Ma, Junchao Abduljabbar, Zaid Ameen Abduljaleel, Iman Qays Department of Computer Science College of Education for Pure Sciences University of Basrah Basrah61004 Iraq Iraqi Commission for Computers and Informatics The Informatics Institute for Postgraduate Studies Baghdad Iraq Computer Science Department Al-Turath University College Baghdad10013 Iraq College of Health Science Hawler Medical University Erbil Iraq Jaramogi Oginga Odinga University of Science and Technology Bondo40601 Kenya College of Big Data and Internet Shenzhen Technology University Shenzhen518118 China Technical Computer Engineering Department AL-Kunooze University College Basrah6100 Iraq Huazhong University of Science and Technology Shenzhen Institute Shenzhen518000 China Department of Computer Science College of Computer Science and Information Technology University of Basrah Basrah61004 Iraq
One of the segmentation techniques with the greatest degree of success used in numerous recent applications is multi-level thresholding. The selection of appropriate threshold values presents difficulties for traditio... 详细信息
来源: 评论
3D E-commerce Using AI Depth Algorithm Augmented Reality  8th
3D E-commerce Using AI Depth Algorithm Augmented Reality
收藏 引用
8th International Conference on Microelectronics Electromagnetics and Telecommunications, ICMEET 2023
作者: Silviya, S. H. Annie Devi, S. Renuka Sriman, B. Aswinrani, M. Raja, S. Sunitha, T. Rajalakshmi Institute of Technology Tamil Nadu Chennai India Department of Artificial Intelligence and Data Science Rajalakshmi Engineering College Chennai India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Artificial Intelligence and Data Science Saveetha Engineering College Chennai India
In today's dynamic world of online shopping, augmented reality (AR) integration has emerged as a game-changing innovation. It transcends the limitations of traditional online shopping by harnessing AR technologies... 详细信息
来源: 评论
Channel assignment and power allocation for throughput improvement with PPO in B5G heterogeneous edge networks
收藏 引用
Digital Communications and Networks 2024年 第1期10卷 109-116页
作者: Xiaoming He Yingchi Mao Yinqiu Liu Ping Ping Yan Hong Han Hu The College of Computer and Information Hohai UniversityNanjingChina The Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai UniversityNanjing China The School of Computer Science and Engineering Nanyang Technological UniversitySingapore The College of Textile and Clothing Engineering Soochow UniversitySuzhouChina The College of Internet of Things Nanjing University of Posts and TelecomurunicationsNanjingChina
In Beyond the Fifth Generation(B5G)heterogeneous edge networks,numerous users are multiplexed on a channel or served on the same frequency resource block,in which case the transmitter applies coding and the receiver u... 详细信息
来源: 评论
FESR - Framework to evaluate Software Reliability based on software metrics  24
FESR - Framework to evaluate Software Reliability based on s...
收藏 引用
8th International Conference on High Performance Compilation, Computing and Communications, HP3C 2024
作者: Fahad, Hurriya Ahmed, Irfan Mahmood, Jabar Saman Batool, Khadija Ali, Qasim Department of Computer Science University of Sialkot Sialkot Pakistan State Key Laboratory of Blockchain and Data Security School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Zhejiang Hangzhou310007 China
Evaluating reliability of software is hot concern for decision makers and software engineers seeing as if we assess, it cannot be mastered. It is common that reliability of system stratum could be employed for evaluat... 详细信息
来源: 评论
Deep Learning and Artificial Intelligence-Driven Advanced Methods for Acute Lymphoblastic Leukemia Identification and Classification: A Systematic Review
收藏 引用
computer Modeling in Engineering & sciences 2025年 第2期142卷 1199-1231页
作者: Syed Ijaz Ur Rahman Naveed Abbas Sikandar Ali Muhammad Salman Ahmed Alkhayat Jawad Khan Dildar Hussain Yeong Hyeon Gu Department of Computer Science Islamia CollegePeshawar25120Pakistan Department of Information Technology The University of HaripurHaripur22620Pakistan College of Technical Engineering The Islamic UniversityNajaf100986Iraq School of Computing Gachon UniversitySeongnam13120Republic of Korea Department of AI and Data Science Sejong UniversitySeoul05006Republic of Korea
Automatic detection of Leukemia or blood cancer is one of the most challenging tasks that need to be addressed in the healthcare *** of white blood cells(WBCs)in the blood or bone marrow microscopic slide images play ... 详细信息
来源: 评论
Nonlinear Registration of Brain Magnetic Resonance Images with Cross Constraints of Intensity and Structure
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2295-2313页
作者: Han Zhou HongtaoXu Xinyue Chang Wei Zhang Heng Dong Digital Fujian Research Institute of Big Data forAgriculture and Forestry Fujian Agriculture and Forestry UniversityFuzhou350002China College of Computer and Information Science Fujian Agriculture and Forestry UniversityFuzhou350002China
Many deep learning-based registration methods rely on a single-stream encoder-decoder network for computing deformation fields between 3D ***,these methods often lack constraint information and overlook semantic consi... 详细信息
来源: 评论
A Tiny Efficient U-Net with Gated Linear Attention for Medical Image Segmentation
A Tiny Efficient U-Net with Gated Linear Attention for Medic...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Ju, Sibo Chen, Zhaozhen Liao, Xiangwen Shen, Yiqing He, Junjun Su, Yanzhou Fuzhou University College of Computer and Data Science Fuzhou China Johns Hopkins University Department of Computer Science Baltimore United States Shanghai Artificial Intelligence Laboratory Shanghai China
Medical image segmentation is crucial for diagnosis and treatment planning. While recent advancements in deep learning, particularly UNet variants, have improved segmentation performance, they often result in increase... 详细信息
来源: 评论