咨询与建议

限定检索结果

文献类型

  • 43,759 篇 会议
  • 21,924 篇 期刊文献
  • 359 册 图书

馆藏范围

  • 66,042 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 39,614 篇 工学
    • 27,797 篇 计算机科学与技术...
    • 22,841 篇 软件工程
    • 10,273 篇 信息与通信工程
    • 6,792 篇 控制科学与工程
    • 5,077 篇 电气工程
    • 4,839 篇 生物工程
    • 4,439 篇 电子科学与技术(可...
    • 3,875 篇 生物医学工程(可授...
    • 3,051 篇 光学工程
    • 2,936 篇 机械工程
    • 2,331 篇 动力工程及工程热...
    • 2,288 篇 网络空间安全
    • 2,212 篇 化学工程与技术
    • 2,142 篇 仪器科学与技术
    • 1,871 篇 安全科学与工程
    • 1,625 篇 交通运输工程
    • 1,620 篇 材料科学与工程(可...
  • 22,533 篇 理学
    • 10,842 篇 数学
    • 7,170 篇 物理学
    • 5,578 篇 生物学
    • 3,399 篇 统计学(可授理学、...
    • 2,474 篇 化学
    • 2,251 篇 系统科学
  • 11,685 篇 管理学
    • 7,521 篇 管理科学与工程(可...
    • 4,737 篇 图书情报与档案管...
    • 3,140 篇 工商管理
  • 4,136 篇 医学
    • 3,419 篇 临床医学
    • 3,072 篇 基础医学(可授医学...
    • 1,902 篇 公共卫生与预防医...
    • 1,828 篇 药学(可授医学、理...
  • 1,985 篇 法学
  • 1,250 篇 经济学
  • 1,208 篇 农学
  • 652 篇 教育学
  • 281 篇 文学
  • 192 篇 军事学
  • 125 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 2,536 篇 accuracy
  • 2,222 篇 deep learning
  • 2,006 篇 feature extracti...
  • 1,648 篇 machine learning
  • 1,519 篇 training
  • 1,461 篇 computational mo...
  • 1,376 篇 educational inst...
  • 1,330 篇 internet of thin...
  • 1,313 篇 convolutional ne...
  • 1,301 篇 real-time system...
  • 1,191 篇 predictive model...
  • 1,161 篇 support vector m...
  • 1,128 篇 computer science
  • 972 篇 optimization
  • 853 篇 security
  • 813 篇 data models
  • 784 篇 artificial intel...
  • 775 篇 data mining
  • 740 篇 cloud computing
  • 710 篇 neural networks

机构

  • 1,068 篇 college of compu...
  • 1,028 篇 department of ph...
  • 1,010 篇 cavendish labora...
  • 977 篇 physikalisches i...
  • 972 篇 oliver lodge lab...
  • 802 篇 college of compu...
  • 639 篇 university of ch...
  • 619 篇 infn sezione di ...
  • 611 篇 infn laboratori ...
  • 599 篇 infn sezione di ...
  • 588 篇 fakultät physik ...
  • 564 篇 infn sezione di ...
  • 556 篇 school of physic...
  • 544 篇 horia hulubei na...
  • 537 篇 department of ph...
  • 536 篇 school of physic...
  • 532 篇 imperial college...
  • 522 篇 nikhef national ...
  • 518 篇 h.h. wills physi...
  • 517 篇 school of physic...

作者

  • 268 篇 barter w.
  • 264 篇 a. gomes
  • 253 篇 beiter a.
  • 247 篇 c. alexa
  • 244 篇 j. m. izen
  • 238 篇 bellee v.
  • 237 篇 s. chen
  • 236 篇 g. bella
  • 236 篇 j. strandberg
  • 235 篇 d. calvet
  • 235 篇 c. amelung
  • 230 篇 brundu d.
  • 229 篇 g. spigo
  • 229 篇 blake t.
  • 226 篇 bowcock t.j.v.
  • 221 篇 f. siegert
  • 221 篇 betancourt c.
  • 220 篇 amato s.
  • 220 篇 bencivenni g.
  • 219 篇 borsato m.

语言

  • 60,414 篇 英文
  • 4,695 篇 其他
  • 950 篇 中文
  • 45 篇 日文
  • 6 篇 德文
  • 5 篇 法文
  • 5 篇 斯洛文尼亚文
  • 2 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=College of Computer Science and Technology Engineering"
66042 条 记 录,以下是4811-4820 订阅
排序:
High Speed Machining for Linear Paths Blended with G3 Continuous Pythagorean-Hodograph Curves
收藏 引用
Journal of Systems science & Complexity 2022年 第4期35卷 1586-1607页
作者: ZHAO Kai LI Shurong College of Control Science and Engineering China University of Petroleum(East China)Qingdao266580China College of Computer Science and Information Engineering Anyang Institute of TechnologyAnyang455000China School of Artificial Intelligence Beijing University of Posts and TelecommunicationsBeijing100876China
Previously,many studies have illustrated corner blend problem with different parameter *** a few of them take a Pythagorean-hodograph(PH)curve as the transition arc,let alone corresponding real-time interpolation *** ... 详细信息
来源: 评论
Hyper Triglycerides Prognosis Using Machine Learning and Data science
Hyper Triglycerides Prognosis Using Machine Learning and Dat...
收藏 引用
2023 International Conference on Data science, Agents and Artificial Intelligence, ICDSAAI 2023
作者: Sunitha, T. Sankaradass, Veeramalai Anna University P B College of Engineering Dept. Computer Science and Engineering Chennai India Chennai Institute of Technology Dept. Computer Science and Engineering Tamil Nadu Chennai600069 India
This study investigates the prognostic potential of machine learning and data science in evaluating hypertriglyceridemia, a condition linked to various health risks. Triglycerides, a substantial component of body fat ... 详细信息
来源: 评论
Light field salient object detection:A review and benchmark
收藏 引用
Computational Visual Media 2022年 第4期8卷 509-534页
作者: Keren Fu Yao Jiang Ge-Peng Ji Tao Zhou Qijun Zhao Deng-Ping Fan College of Computer Science Sichuan Universityand National Key Laboratory of Fundamental Science on Synthetic VisionSichuan UniversityChengdu 610065China School of Computer Science Wuhan UniversityWuhan 430072China PCA Lab School of Computer Science and EngineeringNanjing University of Science and TechnologyNanjing 210094China Computer Vision Lab ETH ZürichZürichSwitzerland
Salient object detection(SOD)is a long-standing research topic in computer vision with increasing interest in the past *** light fields record comprehensive information of natural scenes that benefit SOD in a number o... 详细信息
来源: 评论
Group Teaching Optimization Algorithm with Machine Learning Model for Big Data Analytics
Group Teaching Optimization Algorithm with Machine Learning ...
收藏 引用
2023 International Conference on Sustainable Communication Networks and Application, ICSCNA 2023
作者: Prabaharan, G. Sesha Vidhya, S. Venkatesh, K. Mary Sundararajan, Suma Christal Shobana, G. Srimathi, S. Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology Department of Computer Science and Engineering Veltech University Avadi Chennai India Rmk College of Engineering and Technology Department of Ece India Kalasalingam Academy of Research and Education Department of Computer Science and Engineering India Panimalar Engineering College Department of Information Technology Poonamalle Chennai India College of Science and Humanities Srm Institute of Science and Technology Department of Computer Applications SRM Nagar Kattankulathur603 203 India Saveetha School of Engineering Simats Department of Bio Technology Tamilnadu Chennai India
Big Data An analytics (BDA) plays a significant role in the process of decision-making over several domains. Effective evaluation and processing of enormous data amounts need influential techniques and Machine Learnin... 详细信息
来源: 评论
Adaptive Differential Privacy Budget Allocation Algorithm Based on Random Forest  16th
Adaptive Differential Privacy Budget Allocation Algorithm Ba...
收藏 引用
16th International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2021
作者: Wang, Chong-Yang Chen, Si-Yang Li, Xin-Cheng College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China
In the context of big data, privacy protection in the process of data mining has become a hot issue in the field of security. The commonly used privacy protection method is to add differential privacy in the process o... 详细信息
来源: 评论
Reconstructing the image stitching pipeline: integrating fusion and rectangling into a unified inpainting model  24
Reconstructing the image stitching pipeline: integrating fus...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Ziqi Xie Weidong Zhao Xianhui Liu Jian Zhao Ning Jia College of Computer Science and Technology Tongji University College of Computer Science and Technology and College of Electronics and Information Engineering Tongji University
Deep learning-based image stitching pipelines are typically divided into three cascading stages: registration, fusion, and rectangling. Each stage requires its own network training and is tightly coupled to the others...
来源: 评论
Application of Data Analysis and Visualization Tools for U.S. Renewable Solar Energy Generation, Its Sustainability Benefits, and Teaching In engineering Curriculum
Application of Data Analysis and Visualization Tools for U.S...
收藏 引用
2024 ASEE Annual Conference and Exposition
作者: Radhakrishnan, Ben D. Altamirano, Nelson Jaurez, James J. Department of Engineering Data and Computer Sciences College of Business Engineering and Technology National University San DiegoCA United States Department of Finance Economics Marketing and Accounting College of Business Engineering and Technology National University San DiegoCA United States Department of Computer Science & Cyber Security College of Business Engineering and Technology National University San DiegoCA United States
The advancement of Data Analysis technologies with visualization has gained significant ground in the industries and they are also gaining ground in higher education curriculum. This research will focus on the applica... 详细信息
来源: 评论
An Overview on Methods for Random Sampling of Social Media Interaction Data  1
An Overview on Methods for Random Sampling of Social Media I...
收藏 引用
1st International Conference on Advanced Computing and Emerging Technologies, ACET 2024
作者: Paturkar, Yogini Prasanna Bhagat, Amol P. Khodke, Priti A. Prof Ram Meghe College of Engineering & Management Research Centre Department of Computer Science and Engineering Badnera Amravati India Prof Ram Meghe College of Engineering & Management Department of Information Technology Badnera Amravati India
The explosive growth of social media platforms has generated vast amounts of interaction data, presenting both opportunities and challenges for researchers and analysts. Effective random sampling of this data is essen... 详细信息
来源: 评论
An Effective Approach Using Machine Learning for Fall Prediction  9
An Effective Approach Using Machine Learning for Fall Predic...
收藏 引用
9th International Conference on Smart Computing and Communications, ICSCC 2023
作者: Vinora, A. Maheswari, P. Uma Deborah, R.Nancy Ajitha, E. Srinivasan, A. Sivakarthi, G. Velammal College of Engineering and Technology Department of Information Technology Madurai India St. Joseph's Institute of Technology Department of Computer Science and Engineering Chennai India
The ability to fall has now increased due to the usage of phones as well as a variety of distractions on the streets that has led to a major public concern. Fall is an activity that can be caused to carelessness or in... 详细信息
来源: 评论
Strengthening Authentication: The Role of Multi-Level Hashing in OSPA Protocol  5
Strengthening Authentication: The Role of Multi-Level Hashin...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Hariharasudhan, S. Varghese, Vineetha Malarvizhi, K. Santhoshkumar, S.P. Nalini, T. Vikram, D. Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Chennai Avadi India Rathinam Technical Campus Department of Computer Science and Engineering Coimbatore India Jct College of Engineering and Technology Department of Computer Science Al Business Systems Coimbatore India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology School of Computing Department of Computer Science and Engineering Chennai Avadi India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Saveetha University Department of Computer Science and Engineering Chennai India Rathinam Technical Campus Department of Artificial Intelligence Data Science Coimbatore India
Authentication is a crucial step in the cyber security process that confirms user identities. Even though they are widely used, traditional password based techniques are frequently vulnerable to attacks like guessing ... 详细信息
来源: 评论