咨询与建议

限定检索结果

文献类型

  • 16,227 篇 会议
  • 14,212 篇 期刊文献
  • 151 册 图书
  • 2 篇 专利

馆藏范围

  • 30,592 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,012 篇 工学
    • 14,543 篇 计算机科学与技术...
    • 12,265 篇 软件工程
    • 4,337 篇 信息与通信工程
    • 3,003 篇 生物工程
    • 2,450 篇 控制科学与工程
    • 1,900 篇 生物医学工程(可授...
    • 1,884 篇 电气工程
    • 1,565 篇 光学工程
    • 1,290 篇 电子科学与技术(可...
    • 993 篇 机械工程
    • 907 篇 化学工程与技术
    • 725 篇 网络空间安全
    • 710 篇 安全科学与工程
    • 661 篇 动力工程及工程热...
    • 653 篇 交通运输工程
    • 626 篇 仪器科学与技术
  • 11,274 篇 理学
    • 6,072 篇 数学
    • 3,398 篇 生物学
    • 2,657 篇 物理学
    • 2,317 篇 统计学(可授理学、...
    • 1,081 篇 化学
    • 1,073 篇 系统科学
  • 5,539 篇 管理学
    • 2,910 篇 图书情报与档案管...
    • 2,890 篇 管理科学与工程(可...
    • 1,466 篇 工商管理
  • 1,842 篇 医学
    • 1,545 篇 临床医学
    • 1,403 篇 基础医学(可授医学...
    • 812 篇 药学(可授医学、理...
    • 794 篇 公共卫生与预防医...
  • 1,028 篇 法学
    • 871 篇 社会学
  • 544 篇 经济学
  • 417 篇 农学
  • 324 篇 教育学
  • 96 篇 文学
  • 47 篇 军事学
  • 39 篇 艺术学
  • 5 篇 历史学
  • 4 篇 哲学

主题

  • 1,006 篇 deep learning
  • 888 篇 accuracy
  • 773 篇 machine learning
  • 719 篇 training
  • 713 篇 feature extracti...
  • 578 篇 semantics
  • 565 篇 computational mo...
  • 427 篇 predictive model...
  • 419 篇 data models
  • 347 篇 convolutional ne...
  • 343 篇 internet of thin...
  • 331 篇 support vector m...
  • 326 篇 reinforcement le...
  • 321 篇 real-time system...
  • 286 篇 neural networks
  • 277 篇 data mining
  • 274 篇 image segmentati...
  • 256 篇 task analysis
  • 255 篇 optimization
  • 249 篇 deep neural netw...

机构

  • 819 篇 school of data a...
  • 428 篇 department of ph...
  • 397 篇 iccub universita...
  • 345 篇 university of ch...
  • 342 篇 college of compu...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...
  • 280 篇 henryk niewodnic...
  • 279 篇 horia hulubei na...

作者

  • 241 篇 beiter a.
  • 241 篇 barter w.
  • 223 篇 bellee v.
  • 218 篇 casse g.
  • 212 篇 bowcock t.j.v.
  • 194 篇 brundu d.
  • 185 篇 blake t.
  • 172 篇 niyato dusit
  • 155 篇 baker s.
  • 153 篇 borsato m.
  • 149 篇 betancourt c.
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon

语言

  • 27,438 篇 英文
  • 3,008 篇 其他
  • 194 篇 中文
  • 6 篇 法文
  • 4 篇 德文
  • 4 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Science/Data Science"
30592 条 记 录,以下是4961-4970 订阅
排序:
Microservice-Based Fog Testbed for 6G Applications  26
Microservice-Based Fog Testbed for 6G Applications
收藏 引用
26th International Conference on Advanced Communications Technology, ICACT 2024
作者: Kuzmina, Ekaterina Tefikova, Meriem Volkov, Artem Muthanna, Ammar Ateya, Abdelhamied A. Koucheryavy, Andrey Saint-Petersburg State University of Telecommunications Department of Telecommunication Networks and Data Transmission Saint Petersburg Russia Zagazig University Department of Electronics and Communications Engineering Zagazig44519 Egypt College of Computer and Information Sciences Prince Sultan University Eias Data Science Lab Riyadh11586 Saudi Arabia
This paper provides a real-time fog computing model based on a microservice architecture that enables testing and modeling of eventual implementations of ultra-reliable low-latency communications (uRLLC) services. The... 详细信息
来源: 评论
Task Offloading and Resource Allocation in IoT Based Mobile Edge Computing Using Deep Learning
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 1463-1477页
作者: Ily s Abdullaev Natalia Prodanova KAruna Bhaskar ELaxmi Lydia Seifedine Kadry Jungeun Kim Dean of the Faculty of Economics Department of Management and MarketingFaculty of EconomicsUrgench State UniversityUrganch220100Uzbekistan Basic Department Financial Control Analysis and Audit of Moscow Main Control DepartmentPlekhanov Russian University of EconomicsMoscow117997Russia Department of Computer Science and Engineering KL Deemed to UniversityVaddeswaramGunturAndhra PradeshIndia Department of Computer Science and Engineering GMR Institute of TechnologyAndhra PradeshRajamIndia Department of Applied Data Science Noroff University CollegeKristiansandNorway Artificial Intelligence Research Center(AIRC) Ajman UniversityAjman346United Arab Emirates Department of Electrical and Computer Engineering Lebanese American UniversityByblosLebanon Department of Software Kongju National UniversityCheonan31080Korea
Recently,computation offloading has become an effective method for overcoming the constraint of a mobile device(MD)using computationintensivemobile and offloading delay-sensitive application tasks to the remote cloud-... 详细信息
来源: 评论
Multi-Tree Genetic Programming for Learning Color and Multi-Scale Features in Image Classification
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 1-1页
作者: Fan, Qinglan Bi, Ying Xue, Bing Zhang, Mengjie School of Computer Science and Technology Shandong University of Finance and Economics Jinan China School of Electrical and Information Engineering Zhengzhou University Zhengzhou China Center for Data Science and Artificial Intelligence and School of Engineering and Computer Science Victoria University of Wellington Wellington New Zealand
data-efficient image classification, which focuses on achieving accurate classification performance with limited labeled data, has garnered significant attention. Genetic programming (GP) has achieved impressive progr... 详细信息
来源: 评论
MOMENTS AND LARGE DEVIATIONS FOR SUPERCRITICAL BRANCHING PROCESSES WITH IMMIGRATION IN RANDOM ENVIRONMENTS
收藏 引用
Acta Mathematica Scientia 2022年 第1期42卷 49-72页
作者: Chunmao HUANG Chen WANG Xiaoqiang WANG Department of Mathematics Harbin Institute of Technology(Weihai)Weihai 264209China School of Data and Computer Science Sun Yat-sen UniversityGuangzhou 510006China School of Mathematics and Statistics Shandong UniversityWeihai 264209China
Let(Z_(n))be a branching process with immigration in a random environmentξ,whereξis an independent and identically distributed sequence of random *** show asymptotic properties for all the moments of Z_(n) and descr... 详细信息
来源: 评论
Enhancing IoT Security with Self-Adaptive Blockchain-Based Intrusion Detection System
Enhancing IoT Security with Self-Adaptive Blockchain-Based I...
收藏 引用
2023 Intelligent Computing and Control for Engineering and Business Systems, ICCEBS 2023
作者: Naik, Pramod Kumar Mannanuddin, Khaja Sundaresan, K. Sah, Swati Patil, Harshal Firos, A. Dayananda Sagar University Department Cse Bangalore India School of Computer Science & Ai Sr University Telangana Warangal India Karpagam Institute of Technology. Coimbatore Anna University Department of Artificial Intelligence and Data Science Chennai India School of Set Sharda University Greater Noida India Pune India Rono-Hills Department of Computer Science and Engineering Arunachal Pradesh Doimukh India
The extensive adoption of Internet of Things (IoT) devices has resulted in a revolution across a variety of business sectors by presenting previously unimaginable prospects for connection and automation. Despite this,... 详细信息
来源: 评论
Quantum Computing's Double-Edged Sword Unravelling the Vulnerabilities in Quantum Key Distribution for Enhanced Network Security
Quantum Computing's Double-Edged Sword Unravelling the Vulne...
收藏 引用
2023 IEEE International Conference on Next Generation Electronics, NEleX 2023
作者: Anantraj, I. Umarani, B. Karpagavalli, C. Usharani, C. Lakshmi, S. Jothi Sri Krishna College of Engineering and Technology Department of Computer Science and Business Systems Coimbatore India Kongunadu College of Engineering and Technology Department of Electronics and Communication Engineering Namakkal India Ramco Institute of Technology Department of Artificial Intelligence and Data Science Rajapalayam India
Quantum computing has emerged as both a boon and a bane in the realm of network security. This paper delves into the intriguing interplay between quantum computing and the vulnerabilities of Quantum Key Distribution (... 详细信息
来源: 评论
Healthy/Glaucoma Fundus Retinal Image Classification using Butterfly Algorithm Optimized ResNet-Features
收藏 引用
Procedia computer science 2025年 258卷 1804-1812页
作者: Ramya Mohan Seifedine Kadry Sahar Yassine Venkatesan Rajinikanth Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences (SIMATS) Chennai 602105 TN India Department of applied data science Noroff University College Kristiansand Norway
Hospitals frequently use medical image supported disease diagnosis to identify diseases and evaluates their severity. Automation in image examination is normally preferred to reduce the diagnostic burden. Developing a... 详细信息
来源: 评论
Modeling Layout Reading Order as Ordering Relations for Visually-rich Document Understanding
Modeling Layout Reading Order as Ordering Relations for Visu...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Zhang, Chong Tu, Yi Zhao, Yixi Yuan, Chenshu Chen, Huan Zhang, Yue Chai, Mingxu Guo, Ya Zhu, Huijia Zhang, Qi Gui, Tao School of Computer Science Fudan University Shanghai China Shanghai Key Laboratory of Intelligent Information Processing Shanghai China Ant Tiansuan Security Lab Ant Group Hangzhou China School of Statistics and Data Science Nankai University Tianjin China Institute of Modern Languages and Linguistics Fudan University Shanghai China
Modeling and leveraging layout reading order in visually-rich documents (VrDs) is critical in document intelligence as it captures the rich structure semantics within documents. Previous works typically formulated lay... 详细信息
来源: 评论
Contour and key point based eye feature extraction
Contour and key point based eye feature extraction
收藏 引用
2023 International Conference on Image, Signal Processing, and Pattern Recognition, ISPP 2023
作者: Wang, Yue Wan, Yaping Min, Xiaoshan Fan, Zhiqing He, Yasha Zou, Gang School of Computer Science University of South China Hengyang421001 China Hunan Medical Big Data International Science and Technology Cooperation Base Hengyang421001 China Xiangya School of Medicine Central South University Changsha410205 China School of Computer Science and Technology North University of China Taiyuan030000 China Hunan ZhongkeZhuying Intelligent Technology Research Institute Changsha410205 China
The use of eye movements for identifying intrinsic human psychological changes is a hot topic, and the identification of eye states in specific scenarios is the basis for analyzing the test taker's instantaneous p... 详细信息
来源: 评论
3L-AODV: Three Layer Security Protocol for Grayhole Attack Mitigation in MANET  8th
3L-AODV: Three Layer Security Protocol for Grayhole Attack ...
收藏 引用
8th International Congress on Information and Communication Technology, ICICT 2023
作者: Kamel, Mohammed B. M. Abdullah, Wisam Dawood Hamoud, Alaa Khalaf Valadares, Dalton C. G. Shareiyat, Ammar Ligeti, Peter Department of Computer Algebra Eotvos Lorand University Budapest Hungary Institute for Data Science Cloud Computing and IT Security Furtwangen University of Applied Sciences Furtwangen im Schwarzwald Germany Department of Computer Science University of Kufa Najaf Iraq Department of Computer Science University of Tikrit Tikrit Iraq Department of Computer Information Systems University of Basrah Basrah Iraq Virtus RDI Center Federal University of Campina Grande Campina Grande Brazil Federal Institute of Pernambuco Pernambuco Caruaru Brazil Department of CSS University of Stockholm Stockholm Sweden Department of Vulnerability Operations Center Orange Cyberdefense Stockholm Sweden
As the mobile ad hoc networks infrastructure has no centralized points of connections, the traffic from a source to a destination passes through number of intermediate nodes. When more than one neighbor node is availa... 详细信息
来源: 评论