咨询与建议

限定检索结果

文献类型

  • 16,227 篇 会议
  • 14,212 篇 期刊文献
  • 151 册 图书
  • 2 篇 专利

馆藏范围

  • 30,592 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,012 篇 工学
    • 14,543 篇 计算机科学与技术...
    • 12,265 篇 软件工程
    • 4,337 篇 信息与通信工程
    • 3,003 篇 生物工程
    • 2,450 篇 控制科学与工程
    • 1,900 篇 生物医学工程(可授...
    • 1,884 篇 电气工程
    • 1,565 篇 光学工程
    • 1,290 篇 电子科学与技术(可...
    • 993 篇 机械工程
    • 907 篇 化学工程与技术
    • 725 篇 网络空间安全
    • 710 篇 安全科学与工程
    • 661 篇 动力工程及工程热...
    • 653 篇 交通运输工程
    • 626 篇 仪器科学与技术
  • 11,274 篇 理学
    • 6,072 篇 数学
    • 3,398 篇 生物学
    • 2,657 篇 物理学
    • 2,317 篇 统计学(可授理学、...
    • 1,081 篇 化学
    • 1,073 篇 系统科学
  • 5,539 篇 管理学
    • 2,910 篇 图书情报与档案管...
    • 2,890 篇 管理科学与工程(可...
    • 1,466 篇 工商管理
  • 1,842 篇 医学
    • 1,545 篇 临床医学
    • 1,403 篇 基础医学(可授医学...
    • 812 篇 药学(可授医学、理...
    • 794 篇 公共卫生与预防医...
  • 1,028 篇 法学
    • 871 篇 社会学
  • 544 篇 经济学
  • 417 篇 农学
  • 324 篇 教育学
  • 96 篇 文学
  • 47 篇 军事学
  • 39 篇 艺术学
  • 5 篇 历史学
  • 4 篇 哲学

主题

  • 1,006 篇 deep learning
  • 888 篇 accuracy
  • 773 篇 machine learning
  • 719 篇 training
  • 713 篇 feature extracti...
  • 578 篇 semantics
  • 565 篇 computational mo...
  • 427 篇 predictive model...
  • 419 篇 data models
  • 347 篇 convolutional ne...
  • 343 篇 internet of thin...
  • 331 篇 support vector m...
  • 326 篇 reinforcement le...
  • 321 篇 real-time system...
  • 286 篇 neural networks
  • 277 篇 data mining
  • 274 篇 image segmentati...
  • 256 篇 task analysis
  • 255 篇 optimization
  • 249 篇 deep neural netw...

机构

  • 819 篇 school of data a...
  • 428 篇 department of ph...
  • 397 篇 iccub universita...
  • 345 篇 university of ch...
  • 342 篇 college of compu...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...
  • 280 篇 henryk niewodnic...
  • 279 篇 horia hulubei na...

作者

  • 241 篇 beiter a.
  • 241 篇 barter w.
  • 223 篇 bellee v.
  • 218 篇 casse g.
  • 212 篇 bowcock t.j.v.
  • 194 篇 brundu d.
  • 185 篇 blake t.
  • 172 篇 niyato dusit
  • 155 篇 baker s.
  • 153 篇 borsato m.
  • 149 篇 betancourt c.
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon

语言

  • 27,438 篇 英文
  • 3,008 篇 其他
  • 194 篇 中文
  • 6 篇 法文
  • 4 篇 德文
  • 4 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Science and Data Science"
30592 条 记 录,以下是991-1000 订阅
排序:
Recognition of American sign language using modified deep residual CNN with modified canny edge segmentation
收藏 引用
Multimedia Tools and Applications 2025年 1-28页
作者: Hariharan, U. Devarajan, Devikanniga Kumar, P. Santhosh Rajkumar, K. Meena, M. Akilan, T. Department of Computer Science and Engineering Apex Institute of Technology Chandigarh University Punjab Mohali140413 India Department of Computer Science and Engineering GITAM University Karnataka Bengaluru561203 India Department of Information Technology Faculty of Engineering and technology SRM Institute of Science and Technology Ramapuram Tamil Nadu Chennai600089 India Department of Data Science and Business Systems School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Kattankulathur Tamil Nadu Chennai603203 India Department of Computer Science and Engineering Sri Sairam Engineering College Tamil Nadu Tambaram602109 India Research Coordinator Dept. of IQAC Amity University Kolkata West Bengal 700135 India
American Sign Language (ASL) recognition aims to recognize hand gestures, and it is a crucial solution to communicating between the deaf community and hearing people. However, existing sign language recognition algori... 详细信息
来源: 评论
Managing Vulnerabilities in Software Projects: the Case of NTT data  49
Managing Vulnerabilities in Software Projects: the Case of N...
收藏 引用
49th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2023
作者: Nocera, Sabato Romano, Simone Francese, Rita Burlon, Riccardo Scanniello, Giuseppe University of Salerno Department of Computer Science Fisciano Italy Ntt Data Salerno Italy
Background: Software vulnerabilities are flaws in application source code that can be exploited to cause harm, hence companies must devise strategies to manage ***: We want to understand how software vulnerabilities a... 详细信息
来源: 评论
Investigation on Nail Denting or Crumbling from Nail Psoriasis Patient Ailment data using the Machine Learning Algorithm and data Mining Techniques  8
Investigation on Nail Denting or Crumbling from Nail Psorias...
收藏 引用
8th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2024
作者: Janani, K. Santhoshkumar, S.P. Vikram, D. Priya, S. Vijayaraj, M. Priyanga, M. Manipal Institute of Technology Department of Data Science and Computer Applications Manipal India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Avadi Department of Computer Science and Engineering Chennai India Rathinam Technical Campus Department of Artificial Intelligence and Data Science Coimbatore India Rathinam Technical Campus Department of Information Technology Coimbatore India
Nail denting or crumbling may result from nail psoriasis. A nail condition known as psoriatic onychodystrophy or psoriatic nails. Psoriasis sufferers frequently experience it;reported occurrences range from 10% to 78%... 详细信息
来源: 评论
Advancing horizons in remote sensing: a comprehensive survey of deep learning models and applications in image classification and beyond
收藏 引用
Neural Computing and Applications 2024年 第27期36卷 16727-16767页
作者: Paheding, Sidike Saleem, Ashraf Siddiqui, Mohammad Faridul Haque Rawashdeh, Nathir Essa, Almabrok Reyes, Abel A. Department of Computer Science and Engineering Fairfield University 1073 N Benson Rd FairfieldCT06824 United States Department of Applied Computing Michigan Technological University 1400 Townsend Dr HoughtonMI49931 United States Department of Computer Science West Texas AM University 2501 4th Ave CanyonTX79016 United States Department of Mathematics Computer Science and Data Science John Carroll University 1 John Carroll Blvd University HeightsOH44118 United States
In recent years, deep learning has significantly reshaped numerous fields and applications, fundamentally altering how we tackle a variety of challenges. Areas such as natural language processing (NLP), computer visio... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural Network Training Based on Functional Encryption
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
PALCT: vehicle-to-vehicle communication based on pseudonym assignment and encryption scheme using delay minimisation cover tree algorithm
收藏 引用
International Journal of Vehicle Information and Communication Systems 2025年 第2期10卷 132-147页
作者: Tandon, Righa Gupta, P.K. Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Department of Computer Science and Engineering Jaypee University of Information Technology HP Solan173 234 India Department of Data Science School of Computing Mohan Babu University AP Tirupati517 102 India
Vehicle-to-vehicle communication is one of the new paradigms of networking, which should be secure, fast, and efficient. In this paper, we propose a framework that implements the pseudonym-based authentication scheme ... 详细信息
来源: 评论
Leveraging Deep Learning Models for Machine-Generated Text Detection Using Transformer-Based Models
Leveraging Deep Learning Models for Machine-Generated Text D...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Suthanthiradevi, P. Revathy, G. Rejini, K. Muthu Lakshmi, V. School of Computing Srm institute of Science and Technology Department of Data Science and Business Systems Kattankulathur Chennai India Vels Institute of science Technology and Advanced studies Department of Computer science and engineering Chennai117 India Amrita college of Engineering and Technology Department of Computer Science Engineering Nagercoil India St. Joseph's College of Engineering Department of Computer Science and Engineering OMR Chennai India
GPT is a large language model (LLM) derived from natural language processing that can generate a human-like text using machine learning. However, these models raise questions about authenticity and reliability of mate... 详细信息
来源: 评论
Comparative Analysis of Traditional and Contextual Embedding for Bangla Sarcasm Detection in Natural Language Processing  12
Comparative Analysis of Traditional and Contextual Embedding...
收藏 引用
12th IEEE International Conference on Communication, Networks and Satellite, COMNETSAT 2023
作者: Fahim, Kaji Mehedi Hasan Moontaha, Mithila Rahman, Mashrur Rhythm, Ehsanur Rahman Rasel, Annajiat Alim Brac University School of Data and Sciences Department of Computer Science and Engineering Dhaka Bangladesh
Sarcasm, a sort of sentiment characterized by a disparity between the apparent and intended meanings of the text, is a key component of sentiment analysis, opinion extraction, and social media analytics. However, sarc... 详细信息
来源: 评论
Attribute-based Message Recovery Designated Verifier Proxy Signature Scheme in Telemedicine System
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2022年 第1期7卷 101-113页
作者: Hu, Yu Zhang, Yi-Fan Huang, Hui Zhou, Yu-Ping School of Computer Science Minnan Normal University Zhangzhou363000 China School of Computer Science Minnan Normal University Key Laboratory of Data Science and Intelligence Application Fujian Province University Zhangzhou363000 China
With the promotion of cloud medical diagnostic applications, the telemedicine system has become increasingly mature, which brings about much convenience to the people’s lives. Meanwhile, the diagnostic time was great... 详细信息
来源: 评论
Virtual Reality Experiment for 5G Service Convergence Course in Communication Engineering  3
Virtual Reality Experiment for 5G Service Convergence Course...
收藏 引用
3rd International Conference on Educational Technology, ICET 2023
作者: Liu, Dandan Meng, Xin Hu, Shengbo Guizhou Normal University School of Big Data and Computer Science Guiyang Guizhou China
Virtual Reality (VR) technology is a computer simulation system that allows the creation and experience of virtual worlds. Because of its immersive, interactive, and realistic characteristics, VR is increasingly usefu... 详细信息
来源: 评论