咨询与建议

限定检索结果

文献类型

  • 16,312 篇 会议
  • 14,134 篇 期刊文献
  • 150 册 图书
  • 2 篇 专利

馆藏范围

  • 30,598 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,999 篇 工学
    • 14,498 篇 计算机科学与技术...
    • 12,204 篇 软件工程
    • 4,323 篇 信息与通信工程
    • 2,997 篇 生物工程
    • 2,436 篇 控制科学与工程
    • 1,892 篇 生物医学工程(可授...
    • 1,851 篇 电气工程
    • 1,552 篇 光学工程
    • 1,290 篇 电子科学与技术(可...
    • 993 篇 机械工程
    • 904 篇 化学工程与技术
    • 723 篇 网络空间安全
    • 705 篇 安全科学与工程
    • 656 篇 动力工程及工程热...
    • 647 篇 交通运输工程
    • 621 篇 仪器科学与技术
  • 11,215 篇 理学
    • 6,071 篇 数学
    • 3,390 篇 生物学
    • 2,645 篇 物理学
    • 2,333 篇 统计学(可授理学、...
    • 1,074 篇 化学
    • 1,069 篇 系统科学
  • 5,521 篇 管理学
    • 2,904 篇 图书情报与档案管...
    • 2,878 篇 管理科学与工程(可...
    • 1,462 篇 工商管理
  • 1,828 篇 医学
    • 1,537 篇 临床医学
    • 1,393 篇 基础医学(可授医学...
    • 815 篇 药学(可授医学、理...
    • 786 篇 公共卫生与预防医...
  • 1,024 篇 法学
    • 870 篇 社会学
  • 544 篇 经济学
  • 416 篇 农学
  • 323 篇 教育学
  • 97 篇 文学
  • 46 篇 军事学
  • 38 篇 艺术学
  • 6 篇 历史学
  • 5 篇 哲学

主题

  • 1,019 篇 deep learning
  • 929 篇 accuracy
  • 784 篇 machine learning
  • 730 篇 training
  • 719 篇 feature extracti...
  • 580 篇 semantics
  • 575 篇 computational mo...
  • 438 篇 predictive model...
  • 435 篇 data models
  • 352 篇 convolutional ne...
  • 348 篇 internet of thin...
  • 348 篇 real-time system...
  • 337 篇 support vector m...
  • 326 篇 reinforcement le...
  • 282 篇 neural networks
  • 279 篇 image segmentati...
  • 279 篇 data mining
  • 254 篇 task analysis
  • 252 篇 optimization
  • 246 篇 deep neural netw...

机构

  • 828 篇 school of data a...
  • 428 篇 department of ph...
  • 397 篇 iccub universita...
  • 347 篇 university of ch...
  • 330 篇 college of compu...
  • 293 篇 nikhef national ...
  • 291 篇 center for high ...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 oliver lodge lab...
  • 283 篇 school of physic...
  • 281 篇 horia hulubei na...
  • 280 篇 henryk niewodnic...

作者

  • 243 篇 barter w.
  • 241 篇 beiter a.
  • 224 篇 bellee v.
  • 218 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 196 篇 brundu d.
  • 187 篇 blake t.
  • 171 篇 niyato dusit
  • 156 篇 baker s.
  • 152 篇 borsato m.
  • 149 篇 betancourt c.
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon

语言

  • 24,737 篇 英文
  • 5,728 篇 其他
  • 224 篇 中文
  • 7 篇 斯洛文尼亚文
  • 6 篇 法文
  • 4 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Data Science"
30598 条 记 录,以下是1101-1110 订阅
排序:
PDF Malware Detection Using Machine Learning  9
PDF Malware Detection Using Machine Learning
收藏 引用
9th IEEE International Conference on Computational Intelligence and Applications, ICCIA 2024
作者: Tantikulvichit, Naragorn Kosolsombat, Somkiat Ratanavilisagul, Chiabwoot College of Interdisciplinary Studies Thammasat University Data Science and Innovation Pathum Thani Thailand King Mongkut's University of Technology Faculty of Applied Science Department of Computer and Information Science North Bangkok Thailand
In today's world, cyber-attacks are on the rise, and PDF files are commonly used as a means of attack. One common type of attack through PDF files is the covert embedding of dangerous malware and tricking users in... 详细信息
来源: 评论
Watch Product Categorization through Conv2D Sequential Covolutional Neural Network with Truncated Normal Kernel Initializer  2
Watch Product Categorization through Conv2D Sequential Covol...
收藏 引用
2nd International Conference on Advancement in Computation and computer Technologies, InCACCT 2024
作者: Shyamala Devi, M. Harivishnu, K.C. Jamal Mohammed, R. Jagan, S. Gurucharan, G. Mohamed Arshad, M. Panimalar Engineering College Department of Computer Science and Engineering Tamilnadu Chennai India Panimalar Engineering College Department of Artificial Intelligence and Data Science Tamilnadu Chennai India
For the sake of customer satisfaction and high profitable revenue, the products are designed in the Ecommerce application along with the product category. Based on the product category, prices may differ in a broad ra... 详细信息
来源: 评论
Emergency Vehicle Detection Using Deep ConvNet2D and computer Vision  2
Emergency Vehicle Detection Using Deep ConvNet2D and Compute...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and Engineering, ic-ETITE 2024
作者: Poongavanam, Elumalaivasan Prathik, A. Munirathinam, T. Kayalvizhi, V. Rajesh, R. Mahavishnu, C. Srm Institute of Science and Technology Department of Data Science and Business Systems Chennai Kattankulathur India Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India Sona College of Technology Department of Information Technology Salem India School of Computer Science and Engineering and Information Science Presidency University Bangalore India School of Computer Science and Engineering Vellore Institute of Technology Chennai India Shreenivasa Engineering College Department of Computer Science and Engineering Dharmapuri India
A surveillance system detects emergency vehicles stuck in traffic. This system helps manage traffic because the number of vehicles on the road has been increasing daily for years, causing congestion. This project impl... 详细信息
来源: 评论
CNN-LSTM: Development of Offline Signature Authentication  1
CNN-LSTM: Development of Offline Signature Authentication
收藏 引用
1st IEEE International Conference on Emerging Research in Computational science, ICERCS 2023
作者: Ganapathy, Revathy Lingeshwaran, D. Suthanthiradevi, P. Harish Kumar, M.V. Vels Insitute of Science Technology and Advanced Studies Department of Computer Science and Engineering Chennai India Srm Institute of Science and Technology Department of Data Science and Business Systems Chennai India
Offline Signature Authentication is a critical task in the field of document authentication, and its accuracy is essential for ensuring security while transactions. This research proposes two approaches: Initially Pre... 详细信息
来源: 评论
Bridging Optimal Transport and Jacobian Regularization by Optimal Trajectory for Enhanced Adversarial Defense  17th
Bridging Optimal Transport and Jacobian Regularization by ...
收藏 引用
17th Asian Conference on computer Vision, ACCV 2024
作者: M. Le, Binh Tariq, Shahroz S. Woo, Simon Department of Computer Science and Engineering Sungkyunkwan University Suwon Korea Republic of CSIRO’s Data61 Sydney Australia
Deep neural networks, particularly in vision tasks, are notably susceptible to adversarial perturbations. To overcome this challenge, developing a robust classifier is crucial. In light of the recent advancements in t... 详细信息
来源: 评论
Knee Osteoarthritis Detection Using X-Rays and DNN  3
Knee Osteoarthritis Detection Using X-Rays and DNN
收藏 引用
3rd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2024
作者: Sinha, Vaishnawi Veemaraj, Ebenezer Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Tamil Nadu Coimbatore India Division of Data Science and Cyber Security Tamil Nadu Coimbatore India
Knee osteoarthritis (OA) is a prevalent degenerative joint disease that affects millions worldwide, leading to pain, disability, and reduced quality of life. Early detection and intervention are crucial for effective ... 详细信息
来源: 评论
Approximation of Hodgkin-Huxley Model Using Neural Networks  12
Approximation of Hodgkin-Huxley Model Using Neural Networks
收藏 引用
12th International Conference on Awareness science and Technology, iCAST 2023
作者: Li, Qin Zhu, Xin Shen, Wenfeng Graduate School of Computer Science and Engineering The University of Aizu Fukushima Aizu-Wakamatsu Japan School of Computer Engineering and Science Shanghai Institute for Advanced Communication and Data Science Shanghai University Shanghai China
Simulation of electrophysiological cardiac models plays a critical role in enabling researchers to investigate the heart’s activity under various conditions. In this domain, the cell model assumes a significant posit... 详细信息
来源: 评论
Visualizing Program Behavior: A Study of Enhanced Program Diagrams Using LLM  54
Visualizing Program Behavior: A Study of Enhanced Program Di...
收藏 引用
54th IEEE Frontiers in Education Conference, FIE 2024
作者: Li, Ying Yang, Runze Gui, ShiJie Shi, Peng Huang, Xuefei Yang, Da Zhang, Xiaozhou Gai, Yiming School of Computer Science and Engineering Beihang University Beijing China International Innovation Institute Beihang University Key Laboratory of Data Science and Intelligent Computing Hangzhou China
This paper aims to address the difficulties faced by novice programmers in grasping code structure and execution flow, improving programming thinking, and pinpointing code errors with accuracy. It proposes providing s... 详细信息
来源: 评论
Classification Attack on IoT Devices with Machine Learning  9
Classification Attack on IoT Devices with Machine Learning
收藏 引用
9th IEEE International Conference on Computational Intelligence and Applications, ICCIA 2024
作者: Charoenwong, Nutcha Kosolsombat, Somkiat Ratanavilisagul, Chiabwoot College of Interdisciplinary Studies Thammasat University Data Science and Innovation Pathum Thani Thailand King Mongkut's University of Technology Faculty of Applied Science Department of Computer and Information Science North Bangkok Thailand
Internet of Things (IoT) devices are small, low-power devices used for detecting and processing data remotely through the internet. These devices have increasingly been integrated into our daily lives, both in the dig... 详细信息
来源: 评论
Detection of Faults in Solar Grids Using Convolutional Neural Network  10
Detection of Faults in Solar Grids Using Convolutional Neura...
收藏 引用
10th International Conference on Advanced Computing and Communication Systems, ICACCS 2024
作者: Chinthaguntla, Madhuri Mahima Priyadharsini, C. Karunya Institute of Technology and Sciences Computer Engineering Division of Data Science and Cybersecurity Tamil Nadu Coimbatore India Karunya Institute of Technology and Sciences Division of Computer Science and Engineering Tamil Nadu Coimbatore India
The imperative need to guarantee the reliability and efficiency of solar energy systems inspired the development of a novel method for solar panel defect identification. As solar panels increasingly become a significa... 详细信息
来源: 评论