咨询与建议

限定检索结果

文献类型

  • 12,691 篇 会议
  • 10,572 篇 期刊文献
  • 164 册 图书

馆藏范围

  • 23,427 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13,505 篇 工学
    • 7,367 篇 计算机科学与技术...
    • 5,844 篇 软件工程
    • 3,015 篇 信息与通信工程
    • 2,416 篇 电气工程
    • 2,352 篇 电子科学与技术(可...
    • 1,923 篇 控制科学与工程
    • 1,767 篇 光学工程
    • 1,429 篇 生物工程
    • 1,259 篇 生物医学工程(可授...
    • 1,027 篇 化学工程与技术
    • 1,020 篇 材料科学与工程(可...
    • 1,002 篇 仪器科学与技术
    • 905 篇 机械工程
    • 724 篇 动力工程及工程热...
    • 496 篇 网络空间安全
    • 420 篇 安全科学与工程
  • 9,349 篇 理学
    • 4,784 篇 物理学
    • 3,142 篇 数学
    • 1,738 篇 生物学
    • 1,270 篇 化学
    • 1,092 篇 统计学(可授理学、...
    • 643 篇 系统科学
  • 2,969 篇 管理学
    • 1,979 篇 管理科学与工程(可...
    • 1,050 篇 图书情报与档案管...
    • 887 篇 工商管理
  • 1,375 篇 医学
    • 1,074 篇 临床医学
    • 919 篇 基础医学(可授医学...
    • 562 篇 药学(可授医学、理...
    • 523 篇 公共卫生与预防医...
  • 528 篇 法学
    • 440 篇 社会学
  • 354 篇 经济学
  • 307 篇 农学
  • 159 篇 教育学
  • 125 篇 文学
  • 59 篇 军事学
  • 30 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 500 篇 deep learning
  • 490 篇 accuracy
  • 350 篇 machine learning
  • 320 篇 computer science
  • 316 篇 feature extracti...
  • 308 篇 computational mo...
  • 298 篇 training
  • 297 篇 internet of thin...
  • 255 篇 support vector m...
  • 207 篇 optimization
  • 196 篇 real-time system...
  • 183 篇 reliability
  • 175 篇 image segmentati...
  • 172 篇 convolutional ne...
  • 164 篇 computer archite...
  • 160 篇 throughput
  • 159 篇 wireless communi...
  • 159 篇 predictive model...
  • 158 篇 artificial intel...
  • 154 篇 scalability

机构

  • 946 篇 cavendish labora...
  • 885 篇 department of ph...
  • 815 篇 physikalisches i...
  • 804 篇 oliver lodge lab...
  • 572 篇 school of physic...
  • 496 篇 university of ch...
  • 493 篇 infn laboratori ...
  • 463 篇 infn sezione di ...
  • 448 篇 fakultät physik ...
  • 443 篇 infn sezione di ...
  • 431 篇 infn sezione di ...
  • 401 篇 iccub universita...
  • 398 篇 horia hulubei na...
  • 394 篇 school of physic...
  • 389 篇 department of ph...
  • 386 篇 department for p...
  • 377 篇 imperial college...
  • 376 篇 nikhef national ...
  • 375 篇 center for high ...
  • 366 篇 stfc rutherford ...

作者

  • 270 篇 a. gomes
  • 259 篇 c. alexa
  • 257 篇 j. m. izen
  • 249 篇 g. bella
  • 248 篇 c. amelung
  • 247 篇 j. strandberg
  • 246 篇 d. calvet
  • 246 篇 s. chen
  • 239 篇 g. spigo
  • 237 篇 f. siegert
  • 227 篇 j. wang
  • 219 篇 y. tayalati
  • 219 篇 r. ströhmer
  • 214 篇 m. rijssenbeek
  • 210 篇 s. jin
  • 206 篇 g. gaudio
  • 200 篇 m. gandelman
  • 199 篇 s. mohapatra
  • 198 篇 t. gershon
  • 195 篇 r. mountain

语言

  • 21,632 篇 英文
  • 1,503 篇 其他
  • 263 篇 中文
  • 25 篇 日文
  • 8 篇 朝鲜文
  • 6 篇 德文
  • 4 篇 法文
  • 1 篇 意大利文
  • 1 篇 荷兰文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science and Engineering Acropolis Institute of Technology and Research"
23427 条 记 录,以下是61-70 订阅
排序:
Privacy Preserving Techniques in Data science : A Review
Privacy Preserving Techniques in Data Science : A Review
收藏 引用
Advances in Computing research on science engineering and technology (ACROSET), International Conference on
作者: Yuvraj Panchal Rashid Sheikh Kamal Kumar Sethi Praveen Kumar Bhanodia Shiv Shankar Rajput Narendra Pal Singh Rathore Department of Computer Science And Engineering Acropolis Institute Of Technology And Research Indore India
In the field of data science, privacy-preserving methods are essential to guaranteeing the moral and secure use of data. This extensive overview study offers an in-depth examination of privacy-preserving approaches, i... 详细信息
来源: 评论
Which is more faithful,seeing or saying? Multimodal sarcasm detection exploiting contrasting sentiment knowledge
收藏 引用
CAAI Transactions on Intelligence technology 2025年 第2期10卷 375-386页
作者: Yutao Chen Shumin Shi Heyan Huang School of Computer Science and Technology Beijing Institute of TechnologyBeijingChina Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications BeijingChina
Using sarcasm on social media platforms to express negative opinions towards a person or object has become increasingly ***,detecting sarcasm in various forms of communication can be difficult due to conflicting *** t... 详细信息
来源: 评论
Enhancing Data Forwarding Efficiency in SIoT with Multidimensional Social Relations
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1095-1113页
作者: Fang Xu Songhao Jiang Yi Ma Manzoor Ahmed Zenggang Xiong Yuanlin Lyu School of Computer and Information Science Hubei Engineering UniversityXiaogan432000China School of Computer Science and Information Engineering Hubei UniversityWuhan430062China Artificial Intelligence Industrial Technology Research Institute Hubei Engineering UniversityXiaogan432000China
Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research *** paper proposes a data forwarding algorithm based on Multidimensional Social Relatio... 详细信息
来源: 评论
Transfer Learning for Multiclass Classification of Wheat Leaf Diseases
Transfer Learning for Multiclass Classification of Wheat Lea...
收藏 引用
Advances in Computing research on science engineering and technology (ACROSET), International Conference on
作者: Riya Verma Narendra Pal Singh Rathore Kamal Kumar Sethi Artificial Intelligence and Data Science Acropolis Institute of Technology and Research Indore India Computer Science and Engineering Acropolis Institute of Technology and Research Indore India
In the following paper, we explore a study focusing on the detection of wheat leaf diseases using transfer learning techniques combined with cutting-edge convolutional neural network (CNN) architectures, namely VGG16,... 详细信息
来源: 评论
UAV Localization with Unreliable Observations in Hostile Underground Environments
收藏 引用
Journal of computer science & technology 2024年 第6期39卷 1401-1418页
作者: Peng-Peng Chen Kui-Yuan Zhang Shou-Wan Gao Si-Yi Ren School of Computer Science and Technology China University of Mining and TechnologyXuzhou 221116China Mine Digitization Engineering Research Center Ministry of EducationXuzhou 221116China Shenzhen Research Institute China University of Mining and TechnologyShenzhen 518057China
The accurate and robust unmanned aerial vehicle(UAV)localization is significant due to the requirements of safety-critical monitoring and emergency wireless communication in hostile underground *** range-based localiz... 详细信息
来源: 评论
Contrastive Domain Adaptation for Time-Series Via Temporal Mixup
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第3期5卷 1185-1194页
作者: Eldele, Emadeldeen Ragab, Mohamed Chen, Zhenghua Wu, Min Kwoh, Chee-Keong Li, Xiaoli School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore Centre for Frontier Ai Research Agency for Science Technology and Research Singapore138632 Singapore Institute for Infocomm Research Agency for Science Technology and Research Singapore138632 Singapore
Unsupervised domain adaptation (UDA) has emerged as a powerful solution for the domain shift problem via transferring the knowledge from a labeled source domain to a shifted unlabeled target domain. Despite the preval... 详细信息
来源: 评论
A Facial Expression Recognition Method Integrating Uncertainty Estimation and Active Learning
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 533-548页
作者: Yujian Wang Jianxun Zhang Renhao Sun School of Computer Science and Engineering Chongqing University of TechnologyChongqing400054China Data Space Research Institute of Hefei Comprehensive National Science Center Hefei230088China
The effectiveness of facial expression recognition(FER)algorithms hinges on the model’s quality and the availability of a substantial amount of labeled expression ***,labeling large datasets demands significant human... 详细信息
来源: 评论
An Intelligent System to Predict Diabetic Retinal Diseases Based on Diabetic Attributes
收藏 引用
SN computer science 2024年 第6期5卷 755页
作者: Eswari, M. Shanmuga Balamurali, S. Ramkumar, K. Department of Computer Applications Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Rajalakshmi Institute of Technology
The most common illness among individuals and the general population in the medical field is diabetes. This is coupled with a careful diabetic retinal that has no signal. The historical record offers unrecoverable ins... 详细信息
来源: 评论
Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 114-125页
作者: Yu-Ang Wang Zidong Wang Lei Zou Bo Shen Hongli Dong the College of Information Science and Technology Donghua University the Engineering Research Center of Digitalized Textile and Fashion Technology Ministry of Education IEEE the College of Electrical Engineering and Automation Shandong University of Science and Technology the Department of Computer Science Brunel University London Uxbridge the Sanya Offshore Oil and Gas Research Institute Northeast Petroleum University the Artificial Intelligence Energy Research Institute Northeast Petroleum University Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control Northeast Petroleum University
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu... 详细信息
来源: 评论
Automated Subject Allotment to Faculty in an Academic institute Using Maxflow Problem
Automated Subject Allotment to Faculty in an Academic Instit...
收藏 引用
Advances in Computing research on science engineering and technology (ACROSET), International Conference on
作者: Neha Sehta Naman Shah Department of Computer Science and Engineering Acropolis Institute of Technology and Research Indore India
presently, educational organizations are utilizing manual procedures to assign subjects to faculties depending on their own preferences, which gives rise to prejudice and therefore, discontentment. The best approach w... 详细信息
来源: 评论