咨询与建议

限定检索结果

文献类型

  • 9,270 篇 会议
  • 8,216 篇 期刊文献
  • 103 册 图书

馆藏范围

  • 17,589 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,850 篇 工学
    • 8,179 篇 计算机科学与技术...
    • 6,872 篇 软件工程
    • 2,649 篇 信息与通信工程
    • 1,795 篇 生物工程
    • 1,451 篇 控制科学与工程
    • 1,282 篇 电气工程
    • 1,193 篇 生物医学工程(可授...
    • 1,019 篇 光学工程
    • 889 篇 电子科学与技术(可...
    • 589 篇 机械工程
    • 535 篇 化学工程与技术
    • 451 篇 网络空间安全
    • 438 篇 交通运输工程
    • 429 篇 动力工程及工程热...
    • 413 篇 仪器科学与技术
    • 412 篇 安全科学与工程
  • 6,494 篇 理学
    • 3,260 篇 数学
    • 2,044 篇 生物学
    • 1,726 篇 物理学
    • 1,252 篇 统计学(可授理学、...
    • 661 篇 化学
    • 591 篇 系统科学
  • 3,130 篇 管理学
    • 1,774 篇 管理科学与工程(可...
    • 1,493 篇 图书情报与档案管...
    • 894 篇 工商管理
  • 1,134 篇 医学
    • 949 篇 临床医学
    • 859 篇 基础医学(可授医学...
    • 517 篇 药学(可授医学、理...
    • 489 篇 公共卫生与预防医...
  • 565 篇 法学
    • 483 篇 社会学
  • 337 篇 经济学
  • 274 篇 农学
  • 174 篇 教育学
  • 58 篇 文学
  • 32 篇 军事学
  • 22 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 675 篇 deep learning
  • 613 篇 accuracy
  • 440 篇 feature extracti...
  • 437 篇 machine learning
  • 399 篇 computational mo...
  • 386 篇 training
  • 329 篇 predictive model...
  • 325 篇 real-time system...
  • 295 篇 semantics
  • 261 篇 internet of thin...
  • 242 篇 optimization
  • 226 篇 support vector m...
  • 221 篇 convolutional ne...
  • 200 篇 reinforcement le...
  • 193 篇 neural networks
  • 187 篇 data mining
  • 187 篇 data models
  • 163 篇 image segmentati...
  • 147 篇 reliability
  • 142 篇 artificial intel...

机构

  • 426 篇 department of ph...
  • 397 篇 iccub universita...
  • 376 篇 horia hulubei na...
  • 364 篇 h.h. wills physi...
  • 308 篇 university of ch...
  • 293 篇 nikhef national ...
  • 290 篇 van swinderen in...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 289 篇 center for high ...
  • 285 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 cavendish labora...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...
  • 279 篇 departamento de ...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 236 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 204 篇 brundu d.
  • 200 篇 borsato m.
  • 199 篇 betancourt c.
  • 165 篇 bediaga i.
  • 159 篇 niyato dusit
  • 157 篇 baker s.
  • 151 篇 amato s.
  • 148 篇 baryshnikov f.
  • 148 篇 boettcher t.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon
  • 143 篇 r. mountain

语言

  • 15,632 篇 英文
  • 1,862 篇 其他
  • 121 篇 中文
  • 4 篇 德文
  • 4 篇 法文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Science and Engineering With Data Science"
17589 条 记 录,以下是821-830 订阅
排序:
Hybrid Model for Lung Cancer Prognosis: Integrating SVM and 3D CNN on Nodule data  2
Hybrid Model for Lung Cancer Prognosis: Integrating SVM and ...
收藏 引用
2nd IEEE International Conference on Emerging Research in Computational science, ICERCS 2024
作者: Carmel Mary Belinda, M.J. Kannan, E. Alex David, S. Kannan, Sriram Ravi Kumar, S. Vathani, Anstey Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Chennai India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Chennai India Fidelity Investments Data Engineering Chennai India Vel Tech Rangarajan Dr Sagunthala RD Institute of Science and Technology Department of Civil Engineering India
In this research, a huge dataset of lung cancer images is processed using advanced image processing techniques gathered from different medical establishments. Images will be edited and color profiles retouched from or... 详细信息
来源: 评论
Detecting the One-Shot Dummy Attack on the Power Industrial Control Processes With an Unsupervised data-Driven Approach
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第2期10卷 550-553页
作者: Zhenyong Zhang Yan Qin Jingpei Wang Hui Li Ruilong Deng the State Key Laboratory of Public Big Data and the College of Computer Science and Technology Guizhou UniversityGuiyang 550025China the School of Chemical and Biomedical Engineering Nanyang Technological UniversitySingapore 639798Singapore the State Key Laboratory of Industrial Control Technology and the College of Control Science and Engineering Zhejiang UniversityHangzhou 310027China IEEE
Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this lett... 详细信息
来源: 评论
Dual Dynamic Consistency Regularization for Semi-Supervised Domain Adaptation
收藏 引用
IEEE Access 2024年 12卷 36267-36279页
作者: Ngo, Ba Hung Lam, Ba Thinh Nguyen, Thanh Huy Dinh, Quang Vinh Choi, Tae Jong Chonnam National University Graduate School of Data Science Gwangju61186 Korea Republic of University of Science Faculty of Information Technology Ho Chi Minh City700000 Viet Nam National Cheng Kung University Department of Biomedical Engineering Tainan70101 Taiwan Vietnamese-German University School of Electrical Engineering and Computer Science Ho Chi Minh City72000 Viet Nam
The Vision Transformer (ViT) model serves as a powerful model to capture and comprehend global information, particularly when trained on extensive datasets. Conversely, the Convolutional Neural Network (CNN) model is ... 详细信息
来源: 评论
Boruta Feature Selection for Prediction of Coronary Artery Disease
Boruta Feature Selection for Prediction of Coronary Artery D...
收藏 引用
2023 IEEE International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication engineering, RMKMATE 2023
作者: Yuvalatha, S. Nithyapriya, S. Kuzhali, R. Tamizh Savitha, S. Department of Computer Science and Business Systems Bannari Amman Institute of Technology Sathyamangalam India Department of Artificial Intelligence and Data Science Bannari Amman Institute of Technology Sathyamangalam India Department of Artificial Intelligence and Data Science C K college of Engineering and Technology Chennai India Department of Computer Science nad Engineering PSR Engineering College Sivakasi India
Day by day cardio vascular disease death cases increasing. It mainly affects the human heart and blood vessels and it is difficult to diagnosis it. In this paper various machine learning algorithm is used to predict t... 详细信息
来源: 评论
Towards Safer Roads: A Comprehensive Review of Object Detection Techniques for Autonomous Vehicles
收藏 引用
SN computer science 2025年 第5期6卷 1-20页
作者: Parisapogu, Samson Anosh Babu Narla, Nitya Juryala, Aarthi Ramavath, Siddhu Department of Computer Science and Engineering School of Computing Amrita Vishwa Vidyapeetham Amaravati Campus Andhra Pradesh Amaravati 522 503 India Department of Artificial Intelligence and Data Science Chaitanya Bharathi Institute of Technology Hyderabad 500075 India
Nowadays, people spend a lot of time in travel, and road safety has become an important area of research. As a result, self-driving cars have been gaining popularity in recent years because they have a lot of benefits... 详细信息
来源: 评论
A Centralized Blockchain Architecture with Optimum Sharing  8
A Centralized Blockchain Architecture with Optimum Sharing
收藏 引用
8th International Conference on Communication and Electronics Systems, ICCES 2023
作者: Ramasamy, Viswanathan Padmapriya, S. Kavitha, G. Lekha, D. Kl Univrsity Department of Computer Science and Engineering Andhra Pradesh Gundoore India Velammal Institute of Technology Department of Artificial Intelligence and Data Science Tamil Nadu Chennai India Department of Computer Science and Engineering Tamil Nadu Namakkal India Rmk College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India
The monolithic network architectures are used in Bitcoin and other big cryptos. Different hierarchical ways to protect the decentralized blockchain have been discussed to improve its usability. However, no debate in t... 详细信息
来源: 评论
A Technical Bas System Through Cetralised System for Grid Systems in Trnsmission of data
A Technical Bas System Through Cetralised System for Grid Sy...
收藏 引用
2023 International Conference on Power Energy, Environment and Intelligent Control, PEEIC 2023
作者: Kurmi, Raviraj Singh Gupta, Ashish Krishnamoorthy, Ramkumar Noida Institute of Engineering and Technology Department of Data Science Uttar Pradesh Greater Noida India Tula's Institute Department of Computer Science and Engineering Dehradun India Department of Computer Bangalore India
Industrial communication protocols are used by SCADA (supervising control and data acquisition) networks and Industrial Control Systems (ICS) to enhance their functionality. Modbus is an example of an application prot... 详细信息
来源: 评论
Leveraging Blockchain for Development of Time Limit-Based Multi-authorized Secure Digital Signature Framework  5th
Leveraging Blockchain for Development of Time Limit-Based Mu...
收藏 引用
5th International Conference on Advances in Information Communication Technology and Computing, AICTC 2024
作者: Mallikharjuna Rao, K. Kumar, Ashutosh Agrawal, Deepesh Reyya, Shikhar Data Science and Artificial Intelligence International Institute of Information Technology Naya Raipur Naya Raipur India Computer Science and Engineering International Institute of Information Technology Naya Raipur Naya Raipur India
This article deeply dives into a shift in document security by introducing innovative authentication measures. Conventional digital signature methods are less secure and can easily be forged. Our research explores the... 详细信息
来源: 评论
Resisting Visual Hacking: A Novel Graphical Password Authentication System  3
Resisting Visual Hacking: A Novel Graphical Password Authent...
收藏 引用
3rd International Conference on Pervasive Computing and Social Networking, ICPCSN 2023
作者: Jebakumar Immanuel, D. Ramalingam, V. Tharun Kumar, P. Iyer, Akash Narayanan, M.S. Karpagam Institute of Technology Department of Artificial Intelligence and Data Science Coimbatore641 105 India Sns College of Engineering Department of Computer Science and Engineering Coimbatore India
Password-based authentication is a widely used method to ensure security and privacy in computer applications. However, the selection of weak passwords and insecure input methods by users is considered the 'weakes... 详细信息
来源: 评论
Spatial-Temporal Semantic Feature Interaction Network for Semantic Change Detection in Remote Sensing Images
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12090-12102页
作者: Zhang, Yuhang Zhang, Wuxia Ding, Songtao Wu, Siyuan Lu, Xiaoqiang Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing School of Computer Science and Technology Xi'an710121 China Xi'an University of Technology College of Computer Science and Engineering Shaanxi Xi'an710048 China Fuzhou University College of Physics and Information Engineering Fuzhou350002 China
Semantic Change Detection (SCD) in Remote Sensing Images (RSI) aims to identify changes in the type of Land Cover/Land Use (LCLU). The "from-to" information of the acquired image has more profound practical ... 详细信息
来源: 评论