咨询与建议

限定检索结果

文献类型

  • 9,347 篇 会议
  • 8,216 篇 期刊文献
  • 103 册 图书

馆藏范围

  • 17,666 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,849 篇 工学
    • 8,148 篇 计算机科学与技术...
    • 6,827 篇 软件工程
    • 2,641 篇 信息与通信工程
    • 1,791 篇 生物工程
    • 1,447 篇 控制科学与工程
    • 1,265 篇 电气工程
    • 1,189 篇 生物医学工程(可授...
    • 1,013 篇 光学工程
    • 888 篇 电子科学与技术(可...
    • 589 篇 机械工程
    • 533 篇 化学工程与技术
    • 451 篇 网络空间安全
    • 434 篇 交通运输工程
    • 424 篇 动力工程及工程热...
    • 411 篇 仪器科学与技术
    • 410 篇 安全科学与工程
  • 6,456 篇 理学
    • 3,249 篇 数学
    • 2,038 篇 生物学
    • 1,719 篇 物理学
    • 1,253 篇 统计学(可授理学、...
    • 656 篇 化学
    • 587 篇 系统科学
  • 3,119 篇 管理学
    • 1,766 篇 管理科学与工程(可...
    • 1,492 篇 图书情报与档案管...
    • 891 篇 工商管理
  • 1,121 篇 医学
    • 942 篇 临床医学
    • 849 篇 基础医学(可授医学...
    • 520 篇 药学(可授医学、理...
    • 481 篇 公共卫生与预防医...
  • 560 篇 法学
    • 480 篇 社会学
  • 338 篇 经济学
  • 275 篇 农学
  • 174 篇 教育学
  • 57 篇 文学
  • 31 篇 军事学
  • 23 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 687 篇 deep learning
  • 648 篇 accuracy
  • 443 篇 feature extracti...
  • 438 篇 machine learning
  • 411 篇 computational mo...
  • 392 篇 training
  • 347 篇 real-time system...
  • 337 篇 predictive model...
  • 296 篇 semantics
  • 267 篇 internet of thin...
  • 244 篇 optimization
  • 230 篇 support vector m...
  • 225 篇 convolutional ne...
  • 199 篇 reinforcement le...
  • 197 篇 data models
  • 193 篇 neural networks
  • 192 篇 data mining
  • 164 篇 image segmentati...
  • 152 篇 reliability
  • 146 篇 artificial intel...

机构

  • 426 篇 department of ph...
  • 397 篇 iccub universita...
  • 376 篇 horia hulubei na...
  • 364 篇 h.h. wills physi...
  • 309 篇 university of ch...
  • 292 篇 van swinderen in...
  • 291 篇 nikhef national ...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 289 篇 center for high ...
  • 285 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 cavendish labora...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...
  • 279 篇 departamento de ...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 236 篇 bellee v.
  • 223 篇 casse g.
  • 215 篇 bowcock t.j.v.
  • 215 篇 blake t.
  • 204 篇 brundu d.
  • 202 篇 borsato m.
  • 200 篇 betancourt c.
  • 163 篇 bediaga i.
  • 158 篇 niyato dusit
  • 158 篇 baker s.
  • 151 篇 amato s.
  • 149 篇 boettcher t.
  • 147 篇 baryshnikov f.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon
  • 143 篇 r. mountain

语言

  • 14,120 篇 英文
  • 3,462 篇 其他
  • 128 篇 中文
  • 5 篇 斯洛文尼亚文
  • 4 篇 德文
  • 4 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Computer Science and Engineering with Data Science"
17666 条 记 录,以下是1121-1130 订阅
排序:
CosineRecom: A KNN-Based Movie Recommendation System Using Cosine Similarity  4
CosineRecom: A KNN-Based Movie Recommendation System Using C...
收藏 引用
4th International Conference on Advancement in Electronics and Communication engineering, AECE 2024
作者: Singh, Mandeep Mishra, Prafull Aggarwal, Nitin Kumar, Vinay Sharma, Pramod Kumar Yadav, Ritesh Bennett University School of Computer Science Engineering and Technology Greater Noida India Raj Kumar Goel Institute of Technology Department of Computer Science & Engineering UP Ghaziabad India Mfps Supervisor Oracle Development Database Admin Data Science PA United States Kiet Group of Institutions Department of Csit UP Ghaziabad India Kiet Group of Institute Department of Applied Science UP Ghaziabad India Raj Kumar Goel Institute of Technology Department of Computer Science & Engineering Ghaziabad India
Information overload is a major problem for many people who use the internet. This is because there is so much information available that it can be hard to know where to start. Filtering tools, like the Recommender Sy... 详细信息
来源: 评论
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1435-1446页
作者: Zhiwei WANG Qiuchi ZHU Zhenqi ZHANG School of Computer Nanjing University of Posts and Telecommunications State Key Laboratory of Public Big Data Guizhou University Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Engineering Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal University
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ... 详细信息
来源: 评论
Application of Machine Learning in Mental Diseases Diagnosis  25
Application of Machine Learning in Mental Diseases Diagnosis
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Alsawi, Rahaf Alazaidah, Raed Samara, Ghassan Alzoui, Haneen Alidmat, Omar Elsoud, Esraa Abu Talat Khouj, Mohammed Katrawi, Anwar Alluwaici, Mo'Ath Zarqa University Faculty of Information Technology Department of Data Science and Ai Zarqa Jordan Applied Science Private University Faculty of Information Technology Department of Computer Science Amman Jordan Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Zarqa University Faculty of It Department of Computer Science Zarqa Jordan
Mental diseases, mental disorders, or psychological disorders is a large group of symptoms which causes changes to the state of mood and reflect this on the behavior of the person with the mental disorder. It affects ... 详细信息
来源: 评论
A Survey on Fish Size Measurement in Aquatic Environments
A Survey on Fish Size Measurement in Aquatic Environments
收藏 引用
2024 IEEE Bangalore Humanitarian Technology Conference, B-HTC 2024
作者: Ankitha, K. Venugopala, P.S. Kumaki, Takeshi NMAMIT Dept. of Artificial Intelligence and Data Science Nitte India Ritsumeikan University Dept. of Electronic and Computer Engineering Kusatsu Shiga Japan
Fish size measurement in aquatic environments plays a pivotal role in understanding fish biology, ecology, and fisheries management. This survey explores various methodologies employed for fish size measurement, empha... 详细信息
来源: 评论
Secrecy Capacity Optimization in RF/FSO Systems: Impact of Mixed Rayleigh and Log-Normal Fading with Atmospheric Turbulence
Secrecy Capacity Optimization in RF/FSO Systems: Impact of M...
收藏 引用
2024 IEEE International Conference on Intelligent Signal Processing and Effective Communication Technologies, INSPECT 2024
作者: Upadhyay, Deepak Sharma, Kunj Bihari Gupta, Mridul Upadhyay, Abhay Venu, Nookala Graphic Era Hill University Dept. of Computer Science and Engineering Dehradun India Graphic Era deemed to be University Dept. of Computer Science and Engineering Dehradun India Graphic Era deemed to be University Dept. of Electronics and Communication Engineering Dehradun India ABV Indian Institute of Information Technology and Management Data Science and Quantum Computing Gwalior India
This paper investigates the secrecy capacity optimization in RF/FSO systems with mixed Rayleigh and log-normal fading, while masking eavesdroppers channel state information () as well as suffering from atmospheric tur... 详细信息
来源: 评论
TSDDISCOVER: Discovering data Dependency for Time Series data  40
TSDDISCOVER: Discovering Data Dependency for Time Series Dat...
收藏 引用
40th IEEE International Conference on data engineering, ICDE 2024
作者: Ding, Xiaoou Li, Yingze Wang, Hongzhi Wang, Chen Liu, Yida Wang, Jianmin School of Computer Science and Technology Harbin Institute of Technology China Tsinghua University National Engineering Research Center for Big Data Software EIRI China
Intelligent devices often produce time series data that suffer from significant data quality issues. While the utilization of data dependency in error detection and data repair has been somewhat beneficial, it remains... 详细信息
来源: 评论
Unsupervised Graph-Based Anomaly Detection Using Variational Autoencoder  24
Unsupervised Graph-Based Anomaly Detection Using Variational...
收藏 引用
24th IEEE International Conference on data Mining Workshops, ICDMW 2024
作者: Sadrolhefazi, Zeinab Sadat Zare, Hadi Asghari, Seyyed Amir Moradi, Parham Jalili, Mahdi University of Tehran Department of Data Science and Technology Tehran Iran Kharazmi University Department of Electrical and Computer Engineering Tehran Iran RMIT University School of Engineering Melbourne Australia
Anomaly detection is recognized as a critical task in machine learning, particularly when applied to high-dimensional and graph structured data. Traditional clustering based methods for anomaly detection are often cha... 详细信息
来源: 评论
AntiMal: an Approach of Malware Detection Employing Swin Transformer  13
AntiMal: an Approach of Malware Detection Employing Swin Tra...
收藏 引用
13th International Conference on Communication and Network Security, ICCNS 2023
作者: Lyu, Chenxi Yao, Yinan Guo, Xiaodong Huang, Zihong Dong, Chen Zhang, Yuanyuan Chen, Zhenyi College of Computer and Data Science Fuzhou University Fuzhou China College of Computer and Cyber Security Fujian Normal University Fuzhou China Department of Computer Science and Engineering University of South Florida FL United States
In the present era, the menace of malicious software is growing continuously, posing a significant challenge in the realm of cybersecurity. Currently, traditional machine learning algorithms have been widely applied t... 详细信息
来源: 评论
SMAKAP: Secure Mutual Authentication and Key Agreement Protocol for RFID Systems  17
SMAKAP: Secure Mutual Authentication and Key Agreement Proto...
收藏 引用
17th International Conference on Security of Information and Networks, SIN 2024
作者: Naziri, Shayesta Wang, Xu Yu, Guangsheng Xu, Jian Shrestha, Sudhir Liang, Christy Jie School of Electrical and Data Engineering University of Technology SydneyNSW2007 Australia School of Computer Science University of Technology SydneyNSW2007 Australia
Radio Frequency Identification (RFID) is a crucial technology in the Internet of Things (IoT), enabling seamless wireless communication and data exchange. However, these technologies can pose significant security chal... 详细信息
来源: 评论
Joint Wireless and Computing Resource Management with Optimal Slice Selection in in-network-edge Metaverse System  15
Joint Wireless and Computing Resource Management with Optima...
收藏 引用
15th International Conference on Information and Communication Technology Convergence, ICTC 2024
作者: Rashid, Sulaiman Muhammad Aliyu, Ibrahim Isah, Abubakar Lee, Jihoon Oh, Sangwon Hahn, Minsoo Kim, Jinsul Chonnam National University Department of Intelligent Electronics and Computer Engineering Gwangju Korea Republic of Astana It University Department of Computational and Data Science Astana Kazakhstan
This paper presents an approach to joint wireless and computing resource management in slice-enabled metaverse networks, addressing the challenges of inter-slice and intra-slice resource allocation in the presence of ... 详细信息
来源: 评论