咨询与建议

限定检索结果

文献类型

  • 9,498 篇 会议
  • 8,349 篇 期刊文献
  • 103 册 图书

馆藏范围

  • 17,950 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,037 篇 工学
    • 8,329 篇 计算机科学与技术...
    • 6,931 篇 软件工程
    • 2,729 篇 信息与通信工程
    • 1,797 篇 生物工程
    • 1,553 篇 控制科学与工程
    • 1,353 篇 电气工程
    • 1,202 篇 生物医学工程(可授...
    • 1,024 篇 光学工程
    • 921 篇 电子科学与技术(可...
    • 609 篇 机械工程
    • 543 篇 化学工程与技术
    • 495 篇 网络空间安全
    • 456 篇 交通运输工程
    • 444 篇 动力工程及工程热...
    • 436 篇 仪器科学与技术
    • 431 篇 安全科学与工程
  • 6,573 篇 理学
    • 3,297 篇 数学
    • 2,050 篇 生物学
    • 1,747 篇 物理学
    • 1,267 篇 统计学(可授理学、...
    • 692 篇 化学
    • 590 篇 系统科学
  • 3,196 篇 管理学
    • 1,823 篇 管理科学与工程(可...
    • 1,516 篇 图书情报与档案管...
    • 903 篇 工商管理
  • 1,166 篇 医学
    • 972 篇 临床医学
    • 862 篇 基础医学(可授医学...
    • 523 篇 药学(可授医学、理...
    • 513 篇 公共卫生与预防医...
  • 570 篇 法学
    • 488 篇 社会学
  • 348 篇 经济学
  • 278 篇 农学
  • 182 篇 教育学
  • 60 篇 文学
  • 32 篇 军事学
  • 23 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 712 篇 deep learning
  • 665 篇 accuracy
  • 452 篇 machine learning
  • 446 篇 feature extracti...
  • 411 篇 computational mo...
  • 401 篇 training
  • 355 篇 real-time system...
  • 334 篇 predictive model...
  • 292 篇 semantics
  • 274 篇 internet of thin...
  • 256 篇 optimization
  • 234 篇 support vector m...
  • 224 篇 convolutional ne...
  • 206 篇 reinforcement le...
  • 204 篇 data models
  • 195 篇 neural networks
  • 194 篇 data mining
  • 172 篇 image segmentati...
  • 157 篇 reliability
  • 149 篇 transformers

机构

  • 425 篇 department of ph...
  • 396 篇 iccub universita...
  • 373 篇 horia hulubei na...
  • 361 篇 h.h. wills physi...
  • 308 篇 university of ch...
  • 289 篇 van swinderen in...
  • 289 篇 nikhef national ...
  • 288 篇 imperial college...
  • 287 篇 school of physic...
  • 287 篇 center for high ...
  • 283 篇 department of ph...
  • 283 篇 physik-institut ...
  • 283 篇 oliver lodge lab...
  • 283 篇 physikalisches i...
  • 281 篇 cavendish labora...
  • 281 篇 stfc rutherford ...
  • 281 篇 school of physic...
  • 281 篇 school of physic...
  • 280 篇 institute of par...
  • 277 篇 departamento de ...

作者

  • 249 篇 barter w.
  • 240 篇 beiter a.
  • 233 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 203 篇 brundu d.
  • 200 篇 borsato m.
  • 198 篇 betancourt c.
  • 162 篇 niyato dusit
  • 160 篇 bediaga i.
  • 159 篇 baker s.
  • 150 篇 amato s.
  • 146 篇 baryshnikov f.
  • 145 篇 boettcher t.
  • 143 篇 a. jawahery
  • 143 篇 m. gandelman
  • 143 篇 t. gershon
  • 143 篇 r. mountain
  • 143 篇 f. maciuc

语言

  • 12,995 篇 英文
  • 4,876 篇 其他
  • 136 篇 中文
  • 5 篇 斯洛文尼亚文
  • 4 篇 德文
  • 4 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Science and Engineering with Data Science"
17950 条 记 录,以下是4961-4970 订阅
A Novel Energy Efficient Sensor data Encryption in Fog Based IoT Networks
A Novel Energy Efficient Sensor Data Encryption in Fog Based...
收藏 引用
Next Generation Electronics (NEleX), International Conference on
作者: Raja M Manicka Kumar S Manoj B Kiruba Department of Computer Science and Business Systems Sri Krishna College of Engineering and Technology Coimbatore India Department of Computer Science and Engineering KPR Institute of Engineering and Technology Coimbatore India Department of Artificial Intelligence and Data Science Sri Krishna College of Engineering and Technology Coimbatore India
Smart devices equipped with embedded systems, including CPUs, sensors, and communication hardware, utilize web connectivity to gather and relay data from their environment, forming a segment of the Internet of Things ...
来源: 评论
ACGraph: Accelerating Streaming Graph Processing via Dependence Hierarchy  23
ACGraph: Accelerating Streaming Graph Processing via Depende...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Zihan Jiang Fubing Mao Yapu Guo Xu Liu Haikun Liu Xiaofei Liao Hai Jin Wei Zhang National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Electronic and Computer Engineering HKUST Hong Kong
Streaming graph processing needs to timely evaluate continuous queries. Prior systems suffer from massive redundant computations due to the irregular order of processing vertices influenced by updates. To address this... 详细信息
来源: 评论
SKIN_ML: An Efficient Approach for Skin Cancer Detection Using Soft Computing Methods  3
SKIN_ML: An Efficient Approach for Skin Cancer Detection Usi...
收藏 引用
3rd International Mobile, Intelligent, and Ubiquitous Computing Conference, MIUCC 2023
作者: Abdelminaam, Diaa Salama Madbouly, Magda M. Farag, Mohamed S Gomaa, Ibrahim A Abd-Elghany Zeid, Magdy Abualigah, Laith Misr International University Faculty of Computer Science Cairo Egypt Benha University Faculty of Computers and Artificial Intelligence Benha Egypt Alexandria University Faculty of Computer and Data Science Alexandria Egypt Alobour High Institute for Computer and Informatics Computer Science Department Cairo Egypt Lebanese American University Department of Electrical and Computer Engineering Byblos13-5053 Lebanon Al-Ahliyya Amman University Hourani Center for Applied Scientific Research Amman19328 Jordan Middle East University Meu Research Unit Amman11831 Jordan School of Computer Sciences Universiti Sains Malaysia Pulau Pinang 11800 Malaysia
In today's environment, cancer is a fatal disease. Skin cancer has become a fairly common malignancy due to the spread of several forms of cancer. Skin cancer is divided into two types: melanoma and non-melanoma. ... 详细信息
来源: 评论
Electrocardiogram-to-Pair (E2P): A Secure Group Pairing Protocol for WBAN Devices
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Zhao, Guichuan Tian, Youliang Jiang, Qi Ma, Jianfeng Guizhou University College of Computer Science and Technology Guiyang550000 China Guizhou University State Key Laboratory of Public Big Data College of Big Data and Information Engineering Guiyang550000 China Xidian University School of Cyber Engineering Xi'an710071 China
In a wireless body area network (WBAN), group pairing among multiple wearable devices enables efficient and secure broadcasting group messages. Existing pairing methods that rely on trusted concentrators, active parti... 详细信息
来源: 评论
Hybrid Visual Verification
Hybrid Visual Verification
收藏 引用
International Conference on Confluence The Next Generation Information Technology Summit (Confluence)
作者: S.Nikkath Bushra A. Syed Ismail P. Sasigresa Edwin Singh C Department of Computing Technologies SRM Institute of Scienece and Technology KattankulathurChengalpattu India Department of Data Science and Business Systems SRM Institute of Scienece and Technology KattankulathurChengalpattu India Department: Computer Science and Engineering Veltech University Department: Computer Science and Engineering Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology
data security is becoming increasingly important as cloud computing advances. data security is the fundamental problem of all distributed computing systems. Cloud computing enables access to distributed applications a...
来源: 评论
Improving Zero-Shot Semantic Segmentation using Dynamic Kernels
Improving Zero-Shot Semantic Segmentation using Dynamic Kern...
收藏 引用
Proceedings of the Digital Image Computing: Technqiues and Applications (DICTA)
作者: Tauseef Tajwar Muftiqur Rahman Taukir Azam Chowdhury Sabbir Ahmed Moshiur Farazi Md. Hasanul Kabir Department of Computer Science and Engineering Islamic University of Technology Gazipur Bangladesh Department of Computer Science and Engineering United International University Dhaka Bangladesh Data61-CSIRO Imaging and Computer Vision Group Canberra Australia
Zero-shot Semantic Segmentation (ZS3) is a challenging task that segments objects belonging to classes that are completely unseen during training. An established and intuitive approach is to formulate ZS3 as a combina...
来源: 评论
Investigation on Nail Denting or Crumbling from Nail Psoriasis Patient Ailment data using the Machine Learning Algorithm and data Mining Techniques
Investigation on Nail Denting or Crumbling from Nail Psorias...
收藏 引用
International conference of Electronics, Communication and Aerospace Technology (ICECA)
作者: K. Janani S. P. Santhoshkumar D. Vikram S. Priya M. Vijayaraj M. Priyanga Department of Data science and Computer Applications Manipal Institute of Technology Manipal India Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Avadi Chennai Department of Artificial Intelligence and Data Science Rathinam Technical Campus Coimbatore India Department of Information Technology Rathinam Technical Campus Coimbatore India
Nail denting or crumbling may result from nail psoriasis. A nail condition known as psoriatic onychodystrophy or psoriatic nails. Psoriasis sufferers frequently experience it; reported occurrences range from 10% to 78... 详细信息
来源: 评论
Improved Particle Swarm Algorithm Using Multiple Strategies  1
收藏 引用
14th International Symposium on Intelligence Computation and Applications, ISICA 2023
作者: Yi, Yunfei Wang, Zhiyong Shi, Yunying School of Big Data and Computer Hechi University Guangxi Yizhou546300 China College of Computer Science and Engineering Guangxi Normal University Guangxi Guilin541001 China
In order to address the issues of premature convergence and low search efficiency in the basic particle swarm algorithm, this paper analyzes the improved particle swarm optimization algorithms proposed by previous res... 详细信息
来源: 评论
ASAnalyzer: Attention based Sentiment analyzer for Real-world Sentiment Analysis
ASAnalyzer: Attention based Sentiment analyzer for Real-worl...
收藏 引用
Frontiers of Information Technology (FIT)
作者: Khadim Hussain Muhammad Azhar Bumshik Lee Asma Iqbal Muhammad Affan Sajid Ullah Khan Department of Computer Science Comsats University Islamabad Sahiwal Pakistan Department of Applied Data Science Hong Kong Shue Yan University Hong Kong Department of Computer Science and Software Engineering Chosun University Korea Department of Computer Science Tsinghua University China Department of Computer Science University of Lakki Marwat
In this era of big data, a lot of data is produced in various forms every second through various sources. Text data is one of those types that is produced mainly through social media like Twitter, Facebook, YouTube co...
来源: 评论
Recognition of data Breach Method from Story Using Advanced Deep Learning
Recognition of Data Breach Method from Story Using Advanced ...
收藏 引用
Innovation in Technology (INOCON), IEEE International Conference for
作者: Samiha Maisha Jeba Tanjim Taharat Aurpa Md Samiul Alom Md. Wadud Mahmud Joy Asm Shakil Ahamed Satya Ranjan Dash Md Shoaib Ahmed Dept. of Computer Science and Engineering International University of Business Agriculture and Technology Bangladesh Department of Data Science Bangabandhu Sheikh Mujibur Rahman Digital University Bangladesh School of Computer Applications KIIT University Odisha India Department of Computer Science Boise State University Boise Idaho USA
We often open our eyes in the morning with the appalling news of data breaches of different popular companies. This is a significant threat not only to giant companies but also to the general people’s privacy. Variou...
来源: 评论