咨询与建议

限定检索结果

文献类型

  • 32,569 篇 会议
  • 24,602 篇 期刊文献
  • 594 册 图书

馆藏范围

  • 57,765 篇 电子文献
  • 6 种 纸本馆藏

日期分布

学科分类号

  • 32,945 篇 工学
    • 18,719 篇 计算机科学与技术...
    • 14,868 篇 软件工程
    • 6,671 篇 信息与通信工程
    • 5,544 篇 电气工程
    • 5,521 篇 控制科学与工程
    • 5,377 篇 电子科学与技术(可...
    • 3,983 篇 生物医学工程(可授...
    • 3,931 篇 生物工程
    • 3,761 篇 光学工程
    • 2,568 篇 化学工程与技术
    • 2,368 篇 机械工程
    • 2,245 篇 材料科学与工程(可...
    • 2,104 篇 仪器科学与技术
    • 1,871 篇 动力工程及工程热...
    • 1,174 篇 安全科学与工程
    • 1,088 篇 网络空间安全
  • 23,202 篇 理学
    • 9,940 篇 物理学
    • 9,620 篇 数学
    • 4,859 篇 生物学
    • 3,318 篇 统计学(可授理学、...
    • 2,952 篇 化学
    • 2,284 篇 系统科学
  • 7,295 篇 管理学
    • 4,647 篇 管理科学与工程(可...
    • 2,785 篇 图书情报与档案管...
    • 2,224 篇 工商管理
  • 4,287 篇 医学
    • 3,481 篇 临床医学
    • 2,956 篇 基础医学(可授医学...
    • 1,818 篇 药学(可授医学、理...
    • 1,543 篇 公共卫生与预防医...
  • 1,332 篇 法学
    • 1,188 篇 社会学
  • 959 篇 经济学
  • 929 篇 农学
  • 626 篇 教育学
  • 242 篇 文学
  • 127 篇 军事学
  • 70 篇 艺术学
  • 13 篇 哲学
  • 12 篇 历史学

主题

  • 1,438 篇 accuracy
  • 1,235 篇 deep learning
  • 1,162 篇 machine learning
  • 999 篇 computational mo...
  • 899 篇 feature extracti...
  • 765 篇 training
  • 711 篇 internet of thin...
  • 711 篇 computer science
  • 700 篇 artificial intel...
  • 646 篇 predictive model...
  • 600 篇 real-time system...
  • 562 篇 optimization
  • 550 篇 support vector m...
  • 534 篇 convolutional ne...
  • 446 篇 testing
  • 421 篇 data models
  • 389 篇 data mining
  • 368 篇 neural networks
  • 362 篇 image segmentati...
  • 337 篇 computer archite...

机构

  • 1,099 篇 cavendish labora...
  • 1,029 篇 department of ph...
  • 986 篇 physikalisches i...
  • 969 篇 oliver lodge lab...
  • 876 篇 university of ch...
  • 765 篇 department of el...
  • 641 篇 infn laboratori ...
  • 618 篇 infn sezione di ...
  • 605 篇 infn sezione di ...
  • 605 篇 fakultät physik ...
  • 596 篇 infn sezione di ...
  • 563 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 538 篇 department of ph...
  • 535 篇 school of physic...
  • 522 篇 imperial college...
  • 517 篇 iccub universita...
  • 515 篇 h.h. wills physi...
  • 511 篇 stfc rutherford ...
  • 508 篇 nikhef national ...

作者

  • 275 篇 barter w.
  • 258 篇 a. gomes
  • 245 篇 c. alexa
  • 243 篇 j. m. izen
  • 240 篇 bellee v.
  • 239 篇 beiter a.
  • 236 篇 c. amelung
  • 235 篇 g. bella
  • 235 篇 s. chen
  • 234 篇 j. strandberg
  • 234 篇 d. calvet
  • 233 篇 blake t.
  • 231 篇 brundu d.
  • 230 篇 g. spigo
  • 225 篇 f. siegert
  • 225 篇 bowcock t.j.v.
  • 223 篇 amato s.
  • 222 篇 betancourt c.
  • 220 篇 borsato m.
  • 219 篇 boettcher t.

语言

  • 48,161 篇 英文
  • 9,184 篇 其他
  • 465 篇 中文
  • 25 篇 德文
  • 17 篇 日文
  • 16 篇 法文
  • 9 篇 斯洛文尼亚文
  • 6 篇 俄文
  • 4 篇 西班牙文
  • 3 篇 阿拉伯文
  • 2 篇 意大利文
  • 2 篇 朝鲜文
  • 2 篇 土耳其文
  • 1 篇 芬兰文
检索条件"机构=Computer Sciences and Computer Engineering Department"
57765 条 记 录,以下是331-340 订阅
排序:
Predicting Stock Prices with K-Nearest Neighbors using Moving Average Techniques  1
Predicting Stock Prices with K-Nearest Neighbors using Movin...
收藏 引用
1st International Conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Yuvaraj, S. Chenni Kumaran, J. Kajendran, K. Saveetha University Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Chennai India Panimalar Engineering College Department of Computer Science and Engineering Chennai India
This research analyzes the effectiveness of the K-Nearest Neighbors algorithm combined with moving average techniques, Five-day and Ten-day Exponential Moving Averages, specifically EMA-5 and EMA-10, to predict stock ... 详细信息
来源: 评论
Integrating ARIMA with Simple Moving Averages for Predictive Stock Price Modeling  1
Integrating ARIMA with Simple Moving Averages for Predictive...
收藏 引用
1st International Conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Yuvaraj, S. Chenni Kumaran, J. Kajendran, K. Saveetha University Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Chennai India Panimalar Engineering College Department of Computer Science and Engineering Chennai India
Forecasting stock prices is crucial because even minor incremental improvements translate into significant advantages in their financial decisions. A novel method that combines ARIMA Models with Simple Moving Averages... 详细信息
来源: 评论
Leveraging Random Forests for Stock Market Bubble Identification: A Comparative Analysis  1
Leveraging Random Forests for Stock Market Bubble Identifica...
收藏 引用
1st International Conference on Intelligent Systems and Computational Networks, ICISCN 2025
作者: Yuvaraj, S. Chenni Kumaran, J. Kajendran, K. Saveetha University Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Chennai India Panimalar Engineering College Department of Computer Science and Engineering Chennai India
This research attempts to identify stock market bubbles using technical indicators combined with machine-learning processes. If not detected early on, stock bubbles arising from overvaluation and speculation can incur... 详细信息
来源: 评论
Bald Eagle Search Algorithm with Hierarchical Deep Learning for Internet of Things Assisted Sleep Quality Recognition
收藏 引用
SN computer Science 2024年 第5期5卷 564页
作者: Duhayyim, Mesfer Al Sharif, Mahir Mohammed Munjal, Muskaan Hilal, Anwer A. Department of Computer Science College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University Al-Kharj 16273 Saudi Arabia Department of Computer Science Faculty of Computer Science and Information Technology Omdurman Islamic University Omdurman Sudan Computer Engineering Thapar Institute of Engineering and Technology Punjab Patiala India Department of Information System Faculty of Computer Science and Information Technology Omdurman Islamic University Omdurman Sudan
Sleep quality prediction in Internet of Things (IoT) involves leveraging a system of interrelated devices to gather as well as analyse related data. Smart devices like wearable devices or smart mattresses endlessly mo... 详细信息
来源: 评论
Efficient Optimal Routing Algorithm Based on Reward and Penalty for Mobile Adhoc Networks
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1331-1351页
作者: Anubha Ravneet Preet Singh Bedi Arfat Ahmad Khan Mohd Anul Haq Ahmad Alhussen Zamil S.Alzamil Department of Computer Applications I.K.G.Punjab Technical UniversityKapurthala144601PunjabIndia Research and Development I.K.G.Punjab Technical UniversityKapurthala144604PunjabIndia Department of Computer Science College of ComputingKhon Kaen UniversityKhon Kaen40002Thailand Department of Computer Science College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityAl-Majmaah11952Saudi Arabia
Mobile adhoc networks have grown in prominence in recent years,and they are now utilized in a broader range of *** main challenges are related to routing techniques that are generally employed in *** Adhoc system mana... 详细信息
来源: 评论
Al-Biruni Earth Radius Optimization for COVID-19 Forecasting
收藏 引用
computer Systems Science & engineering 2023年 第7期46卷 883-896页
作者: El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Tatiana Makarovskikh Amal H.Alharbi Doaa Sami Khafaga Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams University11566CairoEgypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura University35516MansouraEgypt Department of System Programming South Ural State University454080ChelyabinskRussia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
Several instances of pneumonia with no clear etiology were recorded in Wuhan,China,on December 31,*** world health organization(WHO)called it COVID-19 that stands for“Coronavirus Disease 2019,”which is the second ve... 详细信息
来源: 评论
TOWARDS THE FUNDAMENTAL LIMITS OF KNOWLEDGE TRANSFER OVER FINITE DOMAINS  12
TOWARDS THE FUNDAMENTAL LIMITS OF KNOWLEDGE TRANSFER OVER FI...
收藏 引用
12th International Conference on Learning Representations, ICLR 2024
作者: Zhao, Qingyue Zhu, Banghua Department of Computer Science and Technology Tsinghua University China Department of Electrical Engineering and Computer Sciences University of California Berkeley United States
We characterize the statistical efficiency of knowledge transfer through n samples from a teacher to a probabilistic student classifier with input space S over labels A. We show that privileged information at three pr... 详细信息
来源: 评论
The Impact of SMOTE and ADASYN on Random Forest and Advanced Gradient Boosting Techniques in Telecom Customer Churn Prediction  10
The Impact of SMOTE and ADASYN on Random Forest and Advanced...
收藏 引用
10th International Conference on Web Research, ICWR 2024
作者: Imani, Mehdi Ghaderpour, Zahra Joudaki, Majid Beikmohammadi, Ali Stockholm University Department of Computer and System Sciences Stockholm10691 Sweden Ayatollah Boroujerdi University Electrical and Computer Engineering Boroujerd Iran University of Kashan Electrical and Computer Engineering Kashan Iran Stockholm University Department of Computer and Systems Sciences StockholmSE-16455 Sweden
This paper explores the capability of various machine learning algorithms, including Random Forest and advanced gradient boosting techniques such as XGBoost, LightGBM, and CatBoost, to predict customer churn in the te... 详细信息
来源: 评论
Impact of Human Vulnerabilities on Cybersecurity
收藏 引用
computer Systems Science & engineering 2022年 第3期40卷 1153-1166页
作者: Maher Alsharif Shailendra Mishra Mohammed AlShehri Department of Information Technology College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia Department of Computer Engineering College of Computer and Information SciencesMajmaah UniversityMajmaah11952Saudi Arabia
Today,security is a major challenge linked with computer network companies that cannot defend against *** vulnerable factors increase security risks and cyber-attacks,including viruses,the internet,communications,and ... 详细信息
来源: 评论
CounterFair: Group Counterfactuals for Bias Detection, Mitigation and Subgroup Identification  24
CounterFair: Group Counterfactuals for Bias Detection, Mitig...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Kuratomi, Alejandro Lee, Zed Tsaparas, Panayiotis Junior, Guilherme Dinis Pitoura, Evaggelia Lindgren, Tony Papapetrou, Panagiotis Stockholm University Department of Computer and Systems Sciences Sweden University of Ioannina and Archimedes/Athena RC Department of Computer Science and Engineering Greece
Counterfactual explanations can be used as a means to explain a models decision process and to provide recommendations to users on how to improve their current status. The difficulty to apply these counterfactual reco... 详细信息
来源: 评论