咨询与建议

限定检索结果

文献类型

  • 12,495 篇 会议
  • 12,478 篇 期刊文献
  • 123 册 图书

馆藏范围

  • 25,096 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,016 篇 工学
    • 10,485 篇 计算机科学与技术...
    • 8,721 篇 软件工程
    • 3,138 篇 信息与通信工程
    • 2,390 篇 生物工程
    • 1,924 篇 生物医学工程(可授...
    • 1,902 篇 控制科学与工程
    • 1,741 篇 电气工程
    • 1,421 篇 光学工程
    • 1,407 篇 电子科学与技术(可...
    • 975 篇 化学工程与技术
    • 761 篇 机械工程
    • 683 篇 材料科学与工程(可...
    • 675 篇 仪器科学与技术
    • 645 篇 动力工程及工程热...
    • 540 篇 安全科学与工程
    • 513 篇 网络空间安全
  • 10,199 篇 理学
    • 4,804 篇 数学
    • 3,137 篇 物理学
    • 2,976 篇 生物学
    • 1,945 篇 统计学(可授理学、...
    • 1,205 篇 化学
    • 863 篇 系统科学
  • 4,163 篇 管理学
    • 2,264 篇 管理科学与工程(可...
    • 2,049 篇 图书情报与档案管...
    • 1,350 篇 工商管理
  • 2,149 篇 医学
    • 1,761 篇 临床医学
    • 1,520 篇 基础医学(可授医学...
    • 821 篇 药学(可授医学、理...
    • 812 篇 公共卫生与预防医...
  • 832 篇 法学
    • 728 篇 社会学
  • 490 篇 经济学
  • 451 篇 农学
  • 445 篇 教育学
  • 91 篇 文学
  • 33 篇 军事学
  • 25 篇 艺术学
  • 7 篇 哲学
  • 5 篇 历史学

主题

  • 746 篇 deep learning
  • 672 篇 accuracy
  • 561 篇 machine learning
  • 379 篇 training
  • 327 篇 computational mo...
  • 303 篇 computer science
  • 301 篇 internet of thin...
  • 301 篇 feature extracti...
  • 298 篇 support vector m...
  • 274 篇 predictive model...
  • 246 篇 convolutional ne...
  • 234 篇 real-time system...
  • 220 篇 optimization
  • 210 篇 data models
  • 202 篇 reinforcement le...
  • 200 篇 data mining
  • 195 篇 neural networks
  • 190 篇 image segmentati...
  • 176 篇 semantics
  • 175 篇 artificial intel...

机构

  • 428 篇 department of ph...
  • 397 篇 iccub universita...
  • 298 篇 university of ch...
  • 293 篇 imperial college...
  • 293 篇 nikhef national ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 287 篇 physikalisches i...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 school of physic...
  • 284 篇 institute of par...
  • 283 篇 horia hulubei na...
  • 280 篇 henryk niewodnic...
  • 279 篇 van swinderen in...
  • 279 篇 departamento de ...

作者

  • 242 篇 barter w.
  • 240 篇 beiter a.
  • 223 篇 bellee v.
  • 218 篇 casse g.
  • 212 篇 bowcock t.j.v.
  • 191 篇 brundu d.
  • 182 篇 blake t.
  • 155 篇 baker s.
  • 155 篇 borsato m.
  • 154 篇 betancourt c.
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 bediaga i.
  • 142 篇 braun s.
  • 142 篇 borisyak m.
  • 142 篇 bizzeti a.

语言

  • 20,464 篇 英文
  • 4,527 篇 其他
  • 132 篇 中文
  • 12 篇 斯洛文尼亚文
  • 7 篇 法文
  • 6 篇 德文
  • 4 篇 西班牙文
  • 4 篇 日文
  • 1 篇 捷克文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Data Science Program Computer Science Department"
25096 条 记 录,以下是1311-1320 订阅
排序:
Enhanced Detection and Analysis of Lymphoma Cancer Through Machine Learning and Deep Learning  1
Enhanced Detection and Analysis of Lymphoma Cancer Through M...
收藏 引用
1st International Conference on Advanced Computing and Emerging Technologies, ACET 2024
作者: Choudhary, Doddapaneni Meghana Ashwini, Bugata Sai Rasagna Devi, Kavuluri Leela Kedareswari, Kotte Kiran, Musunuru Hari Srinivas, Pvvs Koneru Lakshmaiah Education Foundation Department of Computer Science and Information Technology Andhra Pradesh Vaddeswaram522502 India Koneru Lakshmaiah Education Foundation Department of Artificial Intelligence and Data Science Andhra Pradesh Vaddeswaram522502 India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Andhra Pradesh Vaddeswaram522502 India
This study focuses on the use of ml techniques to unravel the complexity of lymph node classification, which is an important part of oncology due to its different subtypes and different treatments. This study aims to ... 详细信息
来源: 评论
"Nyctophy": Assessing the effectiveness of serious game for nyctophobia based on virtual reality by usability and heart rate monitoring
收藏 引用
Procedia computer science 2024年 245卷 185-192页
作者: Elshad Ryan Ardiyanto Patrick Alexander Edyth Novian Putra Dimas Ramdhan Game Application & Technology Program Computer Science Department School of Computer Science Bina Nusantara University Jakarta
Nyctophobia is a phobia of the dark and is common among children but also found in adults. While the phobia itself is commonly known, the diversity of its treatment is still minimal. As technology has reached its high... 详细信息
来源: 评论
A Study Of Dynamic Thresholds Power Detection Spectrum Sensing Techniques In CRN  9
A Study Of Dynamic Thresholds Power Detection Spectrum Sensi...
收藏 引用
9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023
作者: Keerthika, J. AnandaKumar, H. Priya, V. Yuvalatha, S. Gayathri, N. Sri Eshwar College of Engineering Department of Computer Science and Engineering Coimbatore India Dr NGP Institute of Technology Department of Artificial Intelligence and Data Science Coimbatore India Bannari Amman Institute of Technology Department of Computer Science and Business System Sathyamangalam India
A Cognitive radio is the mobile communication technologies which help to utilize the efficient need of radio spectrum origin. The performance of CRN is significantly impacted by the spectrum sensing function. The prob... 详细信息
来源: 评论
SELF-JOINT SUPERVISED LEARNING  10
SELF-JOINT SUPERVISED LEARNING
收藏 引用
10th International Conference on Learning Representations, ICLR 2022
作者: Kardan, Navid Hill, Mitchell Shah, Mubarak Center for Research in Computer Vision Department of Computer Science Department of Statistics and Data Science University of Central Florida United States
Supervised learning is a fundamental framework used to train machine learning systems. A supervised learning problem is often formulated using an i.i.d. assumption that restricts model attention to a single relevant s... 详细信息
来源: 评论
Service Oriented Fuzzy Decision Model for Road Traffic Engineering  9
Service Oriented Fuzzy Decision Model for Road Traffic Engin...
收藏 引用
9th IEEE International Conference on Computing, Engineering and Design, ICCED 2023
作者: Utama, Ditdit Nugeraha Zaki, Fauzan Affan Munjeri, Intan Juliani Putri, Nidya Utami Bina Nusantara University BINUS Graduate Program Master of Computer Science Computer Science Department Jakarta11480 Indonesia UIN Syarif Hidayatullah Information Systems Department Jakarta Indonesia
A number of attempts have already been implemented formally to solve road traffic congestion. However, the objective strategy type of road traffic engineering could not be proven truly. Try and error is one inefficien... 详细信息
来源: 评论
Critical (P5, dart) -Free Graphs  16th
Critical (P5, dart) -Free Graphs
收藏 引用
16th Annual International Conference on Combinatorial Optimization and Applications, COCOA 2023
作者: Xia, Wen Jooken, Jorik Goedgebeur, Jan Huang, Shenwei College of Computer Science Nankai University Tianjin300071 China Tianjin Key Laboratory of Network and Data Security Technology Nankai University Tianjin300071 China Department of Computer Science KU Leuven Campus Kulak-Kortrijk Kortrijk8500 Belgium Department of Applied Mathematics Computer Science and Statistics Ghent University Ghent9000 Belgium
Given two graphs H1 and H2, a graph is (H1, H2) -free if it contains no induced subgraph isomorphic to H1 nor H2. A dart is the graph obtained from a diamond by adding a new vertex and making it adjacent to exactly on... 详细信息
来源: 评论
Resisting Visual Hacking: A Novel Graphical Password Authentication System  3
Resisting Visual Hacking: A Novel Graphical Password Authent...
收藏 引用
3rd International Conference on Pervasive Computing and Social Networking, ICPCSN 2023
作者: Jebakumar Immanuel, D. Ramalingam, V. Tharun Kumar, P. Iyer, Akash Narayanan, M.S. Karpagam Institute of Technology Department of Artificial Intelligence and Data Science Coimbatore641 105 India Sns College of Engineering Department of Computer Science and Engineering Coimbatore India
Password-based authentication is a widely used method to ensure security and privacy in computer applications. However, the selection of weak passwords and insecure input methods by users is considered the 'weakes... 详细信息
来源: 评论
Catapults in SGD: spikes in the training loss and their impact on generalization through feature learning  41
Catapults in SGD: spikes in the training loss and their impa...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Zhu, Libin Liu, Chaoyue Radhakrishnan, Adityanarayanan Belkin, Mikhail Department of Computer Science UCSD United States Halicioğlu Data Science Institute UCSD United States Harvard University United States Broad Institute of MIT and Harvard United States
In this paper, we first present an explanation regarding the common occurrence of spikes in the training loss when neural networks are trained with stochastic gradient descent (SGD).We provide evidence that the spikes...
来源: 评论
Feature Selection in Associative Classification-A Review and Comparative Analysis  24
Feature Selection in Associative Classification-A Review and...
收藏 引用
24th International Arab Conference on Information Technology, ACIT 2023
作者: Alazaidah, Raed Al-Qerem, Ahmad Qasem, Mais Haj Al-Shaikh, Ala'a Almilli, Nabeel Injadat, MohammadNoor Zarqa University Faculty of Information Technology Department of Data Science and Ai Zarqa Jordan Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan
Feature selection is one of the most important and significant steps that highly affects the final accuracy of any classification model. It aims to determine the most significant features that help in accurately predi... 详细信息
来源: 评论
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals
收藏 引用
Frontiers of computer science 2024年 第3期18卷 199-216页
作者: Antonio SANTOS-OLMO Luis Enrique SÁNCHEZ David G.ROSADO Manuel A.SERRANO Carlos BLANCO Haralambos MOURATIDIS Eduardo FERNÁNDEZ-MEDINA GSyA Research Group University of Castilla-La ManchaCiudad Real 13071Spain Institute for Analytics and Data Science University of EssexColchester CO43SQUK Alarcos Research Group University of Castilla-La ManchaCiudad Real 13071Spain ISTR Research group Department of Computer Science and ElectronicsUniversity of CantabriaSantander 39005Spain
The information society depends increasingly on risk assessment and management systems as means to adequately protect its key information *** availability of these systems is now vital for the protection and evolution... 详细信息
来源: 评论