咨询与建议

限定检索结果

文献类型

  • 12,547 篇 期刊文献
  • 12,187 篇 会议
  • 119 册 图书

馆藏范围

  • 24,853 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14,940 篇 工学
    • 10,464 篇 计算机科学与技术...
    • 8,711 篇 软件工程
    • 3,166 篇 信息与通信工程
    • 2,392 篇 生物工程
    • 1,923 篇 生物医学工程(可授...
    • 1,898 篇 控制科学与工程
    • 1,786 篇 电气工程
    • 1,420 篇 光学工程
    • 1,392 篇 电子科学与技术(可...
    • 985 篇 化学工程与技术
    • 776 篇 机械工程
    • 676 篇 仪器科学与技术
    • 652 篇 材料科学与工程(可...
    • 652 篇 动力工程及工程热...
    • 546 篇 安全科学与工程
    • 528 篇 网络空间安全
  • 10,242 篇 理学
    • 4,774 篇 数学
    • 3,144 篇 物理学
    • 3,003 篇 生物学
    • 1,918 篇 统计学(可授理学、...
    • 1,228 篇 化学
    • 862 篇 系统科学
  • 4,194 篇 管理学
    • 2,274 篇 管理科学与工程(可...
    • 2,078 篇 图书情报与档案管...
    • 1,357 篇 工商管理
  • 2,176 篇 医学
    • 1,749 篇 临床医学
    • 1,537 篇 基础医学(可授医学...
    • 818 篇 药学(可授医学、理...
    • 807 篇 公共卫生与预防医...
  • 825 篇 法学
    • 720 篇 社会学
  • 490 篇 经济学
  • 455 篇 农学
  • 445 篇 教育学
  • 94 篇 文学
  • 32 篇 军事学
  • 26 篇 艺术学
  • 5 篇 哲学
  • 3 篇 历史学

主题

  • 726 篇 deep learning
  • 622 篇 accuracy
  • 559 篇 machine learning
  • 366 篇 training
  • 327 篇 computational mo...
  • 302 篇 computer science
  • 295 篇 internet of thin...
  • 293 篇 support vector m...
  • 275 篇 feature extracti...
  • 265 篇 predictive model...
  • 224 篇 convolutional ne...
  • 209 篇 real-time system...
  • 207 篇 data models
  • 206 篇 optimization
  • 202 篇 data mining
  • 199 篇 neural networks
  • 196 篇 reinforcement le...
  • 190 篇 image segmentati...
  • 187 篇 artificial intel...
  • 177 篇 semantics

机构

  • 428 篇 department of ph...
  • 398 篇 iccub universita...
  • 297 篇 university of ch...
  • 297 篇 nikhef national ...
  • 293 篇 imperial college...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 289 篇 physikalisches i...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 school of physic...
  • 284 篇 institute of par...
  • 282 篇 horia hulubei na...
  • 280 篇 henryk niewodnic...
  • 279 篇 van swinderen in...
  • 279 篇 departamento de ...

作者

  • 242 篇 barter w.
  • 240 篇 beiter a.
  • 223 篇 bellee v.
  • 217 篇 casse g.
  • 211 篇 bowcock t.j.v.
  • 192 篇 brundu d.
  • 181 篇 blake t.
  • 156 篇 borsato m.
  • 155 篇 betancourt c.
  • 154 篇 baker s.
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 bediaga i.
  • 142 篇 braun s.
  • 142 篇 borisyak m.
  • 142 篇 bizzeti a.

语言

  • 23,327 篇 英文
  • 1,420 篇 其他
  • 117 篇 中文
  • 6 篇 法文
  • 4 篇 德文
  • 4 篇 西班牙文
  • 4 篇 日文
  • 3 篇 斯洛文尼亚文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Data Science Program Computer Science Department"
24853 条 记 录,以下是4911-4920 订阅
排序:
A Digital Currency Scheme Based on Blind Signatures Using Chaotic Hash Functions and RSA Algorithm  5
A Digital Currency Scheme Based on Blind Signatures Using Ch...
收藏 引用
5th International Conference on Information science, Parallel and Distributed Systems, ISPDS 2024
作者: Zhang, Chunfu Bai, Jing Liang, Yanchun Tavares, Adriano Wang, Lidong Jiang, Jie Zhuhai College of Science and Technology School of Big Data Zhuhai519041 China University of Minho Department of Industrial Electronics Guimaraes4800-058 Portugal Zhuhai College of Science and Technology School of Computer Science Zhuhai519041 China
Blind signature is a cryptographic technique where a signer signs a message without knowing its content, thereby protecting the privacy of the message. It is widely used in digital currencies, electronic voting system... 详细信息
来源: 评论
Demystifying Cyber terrorism: Causes, Costs & its impact on individuals' psyche and public confidence
Demystifying Cyber terrorism: Causes, Costs & its impact on ...
收藏 引用
2023 International Conference on Recent Advances in Electrical, Electronics and Digital Healthcare Technologies, REEDCON 2023
作者: Zahra, Syed Rameem Saleem, Tausifa Jan Sonia Netaji Subhas University of Technology Department of Computer Science and Engineering Delhi India Indian Institute of Technology Delhi Department of Electrical Engineering Delhi India Shoolini University Yogananda School of Ai Computer and Data Science H.P Solan India
Just like the game for Information Technology (IT) security was turned topsy-turvy by the arrival of mobile devices a few decades ago, the Internet of Things (IoT) today is changing it again a big time. data breaches,... 详细信息
来源: 评论
Ghost Module Based Residual Mixture of Self-Attention and Convolution for Online Signature Verification
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 695-712页
作者: Fangjun Luan Xuewen Mu Shuai Yuan Department of Computer Technology School of Computer Science and EngineeringShenyang Jianzhu UniversityShenyang110168China Liaoning Province Big Data Management and Analysis Laboratory of Urban Construction Shenyang Jianzhu UniversityShenyang110168China Shenyang Branch of National Special Computer Engineering Technology Research Center Shenyang Jianzhu UniversityShenyang110168China
Online Signature Verification (OSV), as a personal identification technology, is widely used in various ***, it faces challenges, such as incomplete feature extraction, low accuracy, and computational heaviness. Toadd... 详细信息
来源: 评论
Mobility and Behavior based Trustable Routing in Mobile Wireless Sensor Network  7
Mobility and Behavior based Trustable Routing in Mobile Wire...
收藏 引用
7th International Conference on Computing Methodologies and Communication, ICCMC 2023
作者: Praveen Kumar, B. Umamageswaran, J. Kalpana, A.V. Dhanalakshmi, R. Department of Computer Science and Engineering KL University Andhra Pradesh Vijayawada India Department of Information Technology RMK Engineering College Tamil Nadu Chennai India Department of Data Science and Business Systems SRM Institute of Science and Technology Tamil Nadu Chennai India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Tamil Nadu Chennai India
Mobile wireless sensor networks (MWSNs) allow the sensor nodes to move freely and transmit to each other without needing a fixed infrastructure. Usually, the routing process is very complex, and it becomes even more c... 详细信息
来源: 评论
Microservices Architecture As a data Governance Tools in Decentralized E-Government
Microservices Architecture As a Data Governance Tools in Dec...
收藏 引用
2022 International Conference on science and Technology, ICOSTECH 2022
作者: Paramita, Adi Suryaputra Gaol, Ford Lomban Ranti, Benny Supangkat, Suhono Harso Graduate Program Universitas Ciputra Surabaya/ Bina Nusantara University Information Systems Department/Doctor of Computer Science Jakarta Surabaya Indonesia Bina Nusantara University Doctor of Computer Science Graduate Program Jakarta Indonesia Institute of Technology Bandung Systems and Information Technology Department Bandung Indonesia
Electronic government, or e-Government, is the use of information and communication technology by the public sector (ICT). Additionally, it can be viewed as a paradigm shift in terms of how governments operate. The go... 详细信息
来源: 评论
InDRI: Intelligent Diagnosis Radiology Images  6
InDRI: Intelligent Diagnosis Radiology Images
收藏 引用
6th International Conference on Cybernetics and Intelligent System, ICORIS 2024
作者: Isnan, Mahmud Elwirehardja, Gregorius Natanael Nugroho, Kuncahyo Setyo Ritonga, Imelda Liana Gultom, Roby Pahala Januario Lubis, Elida Afni Pardamean, Bens Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia Bioinformatics and Data Science Research Center Bina Nusantara University Jakarta11480 Indonesia Universitas Imelda Medan Indonesia Medan20238 Indonesia Universitas Imelda Medan Indonesia Medan20238 Indonesia Clinical Pathology Unit Rumah Sakit Imelda Pekerja Indonesia Medan20239 Indonesia Computer Science Department BINUS Graduate Program Bina Nusantara University Jakarta11480 Indonesia
The need for an early screening and computer-Aided Diagnosis (CAD) system based on Artificial Intelligence (AI) for the field of radiology is essential to realize considering the large impact of lung diseases globally... 详细信息
来源: 评论
Token2vec: A Joint Self-Supervised Pre-Training Framework Using Unpaired Speech and Text  48
Token2vec: A Joint Self-Supervised Pre-Training Framework Us...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Yue, Xianghu Ao, Junyi Gao, Xiaoxue Li, Haizhou National University of Singapore Department of Electrical and Computer Engineering Singapore Shenzhen Research Institute of Big Data Shenzhen China The Chinese University of HongKong School of Data Science Shenzhen China
Self-supervised pre-Training has been successful in both text and speech processing. Speech and text offer different but complementary information. The question is whether we are able to perform a speech-Text joint pr... 详细信息
来源: 评论
A general framework for adversarial label learning
The Journal of Machine Learning Research
收藏 引用
The Journal of Machine Learning Research 2021年 第1期22卷 5254-5286页
作者: Chidubem Arachie Bert Huang Department of Computer Science Virginia Tech Blacksburg VA Department of Computer Science Data Intensive Studies Center Tufts University Medford MA
We consider the task of training classifiers without fully labeled data. We propose a weakly supervised method--adversarial label learning--that trains classifiers to perform well when noisy and possibly correlated la... 详细信息
来源: 评论
Unsupervised Person and Vehicle Re-identification via Relative Hard Samples in Industrial Surveillance System  3
Unsupervised Person and Vehicle Re-identification via Relati...
收藏 引用
3rd International Workshop on Intelligent Systems, IWIS 2023
作者: Tang, Qing Cao, Ge Jo, Kang-Hyun Jung, Hail Data Science Group INTERX Ulsan Korea Republic of University of Ulsan Department of Electrical Electronic and Computer Engineering Korea Republic of Seoul National University of Science and Technology Department of Business Administration Seoul Korea Republic of
Person and Vehicle Re-Identification (Re-ID) is a critical task in the realm of intelligent industrial surveillance systems. It aims to identify the same person or vehicle across different camera views or scenes, faci... 详细信息
来源: 评论
Geometric Optimisation of Unmanned Aerial Vehicle Trajectories in Uncertain Environments
收藏 引用
Vehicular Communications 2025年 54卷
作者: Akshya, J. Sundarrajan, M. Amutha, S. Dhanaraj, Rajesh Kumar Khadidos, Adil O. Khadidos, Alaa O. Selvarajan, Shitharth Department of Computational Intelligence SRM Institute of Science and Technology Tamil Nadu Kattankulathur 603203 India Department of Networking and Communications SRM Institute of Science and Technology Tamil Nadu Kattankulathur 603203 India Department of Computer Science and Engineering School of Computing Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology Chennai India Symbiosis Institute of Computer Studies and Research (SICSR) Symbiosis International (Deemed University) Pune India Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah 21589 Saudi Arabia Center of Research Excellence in Artificial Intelligence and Data Science King Abdulaziz University Jeddah Saudi Arabia School of Built Environment Engineering and Computing Leeds Beckett University LS6 3HF Leeds United Kingdom Department of Computer Science and Engineering Chennai Institute of Technology Chennai India Centre for Research Impact & Outcome Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura 140401 India
The problem of efficient trajectory optimisation for Unmanned Aerial Vehicles (UAVS) in dynamic and constrained environments is one where energy efficiency, spatial coverage, and path smoothness need to be balanced. T... 详细信息
来源: 评论