咨询与建议

限定检索结果

文献类型

  • 42,238 篇 会议
  • 26,353 篇 期刊文献
  • 692 册 图书

馆藏范围

  • 69,283 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 42,506 篇 工学
    • 31,532 篇 计算机科学与技术...
    • 26,499 篇 软件工程
    • 10,318 篇 信息与通信工程
    • 6,156 篇 控制科学与工程
    • 5,956 篇 生物工程
    • 5,057 篇 生物医学工程(可授...
    • 4,767 篇 电气工程
    • 3,855 篇 电子科学与技术(可...
    • 3,426 篇 光学工程
    • 2,597 篇 机械工程
    • 2,213 篇 仪器科学与技术
    • 2,076 篇 化学工程与技术
    • 1,980 篇 动力工程及工程热...
    • 1,872 篇 网络空间安全
    • 1,733 篇 安全科学与工程
    • 1,572 篇 交通运输工程
  • 24,799 篇 理学
    • 12,424 篇 数学
    • 7,094 篇 生物学
    • 6,600 篇 物理学
    • 4,811 篇 统计学(可授理学、...
    • 2,447 篇 系统科学
    • 2,421 篇 化学
  • 13,147 篇 管理学
    • 7,464 篇 管理科学与工程(可...
    • 6,182 篇 图书情报与档案管...
    • 3,774 篇 工商管理
  • 5,549 篇 医学
    • 4,535 篇 临床医学
    • 4,052 篇 基础医学(可授医学...
    • 2,464 篇 公共卫生与预防医...
    • 2,317 篇 药学(可授医学、理...
  • 2,473 篇 法学
    • 2,095 篇 社会学
  • 1,485 篇 经济学
  • 1,165 篇 农学
  • 985 篇 教育学
  • 329 篇 文学
  • 135 篇 军事学
  • 106 篇 艺术学
  • 12 篇 哲学
  • 12 篇 历史学

主题

  • 2,258 篇 accuracy
  • 1,942 篇 deep learning
  • 1,844 篇 machine learning
  • 1,660 篇 computer science
  • 1,604 篇 data mining
  • 1,594 篇 data models
  • 1,535 篇 training
  • 1,485 篇 feature extracti...
  • 1,307 篇 computational mo...
  • 1,255 篇 predictive model...
  • 1,134 篇 internet of thin...
  • 997 篇 real-time system...
  • 984 篇 support vector m...
  • 927 篇 artificial intel...
  • 906 篇 convolutional ne...
  • 663 篇 optimization
  • 645 篇 cloud computing
  • 610 篇 security
  • 602 篇 semantics
  • 577 篇 wireless sensor ...

机构

  • 975 篇 cavendish labora...
  • 944 篇 department of ph...
  • 883 篇 oliver lodge lab...
  • 864 篇 physikalisches i...
  • 590 篇 university of ch...
  • 556 篇 fakultät physik ...
  • 519 篇 department of ph...
  • 511 篇 horia hulubei na...
  • 503 篇 school of physic...
  • 502 篇 imperial college...
  • 497 篇 school of physic...
  • 492 篇 nikhef national ...
  • 491 篇 stfc rutherford ...
  • 486 篇 iccub universita...
  • 482 篇 h.h. wills physi...
  • 478 篇 physik-institut ...
  • 475 篇 school of physic...
  • 472 篇 henryk niewodnic...
  • 470 篇 school of physic...
  • 464 篇 institute of par...

作者

  • 250 篇 barter w.
  • 238 篇 a. gomes
  • 235 篇 beiter a.
  • 223 篇 bellee v.
  • 222 篇 s. chen
  • 212 篇 c. alexa
  • 211 篇 j. m. izen
  • 211 篇 brundu d.
  • 211 篇 bowcock t.j.v.
  • 210 篇 g. bella
  • 210 篇 j. strandberg
  • 210 篇 d. calvet
  • 210 篇 c. amelung
  • 203 篇 blake t.
  • 202 篇 boettcher t.
  • 201 篇 amato s.
  • 199 篇 betancourt c.
  • 198 篇 borsato m.
  • 196 篇 g. spigo
  • 195 篇 m. gandelman

语言

  • 65,288 篇 英文
  • 3,460 篇 其他
  • 551 篇 中文
  • 31 篇 日文
  • 11 篇 法文
  • 9 篇 德文
  • 6 篇 朝鲜文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=Data Science Program Computer Science Department School of Computer Science"
69283 条 记 录,以下是31-40 订阅
排序:
Fuzzy knowledge based intelligent decision support system for ground based air defence
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第4期15卷 2317-2340页
作者: Ahmad, Adnan Amjad, Rawan Basharat, Amna Farhan, Asma Ahmad Abbas, Ali Ezad Department of Computer Science School of Computing National University of Computer and Emerging Sciences Islamabad Pakistan Department of Data Science School of Computing National University of Computer and Emerging Sciences Lahore Pakistan Islamabad Pakistan
This research proposes an Intelligent Decision Support System for Ground-Based Air Defense (GBAD) environments, which consist of Defended Assets (DA) on the ground that require protection from enemy aerial threats. A ... 详细信息
来源: 评论
Machine Learning for Threat Detection
Machine Learning for Threat Detection
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Sutanto, Dustin Fransisca, Febri Liem, Steven Chowanda, Andry Muliono, Yohan Izdihar, Zahra Nabila School of Computer Science Cyber Security Program Computer Science Department Bina Nusantara Jakarta Indonesia School of Computer Science Computer Science Program Computer Science Department Bina Nusantara Jakarta Indonesia
These days almost all people in the world use the Internet as the internet is constantly evolving. Cyber attack scale are increased thanks to cybercriminals that have become sophisticated in employing threats. Since t... 详细信息
来源: 评论
Security Challenges and Issues in Cloud Computing
Security Challenges and Issues in Cloud Computing
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Zakiyyah, Rika Permana, Daniel Valenecio, Devan Chowanda, Andry Muliono, Yohan Izdihar, Zahra Nabila Cyber Security Program Computer Science Department School of Computer Science Bina Nusantara Jakarta Indonesia Computer Science Program Computer Science Department School of Computer Science Bina Nusantara Jakarta Indonesia
Managing data has changed significantly because of cloud computing, which offers scalabe, flexible and reasonably priced solutions to enterprises and to people as well such as Amazon, Google, and Microsoft expanding t... 详细信息
来源: 评论
Unsupervised spectral feature selection algorithms for high dimensional data
收藏 引用
Frontiers of computer science 2023年 第5期17卷 27-40页
作者: Mingzhao WANG Henry HAN Zhao HUANG Juanying XIE School of Computer Science Shaanxi Normal UniversityXi’an 710119China Department of Computer Science School of Engineering&Computer ScienceBaylor UniversityWacoTX 76798USA
It is a significant and challenging task to detect the informative features to carry out explainable analysis for high dimensional data,especially for those with very small number of *** selection especially the unsup... 详细信息
来源: 评论
Predicting Age and Gender in Author Profiling: A Multi-Feature Exploration
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3333-3353页
作者: Aiman Muhammad Arshad Bilal Khan Sadique Ahmad Muhammad Asim Department of Computer Science City University of Science and Information TechnologyPeshawar25000Pakistan EIAS:Data Science and Blockchain Laboratory College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia School of Computer Science and Technology Guangdong University of TechnologyGuangzhou510006China
Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personalinformation, such as age, gender, occupation, and education, based on various linguistic features, e.g.... 详细信息
来源: 评论
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG College of Information Science and Engineering Hunan Normal University School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Computer Science Department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 评论
Evaluation of Educational Fund Management and Operational Cost Efficiency: Analyzing U.S. Public schools data
Evaluation of Educational Fund Management and Operational Co...
收藏 引用
2024 International Conference on Artificial Intelligence and Mechatronics System, AIMS 2024
作者: Eleeas, Kevina Nugraha Muljana, Richie Ayuningtyas, Lintang Diah Gunawan, Alexander Agung Santoso Setiawan, Karli Eka School of Computer Science Bina Nusantara University Jakarta Data Science Program 11480 Indonesia School of Computer Science Bina Nusantara University Jakarta Computer Science Department 11480 Indonesia
This study investigates the challenges and opportunities of managing educational funds and controlling operational costs in two educational systems. It examines how factors such as school infrastructure, technology in... 详细信息
来源: 评论
A privacy-preserving method for publishing data with multiple sensitive attributes
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第1期9卷 222-238页
作者: Tong Yi Minyong Shi Wenqian Shang Haibin Zhu School of Computer Science and Engineering Guangxi Normal UniversityGuilinChina School of Computer Science Communication University of ChinaBeijingChina Department of Computer Science and Mathematics Nipissing UniversityNorth BayOntarioCanada
The overgeneralisation may happen because most studies on data publishing for multiple sensitive attributes(SAs)have not considered the personalised privacy ***,sensitive information disclosure may also be caused by t... 详细信息
来源: 评论
On learning the right attention point for feature enhancement
收藏 引用
science China(Information sciences) 2023年 第1期66卷 131-143页
作者: Liqiang LIN Pengdi HUANG Chi-Wing FU Kai XU Hao ZHANG Hui HUANG College of Computer Science and Software Engineering Shenzhen University Department of Computer Science and Engineering The Chinese University of Hong Kong School of Computer Science National University of Defense Technology School of Computing Science Simon Fraser University
We present a novel attention-based mechanism to learn enhanced point features for point cloud processing tasks, e.g., classification and segmentation. Unlike prior studies, which were trained to optimize the weights o... 详细信息
来源: 评论
Towards High-Performance Graph Processing: From a Hardware/Software Co-Design Perspective
收藏 引用
Journal of computer science & Technology 2024年 第2期39卷 245-266页
作者: 廖小飞 赵文举 金海 姚鹏程 黄禹 王庆刚 赵进 郑龙 张宇 邵志远 National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Laboratory School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China Zhejiang Lab Hangzhou 311121China
Graph processing has been widely used in many scenarios,from scientific computing to artificial *** processing exhibits irregular computational parallelism and random memory accesses,unlike traditional ***,running gra... 详细信息
来源: 评论