咨询与建议

限定检索结果

文献类型

  • 42,219 篇 会议
  • 26,161 篇 期刊文献
  • 693 册 图书

馆藏范围

  • 69,073 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 42,348 篇 工学
    • 31,441 篇 计算机科学与技术...
    • 26,434 篇 软件工程
    • 10,282 篇 信息与通信工程
    • 6,142 篇 控制科学与工程
    • 5,950 篇 生物工程
    • 5,041 篇 生物医学工程(可授...
    • 4,714 篇 电气工程
    • 3,847 篇 电子科学与技术(可...
    • 3,406 篇 光学工程
    • 2,587 篇 机械工程
    • 2,207 篇 仪器科学与技术
    • 2,070 篇 化学工程与技术
    • 1,975 篇 动力工程及工程热...
    • 1,870 篇 网络空间安全
    • 1,727 篇 安全科学与工程
    • 1,564 篇 交通运输工程
  • 24,711 篇 理学
    • 12,381 篇 数学
    • 7,067 篇 生物学
    • 6,584 篇 物理学
    • 4,792 篇 统计学(可授理学、...
    • 2,444 篇 系统科学
    • 2,409 篇 化学
  • 13,100 篇 管理学
    • 7,438 篇 管理科学与工程(可...
    • 6,168 篇 图书情报与档案管...
    • 3,757 篇 工商管理
  • 5,501 篇 医学
    • 4,505 篇 临床医学
    • 4,023 篇 基础医学(可授医学...
    • 2,434 篇 公共卫生与预防医...
    • 2,315 篇 药学(可授医学、理...
  • 2,462 篇 法学
    • 2,087 篇 社会学
  • 1,482 篇 经济学
  • 1,163 篇 农学
  • 975 篇 教育学
  • 328 篇 文学
  • 135 篇 军事学
  • 106 篇 艺术学
  • 12 篇 哲学
  • 12 篇 历史学

主题

  • 2,255 篇 accuracy
  • 1,937 篇 deep learning
  • 1,838 篇 machine learning
  • 1,660 篇 computer science
  • 1,605 篇 data mining
  • 1,593 篇 data models
  • 1,533 篇 training
  • 1,480 篇 feature extracti...
  • 1,304 篇 computational mo...
  • 1,254 篇 predictive model...
  • 1,129 篇 internet of thin...
  • 997 篇 real-time system...
  • 984 篇 support vector m...
  • 926 篇 artificial intel...
  • 901 篇 convolutional ne...
  • 663 篇 optimization
  • 645 篇 cloud computing
  • 608 篇 security
  • 603 篇 semantics
  • 574 篇 wireless sensor ...

机构

  • 975 篇 cavendish labora...
  • 944 篇 department of ph...
  • 883 篇 oliver lodge lab...
  • 864 篇 physikalisches i...
  • 592 篇 university of ch...
  • 556 篇 fakultät physik ...
  • 519 篇 department of ph...
  • 511 篇 horia hulubei na...
  • 503 篇 school of physic...
  • 502 篇 imperial college...
  • 497 篇 school of physic...
  • 492 篇 nikhef national ...
  • 491 篇 stfc rutherford ...
  • 486 篇 iccub universita...
  • 482 篇 h.h. wills physi...
  • 478 篇 physik-institut ...
  • 475 篇 school of physic...
  • 472 篇 henryk niewodnic...
  • 472 篇 school of physic...
  • 464 篇 institute of par...

作者

  • 250 篇 barter w.
  • 238 篇 a. gomes
  • 235 篇 beiter a.
  • 223 篇 bellee v.
  • 222 篇 s. chen
  • 212 篇 c. alexa
  • 211 篇 j. m. izen
  • 211 篇 brundu d.
  • 211 篇 bowcock t.j.v.
  • 210 篇 g. bella
  • 210 篇 j. strandberg
  • 210 篇 d. calvet
  • 210 篇 c. amelung
  • 203 篇 blake t.
  • 202 篇 boettcher t.
  • 201 篇 amato s.
  • 199 篇 betancourt c.
  • 198 篇 borsato m.
  • 197 篇 g. spigo
  • 195 篇 m. gandelman

语言

  • 65,118 篇 英文
  • 3,422 篇 其他
  • 552 篇 中文
  • 31 篇 日文
  • 11 篇 法文
  • 9 篇 德文
  • 6 篇 朝鲜文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 3 篇 西班牙文
  • 1 篇 俄文
检索条件"机构=Data Science Program Computer Science Department School of Computer Science"
69073 条 记 录,以下是4911-4920 订阅
排序:
Exploring the Efficiency of Clustered Neural Network Aggregators for Time Series  5th
Exploring the Efficiency of Clustered Neural Network Aggrega...
收藏 引用
5th International Conference on data science, Machine Learning and Applications, ICDSMLA 2023
作者: Sivaraman, Himani Tembhre, Sh obhit Mishra, Awakash Gobi, N. Department of Computer Science and Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bangalore India
This paper explores the performance of clustered neural community aggregators (CNNA) for time series. Through the years, time collection evaluation has allowed for insights into numerous phenomena, ranging from low co... 详细信息
来源: 评论
An Evaluation of Hashing and Other Applied Cryptography Algorithms  5th
An Evaluation of Hashing and Other Applied Cryptography Algo...
收藏 引用
5th International Conference on data science, Machine Learning and Applications, ICDSMLA 2023
作者: Mishra, Awakash Haripriya Sharma, Apurva Thomas, Jobin S. Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bengaluru India Department of Computer Science and Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India
In the modern digital world, cryptography is critical in protecting personal statistics. Most of the cryptography algorithms used to ease data, hashing, and other implemented cryptography algorithms are extensively us... 详细信息
来源: 评论
Sentiment Analysis of Tokopedia Product Reviews Using Naïve Bayes Algorithm  1st
Sentiment Analysis of Tokopedia Product Reviews Using Naïve...
收藏 引用
1st International Conference on Computation of Artificial Intelligence and Machine Learning, ICCAIML 2024
作者: Lita, Mario Gracius Krishna Mardhiyyah, Alya Dhiya’ Maharani, I. Gusti Ayu Ngurah Stita Mulia, Angelina Patience Maulana, Fairuz Iqbal Computer Science Department School of Computer Science Bina Nusantara University Jakarta11480 Indonesia
Sentiment analysis is a method for classifying text using a Natural Language Processing (NLP) machine learning approach. Sentiment analysis can be utilized in various sectors to help obtain information on customer sat... 详细信息
来源: 评论
Emphasis Interaction Based Industry 5.0 Smart city Digital Twin's Technology  7
Emphasis Interaction Based Industry 5.0 Smart city Digital T...
收藏 引用
7th International Conference on Circuit Power and Computing Technologies, ICCPCT 2024
作者: Ramal, P. Janaki Anbalagan, E. Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Department of Computer Science and Engineering Tamil Nadu Chennai India
The proposed research endeavours to establish a symbiotic relationship between Interaction-Based Industry 5.0 and smart cities, emphasizing the transformative capabilities inherent in Digital Twin technology. Digital ... 详细信息
来源: 评论
Exploring the Power of Deep Learning in Anomaly Detection: A Comprehensive Review and Analysis  12th
Exploring the Power of Deep Learning in Anomaly Detection: A...
收藏 引用
12th International Conference on Soft Computing for Problem Solving, SocProS 2023
作者: Kumar, Gaurav Kumar, Ankit Pandy, Saroj Kumar Singh, Kamred Udham Singh, Teekam Kumar, Lalan Choudhury, Tanupriya Department of Computer Engineering and Applications GLA University UP Mathura India School of Computing Graphic Era Hill University Dehradun India Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India Department of Master of Computer Application GL Bajaj Institute of Technology and Management Greater Noida India Department of Computer Science and Engineering University of Petroleum and Energy Studies Dehradun India
This paper aims to provide a comprehensive overview of existing and state-of-the-art fraud and intrusion detection strategies, specifically focusing on incorporating neural networks. We begin by discussing the fundame... 详细信息
来源: 评论
Proximal Alternating-Direction-Method-of-Multipliers-Incorporated Nonnegative Latent Factor Analysis
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第6期10卷 1388-1406页
作者: Fanghui Bi Xin Luo Bo Shen Hongli Dong Zidong Wang the Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciencesand also with the Chongqing SchoolUniversity of Chinese Academy of SciencesChongqing 400714China the College of Computer and Information Science Southwest UniversityChongqing 400715China the College of Information Science and Technology Donghua UniversityShanghai 201620China the Artificial Intelligence Energy Research Institute Northeast Petroleum UniversityDaqing 163318China the Department of Computer Science Brunel University LondonUxbridge UB83PHUnited Kingdom
High-dimensional and incomplete(HDI)data subject to the nonnegativity constraints are commonly encountered in a big data-related application concerning the interactions among numerous nodes.A nonnegative latent factor... 详细信息
来源: 评论
Research on video synopsis optimization method based on Two-stage abnormal behavior recognition  6
Research on video synopsis optimization method based on Two-...
收藏 引用
6th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2023
作者: Wang, Fudan Zhu, Zhixiang Wang, Chenwu Wang, Pei Zhang, Lei Mu, Pengyuan School of Computer Science Xi'an University of Posts and Telecommunications Xi'an China School of Modern Post Xi'an University of Posts and Telecommunications Xi'an China School of Computer Science Northwestern Polytechnical University Xi'an China Data Operations Department Shaanxi Information Engineering Research Institute Shaanxi Xi'an710065 China
Video synopsis techniques shift the moving target in the time axis to achieve the purpose of displaying as much effective information as possible in the shortest possible time, usually the abnormal behavior in the vid... 详细信息
来源: 评论
Visual–Semantic Graph Matching Net for Zero-Shot Learning
收藏 引用
IEEE Transactions on Neural Networks and Learning Systems 2024年 第6期36卷 10171-10185页
作者: Bowen Duan Shiming Chen Yufei Guo Guo-Sen Xie Weiping Ding Yisong Wang School of Computer Science and Technology and the Institute for Artificial Intelligence Guizhou University Guiyang Guizhou China Department of Computer Vision Mohamed bin Zayed University of AI Abu Dhabi United Arab Emirates Intelligent Science and Technology Academy CASIC Beijing China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China School of Artificial Intelligence and Computer Science Nantong University Nantong China Faculty of Data Science City University of Macau Macau China
Zero-shot learning (ZSL) aims to leverage additional semantic information to recognize unseen classes. To transfer knowledge from seen to unseen classes, most ZSL methods often learn a shared embedding space by simply... 详细信息
来源: 评论
Hyper Spectral Image Analysis Integrating Fuzzy C-Means Clustering and Feature Selection  5th
Hyper Spectral Image Analysis Integrating Fuzzy C-Means Clus...
收藏 引用
5th International Conference on data science, Machine Learning and Applications, ICDSMLA 2023
作者: Agarwal, Trapty Rengarajan Goyal, Rohit Khan, N. Zafar Ali Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bangalore India Department of Computer Science & Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India
Hyper spectral picture evaluation is an effective tool for analyzing large volumes of excessive-dimensional facts. In this paper, a brand new method to hyper spectral photo analysis is provided that integrates fuzzy C... 详细信息
来源: 评论
Optimal Visualization of Hyper Spectral Time Series Algorithms via Graphical Representations  5th
Optimal Visualization of Hyper Spectral Time Series Algorith...
收藏 引用
5th International Conference on data science, Machine Learning and Applications, ICDSMLA 2023
作者: Agarwal, Trapty Karthikeyan, M.P. Adhikari, Manoj S. Ulla, Mohammed Mujeer Maharishi School of Engineering & Technology Maharishi University of Information Technology Uttar Pradesh Lucknow India Karnataka Bangalore India Department of Computer Science & Engineering School of Engineering and Computing Dev Bhoomi Uttarakhand University Navgaon Manduwala Dehradun India School of Computer Science and Engineering Presidency University Karnataka Bengaluru India
This technical summary describes how using graphical representations can allow for the best visualization of hyper spectral time series algorithms. Hyper spectral time collection algorithms correctly analyze temporal ... 详细信息
来源: 评论