咨询与建议

限定检索结果

文献类型

  • 43,488 篇 会议
  • 27,080 篇 期刊文献
  • 698 册 图书

馆藏范围

  • 71,266 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 44,219 篇 工学
    • 32,839 篇 计算机科学与技术...
    • 27,204 篇 软件工程
    • 10,685 篇 信息与通信工程
    • 6,544 篇 控制科学与工程
    • 6,032 篇 生物工程
    • 5,228 篇 生物医学工程(可授...
    • 4,978 篇 电气工程
    • 3,953 篇 电子科学与技术(可...
    • 3,567 篇 光学工程
    • 2,704 篇 机械工程
    • 2,256 篇 仪器科学与技术
    • 2,149 篇 化学工程与技术
    • 2,044 篇 动力工程及工程热...
    • 2,017 篇 网络空间安全
    • 1,823 篇 安全科学与工程
    • 1,633 篇 交通运输工程
  • 25,444 篇 理学
    • 12,699 篇 数学
    • 7,248 篇 生物学
    • 6,799 篇 物理学
    • 4,965 篇 统计学(可授理学、...
    • 2,501 篇 化学
    • 2,477 篇 系统科学
  • 13,657 篇 管理学
    • 7,801 篇 管理科学与工程(可...
    • 6,416 篇 图书情报与档案管...
    • 3,943 篇 工商管理
  • 5,743 篇 医学
    • 4,689 篇 临床医学
    • 4,169 篇 基础医学(可授医学...
    • 2,590 篇 公共卫生与预防医...
    • 2,322 篇 药学(可授医学、理...
  • 2,570 篇 法学
    • 2,164 篇 社会学
  • 1,539 篇 经济学
  • 1,224 篇 农学
  • 1,034 篇 教育学
  • 320 篇 文学
  • 137 篇 军事学
  • 111 篇 艺术学
  • 13 篇 哲学
  • 12 篇 历史学

主题

  • 2,417 篇 accuracy
  • 2,130 篇 deep learning
  • 1,910 篇 machine learning
  • 1,664 篇 computer science
  • 1,660 篇 data models
  • 1,629 篇 data mining
  • 1,611 篇 training
  • 1,559 篇 feature extracti...
  • 1,380 篇 computational mo...
  • 1,312 篇 predictive model...
  • 1,174 篇 internet of thin...
  • 1,110 篇 real-time system...
  • 1,020 篇 support vector m...
  • 982 篇 artificial intel...
  • 970 篇 convolutional ne...
  • 725 篇 optimization
  • 678 篇 cloud computing
  • 667 篇 security
  • 620 篇 semantics
  • 602 篇 neural networks

机构

  • 974 篇 cavendish labora...
  • 944 篇 department of ph...
  • 879 篇 oliver lodge lab...
  • 865 篇 physikalisches i...
  • 604 篇 university of ch...
  • 564 篇 fakultät physik ...
  • 520 篇 department of ph...
  • 509 篇 horia hulubei na...
  • 504 篇 school of physic...
  • 500 篇 imperial college...
  • 494 篇 school of physic...
  • 488 篇 stfc rutherford ...
  • 488 篇 nikhef national ...
  • 481 篇 iccub universita...
  • 481 篇 h.h. wills physi...
  • 476 篇 school of physic...
  • 473 篇 department of co...
  • 473 篇 physik-institut ...
  • 469 篇 henryk niewodnic...
  • 465 篇 school of physic...

作者

  • 254 篇 barter w.
  • 235 篇 a. gomes
  • 232 篇 beiter a.
  • 222 篇 bellee v.
  • 218 篇 s. chen
  • 215 篇 brundu d.
  • 212 篇 bowcock t.j.v.
  • 211 篇 blake t.
  • 210 篇 c. alexa
  • 209 篇 j. m. izen
  • 207 篇 g. bella
  • 207 篇 j. strandberg
  • 207 篇 d. calvet
  • 207 篇 c. amelung
  • 206 篇 boettcher t.
  • 205 篇 betancourt c.
  • 205 篇 amato s.
  • 204 篇 borsato m.
  • 200 篇 bencivenni g.
  • 198 篇 bay a.

语言

  • 61,375 篇 英文
  • 9,367 篇 其他
  • 629 篇 中文
  • 33 篇 日文
  • 18 篇 德文
  • 18 篇 斯洛文尼亚文
  • 17 篇 法文
  • 7 篇 罗马尼亚文
  • 6 篇 朝鲜文
  • 3 篇 西班牙文
  • 2 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 俄文
检索条件"机构=Data Science Program Computer Science Department School of Computer Science"
71266 条 记 录,以下是571-580 订阅
Analysis of the Utilization of Human Motion Tracking in the Security Sector: Examining the Accuracy Level and Key Factors in Operation  6
Analysis of the Utilization of Human Motion Tracking in the ...
收藏 引用
6th International Seminar on Research of Information Technology and Intelligent Systems, ISRITI 2023
作者: Indradjaja, Nicholas Chen, Michael Masada, Hossey Anggreainy, Maria Susan Kurniawan, Afdhal School of Computer Science Computer Science Department Bina Nusantara University Jakarta11480 Indonesia BINUS Graduiate Program Doctor of Computer Science Computer Science Department Bina Nusantara University Jakarta11480 Indonesia
The use of surveillance cameras (CCTV) is very limited and has many weaknesses. Surveillance cameras can only record events that are happening without being detected, so supervisors still need protection. From these l... 详细信息
来源: 评论
Evaluation of REAL-ESRGAN Using Different Types of Image Degradation  11
Evaluation of REAL-ESRGAN Using Different Types of Image Deg...
收藏 引用
11th International Conference on ICT for Smart Society, ICISS 2024
作者: Andriadi, Kus Zarlis, Muhammad Heryadi, Yaya Chowanda, Andry Binus Graduate Program Bina Nusantara University Computer Science Department Jakarta Indonesia Binus Graduate Program Bina Nusantara University Information System Management Department Jakarta11480 Indonesia School of Computer Science Binus University Computer Science Department Jakarta Indonesia
This study evaluates the performance of the REAL-ESRGAN [1] model on images with varying levels of degradation using the DIV2K dataset [2], such as the Wild, the Mild, the Difficult, and the x8 subsets. REAL-ESRGAN wa... 详细信息
来源: 评论
Effects of feature selection and normalization on network intrusion detection
Data Science and Management
收藏 引用
data science and Management 2025年 第1期8卷 23-39页
作者: Mubarak Albarka Umar Zhanfang Chen Khaled Shuaib Yan Liu College of Information Technology United Arab Emirates UniversityAl Ain15551United Arab Emirates School of Computer Science and Technology Changchun University of Science and TechnologyChangchun130022China Department of Computer Science Shantou UniversityShantouGuangdong515063China
The rapid rise of cyberattacks and the gradual failure of traditional defense systems and approaches led to using artificial intelligence(AI)techniques(such as machine learning(ML)and deep learning(DL))to build more e... 详细信息
来源: 评论
A Construction of Object Detection Model for Acute Myeloid Leukemia
收藏 引用
Intelligent Automation & Soft Computing 2023年 第4期36卷 543-560页
作者: K.Venkatesh S.Pasupathy S.P.Raja Department of Computer Science and Engineering Annamalai UniversityChidambaram608002India School of Computer Science and Engineering Vellore Institute of TechnologyVellore632014India
The evolution of bone marrow morphology is necessary in Acute Mye-loid Leukemia(AML)*** takes an enormous number of times to ana-lyze with the standardization and inter-observer ***,we proposed a novel AML detection m... 详细信息
来源: 评论
An Artificial Neural Network-Based Model for Effective Software Development Effort Estimation
收藏 引用
computer Systems science & Engineering 2023年 第2期44卷 1309-1324页
作者: Junaid Rashid Sumera Kanwal Muhammad Wasif Nisar Jungeun Kim Amir Hussain Department of Computer Science and Engineering Kongju National UniversityCheonan31080Korea Department of Computer Science COMSATS University IslamabadWah CampusIslamabad47040Pakistan Centre of AI and Data Science Edinburgh Napier UniversityEdinburghEH114DYUK
In project management,effective cost estimation is one of the most cru-cial activities to efficiently manage resources by predicting the required cost to fulfill a given ***,finding the best estimation results in softwar... 详细信息
来源: 评论
Diversified deep hierarchical kernel ensemble regression
收藏 引用
Multimedia Tools and Applications 2025年 第15期84卷 15553-15573页
作者: Liu, Zhifeng Xu, Zhengqin Ebhohimhen Abhadiomhen, Stanley Qian, Xiaoqin Shen, Xiang-Jun School of Computer Science and Communication Engineering JiangSu University Zhenjiang212013 China Department of Computer Science University of Nigeria Nsukka410105 Nigeria Department of Ultrasound Affiliated People’s Hospital of Jiangsu University Zhenjiang212002 China
Deep ensemble learning models that combine multiple independent deep learning models with multi-layer processing architectures have proven to be effective techniques for improving the accuracy and robustness of deep l... 详细信息
来源: 评论
Chili Plant Health Status Classification Using Random Forest  4
Chili Plant Health Status Classification Using Random Forest
收藏 引用
4th International Conference on Artificial Intelligence and data sciences, AiDAS 2023
作者: Tan, Julius Sutanto, Bryant Christoper Marvelim, Darren Pratama, Galih Dea Hasana, Silviya School of Computer Science Bina Nusantara University Computer Science Department Jakarta Indonesia School of Computer Science Bina Nusantara University Department of Computer Science Jakarta Indonesia
There are numerous agricultural products in the world, and chili is among the most important ones due to its role in adding spice to food, particularly in Indonesia. Consequently, diseases affecting chili plants can l... 详细信息
来源: 评论
Meta Auxiliary Learning for Top-K Recommendation
收藏 引用
IEEE Transactions on Knowledge and data Engineering 2023年 第10期35卷 10857-10870页
作者: Li, Ximing Ma, Chen Li, Guozheng Xu, Peng Liu, Chi Harold Yuan, Ye Wang, Guoren Beijing Institute of Technology School of Computer Science and Technology Beijing100811 China City University of Hong Kong Department of Computer Science Hong Kong
Recommender systems are playing a significant role in modern society to alleviate the information/choice overload problem, since Internet users may feel hard to identify the most favorite items or products from millio... 详细信息
来源: 评论
A Tutorial on Federated Learning from Theory to Practice:Foundations,Software Frameworks,Exemplary Use Cases,and Selected Trends
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第4期11卷 824-850页
作者: M.Victoria Luzón Nuria Rodríguez-Barroso Alberto Argente-Garrido Daniel Jiménez-López Jose M.Moyano Javier Del Ser Weiping Ding Francisco Herrera Department of Software Engineering Andalusian Research Institute in Data Science and Computational Intelligence(DaSCI)University of GranadaGranada 18071Spain Department of Computer Science and Artificial Intelligence Andalusian Research Institute in Data Science and Computational Intelligence(DaSCI)University of GranadaGranada 18071Spain Department of Communications Engineering University of the Basque Country(UPV/EHU)and also with TECNALIABasque Research&Technology Alliance(BRTA)Spain School of Information Science and Technology Nantong UniversityNantong 226019China
When data privacy is imposed as a necessity,Federated learning(FL)emerges as a relevant artificial intelligence field for developing machine learning(ML)models in a distributed and decentralized *** allows ML models t... 详细信息
来源: 评论
Business Email Compromise: A Comprehensive Taxonomy for Detection and Prevention  24
Business Email Compromise: A Comprehensive Taxonomy for Dete...
收藏 引用
7th International Conference on Information science and Systems, ICISS 2024
作者: Almutairi, Amirah M. Kang, Boojoong AL Hashimy, Nawfal School of Electronics and Computer Science University of Southampton United Kingdom Department of Computer Science Shaqra University Saudi Arabia
Business Email Compromise (BEC) is a sophisticated and increasingly prevalent form of cyber fraud that targets businesses and individuals to gain financial benefits and access sensitive data. BEC fraud involves variou... 详细信息
来源: 评论