咨询与建议

限定检索结果

文献类型

  • 10,551 篇 期刊文献
  • 9,935 篇 会议
  • 75 册 图书
  • 2 篇 专利

馆藏范围

  • 20,563 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,789 篇 工学
    • 9,396 篇 计算机科学与技术...
    • 7,894 篇 软件工程
    • 2,827 篇 信息与通信工程
    • 1,945 篇 生物工程
    • 1,568 篇 控制科学与工程
    • 1,345 篇 电气工程
    • 1,309 篇 生物医学工程(可授...
    • 1,063 篇 光学工程
    • 936 篇 电子科学与技术(可...
    • 684 篇 机械工程
    • 674 篇 化学工程与技术
    • 451 篇 动力工程及工程热...
    • 432 篇 安全科学与工程
    • 417 篇 交通运输工程
    • 405 篇 仪器科学与技术
    • 403 篇 网络空间安全
  • 7,655 篇 理学
    • 3,738 篇 数学
    • 2,308 篇 生物学
    • 2,046 篇 物理学
    • 1,448 篇 统计学(可授理学、...
    • 798 篇 化学
    • 652 篇 系统科学
  • 3,693 篇 管理学
    • 1,962 篇 管理科学与工程(可...
    • 1,873 篇 图书情报与档案管...
    • 1,009 篇 工商管理
  • 1,469 篇 医学
    • 1,189 篇 临床医学
    • 1,011 篇 基础医学(可授医学...
    • 552 篇 公共卫生与预防医...
    • 550 篇 药学(可授医学、理...
  • 649 篇 法学
    • 549 篇 社会学
  • 376 篇 经济学
  • 313 篇 教育学
  • 299 篇 农学
  • 62 篇 文学
  • 32 篇 军事学
  • 23 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 596 篇 deep learning
  • 415 篇 feature extracti...
  • 376 篇 semantics
  • 369 篇 machine learning
  • 360 篇 training
  • 348 篇 accuracy
  • 338 篇 computational mo...
  • 258 篇 predictive model...
  • 219 篇 data mining
  • 212 篇 reinforcement le...
  • 209 篇 internet of thin...
  • 201 篇 optimization
  • 199 篇 neural networks
  • 195 篇 task analysis
  • 185 篇 data models
  • 184 篇 image segmentati...
  • 169 篇 real-time system...
  • 165 篇 support vector m...
  • 165 篇 convolution
  • 150 篇 computer science

机构

  • 828 篇 school of data a...
  • 427 篇 department of ph...
  • 397 篇 iccub universita...
  • 318 篇 horia hulubei na...
  • 313 篇 university of ch...
  • 306 篇 h.h. wills physi...
  • 293 篇 nikhef national ...
  • 291 篇 imperial college...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 van swinderen in...
  • 283 篇 school of physic...

作者

  • 246 篇 barter w.
  • 241 篇 beiter a.
  • 227 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 198 篇 blake t.
  • 197 篇 brundu d.
  • 176 篇 borsato m.
  • 167 篇 betancourt c.
  • 156 篇 baker s.
  • 148 篇 niyato dusit
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 145 篇 amato s.
  • 144 篇 bediaga i.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 16,871 篇 英文
  • 3,573 篇 其他
  • 158 篇 中文
  • 7 篇 日文
  • 4 篇 德文
  • 4 篇 法文
  • 4 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Data Science Program School of Computer Science"
20563 条 记 录,以下是4631-4640 订阅
排序:
Hybrid System with Modified Cuckoo Search to Design Airfoil
Hybrid System with Modified Cuckoo Search to Design Airfoil
收藏 引用
data science, Agents & Artificial Intelligence (ICDSAAI), International Conference on
作者: K. Thinakaran M. Anand T.Rajesh Kumar Saira Banu Atham K.M. Subramanian Department of Computer Science Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Data Science and Business Systems School of Computing SRM Institute of Science and Technology Kattankulathur Chennai Saveetha School of Engineering Saveetha Institute of Medical and Technical Science Department of Computer Science and Engineering School of CSE & IS Presidency University Bangaluru Department of Computer Science Engineering Shadan College of Engineering and Technology Hyderabad
The proposed models can design the airfoil by Cuckoo search with Levenberg-Marquardt. The Neural Network framework has impediments due to over-fitting. This paper proposed a modified cuckoo search. here the aerodynami...
来源: 评论
Total Nitrogen and Total Phosphorus Pollution Reshaped the Relationship Between Water Supply and Demand in the Huaihe River Watershed, China
收藏 引用
Chinese Geographical science 2023年 第3期33卷 512-530页
作者: LU Yan LIU Lyuyi QIN Fen WANG Jiayao LIU Jianzhong LI Yingjie WAN Luwen School of Geoscience and Technology Zhengzhou UniversityZhengzhou 450001China Henan Provincial Academy of Eco-Environmental Sciences Zhengzhou 450003China Laboratory of Geospatial Technology for the Middle and Lower Yellow River Regions Ministry of EducationHenan UniversityKaifeng 475000China Henan Industrial Technology Academy of Spatio-Temporal Big Data Henan UniversityKaifeng 475000China College of Geography and Environmental Science Henan UniversityKaifeng 475000China Environmental Science and Policy Program Michigan State UniversityEast LansingMI 48824USA
As total nitrogen(TN)and total phosphorus(TP)pollution is the main source of water pollution in the Huaihe River watershed in China,it is important to understand how TN and TP pollution affect the relationship between... 详细信息
来源: 评论
Self-training through Classifier Disagreement for Cross-Domain Opinion Target Extraction
arXiv
收藏 引用
arXiv 2023年
作者: Sun, Kai Zhang, Richong Mensah, Samuel Aletras, Nikolaos Mao, Yongyi Liu, Xudong Beijing Advanced Innovation Center for Big Data and Brain Computing School of Computer Science and Engineering Beihang University Beijing China Department of Computer Science University of Sheffield Sheffield United Kingdom School of Electrical Engineering and Computer Science University of Ottawa Ottawa Canada
Opinion target extraction (OTE) or aspect extraction (AE) is a fundamental task in opinion mining that aims to extract the targets (or aspects) on which opinions have been expressed. Recent work focus on cross-domain ... 详细信息
来源: 评论
Link/Switch Fault-Tolerant Hamiltonian Path Embedding in BCube Networks for Deadlock-Free Routing
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Lin, Wanling Li, Xiao-Yan Chang, Jou-Ming Xiang, Dong Jia, Xiaohua Fuzhou University College of Computer and Data Science Fuzhou350108 China National Taipei University of Business Institute of Information and Decision Sciences Taipei10051 Taiwan Tsinghua University School of Software Beijing100084 China City University of Hong Kong Department of Computer Science Hong Kong
BCube stands as a renowned server-centric data center network (DCN), boasting numerous advantages, such as low diameter, high aggregate throughput, and abundant parallel paths. As DCNs expand rapidly, followed by the ... 详细信息
来源: 评论
Pseudo Triplet Guided Few-shot Composed Image Retrieval
arXiv
收藏 引用
arXiv 2024年
作者: Hou, Bohan Lin, Haoqiang Wen, Haokun Liu, Meng Xu, Mingzhu Song, Xuemeng The Department of Computer Science and Technology Shandong University Qingdao China Shenzhen China The Department of Data Science City University of Hong Kong Hong Kong The Department of Computer Science Shandong Jianzhu University Jinan China The School of Software Shandong University Jinan China
Composed Image Retrieval (CIR) is a challenging task that aims to retrieve the target image with a multimodal query, i.e., a reference image, and its complementary modification text. As previous supervised or zero-sho... 详细信息
来源: 评论
Apache Kafka on Big data Event Streaming for Enhanced data Flows  8
Apache Kafka on Big Data Event Streaming for Enhanced Data F...
收藏 引用
8th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2024
作者: Padmanaban, K. Babu, T.R. Ganesh Karthika, K. Pattanaik, Balachandra Dhanabhavithra, K. Srinivasan, C. Department of Electronics and Communication Engineering Tamil Nadu Namakkal India Kcg College of Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India Wollega University Department of Electrical and Computer Engineering Nekemte Ethiopia Agni College of Technology Department of Artificial Intelligence and Data Science Tamil Nadu Chennai India Saveetha University Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Computer Science and Engineering Tamil Nadu Chennai India
Apache Kafka's distributed architecture and message queuing capabilities offer significant improvements in real-time and batch data processing efficiency and reliability. This research aims to optimize Kafka setup... 详细信息
来源: 评论
Recognition of data Breach Method from Story Using Advanced Deep Learning
Recognition of Data Breach Method from Story Using Advanced ...
收藏 引用
Innovation in Technology (INOCON), IEEE International Conference for
作者: Samiha Maisha Jeba Tanjim Taharat Aurpa Md Samiul Alom Md. Wadud Mahmud Joy Asm Shakil Ahamed Satya Ranjan Dash Md Shoaib Ahmed Dept. of Computer Science and Engineering International University of Business Agriculture and Technology Bangladesh Department of Data Science Bangabandhu Sheikh Mujibur Rahman Digital University Bangladesh School of Computer Applications KIIT University Odisha India Department of Computer Science Boise State University Boise Idaho USA
We often open our eyes in the morning with the appalling news of data breaches of different popular companies. This is a significant threat not only to giant companies but also to the general people’s privacy. Variou...
来源: 评论
Extended Kalman Filter Algorithm to Detect False data Injection in Wireless Sensor Network  2
Extended Kalman Filter Algorithm to Detect False Data Inject...
收藏 引用
2nd International Conference on Augmented Intelligence and Sustainable Systems, ICAISS 2023
作者: Babuji, R. Ganesan, J. Jeya Lekha, D. Karthikeyan, M. Kalai Selvi, D.M. Rmk Engineering College Department of Electronics and Communication Engineering Tamil Nadu Chennai India Sri Sairam Institute of Technology Department of Artificial Intelligence and Data Science Tamil Nadu Chennai India Rmk College of Engineering and Technology Department of Computer Science and Engineering Tamil Nadu Chennai India Srm Institute of Science and Technology School of Computing Faculty of Engineering and Technology Department of Computing Technologies Tamil Nadu Chennai India R.M.D. Engineering College Department of Computer Science and Engineering Tamil Nadu Chennai India
Wireless Sensor Networks (WSN) contains spatially distributed sensor nodes that collaborate with each other. However, the WSN is susceptible since the wireless medium is unpredictable. Several conventional approaches ... 详细信息
来源: 评论
Exploring Reinforcement Learning in Large-Scale data Processing  3
Exploring Reinforcement Learning in Large-Scale Data Process...
收藏 引用
3rd International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Bhambu, Pawan Kumar, Ritesh Sharmila, P. Patil, Vivek D. Khurana, Shivam Vivek, V. Vivekananda Global University Department of Computer Science & Engineering Jaipur India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Prince Shri Venkateshwara Padmavathy Engineering College Department of Science and Humanities Chennai127 India Vishwakarma Institute of Information Technology Department of Artificial Intelligence & Data Science Pune India Chitkara University Institute of Engineering and Technology Chitkara University Centre of Interdisciplinary Research in Business and Technology Punjab India Computer Science and Engineering Faculty of Engineering and Technology Karnataka Bangalore India
Reinforcement mastering (RL) is vital for big-scale fast processing. RL utilizes the availability of large datasets and dealers skilled in this information to remedy a wide variety of obligations, from automated diagn... 详细信息
来源: 评论
Privacy-Enhanced data Deduplication Computational Intelligence Technique for Secure Healthcare Applications
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 4169-4184页
作者: Jinsu Kim Sungwook Ryu Namje Park Department of Convergence Information Security Graduate SchoolJeju National University63294Korea Master’s Program in Future Strategy Korea Advanced Institute of Science and Technology34141Korea Department of Computer Education Teachers CollegeJeju National University63294Korea
A significant number of cloud storage environments are already implementing deduplication *** to the nature of the cloud environment,a storage server capable of accommodating large-capacity storage is *** storage capa... 详细信息
来源: 评论