咨询与建议

限定检索结果

文献类型

  • 10,606 篇 期刊文献
  • 9,935 篇 会议
  • 75 册 图书
  • 2 篇 专利

馆藏范围

  • 20,618 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,775 篇 工学
    • 9,394 篇 计算机科学与技术...
    • 7,894 篇 软件工程
    • 2,825 篇 信息与通信工程
    • 1,945 篇 生物工程
    • 1,566 篇 控制科学与工程
    • 1,343 篇 电气工程
    • 1,309 篇 生物医学工程(可授...
    • 1,063 篇 光学工程
    • 935 篇 电子科学与技术(可...
    • 683 篇 机械工程
    • 675 篇 化学工程与技术
    • 451 篇 动力工程及工程热...
    • 432 篇 安全科学与工程
    • 417 篇 交通运输工程
    • 406 篇 仪器科学与技术
    • 403 篇 网络空间安全
  • 7,657 篇 理学
    • 3,729 篇 数学
    • 2,308 篇 生物学
    • 2,047 篇 物理学
    • 1,440 篇 统计学(可授理学、...
    • 798 篇 化学
    • 652 篇 系统科学
  • 3,691 篇 管理学
    • 1,962 篇 管理科学与工程(可...
    • 1,871 篇 图书情报与档案管...
    • 1,009 篇 工商管理
  • 1,476 篇 医学
    • 1,194 篇 临床医学
    • 1,015 篇 基础医学(可授医学...
    • 553 篇 公共卫生与预防医...
    • 550 篇 药学(可授医学、理...
  • 649 篇 法学
    • 549 篇 社会学
  • 377 篇 经济学
  • 312 篇 教育学
  • 299 篇 农学
  • 62 篇 文学
  • 32 篇 军事学
  • 24 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 597 篇 deep learning
  • 424 篇 feature extracti...
  • 383 篇 semantics
  • 363 篇 machine learning
  • 358 篇 training
  • 345 篇 accuracy
  • 337 篇 computational mo...
  • 261 篇 predictive model...
  • 221 篇 data mining
  • 212 篇 reinforcement le...
  • 210 篇 internet of thin...
  • 199 篇 neural networks
  • 199 篇 optimization
  • 195 篇 task analysis
  • 187 篇 data models
  • 184 篇 image segmentati...
  • 172 篇 real-time system...
  • 165 篇 support vector m...
  • 162 篇 convolution
  • 150 篇 computer science

机构

  • 820 篇 school of data a...
  • 427 篇 department of ph...
  • 397 篇 iccub universita...
  • 313 篇 horia hulubei na...
  • 312 篇 university of ch...
  • 308 篇 h.h. wills physi...
  • 293 篇 nikhef national ...
  • 291 篇 imperial college...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 institute of par...
  • 283 篇 school of physic...
  • 280 篇 henryk niewodnic...

作者

  • 247 篇 barter w.
  • 241 篇 beiter a.
  • 227 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 198 篇 blake t.
  • 197 篇 brundu d.
  • 176 篇 borsato m.
  • 169 篇 betancourt c.
  • 156 篇 baker s.
  • 147 篇 niyato dusit
  • 146 篇 boettcher t.
  • 146 篇 albrecht j.
  • 145 篇 bediaga i.
  • 145 篇 amato s.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 16,926 篇 英文
  • 3,573 篇 其他
  • 158 篇 中文
  • 7 篇 日文
  • 4 篇 德文
  • 4 篇 法文
  • 4 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Data Science Program School of Computer Science"
20618 条 记 录,以下是581-590 订阅
排序:
Analysis of the 5Rs in Thailand Medication Error Classification through Natural Language Processing  20
Analysis of the 5Rs in Thailand Medication Error Classificat...
收藏 引用
20th International Joint Conference on computer science and Software Engineering, JCSSE 2023
作者: Udomnuchaisup, Peachyasitt Imsombut, Aurawan Suwannahitatorn, Picha Saethang, Thammakorn Kasetsart University Biomedical Data Science Master's Program Faculty of Science Bangkok Thailand Kasetsart University Faculty of Science Department of Computer Science Bangkok Thailand Bangkok Thailand
Medication errors threaten patient safety considerably, underscoring the necessity for enhanced detection and prevention techniques. A prevalent classification system in hospitals relies on the standard practice of me... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
A Reduced State-Space Generation Method for Concurrent Systems Based on CPN-PR Model
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年 第6期44卷 2328-2342页
作者: Zhong, Wenjie Sun, Tao Zhou, Jian-Tao Wang, Zhuowei Song, Xiaoyu Inner Mongolia University College of Computer Science the Engineering Research Center of Ecological Big Data Ministry of Education the Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software the Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot010000 China Guangdong University of Technology School of Computer Science and Technology Guangzhou510006 China Portland State University Department of Electrical and Computer Engineering PortlandOR97207 United States
Colored Petri nets (CPNs) provide descriptions of the concurrent behaviors for software and hardware. Model checking based on CPNs is an effective method to simulate and verify the concurrent behavior in system design... 详细信息
来源: 评论
Supply Chain Management Using Internet of Things and Blockchain for Smart Meat Packaging  5
Supply Chain Management Using Internet of Things and Blockch...
收藏 引用
5th International Conference on data Intelligence and Cognitive Informatics, ICDICI 2024
作者: Kour, Kanwal Preet Singh, S. Kanwal Deep Bali, Malvinder Singh Ghantasala, G. S. Pradeep Rajesh Sharma, R. Ananthanagu, U. Manipal University School of Computer Science and Engineering Jaipur India Federation University Department of Computer Science Australia Manipal University Department of Data Science and Engineering Rajasthan Jaipur India Alliance College of Engineering and Design Alliance University Department of Computer Science and Engineering Bengaluru India
In recent times, blockchain has evolved the security of traditional supply chain systems. Different issues of supply chain management like flexibility and reliability can be easily addressed using blockchain. Meat Pac... 详细信息
来源: 评论
Enhanced Identification of Care Preference Documentation in Patients’ Discharge Summaries Using Pre-trained Large Language Models  1
Enhanced Identification of Care Preference Documentation in ...
收藏 引用
1st IEEE International Conference on Artificial Intelligence for Medicine, Health and Care, AIMHC 2024
作者: Arora, Saksham Khayal, Inas S. Department of Computer Science Dartmouth College HanoverNH United States Dartmouth Institute & Biomedical Data Science Geisel School of Medicine at Dartmouth Dept. of Computer Science Dartmouth College HanoverNH United States
Improving patient-centered care necessitates accurate documentation of care preferences, a crucial aspect often underrepresented in administrative data. Most studies apply care documentation to specific patient popula... 详细信息
来源: 评论
Virtual Reality Experiment for 5G Service Convergence Course in Communication Engineering  3
Virtual Reality Experiment for 5G Service Convergence Course...
收藏 引用
3rd International Conference on Educational Technology, ICET 2023
作者: Liu, Dandan Meng, Xin Hu, Shengbo Guizhou Normal University School of Big Data and Computer Science Guiyang Guizhou China
Virtual Reality (VR) technology is a computer simulation system that allows the creation and experience of virtual worlds. Because of its immersive, interactive, and realistic characteristics, VR is increasingly usefu... 详细信息
来源: 评论
Development of Sundanese Stemmer Based on Morphophonemics  10
Development of Sundanese Stemmer Based on Morphophonemics
收藏 引用
10th International Conference on ICT for Smart Society, ICISS 2023
作者: Maesya, Aries Arifin, Yulyani Zahra, Amalia Budiharto, Widodo BINUS Graduate Program-Doctor of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia School of Computer Science Binus Nusantara University Computer Science Department Jakarta11480 Indonesia
The Stemming Process is used to get the base word by removing the word affixes. The purpose of this study is to improve the algorithm in previous research by incorporating the Stemming Process into a morphophonemic ap... 详细信息
来源: 评论
Predicting Stock Market Movements Using Long Short-Term Memory (LSTM)  4
Predicting Stock Market Movements Using Long Short-Term Memo...
收藏 引用
4th International Conference on Artificial Intelligence and data sciences, AiDAS 2023
作者: Fauzan, Achmad Susananggreainy, Maria Nathaniel, Nicholas Kurniawan, Afdhal School of Computer Science Bina Nusantara University Computer Science Department Jakarta11480 Indonesia Bina Nusantara University Binus Graduate Program Doctor of Computer Science Computer Science Department Jakarta11480 Indonesia
This paper explores using artificial intelligence (AI) to predict stock market movements and build optimal portfolios. The research methodology involves using LSTM networks to predict stock performance. The study aims... 详细信息
来源: 评论
Estimation of Neurological Diseases and Age Using Brain MRI  4th
Estimation of Neurological Diseases and Age Using Brain MRI
收藏 引用
4th International Conference on Smart Systems: Innovations in Computing, SSIC 2023
作者: Ashokkumar, K. Dharshan, K. Ragupathi, T. Pritam, Anem Sagar, Amujuru Gnana Department of Computer Science Engineering Sathyabama Institute of Science and Technology Chennai India School of Computing and Mathematical Sciences University of Leicester Leicester United Kingdom Data Science and Business systems School of Computing SRM Institute of Science and Science and Technology Kattankulathur Chennai India
Leveraging D-NN trained on neuroimaging data, we can effectively estimate the chronological ages of normal persons;this projected brain age has potential as a biomarker for identifying age-related disorders. The sugge... 详细信息
来源: 评论
A benchmark for visual analysis of insider threat detection
收藏 引用
science China(Information sciences) 2022年 第9期65卷 294-296页
作者: Ying ZHAO Kui YANG Siming CHEN Zhuo ZHANG Xin HUANG Qiusheng LI Qi MA Xinyue LUAN Xiaoping FAN School of Computer Science and Engineering Central South University School of Data Science Fudan University Qi An Xin Group School of Information Technology and Management Hunan University of Finance and Economics
Dear editor,Malicious insiders are trusted entities that are given the power to violate rules in a given security policy, and insider threats occur when trusted entities abuse such a power. In modern networked work en... 详细信息
来源: 评论