咨询与建议

限定检索结果

文献类型

  • 406 篇 会议
  • 325 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 735 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 477 篇 工学
    • 358 篇 计算机科学与技术...
    • 302 篇 软件工程
    • 120 篇 信息与通信工程
    • 77 篇 电气工程
    • 74 篇 控制科学与工程
    • 71 篇 生物工程
    • 48 篇 生物医学工程(可授...
    • 37 篇 电子科学与技术(可...
    • 32 篇 光学工程
    • 29 篇 网络空间安全
    • 26 篇 交通运输工程
    • 25 篇 化学工程与技术
    • 23 篇 仪器科学与技术
    • 22 篇 机械工程
    • 22 篇 动力工程及工程热...
    • 22 篇 土木工程
    • 22 篇 安全科学与工程
    • 21 篇 建筑学
  • 284 篇 理学
    • 144 篇 数学
    • 74 篇 物理学
    • 74 篇 生物学
    • 39 篇 统计学(可授理学、...
    • 27 篇 系统科学
    • 26 篇 化学
    • 22 篇 地球物理学
  • 112 篇 管理学
    • 60 篇 图书情报与档案管...
    • 54 篇 管理科学与工程(可...
  • 44 篇 医学
    • 36 篇 临床医学
    • 32 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 20 篇 法学
  • 12 篇 农学
  • 10 篇 教育学
  • 7 篇 经济学
  • 7 篇 军事学
  • 6 篇 艺术学
  • 1 篇 文学

主题

  • 40 篇 accuracy
  • 29 篇 deep learning
  • 27 篇 machine learning
  • 26 篇 convolutional ne...
  • 22 篇 internet of thin...
  • 22 篇 feature extracti...
  • 21 篇 real-time system...
  • 18 篇 training
  • 17 篇 computational mo...
  • 17 篇 artificial intel...
  • 16 篇 predictive model...
  • 15 篇 data models
  • 13 篇 support vector m...
  • 13 篇 authentication
  • 11 篇 genetic algorith...
  • 11 篇 prediction algor...
  • 10 篇 optimization
  • 10 篇 data mining
  • 10 篇 technological in...
  • 9 篇 global optimizat...

机构

  • 50 篇 fujian provincia...
  • 32 篇 college of compu...
  • 21 篇 department of da...
  • 19 篇 school of comput...
  • 19 篇 fujian provincia...
  • 16 篇 beijing engineer...
  • 13 篇 institute of cos...
  • 12 篇 national demonst...
  • 12 篇 data science and...
  • 11 篇 fujian provincia...
  • 10 篇 department of ph...
  • 10 篇 school of mathem...
  • 10 篇 fermi national a...
  • 10 篇 department of ph...
  • 10 篇 school of comput...
  • 10 篇 madrid
  • 10 篇 center for cosmo...
  • 10 篇 department of ph...
  • 10 篇 college of compu...
  • 9 篇 national center ...

作者

  • 37 篇 pan jeng-shyang
  • 18 篇 wu tsu-yang
  • 16 篇 nguyen trong-the
  • 16 篇 chen chien-ming
  • 15 篇 chu shu-chuan
  • 12 篇 huerta e.a.
  • 12 篇 dao thi-kien
  • 11 篇 seth pratinav
  • 11 篇 zhang jing
  • 11 篇 ning huansheng
  • 10 篇 smith m.
  • 10 篇 sanchez e.
  • 10 篇 carretero j.
  • 10 篇 mao qirong
  • 9 篇 miquel r.
  • 9 篇 xue xingsi
  • 9 篇 gruendl r.a.
  • 9 篇 tarle g.
  • 9 篇 tian shuangliang
  • 9 篇 gruen d.

语言

  • 573 篇 英文
  • 158 篇 其他
  • 9 篇 中文
检索条件"机构=Data Science and Computer Applications"
735 条 记 录,以下是261-270 订阅
排序:
False Positives and Deceptive Errors in Sql Assessment: A Large-Scale Analysis of Online Judge Systems
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Jinshui Chen, Shuguang Tang, Zhengyi Lin, Pengchen School of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fuzhou350118 China
Online Judge Systems (OJSs) are widely used in higher education to assess students’ SQL programming skills and provide feedback in computer education. However, OJSs may not accurately evaluate students’ queries due ... 详细信息
来源: 评论
Processing of ECG Signal Using Optimized Feature Selection for the Prediction of Irregular Heart Beat
Processing of ECG Signal Using Optimized Feature Selection f...
收藏 引用
International Conference on Circuit, Power and Computing Technologies (ICCPCT)
作者: K. Rema C.P. Maheswaran Department of Computer Applications Noorul Islam Centre for Higher Education Nagercoil Tamilnadu India Department of Artificial Intelligence and Data Science Sri Krishna College of Technology Coimbatore
The categorization of Electro Cardio Gram (ECG) trials into significant arrhythmia programs to identify abnormal heartbeats is presented in this study as an effective hybridized method. The most frequently used and re...
来源: 评论
Beyond Scaleup: Knowledge-aware Parsimony Learning from Deep Networks
arXiv
收藏 引用
arXiv 2024年
作者: Yao, Quanming Zhang, Yongqi Wang, Yaqing Yin, Nan Kwok, James Yang, Qiang Department of Electronic Engineering the Tsinghua University China Department of Data Science and Analytics Thrust the Hong Kong University of Science and Technology Guangzhou China Beijing Institute of Mathematical Sciences and Applications China Department of Computer Science and Engineering the Hong Kong University of Science and Technology Hong Kong
The brute-force scaleup of training datasets, learnable parameters and computation power, has become a prevalent strategy for developing more robust learning models. However, due to bottlenecks in data, computation, a... 详细信息
来源: 评论
Evaluating the Effectiveness of Object Detection Algorithms for Autonomous Parking
Evaluating the Effectiveness of Object Detection Algorithms ...
收藏 引用
computer, Electronics & Electrical Engineering & their applications (IC2E3), International Conference on
作者: Utkarsh Sharma Krishnan Subramonian Aaron Dsouza Sughosh P Savitha G Girisha S Department of Data Science and Computer Applications Manipal Institute of Technology Manipal Academy of Higher Education Manipal India Department of Civil Engineering Manipal Institute of Technology Manipal Academy of Higher Education Manipal India
In response to the challenges posed by increasing urbanization, traditional parking systems face numerous issues, such as inaccurate slot detection and manual tracking, which exacerbate traffic congestion and environm... 详细信息
来源: 评论
Graph Embedding of Chronic Myeloid Leukaemia K562 Cells Gene Network Reveals a Hyperbolic Latent Geometry  8th
Graph Embedding of Chronic Myeloid Leukaemia K562 Cells Gen...
收藏 引用
8th International Congress on Information and Communication Technology, ICICT 2023
作者: Lecca, Paola Re, Angela Lombardi, Giulia Latorre, Roberta Valeria Sorio, Claudio Faculty of Computer Science Smart Data Factory Laboratory Free University of Bozen-Bolzano Bolzano Italy Member of National Group for Mathematical Analysis Probability and their Applications Francesco Severi’ National Institute of High Mathematics Rome Italy Department of Applied Science and Technology Politecnico di Torino Turin Italy Department of Mathematics University of Trento Trento Italy Department of Medicine University of Verona Verona Italy
Recent research emphasises the significance of identifying the latent geometry—also known as the geometry underlying a complex network—which is determined by the manifold class, curvature, and dimension. Geometry’s... 详细信息
来源: 评论
Lateralizing Seizure Onset Zone Through Interictal Sleep Scalp EEG High-Frequency Oscillations
Lateralizing Seizure Onset Zone Through Interictal Sleep Sca...
收藏 引用
International Joint Conference on computer science and Software Engineering (JCSSE)
作者: Dhruva P Achar Karunakar A Kotegar Kurupath Radhakrishnan Dept. of Data Science and Computer Applications Manipal Institute of Technology Manipal Academy of Higher Education Manipal Karnataka India Department of Neurosciences AVITIS Institute of Medical Sciences Nemmara Palakkad Kerala India
Epilepsy, a neurological disorder impacting an estimated 50 million people globally, sees about 30% of patients developing drug-resistant epilepsy (DRE). For these patients, surgery emerges as a more promising option ... 详细信息
来源: 评论
A Dynamic Parallel Harris Hawks Optimization Based WSN Node Localization Algorithm
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2021年 第4期6卷 688-703页
作者: He, Xiankang Chu, Shu-Chuan Liu, Shi-Jian Pan, Jeng-Shyang Yan, Lijun College of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Shenzhen Institute of Information Technology Shenzhen518000 China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China College of Science and Engineering Flinders University Adelaide Australia Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fuzhou350118 China
The localization of wireless sensor network (WSN) is an increasingly promi-nent problem. The goal of this problem is to use the anchor nodes in WSN to esti-mate the geographical location of the unknown nodes. This pap... 详细信息
来源: 评论
Grey Wolf Optimizer with Deep Learning based Short Term Traffic Forecasting in Smart City Environment  5
Grey Wolf Optimizer with Deep Learning based Short Term Traf...
收藏 引用
5th International Conference on Smart Systems and Inventive Technology, ICSSIT 2023
作者: Jegadeesan, R. Rapaka, E. Vijayakrishna Himabindu, K. Behera, Nihar Ranjan Shukla, Arvind Kumar Dangi, Arvind Kumar Jyothishmathi Institute of Technology and Science Karimnagar India Data Science Indian Institute of Technology Madras Tamilnadu Chennai India Kl University Department of Csa Andhrapradesh Guntur India Swiss School of Business and Management Geneva Av. des Morgines 12 Petit-Lancy1213 Switzerland Iftm University Department of Computer Applications Uttar Pradesh Moradabad India Mriirs Haryana Faridabad India
Intelligent Transportation System (ITS) is one of the revolutionary technologies in smart cities that aids in minimizing traffic congestion and improving traffic quality. ITS provides real-time analysis and very effec... 详细信息
来源: 评论
Adversarial-Inspired Backdoor Defense via Bridging Backdoor and Adversarial Attacks  39
Adversarial-Inspired Backdoor Defense via Bridging Backdoor ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Yin, Jia-Li Wang, Weijian Lyhwa Lin, Wei Liu, Ximeng Fujian Province Key Laboratory of Information Security and Network Systems Fuzhou350108 China College of Computer and Data Science Fuzhou University Fuzhou350118 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fuzhou350118 China College of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Lion Rock Labs of Cyberspace Security CTIHE Hong Kong
Backdoor attacks and adversarial attacks are two major security threats to deep neural networks (DNNs), with the former one is a training-time data poisoning attack that aims to implant backdoor triggers into models b... 详细信息
来源: 评论
Cybersecurity Threat Detection using Machine Learning on Network Traffic
Cybersecurity Threat Detection using Machine Learning on Net...
收藏 引用
International Conference on ent Computing and Control Systems (ICICCS)
作者: R. Rithi N. Nithya A. Akila R. Saravanakumar M. Vargheese S. Jeya Lakshmi Master of Computer Applications Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Department of Computer Applications Karpagam Academy of Higher Education Coimbatore Tamil Nadu India Department of Artificial Intelligence and Data Science R.M.K College of Engineering and Technology Tamil Nadu India Iconix Software Solution Tirunelveli Tamil Nadu India Department of Computer Science and Engineering PSN College of Engineering and Technology Tirunelveli Tamil Nadu India
Web phishing is a prevalent online attack in which victims are tricked into revealing their personal information by visiting fraudulent websites. Phishers often use URL shortening tools to disguise malicious links, ma... 详细信息
来源: 评论