咨询与建议

限定检索结果

文献类型

  • 9,075 篇 会议
  • 6,742 篇 期刊文献
  • 155 册 图书

馆藏范围

  • 15,972 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,903 篇 工学
    • 5,250 篇 计算机科学与技术...
    • 4,063 篇 软件工程
    • 1,704 篇 信息与通信工程
    • 1,405 篇 电子科学与技术(可...
    • 1,268 篇 电气工程
    • 1,155 篇 控制科学与工程
    • 1,038 篇 光学工程
    • 850 篇 生物工程
    • 807 篇 生物医学工程(可授...
    • 663 篇 化学工程与技术
    • 657 篇 材料科学与工程(可...
    • 501 篇 仪器科学与技术
    • 490 篇 机械工程
    • 471 篇 动力工程及工程热...
    • 254 篇 网络空间安全
  • 6,351 篇 理学
    • 3,030 篇 物理学
    • 2,578 篇 数学
    • 1,082 篇 生物学
    • 854 篇 化学
    • 852 篇 统计学(可授理学、...
    • 456 篇 系统科学
    • 291 篇 地球物理学
  • 1,977 篇 管理学
    • 1,207 篇 管理科学与工程(可...
    • 833 篇 图书情报与档案管...
    • 623 篇 工商管理
  • 865 篇 医学
    • 705 篇 临床医学
    • 603 篇 基础医学(可授医学...
    • 373 篇 药学(可授医学、理...
    • 330 篇 公共卫生与预防医...
  • 394 篇 法学
    • 348 篇 社会学
  • 252 篇 经济学
  • 226 篇 农学
  • 146 篇 教育学
  • 52 篇 文学
  • 31 篇 军事学
  • 26 篇 艺术学
  • 10 篇 哲学
  • 5 篇 历史学

主题

  • 646 篇 computer science
  • 273 篇 deep learning
  • 266 篇 computational mo...
  • 222 篇 accuracy
  • 220 篇 feature extracti...
  • 214 篇 educational inst...
  • 200 篇 machine learning
  • 185 篇 internet of thin...
  • 177 篇 support vector m...
  • 167 篇 application soft...
  • 162 篇 computer archite...
  • 156 篇 data mining
  • 141 篇 neural networks
  • 141 篇 optimization
  • 137 篇 predictive model...
  • 132 篇 artificial intel...
  • 130 篇 bandwidth
  • 117 篇 routing
  • 117 篇 real-time system...
  • 115 篇 throughput

机构

  • 348 篇 department of ph...
  • 245 篇 department of ph...
  • 244 篇 faculty of scien...
  • 240 篇 department for p...
  • 233 篇 west university ...
  • 232 篇 department of mo...
  • 230 篇 department of ph...
  • 229 篇 infn e laborator...
  • 220 篇 department of ph...
  • 218 篇 department of el...
  • 202 篇 cavendish labora...
  • 197 篇 research center ...
  • 193 篇 kirchhoff-instit...
  • 174 篇 oliver lodge lab...
  • 162 篇 physikalisches i...
  • 161 篇 fakultät für phy...
  • 154 篇 department physi...
  • 152 篇 infn sezione di ...
  • 150 篇 graduate school ...
  • 138 篇 institute of phy...

作者

  • 169 篇 c. alexa
  • 169 篇 g. bella
  • 169 篇 d. calvet
  • 169 篇 c. amelung
  • 168 篇 y. tayalati
  • 168 篇 v. chiarella
  • 168 篇 f. siegert
  • 167 篇 j. strandberg
  • 167 篇 n. orlando
  • 167 篇 g. spigo
  • 166 篇 j. m. izen
  • 164 篇 a. dimitrievska
  • 162 篇 f. deliot
  • 159 篇 r. ströhmer
  • 156 篇 m. rijssenbeek
  • 154 篇 y. tu
  • 153 篇 s. jin
  • 152 篇 g. gaudio
  • 149 篇 y. abulaiti
  • 147 篇 s. mohapatra

语言

  • 13,414 篇 英文
  • 2,439 篇 其他
  • 137 篇 中文
  • 11 篇 日文
  • 6 篇 法文
  • 5 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Institute for Advanced Computer Studies"
15972 条 记 录,以下是641-650 订阅
排序:
Metagenomic Face: Applying Machine Learning to Facial Microbiome Data for Pattern Recognition and Disease Classification  4
Metagenomic Face: Applying Machine Learning to Facial Microb...
收藏 引用
4th International Conference on Intelligent Technologies, CONIT 2024
作者: Guru Prasad, M.S. Devadas, Raghavendra M Hiremani, Vani Jahan, Afsar Praveen Gujjar, J. Dahiya, Aryan Department of Computer Science and Engg Dehradun India Manipal Institute of Technology Department of Information Technology Bengaluru India Manipal Academy of Higher Education Manipal India University Pune India Department of Computer Applications Dehradun India Faculty of Management Studies Bengaluru India
This innovative study utilizes machine learning techniques to analyze facial microbiome data, drawing inspiration from the metaphorical representation of microbial information through facial features. Leveraging the O... 详细信息
来源: 评论
RFECV-DT: Recursive Feature Selection with Cross Validation using Decision Tree based Android Malware Detection
RFECV-DT: Recursive Feature Selection with Cross Validation ...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Naimisha Awasthi Prateek Raj Gautam Anuj Kumar Sharma Department of Computer Science and Engineering Centre for Advanced Studies AKTU Lucknow India School of Computer Science UPES Dehradun India Department of Mechatronics Centre For Advanced Studies AKTU Lucknow India
The internet is extremely valuable, but it is also vulnerable to assault. Malware is a persistent and dynamic danger. Malware assaults entail introducing malicious code into software. The task was handled using a vari... 详细信息
来源: 评论
MPEC: Manifold-Preserved EEG Classification via an Ensemble of Clustering-Based Classifiers
MPEC: Manifold-Preserved EEG Classification via an Ensemble ...
收藏 引用
International CSI computer Conference, CSICC
作者: Shermin Shahbazi Mohammad–Reza Nasiri Majid Ramezani Department of Electrical and Computer Engineering University of Zanjan Zanjan Iran Department of Computer Science and Information Technology Institute for Advanced Studies in Basic Sciences (IASBS) Zanjan Iran
Accurate classification of EEG signals is crucial for brain-computer interfaces (BCls) and neuroprosthetic applications, yet many existing methods fail to account for the non-Euclidean, manifold structure of EEG data,... 详细信息
来源: 评论
Beyond Deterrence: A Systematic Review of the Role of Autonomous Motivation in Organizational Security Behavior studies  25
Beyond Deterrence: A Systematic Review of the Role of Autono...
收藏 引用
2025 CHI Conference on Human Factors in Computing Systems, CHI 2025
作者: Chen, Xiaowei Schöni, Lorin Distler, Verena Zimmermann, Verena Institute for Advanced Studies University of Luxembourg Esch-sur-Alzette Luxembourg Security Privacy & Society ETH Zurich Zurich Switzerland Department of Computer Science Aalto University Espoo Finland Department of Humanities Social and Political Sciences ETH Zürich Zürich Switzerland
What drives employees to ensure security when handling information assets in organizations? There is growing interest from the security behavior community in how autonomous motivators shape employees' security-rel... 详细信息
来源: 评论
Enhanced Bayesian Optimized Support Vector Machine (BO-SVM) Classification and Prediction of Heart Disease
Enhanced Bayesian Optimized Support Vector Machine (BO-SVM) ...
收藏 引用
Sentiment Analysis and Deep Learning (ICSADL), International Conference on
作者: P. Chairmadurai P. Kavitha S. Kamalakkannan Department of Computer Science School of Computing Sciences Vels Institute of Science Technology & Advanced Studies (VISTAS) Pallavaram Chennai India Department of Computer Applications School of Computing Sciences Vels Institute of Science Technology & Advanced Studies (VISTAS) Pallavaram Chennai India Department of Information Technology School of Computing Sciences Vels Institute of Science Technology & Advanced Studies (VISTAS) Pallavaram Chennai India
Medical data analysis is increasingly used to plan, improve research techniques, and explain diagnoses. The allocation of medical resources is based on the prevalence of specific pathologies. Artificial intelligence (... 详细信息
来源: 评论
Enhancing Video Anomaly Detection Using Spatio-Temporal Autoencoders and Convolutional LSTM Networks
收藏 引用
SN computer science 2024年 第1期5卷 190页
作者: Almahadin, Ghayth Subburaj, Maheswari Hiari, Mohammad Sathasivam Singaram, Saranya Kolla, Bhanu Prakash Dadheech, Pankaj Vibhute, Amol D. Sengan, Sudhakar Department of Networks and Cybersecurity Faculty of Information Technology Al Ahliyya Amman University Country Amman Jordan School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai 600127 India Department of Networks and Cybersecurity Information Technology Al Ahliyya Amman University Amman Jordan Department Computing Technology School of Computing SRM Institute of Science and Technology Kattankulathur Campus Tamil Nadu Chennai 603203 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Guntur 522302 India Department of Computer Science and Engineering Swami Keshvanand Institute of Technology Management and Gramothan (SKIT) Rajasthan Jaipur 302017 India Symbiosis Institute of Computer Studies and Research (SICSR) Symbiosis International (Deemed University) MH Pune 411016 India Department of Computer Science and Engineering PSN College of Engineering and Technology Tamil Nadu Tirunelveli 627152 India
Identifying suspicious activities or behaviors is essential in the domain of Anomaly Detection (AD). In crowded scenes, the presence of inter-object occlusions often complicates the detection of such behaviors. Theref... 详细信息
来源: 评论
Deep Learning Crime Monitoring and Alerting System using Hybrid Feature Engineering technique with IoT Technology
Deep Learning Crime Monitoring and Alerting System using Hyb...
收藏 引用
Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE), International Conference on
作者: S. Arul. P. Kavitha S. Kamalakkannan Department of Computer Science School of Computing Sciences Vels Institute of Science Technology & Advanced Studies (VISTAS) Pallavaram Chennai India Department of Computer Applications School of Computing Sciences Vels Institute of Science Technology & Advanced Studies (VISTAS) Pallavaram Chennai India Department of Information Technology School of Computing Sciences Vels Institute of Science Technology & Advanced Studies (VISTAS) Pallavaram Chennai India
This paper presents a Deep Learning-based Crime Monitoring and Alerting System that integrates IoT technology with a Hybrid Feature Engineering technique using Vision Transformer and Bidirectional Gated Recurrent Unit... 详细信息
来源: 评论
Weighting Heart Disease Criteria Using Multi-Criteria Decision-Making
Weighting Heart Disease Criteria Using Multi-Criteria Decisi...
收藏 引用
2023 Al-Sadiq International Conference on Communication and Information Technology, AICCIT 2023
作者: Muhammed, Saleh Mahdi Abdul-Majeed, Ghassan Mahmoud, Mahmoud Shuker Informatics Institute for Postgraduate Studies Iraqi Commission for Computers and Informatics Department of Computer Science Baghdad Iraq University of Baghdad College of Engineering Department of Computer Science Baghdad Iraq Al-Mansour University College Department of Communications Baghdad Iraq
Heart disease describes a group of conditions that affect the heart and there are many different factors including lifestyle, medical history, family history, and so on that may cause this complex disease. It is there... 详细信息
来源: 评论
Improving Alpha-Beta Pruning Efficiency in Chess Engines  2
Improving Alpha-Beta Pruning Efficiency in Chess Engines
收藏 引用
2nd International Conference on IT Innovations and Knowledge Discovery, ITIKD 2024
作者: Nair, Rekha R Babu, Tina Kishore, S. Pavithra, K. Sumana, S.G. Alliance School of Advanced Computing Alliance University Department of Computer Science and Engineering Bengaluru India Nitte Institute of Professional Education Nitte (Deemed to Be University Department of Computer Applications Mangalore India Dayananda Sagar University Department of Computer Applications Bengaluru India
Alpha-Beta Pruning is a critical optimization technique in chess engines, helping them make fast, accurate decisions by reducing unnecessary calculations. This paper focuses on enhancing its efficiency to improve sear... 详细信息
来源: 评论
Abnormal Mutations Evolution Strategies Don’t Require Gaussianity
arXiv
收藏 引用
arXiv 2025年
作者: de Nobel, Jacob Vermetten, Diederick Wang, Hao Kononova, Anna V. Rudolph, Günter Bäck, Thomas Leiden Institute for Advanced Computer Science Leiden Netherlands TU Dortmund University Department of Computer Science Dortmund Germany
The mutation process in evolution strategies has been interlinked with the normal distribution since its inception. Many lines of reasoning have been given for this strong dependency, ranging from maximum entropy argu... 详细信息
来源: 评论