咨询与建议

限定检索结果

文献类型

  • 6,259 篇 会议
  • 4,873 篇 期刊文献
  • 49 册 图书

馆藏范围

  • 11,181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,524 篇 工学
    • 4,219 篇 计算机科学与技术...
    • 3,352 篇 软件工程
    • 1,079 篇 信息与通信工程
    • 958 篇 生物工程
    • 933 篇 控制科学与工程
    • 836 篇 生物医学工程(可授...
    • 742 篇 电气工程
    • 677 篇 电子科学与技术(可...
    • 581 篇 光学工程
    • 510 篇 化学工程与技术
    • 430 篇 材料科学与工程(可...
    • 318 篇 机械工程
    • 318 篇 仪器科学与技术
    • 238 篇 动力工程及工程热...
  • 4,367 篇 理学
    • 1,594 篇 物理学
    • 1,574 篇 数学
    • 1,403 篇 生物学
    • 622 篇 统计学(可授理学、...
    • 596 篇 化学
    • 281 篇 系统科学
  • 1,642 篇 管理学
    • 859 篇 管理科学与工程(可...
    • 834 篇 图书情报与档案管...
    • 549 篇 工商管理
  • 1,048 篇 医学
    • 888 篇 临床医学
    • 682 篇 基础医学(可授医学...
    • 344 篇 药学(可授医学、理...
    • 251 篇 公共卫生与预防医...
  • 443 篇 教育学
    • 289 篇 教育学
    • 198 篇 心理学(可授教育学...
  • 394 篇 法学
    • 367 篇 社会学
  • 209 篇 农学
  • 176 篇 经济学
  • 64 篇 文学
  • 25 篇 哲学
  • 13 篇 艺术学
  • 12 篇 历史学
  • 10 篇 军事学

主题

  • 276 篇 computer science
  • 175 篇 deep learning
  • 158 篇 machine learning
  • 155 篇 semantics
  • 151 篇 computational mo...
  • 128 篇 accuracy
  • 122 篇 feature extracti...
  • 114 篇 artificial intel...
  • 114 篇 training
  • 111 篇 neural networks
  • 106 篇 visualization
  • 99 篇 support vector m...
  • 96 篇 students
  • 95 篇 cognitive scienc...
  • 91 篇 computer archite...
  • 87 篇 predictive model...
  • 82 篇 reinforcement le...
  • 80 篇 data mining
  • 79 篇 humans
  • 76 篇 decision making

机构

  • 159 篇 computer science...
  • 102 篇 department of co...
  • 100 篇 computer science...
  • 59 篇 moe key lab of a...
  • 51 篇 key laboratory o...
  • 46 篇 department of ph...
  • 46 篇 bioinformatics a...
  • 45 篇 school of comput...
  • 42 篇 computer science...
  • 41 篇 renewable and su...
  • 40 篇 centre for cogni...
  • 37 篇 department of el...
  • 30 篇 department of ph...
  • 29 篇 bioinformatics a...
  • 27 篇 computer science...
  • 27 篇 photonics initia...
  • 27 篇 photonics initia...
  • 26 篇 cognitive scienc...
  • 25 篇 school of physic...
  • 25 篇 computer science...

作者

  • 193 篇 zhao hai
  • 108 篇 bens pardamean
  • 99 篇 pardamean bens
  • 86 篇 zhang zhuosheng
  • 80 篇 gaol ford lumban
  • 59 篇 heryadi yaya
  • 57 篇 warnars harco le...
  • 43 篇 prabowo harjanto
  • 38 篇 andrea alù
  • 33 篇 ivan i. smalyukh
  • 33 篇 kersting kristia...
  • 31 篇 yaya heryadi
  • 29 篇 kono junichiro
  • 26 篇 anggreainy maria...
  • 26 篇 muhammad zarlis
  • 23 篇 yu kai
  • 22 篇 rahutomo reza
  • 22 篇 wang deliang
  • 21 篇 agung trisetyars...
  • 21 篇 hidayat alam ahm...

语言

  • 9,838 篇 英文
  • 1,279 篇 其他
  • 52 篇 中文
  • 6 篇 斯洛文尼亚文
  • 5 篇 日文
  • 4 篇 西班牙文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 捷克文
  • 1 篇 朝鲜文
检索条件"机构=Department of Computer Science and Cognitive Science Program"
11181 条 记 录,以下是1241-1250 订阅
排序:
Evaluation of Deep Convolutional Neural Network-Based Tattoo Detection
Evaluation of Deep Convolutional Neural Network-Based Tattoo...
收藏 引用
Inteligencia Ambiental, Ingeniería de Software y Salud Electrónica y Móvil (AmITIC), V Congreso Internacional en
作者: E. Jiménez-Delgado C. Quesada-López A Méndez-Porras A Lara-Petitdemange J Alfaro-Velasco Graduate Program in Computer Science and Informatics University of Costa Rica Computer Engineering Department Technological Institute of Costa Rica School of Computer Science and Informatics University of Costa Rica
In this study, two deep learning models for automatic tattoo detection were analyzed; a modified Convolutional Neural Network (CNN) and pre-trained ResNet-50 model. In order to achieve this, ResNet-50 uses transfer le... 详细信息
来源: 评论
Boundary Conditions in Geodesic Motion Planning for Manipulators
Boundary Conditions in Geodesic Motion Planning for Manipula...
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: Mario Laux Andreas Zell Department of Computer Science Chair of Cognitive Systems University of Tübingen Tübingen Germany
In dynamic environments, robotic manipulators and especially cobots must be able to react to changing circumstances while in motion. This substantiates the need for quick trajectory planning algorithms that are able t...
来源: 评论
DARNet: dual attention refinement network with spatiotemporal construction for auditory attention detection  24
DARNet: dual attention refinement network with spatiotempora...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Sheng Yan Cunhang Fan Hongyu Zhang Xiaoke Yang Jianhua Tao Zhao Lv Anhui Province Key Laboratory of Multimodal Cognitive Computations School of Computer Science and Technology Anhui University Department of Automation Tsinghua University
At a cocktail party, humans exhibit an impressive ability to direct their attention. The auditory attention detection (AAD) approach seeks to identify the attended speaker by analyzing brain signals, such as EEG signa...
来源: 评论
Maternal Health Risk Classification - A Comparison between Algorithm Decision Tree and k-Nearest Neighbor (kNN)
Maternal Health Risk Classification - A Comparison between A...
收藏 引用
2023 International Conference on Sustainable Emerging Innovations in Engineering and Technology, ICSEIET 2023
作者: Fatmawati, Maylia Novita, Mega Saputro, Nugroho Dwi Chauhan, Alok Singh Nada, Noora Qotrun Sinha, Amit Herlambang, Bambang Agus Gupta, Shruti Universitas Pgri Semarang Faculty of Engineering and Informatics Department of Informatics Semarang Indonesia Universitas Pgri Semarang Postgraduate Program of Science Education Semarang Indonesia School of Computing Science & Engineering Galgotias University Greater Noida India ABES Engineering College Department of Computer Science & Engineering Uttar Pradesh Ghaziabad201009 India
Maternal health is a critical concern, particularly for individuals who are pregnant and will shape the future generations. However, not all expectant mothers receive tailored attention and care for their unique healt... 详细信息
来源: 评论
LLAVAGUARD: An Open VLM-based Framework for Safeguarding Vision Datasets and Models
arXiv
收藏 引用
arXiv 2024年
作者: Helff, Lukas Friedrich, Felix Brack, Manuel Kersting, Kristian Schramowski, Patrick Department of Computer Science Technical University of Darmstadt Germany hessian.AI Darmstadt Germany DFKI Germany Centre for Cognitive Science Darmstadt Germany Ontocord Germany
This paper introduces LlavaGuard, a suite of VLM-based vision safeguards that address the critical need for reliable guardrails in the era of large-scale data and models. To this end, we establish a novel open framewo... 详细信息
来源: 评论
Deciphering the Complex Characterization of Coding LncRNA
Deciphering the Complex Characterization of Coding LncRNA
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Tianyuan Liu Xiucai Ye Tetsuya Sakurai Tsukuba Life Science Innovation Program University of Tsukuba Tsukuba Japan Department of Computer Science University of Tsukuba Tsukuba Japan
This research addresses the intricate nature of coding long non-coding RNAs (lncRNAs), challenging the traditional view of these molecules as merely non-coding elements. By analyzing sequence, physicochemical, and str... 详细信息
来源: 评论
U-Net Based Vegetation Segmentation for Urban Green Space (UGS) Regulation in Yogyakarta City
U-Net Based Vegetation Segmentation for Urban Green Space (U...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Delfia Nur Anrianti Putri Raden Bagus Muhammad AdryanPutra Adhy Wijaya Nailfaaz Wahyono Computer Science Undergraduate Program Faculty Of Mathematics And Natural Science Sleman Indonesia Department of Computer Science and Electronics Faculty Of Mathematics And Natural Science Sleman Indonesia
Urban Green Space (UGS) plays a vital role in maintaining the balance of urban ecosystems. In Yogyakarta City, urban development and an increase in population accompanied by a decrease and insufficiency in the proport...
来源: 评论
Comprehensive Analysis and Remediation of Insecure Direct Object References (IDOR) Vulnerabilities in Android APIs
Comprehensive Analysis and Remediation of Insecure Direct Ob...
收藏 引用
Cryptography, Informatics, and Cybersecurity (ICoCICs), IEEE International Conference on
作者: Semi Yulianto Roni Reza Abdullah Benfano Soewito Computer Science Department Binus Graduate Program Computer Science Bina Nusantara University Jakarta Indonesia Faculty of Informatics Engineering National Institute of Science and Technology Jakarta Indonesia Computer Science Department Binus Graduate Program. Master of Computer Science Bina Nusantara University Jakarta Indonesia
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. ...
来源: 评论
The Information Systems and Model for Succession Planning in Higher Education Institutions
The Information Systems and Model for Succession Planning in...
收藏 引用
computer Applications (ICCA), IEEE Conference on
作者: Devyano Luhukay Ford Lumban Gaol Meyliana Harjanto Prabowo Computer Science Department BINUS Graduate Program Computer Science Bina Nusantara University Jakarta Indonesia Information Systems Department School of Information Systems Bina Nusantara University Jakarta Indonesia
Succession planning is important in organization management. It is a strategic level management that involves not only finding the best successor but also including the development program for the successor so that th... 详细信息
来源: 评论
Sentiment Analysis of Electric Vehicle Incentives Using CNN-LSTM and SVM Models
Sentiment Analysis of Electric Vehicle Incentives Using CNN-...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Fahmi Reza Prasastio P Dimas Riswanda Pradana Endra Permana Afiahayati Aufaclav Zatu Kusuma Frisky Department Computer Science And Electronics Master Program in Artificial Intelligence Universitas Gadjah Mada Yogyakarta Indonesia Department Computer Science And Electronics Universitas Gadjah Mada Yogyakarta Indonesia
In this study, we will briefly discuss the potential use of a hybrid deep learning model consisting of Convolutional Neural Networks (CNNs) and Long Short-Term Memory (LSTMs) in sentiment analysis applications will be... 详细信息
来源: 评论