咨询与建议

限定检索结果

文献类型

  • 8,774 篇 期刊文献
  • 8,137 篇 会议
  • 105 册 图书

馆藏范围

  • 17,016 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,527 篇 工学
    • 7,904 篇 计算机科学与技术...
    • 6,661 篇 软件工程
    • 2,420 篇 信息与通信工程
    • 1,793 篇 生物工程
    • 1,377 篇 控制科学与工程
    • 1,333 篇 生物医学工程(可授...
    • 1,115 篇 电气工程
    • 984 篇 光学工程
    • 769 篇 电子科学与技术(可...
    • 539 篇 化学工程与技术
    • 524 篇 机械工程
    • 428 篇 网络空间安全
    • 424 篇 安全科学与工程
    • 419 篇 仪器科学与技术
    • 416 篇 动力工程及工程热...
    • 388 篇 交通运输工程
  • 6,897 篇 理学
    • 3,647 篇 数学
    • 2,096 篇 生物学
    • 1,736 篇 物理学
    • 1,440 篇 统计学(可授理学、...
    • 687 篇 化学
    • 658 篇 系统科学
  • 3,052 篇 管理学
    • 1,652 篇 管理科学与工程(可...
    • 1,515 篇 图书情报与档案管...
    • 945 篇 工商管理
  • 1,378 篇 医学
    • 1,136 篇 临床医学
    • 1,034 篇 基础医学(可授医学...
    • 595 篇 公共卫生与预防医...
    • 588 篇 药学(可授医学、理...
  • 599 篇 法学
    • 517 篇 社会学
  • 345 篇 经济学
  • 295 篇 农学
  • 180 篇 教育学
  • 63 篇 文学
  • 24 篇 军事学
  • 20 篇 艺术学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 612 篇 deep learning
  • 536 篇 accuracy
  • 492 篇 machine learning
  • 310 篇 feature extracti...
  • 302 篇 computational mo...
  • 289 篇 predictive model...
  • 264 篇 real-time system...
  • 253 篇 training
  • 233 篇 internet of thin...
  • 225 篇 support vector m...
  • 215 篇 semantics
  • 196 篇 data mining
  • 189 篇 optimization
  • 188 篇 convolutional ne...
  • 177 篇 reinforcement le...
  • 165 篇 artificial intel...
  • 162 篇 neural networks
  • 159 篇 data models
  • 152 篇 image segmentati...
  • 133 篇 computer science

机构

  • 428 篇 department of ph...
  • 399 篇 iccub universita...
  • 367 篇 horia hulubei na...
  • 356 篇 h.h. wills physi...
  • 295 篇 university of ch...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 290 篇 imperial college...
  • 289 篇 van swinderen in...
  • 289 篇 school of physic...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 287 篇 physikalisches i...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 school of physic...
  • 284 篇 institute of par...
  • 280 篇 henryk niewodnic...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 235 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 213 篇 blake t.
  • 205 篇 brundu d.
  • 202 篇 borsato m.
  • 194 篇 betancourt c.
  • 163 篇 bediaga i.
  • 157 篇 baker s.
  • 148 篇 amato s.
  • 148 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 baryshnikov f.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 15,758 篇 英文
  • 1,199 篇 其他
  • 79 篇 中文
  • 5 篇 法文
  • 3 篇 德文
  • 3 篇 斯洛文尼亚文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Data Science"
17016 条 记 录,以下是31-40 订阅
排序:
ENHANCED LABEL PROPAGATION THROUGH AFFINITY MATRIX FUSION FOR SOURCE-FREE DOMAIN ADAPTATION  3
ENHANCED LABEL PROPAGATION THROUGH AFFINITY MATRIX FUSION FO...
收藏 引用
3rd Conference on Lifelong Learning Agents, CoLLAs 2024
作者: Guo, Li Xia, Yuxuan Wang, Shengjie Department of Computer Science and Data Science New York University Shanghai China
Source-free domain adaptation (SFDA) has gained significant attention as a method to transfer knowledge from a pre-trained model on source domains toward target domains without accessing the source data. Recent resear... 详细信息
来源: 评论
Automated Adversarial-Attack Removal with SafetyNet Using ADGIT  10
Automated Adversarial-Attack Removal with SafetyNet Using AD...
收藏 引用
10th International Conference on Smart Computing and Communication, ICSCC 2024
作者: Halim, Steven Anandi, Arvio Devin, Vyos Agung Santoso Gunawan, Alexander Eka Setiawan, Karli School of Computer Science Bina Nusantara University Data Science Program Computer Science Department Jakarta11480 Indonesia
In the realm of artificial intelligence (AI), a notable challenge has surfaced: adversarial attacks, these attacks involve altering input data to mislead AI models. Developing defensive measures against adversarial at... 详细信息
来源: 评论
Cosmetics Recommendation System Based on Ingredients Using Cosine Similarity  7
Cosmetics Recommendation System Based on Ingredients Using C...
收藏 引用
7th International Conference on data science and Its Applications, ICoDSA 2024
作者: Alisha Firdaus, Sekar Dwi Nurmuthia, Laksmi Imtiyaz, Raina Agung Santoso Gunawan, Alexander Eka Setiawan, Karli School of Computer Science Bina Nusantara University Data Science Program Computer Science Department Jakarta11480 Indonesia
In the rapidly evolving beauty industry, consumers are often bombarded with an overwhelming array of skincare brands and products, making the quest for the perfect skincare regimen a daunting task. This saturation of ... 详细信息
来源: 评论
A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural Networks with Leveraging LSTM
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3089-3127页
作者: Navaneetha Krishnan Muthunambu Senthil Prabakaran Balasubramanian Prabhu Kavin Kishore Senthil Siruvangur Kavitha Chinnadurai Jehad Ali Department of Computer Applications Karpagam College of EngineeringCoimbatore641032India Department of Computer Science and Engineering Karpagam College of EngineeringCoimbatore641032India Department of Data Science and Business Systems College of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathur603203India Department of Computer Science and Engineering Sathyabama Institute of Science and TechnologyJeppiaar NagarRajiv Gandhi SalaiChennai600119India Department of AI Convergence Network Ajou UniversitySuwon16499Korea
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has ex... 详细信息
来源: 评论
A hybrid memory architecture supporting fine-grained data migration
收藏 引用
Frontiers of computer science 2024年 第2期18卷 31-41页
作者: Ye CHI Jianhui YUE Xiaofei LIAO Haikun LIU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China Department of Computer Science Michigan Technological UniversityMichigan 49931USA
Hybrid memory systems composed of dynamic random access memory(DRAM)and Non-volatile memory(NVM)often exploit page migration technologies to fully take the advantages of different memory *** previous proposals usually... 详细信息
来源: 评论
Blockchain with drug traceability in medical supply chain with Henry gas solubility optimisation algorithm
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第2期28卷 135-148页
作者: Devi, P. Yamini Sriramya, P. Department of Computer Science and Engineering Saveetha School of Engineering Thandalam Tamil Nadu Chennai India Department of Data Science Saveetha School of Engineering SIMATS Tamil Nadu Chennai India
The drug traceability model is used for ensuring drug quality and its safety for customers in the medical supply chain. The healthcare supply chain is a complex network, which is susceptible to failures and leakage of... 详细信息
来源: 评论
Blockchain based Security Management of Internet of Medical Things (IoMT) using Homomorphic Encryption using Metaheuristics with a Deep Learning Model  2
Blockchain based Security Management of Internet of Medical ...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Santiago, S. Prasanna, B.T. Qureshi, Kashif Subash, K. Trichy India Jss Science and Technology University Department of Computer Science and Engineering Mysuru India Department of Data Science Ai India Department of Data Science Trichy India
The introduction of the Internet of Medical Things (IoMT), has drastically transformed the worldwide landscape of healthcare delivery. The proliferation of IoMT devices in healthcare systems brings new issues in guara... 详细信息
来源: 评论
A Linked List Encryption Scheme for Image Steganography without Embedding
收藏 引用
computer Modeling in Engineering & sciences 2024年 第10期141卷 331-352页
作者: Pengbiao Zhao Qi Zhong Jingxue Chen Xiaopei Wang Zhen Qin Erqiang Zhou Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of ChinaChengdu610054China Faculty of Data Science City University of MacaoMacao999078China Department of Computer Science and Engineering University of CaliforniaRiversideCA 92521USA
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in... 详细信息
来源: 评论
Lung Cancer Detection: A Comparative Approach Using Regressor Methods  4
Lung Cancer Detection: A Comparative Approach Using Regresso...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Puri, Chetan Sharma, Mansi Reddy, K.T.V. Department of Computer Science and Design Wardha India Department of Artificial Intelligence and Data Science Wardha India
Lung cancer detection is the detection of tumors or cancerous cells in lung tissue. It is done using several medical imaging modalities, such as nuclear and genetic tests, magnetic resonance imaging (MRI), computed to... 详细信息
来源: 评论
Drug sales forecasting in the pharmaceutical market using deep neural network algorithms
International Journal of Systematic Innovation
收藏 引用
International Journal of Systematic Innovation 2024年 第3期8卷 63-83页
作者: Qassrawi, Noura Azzeh, Mohammad Hijjawi, Mohammad Department of Computer Science Applied Science Private University Amman Jordan Department of Data Science Princess Sumaya University for Technology Amman Jordan
Drug sales and price forecasting have become an attractive investigation topic due to their important role in the pharmaceutical industry, A sales forecast helps every business to make better business decisions in ove... 详细信息
来源: 评论