咨询与建议

限定检索结果

文献类型

  • 8,859 篇 期刊文献
  • 8,411 篇 会议
  • 107 册 图书

馆藏范围

  • 17,377 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,700 篇 工学
    • 7,997 篇 计算机科学与技术...
    • 6,699 篇 软件工程
    • 2,447 篇 信息与通信工程
    • 1,797 篇 生物工程
    • 1,419 篇 控制科学与工程
    • 1,338 篇 生物医学工程(可授...
    • 1,114 篇 电气工程
    • 993 篇 光学工程
    • 777 篇 电子科学与技术(可...
    • 542 篇 化学工程与技术
    • 529 篇 机械工程
    • 434 篇 网络空间安全
    • 426 篇 安全科学与工程
    • 419 篇 仪器科学与技术
    • 410 篇 动力工程及工程热...
    • 389 篇 交通运输工程
  • 6,926 篇 理学
    • 3,682 篇 数学
    • 2,100 篇 生物学
    • 1,742 篇 物理学
    • 1,466 篇 统计学(可授理学、...
    • 686 篇 化学
    • 659 篇 系统科学
  • 3,057 篇 管理学
    • 1,658 篇 管理科学与工程(可...
    • 1,514 篇 图书情报与档案管...
    • 943 篇 工商管理
  • 1,384 篇 医学
    • 1,149 篇 临床医学
    • 1,038 篇 基础医学(可授医学...
    • 606 篇 公共卫生与预防医...
    • 590 篇 药学(可授医学、理...
  • 608 篇 法学
    • 524 篇 社会学
  • 345 篇 经济学
  • 297 篇 农学
  • 185 篇 教育学
  • 61 篇 文学
  • 25 篇 军事学
  • 20 篇 艺术学
  • 5 篇 哲学
  • 5 篇 历史学

主题

  • 645 篇 deep learning
  • 582 篇 accuracy
  • 500 篇 machine learning
  • 322 篇 feature extracti...
  • 308 篇 computational mo...
  • 299 篇 predictive model...
  • 284 篇 real-time system...
  • 259 篇 training
  • 239 篇 internet of thin...
  • 232 篇 support vector m...
  • 205 篇 optimization
  • 205 篇 semantics
  • 200 篇 data mining
  • 196 篇 convolutional ne...
  • 183 篇 reinforcement le...
  • 165 篇 data models
  • 162 篇 neural networks
  • 159 篇 image segmentati...
  • 157 篇 artificial intel...
  • 135 篇 deep neural netw...

机构

  • 428 篇 department of ph...
  • 399 篇 iccub universita...
  • 360 篇 horia hulubei na...
  • 353 篇 h.h. wills physi...
  • 297 篇 university of ch...
  • 293 篇 nikhef national ...
  • 291 篇 center for high ...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 287 篇 van swinderen in...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 287 篇 physikalisches i...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 school of physic...
  • 284 篇 institute of par...
  • 280 篇 henryk niewodnic...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 233 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 204 篇 brundu d.
  • 194 篇 borsato m.
  • 192 篇 betancourt c.
  • 159 篇 bediaga i.
  • 158 篇 baker s.
  • 149 篇 amato s.
  • 148 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 baryshnikov f.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 13,719 篇 英文
  • 3,600 篇 其他
  • 96 篇 中文
  • 7 篇 斯洛文尼亚文
  • 5 篇 法文
  • 3 篇 德文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Data Science"
17377 条 记 录,以下是521-530 订阅
排序:
Potential effects of a role-playing digital gaming learning system on the learning performance and motivation in a humanities course
收藏 引用
Interactive Learning Environments 2023年 第8期31卷 5078-5091页
作者: Chin, Kai-Yi Chen, Yen-Lin Department of Data Science Soochow University Taipei City Taiwan Department of Computer Science Information Engineering National Taipei University of Technology Taipei City Taiwan
Using digital learning content to realize learning in games is a rapidly-developing direction of interest for teachers and researchers. This study has developed a digital role-playing gaming system to review Social St... 详细信息
来源: 评论
Detecting Cyber Bullying in the Social Media Using Deep Learning Algorithms  15th
Detecting Cyber Bullying in the Social Media Using Deep Lear...
收藏 引用
15th International Conference on Soft Computing and Pattern Recognition, SoCPaR 2023 and 14th World Congress on Nature and Biologically Inspired Computing, NaBIC 2023
作者: Mridul, Aunik Hasan Ahsan, Nowreen Sultana, Zakia Asif, Asifuzzaman Computer Science and Engineering Daffodil International University Dhaka Bangladesh Department of Data Science Clarkson University New York United States Computer Science and Engineering Lovely Professional University Punjab India
Cyberbullying is a pressing issue in the digital age, especially in non-English-speaking communities. This study focuses on using deep learning techniques to detect cyberbullying in the Bangla language. The research e... 详细信息
来源: 评论
Cognitive Detection of Anomalies in Autonomous In-Vehicle Network Communication
Cognitive Detection of Anomalies in Autonomous In-Vehicle Ne...
收藏 引用
2024 International Conference on Advancements in Power, Communication and Intelligent Systems, APCI 2024
作者: Firasta, Suzen Srivastava, Yash Rahul Rao, Vidya Manipal Institute of Technology Manipal Academy of Higher Education Department of Data Science and Computer Applications Manipal India
The research addresses the critical issue of detecting anomalies in autonomous in-vehicle network communication, focusing on the vulnerability of infotainment systems to denial-of-service attacks. The aim is to explor... 详细信息
来源: 评论
Application of improved virtual sample and sparse representation in face recognition
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第4期8卷 1391-1402页
作者: Yongjun Zhang Zewei Wang Xuexue Zhang Zhongwei Cui Bob Zhang Jinrong Cui Lamin LJanneh College of Computer Science and Technology Guizhou UniversityGuiyangChina Big Data Science and Intelligent Engineering Research Institute Guizhou Education UniversityGuiyangChina School of Mathematics and Big Data Guizhou Education UniversityGuiyangChina Department of Computer and Information Science University of MacaoAvenida da UniversidadeTaipaMacaoChina School of Mathematics and Information South China Agricultural UniversityGuangzhouChina
Sparse representation plays an important role in the research of face *** a deformable sample classification task,face recognition is often used to test the performance of classification *** face recognition,differenc... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Dementia Disorder Analysis Using Optimized Deep ResiNet Based on Cognitive Approach  1st
Dementia Disorder Analysis Using Optimized Deep ResiNet Base...
收藏 引用
1st International Conference on data Engineering and Machine Intelligence, ICDEMI 2023
作者: Duraipandian, Kavitha Ambigapathy, Murugan Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Tamil Nadu Chennai600089 India Department of Data Science and Business Systems SRM Institute of Science and Technology Kattankulathur Tamil Nadu Chennai603203 India
Early warning signs of dementia may include memory loss, difficulty with problem-solving, confusion, changes in mood and behavior, and impaired communication skills. People impacted by dementia often make a loss on th... 详细信息
来源: 评论
Does the Choice of Preferential Voting Method Matter? An Empirical Study Using Ranked Choice Elections in the United States
收藏 引用
Representation 2024年 第1期60卷 1-16页
作者: McCune, David McCune, Lori William Jewell College Mathematics and Data Science Liberty United States Department of Mathematics Computer Science and Physics Missouri Western State University Saint Joseph MO United States
In an election which uses preference ballots, there exist many different voting methods for choosing a winner of the election given the voters’ preference data. We analyse the extent to which the choice of voting met... 详细信息
来源: 评论
Granularity is crucial when applying differential privacy to text: An investigation for neural machine translation
Granularity is crucial when applying differential privacy to...
收藏 引用
2024 Findings of the Association for Computational Linguistics, EMNLP 2024
作者: Vu, Doan Nam Long Igamberdiev, Timour Habernal, Ivan Trustworthy Human Language Technologies Germany Department of Computer Science Technical University of Darmstadt Germany Research Center Trustworthy Data Science and Security of the University Alliance Ruhr Faculty of Computer Science Ruhr University Bochum Germany
Applying differential privacy (DP) by means of the DP-SGD algorithm to protect individual data points during training is becoming increasingly popular in NLP. However, the choice of granularity at which DP is applied ... 详细信息
来源: 评论
Enhanced Identification of Care Preference Documentation in Patients’ Discharge Summaries Using Pre-trained Large Language Models  1
Enhanced Identification of Care Preference Documentation in ...
收藏 引用
1st IEEE International Conference on Artificial Intelligence for Medicine, Health and Care, AIMHC 2024
作者: Arora, Saksham Khayal, Inas S. Department of Computer Science Dartmouth College HanoverNH United States Dartmouth Institute & Biomedical Data Science Geisel School of Medicine at Dartmouth Dept. of Computer Science Dartmouth College HanoverNH United States
Improving patient-centered care necessitates accurate documentation of care preferences, a crucial aspect often underrepresented in administrative data. Most studies apply care documentation to specific patient popula... 详细信息
来源: 评论
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12528-12537页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Tariq, Tayyaba Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Yunlin Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
Vehicular network technology has made substantial advancements in recent years in the field of Intelligent Transportation Systems. Vehicular Cloud Computing (VCC) has emerged as a novel paradigm with a substantial inc... 详细信息
来源: 评论