咨询与建议

限定检索结果

文献类型

  • 8,859 篇 期刊文献
  • 8,411 篇 会议
  • 107 册 图书

馆藏范围

  • 17,377 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,700 篇 工学
    • 7,997 篇 计算机科学与技术...
    • 6,699 篇 软件工程
    • 2,447 篇 信息与通信工程
    • 1,797 篇 生物工程
    • 1,419 篇 控制科学与工程
    • 1,338 篇 生物医学工程(可授...
    • 1,114 篇 电气工程
    • 993 篇 光学工程
    • 777 篇 电子科学与技术(可...
    • 542 篇 化学工程与技术
    • 529 篇 机械工程
    • 434 篇 网络空间安全
    • 426 篇 安全科学与工程
    • 419 篇 仪器科学与技术
    • 410 篇 动力工程及工程热...
    • 389 篇 交通运输工程
  • 6,926 篇 理学
    • 3,682 篇 数学
    • 2,100 篇 生物学
    • 1,742 篇 物理学
    • 1,466 篇 统计学(可授理学、...
    • 686 篇 化学
    • 659 篇 系统科学
  • 3,057 篇 管理学
    • 1,658 篇 管理科学与工程(可...
    • 1,514 篇 图书情报与档案管...
    • 943 篇 工商管理
  • 1,384 篇 医学
    • 1,149 篇 临床医学
    • 1,038 篇 基础医学(可授医学...
    • 606 篇 公共卫生与预防医...
    • 590 篇 药学(可授医学、理...
  • 608 篇 法学
    • 524 篇 社会学
  • 345 篇 经济学
  • 297 篇 农学
  • 185 篇 教育学
  • 61 篇 文学
  • 25 篇 军事学
  • 20 篇 艺术学
  • 5 篇 哲学
  • 5 篇 历史学

主题

  • 645 篇 deep learning
  • 582 篇 accuracy
  • 500 篇 machine learning
  • 322 篇 feature extracti...
  • 308 篇 computational mo...
  • 299 篇 predictive model...
  • 284 篇 real-time system...
  • 259 篇 training
  • 239 篇 internet of thin...
  • 232 篇 support vector m...
  • 205 篇 optimization
  • 205 篇 semantics
  • 200 篇 data mining
  • 196 篇 convolutional ne...
  • 183 篇 reinforcement le...
  • 165 篇 data models
  • 162 篇 neural networks
  • 159 篇 image segmentati...
  • 157 篇 artificial intel...
  • 135 篇 deep neural netw...

机构

  • 428 篇 department of ph...
  • 399 篇 iccub universita...
  • 360 篇 horia hulubei na...
  • 353 篇 h.h. wills physi...
  • 297 篇 university of ch...
  • 293 篇 nikhef national ...
  • 291 篇 center for high ...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 287 篇 van swinderen in...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 287 篇 physikalisches i...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 school of physic...
  • 284 篇 institute of par...
  • 280 篇 henryk niewodnic...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 233 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 204 篇 brundu d.
  • 194 篇 borsato m.
  • 192 篇 betancourt c.
  • 159 篇 bediaga i.
  • 158 篇 baker s.
  • 149 篇 amato s.
  • 148 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 baryshnikov f.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 13,719 篇 英文
  • 3,600 篇 其他
  • 96 篇 中文
  • 7 篇 斯洛文尼亚文
  • 5 篇 法文
  • 3 篇 德文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Data Science"
17377 条 记 录,以下是571-580 订阅
排序:
Learning to Communicate Among Agents for Large-Scale Dynamic Path Planning With Genetic Programming Hyperheuristic
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第5期6卷 1269-1283页
作者: Liao, Xiao-Cheng Hu, Xiao-Min Chen, Xiang-Ling Mei, Yi Jia, Ya-Hui Chen, Wei-Neng Victoria University of Wellington Centre for Data Science and Artificial Intelligence School of Engineering and Computer Science Wellington6140 New Zealand Guangdong University of Technology School of Computer Science and Technology Guangzhou510006 China Hanyang University Department of Electrical and Electronic Engineering Ansan15588 Korea Republic of South China University of Technology School of Future Technology Guangzhou510006 China Pazhou Lab Guangzhou510005 China South China University of Technology School of Computer Science and Engineering State Key Laboratory of Subtropical Building and Urban Science Guangzhou510006 China
Genetic programming hyperheuristic (GPHH) has recently become a promising methodology for large-scale dynamic path planning (LDPP) since it can produce reusable heuristics rather than disposable solutions. However, in... 详细信息
来源: 评论
Machine Learning for Mental Health: A Systematic Study of Seven Approaches for Detecting Mental Disorders
Machine Learning for Mental Health: A Systematic Study of Se...
收藏 引用
2023 International Technical Conference on Circuits/Systems, computers, and Communications, ITC-CSCC 2023
作者: Nadeem, Muhammad Rashid, Junaid Moon, Hyeonjoon Dosset, Arailym Sejong Uviversity Department of Computer Science and Engineering Seoul Korea Republic of Sejong University Department of Data Science Seoul Korea Republic of
Mental disorders are a prevalent issue among teenagers. The widespread use of smartphones and social media has revolutionized the way individuals communicate and exchange information with millions of people using thes... 详细信息
来源: 评论
Graph Contrastive Learning for Truth Inference  40
Graph Contrastive Learning for Truth Inference
收藏 引用
40th IEEE International Conference on data Engineering, ICDE 2024
作者: Liu, Hao Liu, Jiacheng Tang, Feilong Li, Peng Chen, Long Yu, Jiadi Zhu, Yanmin Gao, Min Yang, Yanqin Hou, Xiaofeng Chinese University of Hong Kong Department of Computer Science and Engineering Hong Kong East China Normal University School of Data Science and Engineering Shanghai China Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai China University of Aizu School of Computer Science and Engineering Japan Simon Fraser University School of Computing Science Canada
Crowdsourcing has become a popular paradigm for collecting large-scale labeled datasets by leveraging numerous annotators. However, these annotators often provide noisy labels due to varying expertise. Truth inference... 详细信息
来源: 评论
CNN-LSTM: Development of Offline Signature Authentication  1
CNN-LSTM: Development of Offline Signature Authentication
收藏 引用
1st IEEE International Conference on Emerging Research in Computational science, ICERCS 2023
作者: Ganapathy, Revathy Lingeshwaran, D. Suthanthiradevi, P. Harish Kumar, M.V. Vels Insitute of Science Technology and Advanced Studies Department of Computer Science and Engineering Chennai India Srm Institute of Science and Technology Department of Data Science and Business Systems Chennai India
Offline Signature Authentication is a critical task in the field of document authentication, and its accuracy is essential for ensuring security while transactions. This research proposes two approaches: Initially Pre... 详细信息
来源: 评论
EfficientNetB1 Deep Learning Model for Microscopic Lung Cancer Lesion Detection and Classification Using Histopathological Images
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 809-825页
作者: Rabia Javed Tanzila Saba Tahani Jaser Alahmadi Sarah Al-Otaibi Bayan AlGhofaily Amjad Rehman Department of Computer Science Lahore College for Women UniversityLahore54000Pakistan Artificial Intelligence&Data Analytics Lab. CCIS Prince Sultan UniversityRiyadh11586Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Computer and Information SciencesKing Saud UniversityRiyadh145111Saudi Arabia
Cancer poses a significant threat due to its aggressive nature,potential for widespread metastasis,and inherent heterogeneity,which often leads to resistance to *** cancer ranks among the most prevalent forms of cance... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
A polyhedral reconstruction of a 3D object from a chain code and a low-density point cloud
收藏 引用
Multimedia Tools and Applications 2025年 1-28页
作者: Tapia-Dueñas, Osvaldo A. López, Hiram H. Sánchez-Cruz, Hermilo Department of Mathematics Computer Science and Data Science John Carroll University University HeightsOH United States Department of Mathematics Virginia Tech BlacksburgVA United States Departamento de Ciencias de la Computación Universidad Autónoma de Aguascalientes Aguascalientes Aguascalientes Mexico
The manipulation of 3D objects is becoming crucial for many applications, such as health, industry, or entertainment, to mention some. However, these 3D objects require substantial energy and different types of resour... 详细信息
来源: 评论
Comparative Analysis of Traditional and Contextual Embedding for Bangla Sarcasm Detection in Natural Language Processing  12
Comparative Analysis of Traditional and Contextual Embedding...
收藏 引用
12th IEEE International Conference on Communication, Networks and Satellite, COMNETSAT 2023
作者: Fahim, Kaji Mehedi Hasan Moontaha, Mithila Rahman, Mashrur Rhythm, Ehsanur Rahman Rasel, Annajiat Alim Brac University School of Data and Sciences Department of Computer Science and Engineering Dhaka Bangladesh
Sarcasm, a sort of sentiment characterized by a disparity between the apparent and intended meanings of the text, is a key component of sentiment analysis, opinion extraction, and social media analytics. However, sarc... 详细信息
来源: 评论
Adaptive Three-Level BDDC Using Frugal Constraints  27th
Adaptive Three-Level BDDC Using Frugal Constraints
收藏 引用
27th International Conference on Domain Decomposition Methods in science and Engineering, DD 2022
作者: Klawonn, Axel Lanser, Martin Weber, Janine Department of Mathematics and Computer Science University of Cologne Weyertal 86-90 Koln50931 Germany Center for Data and Simulation Science University of Cologne Cologne Germany
The convergence rate of both the FETI-DP (Finite Element Tearing and Interconnecting-Dual Primal) and the BDDC (Balancing Domain Decomposition by Constraints) domain decomposition methods strongly depend on the spectr... 详细信息
来源: 评论
Comparison of Various Computational Models for Accurate Stroke Prediction and Interpretation Using LIME and SHAP Kernels  1
Comparison of Various Computational Models for Accurate Stro...
收藏 引用
1st International Conference for Women in Computing, InCoWoCo 2024
作者: Arun, Chalana B Anusha, M. Kodipalli, Ashwini Gargi, N. Harish, L. Devamane, Shridhar B Global Academy of Technology Dept. of Artificial Intelligence and Data Science Bangalore India School of Computing Amrita Vishwavidhyapeetam Department of Computer Science Mysuru India
Stroke is one dangerous illness that kills people. Stroke is so called because of the way it strikes people down. Across the globe, it is among the main causes of mortality and disability. It requires early identifica... 详细信息
来源: 评论