咨询与建议

限定检索结果

文献类型

  • 5,598 篇 期刊文献
  • 5,501 篇 会议
  • 80 册 图书

馆藏范围

  • 11,179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,859 篇 工学
    • 5,072 篇 计算机科学与技术...
    • 4,211 篇 软件工程
    • 1,707 篇 信息与通信工程
    • 1,168 篇 生物工程
    • 990 篇 控制科学与工程
    • 864 篇 生物医学工程(可授...
    • 855 篇 电气工程
    • 689 篇 光学工程
    • 602 篇 电子科学与技术(可...
    • 370 篇 机械工程
    • 363 篇 化学工程与技术
    • 309 篇 仪器科学与技术
    • 309 篇 网络空间安全
    • 307 篇 交通运输工程
    • 303 篇 动力工程及工程热...
    • 290 篇 安全科学与工程
  • 4,459 篇 理学
    • 2,167 篇 数学
    • 1,371 篇 生物学
    • 1,303 篇 物理学
    • 873 篇 统计学(可授理学、...
    • 490 篇 化学
    • 396 篇 系统科学
  • 1,942 篇 管理学
    • 1,145 篇 管理科学与工程(可...
    • 862 篇 图书情报与档案管...
    • 634 篇 工商管理
  • 898 篇 医学
    • 742 篇 临床医学
    • 665 篇 基础医学(可授医学...
    • 392 篇 公共卫生与预防医...
    • 382 篇 药学(可授医学、理...
  • 368 篇 法学
    • 321 篇 社会学
  • 230 篇 经济学
  • 208 篇 农学
  • 107 篇 教育学
  • 40 篇 文学
  • 17 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 480 篇 accuracy
  • 469 篇 deep learning
  • 359 篇 machine learning
  • 276 篇 feature extracti...
  • 252 篇 real-time system...
  • 245 篇 computational mo...
  • 222 篇 training
  • 219 篇 predictive model...
  • 205 篇 internet of thin...
  • 190 篇 convolutional ne...
  • 170 篇 artificial intel...
  • 164 篇 support vector m...
  • 155 篇 optimization
  • 138 篇 semantics
  • 135 篇 data models
  • 134 篇 reinforcement le...
  • 118 篇 security
  • 111 篇 neural networks
  • 105 篇 data mining
  • 103 篇 reliability

机构

  • 426 篇 department of ph...
  • 400 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 383 篇 h.h. wills physi...
  • 348 篇 van swinderen in...
  • 321 篇 yandex school of...
  • 297 篇 school of physic...
  • 296 篇 university of ch...
  • 295 篇 cavendish labora...
  • 293 篇 nikhef national ...
  • 291 篇 imperial college...
  • 289 篇 center for high ...
  • 286 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 242 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 215 篇 blake t.
  • 214 篇 bowcock t.j.v.
  • 210 篇 borsato m.
  • 210 篇 betancourt c.
  • 206 篇 brundu d.
  • 199 篇 bediaga i.
  • 191 篇 amato s.
  • 183 篇 baryshnikov f.
  • 180 篇 boettcher t.
  • 161 篇 braun s.
  • 159 篇 baker s.
  • 155 篇 borisyak m.
  • 146 篇 bjørn m.
  • 145 篇 bizzeti a.
  • 144 篇 albrecht j.
  • 142 篇 a. jawahery

语言

  • 9,784 篇 英文
  • 1,349 篇 其他
  • 56 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Engineering specialization in Data Science"
11179 条 记 录,以下是4991-5000 订阅
排序:
Malicious Traffic Classification in WSN using Deep Learning Approaches
Malicious Traffic Classification in WSN using Deep Learning ...
收藏 引用
Communication, Security and Artificial Intelligence (ICCSAI), International Conference on
作者: Chhote Lal Prasad Gupta Dinesh Rajassekharan Dilip Kumar Sharma Mohanraj Elangovan Varatharaj Myilsamy Kamal Upreti Dept. of Computer Science and Engineering Bansal Institute of Engineering and Technology Lucknow India Faculty of Computer Science Peninsula College Peninsula Malaysia Department of Mathematics Jaypee University of Engineering and Technology Guna Madhya Pradesh India Department of Artificial Intelligence and Data Science K. S. Rangasamy College of Technology Tiruchengode Tamil Nadu India Department of Electrical and Electronics Engineering V.S.B College of Engineering Technical Campus Coimbatore Tamil Nadu India Department of Computer Science CHRIST(Deemed to be University) Delhi-NCR Ghaziabad India
Classifying malicious traffic in Wireless Sensor Networks (WSNs) is crucial for maintaining the network's security and dependability. Traditional security techniques are challenging to deploy in WSNs because they ...
来源: 评论
Constructions of Binary MDS Array Codes with Optimal Cooperative Repair Bandwidth
Constructions of Binary MDS Array Codes with Optimal Coopera...
收藏 引用
IEEE International Symposium on Information Theory
作者: Lei Li Xinchun Yu Chenhao Ying Liang Chen Yuanyuan Dong Yuan Luo Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Institute of Data and Information Tsinghua University Shenzhen International Graduate School Shenzhen China Alibaba Group Hangzhou China
Erasure codes are widely implemented in distributed storage systems to provide high fault tolerance with small storage overhead. Maximum distance separable codes are an common choice as they achieve the optimal tradeo... 详细信息
来源: 评论
Visual Programming for Artificial Intelligent and Robotic Application (VPAR) Framework
Frontiers in Artificial Intelligence and Applications
收藏 引用
Frontiers in Artificial Intelligence and Applications 2021年 343卷 64-80页
作者: Pongthanisorn, Goragod Viriyavit, Waranrach Charoenporn, Thatsanee Sornlertlamvanich, Virach Department of Computer Engineering Faculty of Engineering Thai-Nichi Institute of Technology Thailand School of ICT Sirindhorn International Institute of Technology Thammasat University Thailand Graduate School of Science and Engineering Chiba University Japan Faculty of Data Science Musashino University Japan Faculty of Engineering Thammasat University 99 Moo 18 Paholyothin Road Klong Nueng Klong Luang Pathumthani12120 Thailand
computer programming is popularized in 21st century education in terms of allowing intensive logical thinking for students. Artificial Intelligent and robotic field is considered to be the most attractive for programm... 详细信息
来源: 评论
User Power Measurement Based IRS Channel Estimation via Single-Layer Neural Network
User Power Measurement Based IRS Channel Estimation via Sing...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: He Sun Weidong Mei Lipeng Zhu Rui Zhang Department of Electrical and Computer Engineering National University of Singapore Singapore National Key Laboratory of Science and Technology on Communications University of Electronic Science and Technology of China China School of Science and Engineering Shenzhen Research Institute of Big Data Chinese University of Hong Kong Shenzhen Guangdong China
One main challenge for implementing intelligent reflecting surface (IRS) aided communications lies in the difficulty to obtain the channel knowledge for the base station (BS)-IRS-user cascaded links, which is needed t...
来源: 评论
WiOpen: A Robust Wi-Fi-based Open-set Gesture Recognition Framework
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Xiang Huang, Jingyang Yan, Huan Zhao, Peng Zhuang, Guohang Liu, Zhi Liu, Bin CAS Key Laboratory of Electromagnetic Space Information University of Science and Technology of China Hefei230026 China School of Computer and Information Hefei University of Technology Hefei230601 China School of Big Data and Computer Science Guizhou Normal University Guiyang550025 China Department of Computer and Network Engineering The University of Electro-Communications Tokyo1828585 Japan
Recent years have witnessed a growing interest in Wi-Fi-based gesture recognition. However, existing works have predominantly focused on closed-set paradigms, where all testing gestures are predefined during training.... 详细信息
来源: 评论
TREE-WASSERSTEIN DISTANCE FOR HIGH DIMENSIONAL data WITH A LATENT FEATURE HIERARCHY
arXiv
收藏 引用
arXiv 2024年
作者: Lin, Ya-Wei Eileen Coifman, Ronald R. Mishne, Gal Talmon, Ronen Viterbi Faculty of Electrical and Computer Engineering Technion United States Department of Mathematics Yale University United States Halicioǧlu Data Science Institute University of California San Diego United States
Finding meaningful distances between high-dimensional data samples is an important scientific task. To this end, we propose a new tree-Wasserstein distance (TWD) for high-dimensional data with two key aspects. First, ... 详细信息
来源: 评论
Investigating the Efficiency of Deep Learning Models in Bioinspired Object Detection
Investigating the Efficiency of Deep Learning Models in Bioi...
收藏 引用
2022 IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2022
作者: Ajagbe, Sunday A. Oki, Olukayode A. Oladipupo, Matthew A. Nwanakwaugwum, Andrew University of Technology Ladoke Akintola Department of Computer Engineering Ogbomoso Nigeria Walter Sisulu University Department of Information Technology East London South Africa University of Salford Department of Data Science Greater Manchester SalfordM5 4WT United Kingdom
Object detection is the process of using a camera to track an object or a group of objects over time. It has numerous applications like human-computer interactions (HCI), security and surveillance, bioinspired approac... 详细信息
来源: 评论
Joint Optimization of Sensing and Communications in Vehicular Networks: A Graph Neural Network-Based Approach
Joint Optimization of Sensing and Communications in Vehicula...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Xuefei Li Mingzhe Chen Zhilong Zhang Danpu Liu Yuchen Liu Shiwen Mao Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral Gables FL USA Department of Computer Science North Carolina State University Raleigh NC USA Department of Electrical and Computer Engineering Auburn University Auburn AL USA
In this paper, the problem of joint sensing and communications is studied over terahertz (THz) vehicular networks. In the studied model, a set of service provider vehicles provide either communication service or sensi...
来源: 评论
Optimizing Purchase Intention Prediction in E-Commerce
Optimizing Purchase Intention Prediction in E-Commerce
收藏 引用
Women in Computing (InCoWoCo), International Conference for
作者: S. Jayanthi Rajeshwari D Naresh Goud M R. Geetha S. Benjamin Franklin Pannangi Rajyalakshmi Department of Artificial Intelligence &Data Science Faculty of Science and Technology (IcfaiTech) The ICFAI Foundation for Higher Education (IFHE) Telangana India Department of CSE Sri Indu Institute of Engineering and Technology Hyderabad Telangana India Department of Computer Science and Engineering Vardhaman College of Engineering Hyderabad Telangana India Department of CSE (AI&ML) Nagarjuna College of Engineering and Technology Bengaluru India Department of Social Work Faculty of Behavioural and Social Sciences SRIHER (DU) Chennai India Department of CSE TKR College of Engineering and Technology Hyderabad India
This study investigates the effectiveness of deep learning models—Convolutional Neural Networks (CNN), Recurrent Neural Networks (RNN), Long Short-Term Memory (LSTM), and Bidirectional LSTM—in predicting purchase in... 详细信息
来源: 评论
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zhen Zhang, Ruqian Zou, Deqing Wang, Ning Li, Yating Xu, Shouhuai Chen, Chen Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science University of Colorado Colorado Springs United States Center for Research in Computer Vision University of Central Florida United States School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China
Deep learning has been widely used in source code classification tasks, such as code classification according to their functionalities, code authorship attribution, and vulnerability detection. Unfortunately, the blac... 详细信息
来源: 评论