咨询与建议

限定检索结果

文献类型

  • 5,544 篇 期刊文献
  • 5,398 篇 会议
  • 78 册 图书

馆藏范围

  • 11,020 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,727 篇 工学
    • 4,977 篇 计算机科学与技术...
    • 4,175 篇 软件工程
    • 1,673 篇 信息与通信工程
    • 1,162 篇 生物工程
    • 926 篇 控制科学与工程
    • 858 篇 生物医学工程(可授...
    • 845 篇 电气工程
    • 682 篇 光学工程
    • 594 篇 电子科学与技术(可...
    • 365 篇 机械工程
    • 361 篇 化学工程与技术
    • 307 篇 仪器科学与技术
    • 304 篇 网络空间安全
    • 302 篇 动力工程及工程热...
    • 300 篇 交通运输工程
    • 287 篇 安全科学与工程
  • 4,414 篇 理学
    • 2,145 篇 数学
    • 1,365 篇 生物学
    • 1,285 篇 物理学
    • 862 篇 统计学(可授理学、...
    • 484 篇 化学
    • 394 篇 系统科学
  • 1,931 篇 管理学
    • 1,138 篇 管理科学与工程(可...
    • 860 篇 图书情报与档案管...
    • 632 篇 工商管理
  • 883 篇 医学
    • 725 篇 临床医学
    • 655 篇 基础医学(可授医学...
    • 382 篇 公共卫生与预防医...
    • 381 篇 药学(可授医学、理...
  • 365 篇 法学
    • 318 篇 社会学
  • 229 篇 经济学
  • 208 篇 农学
  • 102 篇 教育学
  • 40 篇 文学
  • 17 篇 军事学
  • 15 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 474 篇 accuracy
  • 454 篇 deep learning
  • 358 篇 machine learning
  • 275 篇 feature extracti...
  • 245 篇 real-time system...
  • 243 篇 computational mo...
  • 230 篇 training
  • 216 篇 predictive model...
  • 202 篇 internet of thin...
  • 188 篇 convolutional ne...
  • 172 篇 artificial intel...
  • 162 篇 support vector m...
  • 152 篇 optimization
  • 139 篇 semantics
  • 136 篇 data models
  • 130 篇 reinforcement le...
  • 117 篇 security
  • 113 篇 neural networks
  • 104 篇 data mining
  • 100 篇 reliability

机构

  • 426 篇 department of ph...
  • 401 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 384 篇 h.h. wills physi...
  • 351 篇 van swinderen in...
  • 326 篇 yandex school of...
  • 298 篇 school of physic...
  • 295 篇 university of ch...
  • 294 篇 cavendish labora...
  • 293 篇 nikhef national ...
  • 291 篇 imperial college...
  • 289 篇 center for high ...
  • 287 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 243 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 215 篇 blake t.
  • 214 篇 bowcock t.j.v.
  • 210 篇 borsato m.
  • 210 篇 betancourt c.
  • 206 篇 brundu d.
  • 201 篇 bediaga i.
  • 192 篇 amato s.
  • 185 篇 baryshnikov f.
  • 183 篇 boettcher t.
  • 162 篇 braun s.
  • 159 篇 baker s.
  • 156 篇 borisyak m.
  • 148 篇 bjørn m.
  • 146 篇 bizzeti a.
  • 144 篇 albrecht j.
  • 142 篇 a. jawahery

语言

  • 10,139 篇 英文
  • 838 篇 其他
  • 52 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science and Engineering specialization in Data Science"
11020 条 记 录,以下是71-80 订阅
排序:
A Comprehensive Survey on Deep Learning for Enhanced Node Position Prediction in Vehicular Ad-Hoc Networks  4
A Comprehensive Survey on Deep Learning for Enhanced Node Po...
收藏 引用
4th International Conference on Ubiquitous Computing and Intelligent Information Systems, ICUIS 2024
作者: Nayomi, B.Deena Divya Jyothsna, V. Department of Computer Science and Engineering Andhra Pradesh Tirupati India Department of Data Science Andhra Pradesh Tirupati India
This research study presents a thorough examination of the application of deep learning techniques in enhancing node position prediction within Vehicular Ad-Hoc Networks (VANETs). As VANETs become increasingly integra... 详细信息
来源: 评论
Empowering Biomedical Named Entity Recognition Through Multi-Tagger Collaboration  27
Empowering Biomedical Named Entity Recognition Through Multi...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Zhao, Jin Xie, Jian Zhu, Tinghui Guo, Qian Li, Zhixu Xiao, Yanghua Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China Department of Computer Science and Engineering East China University of Science and Technology China
Biomedical Named Entity Recognition (BioNER) plays a crucial role in automatically identifying specific categories of entities from biomedical texts. Currently, region-based methods have shown promising performance in... 详细信息
来源: 评论
A Mathematical and Dynamical Model for Analyzing H-Shaped PM Vernier Motor for Electric Motorcycle Mid-Drive Applications
收藏 引用
IEEE Transactions on Energy Conversion 2025年 第1期40卷 529-543页
作者: Ghods, Mehrage Faiz, Jawad Bazrafshan, Mohammad Amin Gorginpour, Hamed Toulabi, Mohammad Sedigh University of Tehran School of Electrical and Computer Engineering College of Engineering Tehran*** Iran Persian Gulf University Department of Intelligent Systems Engineering and Data Science Bushehr*** Iran Oakland University Department of Electrical and Computer Engineering RochesterMI48309 United States
The permanent magnet (PM) Vernier machines enhance torque density and decrease cogging torque compared to conventional permanent magnet synchronous motor. This paper presents a novel fractional-slot H-shaped PM Vernie... 详细信息
来源: 评论
Literature Review on Packet Sniffing: Essential for Cybersecurity & Network Security  5
Literature Review on Packet Sniffing: Essential for Cybersec...
收藏 引用
5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks, ICICV 2024
作者: Shaw, Ranju Parveen, Suraiya Jamia Hamdard University Dept. of Computer Science Engineering with Specialization in Cyber Forensic Information Security Delhi India Faculty at Jamia Hamdard University Sest Department of Computer Science Engineering Delhi India
In the realm of cybersecurity and network security, the significance of monitoring and analyzing network traffic cannot be overstated Network packet sniffing, a technique employed to capture and inspect data packets t... 详细信息
来源: 评论
Real-Time Pothole Detection at night to prevent road accidents using YOLOV5  6
Real-Time Pothole Detection at night to prevent road acciden...
收藏 引用
6th International Conference on Recent Trends in Advance Computing, ICRTAC 2023
作者: Mandal, Gouranga De, Anurag Dey, Arindam Gangarapu, Sudeepthi Chekuru, Sharmila Rani Nandini, Chekuri Vellore Institute of Technology School of Computer Science and Engineering Andhra Pradesh 522237 India Vellore Institute of Technology School of Computer Science and Engineering with Specialization in Data Analytics Andhra Pradesh 522237 India
This article proposes a technique to create a pothole detection system that can operate both during the day and at night. This model was developed using the real-time object identification YOLO (You Only Look Once) te... 详细信息
来源: 评论
Red deer algorithm to detect the secret key of the monoalphabetic cryptosystem
收藏 引用
Soft Computing 2024年 第17-18期28卷 10569-10582页
作者: Jain, Ashish Bansal, Sulabh Das, Nripendra Narayan Gupta, Shyam Sunder Department of Information Technology School of Information Security and Data Science Manipal University Jaipur Jaipur303007 India Department of Computer Science and Engineering Amity School of Engineering and Technology Amity University Madhya Pradesh Gwalior474005 India
Encryption of a plaintext involves a secret key. The secret key of classical cryptosystems can be successfully determined by utilizing metaheuristic techniques. Monoalphabetic cryptosystem is one of the famous classic... 详细信息
来源: 评论
Climate Geoscience–Based Disaster Management in Healthcare Analysis by Markov Q-Transfer Adversarial with Cloud Computing
收藏 引用
Remote Sensing in Earth Systems sciences 2025年 第2期8卷 474-483页
作者: Srinivas, Jhade Rebecca, B. Bhargavi, Kovvuri N Swetha, Velma Reddy Spandana, S. Degala, Divya Priya Department of Computer Science and Engineering-Data Science KG Reddy College of Engineering and Technology Moinabad Telangana Hyderabad India Computer Science and Engineering Marri Laxman Reddy Institute of Technology and Management Telangana Dundigal 500043 India Department of CSE Aditya University AP Surampalem India Department of Computer Science and Engineering (AI-ML) Malla Reddy Engineering College Hyderabad India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Bowrampet Telangana Hyderabad India Department of Computer Science and Engineering MLR Institute of Technology Hyderabad India
Analysis and reaction to natural disasters have made extensive use of deep learning methods using semantic segmentation networks. These implementations’ foundation is based on convolutional neural networks (CNNs), wh... 详细信息
来源: 评论
Revisiting 30 years of the Network Time Protocol  24
Revisiting 30 years of the Network Time Protocol
收藏 引用
33rd Companion of the ACM World Wide Web Conference, WWW 2023
作者: Woo, Simon S. Computer Science and Engineering Department Applied Data Science Department Department of Artificial Intelligence Sungkyunkwan University Suwon Korea Republic of
Since the inception of the Internet and WWW, providing the time among multiple nodes on the Internet has been one of the most critical challenges. David Mills is the pioneer to provide time on the Internet, inventing ... 详细信息
来源: 评论
Dynamic Resource Allocation in Edge Computing via Deep Deterministic Policy Gradient Reinforcement Learning  3
Dynamic Resource Allocation in Edge Computing via Deep Deter...
收藏 引用
3rd International Conference on Integrated Circuits and Communication Systems, ICICACS 2025
作者: Gopal, Vidhya Surendar, U. Bajulunisha, A. Tamilselvi, M. Sathiyapriya, V. Saranya, N. Sona College of Technology Department of Computer Science and Engineering Salem India Srm institute of Science and Technology Department of Electronics and Communication Engineering Chennai India Chennai Institute of Technology Department of Computer Science and Engineering Kundrathur India Roever Engineering College Department of Computer Science and Engineering Perambalur India Knowledge Institute of Technology Department of Computer Science and Engineering Salem India Karpagam College of Engineering Department of Artificial Intelligence and Data Science Coimbatore India
The difficulty with dynamic and heterogeneous natured edge computing environments is resource provisioning. Reinforcement Learning (RL) can be promising to solve the problems of resource allocation under conditions of... 详细信息
来源: 评论
Evaluating the Effectiveness of Deep Convolutional Neural Networks for Picture Quality Prediction  27
Evaluating the Effectiveness of Deep Convolutional Neural Ne...
收藏 引用
27th International Symposium on Wireless Personal Multimedia Communications, WPMC 2024
作者: Jhingran, Sushant Chaturvedi, Rekha Bansal, Nidhi Malik, Suraj Sharda University Department of Computer Science and Engineering Greater Noida India Manipal University Jaipur School of Information Security and Data Science Department of Data Science and Engineering Rajasthan Jaipur India Pune India IIMT University Department of Computer Science and Engineering Uttar Pradesh Meerut India
Since the advent of smartphones, capturing images has become deeply embedded in human behavior, evolving into a fundamental part of daily life. Research into human perception of image quality is crucial as people freq... 详细信息
来源: 评论