咨询与建议

限定检索结果

文献类型

  • 8,859 篇 期刊文献
  • 8,411 篇 会议
  • 107 册 图书

馆藏范围

  • 17,377 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,700 篇 工学
    • 7,997 篇 计算机科学与技术...
    • 6,699 篇 软件工程
    • 2,447 篇 信息与通信工程
    • 1,797 篇 生物工程
    • 1,419 篇 控制科学与工程
    • 1,338 篇 生物医学工程(可授...
    • 1,114 篇 电气工程
    • 993 篇 光学工程
    • 777 篇 电子科学与技术(可...
    • 542 篇 化学工程与技术
    • 529 篇 机械工程
    • 434 篇 网络空间安全
    • 426 篇 安全科学与工程
    • 419 篇 仪器科学与技术
    • 410 篇 动力工程及工程热...
    • 389 篇 交通运输工程
  • 6,926 篇 理学
    • 3,682 篇 数学
    • 2,100 篇 生物学
    • 1,742 篇 物理学
    • 1,466 篇 统计学(可授理学、...
    • 686 篇 化学
    • 659 篇 系统科学
  • 3,057 篇 管理学
    • 1,658 篇 管理科学与工程(可...
    • 1,514 篇 图书情报与档案管...
    • 943 篇 工商管理
  • 1,384 篇 医学
    • 1,149 篇 临床医学
    • 1,038 篇 基础医学(可授医学...
    • 606 篇 公共卫生与预防医...
    • 590 篇 药学(可授医学、理...
  • 608 篇 法学
    • 524 篇 社会学
  • 345 篇 经济学
  • 297 篇 农学
  • 185 篇 教育学
  • 61 篇 文学
  • 25 篇 军事学
  • 20 篇 艺术学
  • 5 篇 哲学
  • 5 篇 历史学

主题

  • 645 篇 deep learning
  • 582 篇 accuracy
  • 500 篇 machine learning
  • 322 篇 feature extracti...
  • 308 篇 computational mo...
  • 299 篇 predictive model...
  • 284 篇 real-time system...
  • 259 篇 training
  • 239 篇 internet of thin...
  • 232 篇 support vector m...
  • 205 篇 optimization
  • 205 篇 semantics
  • 200 篇 data mining
  • 196 篇 convolutional ne...
  • 183 篇 reinforcement le...
  • 165 篇 data models
  • 162 篇 neural networks
  • 159 篇 image segmentati...
  • 157 篇 artificial intel...
  • 135 篇 deep neural netw...

机构

  • 428 篇 department of ph...
  • 399 篇 iccub universita...
  • 360 篇 horia hulubei na...
  • 353 篇 h.h. wills physi...
  • 297 篇 university of ch...
  • 293 篇 nikhef national ...
  • 291 篇 center for high ...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 287 篇 van swinderen in...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 287 篇 physikalisches i...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 school of physic...
  • 284 篇 institute of par...
  • 280 篇 henryk niewodnic...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 233 篇 bellee v.
  • 222 篇 casse g.
  • 214 篇 bowcock t.j.v.
  • 214 篇 blake t.
  • 204 篇 brundu d.
  • 194 篇 borsato m.
  • 192 篇 betancourt c.
  • 159 篇 bediaga i.
  • 158 篇 baker s.
  • 149 篇 amato s.
  • 148 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 baryshnikov f.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 13,719 篇 英文
  • 3,600 篇 其他
  • 96 篇 中文
  • 7 篇 斯洛文尼亚文
  • 5 篇 法文
  • 3 篇 德文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science with Data Science"
17377 条 记 录,以下是4581-4590 订阅
排序:
A Blockchain-Based Intelligent IoT Communication System for Enhanced Security, Reliability, and Efficiency
A Blockchain-Based Intelligent IoT Communication System for ...
收藏 引用
Advanced Computing Technologies (ICoACT), International Conference on
作者: Dinesh Kumar K J. Gobinath Jayavadivel Ravi S. Saravanakumar Senthil P B. Prabhu Shankar Department of Computer Science and Engineering Vel Tech University Chennai India Department of Computer Science and Engineering Rajiv Gandhi College of Engineering Chennai India School of Computer Science and Engineering Presidency University Bengaluru India Department of Information Technology Paavai Engineering College Paachal India Department of Artificial Intelligence and Data Science T.J.S.Engineering college Chennai India Department of Artificial Intelligence and Machine Learning Vel Tech University Chennai India
This research proposes a new approach for developing and implementing a smart communication system of IoT through developmental blockchain technology. Regarding the proposed solution, it is suggested that a distribute... 详细信息
来源: 评论
Actuation Sequence Tampering Attack Detection on Field-Level Micro-Electrode Dot Arrays Based on 2-Layer Authentication  23
Actuation Sequence Tampering Attack Detection on Field-Level...
收藏 引用
Proceedings of the 2023 13th International Conference on Communication and Network Security
作者: Xiaodong Guo Chenxi Lyu Zhenyi Chen Xiaoding Wang Ruishen Bao Chen Dong College of Computer and Big Data Fuzhou University China Department of Computer Science and Engineering University of South Florida USA College of Computer and Cyber Security Fujian Normal University China
As a next-generation digital microfluidic biochip (DMFB) platform, micro-electrode-dot -array (MEDA) play an important role in the biochemical industry with more advanced fluidic manipulation and higher reliability. A... 详细信息
来源: 评论
Digital Twin-based Dynamic Resource Provisioning Using Deep Q-Network on 6G-enabled Mobile Edge Networks
Digital Twin-based Dynamic Resource Provisioning Using Deep ...
收藏 引用
International Communication Systems and Networks and Workshops, COMSNETS
作者: Suja A. Alex Neha Singh Mainak Adhikari Department of Information Technology St. Xavier’s Catholic College of Engineering Nagercoil India Department of Computer Science Indian Institute of Information Technology Lucknow Lucknow India School of Data Science Indian Institute of Science Education and Research Thiruvananthapuram Thiruvananthapuram India
The advancement of Digital Twin (DT) technology has enabled the creation of digital replicas of physical entitics, significantly enhancing the functionality and performance of mobile networks. However, this innovative... 详细信息
来源: 评论
Artificial Intelligence Techniques for the Performance Analysis of Indian Mutual Fund Industry and Market Trends
Artificial Intelligence Techniques for the Performance Analy...
收藏 引用
Mobile Computing and Sustainable Informatics (ICMCSI), International Conference on
作者: S. Silvia Priscila M. Sakthivanitha M. Yogeshwari T. Shirley Devakirubai M. Mohamed Sirajudeen Department of Computer Science Bharath Institute of Higher Education and Research Tamil Nadu India Department of Information Technology VEL'S Institute of Science Technology and Advanced Studies Chennai Tamil Nadu India Department of Data Analyst Saveetha Liberal Arts and Science College Chennai Tamil Nadu India Department of Commerce Madras Christian College Chennai Tamil Nadu India Department of Computer Science Nilgiri College of Arts and Science (Autonomous) The Nilgiris Tamil Nadu India
A basic examination of a mutual fund's strategy (growth or value), median market cap, rolling returns, standard deviation, and maybe a portfolio breakdown by industry, geography, and other factors make up a typica... 详细信息
来源: 评论
Cross Space and Time: A Spatio-Temporal Unitized Model for Traffic Flow Forecasting
arXiv
收藏 引用
arXiv 2024年
作者: Ruan, Weilin Wang, Wenzhuo Zhong, Siru Chen, Wei Liu, Li Liang, Yuxuan The Hong Kong University of Science and Technology Guangzhou China The Computer Science Department Jinan University Guangzhou China The School of Big Data and Software Engineering Chongqing University Chongqing China
Predicting spatio-temporal traffic flow presents significant challenges due to complex interactions between spatial and temporal factors. Existing approaches often address these dimensions in isolation, neglecting the... 详细信息
来源: 评论
Strengthening Authentication: The Role of Multi-Level Hashing in OSPA Protocol
Strengthening Authentication: The Role of Multi-Level Hashin...
收藏 引用
IoT Based Control Networks and Intelligent Systems (ICICNIS), International Conference on
作者: S. Hariharasudhan Vineetha Varghese K Malarvizhi S.P. Santhoshkumar T. Nalini D. Vikram Department of Computer Science and Engineering Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Avadi Chennai Department of Computer Science and Engineering Rathinam Technical Campus Coimbatore India Department of Computer Science al Business Systems Jct College of Engineering and Technology Coimbatore India Department of Computer Science and Engineering School of Computing Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Avadi Chennai Department of computer science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India Department of Artificial Intelligence Data Science Rathinam Technical Campus Coimbatore India
Authentication is a crucial step in the cyber security process that confirms user identities. Even though they are widely used, traditional password based techniques are frequently vulnerable to attacks like guessing ... 详细信息
来源: 评论
An IoT-based Bearded Dragon Enclosure Integrating YOLO Object Detection for Monitoring Food and Cleanliness
An IoT-based Bearded Dragon Enclosure Integrating YOLO Objec...
收藏 引用
IEEE Global Conference on Consumer Electronics (GCCE)
作者: Nanmanat Varisthanist Thanapat Tardtong Kittitach Jadee Krittakom Srijiranon Thammasat University Research Unit in Data Innovation and Artificial Intelligence Department of Computer Science Faculty of Science and Technology Thammasat University Pathumthani Thailand
Among exotic reptiles, bearded dragons (Pogona) are popular pets. As ectotherms, bearded dragons require special food and controlled environments, including temperature, humidity, ultraviolet light, and cleanliness. T...
来源: 评论
UAV-Enabled Relaying and Edge Computing: Hybrid Network Optimization
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Ma, Bo Ye, Jiawei Feng, Shaohan Li, Chuanhuang Niyato, Dusit Kim, Dong In Hangzhou310018 China Nanyang Technological University College of Computing and Data Science 639798 Singapore Sungkyunkwan University Department of Electrical and Computer Engineering Suwon16419 Korea Republic of
This paper exploits an Unmanned Aerial Vehicle assisted Mobile Edge Computing (UAV-MEC) system to meet the computation demand of User Equipments (UEs). However, in conventional UAV-MEC architecture, a UAV is dedicated... 详细信息
来源: 评论
Smaller Language Models are capable of selecting Instruction-Tuning Training data for Larger Language Models
arXiv
收藏 引用
arXiv 2024年
作者: Mekala, Dheeraj Nguyen, Alex Shang, Jingbo Department of Computer Science & Engineering University of California San Diego United States Halıcıoğlu Data Science Institute University of California San Diego United States
Instruction-tuning language models has become a crucial step in aligning them for general use. Typically, this process involves extensive training on large datasets, incurring high training costs. In this paper, we in... 详细信息
来源: 评论
Enhancing Human Activity Recognition Through Sensor Fusion And Hybrid Deep Learning Model
Enhancing Human Activity Recognition Through Sensor Fusion A...
收藏 引用
Acoustics, Speech, and Signal Processing Workshops (ICASSPW), IEEE International Conference on
作者: Adane Nega Tarekegn Mohib Ullah Faouzi Alaya Cheikh Muhammad Sajjad Department of Computer Science The Software Data and Digital Environments (SDDE) Research Group Norwegian University of Science and Technology (NTNU) Gjøvik Norway
Wearable-based human activity recognition (HAR) is essential for several applications, such as health monitoring, physical training, and rehabilitation. However, most HAR systems presently depend on a single sensor, t...
来源: 评论