咨询与建议

限定检索结果

文献类型

  • 8,897 篇 期刊文献
  • 8,371 篇 会议
  • 107 册 图书

馆藏范围

  • 17,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,738 篇 工学
    • 8,059 篇 计算机科学与技术...
    • 6,706 篇 软件工程
    • 2,461 篇 信息与通信工程
    • 1,810 篇 生物工程
    • 1,479 篇 控制科学与工程
    • 1,348 篇 生物医学工程(可授...
    • 1,139 篇 电气工程
    • 993 篇 光学工程
    • 781 篇 电子科学与技术(可...
    • 543 篇 化学工程与技术
    • 531 篇 机械工程
    • 433 篇 网络空间安全
    • 428 篇 安全科学与工程
    • 423 篇 仪器科学与技术
    • 417 篇 动力工程及工程热...
    • 396 篇 交通运输工程
  • 6,977 篇 理学
    • 3,683 篇 数学
    • 2,107 篇 生物学
    • 1,766 篇 物理学
    • 1,457 篇 统计学(可授理学、...
    • 706 篇 化学
    • 661 篇 系统科学
  • 3,069 篇 管理学
    • 1,659 篇 管理科学与工程(可...
    • 1,520 篇 图书情报与档案管...
    • 947 篇 工商管理
  • 1,413 篇 医学
    • 1,167 篇 临床医学
    • 1,048 篇 基础医学(可授医学...
    • 609 篇 公共卫生与预防医...
    • 589 篇 药学(可授医学、理...
  • 603 篇 法学
    • 521 篇 社会学
  • 347 篇 经济学
  • 299 篇 农学
  • 186 篇 教育学
  • 63 篇 文学
  • 25 篇 军事学
  • 20 篇 艺术学
  • 4 篇 哲学
  • 4 篇 历史学

主题

  • 642 篇 deep learning
  • 554 篇 accuracy
  • 493 篇 machine learning
  • 313 篇 feature extracti...
  • 306 篇 computational mo...
  • 292 篇 predictive model...
  • 272 篇 real-time system...
  • 256 篇 training
  • 237 篇 internet of thin...
  • 227 篇 support vector m...
  • 208 篇 semantics
  • 201 篇 optimization
  • 196 篇 data mining
  • 196 篇 convolutional ne...
  • 184 篇 reinforcement le...
  • 165 篇 artificial intel...
  • 159 篇 neural networks
  • 157 篇 data models
  • 156 篇 image segmentati...
  • 135 篇 deep neural netw...

机构

  • 428 篇 department of ph...
  • 399 篇 iccub universita...
  • 365 篇 horia hulubei na...
  • 356 篇 h.h. wills physi...
  • 297 篇 university of ch...
  • 295 篇 nikhef national ...
  • 291 篇 center for high ...
  • 290 篇 imperial college...
  • 289 篇 school of physic...
  • 288 篇 van swinderen in...
  • 287 篇 department of ph...
  • 287 篇 physik-institut ...
  • 287 篇 physikalisches i...
  • 285 篇 cavendish labora...
  • 285 篇 stfc rutherford ...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 school of physic...
  • 284 篇 institute of par...
  • 280 篇 henryk niewodnic...

作者

  • 250 篇 barter w.
  • 241 篇 beiter a.
  • 233 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 213 篇 blake t.
  • 205 篇 brundu d.
  • 197 篇 borsato m.
  • 191 篇 betancourt c.
  • 162 篇 bediaga i.
  • 157 篇 baker s.
  • 148 篇 amato s.
  • 148 篇 boettcher t.
  • 146 篇 albrecht j.
  • 144 篇 cattaneo m.
  • 144 篇 amhis y.
  • 144 篇 akar s.
  • 143 篇 baryshnikov f.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 15,318 篇 英文
  • 1,996 篇 其他
  • 84 篇 中文
  • 5 篇 法文
  • 4 篇 斯洛文尼亚文
  • 3 篇 德文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science with Data Science"
17375 条 记 录,以下是81-90 订阅
排序:
Two kinds of average approximation accuracy
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第2期9卷 481-490页
作者: Qingzhao Kong Wanting Wang Dongxiao Zhang Wenbin Zhang Department of Science Jimei UniversityXiamenChina Digital Fujian Big Data Modeling and Intelligent Computing Institute Jimei UniversityXiamenChina Department of Computer Science Michigan Technological UniversityHoughtonMichiganUSA
Rough set theory places great importance on approximation accuracy,which is used to gauge how well a rough set model describes a target ***,traditional approximation accuracy has limitations since it varies with chang... 详细信息
来源: 评论
Safety-certified Receding-horizon Motion Planning and Containment Control of Autonomous Surface Vehicles via Neurodynamic Optimization
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-13页
作者: Lyu, Guanghao Peng, Zhouhua Wang, Dan Wang, Jun School of Marine Electrical Engineering Dalian Maritime University Dalian China Department of Computer Science and the School of Data Science City University of Hong Kong Hong Kong
This paper addresses the safety-certified motion planning and containment control of under-actuated autonomous surface vehicles subject to model uncertainties, external disturbances, and input constraints in the prese... 详细信息
来源: 评论
SACNN-IDS: A self-attention convolutional neural network for intrusion detection in industrial internet of things
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第6期9卷 1398-1411页
作者: Mimonah Al Qathrady Safi Ullah Mohammed S.Alshehri Jawad Ahmad Sultan Almakdi Samar M.Alqhtani Muazzam A.Khan Baraq Ghaleb Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Computer Science Quaid-i-Azam UniversityIslamabadPakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghUK ICESCO Chair Big Data Analytics and Edge Computing Quaid-i-Azam UniversityIslamabadPakistan
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial *** IIoT nodes operate confidential data(such as medical,tr... 详细信息
来源: 评论
Automated face recognition using deep learning technique and center symmetric multivariant local binary pattern
收藏 引用
Neural Computing and Applications 2025年 第1期37卷 263-281页
作者: Sekhar, J.C. Josephson, P. Joel Chinnasamy, A. Maheswari, M. Sankar, S. Kalangi, Ruth Ramya Department of Computer Science and Engineering NRI Institute of Technology Andhra Pradesh Guntur India Department of Electronics and Communication Engineering Malla Reddy Engineering College Telangana Hyderabad India Department of Data Science and Business Systems School of Computing SRMIST Kattankulathur Chennai India Department of Computer Science and Engineering Panimalar Engineering College Chennai India Department of Computer Science and Engineering Saveetha School of Engineering SIMATS Chennai India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vijayawada India
Researchers have recently created several deep learning strategies for various tasks, and facial recognition has made remarkable progress in employing these techniques. Face recognition is a noncontact, nonobligatory,... 详细信息
来源: 评论
The Implicit Bias of Adam on Separable data  38
The Implicit Bias of Adam on Separable Data
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhang, Chenyang Zou, Difan Cao, Yuan Department of Statistics and Actuarial Science School of Computing and Data Science The University of Hong Kong Hong Kong Department of Computer Science School of Computing and Data Science Institute of Data Science The University of Hong Kong Hong Kong Department of Statistics and Actuarial Science School of Computing and Data Science Department of Mathematics The University of Hong Kong Hong Kong
Adam has become one of the most favored optimizers in deep learning problems. Despite its success in practice, numerous mysteries persist regarding its theoretical understanding. In this paper, we study the implicit b...
来源: 评论
CONTESTS: a Framework for Consistency Testing of Span Probabilities in Language Models
CONTESTS: a Framework for Consistency Testing of Span Probab...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Wagner, Eitan Slavutsky, Yuli Abend, Omri School of Computer Science and Engineering Department of Statistics and Data Science Hebrew University of Jerusalem Israel
Although language model scores are often treated as probabilities, their reliability as probability estimators has mainly been studied through calibration, overlooking other aspects. In particular, it is unclear wheth... 详细信息
来源: 评论
Unsupervised machine learning approach for tailoring educational content to individual student weaknesses
收藏 引用
High-Confidence Computing 2024年 第4期4卷 91-104页
作者: Shabab Intishar Rahman Shadman Ahmed Tasnim Akter Fariha Ammar Mohammad Muhammad Nayeem Mubasshirul Haque Sriram Chellappan Jannatun Noor Department of Computer Science and Engineering BRAC UniversityDhaka 1212Bangladesh Department of Computer Science and Engineering University of South FloridaFL 33620USA Computing for Sustainability and Social Good(C2SG)Research Group Department of Computer Science and EngineeringSchool of Data and SciencesBRAC UniversityDhaka 1212Bangladesh
By analyzing data gathered through Online Learning(OL)systems,data mining can be used to unearth hidden relationships between topics and trends in student ***,in this paper,we show how data mining techniques such as c... 详细信息
来源: 评论
Part-Whole Relational Few-Shot 3D Point Cloud Semantic Segmentation
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3021-3039页
作者: Shoukun Xu Lujun Zhang Guangqi Jiang Yining Hua Yi Liu School of Computer Science and Artificial Intelligence Aliyun School of Big Data and School of SoftwareChangzhou UniversityChangzhou213164China Department of Computer Science University of AberdeenKing’s CollegeAberdeenAB243FXUK
This paper focuses on the task of few-shot 3D point cloud semantic *** some progress,this task still encounters many issues due to the insufficient samples given,e.g.,incomplete object segmentation and inaccurate sema... 详细信息
来源: 评论
Sparse representation scheme with enhanced medium pixel intensity for face recognition
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第1期9卷 116-127页
作者: Xuexue Zhang Yongjun Zhang Zewei Wang Wei Long Weihao Gao Bob Zhang State Key Laboratory of Public Big Data Institute for Artificial IntelligenceCollege of Computer Science and TechnologyGuizhou UniversityGuiyangGuizhouChina Department of Computer and Information Science University of MacaoAvenida da UniversidadeTaipaMacaoChina
Sparse representation is an effective data classification algorithm that depends on the known training samples to categorise the test *** has been widely used in various image classification *** in sparse representati... 详细信息
来源: 评论
Deep learning-based method for detection of copy-move forgery in videos
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8451-8464页
作者: Elbarougy, Reda Abdelfatah, Osama Behery, G.M. El-Badry, Noha M. Department of Artificial Intelligence and Data Science College of Computer Science and Engineering University of Ha’il Ha’il81481 Saudi Arabia Department of Information Technology Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Computer Science Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Mathematics Faculty of Science Damietta University New Damietta Kafr Saad Egypt
Video forgery is one of the most serious problems affecting the credibility and reliability of video content. Therefore, detecting video forgery presents a major challenge for researchers due to the diversity of forge... 详细信息
来源: 评论