咨询与建议

限定检索结果

文献类型

  • 6,318 篇 会议
  • 6,148 篇 期刊文献
  • 86 册 图书

馆藏范围

  • 12,552 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,670 篇 工学
    • 5,523 篇 计算机科学与技术...
    • 4,602 篇 软件工程
    • 1,898 篇 信息与通信工程
    • 1,288 篇 生物工程
    • 1,049 篇 控制科学与工程
    • 1,037 篇 电气工程
    • 930 篇 生物医学工程(可授...
    • 815 篇 光学工程
    • 759 篇 电子科学与技术(可...
    • 418 篇 机械工程
    • 413 篇 化学工程与技术
    • 359 篇 仪器科学与技术
    • 340 篇 动力工程及工程热...
    • 321 篇 交通运输工程
    • 321 篇 网络空间安全
    • 313 篇 安全科学与工程
  • 5,073 篇 理学
    • 2,440 篇 数学
    • 1,559 篇 物理学
    • 1,507 篇 生物学
    • 964 篇 统计学(可授理学、...
    • 541 篇 化学
    • 450 篇 系统科学
  • 2,122 篇 管理学
    • 1,250 篇 管理科学与工程(可...
    • 946 篇 图书情报与档案管...
    • 690 篇 工商管理
  • 938 篇 医学
    • 780 篇 临床医学
    • 700 篇 基础医学(可授医学...
    • 407 篇 公共卫生与预防医...
    • 406 篇 药学(可授医学、理...
  • 412 篇 法学
    • 358 篇 社会学
  • 253 篇 经济学
  • 212 篇 农学
  • 110 篇 教育学
  • 51 篇 文学
  • 18 篇 军事学
  • 17 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 483 篇 deep learning
  • 472 篇 accuracy
  • 369 篇 machine learning
  • 300 篇 feature extracti...
  • 271 篇 computational mo...
  • 247 篇 real-time system...
  • 231 篇 predictive model...
  • 227 篇 training
  • 219 篇 internet of thin...
  • 168 篇 support vector m...
  • 166 篇 convolutional ne...
  • 160 篇 optimization
  • 160 篇 artificial intel...
  • 154 篇 neural networks
  • 141 篇 reinforcement le...
  • 138 篇 semantics
  • 134 篇 data models
  • 127 篇 data mining
  • 110 篇 security
  • 109 篇 image segmentati...

机构

  • 426 篇 department of ph...
  • 399 篇 iccub universita...
  • 399 篇 horia hulubei na...
  • 382 篇 h.h. wills physi...
  • 336 篇 van swinderen in...
  • 306 篇 yandex school of...
  • 298 篇 university of ch...
  • 296 篇 school of physic...
  • 293 篇 nikhef national ...
  • 291 篇 imperial college...
  • 290 篇 cavendish labora...
  • 289 篇 center for high ...
  • 286 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 243 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 215 篇 blake t.
  • 214 篇 bowcock t.j.v.
  • 210 篇 borsato m.
  • 209 篇 betancourt c.
  • 205 篇 brundu d.
  • 194 篇 bediaga i.
  • 184 篇 amato s.
  • 175 篇 baryshnikov f.
  • 172 篇 boettcher t.
  • 159 篇 baker s.
  • 153 篇 braun s.
  • 149 篇 borisyak m.
  • 145 篇 bizzeti a.
  • 144 篇 albrecht j.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman

语言

  • 11,561 篇 英文
  • 937 篇 其他
  • 63 篇 中文
  • 4 篇 法文
  • 3 篇 德文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer and Data Engineering"
12552 条 记 录,以下是321-330 订阅
排序:
Youth Vaping in the Digital Age: A Systematic Review of Technological Interventions for Prevention and Cessation  25
Youth Vaping in the Digital Age: A Systematic Review of Tech...
收藏 引用
2025 ACM International Conference on Supporting Group Work, GROUP Companion 2025
作者: Milkowski, Maria Olesk, Johanna Asfura, Dominique Martel Barco, Cassandra Cervera, Cesar Wachira, Mary Sisk, Matthew Balke, Alissa Purushotham, Diana Williams, Renata Badillo-Urquiola, Karla Department of Computer Science and Engineering University of Notre Dame Notre DameIN United States University of Notre Dame Notre DameIN United States Lucy Family Institute for Data & Society University of Notre Dame Notre DameIN United States St. Joseph County Department of Health South BendIN United States
E-cigarettes are the most popular tobacco product among youth, yet existing prevention and cessation interventions are primarily adult-centered and adapted from general tobacco use, with limited evidence for their eff... 详细信息
来源: 评论
A Survey of Advanced Algorithms and Experimental Approaches for Kidney Abnormality Detection in Ultrasound Imaging
A Survey of Advanced Algorithms and Experimental Approaches ...
收藏 引用
Electronics and Renewable Systems (ICEARS), International Conference on
作者: N. Thulasi Chitra Sreenivasulu Gogula Sukla Satapathy Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Hyderabad Telangana India Department of Computer Science and Engineering(Data Science) Vardhaman College of Engineering Hyderabad Telangana India Department of Artificial Intelligence and Machine Learning Koneru Lakshmaiah Education Foundation Hyderabad Telangana India
Kidney abnormalities, such as cysts, tumors, and stones, are critical health concerns requiring early and precise detection. This study reviews advanced algorithms and experimental approaches for kidney abnormality de... 详细信息
来源: 评论
Precision Land Use and Land Cover Mapping with a High-Accuracy Time Series LSTM Model
Precision Land Use and Land Cover Mapping with a High-Accura...
收藏 引用
IEEE Students' Conference on Electrical, Electronics and computer Science (SCEECS)
作者: Adla Aryan Prakash RV Srinivas Aluvala Venigalla Shashank Chowdary Department of Artificial Intelligence & Machine Learning Ardhaman College of Engineering Hyderabad Telangana India Department of Computer Science & Artificial Intelligence SR University Warangal Telangana India Department of Computer Science and Engineering (Data Science) Rajeev Gandhi Memorial College of Engineering and Technology Nandyal India
This paper introduces a machine-learning-based LULC classifying model developed with a time series data set, trained on a diverse set of agriculture and non-agricultural classes. It used a strong generalization capabi... 详细信息
来源: 评论
Channel-wise attention based binarization for CNN Architectures
Channel-wise attention based binarization for CNN Architectu...
收藏 引用
Emerging Systems and Intelligent Computing (ESIC), International Conference on
作者: Ipsita Paul Mainak Bandyopadhyay Satya Ranjan Dash Tanjim Taharat Aurpa School of Computer Engineering KIIT D.U. Bhubaneswar India School of Computer Applications KIIT D.U. Bhubaneswar India Department of Data Science Engineering BSMR Digital University Bangladesh
Attention mechanisms are known to effectively increase the performance of a model by focusing on specific sections of the input while executing a task. Squeeze and Excitation module (SE-Net) and Efficient channel atte... 详细信息
来源: 评论
Optimizing Cloud Security with CNN and XGBoost Models for Intrusion Detection Systems
Optimizing Cloud Security with CNN and XGBoost Models for In...
收藏 引用
Integrated Circuits and Communication Systems (ICICACS), IEEE International Conference on
作者: Amit Karbhari Mogal V. Anitha Preeti Nitin Bhatt Kriti Srivasatava S. Rukmani Devi Anvesh Perada Department of Computer Science and Application MVP Samaj's CMCS College Nashik India Department of Computer Science and Engineering School of Engineering and Technology Dhanalakshmi Srinivasan University Trichy India Department of Electronics & Communication Engineering IIMT College of Engineering Greater Noida India Department of Computer Science and Engineering (Data Science) Dwarkadas J Sanghvi College of Engineering Vile Parle India Department of Computer Science Saveetha College of Liberal Arts and Sciences SIMATS Deemed to be University Chennai India Department of Electrical and Computer Engineering Drexel University Philadelphia United States of America
Cloud computing and Internet growth have simplified certain formerly difficult activities. This advancement has also revealed many security weaknesses. Due to cyberattacks, organizations need Intrusion Detection Syste... 详细信息
来源: 评论
Real-Time Energy Efficient Communication for Large-Scale Industrial Internet of Things  2nd
Real-Time Energy Efficient Communication for Large-Scale Ind...
收藏 引用
2nd International Conference on Sustainability: Developments and Innovations, ICSDI 2024
作者: Khan, Musfira Khan, Muazzam A. Farman, Haleem Malik, Asad W. Ramzan, Muhammad Sher Islamabad Pakistan Department of Computer Science Quaid-I-Azam University Islamabad Pakistan ICESCO Chair for Big Data Analytics and Edge Computing Quaid-I-Azam University Islamabad Pakistan Smart Systems Engineering Lab College of Engineering Prince Sultan University Riyadh Saudi Arabia King Abdulaziz University Jeddah Saudi Arabia
Industrial Internet of Things (IIoTs) comprises large-scale sensors deployed to monitor and control the system. Deploying IoT devices presents challenges due to frequent disconnections and sudden power drainage in int... 详细信息
来源: 评论
Channel Gain Map Estimation for Wireless Networks Based on Scatterer Model
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Sun, He Zhu, Lipeng Zhang, Rui National University of Singapore Department of Electrical and Computer Engineering 117583 Singapore The Chinese University of Hong Kong School of Science and Engineering Shenzhen Research Institute of Big Data Guangdong Shenzhen518172 China
Channel gain map (CGM) contains crucial large-scale fading information regarding wireless channels at specific frequency bands in wireless networks. Traditional CGM construction methods require either detailed propaga... 详细信息
来源: 评论
Enhancing malware detection performance: leveraging K-Nearest Neighbors with Firefly Optimization Algorithm
收藏 引用
Multimedia Tools and Applications 2025年 第12期84卷 10071-10094页
作者: Al Saaidah, Adeeb Abualhaj, Mosleh M. Shambour, Qusai Y. Abu-Shareha, Ahmad Adel Abualigah, Laith Al-Khatib, Sumaya N. Alraba’nah, Yousef H Department of Networks and Cybersecurity Al-Ahliyya Amman University Amman Jordan Department of Software Engineering Al-Ahliyya Amman University Amman Jordan Department of Data Science and Artificial Intelligence Al-Ahliyya Amman University Amman Jordan Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman19328 Jordan Research Center University of Tabuk Tabuk71491 Saudi Arabia MEU Research Unit Middle East University Amman11831 Jordan Department of Electrical and Computer Engineering Lebanese American University Byblos13-5053 Lebanon College of Engineering Yuan Ze University Taoyuan32003 Taiwan Applied Science Research Center Applied Science Private University Amman11931 Jordan School of Engineering and Technology Sunway University Malaysia Petaling Jaya27500 Malaysia
Malware detection plays a crucial role in ensuring robust cybersecurity amidst the ever-evolving cyber threats. This research paper delves into the realm of machine learning (ML) algorithms for malware detection, with... 详细信息
来源: 评论
NOMA Attack Prediction in Large-Scale Networks Using Non-Linear Chaotic Belief Mechanism
NOMA Attack Prediction in Large-Scale Networks Using Non-Lin...
收藏 引用
Intelligent data Communication Technologies and Internet of Things (IDCIoT), International Conference on
作者: K. Sangeetha M. Suguna Jebakumar Immanuel D SA Suje Department of Computer Science and Engineering SNS College of Technology Coimbatore Tamil Nadu India Department of Artificial Intelligence and Data Science Karpagam Institute of Technology Coimbatore Tamil Nadu India Department of Artificial Intelligence and Data Science Nandha Engineering College Erode Tamil Nadu
Non-Orthogonal Multiple Access (NOMA) systems are becoming relevant in the fast-expanding terrain of large-scale networks because of their efficiency in concurrently managing many users. This is true since NOMA system... 详细信息
来源: 评论
Utilization of Machine Learning Algorithms to Monitor the Growth Path of Fishes in Marine Aquaculture  15th
Utilization of Machine Learning Algorithms to Monitor the Gr...
收藏 引用
15th International Conference on Soft Computing and Pattern Recognition, SoCPaR 2023 and 14th World Congress on Nature and Biologically Inspired Computing, NaBIC 2023
作者: Ajibade, Samuel-Soma M. Essah, Richard Tapales, Catherine P. Antecristo, Charmaine P. Cababat, Feliciana G. Oyebode, Oluwadare Joshua Akintoye, Kayode A. Department of Data Science and Artificial Intelligence Faculty of Engineering and Technology Sunway University Selangor Malaysia Department of Computer and Information Sciences Sunway University Selangor Malaysia Department of Computer Science and Engineering Chandigarh University Punjab India College of Arts and Sciences Cebu Technological University Cebu Moalboal Philippines Cebu Technological University Cebu Moalboal Philippines College of Education Cebu Technological University Cebu Moalboal Philippines Department of Civil and Environmental Engineering ABUAD Ado Ekiti Nigeria Department of Computer Science The Federal Polytechnic Ekiti State Ado Ekiti Nigeria
Under a realistic cellular metabolic economic model of Nile tilapia, this work investigates Q-learning fish growth trajectory analysis. we offer two Q-learning data mining algorithms the best management policy using s... 详细信息
来源: 评论