咨询与建议

限定检索结果

文献类型

  • 8,978 篇 期刊文献
  • 8,545 篇 会议
  • 107 册 图书

馆藏范围

  • 17,630 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,865 篇 工学
    • 8,159 篇 计算机科学与技术...
    • 6,787 篇 软件工程
    • 2,536 篇 信息与通信工程
    • 1,803 篇 生物工程
    • 1,510 篇 控制科学与工程
    • 1,351 篇 生物医学工程(可授...
    • 1,176 篇 电气工程
    • 1,005 篇 光学工程
    • 801 篇 电子科学与技术(可...
    • 550 篇 化学工程与技术
    • 545 篇 机械工程
    • 474 篇 网络空间安全
    • 442 篇 安全科学与工程
    • 437 篇 仪器科学与技术
    • 434 篇 动力工程及工程热...
    • 403 篇 交通运输工程
  • 7,043 篇 理学
    • 3,724 篇 数学
    • 2,112 篇 生物学
    • 1,770 篇 物理学
    • 1,476 篇 统计学(可授理学、...
    • 715 篇 化学
    • 664 篇 系统科学
  • 3,136 篇 管理学
    • 1,709 篇 管理科学与工程(可...
    • 1,537 篇 图书情报与档案管...
    • 959 篇 工商管理
  • 1,430 篇 医学
    • 1,173 篇 临床医学
    • 1,054 篇 基础医学(可授医学...
    • 636 篇 公共卫生与预防医...
    • 593 篇 药学(可授医学、理...
  • 625 篇 法学
    • 539 篇 社会学
  • 361 篇 经济学
  • 300 篇 农学
  • 190 篇 教育学
  • 63 篇 文学
  • 26 篇 军事学
  • 20 篇 艺术学
  • 5 篇 哲学
  • 5 篇 历史学

主题

  • 671 篇 deep learning
  • 589 篇 accuracy
  • 515 篇 machine learning
  • 325 篇 feature extracti...
  • 308 篇 computational mo...
  • 297 篇 predictive model...
  • 292 篇 real-time system...
  • 264 篇 training
  • 247 篇 internet of thin...
  • 234 篇 support vector m...
  • 213 篇 optimization
  • 203 篇 data mining
  • 202 篇 semantics
  • 197 篇 convolutional ne...
  • 188 篇 reinforcement le...
  • 170 篇 data models
  • 164 篇 neural networks
  • 163 篇 image segmentati...
  • 157 篇 artificial intel...
  • 137 篇 reliability

机构

  • 427 篇 department of ph...
  • 397 篇 iccub universita...
  • 358 篇 horia hulubei na...
  • 349 篇 h.h. wills physi...
  • 298 篇 university of ch...
  • 291 篇 nikhef national ...
  • 289 篇 center for high ...
  • 288 篇 imperial college...
  • 287 篇 school of physic...
  • 285 篇 van swinderen in...
  • 285 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 physikalisches i...
  • 283 篇 cavendish labora...
  • 283 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 oliver lodge lab...
  • 283 篇 school of physic...
  • 282 篇 institute of par...
  • 278 篇 henryk niewodnic...

作者

  • 249 篇 barter w.
  • 240 篇 beiter a.
  • 231 篇 bellee v.
  • 221 篇 casse g.
  • 213 篇 bowcock t.j.v.
  • 213 篇 blake t.
  • 203 篇 brundu d.
  • 191 篇 borsato m.
  • 189 篇 betancourt c.
  • 159 篇 baker s.
  • 156 篇 bediaga i.
  • 147 篇 amato s.
  • 146 篇 boettcher t.
  • 144 篇 albrecht j.
  • 142 篇 a. jawahery
  • 142 篇 m. gandelman
  • 142 篇 t. gershon
  • 142 篇 r. mountain
  • 142 篇 f. maciuc
  • 142 篇 n. bondar

语言

  • 12,469 篇 英文
  • 5,110 篇 其他
  • 103 篇 中文
  • 7 篇 斯洛文尼亚文
  • 5 篇 法文
  • 3 篇 德文
  • 1 篇 俄文
检索条件"机构=Department of Computer in Data Science"
17630 条 记 录,以下是461-470 订阅
排序:
CNN-DBO: Dung Beetle Optimization Based Urban Area Change Detection Using Satellite Images
CNN-DBO: Dung Beetle Optimization Based Urban Area Change De...
收藏 引用
2025 IEEE International Conference on Computational, Communication and Information Technology, ICCCIT 2025
作者: Pujari, Jambukeshwar Wasim, Javed Tripathi, Aprna Mangalayatan University Department of Computer Engineering and Applications Aligarh20221385 India Mangalayatan University Department of Computer Engineering and Applications Aligarh India Manipal University Department of Data Science Engineering Jaipur India
In recent years, Geographic Information Systems (GIS) have garnered a significant deal of interest for their ability to detect changes in metropolitan areas. One of the uses of change detection in satellite photograph... 详细信息
来源: 评论
An effective compressed image authentication scheme based on N-variant AMBTC
收藏 引用
Multimedia Tools and Applications 2024年 第2期83卷 3801-3829页
作者: Su, Guo-Dong Chang, Chin-Chen Lin, Chia-Chen School of Big Data and Artificial Intelligence Fujian Polytechnic Normal University Fuzhou350300 China Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Road Seatwen Taichung40724 Taiwan Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung41170 Taiwan
Image authentication is one technique that provides integrity protection for digital images, making them sensitive to any slight modification. Recently, the detectability of absolute moment block truncation coding (AM... 详细信息
来源: 评论
Explainable Artificial Intelligence for Education: A Real Case of a University Subject Switched to Python  1
收藏 引用
16th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2023 and 14th International Conference on EUropean Transnational Education, ICEUTE 2023
作者: Melgar-García, Laura Troncoso-García, Ángela Gutiérrez-Avilés, David Torres, José Francisco Troncoso, Alicia Data Science & Big Data Lab Pablo de Olavide University Seville41013 Spain Department of Computer Science University of Seville Seville Spain
Explainable artificial intelligence aims to describe an artificial intelligence model and its predictions. In this research work, this technique is applied to a subject of a computer science degree where the programmi... 详细信息
来源: 评论
Localization and Local Motion Magnification of Pulsatile Regions in Endoscopic Surgery Videos  1
收藏 引用
30th International Conference on MultiMedia Modeling, MMM 2024
作者: Zheng, Honglei Fan, Wenkang Chen, Yinran Luo, Xiongbiao Department of Computer Science and Technology Xiamen University Xiamen China National Institute for Data Science in Health and Medicine Xiamen University Xiamen China
Localization of neurovascular bundles or vessels is critical in endoscopic surgery. It still remains challenging to identify neurovascular bundles and vessels due to limited field-of-view and tactile perception loss. ... 详细信息
来源: 评论
Provably Secure Efficient Key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J. F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh12311 Saudi Arabia International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of Key Laboratory of Computing Power Network and Information Security Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Ministry of Education Shandong Computer Science Center Jinan250353 China
Intelligent supply line surveillance is critical for modern smart grids (SGs). Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data conti... 详细信息
来源: 评论
ABLE: Personalized Disability Support with Politeness and Empathy Integration
ABLE: Personalized Disability Support with Politeness and Em...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Mishra, Kshitij Burja, Manisha Ekbal, Asif Department of Computer Science and Engineering Indian Institute of Technology Patna India School of AI and Data Science Indian Institute of Technology Jodhpur India
In today's dynamic world, providing inclusive and personalized support for individuals with physical disabilities is imperative. With diverse needs and preferences, tailored assistance according to user personas i... 详细信息
来源: 评论
Anatomization of Neural Networks based models for Semantic Analysis of Tabular dataset  9
Anatomization of Neural Networks based models for Semantic A...
收藏 引用
9th IEEE International Conference for Convergence in Technology, I2CT 2024
作者: Bharath, B. Sai Bollineni, Jahnavi Mandala, Sandeep Preetham Ganguly, Tania Amudha, J. Shukla, Nikhil Joseph, Raj Amrita Vishwa Vidyapeetham Amrita School of Computing Department of Computer Science And Engineering Bengaluru India Intellectyx Data Science Pvt Ltd India
The Paper focuses on analysing neural network models that are used for semantically classifying tabular customer datasets. Additionally, we propose a custom neural network architecture to analyze tabular datasets and ... 详细信息
来源: 评论
Towards property-preserving JPEG encryption with structured permutation and adaptive group differentiation
收藏 引用
Visual computer 2024年 第9期40卷 6421-6447页
作者: Su, Guo-Dong Chang, Ching-Chun Lin, Chia-Chen Chang, Chin-Chen School of Big Data and Artificial Intelligence Fujian Polytechnic Normal University Fuzhou350300 China Department of Information Engineering and Computer Science Feng Chia University Taichung40724 Taiwan Fujian Province University Fuzhou China Department of Computer Science and Information Engineering National Chin-Yi University of Technology Taichung41170 Taiwan
The security and privacy of digital images are a major concern in cyberspace. JPEG is the most widely used image compression standard and yet there are problems with format compatibility and file size preservation in ... 详细信息
来源: 评论
Distributionally Robust Reinforcement Learning with Interactive data Collection: Fundamental Hardness and Near-Optimal Algorithms  38
Distributionally Robust Reinforcement Learning with Interact...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Lu, Miao Zhong, Han Zhang, Tong Blanchet, Jose Department of Management Science and Engineering Stanford University United States Center for Data Science Peking University China Department of Computer Science University of Illinois Urbana-Champaign United States
Distributionally robust reinforcement learning (DRRL), often framed as a robust Markov decision process (RMDP), seeks to find a robust policy that achieves good performance under the worst-case scenario among all envi...
来源: 评论
ENERGY EFFICIENT SECURITY PROTOCOL FOR HEALTHCARE INTERNET OF THINGS
收藏 引用
Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika) 2024年 第12期83卷 65-78页
作者: Babu, Ravi Mahesh Malluvalasa, S.N. Lakshmi Devi, M. Kalpana Karthik, Sagirala Satya Rakesh, M. Prasad, Satamraju Krishna 522508 India Department of Artificial Intelligence and Data Science Koneru Lakshmaiah Education Foundation Green Fields Andhra Pradesh Vaddeswaram522302 India Department of Electronics and Communication Engineering Department of Computer Science and Engineering Newton’s Institute of Engineering Guntur Andhra Pradesh Macherla India
The Energy Efficient Security for Internet of Things (EESP-IoT) protocol aims to achieve a harmonious equilibrium between energy preservation, security, and network optimization within the ever-changing domain of the ... 详细信息
来源: 评论