咨询与建议

限定检索结果

文献类型

  • 2,531 篇 期刊文献
  • 1,688 篇 会议
  • 28 册 图书

馆藏范围

  • 4,247 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,704 篇 工学
    • 2,014 篇 计算机科学与技术...
    • 1,704 篇 软件工程
    • 576 篇 信息与通信工程
    • 431 篇 生物工程
    • 386 篇 电气工程
    • 343 篇 生物医学工程(可授...
    • 315 篇 控制科学与工程
    • 276 篇 光学工程
    • 243 篇 电子科学与技术(可...
    • 135 篇 机械工程
    • 134 篇 化学工程与技术
    • 112 篇 仪器科学与技术
    • 110 篇 安全科学与工程
    • 108 篇 动力工程及工程热...
    • 99 篇 交通运输工程
  • 1,777 篇 理学
    • 868 篇 数学
    • 553 篇 物理学
    • 500 篇 生物学
    • 344 篇 统计学(可授理学、...
    • 161 篇 化学
    • 154 篇 系统科学
    • 115 篇 地球物理学
  • 745 篇 管理学
    • 467 篇 管理科学与工程(可...
    • 305 篇 图书情报与档案管...
    • 271 篇 工商管理
  • 358 篇 医学
    • 311 篇 临床医学
    • 262 篇 基础医学(可授医学...
    • 155 篇 公共卫生与预防医...
    • 149 篇 药学(可授医学、理...
  • 134 篇 法学
    • 119 篇 社会学
  • 91 篇 经济学
  • 82 篇 农学
  • 48 篇 教育学
  • 8 篇 军事学
  • 6 篇 文学
  • 4 篇 艺术学
  • 1 篇 历史学

主题

  • 154 篇 accuracy
  • 152 篇 deep learning
  • 133 篇 machine learning
  • 92 篇 training
  • 86 篇 computational mo...
  • 81 篇 feature extracti...
  • 77 篇 convolutional ne...
  • 72 篇 real-time system...
  • 70 篇 predictive model...
  • 62 篇 internet of thin...
  • 61 篇 artificial intel...
  • 59 篇 data models
  • 55 篇 reinforcement le...
  • 48 篇 optimization
  • 48 篇 federated learni...
  • 46 篇 semantics
  • 45 篇 image segmentati...
  • 45 篇 graph neural net...
  • 43 篇 generative adver...
  • 40 篇 adversarial mach...

机构

  • 156 篇 college of compu...
  • 60 篇 department of co...
  • 57 篇 nanyang technolo...
  • 52 篇 department of co...
  • 49 篇 beijing advanced...
  • 42 篇 college of compu...
  • 40 篇 data science ins...
  • 34 篇 department of co...
  • 34 篇 national enginee...
  • 31 篇 university of ch...
  • 31 篇 school of data a...
  • 31 篇 the college of c...
  • 27 篇 dipartimento di ...
  • 26 篇 the oskar klein ...
  • 24 篇 college of intel...
  • 23 篇 center for scien...
  • 23 篇 department of br...
  • 22 篇 department of ph...
  • 22 篇 college of infor...
  • 22 篇 institut für ast...

作者

  • 152 篇 niyato dusit
  • 32 篇 sun geng
  • 31 篇 chen mingzhe
  • 30 篇 peng hao
  • 29 篇 du hongyang
  • 27 篇 e. j. siskind
  • 27 篇 r. bellazzini
  • 25 篇 j. b. thayer
  • 25 篇 p. spinelli
  • 25 篇 m. kuss
  • 25 篇 guo yike
  • 24 篇 s. guiriec
  • 24 篇 wang jiacheng
  • 23 篇 p. a. caraveo
  • 23 篇 p. f. michelson
  • 23 篇 s. ciprini
  • 23 篇 r. rando
  • 23 篇 s. rainò
  • 23 篇 kang jiawen
  • 22 篇 m. ackermann

语言

  • 3,809 篇 英文
  • 429 篇 其他
  • 14 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Department of Computing and Data Science"
4247 条 记 录,以下是291-300 订阅
排序:
Real-Time Road Damage Detection and Infrastructure Evaluation Leveraging Unmanned Aerial Vehicles and Tiny Machine Learning
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 21347-21358页
作者: Khan, Muhammad Waseem Obaidat, Mohammad S. Mahmood, Khalid Batool, Dania Badar, Hafiz Muhammad Sanaullah Aamir, Muhammad Gao, Wu Comsats University Islamabad Sahiwal Campus Department Of Computer Science Sahiwal57000 Pakistan Superior University Department Of Computer Science Lahore54000 Pakistan The University Of Jordan King Abdullah Ii School Of Information Technology Amman11942 Jordan University Of Science And Technology Beijing School Of Communication And Computing Engineering Beijing100083 China Amity University Amity School Of Engineering And Technology Uttar Pradesh Noida201301 India National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan University Of Palermo Department Of Engineering Palermo90133 Italy Emerson University Department Of Emerging Computing Technologies Multan60000 Pakistan Northwestern Polytechnical University Center For Bio-Inspired System-on-Chip School Of Computer Science Xi'an710060 China
Road damage detection (RDD) through computer vision and deep learning techniques can ensure the safety of vehicles and humans on the roads. Integrating unmanned aerial vehicles (UAVs) in RDD and infrastructure evaluat... 详细信息
来源: 评论
ZeroMark: towards dataset ownership verification without disclosing watermarks  24
ZeroMark: towards dataset ownership verification without dis...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Junfeng Guo Yiming Li Ruibo Chen Yihan Wu Chenxi Liu Heng Huang Department of Computer Science Institute of Health Computing University of Maryland College Park College of Computing and Data Science Nanyang Technology University
High-quality public datasets significantly prompt the prosperity of deep neural networks (DNNs). Currently, dataset ownership verification (DOV), which consists of dataset watermarking and ownership verification, is t...
来源: 评论
Analysis and Performance Evaluation of Credit Card Fraud by Multi-model ML  3
Analysis and Performance Evaluation of Credit Card Fraud by ...
收藏 引用
3rd International Conference on Advancement in Electrical and Electronic Engineering, ICAEEE 2024
作者: Islam, Md Aminul Asif Imran, A.T.M. Rahman, Md Habibur Pabel, Md Amran Hossen Mishra, Bhupesh Kumar Basu, Kashinath University of Gloucestershire Data Science School of Engineering and Technology Cheltenham United Kingdom Dhaka Bangladesh University of Chittagong Department of Mathematics Chittagong Bangladesh Wright State University Master of Science in Business Analytics United States United Kingdom Oxford Brookes University Data Science School of Engineering Computing and Mathematics United Kingdom
Using credit cards is a convenient and efficient payment mechanism. Credit card fraud significantly impacts financial loss, mental health, and the reputation of financial institutions. This study would incorporate an ... 详细信息
来源: 评论
Optimizing Diabetic Foot Ulcer Detection: Leveraging SSD and YOLO Architectures  21
Optimizing Diabetic Foot Ulcer Detection: Leveraging SSD and...
收藏 引用
21st IEEE International Conference on Smart Communities: Improving Quality of Life using AI, Robotics and IoT, HONET 2024
作者: Azeem, Muhammad Zaman, Muhammad Akhunzada, Adnan Kehkashan, Tanzila Ashraf, Imran Rehman, Abdul The University of Lahore Department of Computer Science Sargodha Pakistan COMSATS University Islamabad Department of Computer Science Islamabad Pakistan University of Doha for Science and Technology Department of Data and Cybersecurity Doha24449 Qatar Universiti Teknologi Malaysia Faculty of Computing Johor Bahru Malaysia The University of Lahore Faculty of Computer Science Sargodha Pakistan
Diabetic foot ulcer (DFU) are a severe complication in diabetic patients, requiring accurate and early diagnosis to prevent further complications such as infection or amputation. To address this, Research employed YOL... 详细信息
来源: 评论
Predicting Cervical Cancer Using Deep Learning Mutation-based Atom Search Optimization (MASO) Algorithm  2
Predicting Cervical Cancer Using Deep Learning Mutation-base...
收藏 引用
2nd IEEE International Conference on Trends in Quantum computing and Emerging Business Technologies, TQCEBT 2024
作者: Mayuri, A.V.R. Selvekumar Subash, K. Aeron, Anurag Vit Bhopal University School of Computing Science and Engineering Madhya Pradesh Sehore India Bahir Dar University Bahir Dar Institute of Technology Department of Electrical and Computer Engineering Ethiopia Department of Data Science Trichy India Miet Meerut Department of Computer Science and Engineering Uttar Pradesh India
Worldwide, women are compressed by cervical cancer, which is a prevalent malignancy. This disease, which is currently the fourth leading cause of death for women, shows no symptoms when it first arises. Cells that cau... 详细信息
来源: 评论
Fuzzy-Based Optimization Techniques for Segmenting the Tumors in Multimodal MRI Images
收藏 引用
Operations Research Forum 2025年 第1期6卷 1-27页
作者: Alagarsamy, Saravanan Nagarajan, D. Govindaraj, Vishnuvardhan Department of Information Technology Sri Sivasubramaniya Nadar College of Engineering Rajiv Gandhi Salai (OMR) Tamilnadu Chennai India Department of Mathematics Rajalakshmi Institute of Technology Chennai India Division of Data Science of School of Computing Science and Education VIT Bhopal University Kothrikalan Madhya Pradesh Sehore 466114 India
Accurate brain tumor prediction is essential when approaching the field of health care;wherever accuracy in decision-making is crucial, the issues also need to be resolved right away. Many artificial intelligence and ... 详细信息
来源: 评论
Securing 3D Point and Mesh Fog data Using Novel Chaotic Cat Map
收藏 引用
Computers, Materials & Continua 2023年 第3期74卷 6703-6717页
作者: K.Priyadarsini Arun Kumar Sivaraman Abdul Quadir Md Areej Malibari Department of Data Science and Business Systems School of ComputingCollege of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathurChennai603203India School of Computer Science and Engineering Vellore Institute of TechnologyChennai600127India Department of Industrial and Systems Engineering College of EngineeringPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
With the rapid evolution of Internet technology,fog computing has taken a major role in managing large amounts of *** major concerns in this domain are security and ***,attaining a reliable level of confidentiality in... 详细信息
来源: 评论
Towards Techniques for Updating Virtual Knowledge Graphs  17
Towards Techniques for Updating Virtual Knowledge Graphs
收藏 引用
17th International Rule Challenge and 7th Doctoral Consortium @ RuleM+RR, RuleML+RR-Companion 2023
作者: Wandji, Romuald Esdras Šimkus, Mantas Calvanese, Diego Department of Computing Science Umeå Universitet Umeå Sweden Research Centre for Knowledge and Data Faculty of Engineering Free University of Bozen-Bolzano Bolzano Italy
The field of Virtual Knowledge Graphs (VKGs) continues to grow in both academic and applied contexts. Yet, the issue of updates in VKG systems has not yet received adequate attention, although it is crucial to manage ... 详细信息
来源: 评论
Deep Neural Network Approach on Phishing Websites Detection, Identification and Proactive Prevention  8
Deep Neural Network Approach on Phishing Websites Detection,...
收藏 引用
8th IEEE International Conference on Computational System and Information Technology for Sustainable Solutions, CSITSS 2024
作者: Soundarya, K. Siddaraju, H.S. Tekchandani, Hitesh Bhardwaj, Navodit Rani, Pooja Joshi, Pallavi Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science Mysuru India Koneru Lakshmaiah Education Foundation Artificial Intelligence and Data Science Hyderabad India Researcher at Food and Drug Administration MD United States
Phishing is a prevalent type of cyberattack that involves posing as a trustworthy source in an email message to fraudulently attempt to get personal information such as usernames, passwords, and bank account informati... 详细信息
来源: 评论
Semantic Querying of Integrated Raster and Relational data: A Virtual Knowledge Graph Approach  17
Semantic Querying of Integrated Raster and Relational Data: ...
收藏 引用
17th International Rule Challenge and 7th Doctoral Consortium @ RuleM+RR, RuleML+RR-Companion 2023
作者: Ghosh, Arka Šimkus, Mantas Calvanese, Diego Department of Computing Science Umeå Universitet Umeå Sweden Research Centre for Knowledge and Data Faculty of Engineering Free University of Bozen-Bolzano Bolzano Italy
Ontology-based data access (OBDA) facilitates access to heterogeneous data sources through the mediation of an ontology (e.g. OWL), which captures the domain of interest and is connected to data sources through a decl... 详细信息
来源: 评论