咨询与建议

限定检索结果

文献类型

  • 30,757 篇 会议
  • 4,824 篇 期刊文献
  • 242 册 图书

馆藏范围

  • 35,823 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22,162 篇 工学
    • 16,070 篇 计算机科学与技术...
    • 13,441 篇 软件工程
    • 5,953 篇 信息与通信工程
    • 3,598 篇 控制科学与工程
    • 2,705 篇 电子科学与技术(可...
    • 2,674 篇 电气工程
    • 2,376 篇 生物工程
    • 1,929 篇 生物医学工程(可授...
    • 1,567 篇 光学工程
    • 1,378 篇 机械工程
    • 1,253 篇 动力工程及工程热...
    • 1,231 篇 仪器科学与技术
    • 1,030 篇 化学工程与技术
    • 905 篇 安全科学与工程
    • 775 篇 交通运输工程
  • 11,349 篇 理学
    • 6,154 篇 数学
    • 3,086 篇 物理学
    • 2,603 篇 生物学
    • 2,073 篇 统计学(可授理学、...
    • 1,326 篇 系统科学
    • 1,109 篇 化学
  • 5,808 篇 管理学
    • 3,408 篇 管理科学与工程(可...
    • 2,708 篇 图书情报与档案管...
    • 1,842 篇 工商管理
  • 1,683 篇 医学
    • 1,425 篇 临床医学
    • 1,330 篇 基础医学(可授医学...
    • 864 篇 药学(可授医学、理...
    • 741 篇 公共卫生与预防医...
  • 1,085 篇 法学
    • 878 篇 社会学
  • 659 篇 经济学
    • 659 篇 应用经济学
  • 496 篇 农学
  • 438 篇 教育学
  • 183 篇 文学
  • 79 篇 军事学
  • 39 篇 艺术学
  • 2 篇 哲学

主题

  • 1,185 篇 accuracy
  • 888 篇 computational mo...
  • 887 篇 feature extracti...
  • 793 篇 deep learning
  • 707 篇 training
  • 677 篇 computer science
  • 585 篇 machine learning
  • 575 篇 real-time system...
  • 541 篇 support vector m...
  • 491 篇 predictive model...
  • 426 篇 internet of thin...
  • 392 篇 convolutional ne...
  • 377 篇 data models
  • 355 篇 computer archite...
  • 349 篇 reliability
  • 314 篇 optimization
  • 302 篇 data mining
  • 276 篇 routing
  • 261 篇 artificial intel...
  • 260 篇 wireless sensor ...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 73 篇 tno technical sc...
  • 66 篇 università di ca...
  • 63 篇 dept. of informa...
  • 62 篇 université de st...
  • 59 篇 dept. of compute...
  • 58 篇 dept. of informa...
  • 58 篇 nikhef national ...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 49 篇 dept. of compute...
  • 48 篇 dept. of compute...
  • 46 篇 university würzb...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 chen a.
  • 81 篇 kalekin o.
  • 79 篇 díaz a.f.
  • 78 篇 boumaaza j.
  • 77 篇 coleiro a.
  • 74 篇 gozzini s.r.
  • 68 篇 huang f.
  • 65 篇 dallier r.
  • 60 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 43 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 30,472 篇 英文
  • 4,954 篇 其他
  • 299 篇 中文
  • 56 篇 日文
  • 50 篇 朝鲜文
  • 4 篇 斯洛文尼亚文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
检索条件"机构=Dept. of Computer Science and Engineering With Data Science"
35823 条 记 录,以下是4361-4370 订阅
排序:
Investigation of Credit Card Fraud detection under the lens of Comparative Machine Learning models
Investigation of Credit Card Fraud detection under the lens ...
收藏 引用
2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2022
作者: Tahsin, Mohammad Sadman Firoz, Neda Chowdhury, Shah Abul Hasnat Wasei, S.M.A. Karim, Musaddiq Al Ara, Mst Yeasmin Brac University Department of Computer Science and Engineering Dhaka Bangladesh Tomsk State University Institute of Applied Mathematics and Computer Science Tomsk Russia American International University-Bangladesh Dept. of Electrical and Electronics Engineering Dhaka Bangladesh American International University-Bangladesh Dept. of Computer Science and Engineering Dhaka Bangladesh
Fraudulent use of credit cards is common and may result in significant financial losses. Using Trojans or Phishing, criminals may get the credit card numbers of innocent victims for their criminal acts. As a result, i... 详细信息
来源: 评论
Reinforcement Learning for Adaptive Traffic Signal Control Using Deep Q-Networks
Reinforcement Learning for Adaptive Traffic Signal Control U...
收藏 引用
Sustainable Energy Technologies and Computational Intelligence (SETCOM), International Conference on
作者: Asha Rani Bohra Thamarai Selvi V Vishal Pawan Sai Sunkara Balaji Sunku Bhavsar Nitya Jignesh Dept. of Computer Science and Engineering New Horizon College of Engineering Bengaluru Karnataka India Dept. of Information Science and Engineering New Horizon College of Engineering Bengaluru Karnataka India
Traffic congestion is a critical issue in urban areas, contributing to increased travel time, fuel consumption, and environmental pollution. Traditional traffic signal control methods, such as fixed-time systems, cann... 详细信息
来源: 评论
Multi-view Learning for the Identification of Risky Users in Dynamic Social Networks
arXiv
收藏 引用
arXiv 2025年
作者: Benedetti, Francesco Pellicani, Antonio Pio, Gianvito Ceci, Michelangelo Dept. of Computer Science University of Bari Bari Italy Dept. of Computer Science University of Pisa Pisa Italy Data Science Lab National Interuniversity Consortium for Informatics Rome Italy Dept. of Knowledge Technologies Jožef Stefan Institute Ljubljana Slovenia
Technological progress in the last few decades has granted an increasing number of people access to social media platforms such as Facebook, X (formerly Twitter), and Instagram. Consequently, the potential risks assoc... 详细信息
来源: 评论
TSPvis: A Temperature Sensitive Paint Formulation Visual Design System
TSPvis: A Temperature Sensitive Paint Formulation Visual Des...
收藏 引用
Pattern Recognition and Artificial Intelligence (PRAI), International Conference on
作者: Jing Liao Yadong Wu Guijuan Wang Fupan Wang Huarong Chen Li Long Dept. Computer Science and Technology Southwest University of Science and Technology Mianyang China Dept. Computer Science and Engineering Sichuan University of Science and Engineering Yibin China
The composition and proportion parameters of temperature sensitive paint formulation are complex. The current methods have a long development cycle and low efficiency. We design a visual formulation design system for ...
来源: 评论
On Bidding Decision in Short-Term Electricity Markets: A Reinforcement Learning Approach  15
On Bidding Decision in Short-Term Electricity Markets: A Rei...
收藏 引用
15th IEEE International Conference on Industry Applications, INDUSCON 2023
作者: Theodoro, Edson A.R. Lopes, Yuri K. Dept. of Electrical Engineering DAELE Federal University of Technology - Parana PR Cornelio Procopio Brazil Dept. of Computer Science CCT Santa Catarina State University SC Joinville Brazil
Modern restructured power systems are identified by the establishment of competitive markets. After the 90s, many countries have been adopted offer-based short-term (day-ahead and intraday) markets to enforce competit... 详细信息
来源: 评论
User Authentication on Smart Speakers Leveraging Acoustic Imaging
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Ren, Yanzhi Xia, Zhiliang Li, Siyi Liu, Hongbo Yu, Jiadi Li, Shuai Li, Hongwei University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China Shanghai Jiao Tong University Dept. of Computer Science and Engineering Shanghai200240 China University of Oulu Finland
The user authentication has drawn increasingly attention as the smart speaker becomes more prevalent. For example, smart speakers that can verify who is sending voice commands can mitigate various types of attacks suc... 详细信息
来源: 评论
Neural Style Transfer: A Comparative Study
Neural Style Transfer: A Comparative Study
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: M Suryamritha Varshini Balaji Srinidhi Kannan Tripty Singh Mansi Sharma Dept. of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Bangalore India Dept. of Computer Science and Engineering Graphic Era(Deemed to be) University India
Neural Style Transfer (NST) has emerged as a powerful technique for artistic image synthesis by fusing the base image with style source. In this study, we present a comparative analysis of NST using popular convolutio... 详细信息
来源: 评论
Quantum-Enhanced Machine Learning for Precision Breast Cancer Diagnosis
Quantum-Enhanced Machine Learning for Precision Breast Cance...
收藏 引用
International Communication Systems and Networks and Workshops, COMSNETS
作者: Agniva Banerjee Dept. Electrical Engineering and Computer Science Indian Institute of Science Education and Research Bhopal Bhopal India
Cancer is the leading cause of premature mortality. Globally, the prevalence of cancer is on the rise, and early-stage diagnosis is crucial for cancer recovery and survival. However, the presence of circulating tumor ... 详细信息
来源: 评论
Deep Learning for Channel Prediction in Non-Stationary Wireless Fading Environments
Deep Learning for Channel Prediction in Non-Stationary Wirel...
收藏 引用
Intelligent Signal Processing and Effective Communication Technologies (INSPECT), IEEE International Conference on
作者: Deepak Upadhyay Kunj Bihari Sharma Mridul Gupta Abhay Upadhyay Nookala Venu Dept. of Computer Science and Engineering Graphic Era Hill University Dehradun India Dept. of Computer Science and Engineering Graphic Era deemed to be University Dehradun India Dept. of Electronics and Communication Engineering Graphic Era deemed to be University Dehradun India Data Science and Quantum Computing ABV Indian Institute of Information Technology and Management Gwalior India
In non-stationary wireless fading channels deep learning models are effective in predicting channel states as indicated by this study. This work compared the LSTM and GRU models with autoregressive methods or Kalman f... 详细信息
来源: 评论
CDP: Selective Influential Nodes Based on Cliques in the Diffusion Process in Social Networks  9
CDP: Selective Influential Nodes Based on Cliques in the Dif...
收藏 引用
9th International Conference on Web Research, ICWR 2023
作者: Yazdanifar, Fatemeh Beni, Hamid Ahmadi Salimi, Nikoo Bouyer, Asgarali Amirkabir University of Technology Dept. of Mathematics and Computer Science Tehran Iran Madani University Dept. Software Engineering Azarbijan Shahid Tabriz Iran University of Genoa Dept. of the Elec. Electronics Electronics and Telecommunication Eng. and Naval Architecture Genoa Italy Azarbaijan Shahid Madani University Dept. of Computer Engineering Tabriz Iran
Influence maximization techniques emphasize selecting a set of influential nodes in order to maximize influence. Because the algorithms presented in this field ignore the topology of cliques for diffusion, there are t... 详细信息
来源: 评论