咨询与建议

限定检索结果

文献类型

  • 30,252 篇 会议
  • 4,791 篇 期刊文献
  • 239 册 图书

馆藏范围

  • 35,282 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,843 篇 工学
    • 15,817 篇 计算机科学与技术...
    • 13,300 篇 软件工程
    • 5,834 篇 信息与通信工程
    • 3,443 篇 控制科学与工程
    • 2,663 篇 电子科学与技术(可...
    • 2,616 篇 电气工程
    • 2,370 篇 生物工程
    • 1,904 篇 生物医学工程(可授...
    • 1,538 篇 光学工程
    • 1,344 篇 机械工程
    • 1,218 篇 动力工程及工程热...
    • 1,202 篇 仪器科学与技术
    • 1,014 篇 化学工程与技术
    • 865 篇 安全科学与工程
    • 738 篇 交通运输工程
  • 11,214 篇 理学
    • 6,082 篇 数学
    • 3,048 篇 物理学
    • 2,594 篇 生物学
    • 2,026 篇 统计学(可授理学、...
    • 1,325 篇 系统科学
    • 1,084 篇 化学
  • 5,669 篇 管理学
    • 3,301 篇 管理科学与工程(可...
    • 2,649 篇 图书情报与档案管...
    • 1,823 篇 工商管理
  • 1,620 篇 医学
    • 1,402 篇 临床医学
    • 1,310 篇 基础医学(可授医学...
    • 865 篇 药学(可授医学、理...
    • 684 篇 公共卫生与预防医...
  • 1,042 篇 法学
    • 840 篇 社会学
  • 649 篇 经济学
    • 649 篇 应用经济学
  • 491 篇 农学
  • 425 篇 教育学
  • 158 篇 文学
  • 79 篇 军事学
  • 39 篇 艺术学
  • 2 篇 哲学

主题

  • 1,094 篇 accuracy
  • 855 篇 feature extracti...
  • 842 篇 computational mo...
  • 715 篇 deep learning
  • 685 篇 training
  • 676 篇 computer science
  • 535 篇 machine learning
  • 527 篇 real-time system...
  • 520 篇 support vector m...
  • 467 篇 predictive model...
  • 417 篇 internet of thin...
  • 351 篇 convolutional ne...
  • 347 篇 computer archite...
  • 344 篇 data models
  • 329 篇 reliability
  • 303 篇 optimization
  • 296 篇 data mining
  • 275 篇 routing
  • 260 篇 wireless sensor ...
  • 248 篇 artificial intel...

机构

  • 83 篇 institut univers...
  • 82 篇 north-west unive...
  • 81 篇 national centre ...
  • 79 篇 infn sezione di ...
  • 77 篇 institute of inf...
  • 76 篇 infn sezione di ...
  • 74 篇 tno technical sc...
  • 66 篇 università di ca...
  • 65 篇 université de st...
  • 64 篇 dept. of informa...
  • 60 篇 nikhef national ...
  • 58 篇 dept. of informa...
  • 58 篇 dept. of compute...
  • 56 篇 dept. of compute...
  • 53 篇 leiden universit...
  • 52 篇 school of automa...
  • 49 篇 dept. of compute...
  • 48 篇 dept. of compute...
  • 46 篇 university würzb...
  • 45 篇 dept. of electri...

作者

  • 85 篇 ferrara g.
  • 85 篇 ardid m.
  • 85 篇 gal t.
  • 85 篇 bozza c.
  • 84 篇 calvo d.
  • 82 篇 chen a.
  • 82 篇 kalekin o.
  • 79 篇 díaz a.f.
  • 78 篇 boumaaza j.
  • 78 篇 coleiro a.
  • 76 篇 gozzini s.r.
  • 68 篇 huang f.
  • 68 篇 dallier r.
  • 62 篇 anguita m.
  • 52 篇 kulikovskiy v.
  • 43 篇 del burgo r.
  • 41 篇 benoit d.m.
  • 41 篇 eddymaoui a.
  • 40 篇 gagliardini s.
  • 40 篇 labalme m.

语言

  • 34,021 篇 英文
  • 847 篇 其他
  • 309 篇 中文
  • 56 篇 日文
  • 50 篇 朝鲜文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer Science and Engineering With Data Science"
35282 条 记 录,以下是4961-4970 订阅
排序:
Peephole Optimization for Quantum Approximate Synthesis
arXiv
收藏 引用
arXiv 2024年
作者: Clark, Joseph Thapliyal, Himanshu Dept. of Electrical Engineering and Computer Science University of Tennessee Knoxville United States
Peephole optimization of quantum circuits provides a method of leveraging standard circuit synthesis approaches into scalable quantum circuit optimization. One application of this technique partitions an entire circui... 详细信息
来源: 评论
Mental Health and Stress Prediction Using NLP and Transformer-Based Techniques
Mental Health and Stress Prediction Using NLP and Transforme...
收藏 引用
IEEE Symposium on Wireless Technology and Applications (ISWTA)
作者: Abhishek Pandey Sanjay Kumar Dept. of Computer Science and Engineering Delhi Technological University New Delhi India
The integration of Natural Language Processing (NLP) and machine learning technologies into the field of mental health and stress prediction represents a significant advancement in the early detection and intervention... 详细信息
来源: 评论
A Machine Learning-Based Secure Face Verification Scheme and Its Applications to Digital Surveillance
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Huan-Chih Wu, Ja-Ling Dept. Computer Science and Information Engineering National Taiwan University Taipei Taiwan
Face verification is a well-known image analysis application and is widely used to recognize individuals in contemporary society. However, most real-world recognition systems ignore the importance of protecting the id... 详细信息
来源: 评论
Vyoma-ADS : An AI-Driven Tool for Adaptive Monitoring and Anomaly Detection for Space Agriculture
Vyoma-ADS : An AI-Driven Tool for Adaptive Monitoring and An...
收藏 引用
Communication, Computing and Signal Processing (IICCCS), IEEE International Conference on
作者: Rajdeep Das Vaishnavi Sharma Priyanka Kumari Abhishek Raj Sudipta Das Indrajit De Dept. of Computer Science and Business Systems Institute of Engineering and Management Kolkata India
As humanity ventures further into space exploration, securing sustainable resources becomes paramount. The success of space farming depends not only on the ability to cultivate crops but also on the effective manageme... 详细信息
来源: 评论
Quora Question Sincerity Detection Using BERT-Based Framework
Quora Question Sincerity Detection Using BERT-Based Framewor...
收藏 引用
International Conference on Confluence The Next Generation Information Technology Summit (Confluence)
作者: Drishti Arora Garima Aggarwal Farhan Asif Dept. of Computer Science and Engineering Amity University Noida Uttar Pradesh India
In the dynamic landscape of online knowledge exchange, platforms such as Quora have become vital arenas for diverse discussions and information dissemination. However, distinguishing sincere from insincere questions p...
来源: 评论
Machine Learning based Anxiety Detection using Physiological Signals and Context Features
Machine Learning based Anxiety Detection using Physiological...
收藏 引用
Advancement in Computation & computer Technologies (InCACCT), International Conference on
作者: Arushi Jain Rajeev Kumar Dept. of Computer Science and Engineering National Institute of Technology Hamirpur Hamirpur India
Anxiety is a common mental disorder that affects millions of people worldwide. Anxiety can be detected using physiological signals such as heart rate, skin conductance, blood pressure, and respiration. Machine learnin... 详细信息
来源: 评论
Modular Design of Solid-State Transformer with High Flexibility
Modular Design of Solid-State Transformer with High Flexibil...
收藏 引用
IEEE Energy Conversion Congress and Exposition, ECCE
作者: Zhuxuan Ma Hui Cao Yue Zhao Dept. of Electrical Engineering and Computer Science University of Arkansas Fayetteville AR USA
This paper presents a modular solid state transformer (SST) design incorporating dual active bridge and cascaded H-Bridge topologies to enhance electric vehicle (EV) charging infrastructure. By using modular design co... 详细信息
来源: 评论
A Rule-Based Approach for Interpretable Intensity-Modulated Radiation Therapy Treatment Selection
A Rule-Based Approach for Interpretable Intensity-Modulated ...
收藏 引用
IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)
作者: Xabier Gonzalez-Garcia Javier Fumanal-Idocin Joan M. Nunez Do Rio Humberto Bustince Dept. of Statistics Computer Science and Mathematics Public University of Navarre Spain University of Essex School of Computer Science and Electronic Engineering United Kingdom Dept. of Computer Science Multimedia and Telecommunications Universitat Oberta de Catalunya Spain
Artificial Intelligence (AI) methods are becoming essential in healthcare. In the context of Intensity-Modulated Radiation Therapy (IMRT), Knowledge-Based Planning (KBP) methodologies have enabled the modification of ... 详细信息
来源: 评论
dept.Voting: A Few-Shot Point Cloud Classification Model Incorporating a Projection-Based Voting Mechanism
DepthVoting: A Few-Shot Point Cloud Classification Model Inc...
收藏 引用
IEEE computer Society Conference on computer Vision and Pattern Recognition Workshops (CVPRW)
作者: Yunhui Zhu Jiajing Chen Senem Velipasalar Electrical Engineering and Computer Science Dept. Syracuse University Syracuse NY USA
Despite the significant progress in few-shot 2D image classification, few-shot 3D point cloud classification remains relatively under-explored, particularly in addressing the challenges posed by missing points in 3D p... 详细信息
来源: 评论
MAD: A Meta-Learning Approach to Detect Advanced Persistent Threats using Provenance data in Industrial IoT
MAD: A Meta-Learning Approach to Detect Advanced Persistent ...
收藏 引用
computer Security Applications Conference Workshops (ACSAC Workshops), Annual
作者: Bikash Saha Nanda Rani Sandeep Kumar Shukla Dept. of Computer Science and Engineering Indian Institute of Technology Kanpur Kanpur India
The increasing reliance on Industrial Internet of Things (IIoT) systems in critical infrastructure has made these environments prime targets for stealthy and prolonged Advanced Persistent Threats (APTs) that evade tra... 详细信息
来源: 评论