咨询与建议

限定检索结果

文献类型

  • 2,069 篇 期刊文献
  • 1,468 篇 会议
  • 36 册 图书

馆藏范围

  • 3,573 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,040 篇 工学
    • 1,445 篇 计算机科学与技术...
    • 1,191 篇 软件工程
    • 420 篇 信息与通信工程
    • 350 篇 生物工程
    • 302 篇 生物医学工程(可授...
    • 250 篇 控制科学与工程
    • 237 篇 光学工程
    • 216 篇 电气工程
    • 136 篇 电子科学与技术(可...
    • 134 篇 化学工程与技术
    • 99 篇 机械工程
    • 85 篇 安全科学与工程
    • 77 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 73 篇 仪器科学与技术
  • 1,566 篇 理学
    • 646 篇 数学
    • 641 篇 物理学
    • 418 篇 生物学
    • 243 篇 统计学(可授理学、...
    • 178 篇 化学
    • 108 篇 系统科学
  • 603 篇 管理学
    • 320 篇 管理科学与工程(可...
    • 307 篇 图书情报与档案管...
    • 185 篇 工商管理
  • 316 篇 医学
    • 261 篇 临床医学
    • 226 篇 基础医学(可授医学...
    • 142 篇 药学(可授医学、理...
    • 117 篇 公共卫生与预防医...
  • 112 篇 法学
    • 91 篇 社会学
  • 75 篇 经济学
    • 75 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 9 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 131 篇 accuracy
  • 123 篇 deep learning
  • 115 篇 machine learning
  • 77 篇 feature extracti...
  • 75 篇 hadrons
  • 73 篇 training
  • 70 篇 data models
  • 66 篇 convolutional ne...
  • 65 篇 artificial intel...
  • 60 篇 real-time system...
  • 57 篇 semantics
  • 55 篇 computational mo...
  • 53 篇 predictive model...
  • 50 篇 hadron colliders
  • 46 篇 hadronic decays
  • 44 篇 internet of thin...
  • 43 篇 support vector m...
  • 42 篇 optimization
  • 41 篇 visualization
  • 39 篇 data mining

机构

  • 427 篇 department of ph...
  • 410 篇 horia hulubei na...
  • 404 篇 van swinderen in...
  • 401 篇 school of physic...
  • 400 篇 iccub universita...
  • 398 篇 h.h. wills physi...
  • 398 篇 cavendish labora...
  • 383 篇 department of ph...
  • 381 篇 yandex school of...
  • 378 篇 imperial college...
  • 361 篇 university of ch...
  • 355 篇 stfc rutherford ...
  • 353 篇 center for high ...
  • 348 篇 institute of par...
  • 325 篇 henryk niewodnic...
  • 316 篇 nikhef national ...
  • 297 篇 school of physic...
  • 297 篇 physik-institut ...
  • 294 篇 oliver lodge lab...
  • 288 篇 school of physic...

作者

  • 252 篇 barter w.
  • 249 篇 bellee v.
  • 241 篇 beiter a.
  • 224 篇 casse g.
  • 222 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 amato s.
  • 215 篇 bediaga i.
  • 215 篇 boettcher t.
  • 210 篇 brundu d.
  • 210 篇 baryshnikov f.
  • 207 篇 braun s.
  • 205 篇 borisyak m.
  • 202 篇 bizzeti a.
  • 195 篇 bencivenni g.
  • 190 篇 back j.j.
  • 189 篇 bay a.
  • 176 篇 bursche a.

语言

  • 3,355 篇 英文
  • 209 篇 其他
  • 11 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 日文
  • 1 篇 俄文
检索条件"机构=Faculty for Computer Science and Data Science"
3573 条 记 录,以下是91-100 订阅
排序:
Multi Label Classification Based on Ensemble Learning: Investigative Study  25
Multi Label Classification Based on Ensemble Learning: Inves...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Nasir, Ola Alazaidah, Raed Hadi, Wael Samara, Ghassan Al Daoud, Essam Owaida, Suhaila Abu Elrashidi, Ali Elsoud, Esraa Abu Alzoubi, Haneen Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan Zarqa University Faculty of Information Technology Department of Data Science and Ai Zarqa Jordan Petra University Faculty of Information Technology Department of Cyber Security Amman Jordan Zarqa University Faculty of Information Technolog Department of Computer Science Zarqa Jordan Al-al-Bayt University Faculty of Information Technology Department of Computer Science Mafraq Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Applied Science Private University Faculty of It Department of Computer Science Amman Jordan
In the big data technology nowadays, activities associated with Multi-Label Classification (MLC) pose big and complex challenges, receiving terrific interest in diverse fields. Existing MLC algorithms suffer from low ... 详细信息
来源: 评论
Classification Attack on IoT Devices with Machine Learning  9
Classification Attack on IoT Devices with Machine Learning
收藏 引用
9th IEEE International Conference on Computational Intelligence and Applications, ICCIA 2024
作者: Charoenwong, Nutcha Kosolsombat, Somkiat Ratanavilisagul, Chiabwoot College of Interdisciplinary Studies Thammasat University Data Science and Innovation Pathum Thani Thailand King Mongkut's University of Technology Faculty of Applied Science Department of Computer and Information Science North Bangkok Thailand
Internet of Things (IoT) devices are small, low-power devices used for detecting and processing data remotely through the internet. These devices have increasingly been integrated into our daily lives, both in the dig... 详细信息
来源: 评论
PVDM-YOLOv8l: a solution for reliable pedestrian and vehicle detection in autonomous vehicles under adverse weather conditions
收藏 引用
Multimedia Tools and Applications 2024年 1-26页
作者: Tahir, Noor Ul Ain Zhang, Zuping Asim, Muhammad Iftikhar, Sundas A. Abd El-Latif, Ahmed School of Computer Science and Engineering Central South University Changsha410083 China EIAS Data Science Lab College of Computer and Information Sciences and Center of Excellence in Quantum and Intelligent Computing Prince Sultan University Riyadh11586 Saudi Arabia Gianforte School of Computing Montana State University Bozeman59717 United States Department of Mathematics and Computer Science Faculty of Science Menoufia University Shebin El-Koom32511 Egypt
Ensuring the safe navigation of autonomous vehicles in intelligent transportation system depends on their ability to detect pedestrians and vehicles. While transformer-based models for object detection have shown rema... 详细信息
来源: 评论
Split Form ALE DG Methods for the Euler Equations: Entropy Stability and Kinetic Energy Dissipation  13th
Split Form ALE DG Methods for the Euler Equations: Entropy S...
收藏 引用
13th International Conference on Spectral and High Order Methods, ICOSAHOM 2021
作者: Schnücke, Gero Gassner, Gregor J. Krais, Nico Faculty of Mathematics and Computer Science University of Jena Jena Germany Department for Mathematics/Computer Science Center for Data and Simulation Science University of Cologne Cologne Germany University of Stuttgart Stuttgart Germany
The construction of discontinuous Galerkin (DG) methods for the compressible Euler equations includes the approximation of non-linear flux terms in the volume integrals. The terms can lead to aliasing and stability is... 详细信息
来源: 评论
Evaluating Pretrained Deep Learning Models for COVID-19 Detection in Medical Imaging  1
Evaluating Pretrained Deep Learning Models for COVID-19 Dete...
收藏 引用
1st Renewable Energy Technologies and Modern Communications Systems: Future and Challenges Conference, RETMCS 2024
作者: AL-Shehri, Bushra A. Sabbeh, Sahar F. Dessouky, Mohamed M. Department of Data Science College of Computer Science and Engineering University of Jeddah Jeddah23218 Saudi Arabia Faculty of Computers and Artificial Intelligence Information Systems Department Benha University Benha13518 Egypt Department of Computer Science and Artificial Intelligence College of Computer Science and Engineering University of Jeddah Jeddah23218 Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt
COVID-19 is a respiratory disease for which reverse transcription-polymerase chain reaction (RT-PCR) is the standard detection method. This study introduces a hybrid deep learning approach to support the diagnosis of ... 详细信息
来源: 评论
PDF Malware Detection Using Machine Learning  9
PDF Malware Detection Using Machine Learning
收藏 引用
9th IEEE International Conference on Computational Intelligence and Applications, ICCIA 2024
作者: Tantikulvichit, Naragorn Kosolsombat, Somkiat Ratanavilisagul, Chiabwoot College of Interdisciplinary Studies Thammasat University Data Science and Innovation Pathum Thani Thailand King Mongkut's University of Technology Faculty of Applied Science Department of Computer and Information Science North Bangkok Thailand
In today's world, cyber-attacks are on the rise, and PDF files are commonly used as a means of attack. One common type of attack through PDF files is the covert embedding of dangerous malware and tricking users in... 详细信息
来源: 评论
Machine Learning Classification for Intrusion Detection on computer Networks  9
Machine Learning Classification for Intrusion Detection on C...
收藏 引用
9th IEEE International Conference on Computational Intelligence and Applications, ICCIA 2024
作者: Tachaapornchai, Abhibhu Kosolsombat, Somkiat Ratanavilisagul, Chiabwoot Data Science and Innovation College of Interdisciplinary Studies Thammasat University Pathum Thani Thailand King Mongkut's University of Technology Faculty of Applied Science Department of Computer and Information Science North Bangkok Thailand
To build an intelligent intrusion detection system, it is essential to have a suitable and high-quality dataset with a sufficiently large quantity to simulate real-world scenarios. The NSL-KDD dataset is an improved v... 详细信息
来源: 评论
Provenance model for Lattice QCD  40
Provenance model for Lattice QCD
收藏 引用
40th International Symposium on Lattice Field Theory, LATTICE 2023
作者: Auge, Tanja Bali, Gunnar Klettke, Meike Ludäscher, Bertram Söldner, Wolfgang Weishäupl, Simon Wettig, Tilo University of Regensburg Faculty of Computer Science and Data Science Germany University of Regensburg Department of Physics Germany University of Illinois at Urbana-Champaign School of Information Sciences United States
Workflow management has become an important topic in many research communities. Here, we focus on the particular aspect of provenance tracking. We follow the W3C PROV standard and formulate a provenance model for Latt... 详细信息
来源: 评论
Enhancing Organizational Performance: Synergy of Cyber-Physical Systems, Cloud Services, and Crowdsensing
收藏 引用
International Journal of Crowd science 2025年 第1期9卷 44-55页
作者: Al-Qerem, Ahmad Ali, Ali Mohd Nabot, Ahmad Jebreen, Issam Alauthman, Mohammad Alangari, Someah Aburub, Faisal Aldweesh, Amjad Computer Science Department Faculty of Information Technology Zarqa University Zarqa13110 Jordan Communications and Computer Engineering Department Faculty of Engineering Al-Ahliyya Amman University Amman19328 Jordan Department of Information Security University of Petra Amman11196 Jordan Department of Computer Science College of Science and Humanities Dawadmi Shaqra University Shaqra11911 Saudi Arabia Department of Business Intelligence and Data Analytics University of Petra Amman11196 Jordan College of Computing and Information Technology Shaqra University Shaqra11911 Saudi Arabia
In the contemporary business landscape, software has evolved into a strategic asset crucial for organizations seeking sustainable competitive advantage. The imperative of ensuring software quality becomes evident as l... 详细信息
来源: 评论
Factor Analysis: Uncovering Factor Structure in the Indonesian Teacher Engagement Index (ITEI) Survey Results data  11
Factor Analysis: Uncovering Factor Structure in the Indonesi...
收藏 引用
11th International Conference on computer, Control, Informatics and its Applications, IC3INA 2024
作者: Cam, Grace Shirley Sasmoko Indrianti, Yasinta Manalu, Sonya Rapinta Moniaga, Jurike V. Data Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia Primary Teacher Education Department Faculty Humanities Bina Nusantara University Jakarta Indonesia Entrepreneurship Department Podomoro University Jakarta Indonesia Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia
This study aims to explore the latent structure of the Indonesian Teacher Engagement Index (ITEI) based on the ITEI survey results of primary school teachers in various regions of Indonesia. Exploration of the ITEI st... 详细信息
来源: 评论