咨询与建议

限定检索结果

文献类型

  • 2,056 篇 期刊文献
  • 1,461 篇 会议
  • 36 册 图书

馆藏范围

  • 3,553 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,037 篇 工学
    • 1,443 篇 计算机科学与技术...
    • 1,192 篇 软件工程
    • 419 篇 信息与通信工程
    • 350 篇 生物工程
    • 302 篇 生物医学工程(可授...
    • 251 篇 控制科学与工程
    • 237 篇 光学工程
    • 216 篇 电气工程
    • 137 篇 电子科学与技术(可...
    • 134 篇 化学工程与技术
    • 100 篇 机械工程
    • 85 篇 安全科学与工程
    • 78 篇 网络空间安全
    • 76 篇 动力工程及工程热...
    • 73 篇 仪器科学与技术
  • 1,566 篇 理学
    • 646 篇 数学
    • 641 篇 物理学
    • 418 篇 生物学
    • 243 篇 统计学(可授理学、...
    • 178 篇 化学
    • 108 篇 系统科学
  • 603 篇 管理学
    • 321 篇 管理科学与工程(可...
    • 307 篇 图书情报与档案管...
    • 185 篇 工商管理
  • 313 篇 医学
    • 261 篇 临床医学
    • 226 篇 基础医学(可授医学...
    • 142 篇 药学(可授医学、理...
    • 116 篇 公共卫生与预防医...
  • 112 篇 法学
    • 91 篇 社会学
  • 75 篇 经济学
    • 75 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 9 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 127 篇 accuracy
  • 118 篇 deep learning
  • 114 篇 machine learning
  • 75 篇 hadrons
  • 74 篇 feature extracti...
  • 72 篇 training
  • 68 篇 data models
  • 66 篇 convolutional ne...
  • 65 篇 artificial intel...
  • 59 篇 real-time system...
  • 55 篇 semantics
  • 54 篇 computational mo...
  • 52 篇 predictive model...
  • 50 篇 hadron colliders
  • 46 篇 hadronic decays
  • 44 篇 internet of thin...
  • 42 篇 support vector m...
  • 40 篇 optimization
  • 39 篇 data mining
  • 39 篇 visualization

机构

  • 427 篇 department of ph...
  • 410 篇 horia hulubei na...
  • 404 篇 van swinderen in...
  • 401 篇 school of physic...
  • 400 篇 iccub universita...
  • 398 篇 h.h. wills physi...
  • 398 篇 cavendish labora...
  • 383 篇 department of ph...
  • 382 篇 yandex school of...
  • 378 篇 imperial college...
  • 361 篇 university of ch...
  • 357 篇 stfc rutherford ...
  • 353 篇 center for high ...
  • 349 篇 institute of par...
  • 326 篇 henryk niewodnic...
  • 316 篇 nikhef national ...
  • 297 篇 school of physic...
  • 297 篇 physik-institut ...
  • 294 篇 oliver lodge lab...
  • 288 篇 school of physic...

作者

  • 252 篇 barter w.
  • 249 篇 bellee v.
  • 241 篇 beiter a.
  • 224 篇 casse g.
  • 223 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 amato s.
  • 215 篇 bediaga i.
  • 215 篇 boettcher t.
  • 210 篇 brundu d.
  • 210 篇 baryshnikov f.
  • 207 篇 braun s.
  • 205 篇 borisyak m.
  • 202 篇 bizzeti a.
  • 195 篇 bencivenni g.
  • 190 篇 back j.j.
  • 189 篇 bay a.
  • 176 篇 bursche a.

语言

  • 3,334 篇 英文
  • 209 篇 其他
  • 12 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 日文
  • 1 篇 俄文
检索条件"机构=Faculty for Computer Science and Data Science"
3553 条 记 录,以下是61-70 订阅
排序:
Enhancing Railway Safety with an IoT Based System for Real Time Fault Detection and Crack Monitoring  9
Enhancing Railway Safety with an IoT Based System for Real T...
收藏 引用
9th International Conference on Information Technology and Digital Applications, ICITDA 2024
作者: Thinakaran, Rajermani Jalari, Somasekar Neerugatti, Vikram Nalluri, Madhusudana Rao Chukka, Santhaiah Cholla, Ravindra Raman Inti International University Faculty of Data Science and Information Technology Malaysia Faculty of Engineering and technology Department of Computer Science and Engineering Bangalore India Icfai Foundation for Higher Education Department of Computer Science and Engineering Telangana Hyderabad India S V College of Engineering Department of Computer Science and Engineering Andhra Pradesh Tirupati India
Safety of railway is the major problem worldwide. It has problems like cracks or any fault in the railway tracks. These problems can cause severe accidents if it is not detected regularly and early. In traditional fau... 详细信息
来源: 评论
Granularity is crucial when applying differential privacy to text: An investigation for neural machine translation
Granularity is crucial when applying differential privacy to...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Vu, Doan Nam Long Igamberdiev, Timour Habernal, Ivan Trustworthy Human Language Technologies Germany Department of Computer Science Technical University of Darmstadt Germany Research Center Trustworthy Data Science and Security of the University Alliance Ruhr Faculty of Computer Science Ruhr University Bochum Germany
Applying differential privacy (DP) by means of the DP-SGD algorithm to protect individual data points during training is becoming increasingly popular in NLP. However, the choice of granularity at which DP is applied ... 详细信息
来源: 评论
Exploring Artificial Neural Network Models for c-VEP Decoding in a Brain-Artificial Intelligence Interface
Exploring Artificial Neural Network Models for c-VEP Decodin...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Miao, Zhengqing Meunier, Anja Žák, Michal Robert Grosse-Wentrup, Moritz Justus Liebig University Giessen Department of Psychology Giessen Germany University of Vienna Doctoral School Computer Science Faculty of Computer Science Vienna Austria University of Vienna Research Group Neuroinformatics Faculty of Computer Science Vienna Austria University of Vienna Vienna Cognitive Science Hub Vienna Austria University of Vienna Research Network Data Science Vienna Austria
The Conversational Brain-Artificial Intelligence Interface (BAI) is a novel brain-computer interface (BCI) that uses artificial intelligence (AI) to help individuals with severe language impairments communicate. It tr... 详细信息
来源: 评论
Diagnosis of Malignant Lymphoma Cancer Using Hybrid Optimized Techniques Based on Dense Neural Networks
Diagnosis of Malignant Lymphoma Cancer Using Hybrid Optimize...
收藏 引用
2024 International Conference on computer and Applications, ICCA 2024
作者: Aly, Salah A. Bakhiet, Ali Balat, Mazen Badya University Faculty of Computing & Data Science Giza Egypt Fayoum University Faculty of Science Computer Science Dept. Fayoum Egypt Computer Science Dept. October 6th City Giza Egypt E-Japanese University of Science & Tech. Cs & It Dept. Alexandria Egypt
Lymphoma diagnosis, particularly distinguishing between subtypes, is critical for effective treatment but remains challenging due to the subtle morphological differences in histopathological images. This study present... 详细信息
来源: 评论
Phasmatodea Population Evolution Algorithm Based on Spiral Mechanism and Its Application to data Clustering
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 475-496页
作者: Jeng-Shyang Pan Mengfei Zhang Shu-Chuan Chu Xingsi Xue Václav Snášel College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao266590China School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing210044China Department of Information Management Chaoyang University of TechnologyTaichung41349TaiwanChina Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of TechnologyFuzhou350118China Faculty of Electrical Engineering and Computer Science VŠB-Technical University of OstravaOstrava70833Czech Republic
data clustering is an essential technique for analyzing complex datasets and continues to be a central research topic in data *** clustering algorithms,such as K-means,are widely used due to their simplicity and *** p... 详细信息
来源: 评论
Hybrid Genetic Algorithm and Ant Colony Algorithm for Solving Travelling Salesman Problem  9
Hybrid Genetic Algorithm and Ant Colony Algorithm for Solvin...
收藏 引用
9th IEEE International Conference on Computational Intelligence and Applications, ICCIA 2024
作者: Thongpiem, Jirawat Punkong, Narong Ratanavilisagul, Chiabwoot Kosolsombat, Somkiat Faculty of Applied Science Department of Computer and Information Sciences Bangkok Thailand Digital Technology for Business Faculty of Management Science Kanchanaburi Thailand Data Science and Innovation College of Interdisciplinary Studies Thammasat University Pathum Thani Thailand
The traveling salesman problem (TSP) is a combinatorial optimization problem and a NP-complete problem. It is a well-known problem for comparison of algorithm performance. Many researchers try to solve the TSP by the ... 详细信息
来源: 评论
Griffin: Fast Transactional database Index with Hash and B+-Tree  20
Griffin: Fast Transactional Database Index with Hash and B+-...
收藏 引用
20th IEEE International Conference on e-science, e-science 2024
作者: Nakazono, Sho Bessho, Yutaro Kawashima, Hideyuki Nakamori, Tatsuhiro NTT Computer and Data Science Laboratories Tokyo Japan Keio University Faculty of Environment and Information Studies Kanagawa Japan
Index access is one of the dominant performance factors in transactional database systems. Many systems use a B+tree or one of its variants to handle point and range operations. This access pattern has room for perfor... 详细信息
来源: 评论
Utilization of Machine Learning in Breast Cancer Detection  25
Utilization of Machine Learning in Breast Cancer Detection
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Momani, Mutaz Yousef, Nidal Aljawazneh, Qotadeh Issa, A.T. Abuowaida, Suhaila Alazaidah, Raed Khouj, Mohammed Talat Batyha, Radwan Elsoud, Esraa Abu Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan Al-Albayt University Faculty of Information Technology Department of Computer Science Mafraq Jordan Zarqa University Department of Data Science and Ai Faculty of Information Technology Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Private University Faculty of It Applied Science Department of Computer Science Amman Jordan
Breast cancer is the most prevalent cancer among women and can be deadly, necessitating early detection to enhance patient outcomes and treatment effectiveness. Recently, Machine Learning (ML) techniques have shown po... 详细信息
来源: 评论
Multi-Task Learning Frameworks to Classify Food and Estimate Weight From a Single Image  20
Multi-Task Learning Frameworks to Classify Food and Estimate...
收藏 引用
20th International Joint Conference on computer science and Software Engineering, JCSSE 2023
作者: Siwathammarat, Pakin Jesadaporn, Panas Chawachat, Jakarin Chiang Mai University Data Science Research Center Faculty of Science Thailand Chiang Mai University Faculty of Medicine Department of Internal Medicine Thailand Faculty of Science Department of Computer Science Chiang Mai Thailand
Usually, elderly patients in hospitals suffer from malnutrition because they are unable to consume food as prescribed by doctors or nutritionists. Analyzing food intake is labor-intensive and time-consuming. Therefore... 详细信息
来源: 评论
The Evolution of Zero Trust Architecture (ZTA) from Concept to Implementation  29
The Evolution of Zero Trust Architecture (ZTA) from Concept ...
收藏 引用
29th International Conference on Information Technology, IT 2025
作者: Nasiruzzaman, Md Ali, Maaruf Salam, Iftekhar Miraz, Mahdi H. Xiamen University Malaysia School of Computing and Data Science Malaysia Universiteti Metropolitan Tirana Faculty of Computer Science and IT Albania The Doctoral College United Kingdom Xiamen University Malaysia Mahdi H. Miraz Is with the School of Computing and Data Science Malaysia Wrexham University School of Computing Faculty of Arts Science and Technology United Kingdom University of South Wales Faculty of Computing Engineering and Science United Kingdom
Zero Trust Architecture (ZTA) is one of the paradigm changes in cybersecurity, from the traditional perimeter-based model to perimeterless. This article studies the core concepts of ZTA, its beginning, a few use cases...
来源: 评论