咨询与建议

限定检索结果

文献类型

  • 671 篇 期刊文献
  • 449 篇 会议
  • 13 册 图书

馆藏范围

  • 1,133 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 642 篇 工学
    • 472 篇 计算机科学与技术...
    • 387 篇 软件工程
    • 129 篇 信息与通信工程
    • 96 篇 电气工程
    • 92 篇 生物工程
    • 84 篇 生物医学工程(可授...
    • 73 篇 控制科学与工程
    • 72 篇 光学工程
    • 62 篇 电子科学与技术(可...
    • 49 篇 机械工程
    • 29 篇 网络空间安全
    • 27 篇 仪器科学与技术
    • 25 篇 交通运输工程
    • 24 篇 化学工程与技术
  • 455 篇 理学
    • 177 篇 数学
    • 175 篇 物理学
    • 121 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 34 篇 地球物理学
    • 32 篇 系统科学
    • 25 篇 化学
  • 184 篇 管理学
    • 112 篇 管理科学与工程(可...
    • 77 篇 图书情报与档案管...
    • 63 篇 工商管理
  • 112 篇 医学
    • 94 篇 临床医学
    • 79 篇 基础医学(可授医学...
    • 53 篇 公共卫生与预防医...
    • 33 篇 药学(可授医学、理...
  • 36 篇 法学
    • 31 篇 社会学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 17 篇 教育学
  • 16 篇 农学
  • 3 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 47 篇 accuracy
  • 44 篇 deep learning
  • 42 篇 machine learning
  • 33 篇 feature extracti...
  • 28 篇 computational mo...
  • 26 篇 semantics
  • 24 篇 convolutional ne...
  • 23 篇 artificial intel...
  • 23 篇 training
  • 20 篇 predictive model...
  • 20 篇 real-time system...
  • 19 篇 neural networks
  • 17 篇 federated learni...
  • 17 篇 data models
  • 16 篇 visualization
  • 15 篇 internet of thin...
  • 15 篇 contrastive lear...
  • 14 篇 optimization
  • 14 篇 security
  • 13 篇 data mining

机构

  • 60 篇 shandong provinc...
  • 49 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 20 篇 department of ph...
  • 20 篇 hiroshima astrop...
  • 19 篇 faculty of data ...
  • 19 篇 department of ph...
  • 17 篇 college of compu...
  • 15 篇 dipartimento di ...
  • 15 篇 shandong fundame...
  • 14 篇 dipartimento di ...
  • 14 篇 deutsches elektr...
  • 14 篇 w. w. hansen exp...
  • 14 篇 istituto naziona...
  • 14 篇 istituto naziona...
  • 14 篇 nasa goddard spa...
  • 13 篇 department of ph...
  • 13 篇 science institut...
  • 13 篇 max-planck-insti...
  • 13 篇 istituto naziona...

作者

  • 17 篇 niyato dusit
  • 15 篇 gargano f.
  • 14 篇 bastieri d.
  • 14 篇 sgrò c.
  • 14 篇 lubrano p.
  • 14 篇 spinelli p.
  • 14 篇 kuss m.
  • 14 篇 giroletti m.
  • 13 篇 ajello m.
  • 13 篇 green d.
  • 13 篇 orlando e.
  • 13 篇 nuss e.
  • 13 篇 torres d.f.
  • 12 篇 monzani m.e.
  • 12 篇 cameron r.a.
  • 12 篇 siskind e.j.
  • 12 篇 morselli a.
  • 12 篇 reimer o.
  • 12 篇 mizuno t.
  • 12 篇 piron f.

语言

  • 1,017 篇 英文
  • 112 篇 其他
  • 6 篇 中文
  • 2 篇 斯洛文尼亚文
检索条件"机构=Faculty of Data Science and Computing"
1133 条 记 录,以下是431-440 订阅
排序:
Anomaly-Free Prior Guided Knowledge Distillation for Industrial Anomaly Detection
Anomaly-Free Prior Guided Knowledge Distillation for Industr...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Gang Li Tianjiao Chen Min Li Delong Han MingLe Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Faculty of Data Science City University of Macau Macau China
In industrial manufacturing, visual anomaly detection is critical for maintaining product quality by detecting and preventing production anomalies. Anomaly detection methods based on knowledge distillation demonstrate... 详细信息
来源: 评论
FGSNet: A Finer-Grained Siamese Network for Industrial Few-Shot Anomaly Detection
FGSNet: A Finer-Grained Siamese Network for Industrial Few-S...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: DeLong Han Luo Xu MingLe Zhou Gang Li Min Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Faculty of Data Science City University of Macau Macau China
Image anomaly detection usually relies on a large set of training samples and abnormal samples are relatively rare and challenging to obtain in daily industrial scenarios. In the scenario of Few-Shot Anomaly Detection... 详细信息
来源: 评论
MemADet: A Representative Memory Bank Approach for Industrial Image Anomaly Detection
MemADet: A Representative Memory Bank Approach for Industria...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Min Li Jinghui He Zuobin Ying Gang Li Mingle Zhou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Faculty of Data Science City University of Macau Macau China
In the field of industrial production, anomaly detection is crucial for ensuring product quality and maintaining production efficiency. With the continuous advancement of computer vision technology, it has shown treme... 详细信息
来源: 评论
Applications of Artificial Intelligence in Biomedical Image Processing  2
Applications of Artificial Intelligence in Biomedical Image ...
收藏 引用
2nd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2022
作者: Rajeyyagari, Sivaram Hung, Bui Thanh Chakrabarti, Prasun Shaqra University College of Computing and Information Technology Department of Computer Science Shaqra Saudi Arabia Thu Dau Mot University Data Analytics and Artificial Intelligence Laboratory Engineering Technology Faculty Thu Dau Mot Viet Nam Provost and Institute Endowed Distinguished Senior Chair Professor Techno India Njr Institute of Technology Rajasthan India
The biomedical applications of nanoparticles are growing in recent years. The uses range from diagnostic to therapeutic purposes, and researchers are constantly introducing new ways. Biosensors, miniaturization techni... 详细信息
来源: 评论
CrypToth: Cryptic Pocket Detection through Mixed-Solvent Molecular Dynamics Simulations-Based Topological data Analysis
收藏 引用
Journal of Chemical Information and Modeling 2025年 第11期65卷 5567-5575页
作者: Koseki, Jun Motono, Chie Yanagisawa, Keisuke Kudo, Genki Yoshino, Ryunosuke Hirokawa, Takatsugu Imai, Kenichiro Cellular and Molecular Biotechnology Research Institute National Institute of Advanced Industrial Science and Technology (AIST) Tokyo 135-0064 Japan Integrated Research Center for Self-Care Technology (irc-sct) National Institute of Advanced Industrial Science and Technology (AIST) Tokyo 135-0064 Japan Computational Bio Big-Data Open Innovation Laboratory (CBBD-OIL) National Institute of Advanced Industrial Science and Technology (AIST) Waseda University Shinjuku-ku Tokyo 169-8555 Japan Department of Computer Science School of Computing Institute of Science Tokyo Tokyo 152-8550 Japan Middle Molecule IT-based Drug Discovery Laboratory (MIDL) Institute of Science Tokyo Tokyo 152-8550 Japan Physics Department Graduate School of Pure and Applied Sciences University of Tsukuba Ibaraki 305-8571 Japan Division of Biomedical Science Faculty of Medicine University of Tsukuba Ibaraki 305-8575 Japan Transborder Medical Research Center University of Tsukuba Ibaraki 305-8577 Japan Global Research and Development Center for Business By Quantum-AI Technology (G-QuAT) National Institute of Advanced Industrial Science and Technology (AIST) Ibaraki 305-8560 Japan
Some functional proteins undergo conformational changes to expose hidden binding sites when a binding molecule approaches their surface. Such binding sites are called cryptic sites and are important targets for drug d... 详细信息
来源: 评论
Contrastive Learning for Chest X-ray Classification: A Fusion of Topological data Analysis and ResNet
Contrastive Learning for Chest X-ray Classification: A Fusio...
收藏 引用
IEEE International Conference on data science in Cyberspace (DSC)
作者: Hao Ren Zeyu Luo Fengshi Jing Xinyue Zhang Han He Yonghao Yu Dawei Zhao Faculty of Data Science City University of Macau China Minzu University of China Beijing China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Lung diseases such as pneumonia and tuberculosis present significant global health challenges, leading to millions of deaths annually. Chest X-ray imaging is crucial for diagnosing these conditions, but interpretation... 详细信息
来源: 评论
A Review of the Effectiveness of Management Information System in Decision Making
A Review of the Effectiveness of Management Information Syst...
收藏 引用
Computer science and Emerging Technologies (CSET), International Conference on
作者: Hazem Mohammad Zeidan Al-kaseasbeh Firas Rashed Wahsheh Fatma Susilawati Mohamad Julaily Aida Jusoh Mazen Mohammed Farea Archana K V MIS BI and Data Analysis Department Faculty of Business and Financial Science Irbid National University Irbid Jordan Department of Management Information Systems Faculty of Business Ajloun National University Ajloun Jordan Faculty of Informatics and Computing UniSZA Malaysia Faculty of Finance & Administrative Sciences Al-Madinah International University Malaysia Jain Deemed To Be University Bangalore India
The rapid advancement of technology has revolutionized the way organizations operate, resulting in the widespread adoption of Management Information Systems (MIS) as a crucial tool in decision-making processes. This r...
来源: 评论
Fortifying database Security: Integrating Advanced Honeypot Technology for Resilient SQL Injection Defense
Fortifying Database Security: Integrating Advanced Honeypot ...
收藏 引用
Communication, Computer sciences and Engineering (IC3SE), International Conference on
作者: Kumaran U Thammisetty Swetha G. S. N. Santhosh Reddy Harini Ala Senthil Murugan Nagarajan B. Umah Department of Computer Science & Engineering Amrita School of Computing Bengaluru India Department of Computer Science & Engineering (Data Science) Madanapalle Institute of Technology & Science Madanapalle Andhra Pradesh India Department of Electronics and Communication Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Bengaluru Karnataka India Department of Mathematics Faculty of Science Technology and Medicine University of Luxembourg Luxembourg Department of Computer Science & Engineering Amrita School of Engineering Amrita Vishwa Vidyapeetham Bengaluru Karnataka India
The dynamic nature of cyber threats necessitates the development of novel approaches to strengthen database system security. The novel method for fortifying defenses against SQL injection attacks—a pervasive and ongo... 详细信息
来源: 评论
When Artificial Intelligence meets Navarasas - Facial Expression Classification in Kathakali Using DSFD and CNN
When Artificial Intelligence meets Navarasas - Facial Expres...
收藏 引用
IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES)
作者: Ganesh Neelakanta Iyer Nattapong Saengarunvong Minh Hien Le Department of Computer Science School of Computing National University of Singapore Singapore Department of Computer Engineering Faculty of Engineering King Mongkut’s University of Technology Thonburi Bangkok Thailand Department of Computer and Data Sciences Case School of Engineering Case Western Reserve University Cleveland Ohio USA
Kathakali, an ancient art form that dates back to the 17th century, is renowned for its intricate hand gestures, dance movements, musical accompaniment, elaborate costumes, and makeup. Mastering such an art form is a ... 详细信息
来源: 评论
Detection of ARP Spoofing Attack in Healthcare Networks Using a LSTM Model
Detection of ARP Spoofing Attack in Healthcare Networks Usin...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Salam Al-E'mari Yousef Sanjalawe Ghader Kurdi Budoor Allehyani Information Security Department Faculty of Information Technology University of Petra (UoP) Amman Jordan Information Technology Department King Abdullah II School for Information Technology The University of Jordan (UJ) Amman Jordan Department of Data Science College of Computing Umm Al-Qura University (UQU) Makkah Saudi Arabia Department of Software Engineering College of Computing Umm Al-Qura University (UQU) Makkah Saudi Arabia
Healthcare networks face significant cybersecurity threats due to their extensive interconnectivity, with Address Resolution Protocol (ARP) spoofing posing a major risk to the confidentiality and integrity of medical ... 详细信息
来源: 评论