咨询与建议

限定检索结果

文献类型

  • 1,019 篇 期刊文献
  • 985 篇 会议
  • 20 册 图书

馆藏范围

  • 2,024 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,151 篇 工学
    • 816 篇 计算机科学与技术...
    • 659 篇 软件工程
    • 252 篇 信息与通信工程
    • 162 篇 控制科学与工程
    • 161 篇 电气工程
    • 160 篇 生物工程
    • 128 篇 生物医学工程(可授...
    • 109 篇 光学工程
    • 84 篇 电子科学与技术(可...
    • 65 篇 机械工程
    • 65 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 52 篇 动力工程及工程热...
    • 51 篇 化学工程与技术
    • 49 篇 安全科学与工程
  • 734 篇 理学
    • 338 篇 数学
    • 225 篇 物理学
    • 190 篇 生物学
    • 123 篇 统计学(可授理学、...
    • 85 篇 化学
    • 53 篇 系统科学
  • 354 篇 管理学
    • 205 篇 管理科学与工程(可...
    • 157 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 162 篇 医学
    • 122 篇 临床医学
    • 97 篇 基础医学(可授医学...
    • 73 篇 公共卫生与预防医...
    • 53 篇 药学(可授医学、理...
  • 70 篇 法学
    • 58 篇 社会学
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 41 篇 农学
  • 24 篇 教育学
  • 8 篇 文学
  • 3 篇 军事学
  • 1 篇 艺术学

主题

  • 95 篇 accuracy
  • 86 篇 feature extracti...
  • 85 篇 machine learning
  • 82 篇 deep learning
  • 72 篇 training
  • 46 篇 computational mo...
  • 44 篇 semantics
  • 43 篇 data models
  • 43 篇 convolutional ne...
  • 40 篇 data mining
  • 40 篇 artificial intel...
  • 39 篇 optimization
  • 39 篇 predictive model...
  • 33 篇 federated learni...
  • 32 篇 visualization
  • 31 篇 real-time system...
  • 29 篇 security
  • 28 篇 measurement
  • 23 篇 reliability
  • 23 篇 support vector m...

机构

  • 60 篇 shandong provinc...
  • 58 篇 key laboratory o...
  • 52 篇 shandong enginee...
  • 46 篇 maharishi school...
  • 43 篇 centre of interd...
  • 35 篇 faculty of data ...
  • 32 篇 department of ar...
  • 31 篇 faculty of infor...
  • 28 篇 vishwakarma inst...
  • 27 篇 graduate school ...
  • 20 篇 university of ch...
  • 18 篇 faculty of infor...
  • 18 篇 department of co...
  • 17 篇 faculty of data ...
  • 17 篇 education and re...
  • 15 篇 hokkaido univers...
  • 15 篇 faculty of data ...
  • 14 篇 department of da...
  • 14 篇 shandong provinc...
  • 13 篇 faculty of infor...

作者

  • 30 篇 wang hao
  • 26 篇 haseyama miki
  • 26 篇 ogawa takahiro
  • 25 篇 togo ren
  • 22 篇 zhou xiaokang
  • 21 篇 takahiro ogawa
  • 20 篇 miki haseyama
  • 19 篇 ren togo
  • 16 篇 alazaidah raed
  • 16 篇 raed alazaidah
  • 15 篇 pan shirui
  • 14 篇 mustakim
  • 14 篇 merhof dorit
  • 14 篇 azad reza
  • 13 篇 li yuan-fang
  • 12 篇 jing zhao
  • 12 篇 maeda keisuke
  • 12 篇 xiaokang zhou
  • 12 篇 zhenyu yang
  • 11 篇 ghassan samara

语言

  • 1,624 篇 英文
  • 393 篇 其他
  • 15 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Data Science and Information Technology"
2024 条 记 录,以下是511-520 订阅
排序:
Machine Learning Classification for Intrusion Detection on Computer Networks
Machine Learning Classification for Intrusion Detection on C...
收藏 引用
International Conference on Computational Intelligence and Applications (ICCIA)
作者: Abhibhu Tachaapornchai Somkiat Kosolsombat Chiabwoot Ratanavilisagul Data Science and Innovation College of Interdisciplinary Studies Thammasat University Pathum Thani Thailand Department of Computer and Information Science Faculty of Applied Science King Mongkut's University of Technology North Bangkok Thailand
To build an intelligent intrusion detection system, it is essential to have a suitable and high-quality dataset with a sufficiently large quantity to simulate real-world scenarios. The NSL-KDD dataset is an improved v... 详细信息
来源: 评论
PDF Malware Detection Using Machine Learning
PDF Malware Detection Using Machine Learning
收藏 引用
International Conference on Computational Intelligence and Applications (ICCIA)
作者: Naragorn Tantikulvichit Somkiat Kosolsombat Chiabwoot Ratanavilisagul Data Science and Innovation College of Interdisciplinary Studies Thammasat University Pathum Thani Thailand Department of Computer and Information Science Faculty of Applied Science King Mongkut's University of Technology North Bangkok Thailand
In today's world, cyber-attacks are on the rise, and PDF files are commonly used as a means of attack. One common type of attack through PDF files is the covert embedding of dangerous malware and tricking users in... 详细信息
来源: 评论
Review of Applications in Brain-Computer Interfaces Using the EMOTIV Insight Headset
Review of Applications in Brain-Computer Interfaces Using th...
收藏 引用
technology & Engineering Management Conference - Asia Pacific (TEMSCON-ASPAC), IEEE
作者: Yamin Thwe Nipat Jongsawat Julaluk Watthananon Padma Nyoman Crisnapati I Made Agus Wirawan Yuri Pamungkas Computer Science Department Faculty of Science and Technology RMUTT PathumThani Thailand Data and Information Science Faculty of Science and Technology RMUTT PathumThani Thailand Mechatronics Engineering Department Faculty of Technical Education RMUTT PathumThani Thailand Education of Informatic Engineering Department Universitas Pendidikan Ganesha Bali Indonesia Medical Technology Institut Teknologi Sepuluh Nopember Surabaya Indonesia
This review explores advancements in Brain-Computer Interfaces (BCIs) using the EMOTIV Insight headset, a non-invasive electroencephalography (EEG) device. The study addresses the rising interest in affordable EEG dev... 详细信息
来源: 评论
Unlocking the Future: A Decade of Insights into Short-Term Stock Market Trends with Machine Learning and the S&P 500 Index
Unlocking the Future: A Decade of Insights into Short-Term S...
收藏 引用
Innovative Research in Applied science, Engineering and technology (IRASET),Conference on
作者: Salma Tajbel Zouhair Elamrani Abou Elassad Abdelghafour Atlas Modélisation des systèmes complexes (MSC) Ecole nationale des sciences appliquées Marrakech Morocco Data Science Lab Faculty of Science and Information Technology Birulia Bangladesh
This research paper presents a comprehensive exploration of short-term stock market trend prediction using state-of-the-art machine learning techniques, anchored in a decade-long analysis of the S&P 500 Index. Lev... 详细信息
来源: 评论
Evolutionary Approach to Security Games with Signaling  31
Evolutionary Approach to Security Games with Signaling
收藏 引用
31st International Joint Conference on Artificial Intelligence, IJCAI 2022
作者: Żychowski, Adam Mańdziuk, Jacek Bondi, Elizabeth Venugopal, Aravind Tambe, Milind Ravindran, Balaraman Faculty of Mathematics and Information Science Warsaw University of Technology Poland Center for Research on Computation and Society Harvard University United States Robert Bosch Centre for Data Science and AI IIT Madras India Department of Computer Science and Engineering IIT Madras India
Green Security Games have become a popular way to model scenarios involving the protection of natural resources, such as wildlife. Sensors (e.g. drones equipped with cameras) have also begun to play a role in these sc... 详细信息
来源: 评论
Designing Robust Deep Learning Models for RealTime data Analysis in Machine Learning  3
Designing Robust Deep Learning Models for RealTime Data Anal...
收藏 引用
3rd International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Borade, Monali R. Gupta, Mukur Faiz, Ayaan Acharjya, Kalyan Rajesh, A. Nunciya, P.M. Vishwakarma Institute of Information Technology Department of Artificial Intelligence & Data Science Pune India Vivekananda Global University Department of Electrical Engineering Jaipur India Centre of Interdisciplinary Research in Business and Technology Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Department of Computer Science Engineering Faculty of Engineering and Technology Karnataka Ramnagar562112 India Prince Shri Venkateshwara Padmavathy Engineering College Department of Master of Business Administration Chennai127 India
The developing call for real-time statistics analysis and selection-making has been a primary driver of improving deep studying models for the device getting to know. These models permit the evaluation of massive stat... 详细信息
来源: 评论
A Sketch-Based Generation Model for Diverse Ceramic Tile Images Using Generative Adversarial Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第9期37卷 2865-2882页
作者: Jianfeng Lu Xinyi Liu Mengtao Shi Chen Cui Mahmoud Emam School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityZhejiang Police CollegeHangzhou310000China Faculty of Artificial Intelligence Menoufia UniversityShebin El-Koom32511Egypt
Ceramic tiles are one of the most indispensable materials for interior *** ceramic patterns can’t match the design requirements in terms of diversity and interactivity due to their natural *** this paper,we propose a... 详细信息
来源: 评论
Drone Gesture Control using OpenCV and Tello
Drone Gesture Control using OpenCV and Tello
收藏 引用
Conference on information Communication technology and Society (ICTAS)
作者: Nokuthula Khoza Pius Owolawi Vusumuzi Malele Department of Computer Systems Engineering Faculty of Information and Communication Technology Soshanguve Campus Tshwane University of Technology Pretoria South Africa Unit for Data Science and Computing School of Computer Science and Information Systems Vanderbijlpark Campus North-West University Vanderbijlpark South Africa
Tracking a person with an onboard camera is a very difficult and perhaps technically impossible if one camera is used. In this regard, real-life projects use a series of cameras to achieve the task. The advent of came...
来源: 评论
A Novel Image Encryption and Decoding Approach Based on DNA Coding and Arnold's Transformation for IoT Applications
A Novel Image Encryption and Decoding Approach Based on DNA ...
收藏 引用
Telecommunications Conference (ITC-Egypt), International
作者: Nawal Shaltout Ahmed A. Abd El-Latif Waleed Al-Adrousy Mohamed Hammad Abdelhamied A. Ateya Samir Elmougy Department of Computer Science Faculty of Computers and Information Mansoura University Mansoura Egypt EIAS Data Science Lab College of Computer and Information Sciences Prince Sultan University Riyadh Saudi Arabia Department of Mathematics and Computer Science Faculty of Science Menoufia University Egypt Department of Information Technology Faculty of Computers and Information Menoufia University Shibin El Kom Egypt Department of Electronics and Communications Engineering Zagazig University Zagazig Egypt
Nowadays, the Internet of Things (IoT) is significantly utilized by an extensive range of applications that lead to the enhancement of different aspects of defense and military capabilities. In IoT, a wide range of sm... 详细信息
来源: 评论
An Evaluation Metric for Single Image-to-3D Models Based on a Class Confidence Score of Object Detection Models
An Evaluation Metric for Single Image-to-3D Models Based on ...
收藏 引用
IEEE Global Conference on Consumer Electronics (GCCE)
作者: Yuiko Uchida Ren Togo Keisuke Maeda Takahiro Ogawa Miki Haseyama School of Engineering Hokkaido University Japan Faculty of Information Science and Technology Hokkaido University Japan Data-Driven Interdisciplinary Research Emergence Department Hokkaido University Japan
This paper proposes a novel evaluation metric for single image-to-3D models based on a class confidence score of an object detection model. Traditional metrics, such as Structural Similarity Index and CLIP-similarity,... 详细信息
来源: 评论