咨询与建议

限定检索结果

文献类型

  • 585 篇 会议
  • 445 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 1,039 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 576 篇 工学
    • 380 篇 计算机科学与技术...
    • 324 篇 软件工程
    • 140 篇 信息与通信工程
    • 74 篇 光学工程
    • 73 篇 控制科学与工程
    • 69 篇 电气工程
    • 69 篇 生物医学工程(可授...
    • 64 篇 电子科学与技术(可...
    • 64 篇 生物工程
    • 39 篇 仪器科学与技术
    • 35 篇 化学工程与技术
    • 34 篇 机械工程
    • 26 篇 网络空间安全
    • 25 篇 交通运输工程
    • 24 篇 动力工程及工程热...
    • 24 篇 土木工程
    • 23 篇 建筑学
  • 332 篇 理学
    • 144 篇 数学
    • 97 篇 物理学
    • 84 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 45 篇 化学
    • 34 篇 系统科学
  • 160 篇 管理学
    • 101 篇 管理科学与工程(可...
    • 63 篇 工商管理
    • 62 篇 图书情报与档案管...
  • 82 篇 医学
    • 68 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
    • 35 篇 公共卫生与预防医...
  • 23 篇 农学
  • 21 篇 经济学
  • 21 篇 法学
  • 5 篇 教育学
  • 3 篇 军事学
  • 2 篇 文学

主题

  • 70 篇 accuracy
  • 48 篇 deep learning
  • 44 篇 real-time system...
  • 42 篇 feature extracti...
  • 37 篇 internet of thin...
  • 32 篇 computational mo...
  • 29 篇 artificial intel...
  • 29 篇 convolutional ne...
  • 27 篇 training
  • 25 篇 predictive model...
  • 25 篇 machine learning
  • 20 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 security
  • 18 篇 decision making
  • 18 篇 cloud computing
  • 17 篇 prediction algor...
  • 17 篇 technological in...
  • 17 篇 data models
  • 16 篇 data mining

机构

  • 27 篇 department of co...
  • 20 篇 department of co...
  • 18 篇 shandong provinc...
  • 18 篇 department of co...
  • 14 篇 department of bi...
  • 12 篇 department of co...
  • 12 篇 key laboratory o...
  • 11 篇 department of ap...
  • 10 篇 lebedev physical...
  • 9 篇 university of ch...
  • 9 篇 department of co...
  • 9 篇 guangdong key la...
  • 8 篇 ifac sesto fiore...
  • 8 篇 department of ap...
  • 8 篇 university of fl...
  • 8 篇 infn sezione di ...
  • 8 篇 infn laboratori ...
  • 8 篇 department of co...
  • 8 篇 department of el...
  • 8 篇 department of el...

作者

  • 40 篇 günnemann stepha...
  • 13 篇 geisler simon
  • 10 篇 bruno a.
  • 10 篇 karelin a.v.
  • 10 篇 cafagna f.
  • 10 篇 marcelli l.
  • 10 篇 leonov a.
  • 10 篇 vacchi a.
  • 10 篇 pearce m.
  • 10 篇 mayorov a.g.
  • 10 篇 castellini g.
  • 10 篇 seifedine kadry
  • 10 篇 bongi m.
  • 10 篇 malakhov v.
  • 10 篇 campana d.
  • 10 篇 spillantini p.
  • 10 篇 casolino m.
  • 10 篇 mikhailov v.v.
  • 10 篇 yurkin y.t.
  • 9 篇 bogomolov e.a.

语言

  • 913 篇 英文
  • 119 篇 其他
  • 6 篇 中文
  • 1 篇 朝鲜文
检索条件"机构=Institute of Computer Science Data and Technical Networks"
1039 条 记 录,以下是81-90 订阅
排序:
Supervised Machine Learning Method for Bone Cancer Detection and Classification  3rd
Supervised Machine Learning Method for Bone Cancer Detection...
收藏 引用
3rd International Conference on Intelligent Systems and Sustainable Computing, ICISSC 2023
作者: Lingappa, Ediga Sriramya, P. Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Tamil Nadu Chennai600056 India Malla Reddy College of Engineering TS Dhulapally Secunderabad500100 India Department of Artificial Intelligence and Data Science Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Tamil Nadu Chennai600056 India
Bone cancer kills most people worldwide. X-rays, MRIs, and CT scans aid bone cancer diagnosis. Manual processes take too much time and knowledge. Thus, a machine learning system must distinguish malignant bone from he... 详细信息
来源: 评论
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc networks
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 1029-1057页
作者: Vincent Omollo Nyangaresi Arkan A.Ghaib Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo40601Kenya Department of Applied Electronics Saveetha School of EngineeringSIMATSChennaiTamilnadu602105India Information Technology Department Management Technical CollegeSouthern Technical UniversityBasrah61004Iraq Department of Computer Science College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq College of Big Data and Internet Shenzhen Technology UniversityShenzhen518118China Huazhong University of Science and Technology Shenzhen InstituteShenzhen518000China National Engineering Laboratory for Big Data System Computing Technology Shenzhen UniversityShenzhen518060China Computer Technology Engineering Department Iraq University CollegeBasrah61004Iraq Department of Mathematics College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq Institute of Mathematics University of DebrecenDebrecenH-4002Hungary Department of Electrical Engineering and Mechatronics Faculty of EngineeringUniversity of DebrecenDebrecen4028Hungary
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation ***,the exchange of beacons and messages over public c... 详细信息
来源: 评论
UNVEILING THE SAMPLING DENSITY IN NON-UNIFORM GEOMETRIC GRAPHS  11
UNVEILING THE SAMPLING DENSITY IN NON-UNIFORM GEOMETRIC GRAP...
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Paolino, Raffaele Bojchevski, Aleksandar Günnemann, Stephan Kutyniok, Gitta Levie, Ron Ludwig-Maximilians-Universität München Germany CISPA Helmholtz Center for Information Security Germany Department of Computer Science Munich Data Science Institute Technical University of Munich Germany Faculty of Mathematics Technion - Israel Institute of Technology Israel
A powerful framework for studying graphs is to consider them as geometric graphs: nodes are randomly sampled from an underlying metric space, and any pair of nodes is connected if their distance is less than a specifi... 详细信息
来源: 评论
Deep Learning Approaches for Road Damage Detection Using YOLOv8 and Custom Convolutional Neural Network  6
Deep Learning Approaches for Road Damage Detection Using YOL...
收藏 引用
6th International Conference on Frontier Technologies of Information and computer, ICFTIC 2024
作者: Khan, Muhammad Waseem Mahmood, Khalid Hussain, Israr Talha Qureshi, Muhammad Muhammad Sanaullah Badar, Hafiz Gao, Wu School of Computer Science Northwestern Poly technical University Center for Bio-inspired System-on-Chip Xi'an China Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Taiwan Institute of Computing Mns University of Agriculture Multan Pakistan Henan University Kaifeng450046 China
The identification of road damage is deemed very important to the preservation of infrastructure. Since recent development in deep learning provide great potential approaches, in this paper, three deep learning models... 详细信息
来源: 评论
An Optimal Scheme for WSN Based on Compressed Sensing
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 1053-1069页
作者: Firas Ibrahim AlZobi Ahmad Ali AlZubi Kulakov Yurii Abdullah Alharbi Jazem Mutared Alanazi Sami Smadi Department of Information Systems and Networks Faculty of Information TechnologyThe World Islamic Sciences&Education UniversityJordan Computer Science Department Community CollegeKing Saud UniversitySaudi Arabia Department of Computer Engineering National Technical University of Ukraine Igor Sikorsky Kyiv Polytechnic InstituteUkraine
Wireless sensor networks(WSNs)is one of the renowned ad hoc network technology that has vast varieties of applications such as in computer networks,bio-medical engineering,agriculture,industry and many *** has been us... 详细信息
来源: 评论
Machine Learning Framework for Loss Range Prediction of Hollow-core Anti-resonant Fibers
Machine Learning Framework for Loss Range Prediction of Holl...
收藏 引用
2024 Conference on Lasers and Electro-Optics, CLEO 2024
作者: Jewani, Yordanos Petry, Michael Sanchez-Arias, Rei Habib, Md Selim Department of Data Science and Business Analytics Florida Polytechnic University LakelandFL33805 United States Department of Aerospace and Geodesy Technical University of Munich Munich80333 Germany Department of Electrical Engineering and Computer Science Florida Institute of Technology FL32901 United States
A supervised machine learning framework is implemented to predict the propagation loss of randomly structured nested hollow-core anti-resonant fiber for the first time. The random forest classifier outperforms other m... 详细信息
来源: 评论
Knowledge Graph based Mutual Attention for Machine Reading Comprehension over Anti-Terrorism Corpus
收藏 引用
data Intelligence 2023年 第3期5卷 685-706页
作者: Feng Gao Jin Hou Jinguang Gu Lihua Zhang School of Computer Science and Technology Wuhan University of Science and TechnologyWuhan 430065Hubei The Key Laboratory of Rich-Media Knowledge Organization and Service of Digital Publishing Content Insitute of Scientic and Technical Information of ChinaBeijing 100038China Wuhan University of Science and Technology Big Data Science and Engineering Research Institute Wuhan 430065Hubei Eastchina Jiaotong University Nanchang 330013Jiangxi
Machine reading comprehension has been a research focus in natural language processing and intelligence ***,there is a lack of models and datasets for the MRC tasks in the anti-terrorism ***,current research lacks the... 详细信息
来源: 评论
Machine Learning Framework for Loss Range Prediction of Hollow-core Anti-resonant Fibers
Machine Learning Framework for Loss Range Prediction of Holl...
收藏 引用
CLEO: science and Innovations in CLEO 2024, CLEO: S and I 2024 - Part of Conference on Lasers and Electro-Optics
作者: Jewani, Yordanos Petry, Michael Sanchez-Arias, Rei Habib, Md Selim Department of Data Science and Business Analytics Florida Polytechnic University LakelandFL33805 United States Department of Aerospace and Geodesy Technical University of Munich Munich80333 Germany Department of Electrical Engineering and Computer Science Florida Institute of Technology FL32901 United States
A supervised machine learning framework is implemented to predict the propagation loss of randomly structured nested hollow-core anti-resonant fiber for the first time. The random forest classifier outperforms other m... 详细信息
来源: 评论
Enhancing face recognition performance: a comprehensive evaluation of deep learning models and a novel ensemble approach with hyperparameter tuning
收藏 引用
Soft Computing 2024年 第20期28卷 12399-12424页
作者: Selvaganesan, Jana Sudharani, B. Shekhar, S. N. Chandra Vaishnavi, K. Priyadarsini, K. Raju, K. Srujan Rao, T. Srinivasa Department of Electronics and Communication Engineering Vel Tech Rangarajan Dr. Sagunthala R & ampD Institute of Science and Technology Avadi Tamil Nadu Chennai600062 India Guntur Dist. Andhra Pradesh Vadlamudi India Department of Electronics and Communication Engineering Sreenidhi Institute of Science and Technology Telangana Hyderabad501301 India Department of Computer Science and Engineering Sona College of Technology Tamil Nadu Salem636005 India Department of Data Science and Business Systems School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nadu Kattankulathur603203 India Department of Computer Science and Engineering CMR Technical Campus Medchal Telangana Hyderabad501401 India Department of Electronics and Communication Engineering Aditya Engineering College Surampalem533437 India
In response to growing security concerns and the increasing demand for face recognition (FR) technology in various sectors, this research explores the application of deep learning techniques, specifically pre-trained ... 详细信息
来源: 评论
Unified mechanism-specific amplification by subsampling and group privacy amplification  24
Unified mechanism-specific amplification by subsampling and ...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Jan Schuchardt Mihail Stoian Arthur Kosmala Stephan Günnemann Dept. of Computer Science & Munich Data Science Institute Technical University of Munich Dept. of Engineering University of Technology Nuremberg
Amplification by subsampling is one of the main primitives in machine learning with differential privacy (DP): Training a model on random batches instead of complete datasets results in stronger privacy. This is tradi...
来源: 评论