咨询与建议

限定检索结果

文献类型

  • 1,599 篇 会议
  • 1,346 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 2,954 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,637 篇 工学
    • 940 篇 计算机科学与技术...
    • 765 篇 软件工程
    • 276 篇 信息与通信工程
    • 223 篇 电子科学与技术(可...
    • 214 篇 电气工程
    • 204 篇 生物工程
    • 196 篇 控制科学与工程
    • 178 篇 生物医学工程(可授...
    • 155 篇 光学工程
    • 149 篇 化学工程与技术
    • 126 篇 材料科学与工程(可...
    • 101 篇 机械工程
    • 87 篇 仪器科学与技术
    • 85 篇 动力工程及工程热...
    • 68 篇 土木工程
  • 1,183 篇 理学
    • 491 篇 物理学
    • 419 篇 数学
    • 291 篇 生物学
    • 175 篇 化学
    • 175 篇 统计学(可授理学、...
    • 71 篇 系统科学
  • 397 篇 管理学
    • 226 篇 管理科学与工程(可...
    • 191 篇 图书情报与档案管...
    • 134 篇 工商管理
  • 210 篇 医学
    • 166 篇 临床医学
    • 142 篇 基础医学(可授医学...
    • 67 篇 公共卫生与预防医...
    • 66 篇 药学(可授医学、理...
  • 99 篇 教育学
    • 93 篇 教育学
  • 80 篇 法学
    • 72 篇 社会学
  • 72 篇 农学
  • 52 篇 经济学
  • 8 篇 文学
  • 1 篇 哲学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 52 篇 computer science
  • 47 篇 accuracy
  • 44 篇 feature extracti...
  • 43 篇 machine learning
  • 39 篇 internet of thin...
  • 38 篇 deep learning
  • 36 篇 training
  • 34 篇 data mining
  • 34 篇 computational mo...
  • 34 篇 visualization
  • 34 篇 students
  • 33 篇 education
  • 31 篇 covid-19
  • 25 篇 predictive model...
  • 25 篇 artificial intel...
  • 22 篇 support vector m...
  • 22 篇 computer archite...
  • 22 篇 technological in...
  • 22 篇 data models
  • 21 篇 real-time system...

机构

  • 27 篇 computer science...
  • 24 篇 school of physic...
  • 22 篇 department of ph...
  • 22 篇 department of ph...
  • 21 篇 kavli institute ...
  • 21 篇 computer science...
  • 21 篇 university of ch...
  • 19 篇 physics division...
  • 19 篇 enrico fermi ins...
  • 18 篇 applied mathemat...
  • 17 篇 department of as...
  • 16 篇 advanced institu...
  • 16 篇 harvey mudd coll...
  • 16 篇 computer science...
  • 16 篇 nist quantum dev...
  • 15 篇 fermi national a...
  • 14 篇 school of physic...
  • 14 篇 applied computer...
  • 14 篇 department of ph...
  • 13 篇 department of ph...

作者

  • 35 篇 gaol ford lumban
  • 26 篇 muhammad zarlis
  • 22 篇 jasra ajay
  • 21 篇 heryadi yaya
  • 20 篇 halverson n.w.
  • 20 篇 benson b.a.
  • 20 篇 padin s.
  • 19 篇 everett w.
  • 19 篇 ruhl j.e.
  • 19 篇 bender a.n.
  • 18 篇 whitehorn n.
  • 18 篇 smecher g.
  • 18 篇 schaffer k.k.
  • 18 篇 bens pardamean
  • 18 篇 holzapfel w.l.
  • 18 篇 novosad v.
  • 18 篇 matsuo tokuro
  • 18 篇 holder g.p.
  • 18 篇 zarlis muhammad
  • 17 篇 meyer s.s.

语言

  • 2,853 篇 英文
  • 76 篇 其他
  • 17 篇 中文
  • 7 篇 日文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Program in Computer Science & Technology"
2954 条 记 录,以下是2551-2560 订阅
排序:
RETRACTED ARTICLE: Effect of human intervention in cause effect relationship
RETRACTED ARTICLE: Effect of human intervention in cause eff...
收藏 引用
作者: Kooptiwoot, Suwimon Computer Science Program Faculty of Science and Technology Suan Sunandha Rajabhat University 1 Uthong Nok Dusit Bangkok 10300 Thailand
In this paper we propose the effect of human intervention in cause effect relationships. In data mining, human intervention has effect on the prediction the results of the relationships. If we ignore human interventio... 详细信息
来源: 评论
Classifying semantic orientation of domain-dependent words with unknown sentiments
Classifying semantic orientation of domain-dependent words w...
收藏 引用
7th Annual International Conference on Electrical Engineering/Electronics, computer, Telecommunications and Information technology, ECTI-CON 2010
作者: Tangyotkhajorn, Suthasinee Luchaichana, Onpapim Korkerd, Warrapat Tuchinda, Rattapoom Nantajeewarawat, Ekawit Computer Science Program Sirindhorn International Institute of Technology Thammasat University Pathum Thani 12121 Thailand Digital Media Laboratory National Electronic and Computer Technology Center Thailand Science Park Pathum Thani 12120 Thailand
Interpretation of semantic orientation of a word depends on the domain topic it describes. Based on Semantic Orientation Pointwise Mutual Information (SO-PMI), we propose a framework for prediction of semantic orienta... 详细信息
来源: 评论
High embedding reversible data hiding scheme for JPEG
High embedding reversible data hiding scheme for JPEG
收藏 引用
6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2010
作者: Kuo, Wen-Chung Kuo, Shao-Hung Wuu, Lih-Chyau Depart. of Computer Science and Information Engineering National Formusa University Yunlin 632 Taiwan Graduate School of Engineering Science Technology Doctoral Program National YunLin University of Science and Technology Yunlin 640 Taiwan
Both Data hiding and data compression are very important technologies in the field of image processing. It seems that there is no relationship between data hiding and data compression because most of the data hiding m... 详细信息
来源: 评论
Visualization of signalized intersections in driving simulator and validity of driving behaviors in virtual environments
Advances in Transportation Studies
收藏 引用
Advances in Transportation Studies 2011年 第26期 17-28页
作者: Yan, X. Abdel-Aty, M. Guo, D. Radwan, E. MOE Key Laboratory for Transportation Complex Systems Theory and Technology Beijing Jiaotong University Beijing 100044 China Department of Civil and Environmental Engineering University of Central Florida Orlando FL 32816-2450 United States Computer Science Program College of Business Florida Gulf Coast University 10501 FGCU Boulevard South Fort Myers FL 33965-6565 United States Center for Advanced Transportation Systems Simulation University of Central Florida Orlando FL 32816-2450 United States
Visualization of highway traffic environments in virtual reality plays a key role on fidelity of simulation and validity of driving behaviors in driving simulator studies. This paper describes a procedure to replicate... 详细信息
来源: 评论
3-3 Multimedia information hiding
收藏 引用
Journal of the National Institute of Information and Communications technology 2011年 第1-2期58卷 183-194页
作者: Takizawa, Osamu Sonoda, Kotaro Yoshioka, Katsunari Suzuki, Jouji Disaster Management and Mitigation Group Japan Security Fundamentals Group Information Security Research Center Japan Computer and Information Science Program Faculty of Engineering Nagasaki University Japan Disaster Management and Mitigation Group Information Security Research Center Japan Interdisciplinary Research Center Yokohama National University Japan Network Security Incident Response Group Information Security Research Center Japan Technology Transfer Promotion Office Outcome Promotion Department Japan Graduate School Research Institute of Environment and Information Sciences Yokohama National University Japan
We research the multimedia information hiding (MIH) which is a technology to overlay digital information on multimedia contents such as picture, sound, document, etc. As application to disaster management of MIH, we h... 详细信息
来源: 评论
Teaching human-centered design with service-learning
Teaching human-centered design with service-learning
收藏 引用
2010 ASEE Annual Conference and Exposition
作者: Zoltowski, Carla Oakes, William Chenoweth, Steve EPICS Program Department of Engineering Education Purdue University United States Department of Computer Science and Software Engineering Rose-Hulman Institute of Technology United States
Effectively teaching human-centered design can pose challenges within the undergraduate curriculum as it requires access to users and stakeholders. Service-learning, a growing pedagogy within engineering, offers many ... 详细信息
来源: 评论
Application of neuro-fuzzy PID controller for post chlorine process
Application of neuro-fuzzy PID controller for post chlorine ...
收藏 引用
15th International Symposium on Artificial Life and Robotics, AROB '10
作者: Lee, Ho-Hyun Oh, Chang-Mok Lee, Ju-Jang Lee, An-Kyu Lee, Dong-Hoon Robotics Program Korea Advanced Institute of Science and Technology Daejeon Korea Republic of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology Daejeon Korea Republic of Cheoung-choung Regional Head Office Korea Water Resources Corporation Daejeon Korea Republic of
Drinking water can be contaminated by microorganisms which can be re-grown in case of not controlling chlorine concentration well in water treatment plant (hereafter WTP). It can be harmful to public health. Most WTPs... 详细信息
来源: 评论
Mining email transaction logs to locate significant messages and users
Mining email transaction logs to locate significant messages...
收藏 引用
作者: Esichaikul, Vatcharaporn Guha, Sumanta Niyamosatha, Thanittha Computer Science and Information Management Program Asian Institute of Technology P.O. Box 4 Klong Luang Pathumthani 12120 Thailand
A simple and intuitive model to mine an email transactions log for significant messages and users is presented. No use is made of NLP or semantic analysis. The model is based only on scoring messages and users from a ... 详细信息
来源: 评论
IUI Mining:Template Base Variation Approach
IUI Mining:Template Base Variation Approach
收藏 引用
2010 3rd IEEE International Conference on computer science and Information technology—ICCSIT 2010
作者: Suwimon Kooptiwoot Computer Science Program Faculty of Science and Technology Suan Sunandha Rajabhat University
Medical data mining is *** this paper,we propose a new data mining method which is the combination of some existing ideas consisting of the concept of template based learning,the large fraction proposed in [1]and the ... 详细信息
来源: 评论
Mining Acute Inflammations of Urinary System Using GAJA2:a New Data Mining Algorithm
Mining Acute Inflammations of Urinary System Using GAJA2:a N...
收藏 引用
2010 3rd IEEE International Conference on computer science and Information technology—ICCSIT 2010
作者: Suwimon Kooptiwoot Computer Science Program Faculty of Science and Technology Suan Sunandha Rajabhat University
Medical data mining is so *** this paper,we propose a new data mining algorithm called GAJA2,which is a derivation of GAJA [1].We apply GAJA2 to mine Acute Inflammations data set,a medical data set got from UCI machin... 详细信息
来源: 评论