咨询与建议

限定检索结果

文献类型

  • 3,443 篇 会议
  • 3,321 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 6,767 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,770 篇 工学
    • 3,307 篇 计算机科学与技术...
    • 2,788 篇 软件工程
    • 1,047 篇 信息与通信工程
    • 714 篇 生物工程
    • 665 篇 控制科学与工程
    • 512 篇 生物医学工程(可授...
    • 507 篇 电气工程
    • 490 篇 电子科学与技术(可...
    • 456 篇 光学工程
    • 335 篇 机械工程
    • 276 篇 化学工程与技术
    • 247 篇 仪器科学与技术
    • 201 篇 动力工程及工程热...
    • 138 篇 材料科学与工程(可...
    • 120 篇 交通运输工程
    • 108 篇 建筑学
  • 2,734 篇 理学
    • 1,302 篇 数学
    • 795 篇 物理学
    • 784 篇 生物学
    • 407 篇 统计学(可授理学、...
    • 304 篇 化学
    • 281 篇 系统科学
  • 1,260 篇 管理学
    • 723 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 468 篇 医学
    • 403 篇 临床医学
    • 342 篇 基础医学(可授医学...
    • 240 篇 药学(可授医学、理...
    • 126 篇 公共卫生与预防医...
  • 208 篇 法学
    • 183 篇 社会学
  • 103 篇 经济学
  • 72 篇 教育学
  • 69 篇 农学
  • 38 篇 文学
  • 24 篇 艺术学
  • 19 篇 军事学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 136 篇 machine learning
  • 127 篇 semantics
  • 115 篇 deep learning
  • 95 篇 feature extracti...
  • 87 篇 training
  • 85 篇 computational mo...
  • 77 篇 computer science
  • 72 篇 deep neural netw...
  • 65 篇 accuracy
  • 64 篇 data mining
  • 62 篇 visualization
  • 59 篇 object detection
  • 56 篇 reinforcement le...
  • 55 篇 neural networks
  • 54 篇 forecasting
  • 52 篇 computer archite...
  • 52 篇 artificial intel...
  • 51 篇 internet of thin...
  • 51 篇 computer vision
  • 50 篇 optimization

机构

  • 208 篇 department of co...
  • 78 篇 department of co...
  • 56 篇 tencent ai lab
  • 49 篇 department of co...
  • 44 篇 department of co...
  • 43 篇 college of compu...
  • 38 篇 department of co...
  • 37 篇 department of el...
  • 37 篇 pazhou lab
  • 37 篇 department of co...
  • 37 篇 peng cheng labor...
  • 36 篇 department of co...
  • 32 篇 huawei noah's ar...
  • 31 篇 tsinghua univers...
  • 30 篇 university of sc...
  • 30 篇 state key lab on...
  • 30 篇 department of co...
  • 29 篇 institute for ar...
  • 28 篇 state key lab on...
  • 26 篇 department of co...

作者

  • 71 篇 sun maosong
  • 52 篇 liu zhiyuan
  • 43 篇 sun fuchun
  • 40 篇 bhowmik biswajit
  • 36 篇 zhu jun
  • 33 篇 huang minlie
  • 31 篇 huang wenbing
  • 30 篇 biswajit bhowmik
  • 27 篇 liu yang
  • 25 篇 yu kai
  • 25 篇 timofte radu
  • 24 篇 zhang min
  • 22 篇 liu qun
  • 21 篇 zhang lei
  • 21 篇 chen hao
  • 20 篇 fuchun sun
  • 19 篇 qinghua zheng
  • 18 篇 zheng qinghua
  • 17 篇 liu xin
  • 17 篇 zhao hai

语言

  • 6,449 篇 英文
  • 245 篇 其他
  • 76 篇 中文
  • 2 篇 日文
检索条件"机构=Programming Technology Lab Computer Science Department"
6767 条 记 录,以下是211-220 订阅
排序:
Sentimental Analysis of COVID-19 Twitter Data Using Machine Learning  8th
Sentimental Analysis of COVID-19 Twitter Data Using Machine ...
收藏 引用
8th International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2023
作者: Likhith, S.R. Pooja Ahuja, S. Prathibha, B.N. Uma Shankari, B. Department of School of Computer Science and Engineering and Information Science Bio-Intelligence Lab Presidency University Bengaluru India Nagarjuna College of Engineering and Technology Bengaluru India Nagarjuna College of Engineering and Technology Bengaluru India
Corona virus is considered as a scourge all over world by which most of the people got infected. Since the virus was spreading very quickly governments had to bring in very tough rules such as lock down. Lock down dis... 详细信息
来源: 评论
LEO Satellite Oriented Wildfire Detection Model Using Deep Neural Networks: A Transfer Learning Based Approach  6
LEO Satellite Oriented Wildfire Detection Model Using Deep N...
收藏 引用
6th International Conference on Electrical Engineering and Information and Communication technology, ICEEICT 2024
作者: Gain, Mrityunjoy Raha, Avi Deb Biswas, Bristy Bairagi, Anupam Kumar Adhikary, Apurba Debnath, Rameswar Khulna University Computer Science and Engineering Discipline Khulna Bangladesh Ai Innovation Lab Khulna Bangladesh Noakhali Science and Technology University Department of Information and Communication Engineering Bangladesh
Wildfires are a recurring concern in several regions around the globe, often leading to catastrophic outcomes. The increasing accessibility of small satellites operating in Low Earth Orbit (LEO) has led to the potenti... 详细信息
来源: 评论
Optimizing Steering Angle Predictive Convolutional Neural Network for Autonomous Car
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2285-2302页
作者: Hajira Saleem Faisal Riaz Asadullah Shaikh Khairan Rajab Adel Rajab Muhammad Akram Mana Saleh Al Reshan Control Automotive and Robotics Lab Affiliated lab of National Center of Robotics and Automation(NCRA HEC Pakistan)and with the Department of Computer Science and Information TechnologyMirpur University of Science and Technology(MUST)Mirpur Azad Kashmir10250Pakistan College of Computer Science and Information System Najran UniversityNajran61441Saudi Arabia College of Computer Science and Engineering University of South FloridaTampa33620United States
Deep learning techniques,particularly convolutional neural networks(CNNs),have exhibited remarkable performance in solving visionrelated problems,especially in unpredictable,dynamic,and challenging *** autonomous vehi... 详细信息
来源: 评论
Classification of Phishing Email Using Word Embedding and Machine Learning Techniques
收藏 引用
Journal of Cyber Security and Mobility 2022年 第3期11卷 279-320页
作者: Somesha, M. Pais, Alwyn R. Information Security Research Lab Department of Computer Science and Engineering National Institute of Technology karnataka Karnataka Surathkal575025 India
Email phishing is a cyber-attack, bringing substantial financial damage to corporate and commercial organizations. A phishing email is a special type of spamming, used to trick the user to disclose personal informatio... 详细信息
来源: 评论
HUSS:A Heuristic Method for Understanding the Semantic Structure of Spreadsheets
收藏 引用
Data Intelligence 2023年 第3期5卷 537-559页
作者: Xindong Wu Hao Chen Chenyang Bu Shengwei Ji Zan Zhang Victor S.Sheng Key Laboratory of Knowledge Engineering with Big Data(the Ministry of Education of China) Hefei University of TechnologyChinaSchool of Computer Science and Information EngineeringHefei University of TechnologyHefeiChina Research Institute of Artificial Intelligence Zhejiang LabHangzhouChina Department of Computer Science Texas Tech UniversityLubbockTX 79409USA
Spreadsheets contain a lot of valuable data and have many practical *** key technology of these practical applications is how to make machines understand the semantic structure of spreadsheets,e.g.,identifying cell fu... 详细信息
来源: 评论
Data-Driven Approach for Condition Monitoring and Improving Power Output of Photovoltaic Systems
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5757-5776页
作者: Nebras M.Sobahi Ahteshamul Haque V S Bharath Kurukuru Md.Mottahir Alam Asif Irshad Khan Department of Electrical and Computer Engineering(ECE) King Abdulaziz UniversityJeddah 21589Saudi Arabia Advance Power Electronics Research Lab Department of Electrical EngineeringJamia Millia IslamiaNew DelhiIndia Computer Science Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah 21589Saudi Arabia
Increasing renewable energy targets globally has raised the requirement for the efficient and profitable operation of solar photovoltaic(PV)*** light of this requirement,this paper provides a path for evaluating the o... 详细信息
来源: 评论
Who Wrote This? The Key to Zero-Shot LLM-Generated Text Detection Is GECSCORE  31
Who Wrote This? The Key to Zero-Shot LLM-Generated Text Dete...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wu, Junchao Zhan, Runzhe Wong, Derek F. Yang, B. Shu Liu, Xuebo Chao, Lidia S. Zhang, Min NLP2CT Lab Department of Computer and Information Science University of Macau China Institute of Computing and Intelligence Harbin Institute of Technology Shenzhen China
The efficacy of detectors for texts generated by large language models (LLMs) substantially depends on the availability of large-scale training data. However, white-box zero-shot detectors, which require no such data,... 详细信息
来源: 评论
VMAP: Matching-based Efficient Offloading in IoT-Fog Environments with Variable Resources  17
VMAP: Matching-based Efficient Offloading in IoT-Fog Environ...
收藏 引用
17th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2023
作者: Morey, Jui Satpathy, Anurag Addya, Sourav Kanti Cloud and Smart System Services Lab Department of Computer Science and Engineering National Institute of Technology Karnataka Surathkal India Missouri University of Science and Technology United States
Fog computing is a promising technology for critical, resource-intensive, and time-sensitive applications. In this regard, a significant challenge is generating an offloading solution that minimizes the latency, energ... 详细信息
来源: 评论
Maximising Influence Spread in Complex Networks by Utilising Community-Based Driver Nodes as Seeds  1
收藏 引用
9th Annual International Conference on Information Management and Big Data, SIMBig 2022
作者: Sadaf, Abida Mathieson, Luke Bródka, Piotr Musial, Katarzyna Complex Adaptive Systems Lab School of Computer Science University of Technology Sydney Sydney Australia Department of Artificial Intelligence Wroclaw University of Science and Technology Wroclaw Poland
Finding a small subset of influential nodes to maximise influence spread in a complex network is an active area of research. Different methods have been proposed in the past to identify a set of seed nodes that can he... 详细信息
来源: 评论
Intrusion Detection in the Internet of Things Using Fusion of GRU-LSTM Deep Learning Model
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 2279-2290页
作者: Mohammad S.Al-kahtani Zahid Mehmood Tariq Sadad Islam Zada Gauhar Ali Mohammed ElAffendi Department of Computer Engineering Prince Sattam Bin Abdulaziz UniversityAl-Kharj16273Saudi Arabia Department of Computer Engineering University of Engineering and TechnologyTaxila47050Pakistan The FAMLIR Group The University of LahoreLahore54000Pakistan Department of Computer Science University of Engineering&TechnologyMardan23200Pakistan Faculty of Computing International Islamic UniversityIslamabad44000Pakistan EIAS Data Science and Blockchain Lab College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia
Cybersecurity threats are increasing rapidly as hackers use advanced *** a result,cybersecurity has now a significant factor in protecting organizational *** detection systems(IDSs)are used in networks to flag serious... 详细信息
来源: 评论