咨询与建议

限定检索结果

文献类型

  • 239 篇 会议
  • 217 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 458 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 259 篇 工学
    • 196 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 54 篇 生物工程
    • 49 篇 生物医学工程(可授...
    • 44 篇 信息与通信工程
    • 31 篇 光学工程
    • 29 篇 控制科学与工程
    • 28 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 机械工程
    • 16 篇 安全科学与工程
    • 14 篇 动力工程及工程热...
    • 11 篇 环境科学与工程(可...
    • 10 篇 化学工程与技术
    • 9 篇 交通运输工程
  • 147 篇 理学
    • 66 篇 数学
    • 65 篇 生物学
    • 24 篇 物理学
    • 24 篇 统计学(可授理学、...
    • 14 篇 化学
    • 13 篇 系统科学
  • 89 篇 管理学
    • 48 篇 图书情报与档案管...
    • 39 篇 管理科学与工程(可...
    • 24 篇 工商管理
  • 52 篇 医学
    • 44 篇 临床医学
    • 40 篇 基础医学(可授医学...
    • 29 篇 公共卫生与预防医...
    • 20 篇 药学(可授医学、理...
  • 14 篇 经济学
    • 14 篇 应用经济学
  • 13 篇 农学
  • 11 篇 法学
    • 11 篇 社会学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 27 篇 machine learning
  • 24 篇 accuracy
  • 21 篇 deep learning
  • 19 篇 training
  • 16 篇 feature extracti...
  • 13 篇 convolutional ne...
  • 12 篇 computational mo...
  • 11 篇 artificial intel...
  • 11 篇 data models
  • 10 篇 image segmentati...
  • 10 篇 semantics
  • 9 篇 task analysis
  • 9 篇 neural networks
  • 9 篇 predictive model...
  • 9 篇 machine learning...
  • 9 篇 forecasting
  • 8 篇 support vector m...
  • 8 篇 real-time system...
  • 8 篇 security
  • 7 篇 optimization

机构

  • 18 篇 school of comput...
  • 15 篇 national enginee...
  • 14 篇 department of el...
  • 12 篇 department of el...
  • 11 篇 school of comput...
  • 9 篇 school of comput...
  • 9 篇 national enginee...
  • 8 篇 department of st...
  • 7 篇 the first affili...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 leeds institute ...
  • 5 篇 center for psych...
  • 5 篇 department of in...
  • 5 篇 institute for pa...
  • 5 篇 department of st...
  • 5 篇 university of pi...
  • 5 篇 arnie charbonnea...
  • 5 篇 school of comput...
  • 5 篇 ilsbio llc bioba...

作者

  • 18 篇 liu jun
  • 14 篇 ghojogh benyamin
  • 13 篇 ghodsi ali
  • 12 篇 li chen
  • 12 篇 karray fakhri
  • 12 篇 crowley mark
  • 10 篇 gao zeyu
  • 9 篇 hawbani ammar
  • 8 篇 zhang lingling
  • 8 篇 chen li
  • 8 篇 gong tieliang
  • 8 篇 wu jialun
  • 8 篇 wang chunbao
  • 8 篇 maria fasli
  • 8 篇 alsamhi saeed ha...
  • 7 篇 buyue qian
  • 7 篇 lin qika
  • 6 篇 zhao tianzhe
  • 6 篇 dong ruihai
  • 6 篇 zheng qinghua

语言

  • 340 篇 英文
  • 115 篇 其他
  • 3 篇 中文
  • 1 篇 德文
检索条件"机构=School of Computer Science and Engineering With Specialization in Data Analytics"
458 条 记 录,以下是111-120 订阅
Decentralized Metaverse: Towards a Secure, Autonomous, and Inclusive Virtual World
Decentralized Metaverse: Towards a Secure, Autonomous, and I...
收藏 引用
Electrical, computer and Energy Technologies (ICECET), International Conference on
作者: Saeed Hamood Alsamhi Ammar Hawbani Santosh Kumar Lukasz Porwol Edward Curry Insight Centre for Data Analytics University of Galway Galway Ireland School of Computer Science Shenyang Aerospace University Shenyang China Computer Science and Engineering IIIT Naya Raipur Chhattisgarh India
The metaverse is a universal and immersive virtual world, which are components of cyber-physical-social systems (CPSS). The traditional centralized approach to building a metaverse poses risks to user privacy, securit...
来源: 评论
Automation Through Machine Learning: Reinvigorating Cyber Security  15
Automation Through Machine Learning: Reinvigorating Cyber Se...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Bagade, Jayashree V. Dari, Sukhvinder Singh Dhivrani, Rekha Chowhan, Santosh Ravivarman, G. Janakiraman, V. Vishwakarma Institute of Technology Department of Information Technology Pune India Symbiosis International Symbiosis Law School Nagpur Pune India Vivekananda Global University Department of Computer Science & Engineering Jaipur India Department of Data Analytics and Mathematical Sciences Karnataka Bangalore India Karpagam Academy of Higher Education Department of Electrical and Electronics Engineering Coimbatore641021 India Prince Shri Venkateshwara Padmavathy Engineering College Department of Mechanical Engineering Chennai127 India
Cyber security is predicated heavily on manual efforts to fight malicious assaults, but such processes are increasingly turning into overwhelmed by means of the quantity of threats - a hassle worsened in the course of... 详细信息
来源: 评论
Adaptation of Compositional data Analysis in Deep Learning to Predict Pasture Biomass Proportions  29
Adaptation of Compositional Data Analysis in Deep Learning t...
收藏 引用
29th Irish Conference on Artificial Intelligence and Cognitive science, AICS 2021
作者: Narayanan, Badri Saadeldin, Mohamed Albert, Paul McGuinness, Kevin O'Connor, Noel E. Namee, Brian Mac School of Computer Science University College Dublin Ireland School of Electronic Engineering Dublin City University Ireland Insight SFI Centre for Data Analytics VistaMilk
Dry biomass weight measurements from a quadrat in a paddock for grass, clover and weeds when expressed as percentages of total dry herbage mass are compositional in nature. Unlike real valued regression problems, pred... 详细信息
来源: 评论
Early Detection of Activity in Untrimmed Videos Using Dense Optical Flow and Deep Neural Network  5
Early Detection of Activity in Untrimmed Videos Using Dense ...
收藏 引用
5th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2021
作者: Poonkodi, M. Vadivu, G. SRM Institute of Science and Technology Department of Computer Science and Engineering Chennai India Big Data Analytics School of Computing SRM Institute of Science and Technology Chennai India
computer Vision is playing aremarkable role right from essentials to entertainment and thus trying to turn computer as a 'seeing' machine. Having widespread applications in most of the real world domain like h... 详细信息
来源: 评论
Enhancing Intrusion Detection Systems Using Ensemble Machine Learning Techniques
Enhancing Intrusion Detection Systems Using Ensemble Machine...
收藏 引用
IEEE International Conference on Emerging & Sustainable Technologies for Power & ICT in a Developing Society (NIGERCON)
作者: Isaac Adedoyin Oyebade Isaac Oluwafemi Elesemoyo Mercy Oka Ebute Abidemi Emmanuel Adeniyi Joseph Bamidele Awotunde Akpan Caleb Solomon Agbotiname Lucky Imoize Kehinde Amudat Odulana Department of Computer Science Bowen University Iwo Nigeria Department of Computer Engineering Elizade University Ilara-Mokin Nigeria Department of Accounting Anderson School of Management University of New Mexico USA Department of Computer Science University of Ilorin Ilorin Nigeria Department of Electrical and Electronics Engineering University of Lagos Akoka Lagos Nigeria School of Physics Engineering and Computer Science (Data Science and Analytics) University of Hertfordshire
Intrusion detection systems are an essential part of the current cybersecurity environment, and IDS devices are intended to scan the activity of the network and systems to identify possible improper actions or violati... 详细信息
来源: 评论
SE-Chain:A Scalable Storage and Efficient Retrieval Model for Blockchain
收藏 引用
Journal of computer science & Technology 2021年 第3期36卷 693-706页
作者: Da-Yu Jia Jun-Chang Xin Zhi-Qiong Wang Han Lei Guo-Ren Wang School of Computer Science and Engineering Northeastern UniversityShenyang 110819China Key Laboratory of Big Data Management and Analytics of Liaoning Province Shenyang 110819China College of Medicine and Biological Information Engineering Northeastern UniversityShenyang 110169China Neusoft Institute of Intelligent Healthcare Technology Co.Ltd. Shenyang 110179China School of Electrical and Electronic Engineering Nanyang Technological UniversitySingapore 639798Singapore School of Computer Science and Technology Beijing Institute of TechnologyBeijing 100081China
Massive data is written to blockchain systems for the destination of keeping safe. However, existing blockchain protocols still demand that each full node has to contain the entire chain. Most nodes quit because they ... 详细信息
来源: 评论
CNN-Based Analytical Approach for Liver Disease Classification and Prediction
CNN-Based Analytical Approach for Liver Disease Classificati...
收藏 引用
Advancement in Computation & computer Technologies (InCACCT), International Conference on
作者: Abrar Ahmed Syed Asia Banu Shaik Sukanya Konatam Maddi Venkata Phani Kumar Neha Gupta Data and Analytics Gainwell Technologies LLC Dallas USA Data Architecture and Analytics LTIMindtree Limited Dallas USA Artificial Intelligence The University of Texas at Austin Austin USA Sr. Technical Architect Tech Mahindra Americas Inc. Plano USA School of Computer Science and Engineering Geeta University Panipat
Liver disease is a major global health concern, and effective treatment requires an early and accurate diagnosis. Deep learning (DL) and Machine Learning (ML) techniques have been widely applied to improve disease pre... 详细信息
来源: 评论
Parm: Efficient Training of Large Sparsely-Activated Models with Dedicated Schedules
arXiv
收藏 引用
arXiv 2024年
作者: Pan, Xinglin Lin, Wenxiang Shi, Shaohuai Chu, Xiaowen Sun, Weinong Li, Bo Data Science and Analytics Thrust The Hong Kong University of Science and Technology Guangzhou China Department of Computer Science Hong Kong Baptist University Hong Kong School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong
Sparsely-activated Mixture-of-Expert (MoE) layers have found practical applications in enlarging the model size of large-scale foundation models, with only a sub-linear increase in computation demands. Despite the wid... 详细信息
来源: 评论
Pretrained Sentence Embedding and Semantic Sentence Similarity Language Model for Text Classification in NLP
Pretrained Sentence Embedding and Semantic Sentence Similari...
收藏 引用
International Symposium on Artificial Intelligence and Signal Processing (AISP)
作者: V.Valli Mayil T.Ratha Jeyalakshmi Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh India Department of Data Science & Analytics Jain University School of Sciences Banglore Karnataka
A key task in the field of Natural Language Processing (NLP) is determining semantic similarity between text sentences. Sentence pair modeling, Textual similarity and language modeling are few important tasks in NLP. ...
来源: 评论
Iterated Greedy Algorithms for Combinatorial Optimization: A Systematic Literature Review
Iterated Greedy Algorithms for Combinatorial Optimization: A...
收藏 引用
ACS/IEEE International Conference on computer Systems and Applications
作者: Ahmed Missaoui Cemalettin Ozturk Barry O’Sullivan Insight Centre for Data Analytics School of Computer Science & IT University College Cork Ireland Process Energy Transport Engineering Munster Technological University Cork Ireland
Metaheuristics are essential tools for efficiently solving combinatorial optimization problems in arising from many fields. As incomplete methods, metaheuristics can provide goodquality results in a very short time. A...
来源: 评论