咨询与建议

限定检索结果

文献类型

  • 5,670 篇 期刊文献
  • 4,828 篇 会议
  • 46 册 图书

馆藏范围

  • 10,544 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,745 篇 工学
    • 5,031 篇 计算机科学与技术...
    • 4,210 篇 软件工程
    • 1,631 篇 信息与通信工程
    • 1,057 篇 生物工程
    • 867 篇 控制科学与工程
    • 812 篇 电气工程
    • 685 篇 生物医学工程(可授...
    • 610 篇 光学工程
    • 541 篇 电子科学与技术(可...
    • 364 篇 机械工程
    • 327 篇 化学工程与技术
    • 255 篇 交通运输工程
    • 250 篇 动力工程及工程热...
    • 236 篇 网络空间安全
    • 221 篇 安全科学与工程
    • 219 篇 仪器科学与技术
  • 3,951 篇 理学
    • 1,959 篇 数学
    • 1,204 篇 生物学
    • 1,101 篇 物理学
    • 743 篇 统计学(可授理学、...
    • 397 篇 化学
    • 348 篇 系统科学
  • 1,920 篇 管理学
    • 1,107 篇 管理科学与工程(可...
    • 895 篇 图书情报与档案管...
    • 539 篇 工商管理
  • 645 篇 医学
    • 534 篇 临床医学
    • 466 篇 基础医学(可授医学...
    • 284 篇 药学(可授医学、理...
    • 267 篇 公共卫生与预防医...
  • 329 篇 法学
    • 277 篇 社会学
  • 210 篇 经济学
  • 150 篇 农学
  • 108 篇 教育学
  • 38 篇 文学
  • 18 篇 军事学
  • 16 篇 艺术学

主题

  • 361 篇 deep learning
  • 288 篇 feature extracti...
  • 279 篇 accuracy
  • 237 篇 semantics
  • 234 篇 machine learning
  • 233 篇 training
  • 199 篇 computational mo...
  • 170 篇 predictive model...
  • 152 篇 internet of thin...
  • 150 篇 real-time system...
  • 137 篇 data models
  • 131 篇 optimization
  • 122 篇 reinforcement le...
  • 120 篇 data mining
  • 119 篇 convolutional ne...
  • 106 篇 image segmentati...
  • 103 篇 artificial intel...
  • 102 篇 neural networks
  • 100 篇 security
  • 94 篇 support vector m...

机构

  • 426 篇 department of ph...
  • 406 篇 horia hulubei na...
  • 399 篇 iccub universita...
  • 390 篇 h.h. wills physi...
  • 363 篇 van swinderen in...
  • 337 篇 yandex school of...
  • 311 篇 school of physic...
  • 310 篇 cavendish labora...
  • 303 篇 university of ch...
  • 291 篇 nikhef national ...
  • 289 篇 imperial college...
  • 289 篇 center for high ...
  • 287 篇 department of ph...
  • 285 篇 physik-institut ...
  • 285 篇 oliver lodge lab...
  • 285 篇 physikalisches i...
  • 284 篇 stfc rutherford ...
  • 283 篇 school of physic...
  • 283 篇 school of physic...
  • 282 篇 institute of par...

作者

  • 250 篇 barter w.
  • 244 篇 bellee v.
  • 241 篇 beiter a.
  • 223 篇 casse g.
  • 217 篇 bowcock t.j.v.
  • 217 篇 blake t.
  • 216 篇 borsato m.
  • 215 篇 betancourt c.
  • 207 篇 brundu d.
  • 204 篇 bediaga i.
  • 199 篇 amato s.
  • 192 篇 baryshnikov f.
  • 186 篇 boettcher t.
  • 165 篇 braun s.
  • 163 篇 borisyak m.
  • 161 篇 baker s.
  • 153 篇 bjørn m.
  • 152 篇 bizzeti a.
  • 144 篇 albrecht j.
  • 143 篇 a. jawahery

语言

  • 8,527 篇 英文
  • 1,957 篇 其他
  • 85 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Data Science and Computer Engineering"
10544 条 记 录,以下是4531-4540 订阅
排序:
Deep Learning Driven - Pest Classification and Sustainable Agriculture
Deep Learning Driven - Pest Classification and Sustainable A...
收藏 引用
Electronics and Renewable Systems (ICEARS), International Conference on
作者: M Sirish Kumar R Usha B Rama Kantha Reddy S Ramachandra P Jaya Prakash B Swetha Dept. of Data Science School of Computing Mohan Babu University India CSE Madanapalle Institute of Technology and Science Madanapalle CSE (AI and ML) Sri Venkateswara College of Engineering Tirupati CSE Mother Theresa Institute of Engineering and Technology Palamaner Department of IT Sri Venkateswara College of Engineering Tirupati Dept. of Master of Computer Applications Mohan Babu University India
This study introduces a system designed to identify pests in crops and classify them as either beneficial or harmful. The project begins by providing a comprehensive overview of various pest identification methods, an... 详细信息
来源: 评论
Simple and High-Precision Hamiltonian Simulation by Compensating Trotter Error with Linear Combination of Unitary Operations
收藏 引用
PRX Quantum 2025年 第1期6卷 010359-010359页
作者: Pei Zeng Jinzhao Sun Liang Jiang Qi Zhao Pritzker School of Molecular Engineering The University of Chicago Illinois 60637 USA Clarendon Laboratory University of Oxford Parks Road Oxford OX1 3PU United Kingdom Blackett Laboratory Imperial College London London SW7 2AZ United Kingdom QICI Quantum Information and Computation Initiative Department of Computer Science School of Computing and Data Science The University of Hong Kong Pokfulam Road Hong Kong
Trotter and linear combination of unitary (LCU) operations are two popular Hamiltonian simulation methods. The Trotter method is easy to implement and enjoys good system-size dependence endowed by commutator scaling, ... 详细信息
来源: 评论
Stochastic orderings between two finite mixture models with inverted-Kumaraswamy distributed components
arXiv
收藏 引用
arXiv 2023年
作者: Bhakta, Raju Kundu, Pradip Kayal, Suchandan Alizadeh, Morad Department of Mathematics National Institute of Technology Rourkela Odisha Rourkela769008 India School of Computer Science and Engineering XIM University Odisha Bhubaneswar India Department of Statistics Faculty of Intelligent Systems Engineering and Data Science Persian Gulf University Bushehr75169 Iran
In this paper, we consider two finite mixture models (FMMs), with inverted-Kumaraswamy distributed components’ lifetimes. Several stochastic ordering results between the FMMs have been obtained. Mainly, we focus on t... 详细信息
来源: 评论
Federated Learning for 6G Communications:Challenges,Methods,and Future Directions
收藏 引用
China Communications 2020年 第9期17卷 105-118页
作者: Yi Liu Xingliang Yuan Zehui Xiong Jiawen Kang Xiaofei Wang Dusit Niyato School of Data Science of Technology Heilongjiang UniversityHarbinChina Faculty of Information Technology Monash UniversityAustralia Alibaba-NTU Joint Research Institute and also School of Computer Science and Engineering NTUSingapore Energy Research Institute Nanyang Technological UniversitySingapore College of Intelligence and Computing Tianjin UniversityTianjinChina School of Computer Science and Engineering NTUSingapore
As the 5G communication networks are being widely deployed worldwide,both industry and academia have started to move beyond 5G and explore 6G *** is generally believed that 6G will be established on ubiquitous Artific... 详细信息
来源: 评论
Structure Similarity Graph for Cross-Network Node Classification
Structure Similarity Graph for Cross-Network Node Classifica...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Xinzheng Li Yuhong Zhang Peipei Li Xuegang Hu Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Cross-network node classification aims to use a labeled source network to classify nodes in an unlabeled target network. Most of the existing cross-network node classification methods learn the network representations... 详细信息
来源: 评论
Adaptive Student Inference Network for Efficient Single Image Super-Resolution
Adaptive Student Inference Network for Efficient Single Imag...
收藏 引用
IEEE International Conference on data Mining (ICDM)
作者: Kang Miao Zhao Zhang Jiahuan Ren Mingbo Zhao Haijun Zhang Richang Hong School of Computer Science and Information Engineering Hefei University of Technology Hefei China Key Laboratory of Knowledge Engineering with Big Data (Ministry of Education) & Intelligent Interconnected Systems Laboratory of Anhui Province Hefei University of Technology Hefei China Yunnan Key Laboratory of Software Engineering Kunming China School of Information Science and Technology Donghua University Shanghai China Department of Computer Science Harbin Institute of Technology (Shenzhen) Shenzhen China
Recent advances in single image super-resolution (SISR) have achieved remarkable performance through deep learning. However, the high computational cost hinders the deployment of SISR models on edge devices. Instead o...
来源: 评论
Detection of Pre Shoplifting Suspicious Behavior Using Deep Learning
Detection of Pre Shoplifting Suspicious Behavior Using Deep ...
收藏 引用
IIAI International Conference on Advanced Applied Informatics (IIAIAAI)
作者: Sujan Shrestha Yoji Taniguchi Tetsuo Tanaka Course of Information and computer sciences Graduate school of Engineering Kanagawa Institute of Tehnology Atsugi Japan Department of Information Artificial Intelligence and Data Science Daiichi Institute of Technology Tokyo Japan Dept. of Information and Computer Sciences Faculty of Information Technology Kanagawa Institute of Technology Atsugi Japan
Shoplifting presents a significant challenge for retailers, leading to substantial financial losses and security concerns. Current surveillance systems effectively identify shoplifting incidents postoccurrence; howeve... 详细信息
来源: 评论
Responsible AI on National Cybersecurity Strategy with Enhancement of Cybersecurity in Education
Responsible AI on National Cybersecurity Strategy with Enhan...
收藏 引用
Intelligent & Innovative Practices in engineering & Management (IIPEM), International Conference on
作者: Bhagyashree Ashok Tingare G. Prasanna Lakshmi Vijayshri Khedkar Rakesh Thoppaen Suresh Babu Tarun Dhar Diwan Pravin B Khatkale Department of Artificial Intelligence and Data Science D Y Patil College of Engineering Akurdi Pune School of Computer Science and Engineering Sandip University Nashik Maharashtra Department of Computer Science & Engineering Symbiosis Institute of Technology Symbiosis International (Deemed University) Pune India Senior Technical Architect HEXAWARE TECHNOLOGIES INC New Jersey Assistant Professor and Controller of Examination (COE) Atal Bihari Vajpayee University Bilaspur India Sanjivani University Kopargaon Maharashtra India
For national cybersecurity to keep up with the digital transition, AI is more important than ever. Responsible AI improves cybersecurity and education by emphasizing openness and ethics. Ethical design is stressed fro... 详细信息
来源: 评论
Epl: Empirical Prototype Learning for Deep Face Recognition
SSRN
收藏 引用
SSRN 2024年
作者: Fan, Weijia Wen, Jiajun Jia, Xi Shen, Linlin Zhou, Jiancan Li, Qiufu National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Computer Vision Institute Shenzhen University Shenzhen518060 China School of Computer Science University of Birmingham Birmingham United Kingdom Aqara Lumi United Technology Coopration Shenzhen China
Prototype learning is widely used in face recognition, which takes the row vectors of coefficient matrix in the last linear layer of the feature extraction model as the prototypes for each class. When the prototypes a... 详细信息
来源: 评论
Enhancing Wireless Networks with Attention Mechanisms: Insights from Mobile Crowdsensing
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Yaoqi Du, Hongyang Xiong, Zehui Niyato, Dusit Jamalipour, Abbas Han, Zhu College of Communications Engineering Army Engineering University of PLA Nanjing210000 China College of Computing and Data Science NTU Singapore Singapore Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore Singapore School of Electrical and Computer Engineering University of Sydney SydneyNSW2006 Australia Department of Electrical and Computer Engineering University of Houston HoustonTX77004 United States
The increasing demand for sensing, collecting, transmitting, and processing vast amounts of data poses significant challenges for resource-constrained mobile users, thereby impacting the performance of wireless networ...
来源: 评论