咨询与建议

限定检索结果

文献类型

  • 13,032 篇 会议
  • 6,937 篇 期刊文献
  • 349 册 图书

馆藏范围

  • 20,318 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,623 篇 工学
    • 8,120 篇 计算机科学与技术...
    • 6,665 篇 软件工程
    • 2,721 篇 信息与通信工程
    • 1,667 篇 控制科学与工程
    • 1,537 篇 生物工程
    • 1,488 篇 生物医学工程(可授...
    • 1,251 篇 电气工程
    • 1,136 篇 电子科学与技术(可...
    • 982 篇 光学工程
    • 768 篇 机械工程
    • 628 篇 仪器科学与技术
    • 518 篇 化学工程与技术
    • 472 篇 动力工程及工程热...
    • 404 篇 安全科学与工程
    • 373 篇 交通运输工程
    • 358 篇 建筑学
  • 7,093 篇 理学
    • 3,414 篇 数学
    • 2,358 篇 物理学
    • 1,752 篇 生物学
    • 1,122 篇 统计学(可授理学、...
    • 793 篇 系统科学
    • 558 篇 化学
  • 3,154 篇 管理学
    • 1,809 篇 管理科学与工程(可...
    • 1,497 篇 图书情报与档案管...
    • 980 篇 工商管理
  • 1,415 篇 医学
    • 1,223 篇 临床医学
    • 1,111 篇 基础医学(可授医学...
    • 717 篇 药学(可授医学、理...
    • 516 篇 公共卫生与预防医...
  • 537 篇 法学
    • 447 篇 社会学
  • 317 篇 经济学
  • 286 篇 教育学
  • 262 篇 农学
  • 62 篇 文学
  • 30 篇 军事学
  • 28 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 589 篇 informatics
  • 297 篇 computational mo...
  • 275 篇 deep learning
  • 275 篇 computer archite...
  • 254 篇 computer science
  • 226 篇 machine learning
  • 217 篇 data mining
  • 202 篇 image segmentati...
  • 202 篇 training
  • 193 篇 internet of thin...
  • 193 篇 feature extracti...
  • 182 篇 support vector m...
  • 182 篇 optimization
  • 180 篇 accuracy
  • 179 篇 artificial intel...
  • 158 篇 neural networks
  • 156 篇 quality of servi...
  • 150 篇 bandwidth
  • 149 篇 monitoring
  • 136 篇 resource managem...

机构

  • 411 篇 department for p...
  • 404 篇 faculty of scien...
  • 402 篇 department of ph...
  • 385 篇 department of ph...
  • 385 篇 kirchhoff-instit...
  • 383 篇 department of ph...
  • 348 篇 fakultät für phy...
  • 319 篇 institute of phy...
  • 305 篇 department of ph...
  • 303 篇 institute of phy...
  • 280 篇 department of ph...
  • 269 篇 instituto de fís...
  • 268 篇 universidade fed...
  • 267 篇 department of ph...
  • 264 篇 ictp trieste
  • 261 篇 graduate school ...
  • 252 篇 yerevan physics ...
  • 251 篇 department of ph...
  • 248 篇 department of ph...
  • 246 篇 department of ph...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 331 篇 g. bella
  • 330 篇 d. calvet
  • 330 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 324 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 318 篇 s. mohapatra
  • 302 篇 s. guindon
  • 299 篇 y. tayalati
  • 289 篇 a. kaczmarska
  • 283 篇 m. klein
  • 265 篇 j. schaarschmidt
  • 259 篇 f. pastore
  • 252 篇 n. orlando

语言

  • 19,307 篇 英文
  • 861 篇 其他
  • 138 篇 中文
  • 18 篇 日文
  • 6 篇 德文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 爱沙尼亚文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Engineering and Informatics"
20318 条 记 录,以下是1191-1200 订阅
排序:
Temperature and Humidity Control System to Address Filament Brittleness in 3D Printers
Temperature and Humidity Control System to Address Filament ...
收藏 引用
Information Technology and Digital Innovation (ISITDI), International Symposium on
作者: Tati Erlina Salsa Kiki Violani Rifki Suwandi Yusuf Sulistyo Nugroho Syful Islam Computer Engineering Department Universitas Andalas Padang Indonesia Informatics Engineering Universitas Muhammadiyah Surakarta Surakarta Indonesia Computer Science and Engineering BSMRSTU Gopalganj
Additive manufacturing, mainly 3D printing, has emerged as a transformative technology with widespread applications across various industries. Despite its advancements, filament brittleness remains a significant chall... 详细信息
来源: 评论
Tangles in IOTA to make crypto currency transactions free and secure
收藏 引用
International Journal of Cloud Computing 2022年 第1期11卷 1-13页
作者: Anakath, A.S. Kannadasan, R. Prabakaran, N. Basha, M.S. Saleem Department of MCA EGS Pillai Engineering College Nagapattinam 611002 India School Computer Science and Engineering Vellore Institute of Technology Vellore632014 India Department of Computing and Informatics Mazoon College Muscat133 Oman
Blockchain introduction has made a revolutionary change in the crypto currency around the world but it has not delivered on its promises of free and faster transaction confirmation. Serguei Popov's proposal of usi... 详细信息
来源: 评论
A New Membrane Algorithm Based on Quasi-Affine TRansformation Evolution for Optimization Problems  1
收藏 引用
15th International Conference on Genetic and Evolutionary Computing, ICGEC 2023
作者: Wang, Xiaopeng Snášel, Václav Mirjalili, Seyedali Chu, Shu-Chuan Shehadeh, Hisham A. Bai, Zhonghai Faculty of Electrical Engineering and Computer Science VŠB-Technical University of Ostrava Ostrava70800 Czech Republic Centre for Artificial Intelligence Research and Optimisation Torrens University Australia Brisbane4006 Australia College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China Faculty of Computer Science and Informatics Amman Arab University Amman11953 Jordan
This paper develops a new meta-heuristic algorithm, called Membrane Algorithm based on Quasi-Affine TRansformation Evolution (MA-QUATRE). The proposed algorithm combines the principles of QUATRE, the one-level membran... 详细信息
来源: 评论
Decoding Gender on Social Networks: An In-depth Analysis of Language in Online Discussions Using Natural Language Processing and Machine Learning
Decoding Gender on Social Networks: An In-depth Analysis of ...
收藏 引用
IEEE International Conference on Big Data
作者: Gerasimos Vonitsanos Andreas Kanavos Phivos Mylonas Computer Engineering and Informatics Department University of Patras Patras Greece Department of Informatics Ionian University Corfu Greece Department of Informatics and Computer Engineering University of West Attica Athens Greece
In today’s digital era, the internet is an indispensable platform for self-expression, facilitating communication, idea sharing, and community formation. Language, a pivotal tool in these online interactive spaces, i...
来源: 评论
The Relation Between a Tensor and Its Associated Semi-Symmetric Form
收藏 引用
Numerical Mathematics(Theory,Methods and Applications) 2022年 第2期15卷 530-564页
作者: Hassan Bozorgmanesh Masoud Hajarian Anthony Theodore Chronopoulos Department of Applied Mathematics Faculty of Mathematical SciencesShahid Beheshti UniversityTehranIran Department of Computer Science University of TexasSan AntonioTexas 78249USA (Visiting Faculty)Department of Computer Engineering&Informatics University of PatrasRio 26500Greece
It is known that every tensor has an associated semi-symmetric *** purpose of this paper is to investigate the shared properties of a tensor and its semi-symmetric *** particular,a corresponding semi-symmetric tensor ... 详细信息
来源: 评论
Automated User Experience (UX) Testing for Mobile Application: Strengths and Limitations
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2022年 第4期16卷 30-45页
作者: Abuaddous, Hayfa. Y. Saleh, Ashraf Mousa Enaizan, Odai Ghabban, Fahad Al-Badareen, Anas Bassam Faculty of Computer Sciences and Informatics Amman Arab University Amman Jordan Department of Management Information System University of Tabuk Tabuk Saudi Arabia College of Computer Science and Engineering Taibah University Medina Saudi Arabia Department of Software Engineering Aqaba University of Technology Aqaba Jordan
User Experience (UX) evaluation has a significant importance for any interactive application. Mobile device applications have additional limitations to convey good user experiences (UX) due to the usage and features o... 详细信息
来源: 评论
Stress Detection Using EEG Signals: A SVM-Based Classification and Feature Selection Approach
Stress Detection Using EEG Signals: A SVM-Based Classificati...
收藏 引用
Electrical Power, Electronics, Communications, Controls and informatics Seminar (EECCIS)
作者: Fi Imanur Sifaunnufus Fitra Abdurrachman Bachtiar Barlian Henryranu Prasetio Department of Computer Engineering Faculty of Computer Science Brawijaya University Malang Indonesia Department of Informatics Engineering Faculty of Computer Science Brawijaya University Malang Indonesia
Stress is a problem with various adverse effects, such as mental disorders and suicide. With these problems arising, a stress detection system is needed as an initial examination of the level of stress experienced. Ge... 详细信息
来源: 评论
3D Mesh Reconstruction from 2D Images: A NeRF based Approach  1
3D Mesh Reconstruction from 2D Images: A NeRF based Approach
收藏 引用
1st International Conference of Intelligent Methods, Systems and Applications, IMSA 2023
作者: Abdelfattah, Mohamed Reda, Rania Salem, Mohammed A.-M. Abdennadher, Slim German University Cairo Media Engineering & Technology Cairo Egypt ITQAN CEO Cairo Egypt German International University Informatics & Computer Science Cairo Egypt
3D object reconstruction is a vital obstacle within computer vision, and several techniques have been proposed to tackle it. However, the automation of the reconstruction process continues to pose a significant challe... 详细信息
来源: 评论
Developing an Anti -Phishing Large Language Model: A Focus Group Study on Human, Technological, and Legal Factors
Developing an Anti -Phishing Large Language Model: A Focus G...
收藏 引用
International Conference on Information, Intelligence, Systems and Applications (IISA)
作者: George A. Thomopoulos Panagiota Kiortsi Damianos Dumi Sigalas Dimitris Kosmopoulos Ioannis Igglezakis Christos Fidas Department of Electrical and Computer Engineering University of Patras Faculty of Law Aristotle University of Thessaloniki Department of Computer Engineering and Informatics University of Patras
The phishing problem poses a significant threat in modern information systems, putting both individuals and businesses at risk of financial and professional harm. Owing to social media's rapid development and wide... 详细信息
来源: 评论
Using Web Server Logs to Identify and Comprehend Anomalous User Activity
Using Web Server Logs to Identify and Comprehend Anomalous U...
收藏 引用
International Conference on Telecommunications (ConTEL)
作者: Lenka Benova Ladislav Hudec Faculty of Informatics and Information Technologies Institute of Computer Engineering and Applied Informatics Bratislava Slovakia
This research paper presents a study for identifying user anomalies in large datasets of web server requests. Using a cybersecurity company's network of web servers as a case study, we propose a technique for anal...
来源: 评论