咨询与建议

限定检索结果

文献类型

  • 13,045 篇 会议
  • 6,945 篇 期刊文献
  • 348 册 图书

馆藏范围

  • 20,338 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,726 篇 工学
    • 8,085 篇 计算机科学与技术...
    • 6,641 篇 软件工程
    • 2,711 篇 信息与通信工程
    • 1,665 篇 控制科学与工程
    • 1,537 篇 生物工程
    • 1,481 篇 生物医学工程(可授...
    • 1,235 篇 电气工程
    • 1,128 篇 电子科学与技术(可...
    • 972 篇 光学工程
    • 766 篇 机械工程
    • 624 篇 仪器科学与技术
    • 515 篇 化学工程与技术
    • 469 篇 动力工程及工程热...
    • 401 篇 安全科学与工程
    • 369 篇 交通运输工程
    • 350 篇 建筑学
  • 7,069 篇 理学
    • 3,418 篇 数学
    • 2,349 篇 物理学
    • 1,751 篇 生物学
    • 1,129 篇 统计学(可授理学、...
    • 792 篇 系统科学
    • 558 篇 化学
  • 3,141 篇 管理学
    • 1,801 篇 管理科学与工程(可...
    • 1,493 篇 图书情报与档案管...
    • 974 篇 工商管理
  • 1,398 篇 医学
    • 1,211 篇 临床医学
    • 1,100 篇 基础医学(可授医学...
    • 718 篇 药学(可授医学、理...
    • 504 篇 公共卫生与预防医...
  • 536 篇 法学
    • 446 篇 社会学
  • 315 篇 经济学
  • 285 篇 教育学
  • 260 篇 农学
  • 61 篇 文学
  • 30 篇 军事学
  • 28 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 589 篇 informatics
  • 297 篇 computational mo...
  • 276 篇 computer archite...
  • 273 篇 deep learning
  • 253 篇 computer science
  • 231 篇 machine learning
  • 221 篇 data mining
  • 204 篇 image segmentati...
  • 203 篇 training
  • 196 篇 feature extracti...
  • 195 篇 internet of thin...
  • 186 篇 optimization
  • 183 篇 support vector m...
  • 180 篇 accuracy
  • 179 篇 artificial intel...
  • 161 篇 quality of servi...
  • 158 篇 neural networks
  • 153 篇 bandwidth
  • 149 篇 monitoring
  • 139 篇 resource managem...

机构

  • 415 篇 department for p...
  • 408 篇 faculty of scien...
  • 406 篇 department of ph...
  • 390 篇 kirchhoff-instit...
  • 388 篇 department of ph...
  • 384 篇 department of ph...
  • 349 篇 fakultät für phy...
  • 323 篇 institute of phy...
  • 308 篇 department of ph...
  • 308 篇 institute of phy...
  • 280 篇 department of ph...
  • 273 篇 instituto de fís...
  • 270 篇 universidade fed...
  • 269 篇 department of ph...
  • 266 篇 graduate school ...
  • 264 篇 ictp trieste
  • 253 篇 department of ph...
  • 252 篇 yerevan physics ...
  • 250 篇 department of ph...
  • 249 篇 nikhef national ...

作者

  • 338 篇 c. alexa
  • 335 篇 j. m. izen
  • 332 篇 g. bella
  • 332 篇 d. calvet
  • 332 篇 c. amelung
  • 330 篇 j. strandberg
  • 327 篇 g. spigo
  • 326 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 320 篇 s. mohapatra
  • 305 篇 s. guindon
  • 301 篇 y. tayalati
  • 293 篇 a. kaczmarska
  • 284 篇 m. klein
  • 269 篇 j. schaarschmidt
  • 261 篇 f. pastore
  • 253 篇 n. orlando

语言

  • 18,181 篇 英文
  • 2,007 篇 其他
  • 142 篇 中文
  • 18 篇 日文
  • 9 篇 德文
  • 3 篇 法文
  • 3 篇 斯洛文尼亚文
  • 3 篇 土耳其文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 爱沙尼亚文
  • 1 篇 朝鲜文
检索条件"机构=Computer Engineering and Informatics"
20338 条 记 录,以下是1481-1490 订阅
排序:
Provably Efficient Multi-Cancer Image Segmentation Based on Multi-Class Fuzzy Entropy
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2023年 第8期47卷 77-88页
作者: Jasim, Hend Muslim Ghrabat, Mudhafar Jalil Jassim Abdulrahman, Luqman Qader Nyangaresi, Vincent Omollo Ma, Junchao Abduljabbar, Zaid Ameen Abduljaleel, Iman Qays Department of Computer Science College of Education for Pure Sciences University of Basrah Basrah61004 Iraq Iraqi Commission for Computers and Informatics The Informatics Institute for Postgraduate Studies Baghdad Iraq Computer Science Department Al-Turath University College Baghdad10013 Iraq College of Health Science Hawler Medical University Erbil Iraq Jaramogi Oginga Odinga University of Science and Technology Bondo40601 Kenya College of Big Data and Internet Shenzhen Technology University Shenzhen518118 China Technical Computer Engineering Department AL-Kunooze University College Basrah6100 Iraq Huazhong University of Science and Technology Shenzhen Institute Shenzhen518000 China Department of Computer Science College of Computer Science and Information Technology University of Basrah Basrah61004 Iraq
One of the segmentation techniques with the greatest degree of success used in numerous recent applications is multi-level thresholding. The selection of appropriate threshold values presents difficulties for traditio... 详细信息
来源: 评论
Topic Relation Graph Construction to Identify Challenges in Introducing Programming in Indonesian K-12 Education  1
Topic Relation Graph Construction to Identify Challenges in ...
收藏 引用
1st IEEE International Conference on Smart Technology, ICE-SMARTec 2023
作者: Ayub, Mewati Karnalim, Oscar Toba, Hapnes Wijanto, Maresha Caroline Dulimarta, Hans Saputra, Williyandie Kotambunan, Tabitha Emanuella Master Program of Computer Science Maranatha Christian University Bandung Indonesia Ewha Womans University Dept. of Computer Science and Engineering Seoul Korea Republic of School of Computing Grand Valley State University MI United States Informatics Engineering Maranatha Christian University Bandung Indonesia
Programming can help K-12 students to develop their 21st-century core skills. Despite the benefits, programming is not common to be delivered in Indonesian K-12 education. There is a need to understand potential chall... 详细信息
来源: 评论
Procedural Modeling Method for Automatic Generation of Multi-Layout Virtual Content with Existing Elements
Procedural Modeling Method for Automatic Generation of Multi...
收藏 引用
International Symposium on INFOTEH-JAHORINA (INFOTEH)
作者: Emir Cogo Ehlimana Cogo Damir Pozderac Selma Rizvić Department of Computer Science and Informatics Faculty of Electrical Engineering University of Sarajevo Sarajevo Bosnia and Herzegovina
Procedural modeling is used to generate virtual content in organized layouts of exterior and interior elements. There is a large number of existing layout generation methods, and newer approaches propose the generatio...
来源: 评论
Sarcasm detection in product reviews using textual entailment approach  23
Sarcasm detection in product reviews using textual entailmen...
收藏 引用
Proceedings of the 2023 7th International Conference on Natural Language Processing and Information Retrieval
作者: Shubham Sinha Tarun Vijeta Pratik Kishor Kubde Ayush Pradeep Gajbhiye Mansi Anup Radke Christopher Jones Department of Computer Science and Engineering Visvesvaraya National Institute of Technology India School of Computer Science and Informatics Cardiff University UK
Sarcasm is a form of sentiment characterized by the use of words that express the opposite of what is meant. Sarcasm detection has applications in multiple domains ranging from sentiment analysis in product reviews to... 详细信息
来源: 评论
OBVIOUSLY STRATEGY-PROOF MECHANISMS WITHOUT MONEY FOR SCHEDULING
收藏 引用
SIAM Journal on Discrete Mathematics 2025年 第2期39卷 1102-1122页
作者: Kyropoulou, Maria Ventre, Carmine Computer Science and Electronic Engineering University of Essex Colchester United Kingdom Department of Informatics King's College London London United Kingdom
We consider the scheduling problem when no payments are allowed and the machines are bound by their declarations. We are interested in a notion of incentive compatibility, stronger than the (standard) strategy-proofne... 详细信息
来源: 评论
Exploring the influence of waste glass granular replacement on compressive strength in concrete mixtures: a normalization and modeling study
收藏 引用
Journal of Building Pathology and Rehabilitation 2024年 第1期9卷 1-15页
作者: Ahmad, Soran Abdrahman Ahmed, Hemn Unis Rafiq, Serwan Khwrshid Gul-Mohammed, Jaza Faiq Ahmed, Dler Ali Rostam, Khalan Jalil Fqi, Kawa Omar Civil Engineering Department Collage of Engineering University of Sulaimani Kurdistan Region Sulaimani Iraq Civil Engineering Department University of Halabja Kurdistan Region Halabja Iraq Computer Engineering Deptartment Collage of Engineering University of Sulaimani Kurdistan Region Sulaimani Iraq Civil Engineering Department University of Garmian Kurdistan Region Kalar Iraq Statistics and Informatics Department College of Administration and Economies University of Sulaimani Kurdistan Region Sulaimani Iraq Qaiwan Company Kurdistan Region Sulaimani Iraq
In many third-world countries, effective waste material management has become a crucial concern due to the escalating quantity of waste materials. Among these materials, waste glass holds significance due to its wides... 详细信息
来源: 评论
Guaranteed Coverage Prediction Intervals with Gaussian Process Regression
arXiv
收藏 引用
arXiv 2023年
作者: Papadopoulos, Harris The Department of Electrical Engineering Computer Engineering and Informatics Frederick University Nicosia1036 Cyprus
Gaussian Process Regression (GPR) is a popular regression method, which unlike most Machine Learning techniques, provides estimates of uncertainty for its predictions. These uncertainty estimates however, are based on... 详细信息
来源: 评论
Application of ensemble models approach in anemia detection using images of the palpable palm
收藏 引用
Medicine in Novel Technology and Devices 2023年 第4期20卷 76-86页
作者: Peter Appiahene Samuel Segun Dzifa Dogbe Emmanuel Edem Yaw Kobina Philip Sackey Dartey Stephen Afrifa Emmanuel Timmy Donkoh Justice Williams Asare Department of Computer Science and Informatics University of Energy and Natural ResourcesGhana Department of Information and Communication Engineering Tianjin UniversityChina c Department of Basic and Applied Biology University of Energy and Natural ResourcesGhana
Anemia is a public health issue with serious ramifications for human health *** particularly affects pregnant women and children from 6 to 59 months old even though every individual is at *** occurs when the Hb level ... 详细信息
来源: 评论
Social engineering Attacks Detection Approach  13
Social Engineering Attacks Detection Approach
收藏 引用
13th International Conference on Dependable Systems, Services and Technologies, DESSERT 2023
作者: Lysenko, Sergii Vorobiov, Volodymyr Bokhonko, Oleksandr Gaj, Piotr Savenko, Oleg Woloszyn, Jacek Khmelnitsky National University Department of Computer Engineering and Information Systems Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Khmelnitsky National University Department of Computer Engineering and System Programming Khmelnitsky Ukraine Kazimierz Pulaski University of Technology and Humanities in Radom Department of Informatics and Teleinformatics Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq... 详细信息
来源: 评论
Training Data Debugging Through a Lens of Outliers in Neuron Coverage
Training Data Debugging Through a Lens of Outliers in Neuron...
收藏 引用
AI, Science, engineering, and Technology (AIxSET), Conference on
作者: Kozo Okano Daichi Ofuchi Shinpei Ogata Shin Nakajima Electrical and Computer Engineering Shinshu University Nagano Japan National Institute of Informatics Tokyo Japan
As the behavior of neural networks is dependent on the characteristics of training data, choosing appropriate data is mandatory to achieve expected levels of their prediction performance such as the accuracy or robust... 详细信息
来源: 评论