咨询与建议

限定检索结果

文献类型

  • 2,850 篇 会议
  • 2,347 篇 期刊文献
  • 100 册 图书

馆藏范围

  • 5,297 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,920 篇 工学
    • 1,975 篇 计算机科学与技术...
    • 1,624 篇 软件工程
    • 636 篇 信息与通信工程
    • 422 篇 控制科学与工程
    • 394 篇 生物工程
    • 387 篇 生物医学工程(可授...
    • 339 篇 电气工程
    • 287 篇 电子科学与技术(可...
    • 250 篇 光学工程
    • 207 篇 机械工程
    • 163 篇 核科学与技术
    • 156 篇 化学工程与技术
    • 149 篇 仪器科学与技术
    • 122 篇 动力工程及工程热...
    • 110 篇 安全科学与工程
    • 87 篇 建筑学
  • 2,223 篇 理学
    • 1,070 篇 物理学
    • 829 篇 数学
    • 452 篇 生物学
    • 270 篇 统计学(可授理学、...
    • 203 篇 系统科学
    • 165 篇 化学
  • 814 篇 管理学
    • 453 篇 管理科学与工程(可...
    • 404 篇 图书情报与档案管...
    • 252 篇 工商管理
  • 365 篇 医学
    • 318 篇 临床医学
    • 273 篇 基础医学(可授医学...
    • 194 篇 药学(可授医学、理...
    • 125 篇 公共卫生与预防医...
  • 120 篇 法学
    • 95 篇 社会学
  • 82 篇 教育学
  • 78 篇 经济学
  • 70 篇 农学
  • 13 篇 文学
  • 11 篇 军事学
  • 5 篇 艺术学

主题

  • 109 篇 machine learning
  • 101 篇 artificial intel...
  • 99 篇 deep learning
  • 94 篇 accuracy
  • 90 篇 hadron colliders
  • 85 篇 informatics
  • 82 篇 computational mo...
  • 78 篇 feature extracti...
  • 76 篇 training
  • 64 篇 support vector m...
  • 63 篇 higgs bosons
  • 57 篇 internet of thin...
  • 57 篇 data models
  • 55 篇 data mining
  • 55 篇 convolutional ne...
  • 54 篇 forecasting
  • 50 篇 predictive model...
  • 49 篇 computer science
  • 47 篇 proton-proton in...
  • 46 篇 optimization

机构

  • 409 篇 department for p...
  • 405 篇 faculty of scien...
  • 400 篇 kirchhoff-instit...
  • 396 篇 department of ph...
  • 386 篇 department of ph...
  • 383 篇 department of ph...
  • 381 篇 institute of phy...
  • 370 篇 institute of phy...
  • 368 篇 fakultät für phy...
  • 346 篇 instituto de fís...
  • 306 篇 department of ph...
  • 286 篇 graduate school ...
  • 282 篇 dipartimento di ...
  • 280 篇 department of ph...
  • 278 篇 department of ph...
  • 273 篇 nikhef national ...
  • 266 篇 universidade fed...
  • 262 篇 department of ph...
  • 261 篇 yerevan physics ...
  • 261 篇 ictp trieste

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 332 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 325 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 317 篇 s. mohapatra
  • 310 篇 s. guindon
  • 305 篇 a. kaczmarska
  • 300 篇 y. tayalati
  • 300 篇 j. schaarschmidt
  • 289 篇 a. d. pilkington
  • 287 篇 l. chevalier
  • 284 篇 m. klein

语言

  • 5,155 篇 英文
  • 122 篇 其他
  • 14 篇 中文
  • 6 篇 日文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Engineering and Informatics Faculty"
5297 条 记 录,以下是71-80 订阅
排序:
Automating Cyber Defense: Enhancing Threat Intelligence with AI-Driven Annotation  7
Automating Cyber Defense: Enhancing Threat Intelligence with...
收藏 引用
7th International Conference on Signal Processing and Information Security, ICSPIS 2024
作者: Mostafa, Youssef Sayed, Samir G. Zamzam, Marwa Giza Egypt Helwan University Faculty of Engineering in Helwan Cairo Egypt German International University Faculty of Informatics and Computer Science Cairo Egypt
The cybersecurity landscape is increasingly challenged by the growing digital footprint and the sophistication of cyber threats, necessitating experts to stay updated and extract actionable insights from a deluge of C... 详细信息
来源: 评论
Bluffing the Hackers: Automated Decoy Creation and Real-Time Cyber Deception  7
Bluffing the Hackers: Automated Decoy Creation and Real-Time...
收藏 引用
7th International Conference on Signal Processing and Information Security, ICSPIS 2024
作者: Farrag, Mohamed Sayed, Samir G. Zamzam, Marwa German International University Faculty of Informatics and Computer Science Cairo Egypt Giza Egypt Helwan University Faculty of Engineering in Helwan Cairo Egypt
In the digital age, the proliferation of cyber threats necessitates advanced cybersecurity solutions. This paper introduces 'Bluff,' an innovative cybersecurity platform designed to enhance intrusion preventio... 详细信息
来源: 评论
Detection and Counting Bacilli Tuberculosis Images using Classical Image Processing and Deep Learning  24
Detection and Counting Bacilli Tuberculosis Images using Cla...
收藏 引用
2nd International Conference on Communications, Computing and Artificial Intelligence, CCCAI 2024
作者: Yuniarti, Heny Fatichah, Chastine Sigit, Riyanto Department of Informatics Faculty of Intelligent Electrical and Informatics Technology Institut Teknologi Sepuluh Nopember Indonesia Department of Computer Engineering Politeknik Elektronika Negeri Surabaya Indonesia
Tuberculosis (TB) has been known as the top two murdering disease worldwide after HIV/AIDS. Indonesia is the second country with the highest number of tuberculosis. One of the reasons for the high number of cases is t... 详细信息
来源: 评论
Neural End-to-End Coreference Resolution using Morphological Information  6
Neural End-to-End Coreference Resolution using Morphological...
收藏 引用
CRAC Shared Task on Multilingual Coreference Resolution at 6th Workshop on Computational Models of Reference, Anaphora and Coreference, CRAC 2023
作者: Arslan, Tugba Pamay Acar, Kutay Eryigit, Gulsen ITÜ NLP Research Group Department of AI&Data Engineering Faculty of Computer&Informatics Istanbul Technical University Turkey ITÜ NLP Research Group Department of Computer Engineering Faculty of Computer&Informatics Istanbul Technical University Turkey
In morphologically rich languages, words consist of morphemes containing deeper information in morphology, and thus such languages may necessitate the use of morpheme-level representations as well as word representati...
来源: 评论
Scheduling Tool for Deterministic Communication in Distributed Real-Time Systems  10
Scheduling Tool for Deterministic Communication in Distribut...
收藏 引用
10th Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications, SQAMIA 2023
作者: Mach, Jan Tašková, Valéria Kohútka, Lukáš Institute of Computer Engineering and Applied Informatics Faculty of Informatics and Information Technologies Slovak University of Technology Bratislava Slovakia Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology Bratislava Slovakia
A network with critical data streams, where the timing of incoming and outgoing data is a necessity, is called a deterministic network. These networks are mostly used in association with real-time systems that use per... 详细信息
来源: 评论
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5035-5048页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis... 详细信息
来源: 评论
Multi-Robot Navigation Uses the Greedy Heuristic Algorithm Based on the ACO Algorithm
Multi-Robot Navigation Uses the Greedy Heuristic Algorithm B...
收藏 引用
2024 International Conference on computer engineering, Network and Intelligent Multimedia, CENIM 2024
作者: Zaini, Ahmad Muhtadin Rioza, Hansen Ade Institut Teknologi Sepuluh Nopember Faculty of Intelligent Electrical and Informatics Technology Department of Computer Engineering Surabaya60111 Indonesia
Robot swarm navigation faces challenges in coordi-nation in dynamic environments with limited information, since each robot only has local access, making optimal paths difficult to achieve. Increasing the number of ro... 详细信息
来源: 评论
Improving SVM Performance in Determining Cost and Kernel Parameter Values Through Grid Search  2
Improving SVM Performance in Determining Cost and Kernel Par...
收藏 引用
2nd International Conference on Technology Innovation and Its Applications, ICTIIA 2024
作者: Sylvia, Visca Lydia, Maya Silvi Nasution, Benny Benyamin Universitas Sumatera Utara Faculty of Computer Science and Information Technology Medan Indonesia Politeknik Negeri Medan Department of Computer Engineering and Informatics Medan Indonesia
The purpose of this study is to improve the performance of Support Vector Machine (SVM) algorithm in sentiment analysis of trainee reviews through parameter optimization using Grid Search. Trainee reviews were taken f... 详细信息
来源: 评论
Comparative Analysis of Edge Detection Algorithms with Particle Swarm Optimization for Enhanced Image Processing  11
Comparative Analysis of Edge Detection Algorithms with Parti...
收藏 引用
11th International Conference on ICT for Smart Society, ICISS 2024
作者: Rahayu, Sri Nurtantio Andono, Pulung Pujiono Zainul Fanani, Ahmad Dian Nuswantoro University Faculty of Computer Science Department of Informatics Engineering Semarang Indonesia Institut Teknologi Garut Computer Science Department Garut Indonesia
Edge detection plays an important role in various fields by identifying object boundaries and supporting advanced image analysis, such as segmentation, recognition, and tracking. Many edge detection algorithms, such a... 详细信息
来源: 评论
Performance Analysis of 3D Rendering Method on Web-Based Augmented Reality Application Using WebGL and OpenGL Shading Language  23
Performance Analysis of 3D Rendering Method on Web-Based Aug...
收藏 引用
8th International Conference on Sustainable Information engineering and Technology, SIET 2023
作者: Hamzaturrazak, Multohadi Jonemaro, Eriq Muhammad Adams Pinandito, Aryo Informatics Engineering Department Universitas Brawijaya Faculty of Computer Science Indonesia Information System Department Universitas Brawijaya Faculty of Computer Science Indonesia
In recent years, web programming has increased to the extent where it is capable of rendering 3D objects on the web. Its rendering performance varied depending on where it ran and what library was used to render the o... 详细信息
来源: 评论