咨询与建议

限定检索结果

文献类型

  • 2,948 篇 会议
  • 2,532 篇 期刊文献
  • 164 册 图书

馆藏范围

  • 5,644 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,071 篇 工学
    • 1,999 篇 计算机科学与技术...
    • 1,580 篇 软件工程
    • 683 篇 信息与通信工程
    • 386 篇 生物工程
    • 376 篇 生物医学工程(可授...
    • 365 篇 控制科学与工程
    • 313 篇 电气工程
    • 283 篇 光学工程
    • 270 篇 电子科学与技术(可...
    • 208 篇 机械工程
    • 182 篇 仪器科学与技术
    • 163 篇 核科学与技术
    • 141 篇 化学工程与技术
    • 112 篇 动力工程及工程热...
    • 97 篇 材料科学与工程(可...
  • 2,241 篇 理学
    • 1,002 篇 物理学
    • 876 篇 数学
    • 473 篇 生物学
    • 281 篇 统计学(可授理学、...
    • 178 篇 系统科学
    • 157 篇 化学
  • 769 篇 管理学
    • 447 篇 管理科学与工程(可...
    • 347 篇 图书情报与档案管...
    • 240 篇 工商管理
  • 386 篇 医学
    • 319 篇 临床医学
    • 296 篇 基础医学(可授医学...
    • 195 篇 药学(可授医学、理...
    • 133 篇 公共卫生与预防医...
  • 138 篇 法学
    • 117 篇 社会学
  • 105 篇 经济学
    • 103 篇 应用经济学
  • 73 篇 教育学
  • 61 篇 农学
  • 12 篇 文学
  • 7 篇 艺术学
  • 5 篇 军事学
  • 2 篇 哲学

主题

  • 205 篇 informatics
  • 144 篇 artificial intel...
  • 94 篇 machine learning
  • 90 篇 hadron colliders
  • 87 篇 computational mo...
  • 86 篇 computer science
  • 76 篇 computer network...
  • 73 篇 computer archite...
  • 73 篇 wireless sensor ...
  • 67 篇 deep learning
  • 66 篇 quality of servi...
  • 63 篇 higgs bosons
  • 62 篇 feature extracti...
  • 61 篇 semantics
  • 61 篇 protocols
  • 59 篇 data mining
  • 58 篇 training
  • 57 篇 image segmentati...
  • 56 篇 costs
  • 55 篇 electronic mail

机构

  • 412 篇 department for p...
  • 404 篇 faculty of scien...
  • 398 篇 department of ph...
  • 398 篇 kirchhoff-instit...
  • 386 篇 department of ph...
  • 385 篇 department of ph...
  • 376 篇 institute of phy...
  • 366 篇 institute of phy...
  • 364 篇 fakultät für phy...
  • 331 篇 instituto de fís...
  • 307 篇 department of ph...
  • 280 篇 department of ph...
  • 280 篇 graduate school ...
  • 274 篇 department of ph...
  • 271 篇 dipartimento di ...
  • 269 篇 universidade fed...
  • 264 篇 ictp trieste
  • 262 篇 nikhef national ...
  • 259 篇 department of ph...
  • 257 篇 yerevan physics ...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 332 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 325 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 317 篇 s. mohapatra
  • 310 篇 s. guindon
  • 304 篇 a. kaczmarska
  • 299 篇 y. tayalati
  • 297 篇 j. schaarschmidt
  • 292 篇 a. d. pilkington
  • 284 篇 l. chevalier
  • 283 篇 m. klein

语言

  • 5,346 篇 英文
  • 250 篇 其他
  • 45 篇 中文
  • 8 篇 日文
  • 1 篇 德文
检索条件"机构=Computer Technology Institute and Department of Computer Engineeringand Informatics"
5644 条 记 录,以下是151-160 订阅
排序:
Modified Histogram Equalization for Improved CNN Medical Image Segmentation  27
Modified Histogram Equalization for Improved CNN Medical Ima...
收藏 引用
27th International Conference on Knowledge Based and Intelligent Information and Engineering Sytems, KES 2023
作者: Saifullah, Shoffan Drezewski, Rafal Institute of Computer Science AGH University of Science and Technology Kraków Poland Department of Informatics Universitas Pembangunan Nasional Veteran Yogyakarta Yogyakarta Indonesia
This research aims to improve the performance of convolutional neural network (CNN) in medical image segmentation that will detect specific parts of the body's anatomical structures. Medical images have drawbacks,... 详细信息
来源: 评论
A Review and Analysis of Localization Techniques in Underwater Wireless Sensor Networks
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5697-5715页
作者: Seema Rani Anju Anupma Sangwan Krishna Kumar Kashif Nisar Tariq Rahim Soomro Ag.Asri Ag.Ibrahim Manoj Gupta Laxmi Chandand Sadiq Ali Khan Department of CSE Guru Jambheshwar University of Science&TechnologyHisar125001India Department of Hydro and Renewable Energy Indian Institute of Technology RoorkeeIndia College of Computer Science and Information Systems Institute of Business ManagementKorangi Creek RoadKarachi75190SindhPakistan Faculty of Computing and Informatics Universiti Malaysia SabahJalan UMSKota Kinabalu88400SabahMalaysia Department of Electronics and Communication Engineering JECRC UniversityJaipurRajasthanIndia Computer Science Department UBIT Karachi UniversityKarachi75270Pakistan
In recent years,there has been a rapid growth in Underwater Wireless Sensor Networks(UWSNs).The focus of research in this area is now on solving the problems associated with large-scale *** of the major issues in such... 详细信息
来源: 评论
Annealing-Based Optimization for Selecting Training Space in Ensemble Learning  10
Annealing-Based Optimization for Selecting Training Space in...
收藏 引用
10th International Conference on Advanced informatics: Concept, Theory and Application, ICAICTA 2023
作者: Yulianti, Lenny Putri Trisetyarso, Agung Santoso, Judhi Surendro, Kridanto School of Electrical Engineering and Informatics Bandung Institute of Technology Bandung Indonesia School of Computer Science Bina Nusantara University Department of Mathematics Jakarta Indonesia
Ensemble learning integrates many learners to achieve better performance, however, it can increase the complexity dramatically. Redundant learners should be pruned to reduce ensemble complexity while allowing for incr... 详细信息
来源: 评论
Depth and Pitch Control of Autonomous Underwater Glider Using Model Predictive Control with ARX Model
Depth and Pitch Control of Autonomous Underwater Glider Usin...
收藏 引用
2023 International Conference on Electrical Engineering and informatics, ICEEI 2023
作者: Jeremy, Jason Hidayat, Egi Muhammad Idris Siregar, Simon Trilaksono, Bambang Riyanto Habibullah, Natsir School of Electrical Engineering and Informatics Bandung Institute of Technology Bandung Indonesia Telkom University Faculty of Applied Science Department Computer Engineering Bandung Indonesia
Autonomous Underwater Gliders (AUGs) are extensively developed vehicles capable of prolonged exploration and observation in complex marine environments. Control of the AUG is challenging due to its slow response syste... 详细信息
来源: 评论
Palm Oil Maturity Classification Using K-Nearest Neighbors Based on RGB and L*a*b Color Extraction  27
Palm Oil Maturity Classification Using K-Nearest Neighbors B...
收藏 引用
27th International Conference on Knowledge Based and Intelligent Information and Engineering Sytems, KES 2023
作者: Saifullah, Shoffan Prasetyo, Dessyanto Boedi Indahyani Drezewski, Rafal Dwiyanto, Felix Andika Institute of Computer Science AGH University of Science and Technology Kraków Poland Department of Informatics Universitas Pembangunan Nasional Veteran Yogyakarta Yogyakarta Indonesia
This study aims to classify the maturity level of oil palm using the K-Nearest Neighbors (KNN) method based on the extraction of RGB and L*a*b color features. This classification determines the optimal oil production ... 详细信息
来源: 评论
Learning teamwork based on leader’s instructions and coercion in the continuous space pursuit problem
收藏 引用
Transactions of the Japanese Society for Artificial Intelligence 2021年 第5期36卷 1-10页
作者: Matsunami, Natsuki Okuhara, Shun Ito, Takayuki Department of Computer Science Nagoya Institute of Technology Japan Department of Social Informatics Kyoto University Japan
In multi-agent environments, reinforcement learning (RL) has shown strong potential especially with the recent developments. However, there exist different difficulties in developing cooperation among learning agents ... 详细信息
来源: 评论
Role of Enabling Technologies in Soft Tissue Engineering: A Systematic Literature Review
收藏 引用
IEEE Engineering Management Review 2022年 第4期50卷 155-169页
作者: Sood, Sandeep Kumar Rawat, Keshav Singh Sharma, Girish National Institute of Technology Kurukshetra Department of Computer Applications Haryana Kurukshetra136119 India Central University of Haryana Computer Sciences and Information Technology Haryana Mahendragarh123031 India Central University of Himachal Pradesh School of Mathematics Computers and Information Science Computer Science and Informatics Himachal Pradesh Dharamshala176215 India
3D printing processes employed in soft tissue engineering are rapidly evolving and gaining commercialization for the artificial synthesis of organs and tissues to bridge the gap of the supply of organ donors and healt... 详细信息
来源: 评论
Adversarial learning for Mirai botnet detection based on long short-term memory and XGBoost
收藏 引用
International Journal of Cognitive Computing in Engineering 2024年 第1期5卷 153-160页
作者: Vajrobol, Vajratiya Gupta, Brij B. Gaurav, Akshat Chuang, Huan-Ming Institute of Informatics and Communication University of Delhi India International Center for AI and Cyber Security Research and Innovations. Asia University Taiwan Department of Computer Science and Information Engineering Asia University Taichung413 Taiwan Ronin Institute MontclairNJ United States Department of Information Management National Yunlin University of Science and Technology Yunlin Taiwan Symbiosis International University Pune India Department of Electrical and Computer Engineering Lebanese American University Beirut1102 Lebanon Dehradun India
In today's world, where digital threats are on the rise, one particularly concerning threat is the Mirai botnet. This malware is designed to infect and command a collection of Internet of Things (IoT) devices. The... 详细信息
来源: 评论
Examining the Effectiveness of Academic Title Verification: A Case Study  24th
Examining the Effectiveness of Academic Title Verification: ...
收藏 引用
24th International Multidisciplinary Conference on Reliability and Statistics in Transportation and Communication, RelStat 2024
作者: Panges, Ioannis Liagkou, Vasiliki Stamatiou, Yannis Stylios, Chrysostomos Department of Informatics and Telecommunications of the University of Ioannina Kostakoi Arta Greece Computer Technology Institute and Press "Diophantus" Rio Greece Business Administration Department of the University of Patras Patras Greece ATHENA Research Center Institute of Industrial System Patras Patras Greece
In the ever-changing realm of identity management, the incorporation of privacy-preserving technologies has become increasingly vital. Despite significant advancements in identity management systems and access control... 详细信息
来源: 评论
Comprehensive Analysis and Remediation of Insecure Direct Object References (IDOR) Vulnerabilities in Android APIs  1
Comprehensive Analysis and Remediation of Insecure Direct Ob...
收藏 引用
1st IEEE International Conference on Cryptography, informatics, and Cybersecurity, ICoCICs 2023
作者: Yulianto, Semi Abdullah, Roni Reza Soewito, Benfano Bina Nusantara University Binus Graduate Program Computer Science Computer Science Department Jakarta11480 Indonesia National Institute of Science and Technology Faculty of Informatics Engineering Jakarta12630 Indonesia Bina Nusantara University Binus Graduate Program. Master of Computer Science Computer Science Department Jakarta11480 Indonesia
The escalating visibility of secure direct object reference (IDOR) vulnerabilities in API security, as indicated in the compilation of OWASP Top 10 API Security Risks, highlights a noteworthy peril to sensitive data. ... 详细信息
来源: 评论