咨询与建议

限定检索结果

文献类型

  • 10,202 篇 会议
  • 5,568 篇 期刊文献
  • 273 册 图书
  • 7 篇 学位论文

馆藏范围

  • 16,050 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9,284 篇 工学
    • 7,020 篇 计算机科学与技术...
    • 5,722 篇 软件工程
    • 1,883 篇 信息与通信工程
    • 1,266 篇 生物工程
    • 1,241 篇 控制科学与工程
    • 1,022 篇 生物医学工程(可授...
    • 744 篇 电气工程
    • 656 篇 光学工程
    • 602 篇 电子科学与技术(可...
    • 537 篇 机械工程
    • 408 篇 化学工程与技术
    • 361 篇 仪器科学与技术
    • 354 篇 安全科学与工程
    • 293 篇 建筑学
  • 5,299 篇 理学
    • 2,632 篇 数学
    • 1,490 篇 物理学
    • 1,455 篇 生物学
    • 915 篇 统计学(可授理学、...
    • 550 篇 系统科学
    • 441 篇 化学
  • 2,781 篇 管理学
    • 1,468 篇 管理科学与工程(可...
    • 1,389 篇 图书情报与档案管...
    • 834 篇 工商管理
  • 1,122 篇 医学
    • 960 篇 临床医学
    • 854 篇 基础医学(可授医学...
    • 512 篇 药学(可授医学、理...
    • 450 篇 公共卫生与预防医...
  • 598 篇 法学
    • 513 篇 社会学
  • 360 篇 教育学
    • 334 篇 教育学
  • 315 篇 经济学
    • 311 篇 应用经济学
  • 205 篇 农学
  • 54 篇 文学
  • 29 篇 军事学
  • 24 篇 艺术学
  • 9 篇 哲学
  • 2 篇 历史学

主题

  • 356 篇 informatics
  • 299 篇 computational mo...
  • 267 篇 machine learning
  • 226 篇 deep learning
  • 197 篇 feature extracti...
  • 195 篇 semantics
  • 192 篇 computer archite...
  • 182 篇 predictive model...
  • 175 篇 data mining
  • 170 篇 training
  • 168 篇 educational inst...
  • 166 篇 visualization
  • 164 篇 optimization
  • 162 篇 internet of thin...
  • 154 篇 support vector m...
  • 152 篇 accuracy
  • 149 篇 monitoring
  • 139 篇 quality of servi...
  • 128 篇 covid-19
  • 128 篇 image segmentati...

机构

  • 107 篇 school of inform...
  • 103 篇 school of comput...
  • 87 篇 faculty of compu...
  • 68 篇 institute of art...
  • 68 篇 school of comput...
  • 65 篇 national institu...
  • 64 篇 college of compu...
  • 63 篇 graduate school ...
  • 60 篇 college of compu...
  • 60 篇 college of compu...
  • 56 篇 school of inform...
  • 55 篇 fujian key labor...
  • 45 篇 college of compu...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 39 篇 department of ph...

作者

  • 66 篇 ji rongrong
  • 44 篇 geyong min
  • 42 篇 alfred rayner
  • 36 篇 mustafa mamat
  • 35 篇 wang cheng
  • 33 篇 liu lantao
  • 33 篇 lai yu-kun
  • 33 篇 fox geoffrey
  • 33 篇 zivkovic miodrag
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo

语言

  • 15,467 篇 英文
  • 492 篇 其他
  • 90 篇 中文
  • 5 篇 葡萄牙文
  • 4 篇 日文
  • 3 篇 斯洛文尼亚文
  • 2 篇 德文
  • 1 篇 捷克文
检索条件"机构=Computing and Informatics"
16050 条 记 录,以下是1-10 订阅
排序:
DeepEarthMY: A Remote Sensing Dataset for Tropical Land-Cover Segmentation
收藏 引用
IEEE Access 2025年 13卷 69103-69115页
作者: Mohammed Najib, Shaaban Pee, Chih-Yang Ting, Choo-Yee Wong, Lai-Kuan Multimedia University Faculty of Computing and Informatics Selangor Cyberjaya63100 Malaysia
Land-cover mapping is essential for applications such as urban planning, natural resource management, and environmental monitoring. However, tropical equatorial regions pose unique challenges to land-cover classificat... 详细信息
来源: 评论
Investigation into the Identification of AI-Generated Short Dialectal Arabic Texts
收藏 引用
IEEE Access 2025年 13卷 85131-85138页
作者: Alharthi, Haifa Saudi Electronic University College of Computing and Informatics Riyadh Saudi Arabia
Identifying AI-generated text (AIGT) has become crucial in addressing the potential misuse of generative AI tools and their impact on trust, fairness, and authenticity of content. This study investigates the detection... 详细信息
来源: 评论
On detecting stock price manipulation attacks: a comprehensive systematic literature review
收藏 引用
Multimedia Tools and Applications 2025年 1-78页
作者: Alfajeer, Amal Altaweel, Ala Bouridane, Ahmed Mouheb, Djedjiga Aslam, Sidra College of Computing and Informatics University of Sharjah Sharjah United Arab Emirates
Stock market is pivotal to economical systems. It is a platform where listed stocks of companies can be bought/sold by market participants to gain profit. In 2020, the total capitalization of all markets reached $95 t... 详细信息
来源: 评论
Aspect-based sentiment analysis in MOOCs: a systematic literature review introducing the MASC-MEF framework
收藏 引用
Journal of King Saud University - Computer and Information Sciences 2025年 第1期37卷 1-33页
作者: Awadh, Wed Akeel Sulaiman, Rosnafisah Bte Mahmoud, Moamin A. Institute of Informatics and Computing in Energy University Tenaga Nasional Kajang Malaysia Department of Computer Information Systems University of Basrah Basrah Iraq Institute of Informatics and Computing in Energy Department of Informatics Universiti Tenaga Nasional Jalan IKRAM UNITEN Selangor Kajang Malaysia Institute of Informatics and Computing in Energy Department of Computing College of Computing and Informatics Universiti Tenaga Nasional Selangor Kajang Malaysia
Aspect-based sentiment analysis (ABSA) in massive open online courses (MOOCs) offers a powerful tool to understand student experiences and improve the quality of online education. As MOOCs grow in popularity, there is... 详细信息
来源: 评论
Enhancing IoT Security: A Comparative Study of CNN and RNN-Based Anomaly Detection Using the CICIoT2023 Dataset
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of Computer Science 2025年 第5期52卷 1424-1441页
作者: Al-Ghamdi, Amal M. Alansari, Marwah M. at College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia Information Technology Department College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia
The rapid growth of Internet of Things (IoT) devices has resulted in numerous security challenges. Anomaly detection has become a crucial aspect of IoT security, as it helps identify unusual behaviors and potential th... 详细信息
来源: 评论
Identifying the Barriers to Human-Centered Design in the Workplace: Perspectives from UX Professionals
收藏 引用
Proceedings of the ACM on Human-Computer Interaction 2025年 第2期9卷 1-25页
作者: Gorichanaz, Tim College of Computing & Informatics Drexel University PhiladelphiaPA United States
Human-centered design, a theoretical ideal, is sometimes compromised in industry practice. Technology firms juggle competing priorities, such as adopting new technologies and generating shareholder returns, which may ... 详细信息
来源: 评论
Analyzing Cybersecurity Risk with a Phishing Simulation Website  24
Analyzing Cybersecurity Risk with a Phishing Simulation Webs...
收藏 引用
9th International Conference on Cloud computing and Internet of Things, CCIOT 2024
作者: Ali, Alya Nasuha Binti Mohamed Rahman, Siti Husna Abdul Faculty of Computing & Informatics Multimedia University Selangor Malaysia
Phishing is a cyberattack that exploits human psychology and technical vulnerabilities. Previous research has revealed inconsistency of relation between age and phishing susceptibility. Hence, this project aims to ide... 详细信息
来源: 评论
Stunting Classification Among Toddlers Using Decision Tree C4.5 in Berastagi City
Stunting Classification Among Toddlers Using Decision Tree C...
收藏 引用
2025 International Conference on Advancement in Data Science, E-learning and Information System, ICADEIS 2025
作者: Saveria, Hygea Gunawan, Putu Harry Informatics School of Computing Telkom University Bandung Indonesia
Stunting is a condition where a child's height significantly falls below the average for their age, primarily due to prolonged malnutrition and inadequate nutrient intake. This condition poses long-term challenges... 详细信息
来源: 评论
A Robust Resource-Aware Framework for YOLO-Based Object Detection in Dynamic and Multi-Platform Resource-Constrained Environments
收藏 引用
IEEE Access 2025年 13卷 79977-79995页
作者: Shiddiqi, Ary Mazharuddin Navastara, Dini Adni Studiawan, Hudan Romadhona, Yasinta Azhar, Muhammad Fath Mushaffa Rahma, Fayruz Bramantoro, Arif Alzahrani, Ahmad A. Institut Teknologi Sepuluh Nopember Faculty of Intelligent Electrical and Informatics Technology Department of Informatics Surabaya60111 Indonesia Informatics Study Program Telkom University Surabaya Campus Surabaya60231 Indonesia Universitas Islam Indonesia Department of Informatics Yogyakarta55584 Indonesia Universiti Teknologi Brunei School of Computing and Informatics Bandar Seri BegawanBE1410 Brunei King Abdulaziz University Faculty of Computing and Information Technology Jeddah21589 Saudi Arabia
Efficient management of resources such as CPU, RAM, and disk storage is a critical challenge for object detection systems that rely on multi-camera video streaming, especially for resource-constrained devices. These c... 详细信息
来源: 评论
An Integrated Web-Based Approach for Email Analysis Investigation Tool  24
An Integrated Web-Based Approach for Email Analysis Investig...
收藏 引用
9th International Conference on Cloud computing and Internet of Things, CCIOT 2024
作者: Bari, Fawzul Rahman, Siti Husna Abdul Faculty of Computing & Informatics Multimedia University Selangor Malaysia
Phishing websites have often been used for online and email fraud, spreading unwanted content. It has been important to find them before any user data was entered. In recent years, numerous attempts have been made to ... 详细信息
来源: 评论