咨询与建议

限定检索结果

文献类型

  • 19,460 篇 会议
  • 11,306 篇 期刊文献
  • 278 册 图书
  • 1 篇 学位论文

馆藏范围

  • 31,045 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,804 篇 工学
    • 13,902 篇 计算机科学与技术...
    • 11,273 篇 软件工程
    • 4,262 篇 信息与通信工程
    • 2,700 篇 控制科学与工程
    • 2,120 篇 生物工程
    • 1,926 篇 电气工程
    • 1,647 篇 电子科学与技术(可...
    • 1,409 篇 生物医学工程(可授...
    • 1,341 篇 光学工程
    • 1,336 篇 机械工程
    • 832 篇 仪器科学与技术
    • 781 篇 化学工程与技术
    • 766 篇 网络空间安全
    • 759 篇 动力工程及工程热...
    • 696 篇 安全科学与工程
    • 674 篇 交通运输工程
  • 10,067 篇 理学
    • 4,999 篇 数学
    • 3,323 篇 物理学
    • 2,399 篇 生物学
    • 1,595 篇 统计学(可授理学、...
    • 1,054 篇 系统科学
    • 866 篇 化学
  • 5,637 篇 管理学
    • 3,274 篇 管理科学与工程(可...
    • 2,645 篇 图书情报与档案管...
    • 1,588 篇 工商管理
  • 1,506 篇 医学
    • 1,279 篇 临床医学
    • 1,136 篇 基础医学(可授医学...
    • 690 篇 公共卫生与预防医...
    • 652 篇 药学(可授医学、理...
  • 964 篇 法学
    • 806 篇 社会学
  • 587 篇 经济学
  • 506 篇 教育学
  • 412 篇 农学
  • 130 篇 文学
  • 87 篇 军事学
  • 80 篇 艺术学
  • 22 篇 哲学
  • 9 篇 历史学

主题

  • 733 篇 deep learning
  • 644 篇 machine learning
  • 614 篇 feature extracti...
  • 572 篇 computational mo...
  • 568 篇 accuracy
  • 557 篇 training
  • 439 篇 information tech...
  • 434 篇 internet of thin...
  • 383 篇 semantics
  • 326 篇 support vector m...
  • 292 篇 data models
  • 286 篇 predictive model...
  • 261 篇 artificial intel...
  • 256 篇 computer archite...
  • 250 篇 neural networks
  • 238 篇 data mining
  • 231 篇 computer science
  • 219 篇 real-time system...
  • 219 篇 security
  • 214 篇 image segmentati...

机构

  • 485 篇 university of ch...
  • 435 篇 key laboratory o...
  • 381 篇 institute of com...
  • 192 篇 shandong provinc...
  • 170 篇 faculty of compu...
  • 130 篇 university of sc...
  • 122 篇 school of comput...
  • 113 篇 research center ...
  • 94 篇 tianfu cosmic ra...
  • 90 篇 department of ph...
  • 89 篇 key laboratory o...
  • 83 篇 cas center for e...
  • 82 篇 department of co...
  • 82 篇 faculty of compu...
  • 82 篇 sri lanka instit...
  • 81 篇 hebei normal uni...
  • 76 篇 state key labora...
  • 75 篇 college of intel...
  • 73 篇 department of co...
  • 73 篇 yunnan observato...

作者

  • 99 篇 niyato dusit
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 li xin
  • 72 篇 jiang k.
  • 71 篇 bastieri d.
  • 71 篇 li cheng
  • 70 篇 kuleshov d.
  • 69 篇 liu d.
  • 68 篇 chen m.j.
  • 63 篇 axikegu
  • 62 篇 min z.
  • 56 篇 heller m.
  • 54 篇 liu s.m.
  • 53 篇 liu ting
  • 51 篇 pang b.y.
  • 50 篇 huang d.h.
  • 47 篇 wang lei
  • 47 篇 liu yang
  • 46 篇 gao l.q.

语言

  • 29,516 篇 英文
  • 1,198 篇 其他
  • 323 篇 中文
  • 21 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 2 篇 俄文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Information Technology"
31045 条 记 录,以下是1-10 订阅
排序:
Student Academic Advisement Augmented by Artificial Intelligence in the School of computing and information technology, University of technology, Jamaica
Student Academic Advisement Augmented by Artificial Intellig...
收藏 引用
Computer Science, Computer Engineering, & Applied computing (CSCE), Congress in
作者: Tanya Graham Horrett Scarlett Shaula Edwards Braham School of Computing and Information Technology (SCIT) University of Technology (UTech) Kingston Jamaica
In this paper we examine the possibility of using artificial intelligence (AI) to improve academic advisement of students within the School of computing and information technology (SCIT) at the University of Technolog...
来源: 评论
Fog computing: Survey on decoy information technology
收藏 引用
International Journal of Security and Networks 2020年 第2期15卷 111-121页
作者: Almobaideen, Wesam Altarawneh, Muhyidean Electrical Engineering and Computing Sciences Department Rochester Institute of Technology University Dubai United Arab Emirates King Abdullah II School of Information Technology University of Jordan Amman Jordan
Fog computing extends the cloud paradigm to the edge of the network, thus covering deficiencies that are in cloud computing infrastructure. Security concerns are reduced, but this does not provide a secured platform, ... 详细信息
来源: 评论
Attar: RRAM-based in-memory attention accelerator with software-hardware co-optimization
收藏 引用
Science China(information Sciences) 2025年 第3期68卷 371-387页
作者: Bing LI Ying QI Ying WANG Yinhe HAN Information Engineering College Capital Normal University Research Center for Intelligent Computing Systems Institute of Computing TechnologyChinese Academy of Sciences
The attention mechanism has become a pivotal component in artificial intelligence, significantly enhancing the performance of deep learning applications. However, its quadratic computational complexity and intricate c... 详细信息
来源: 评论
Securing IIoT operations with recurrent federated network-based enhanced local search grasshopper
收藏 引用
Neural computing and Applications 2024年 第25期36卷 15893-15906页
作者: Alassafi, Madini O. Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
The integration of the Industrial Internet of Things (IIoT) brings about a significant improvement in the efficiency and productivity of industrial processes. The speed and accuracy of various tasks have been greatly ... 详细信息
来源: 评论
Enhancing Precision Agriculture with YOLOv8: A Deep Learning Approach to Potato Disease Identification
收藏 引用
International Journal of Advanced Computer Science and Applications 2025年 第4期16卷 1156-1166页
作者: Aleinzi, Mohammed Faculty of Computing and Information Technology Information System Department Northern Border University Saudi Arabia
Timely and precise identification of potato leaf diseases plays a critical role in improving crop productivity and reducing the impact of plant pathogens. Conventional detection techniques are often labor-intensive, d... 详细信息
来源: 评论
Optimizing Medical Image Analysis: A Performance Evaluation of YOLO-Based Segmentation Models
收藏 引用
International Journal of Advanced Computer Science and Applications 2025年 第4期16卷 1167-1174页
作者: Alanazi, Haifa Department of Information Systems-Faculty of Computing and Information Technology Northern Border University Saudi Arabia
Instance segmentation is a critical component of medical image analysis, enabling tasks such as tissue and organ delineation, and disease detection. This paper provides a detailed comparative analysis of two fine-tune... 详细信息
来源: 评论
Enhanced Wolf Pack Algorithm (EWPA) and Dense-kUNet Segmentation for Arterial Calcifications in Mammograms
收藏 引用
Computers, Materials & Continua 2024年 第2期78卷 2207-2223页
作者: Afnan M.Alhassan College of Computing and Information Technology Shaqra UniversityShaqra11961Saudi Arabia
Breast Arterial Calcification(BAC)is a mammographic decision dissimilar to cancer and commonly observed in elderly *** identifying BAC could provide an expense,and be *** Deep Learning(DL)methods have been introduced ... 详细信息
来源: 评论
Pervasive Attentive Neural Network for Intelligent Image Classification Based on N-CDE’s
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1137-1156页
作者: Anas W.Abulfaraj Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityRabigh21911Saudi Arabia
The utilization of visual attention enhances the performance of image classification *** attentionbased models have demonstrated notable performance,but many of these models exhibit reduced accuracy when confronted wi... 详细信息
来源: 评论
Dawwen: An Arabic Mental Health Mobile App Based on Natural Language Processing
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第4期19卷 108-131页
作者: Wali, Arwa Almagrabi, Hana El-Feky, Sarah Jokhdar, Maryah Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia
People are increasingly concerned about their mental health wellness. Scientific studies suggest that online counselling for anxiety and depression is just as effective as in-person treatment. Additionally, journaling... 详细信息
来源: 评论
Grey Wolf-Based Method for an Implicit Authentication of Smartphone Users
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 3729-3741页
作者: Abdulwahab Ali Almazroi Mohamed Meselhy Eltoukhy University of Jeddah College of Computing and Information Technology at KhulaisDepartment of Information TechnologyJeddahSaudi Arabia
Smartphones have now become an integral part of our everyday *** authentication on smartphones is often accomplished by mechanisms(like face unlock,pattern,or pin password)that authenticate the user’s *** technologie... 详细信息
来源: 评论