咨询与建议

限定检索结果

文献类型

  • 4,730 篇 会议
  • 3,607 篇 期刊文献
  • 199 册 图书

馆藏范围

  • 8,536 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,790 篇 工学
    • 3,100 篇 计算机科学与技术...
    • 2,500 篇 软件工程
    • 1,163 篇 信息与通信工程
    • 678 篇 控制科学与工程
    • 599 篇 电气工程
    • 572 篇 生物工程
    • 531 篇 电子科学与技术(可...
    • 513 篇 生物医学工程(可授...
    • 401 篇 光学工程
    • 324 篇 机械工程
    • 264 篇 仪器科学与技术
    • 256 篇 动力工程及工程热...
    • 221 篇 化学工程与技术
    • 220 篇 核科学与技术
    • 165 篇 安全科学与工程
    • 163 篇 交通运输工程
  • 3,314 篇 理学
    • 1,434 篇 物理学
    • 1,383 篇 数学
    • 672 篇 生物学
    • 467 篇 统计学(可授理学、...
    • 313 篇 系统科学
    • 252 篇 化学
  • 1,262 篇 管理学
    • 776 篇 管理科学与工程(可...
    • 523 篇 图书情报与档案管...
    • 403 篇 工商管理
  • 535 篇 医学
    • 456 篇 临床医学
    • 402 篇 基础医学(可授医学...
    • 265 篇 药学(可授医学、理...
    • 189 篇 公共卫生与预防医...
  • 207 篇 法学
    • 170 篇 社会学
  • 162 篇 经济学
  • 96 篇 农学
  • 86 篇 教育学
  • 19 篇 文学
  • 15 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 195 篇 informatics
  • 171 篇 hadron colliders
  • 165 篇 machine learning
  • 154 篇 artificial intel...
  • 127 篇 deep learning
  • 120 篇 computational mo...
  • 113 篇 computer archite...
  • 111 篇 quality of servi...
  • 104 篇 feature extracti...
  • 98 篇 predictive model...
  • 93 篇 optimization
  • 93 篇 accuracy
  • 92 篇 wireless sensor ...
  • 90 篇 bandwidth
  • 87 篇 monitoring
  • 85 篇 routing
  • 84 篇 resource managem...
  • 83 篇 higgs bosons
  • 82 篇 data mining
  • 79 篇 wireless communi...

机构

  • 489 篇 yerevan physics ...
  • 394 篇 department for p...
  • 386 篇 faculty of scien...
  • 380 篇 department of ph...
  • 376 篇 kirchhoff-instit...
  • 369 篇 department of ph...
  • 366 篇 department of ph...
  • 342 篇 fakultät für phy...
  • 338 篇 institute of phy...
  • 331 篇 institute of phy...
  • 308 篇 irfu cea univers...
  • 297 篇 department of ph...
  • 292 篇 instituto de fís...
  • 267 篇 department of ph...
  • 266 篇 department of ph...
  • 261 篇 universidade fed...
  • 254 篇 graduate school ...
  • 251 篇 ictp trieste
  • 250 篇 department of ph...
  • 247 篇 nikhef national ...

作者

  • 330 篇 c. alexa
  • 328 篇 j. m. izen
  • 321 篇 g. bella
  • 318 篇 j. strandberg
  • 315 篇 d. calvet
  • 313 篇 c. amelung
  • 294 篇 g. spigo
  • 288 篇 f. siegert
  • 285 篇 r. ströhmer
  • 282 篇 m. rijssenbeek
  • 280 篇 s. jin
  • 280 篇 g. gaudio
  • 279 篇 s. mohapatra
  • 271 篇 y. tayalati
  • 270 篇 s. guindon
  • 264 篇 a. kaczmarska
  • 254 篇 j. schaarschmidt
  • 251 篇 m. klein
  • 246 篇 a. d. pilkington
  • 244 篇 l. chevalier

语言

  • 8,058 篇 英文
  • 407 篇 其他
  • 72 篇 中文
  • 3 篇 德文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 爱沙尼亚文
检索条件"机构=Cyprus University of Technology Computer Engineering and Informatics"
8536 条 记 录,以下是431-440 订阅
排序:
A Machine Learning Model for Predicting Individual Substance Abuse with Associated Risk-Factors
收藏 引用
Annals of Data Science 2023年 第6期10卷 1607-1634页
作者: Islam, Uwaise Ibna Haque, Enamul Alsalman, Dheyaaldin Islam, Muhammad Nazrul Moni, Mohammad Ali Sarker, Iqbal H. Department of Computer Science and Engineering Chittagong University of Engineering & Technology Chittagong4349 Bangladesh University of Waterloo WaterlooONN2L 3G1 Canada School of Engineering Computing and Informatics Dar Al-Hekma University Jeddah Saudi Arabia Department of Computer Science and Engineering Military Institute of Science and Technology Dhaka1216 Bangladesh School of Health and Rehabilitation Sciences Faculty of Health and Behavioural Sciences The University of Queensland St LuciaQLD4072 Australia
Substance abuse is the unrestrained and detrimental use of psychoactive chemical substances, unauthorized drugs, and alcohol that can ultimately lead a human to disastrous consequences. As patients with this behavior ... 详细信息
来源: 评论
Bounded and Uniform Energy-based Out-of-distribution Detection for Graphs  41
Bounded and Uniform Energy-based Out-of-distribution Detecti...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Yang, Shenzhi Liang, Bin Liu, An Gui, Lin Yao, Xingkai Zhang, Xiaofang School of Computer Science and Technology Soochow University Suzhou China Department of Systems Engineering and Engineering Management The Chinese University of Hong Kong Hong Kong Department of Informatics King's College London London United Kingdom
Given the critical role of graphs in real-world applications and their high-security requirements, improving the ability of graph neural networks (GNNs) to detect out-of-distribution (OOD) data is an urgent research p... 详细信息
来源: 评论
The Effect of Information Security Awareness, Subjective Norms and Shared Tacit Assumptions on Information Security Culture  2
The Effect of Information Security Awareness, Subjective Nor...
收藏 引用
2nd Zimbabwe Conference on Information Communication and technology, ZCICT 2023
作者: Mupokosera, Joseph Mphahlele, Maredi Ivan Jordaan, Annelie Jokonya, Osden Tshwane University of Technology Department of Informatics Pretoria South Africa Tshwane University of Technology Department of Computer Engineering Pretoria South Africa Vaal University of Technology Department of Informatics Vanderbijlpark South Africa University of the Western Cape Department of Information Systems Cape Town South Africa
Financial services institutions are one of the prime targets of information security breaches because of the potential of the attackers to reap financial rewards from launching the attacks. Information security cultur... 详细信息
来源: 评论
A Framework for Democratizing Open-Source Decision-Making using Decentralized Autonomous Organization  6
A Framework for Democratizing Open-Source Decision-Making us...
收藏 引用
6th International Conference on Computing and informatics, ICCI 2024
作者: Afifi, Khalifa H. Fouad, Khaled M. Asian, Heba K. Faculty of Information Technology and Computer Science Nile University Cairo Egypt Faculty of Computers and Artificial Intelligence Benha University Egypt Faculty of Computers and Engineering New Mansoura University Egypt Cairo Egypt Center of Informatics Science Faculty of Information Technology and Computer Science Nile University Cairo Egypt
The open Source Software (OSS) became the backbone of the most heavily used technologies, including operating systems, cloud computing, AI, Blockchain, Bigdata Systems, IoT, and many more. Although the OSS individual ... 详细信息
来源: 评论
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4615-4630页
作者: Erssa Arif Syed Khuram Shahzad Muhammad Waseem Iqbal Muhammad Arfan Jaffar Abdullah S.Alshahrani Ahmed Alghamdi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Faculty of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword... 详细信息
来源: 评论
Methodology for Identification of the Optimal Structure of Hybrid AC-DC Microgrids and Micro Energy Hubs
Methodology for Identification of the Optimal Structure of H...
收藏 引用
International Universities Power engineering Conference (UPEC)
作者: Chrysanthos Charalambous Alexis Polycarpou Venizelos Efthymiou George E. Georghiou FOSS Research Centre for Sustainable Energy University of Cyprus Nicosia Cyprus Department of Electrical Computer Engineering and Informatics Frederick University Nicosia Cyprus
With the increasing availability of DC consumer appliances as well as the increasing penetration of direct current (DC) Distributed Energy Resources (DERs) such as photovoltaics (PV) and Energy Storage Systems (ESS), ...
来源: 评论
Exploring Music Similarity through Siamese CNNs using Triplet Loss on Music Samples
Exploring Music Similarity through Siamese CNNs using Triple...
收藏 引用
2023 International Research Conference on Smart Computing and Systems engineering, SCSE 2023
作者: Kasif, Gibran Thondilege, Comganesha University of Westminster London School of Computer Science and Engineering United Kingdom Informatics Institute of Technology Department of Computing Colombo06 Sri Lanka
In the rapidly evolving digital music landscape, identifying similarities between musical pieces is essential to help musicians avoid unintended copyright infringement and maintain the originality of their work. Howev... 详细信息
来源: 评论
Auto-Handover Gateway LoRaWAN based on Autonomous Vehicles  10
Auto-Handover Gateway LoRaWAN based on Autonomous Vehicles
收藏 引用
10th IEEE Information technology International Seminar, ITIS 2024
作者: Purnama, Iwan Pane, Rahmadani Sooai, Adri Gabriel Edi, Firman Chamid, Ahmad Abdul Adi, Puput Dani Prasetyo Universitas Labuhanbatu Faculty of Science and Technology Department of Information Technology Labuhanbatu Indonesia Universitas Katolik Widya Mandira Faculty of Computer Science Department of Computer Engineering NTT Kupang Indonesia Batam Institute of Technology Faculty of Industrial Technology Department of Engineering Management Batam City Indonesia Muria Kudus University Department of Informatics Engineering Kudus Indonesia Department of Telecommunication Bandung Indonesia
This article presents a simulation study on the use of LoRaWAN technology in autonomous vehicles. The research focuses on developing an Auto-Handover Gateway for Autonomous Vehicles, utilizing LoRaWAN parameters such ... 详细信息
来源: 评论
Modeling heterogeneous behaviors with different strategies in a terrorist attack
收藏 引用
Virtual Reality & Intelligent Hardware 2023年 第4期5卷 351-365页
作者: Le BI Tingting LIU Zhen LIU Jason TEO Yumeng ZHAO Yanjie CHAI Faculty of Electrical Engineering and Computer Science Ningbo UniversityNingbo 315211China College of Science&Technology Ningbo UniversityCixi 315300China Faculty of Computing&Informatics Universiti Malaysia SabahKota Kinabalu 88000Malaysia
Existing simulations of terrorist attacks do not consider individual *** overcome this lim-itation,we propose a framework to model heterogeneous behavior of individuals during terrorist *** constructed an emotional mo... 详细信息
来源: 评论
Accidental Face Recognition and Detection Using Machine Learning  1
Accidental Face Recognition and Detection Using Machine Lear...
收藏 引用
1st International Conference in Advanced Innovation on Smart City, ICAISC 2023
作者: Sharma, Ashish Agrawal, Piyansh Krishan Sharma, Bhisham Dhaou, Imed Ben GLA University Department of Computer Engineering & Applications UP Mathura India Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Dar Al-Hekma University Hekma School of Engineering Computing and Informatics Department of Computer Science Jeddah Saudi Arabia
The data collected from all the States and Union Territories has been compiled in the Publication, according to the ministry of road transport and roads transport research wing. The total number of accident-related de... 详细信息
来源: 评论