咨询与建议

限定检索结果

文献类型

  • 1,070 篇 会议
  • 689 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,771 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,048 篇 工学
    • 814 篇 计算机科学与技术...
    • 679 篇 软件工程
    • 204 篇 信息与通信工程
    • 157 篇 控制科学与工程
    • 93 篇 生物工程
    • 80 篇 机械工程
    • 77 篇 生物医学工程(可授...
    • 74 篇 电子科学与技术(可...
    • 66 篇 电气工程
    • 53 篇 光学工程
    • 52 篇 仪器科学与技术
    • 45 篇 建筑学
    • 44 篇 安全科学与工程
    • 41 篇 化学工程与技术
    • 37 篇 土木工程
    • 36 篇 网络空间安全
  • 517 篇 理学
    • 205 篇 数学
    • 177 篇 物理学
    • 110 篇 生物学
    • 78 篇 统计学(可授理学、...
    • 59 篇 系统科学
    • 46 篇 化学
  • 405 篇 管理学
    • 270 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 128 篇 工商管理
  • 113 篇 医学
    • 96 篇 临床医学
    • 65 篇 基础医学(可授医学...
    • 46 篇 公共卫生与预防医...
  • 59 篇 法学
    • 49 篇 社会学
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 34 篇 教育学
  • 29 篇 农学
  • 16 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 69 篇 deep learning
  • 49 篇 machine learning
  • 47 篇 computer science
  • 44 篇 information syst...
  • 40 篇 data mining
  • 36 篇 feature extracti...
  • 32 篇 multimedia syste...
  • 28 篇 information tech...
  • 26 篇 internet of thin...
  • 24 篇 neural networks
  • 24 篇 computational mo...
  • 23 篇 security
  • 23 篇 artificial intel...
  • 22 篇 application soft...
  • 22 篇 testing
  • 22 篇 accuracy
  • 21 篇 support vector m...
  • 20 篇 decision making
  • 20 篇 humans
  • 18 篇 authentication

机构

  • 38 篇 department of co...
  • 23 篇 distributed mult...
  • 22 篇 department of el...
  • 22 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 department of el...
  • 17 篇 distributed mult...
  • 17 篇 department of in...
  • 16 篇 department of co...
  • 12 篇 department of co...
  • 12 篇 department of in...
  • 12 篇 department of co...
  • 12 篇 faculty of commu...
  • 10 篇 department of ap...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 department of sy...
  • 8 篇 computer science...
  • 8 篇 applied science ...

作者

  • 25 篇 abdelwahed motwa...
  • 25 篇 shu-ching chen
  • 24 篇 mei-ling shyu
  • 20 篇 mesfer al duhayy...
  • 19 篇 chen shu-ching
  • 18 篇 shyu mei-ling
  • 18 篇 manar ahmed hamz...
  • 17 篇 ishfaq yaseen
  • 16 篇 mohamed k.nour
  • 13 篇 abu sarwar zaman...
  • 13 篇 pinandito aryo
  • 13 篇 abdullah rusli
  • 12 篇 saud s.alotaibi
  • 11 篇 shahaboddin sham...
  • 10 篇 radwa marzouk
  • 10 篇 shamshirband sha...
  • 10 篇 anwer mustafa hi...
  • 10 篇 hala j.alshahran...
  • 10 篇 ahmedy ismail
  • 10 篇 rusli abdullah

语言

  • 1,705 篇 英文
  • 59 篇 其他
  • 9 篇 中文
检索条件"机构=Department of Computer Graphics and Multimedia Faculty of Computer Science and Information System"
1771 条 记 录,以下是421-430 订阅
排序:
Brain Tumor Auto-Segmentation on Multimodal Imaging Modalities Using Deep Neural Network
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4509-4523页
作者: Elias Hossain Md.Shazzad Hossain Md.Selim Hossain Sabila Al Jannat Moontahina Huda Sameer Alsharif Osama S.Faragallah Mahmoud M.A.Eid Ahmed Nabih Zaki Rashed Department of Software Engineering Daffodil International UniversityDhaka 1207Bangladesh Department of Computing and Information System Daffodil International UniversityDhaka 1207Bangladesh Department of Computer Science&Engineering BRAC UniversityDhaka 1212Bangladesh Department of Information and Communication Engineering Bangladesh University of Professionals(BUP)Dhaka 1216Bangladesh Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia Department of Electrical Engineering College of EngineeringTaif UniversityP.O.Box 11099Taif 21944Saudi Arabia Electronics and Electrical Communications Engineering Department Faculty of Electronic EngineeringMenouf 32951Egypt
Due to the difficulties of brain tumor segmentation, this paper proposes a strategy for extracting brain tumors from three-dimensional MagneticResonance Image (MRI) and Computed Tomography (CT) scans utilizing3D U-Net... 详细信息
来源: 评论
PipeEdge: A Trusted Pipelining Collaborative Edge Training based on Blockchain  23
PipeEdge: A Trusted Pipelining Collaborative Edge Training b...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Yuan, Liang He, Qiang Chen, Feifei Dou, Ruihan Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia Faculty of Mathematics University of Waterloo Canada National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Powered by the massive data generated by the blossom of mobile and Web-of-Things (WoT) devices, Deep Neural Networks (DNNs) have developed both in accuracy and size in recent years. Conventional cloud-based DNN traini... 详细信息
来源: 评论
XoT (Xducation of Things): Harnessing AI and edge computing to educate all things
收藏 引用
IEEE Access 2024年
作者: Nurtantyana, Rio Hwang, Wu-Yuin Hariyanti, Uun Research Center for Data and Information Sciences Bandung Indonesia Telkom University School of Computing Indonesia Telkom University Center of Excellence Artificial Intelligence for Learning and Optimization Bandung Indonesia National Dong Hwa University College of Science and Engineering Department of Computer Science and Information Engineering Taiwan National Central University Graduate Institute of Network Learning Technology Taiwan Universitas Brawijaya Faculty of Computer Science Department of Information System Indonesia
Most English foreign language (EFL) studies focus solely on human beings. This research explores how edge computing can facilitate learning for all things. The XoT (Xducation of Things) framework was proposed to educa... 详细信息
来源: 评论
Feature Selection based on Particle Swarm Optimization Algorithm for Sentiment Analysis Classification
Feature Selection based on Particle Swarm Optimization Algor...
收藏 引用
2021 International Conference on Intelligent Technology, system and Service for Internet of Everything, ITSS-IoE 2021
作者: Nurcahyawati, Vivine Mustaffa, Zuriani Universitas Dinamika Faculty Technology And Informatics Department Of Information System Surabaya Indonesia Universiti Malaysia Pahang Faculty Computing Department Of Computer Science Pahang Malaysia
Online media serve as a potential secondary data source for studies on sentiment analysis. The current conditions of the data sources are very different, and it offers a variety of writing systems. Therefore, the resu... 详细信息
来源: 评论
Deep Learning Algorithm for Room Temperature Detection Using Bioelectric Potential of Plant Data
SSRN
收藏 引用
SSRN 2024年
作者: Tahyudin, Imam Rozaq, Hasri Akbar Awal Nambo, Hidetaka Department of Information System Faculty of Computer Science Amikom Purwokerto University Jl. Letjendpol Soemarto Banyumas Purwanegara 53127 Indonesia Graduate School of Informatics Faculty of Computer Science Gazi Üniversitesi Ankara Yenimahalle Turkey Graduate School of NST Division of Electrical Engineering and Computer Science Kanazawa University Kakumamachi Ishikawa Kanazawa920-1192 Japan
Plants are living things that have many secrets in them. One that is very interesting is how plants can communicate with the surrounding environment through the activities of the plants themselves. Then, from this com... 详细信息
来源: 评论
The Effect of Data Augmentation on the Accuracy of Fish Species Classification Using Deep Learning
The Effect of Data Augmentation on the Accuracy of Fish Spec...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Ellya Helmud Catur Edi Widodo Oky Dwi Nurhayati Doctor Information System Postgraduate Diponegoro University Semarang Indonesia Faculty of Information Technology Information Systems Study Program Atma Luhur Institute of Science and Business Pangkalpinang Indonesia Physics Department Faculty of Science and Mathematics Diponegoro University Semarang Indonesia Department of Computer Engineering Faculty of Engineering Diponegoro University Semarang Indonesia
Fish image classification presents an intriguing challenge in the field of computer vision. This research aims to develop an accurate classification model to differentiate between four different fish species using a c... 详细信息
来源: 评论
Discounted Iterative Adaptive Critic Designs With Novel Stability Analysis for Tracking Control
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第7期9卷 1262-1272页
作者: Mingming Ha Ding Wang Derong Liu School of Automation and Electrical Engineering University of Science and Technology BeijingBeijing 100083China Faculty of Information Technology the Beijing Key Laboratory of Computational Intelligence and Intelligent Systemthe Beijing Laboratory of Smart Environmental Protectionand the Beijing Institute of Artificial IntelligenceBeijing University of TechnologyBeijing 100124China Department of Electrical and Computer Engineering University of Illinois at ChicagoChicago IL 60607 USA IEEE
The core task of tracking control is to make the controlled plant track a desired *** traditional performance index used in previous studies cannot eliminate completely the tracking error as the number of time steps *... 详细信息
来源: 评论
A reliable neural network framework for the Zika system based reservoirs and human movement
收藏 引用
Knowledge-Based systems 2024年 292卷
作者: Sabir, Zulqurnain Khan, Sundas Naqeeb Raja, Muhammad Asif Zahoor Babatin, M.M. Hashem, Atef F. Abdelkawy, M.A. Department of Computer Science and Mathematics Lebanese American University Beirut Lebanon Department of Graphics Computer Vision and Digital Systems Silesian University of Technology Gliwice Poland Future Technology Research Center National Yunlin University of Science and Technology 123 University Road Section 3 Yunlin Douliou64002 Taiwan Riyadh11566 Saudi Arabia Department of Mathematics and Information Science Faculty of Science Beni-Suef University Egypt
The motive of current investigations provides the numerical solutions of the neuro computing solver based on the Levenberg-Marquardt backpropagation neural network approach (LMB) to solve the Zika virus system of rese... 详细信息
来源: 评论
Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure  1st
Transient Session Key Derivation Protocol for Key Escrow Pre...
收藏 引用
1st EAI International Conference on Internet of Everything, IoECon 2022
作者: Nyangaresi, Vincent Omollo Abduljabbar, Zaid Ameen Maolood, Ismail Yaqub Sibahee, Mustafa A. Al Ma, Junchao Aldarwish, Abdulla J. Y. Faculty of Biological and Physical Sciences Tom Mboya University Homabay40300 Kenya Department of Computer Science College of Education for Pure Sciences University of Basrah Basrah61004 Iraq Shenzhen Institute Huazhong University of Science and Technology Shenzhen518118 China – System Information Ministry of Higher Education and Scientific Research Erbil Iraq College of Big Data and Internet Shenzhen Technology University Shenzhen518118 China Computer Technology Engineering Department Iraq University College Basrah Iraq
The Internet of Things (IoT) devices have been deployed to realize smart environments such as smart cities, smart homes, smart health and smart grids. In these domains, the IoT devices collect and forward high volumes... 详细信息
来源: 评论
Deep Learning for Cyber Security: Deephoax Detection  2
Deep Learning for Cyber Security: Deephoax Detection
收藏 引用
2nd International Conference on Advanced Innovations in Smart Cities, ICAISC 2025
作者: Yakub, Sy. Yuliani Wowor, Rivo Juicer Agustriawan, David Irmawati Kristiyanti, Dinar Ajeng Winarno, P.M. Hassan, Rosilah Mohamad, Roshayu Razzaq, Randy Zahran Universitas Multimedia Nusantara Department of Informatics Tangerang Indonesia Information System Study Program Universitas Multimedia Nusantara Tangerang Indonesia Universiti Kebangsaan Malaysia Selangor Malaysia College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia Uin Sultan Maulana Hasanuddin Department of Informatics Banten Indonesia
The increasing prevalence of deep hoaxes, such as fake news and phishing schemes, poses a significant threat to cybersecurity, undermining trust and spreading misinformation. In Indonesia, surveys indicate that more t... 详细信息
来源: 评论