咨询与建议

限定检索结果

文献类型

  • 1,070 篇 会议
  • 689 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,771 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,048 篇 工学
    • 814 篇 计算机科学与技术...
    • 679 篇 软件工程
    • 204 篇 信息与通信工程
    • 157 篇 控制科学与工程
    • 93 篇 生物工程
    • 80 篇 机械工程
    • 77 篇 生物医学工程(可授...
    • 74 篇 电子科学与技术(可...
    • 66 篇 电气工程
    • 53 篇 光学工程
    • 52 篇 仪器科学与技术
    • 45 篇 建筑学
    • 44 篇 安全科学与工程
    • 41 篇 化学工程与技术
    • 37 篇 土木工程
    • 36 篇 网络空间安全
  • 517 篇 理学
    • 205 篇 数学
    • 177 篇 物理学
    • 110 篇 生物学
    • 78 篇 统计学(可授理学、...
    • 59 篇 系统科学
    • 46 篇 化学
  • 405 篇 管理学
    • 270 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 128 篇 工商管理
  • 113 篇 医学
    • 96 篇 临床医学
    • 65 篇 基础医学(可授医学...
    • 46 篇 公共卫生与预防医...
  • 59 篇 法学
    • 49 篇 社会学
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 34 篇 教育学
  • 29 篇 农学
  • 16 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 69 篇 deep learning
  • 49 篇 machine learning
  • 47 篇 computer science
  • 44 篇 information syst...
  • 40 篇 data mining
  • 36 篇 feature extracti...
  • 32 篇 multimedia syste...
  • 28 篇 information tech...
  • 26 篇 internet of thin...
  • 24 篇 neural networks
  • 24 篇 computational mo...
  • 23 篇 security
  • 23 篇 artificial intel...
  • 22 篇 application soft...
  • 22 篇 testing
  • 22 篇 accuracy
  • 21 篇 support vector m...
  • 20 篇 decision making
  • 20 篇 humans
  • 18 篇 authentication

机构

  • 38 篇 department of co...
  • 23 篇 distributed mult...
  • 22 篇 department of el...
  • 22 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 department of el...
  • 17 篇 distributed mult...
  • 17 篇 department of in...
  • 16 篇 department of co...
  • 12 篇 department of co...
  • 12 篇 department of in...
  • 12 篇 department of co...
  • 12 篇 faculty of commu...
  • 10 篇 department of ap...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 department of sy...
  • 8 篇 computer science...
  • 8 篇 applied science ...

作者

  • 25 篇 abdelwahed motwa...
  • 25 篇 shu-ching chen
  • 24 篇 mei-ling shyu
  • 20 篇 mesfer al duhayy...
  • 19 篇 chen shu-ching
  • 18 篇 shyu mei-ling
  • 18 篇 manar ahmed hamz...
  • 17 篇 ishfaq yaseen
  • 16 篇 mohamed k.nour
  • 13 篇 abu sarwar zaman...
  • 13 篇 pinandito aryo
  • 13 篇 abdullah rusli
  • 12 篇 saud s.alotaibi
  • 11 篇 shahaboddin sham...
  • 10 篇 radwa marzouk
  • 10 篇 shamshirband sha...
  • 10 篇 anwer mustafa hi...
  • 10 篇 hala j.alshahran...
  • 10 篇 ahmedy ismail
  • 10 篇 rusli abdullah

语言

  • 1,705 篇 英文
  • 59 篇 其他
  • 9 篇 中文
检索条件"机构=Department of Computer Graphics and Multimedia Faculty of Computer Science and Information System"
1771 条 记 录,以下是461-470 订阅
排序:
CIPM: Common identification process model for database forensics field  2
CIPM: Common identification process model for database foren...
收藏 引用
2nd International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2021
作者: Alfadli, Ibrahim M Ghabban, Fahad M Ameerbakhsh, Omair Abuali, Amer Nizar Al-Dhaqm, Arafat Al-Khasawneh, Mahmoud Ahmad Taibah University College of Computer Science and Engineering Information System Department Madinah Saudi Arabia University Technology Malaysia Faculty of Engineering School of Computing Johor Malaysia Al-Madinah International University Faculty of Computer and Information Technology Shah Alam Malaysia
Database Forensics (DBF) domain is a branch of digital forensics, concerned with the identification, collection, reconstruction, analysis, and documentation of database crimes. Different researchers have introduced se... 详细信息
来源: 评论
Selection a Suitable Supplier for Enhancing Supply Chain Management under Neutrosophic Environment
收藏 引用
Neutrosophic Sets and systems 2021年 47卷 332-450页
作者: Hosny, Hager El-Henawey, Ibrahim Abo-Elhadid, Samah Business Information System department Faculty of Commerce & Business Administration Helwan University.Cairo Egypt Department of Computer Science Faculty of Computers and Informatics Zagazig University Sharqiyah El-Zera Square Zagazig Egypt Department of Mathematics Insurance and Applied Statistics Faculty of Commerce and Business Administration Helwan University.Cairo Egypt
In supply chain management (SCM), selecting a sustainable supplier has improved as one of the most urgent issues. Several previous research has attempted to determine how to choose a sustainable supplier using various... 详细信息
来源: 评论
FlexiFed: Personalized Federated Learning for Edge Clients with Heterogeneous Model Architectures  23
FlexiFed: Personalized Federated Learning for Edge Clients w...
收藏 引用
2023 World Wide Web Conference, WWW 2023
作者: Wang, Kaibin He, Qiang Chen, Feifei Chen, Chunyang Huang, Faliang Jin, Hai Yang, Yun School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computing Technologies Swinburne University of Technology Australia School of Information Technology Deakin University Australia Faculty of Information Technology Monash University Australia Guangxi Key Lab of Human-machine Interaction and Intelligent Decision Nanning Normal University China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Huazhong University of Science and Technology Wuhan430074 China
Mobile and Web-of-Things (WoT) devices at the network edge account for more than half of the world's web traffic, making a great data source for various machine learning (ML) applications, particularly federated l... 详细信息
来源: 评论
Deep Learning for Cyber Security: Deephoax Detection
Deep Learning for Cyber Security: Deephoax Detection
收藏 引用
Advanced Innovations in Smart Cities (ICAISC), International Conference on
作者: SY. Yuliani Yakub Rivo Juicer Wowor David Agustriawan Irmawati Dinar Ajeng Kristiyanti P.M. Winarno Rosilah Hassan Roshayu Mohamad Randy Zahran Razzaq Department of Informatics Universitas Multimedia Nusantara Tangerang Indonesia Information System Study Program Universitas Multimedia Nusantara Tangerang Indonesia Center for Cyber Security (CYBER) Universiti Kebangsaan Malaysia Selangor Malaysia College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia Department of Informatics UIN Sultan Maulana Hasanuddin Banten Indonesia
The increasing prevalence of deep hoaxes, such as fake news and phishing schemes, poses a significant threat to cybersecurity, undermining trust and spreading misinformation. In Indonesia, surveys indicate that more t... 详细信息
来源: 评论
Best Lecturer Decision Support system Using Method Analytical Hierarchy Process (AHP) and Simple Adaptive Weighting (SAW)  9
Best Lecturer Decision Support System Using Method Analytica...
收藏 引用
9th International Conference on Electrical Engineering, computer science and Informatics, EECSI 2022
作者: Pebrianti, Dwi Nurhayati Bayuaji, Luhur Syafrullah, Mohammad Universitas Budi Luhur Magister of Computer Science Faculty of Information Technology Jakarta Indonesia International Islamic University Malaysia Faculty of Engineering Dept. of Mechanical Aerospace Engineering Gombak Malaysia Universitas Budi Luhur Faculty of Information Technology Department of Information System Jakarta Indonesia
Data processing as one of information technology area has wide range of applications including the selection of best lecturer in universities. Best Lecturer Assessment is required by the university to identify qualifi... 详细信息
来源: 评论
Deep Learning Techniques for Advanced Large-Scale Data Processing
Deep Learning Techniques for Advanced Large-Scale Data Proce...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Mp Sunil Jyoti Shekhawat T. Vanaja Vazeer Ali Mohammed Shailesh J. Thaware Vaishali Singh Department of Electronics and Communication Engineering Faculty of Engineering and Technology JAIN (Deemed-to-be University) Bangalore Karnataka India Department of Computer Science & Application Vivekananda Global University Jaipur India Department of Information Technology Prince Shri Venkateshwara Padmavathy Engineering College Chennai Department of Computer & Information System Lewis University Illinois USA Department of Computer Engineering Vishwakarma Institute of Technology Pune INDIA Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India
Deep getting to know techniques have become increasingly more popular due to their potential to improve huge-scale records processing performance. Leveraging specialized hardware which includes GPUs, deep getting to k... 详细信息
来源: 评论
First Competition on Presentation Attack Detection on ID Card
First Competition on Presentation Attack Detection on ID Car...
收藏 引用
IEEE International Joint Conference on Biometrics (IJCB)
作者: Juan E. Tapia Naser Damer Christoph Busch Juan M. Espin Javier Barrachina Alvaro S. Rocamora Krištof Ocvirk Leon Alessio Borut Batagelj Sushrut Patwardhan Raghavendra Ramachandra Raghavendra Mudgalgundurao Kiran Raja Daniel Schulz Carlos Aravena Hochschule Darmstadt (h_da) da/sec-Biometrics and Internet Security Research Germany Fraunhofer Institute for Computer Graphics Research IGD Darmstadt Germany Department of Computer Science TU Darmstadt Darmstadt Germany Facephi Company Spain Faculty of Computer and Information Science University of Ljubljana Ljubljana Slovenia Norwegian University of Science and Technology (NTNU) Gjøvik Norway ID VisionCenter (IDVC) Santiago Chile
This paper summarises the Competition on Presentation Attack Detection on ID Cards (PAD-IDCard) held at the 2024 International Joint Conference on Biometrics (IJCB 2024). The competition attracted a total of ten regis... 详细信息
来源: 评论
Sensor Infused Emperor Penguin Optimized Deep Maxout Network for Paralyzed Person Monitoring
收藏 引用
IEEE Sensors Journal 2024年
作者: Yang, Jing Hu, Ruoyang Wu, Chenwei Jiang, Gaozhe Alkanhel, Reem Ibrahim Elmannai, Hela Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Boston University Sargent College BostonMA02115 United States Evident Battery Inc MA02138 United States National University of Singapore Singapore Institute of Operations Research and Analytics Singapore119007 Singapore Princess Nourah Bint Abdulrahman University College of Computer and Information Sciences Department of Information Technology P.O. Box 84428 Riyadh11671 Saudi Arabia
Paralyzed people must maintain proper posture to prevent respiratory problems, pressure sores, and muscular contractures. A paralyzed person may slip out of their wheelchair several times as a result of poor sitting p... 详细信息
来源: 评论
Enabling Quadruple-D Compensation Coil Integration for Efficient Power Transfer to Receiver in Wireless Power Transfer systems for EV Charging
收藏 引用
IEEE Journal of Emerging and Selected Topics in Power Electronics 2025年
作者: Erel, Mehmet Zahid Imtiaz, Tabish Elsanabary, Ahmed Mubin, Marizan Soon, Tey Kok Mekhilef, Saad Ankara Yildirim Beyazit University Department of Energy Systems Engineering Ankara Turkey Universiti Malaya Faculty of Engineering Department of Electrical Engineering Kuala Lumpur Malaysia Port Said University Faculty of Engineering Department of Electrical Engineering Port Said Egypt Universiti Malaya Department of Computer System and Technology Faculty of Computer Science and Information Technology Kuala Lumpur Malaysia Swinburne University of Technology School of Science Computing and Engineering Technologies Hawthorn Australia Presidency University Department of Electrical and Electronics Engineering Karnataka Bengaluru India
Wireless power transfer (WPT) presents a promising approach for charging electric vehicles (EVs), offering increased convenience, reliability, and safety for EV customers. Recently, the incorporation of multiple coil ... 详细信息
来源: 评论
SVFormer: A Direct Training Spiking Transformer for Efficient Video Action Recognition  4th
SVFormer: A Direct Training Spiking Transformer for Efficie...
收藏 引用
4th International Workshop on Human Brain and Artificial Intelligence, HBAI 2024
作者: Yu, Liutao Huang, Liwei Zhou, Chenlin Zhang, Han Ma, Zhengyu Zhou, Huihui Tian, Yonghong AI Department Pengcheng Laboratory Shenzhen China National Key Laboratory for Multimedia Information Processing School of Computer Science Peking University Beijing China Faculty of Computing Harbin Institute of Technology Harbin China
Video action recognition (VAR) plays crucial roles in various domains such as surveillance, healthcare, and industrial automation, making it highly significant for the society. Consequently, it has long been a researc... 详细信息
来源: 评论