咨询与建议

限定检索结果

文献类型

  • 51,588 篇 会议
  • 26,186 篇 期刊文献
  • 920 册 图书

馆藏范围

  • 78,694 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 48,349 篇 工学
    • 35,891 篇 计算机科学与技术...
    • 28,477 篇 软件工程
    • 12,578 篇 信息与通信工程
    • 7,684 篇 控制科学与工程
    • 5,492 篇 生物工程
    • 5,345 篇 电气工程
    • 4,808 篇 电子科学与技术(可...
    • 4,167 篇 生物医学工程(可授...
    • 3,298 篇 机械工程
    • 3,172 篇 光学工程
    • 2,335 篇 仪器科学与技术
    • 2,300 篇 网络空间安全
    • 2,225 篇 动力工程及工程热...
    • 2,081 篇 安全科学与工程
    • 2,059 篇 化学工程与技术
    • 1,759 篇 交通运输工程
  • 25,360 篇 理学
    • 13,539 篇 数学
    • 7,073 篇 物理学
    • 6,230 篇 生物学
    • 4,315 篇 统计学(可授理学、...
    • 2,996 篇 系统科学
    • 2,223 篇 化学
  • 14,482 篇 管理学
    • 8,733 篇 管理科学与工程(可...
    • 6,349 篇 图书情报与档案管...
    • 3,996 篇 工商管理
  • 4,428 篇 医学
    • 3,667 篇 临床医学
    • 3,249 篇 基础医学(可授医学...
    • 2,053 篇 公共卫生与预防医...
    • 1,887 篇 药学(可授医学、理...
  • 2,459 篇 法学
    • 1,973 篇 社会学
  • 1,426 篇 经济学
  • 1,134 篇 农学
  • 1,112 篇 教育学
  • 424 篇 文学
  • 204 篇 军事学
  • 160 篇 艺术学
  • 25 篇 哲学
  • 13 篇 历史学

主题

  • 2,742 篇 computer science
  • 1,932 篇 deep learning
  • 1,914 篇 accuracy
  • 1,809 篇 feature extracti...
  • 1,717 篇 machine learning
  • 1,585 篇 computational mo...
  • 1,259 篇 data mining
  • 1,237 篇 training
  • 1,101 篇 information tech...
  • 1,097 篇 internet of thin...
  • 1,059 篇 support vector m...
  • 1,023 篇 artificial intel...
  • 927 篇 predictive model...
  • 900 篇 optimization
  • 830 篇 wireless sensor ...
  • 781 篇 real-time system...
  • 770 篇 educational inst...
  • 729 篇 security
  • 710 篇 protocols
  • 679 篇 cloud computing

机构

  • 960 篇 department of co...
  • 475 篇 maharishi school...
  • 357 篇 department of co...
  • 282 篇 department of co...
  • 278 篇 faculty of scien...
  • 273 篇 department of ph...
  • 263 篇 department of ph...
  • 256 篇 faculté des scie...
  • 248 篇 departamento de ...
  • 220 篇 department of ph...
  • 217 篇 department of ph...
  • 216 篇 physics division...
  • 216 篇 department of ph...
  • 198 篇 department of co...
  • 195 篇 department of ph...
  • 192 篇 department for p...
  • 183 篇 department of ph...
  • 158 篇 department of co...
  • 157 篇 institute of phy...
  • 157 篇 institute of phy...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 265 篇 g. spigo
  • 264 篇 f. siegert
  • 264 篇 a. c. könig
  • 263 篇 m. klein
  • 262 篇 r. ströhmer
  • 259 篇 h. a. gordon
  • 257 篇 h. sakamoto
  • 254 篇 m. rijssenbeek
  • 248 篇 s. jin
  • 242 篇 y. tayalati
  • 240 篇 d. guest
  • 232 篇 g. gaudio
  • 201 篇 n. orlando
  • 201 篇 f. marroquim

语言

  • 70,496 篇 英文
  • 7,310 篇 其他
  • 986 篇 中文
  • 65 篇 日文
  • 44 篇 斯洛文尼亚文
  • 22 篇 德文
  • 17 篇 法文
  • 14 篇 罗马尼亚文
  • 7 篇 俄文
  • 3 篇 朝鲜文
  • 2 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
检索条件"机构=Department of Computer ScienceFaculty of Computer Science and Information Technology"
78694 条 记 录,以下是1-10 订阅
Facial Sentiment Analysis Using Convolutional Neural Network and Fuzzy Systems
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第12期48卷 15-32页
作者: Kadhim, Ahmed R. Khudeyer, Raidah S. Alabbas, Maytham Department of Computer Information System College of Computer Science and Information Technology University of Basrah Basrah Iraq Department of Computer Science College of Computer Science and Information Technology University of Basrah Basrah Iraq
This study provides a detailed study of a Сonvolutional Neural Network (СNN) model optimized for facial eхpression recognition with Fuzzy logic using Fuzzy2DPooling and Fuzzy Neural Networks (FNN), and discusses da... 详细信息
来源: 评论
A Review Of Text Mining Techniques: Trends, and Applications In Various Domains
Iraqi Journal for Computer Science and Mathematics
收藏 引用
Iraqi Journal for computer science and Mathematics 2024年 第1期5卷 125-141页
作者: Aleqabie, Hiba J. Sfoq, Mais Saad Albeer, Rand Abdulwahid Abd, Enaam Hadi Computer Science Department Collage of Computer Science and Information Technology University of Kerbala Karbala Iraq Information Technology Department Collage of Computer Science and Information Technology University of Kerbala. Karbala Iraq
Text mining, a subfield of natural language processing (NLP), has received considerable attention in recent years due to its ability to extract valuable insights from large volumes of unstructured textual data. This r... 详细信息
来源: 评论
Privacy-preserving explainable AI: a survey
收藏 引用
science China(information sciences) 2025年 第1期68卷 23-56页
作者: Thanh Tam NGUYEN Thanh Trung HUYNH Zhao REN Thanh Toan NGUYEN Phi Le NGUYEN Hongzhi YIN Quoc Viet Hung NGUYEN School of Information and Communication Technology Griffith University School of Computer and Communication Sciences Ecole Polytechnique Federale de Lausanne Faculty of Mathematics and Computer Science University of Bremen Faculty of Information Technology HUTECH University Department of Computer Science Hanoi University of Science and Technology School of Electrical Engineering and Computer Science The University of Queensland
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention... 详细信息
来源: 评论
Biometric-Based Secure Encryption Key Generation Using Convolutional Neural Networks and Particle Swarm Optimization
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第16期49卷 213-234页
作者: Almola, Sahera A.S. Khudeyer, Raidah S. Younis, Hameed Abdulkareem Department of Computer Information Systems College of Computer Science and Information Technology University of Basrah Basrah Iraq
With the rapid expansion of computer networks and information technology, ensuring secure data transmission is increasingly vital—especially for image data, which often contains sensitive information. This research p... 详细信息
来源: 评论
Malicious iOS Apps Detection Through Multi-Criteria Decision-Making Approach
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第1期49卷 207-220页
作者: Bhatt, Arpita Jadhav Sardana, Neetu Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Indonesia
In today’s era, smartphones are used in daily lives because they are ubiquitous and can be customized by installing third-party apps. As a result, the menaces because of these apps, which are potentially risky for u... 详细信息
来源: 评论
A Deep Transfer Learning Framework for Robust IoT Attack Detection: A Review
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第12期48卷 55-64页
作者: Mohammad, Hanan Abbas Husien, Idress Mohammed Department of Computer Science College of Computer Science and Information Technology University of Kirkuk Kirkuk Iraq
Our lives have been significantly altered due to the digital revolution, and the Internet of Things (IoT) has played a significant part in this transformation. However, the fast expansion of the IoT into almost every ... 详细信息
来源: 评论
Cloud Computing Security: Assured Deletion
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2024年 第3期48卷 485-496页
作者: Ahmed, Sarmad Mahmood Mahmood, Baban Ahmed Department of Computer Science College of Computer Science and Information Technology Kirkuk University Kirkuk Iraq
With the advent of cloud computing, many organizations, institutions, and individuals have chosen to store their data in the cloud as a way to compensate for limited local storage capabilities and reduce expenses. How... 详细信息
来源: 评论
One model, two skills: active vision and action learning model for robotic manipulation
收藏 引用
science China(information sciences) 2025年 第6期68卷 331-349页
作者: Guokang WANG Yanhong LIU Huaping LIU School of Electrical and Information Engineering Zhengzhou University Department of Computer Science and Technology Tsinghua University
The perception in most existing vision-based reinforcement learning(RL) models for robotic manipulation relies heavily on static third-person or hand-mounted first-person cameras. In scenarios with occlusions and limi... 详细信息
来源: 评论
A Holistic Anti-Counterfeiting Platform Using NFC and Blockchain Technologies
收藏 引用
computers, Materials & Continua 2025年 第6期83卷 4257-4280页
作者: Rajendren Subramaniam Saaidal Razalli Azzuhri Teh Ying Wah Atif Mahmood Vimala Balakrishnan Department of Information System Faculty of Computer Science&Information TechnologyUniversiti MalayaKuala Lumpur50603Malaysia Department of Computer System&Technology Faculty of Computer Science&Information TechnologyUniversiti MalayaKuala Lumpur50603Malaysia Faculty of Data Science and Information Technology INTI International UniversityNilai71800Malaysia
Counterfeiting is still a pervasive global issue,affecting multiple industries and hindering industrial innovation,while causing substantial financial losses,reputational damage,and risks to consumer *** luxury goods ... 详细信息
来源: 评论
Exploration of alzheimer disease using design of experiments
收藏 引用
Multimedia Tools and Applications 2025年 第3期84卷 1079-1101页
作者: Gupta, Pranav Pandey, Kavita Gupta, Sanskar Department of Computer Science & Engineering and Information Technology Jaypee Institute of Information Technology Noida India
This study examines the use of experimental designs, specifically full and fractional factorial designs, for predicting Alzheimer’s disease with fewer variables. The full factorial design systematically investigates ... 详细信息
来源: 评论