咨询与建议

限定检索结果

文献类型

  • 1,019 篇 期刊文献
  • 931 篇 会议
  • 21 册 图书

馆藏范围

  • 1,971 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,136 篇 工学
    • 812 篇 计算机科学与技术...
    • 657 篇 软件工程
    • 249 篇 信息与通信工程
    • 164 篇 电气工程
    • 162 篇 生物工程
    • 157 篇 控制科学与工程
    • 129 篇 生物医学工程(可授...
    • 109 篇 光学工程
    • 82 篇 电子科学与技术(可...
    • 67 篇 机械工程
    • 65 篇 仪器科学与技术
    • 65 篇 网络空间安全
    • 53 篇 动力工程及工程热...
    • 52 篇 化学工程与技术
    • 49 篇 安全科学与工程
  • 732 篇 理学
    • 339 篇 数学
    • 221 篇 物理学
    • 193 篇 生物学
    • 124 篇 统计学(可授理学、...
    • 86 篇 化学
    • 53 篇 系统科学
  • 358 篇 管理学
    • 210 篇 管理科学与工程(可...
    • 157 篇 图书情报与档案管...
    • 113 篇 工商管理
  • 169 篇 医学
    • 129 篇 临床医学
    • 99 篇 基础医学(可授医学...
    • 74 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 67 篇 法学
    • 56 篇 社会学
  • 49 篇 经济学
    • 49 篇 应用经济学
  • 40 篇 农学
  • 22 篇 教育学
  • 8 篇 文学
  • 3 篇 军事学
  • 1 篇 艺术学

主题

  • 78 篇 machine learning
  • 77 篇 accuracy
  • 76 篇 feature extracti...
  • 70 篇 deep learning
  • 69 篇 training
  • 41 篇 semantics
  • 40 篇 convolutional ne...
  • 39 篇 artificial intel...
  • 39 篇 data models
  • 37 篇 data mining
  • 37 篇 computational mo...
  • 37 篇 predictive model...
  • 33 篇 optimization
  • 30 篇 visualization
  • 27 篇 federated learni...
  • 26 篇 security
  • 24 篇 real-time system...
  • 24 篇 forecasting
  • 23 篇 support vector m...
  • 23 篇 measurement

机构

  • 60 篇 shandong provinc...
  • 47 篇 maharishi school...
  • 47 篇 key laboratory o...
  • 46 篇 shandong enginee...
  • 43 篇 centre of interd...
  • 31 篇 department of ar...
  • 30 篇 faculty of data ...
  • 28 篇 vishwakarma inst...
  • 28 篇 faculty of infor...
  • 25 篇 graduate school ...
  • 18 篇 faculty of infor...
  • 18 篇 university of ch...
  • 18 篇 city university ...
  • 17 篇 department of co...
  • 16 篇 faculty of data ...
  • 14 篇 department of da...
  • 14 篇 education and re...
  • 13 篇 fraunhofer insti...
  • 13 篇 hokkaido univers...
  • 13 篇 department of el...

作者

  • 29 篇 wang hao
  • 25 篇 haseyama miki
  • 23 篇 togo ren
  • 23 篇 ogawa takahiro
  • 20 篇 zhou xiaokang
  • 20 篇 takahiro ogawa
  • 19 篇 miki haseyama
  • 18 篇 ren togo
  • 16 篇 raed alazaidah
  • 14 篇 mustakim
  • 14 篇 merhof dorit
  • 14 篇 azad reza
  • 13 篇 li yuan-fang
  • 13 篇 pan shirui
  • 13 篇 alazaidah raed
  • 13 篇 xiaokang zhou
  • 12 篇 maeda keisuke
  • 11 篇 ghassan samara
  • 11 篇 jing zhao
  • 10 篇 wang h.

语言

  • 1,852 篇 英文
  • 113 篇 其他
  • 10 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty Data Science and Information Technology"
1971 条 记 录,以下是21-30 订阅
排序:
Vietnamese Text Summarization Using Transformer Approach  6th
Vietnamese Text Summarization Using Transformer Approach
收藏 引用
6th International Conference on Computational Intelligence in Pattern Recognition, CIPR 2024
作者: Hung, Bui Thanh Tan, Phan Nguyen Trong Long, Tran Ho Phi Data Science Laboratory Faculty of Information Technology Industrial University of Ho Chi Minh city Ho Chi Minh Viet Nam
Text summarization is a crucial aspect of natural language processing, finding widespread applications in various aspects of our lives. Numerous studies have delved into this task, employing diverse approaches ranging... 详细信息
来源: 评论
Evaluating BERT-based language models for detecting misinformation
收藏 引用
Neural Computing and Applications 2025年 1-32页
作者: Anggrainingsih, Rini Hassan, Ghulam Mubashar Datta, Amitava Information Technology and Data Science Faculty Sebelas Maret University Ir Sutami 36A Central Java Surakarta57126 Indonesia Computer Science and Software Engineering The University of Western Australia 35 Stirling Highway PerthWA6009 Australia
Online misinformation poses a significant challenge due to its rapid spread and limited supervision. To address this issue, automated rumour detection techniques are essential for countering the negative impact of fal... 详细信息
来源: 评论
Feature Selection in Socio-Economic Analysis: A Multi-Method Approach for Accurate Predictive Outcomes
收藏 引用
International Journal of Crowd science 2025年 第1期9卷 64-78页
作者: Al-Qerem, Ahmad Ali, Ali Mohd Jebreen, Issam Nabot, Ahmad Rajab, Mohammed Alauthman, Mohammad Aldweesh, Amjad Aburub, Faisal Alangari, Someah Alzgol, Musab Computer Science Department Faculty of Information Technology Zarqa University Zarqa13110 Jordan Communications and Computer Engineering Department Faculty of Engineering Al-Ahliyya Amman University Amman19328 Jordan University Headquarter University of Anbar Ramadi31001 Iraq Department of Information Security University of Petra Amman11196 Jordan College of Computing and Information Technology Shaqra University Shaqra11911 Saudi Arabia Department of Business Intelligence and Data Analytics University of Petra Amman11196 Jordan Computer Information Systems Department Faculty of Information Technology Isra University Amman11622 Jordan
Feature selection is a cornerstone in advancing the accuracy and efficiency of predictive models, particularly in nuanced domains like socio-economic analysis. This study explores nine distinct feature selection metho... 详细信息
来源: 评论
Applying Text Mining to Analyze Human Question Asking in Creativity Research  12th
Applying Text Mining to Analyze Human Question Asking in C...
收藏 引用
12th International Conference on Big data Analytics, BDA 2024
作者: Wròblewska, Anna Korbin, Marceli Kenett, Yoed N. Dan, Daniel Ganzha, Maria Paprzycki, Marcin Faculty of Mathematics and Information Science Warsaw University of Technology Warsaw Poland Faculty of Data and Decision Sciences Technion - Israel Institute of Technology Haifa Israel School of Applied Data Science Modul University Vienna Vienna Austria Systems Research Institute Polish Academy of Sciences Warsaw Poland
Creativity relates to the ability to generate novel, and effective, ideas in the areas of interest. How are such creative ideas generated? One possible mechanism that supports creative ideation, and is gaining increas... 详细信息
来源: 评论
Design of a Smart Home Door Security System with Face Detection and Smart Bell using ESP32-CAM  6
Design of a Smart Home Door Security System with Face Detect...
收藏 引用
6th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Salsabila, Nurhusna Siswanto, Apri Bayuaji, Luhur Informatics Department Faculty of Engineering Universitas Islam Riau Pekanbaru Indonesia Fac. Data Science and Information Technology INTI International University Malaysia
This research introduces the design and implementation of an advanced IoT-based home security system aimed at improving both convenience and safety for homeowners. The system integrates a smart doorbell with a mobile ... 详细信息
来源: 评论
Enhancing Organizational Performance: Synergy of Cyber-Physical Systems, Cloud Services, and Crowdsensing
收藏 引用
International Journal of Crowd science 2025年 第1期9卷 44-55页
作者: Al-Qerem, Ahmad Ali, Ali Mohd Nabot, Ahmad Jebreen, Issam Alauthman, Mohammad Alangari, Someah Aburub, Faisal Aldweesh, Amjad Computer Science Department Faculty of Information Technology Zarqa University Zarqa13110 Jordan Communications and Computer Engineering Department Faculty of Engineering Al-Ahliyya Amman University Amman19328 Jordan Department of Information Security University of Petra Amman11196 Jordan Department of Computer Science College of Science and Humanities Dawadmi Shaqra University Shaqra11911 Saudi Arabia Department of Business Intelligence and Data Analytics University of Petra Amman11196 Jordan College of Computing and Information Technology Shaqra University Shaqra11911 Saudi Arabia
In the contemporary business landscape, software has evolved into a strategic asset crucial for organizations seeking sustainable competitive advantage. The imperative of ensuring software quality becomes evident as l... 详细信息
来源: 评论
Deep learning-based method for detection of copy-move forgery in videos
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8451-8464页
作者: Elbarougy, Reda Abdelfatah, Osama Behery, G.M. El-Badry, Noha M. Department of Artificial Intelligence and Data Science College of Computer Science and Engineering University of Ha’il Ha’il81481 Saudi Arabia Department of Information Technology Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Computer Science Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Mathematics Faculty of Science Damietta University New Damietta Kafr Saad Egypt
Video forgery is one of the most serious problems affecting the credibility and reliability of video content. Therefore, detecting video forgery presents a major challenge for researchers due to the diversity of forge... 详细信息
来源: 评论
GENSIMO - A Generic Framework for Modelling Social Insurance Systems  25th
GENSIMO - A Generic Framework for Modelling Social Insuranc...
收藏 引用
25th International Workshop on Multi-Agent-Based Simulation, MABS 2024
作者: de Haan, Fjalar J. Thompson, Jason School of Computing and Information Systems Faculty of Engineering and Information Technology The University of Melbourne Parkville Australia Melbourne Centre for Data Science The University of Melbourne Parkville Australia Department of Psychiatry Faculty of Medicine Dentistry and Health Sciences The University of Melbourne Parkville Australia
We report on the design, development and prototype testing of gensimo (GENeric Social Insurance MOdeling), a free and open-source software framework for modelling and simulation of social insurance systems. We discuss... 详细信息
来源: 评论
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论
Robust Adversarial Defense Based on Non-Transferability of Attack Across Foundation Models
Robust Adversarial Defense Based on Non-Transferability of A...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Toishi, Koshiro Maeda, Keisuke Togo, Ren Ogawa, Takahiro Haseyama, Miki School of Engineering Hokkaido University Japan Data-Driven Interdisciplinary Research Emergence Department Japan Faculty of Information Science and Technology Hokkaido University Japan
This paper presents a novel adversarial defense method that exploits non-transferability of attack across foundation models. Existing adversarial training methods have insufficient robustness to adversarial examples u... 详细信息
来源: 评论