咨询与建议

限定检索结果

文献类型

  • 734 篇 期刊文献
  • 524 篇 会议
  • 19 册 图书

馆藏范围

  • 1,277 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 745 篇 工学
    • 445 篇 计算机科学与技术...
    • 359 篇 软件工程
    • 109 篇 信息与通信工程
    • 102 篇 电气工程
    • 96 篇 控制科学与工程
    • 93 篇 电子科学与技术(可...
    • 89 篇 生物医学工程(可授...
    • 82 篇 光学工程
    • 82 篇 生物工程
    • 79 篇 仪器科学与技术
    • 66 篇 化学工程与技术
    • 56 篇 机械工程
    • 53 篇 材料科学与工程(可...
    • 53 篇 航空宇航科学与技...
    • 48 篇 动力工程及工程热...
    • 31 篇 核科学与技术
  • 614 篇 理学
    • 308 篇 物理学
    • 218 篇 数学
    • 114 篇 生物学
    • 98 篇 化学
    • 74 篇 统计学(可授理学、...
    • 72 篇 地球物理学
    • 45 篇 系统科学
  • 185 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 76 篇 图书情报与档案管...
    • 47 篇 工商管理
  • 108 篇 医学
    • 90 篇 临床医学
    • 76 篇 基础医学(可授医学...
    • 42 篇 药学(可授医学、理...
    • 35 篇 公共卫生与预防医...
  • 34 篇 农学
  • 25 篇 法学
  • 18 篇 经济学
  • 11 篇 教育学
  • 3 篇 艺术学
  • 2 篇 哲学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 历史学

主题

  • 59 篇 deep learning
  • 39 篇 machine learning
  • 26 篇 feature extracti...
  • 24 篇 semantics
  • 23 篇 artificial intel...
  • 22 篇 accuracy
  • 19 篇 covid-19
  • 18 篇 neutrons
  • 18 篇 convolutional ne...
  • 16 篇 predictive model...
  • 15 篇 computational mo...
  • 15 篇 forecasting
  • 14 篇 neural networks
  • 13 篇 data models
  • 12 篇 internet of thin...
  • 12 篇 image segmentati...
  • 12 篇 sentiment analys...
  • 12 篇 training
  • 11 篇 gravitational wa...
  • 11 篇 measurement

机构

  • 51 篇 shandong provinc...
  • 50 篇 infn sezione di ...
  • 50 篇 north-west unive...
  • 50 篇 université de st...
  • 49 篇 institut univers...
  • 47 篇 national centre ...
  • 46 篇 shandong enginee...
  • 46 篇 tno technical sc...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 infn sezione di ...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 nikhef national ...
  • 40 篇 università di ca...
  • 40 篇 in2p3 lpc campus...
  • 39 篇 dipartimento di ...
  • 38 篇 department of ph...

作者

  • 51 篇 chen a.
  • 50 篇 ferrara g.
  • 50 篇 ardid m.
  • 50 篇 calvo d.
  • 48 篇 benoit d.m.
  • 48 篇 eddymaoui a.
  • 44 篇 gagliardini s.
  • 41 篇 gal t.
  • 41 篇 bozza c.
  • 41 篇 díaz a.f.
  • 41 篇 boumaaza j.
  • 40 篇 coleiro a.
  • 40 篇 gozzini s.r.
  • 40 篇 dallier r.
  • 40 篇 boettcher m.
  • 40 篇 enzenhöfer a.
  • 40 篇 celli s.
  • 39 篇 benhassi m.
  • 39 篇 dornic d.
  • 38 篇 kulikovskiy v.

语言

  • 1,230 篇 英文
  • 42 篇 其他
  • 3 篇 中文
  • 1 篇 捷克文
  • 1 篇 俄文
检索条件"机构=Faculty of Applied Computing and Technology"
1277 条 记 录,以下是251-260 订阅
排序:
Using Sentiment Analysis to Explore the Accommodation Experience in the Sharing Economy through Topic Modeling
Using Sentiment Analysis to Explore the Accommodation Experi...
收藏 引用
Advancements in computing (ICAC), International Conference on
作者: H.M.A.P. Bandara J. Charles L. S. Lekamge Department of Computing and Information Systems Sabaragamuwa University of Sri Lanka Department of Physical Sciences and Technology Faculty of Applied Sciences
The rapid proliferation of internet-based technology has made the sharing economy the next e-commerce business model. Recently, sharing economy lodging platforms have gained a significant market share in the tourism a... 详细信息
来源: 评论
Mobile commerce and its apps - Opportunities and threats in Malaysia  2
Mobile commerce and its apps - Opportunities and threats in ...
收藏 引用
2nd International Conference on Smart computing and Electronic Enterprise, ICSCEE 2021
作者: Baker El-Ebiary, Yousef A. Aseh, Khairi Bamansoor, Samer Pande, Bishwajeet Abu-Ulbeh, Waheeb Yusoff, M. Hafiz Pathmanathan, P. Ravindran Jusoh, Julaily Aida Al Moaiad, Yazeed UniSZA Faculty of Informatics and Computing Malaysia International Institute of Applied Science Swiss School of Management Netherlands MEDIU Faculty of Computer and Information Technology Malaysia Gyancity Research Consultancy Pvt Ltd Motihari India Faculty of Computer Science and Informatics Cybersecurity Department Jordan Albukhary International University School of Computing and Informatic Kedah Malaysia Faculty of Informatics and Computing UniSZA Malaysia
The purpose of this study is to discuss on opportunities and threats of Foodpanda as an online E-commerce platform including their strength and weaknesses. Electronic Commerce commonly known as E - Commerce means buyi... 详细信息
来源: 评论
Optical Character Recognition using Backpropagation Neural Network for Handwritten Digit Characters  7
Optical Character Recognition using Backpropagation Neural N...
收藏 引用
7th International Conference on Software Engineering and Computer Systems and 4th International Conference on Computational Science and Information Management, ICSECS-ICOCSIM 2021
作者: Yap, Mei Ing Moorthy, Kohbalan Daud, Kauthar Mohd Ernawan, Ferda Universiti Malaysia Pahang Faculty of Computing College of Computing and Applied Sciences Pekan26600 Malaysia Universiti Kebangsaan Malaysia Center for Artificial Intelligence Technology Fakulti Teknologi Dan Sains Maklumat Bangi43600 Malaysia
Recognizing handwritten characters, the accuracy of the optical character recognition is usually not relatively high due to every person having their unique way of writing characters. Therefore, we focus on finding a ... 详细信息
来源: 评论
Automatic recognition of depression based on audio and video:A review
收藏 引用
World Journal of Psychiatry 2024年 第2期14卷 225-233页
作者: Meng-Meng Han Xing-Yun Li Xin-Yu Yi Yun-Shao Zheng Wei-Li Xia Ya-Fei Liu Qing-Xiang Wang Shandong Mental Health Center Shandong UniversityJinan 250014Shandong ProvinceChina Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and TechnologyQilu University of Technology(Shandong Academy of Sciences)Jinan 250353Shandong ProvinceChina Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250353Shandong ProvinceChina Department of Ward Two Shandong Mental Health CenterShandong UniversityJinan 250014Shandong ProvinceChina
Depression is a common mental health *** current depression detection methods,specialized physicians often engage in conversations and physiological examinations based on standardized scales as auxiliary measures for ... 详细信息
来源: 评论
Analysis of Fraudulent Job Postings Using Machine Learning  5
Analysis of Fraudulent Job Postings Using Machine Learning
收藏 引用
5th International Conference on Intelligent computing, Communication, Networking and Services, ICCNS 2024
作者: Salloum, Said Tahat, Khalaf Mansoori, Ahmed Alfaisal, Raghad Tahat, Dina School of Science Engineering and Environment University of Salford Manchester United Kingdom United Arab Emirates University and Yarmouk University Media and Creative Industries Jordan United Arab Emirates University Media and Creative Industries Department United Arab Emirates Universiti Pendidikan Sultan Idris Faculty of Computing and Meta-Technology Tanjung Malim Malaysia Al Ain University Applied Sociology Department United Arab Emirates
In the age of digital recruitment, the proliferation of fraudulent job postings poses significant challenges for job seekers and legitimate employers alike. These deceptive listings not only waste time and resources b... 详细信息
来源: 评论
Ensemble-Based Approach for Efficient Intrusion Detection in Network Traffic
收藏 引用
Intelligent Automation & Soft computing 2023年 第8期37卷 2499-2517页
作者: Ammar Almomani Iman Akour Ahmed M.Manasrah Omar Almomani Mohammad Alauthman Esra’a Abdullah Amaal Al Shwait Razan Al Sharaa School of Computing Skyline University CollegeUniversity City of SharjahP.O.Box 1797SharjahUnited Arab Emirates IT-Department-Al-Huson University College Al-Balqa Applied UniversityP.O.Box 50IrbidJordan Information Systems Department College of Computing&InformaticsUniversity of SharjahUnited Arab Emirates Comp.Info Sciences(CIS)Division Higher Colleges of TechnologySharjahUnited Arab Emirates Computer Sciences Department Yarmouk UniversityIrbidJordan Computer Network and Information Systems Department The World Islamic Sciences and Education UniversityAmman11947Jordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan
The exponential growth of Internet and network usage has neces-sitated heightened security measures to protect against data and network ***,executed through network packets,pose a significant challenge for firewalls t... 详细信息
来源: 评论
Improvement of Swarm Intelligence Algorithm and Its Application in Logistics Network Routing
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2023年 第4期8卷 1077-1094页
作者: Zhang, Xin Wei, Yanqiu Hashim, Zrdplwa School of Business Applied Technology College of Soochow University Kunshan 215325 China Fan Li Business School Shaoxing Vocational Technical College Shaoxing 312000 China Faculty of Engineering Computing Science Swinburne University of Technology Kuching93350 Malaysia
The Vehicle Routing Problem (VRP) is a key aspect of logistics network routing, and an excellent routing optimization strategy can effectively improve the service experience of users and reduce transportation costs. W... 详细信息
来源: 评论
Leveraging K-Means Clustering for Analysis of Arabic Hate Speech Tweets
Leveraging K-Means Clustering for Analysis of Arabic Hate Sp...
收藏 引用
2024 Global Congress on Emerging Technologies, GCET 2024
作者: Salloum, Said Tahat, Khalaf Mansoori, Ahmed Alfaisal, Raghad Tahat, Dina University of Salford School of Science Engineering and Environment Manchester United Kingdom United Arab Emirates University Yarmouk University Media & Creative Industries Jordan United Arab Emirates University Media & Creative Industries Department United Arab Emirates Universiti Pendidikan Sultan Idris Faculty of Computing and Meta-Technology Tanjung Malim Malaysia Al Ain University Applied Sociology Department United Arab Emirates
As hate speech is becoming common on social media platforms, it is important to detect, and curb hate speech in order to provide a better and safe environment online. Given the heavy usage of manual methods of hate sp... 详细信息
来源: 评论
Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment
收藏 引用
Computers, Materials & Continua 2022年 第7期72卷 1323-1338页
作者: Mahmoud Ragab Samah Alshehri Hani A.Alhadrami Faris Kateb Ehab Bahaudien Ashary SAbdel-khalek Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Centre of Artificial Intelligence for Precision Medicines King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Mathematics Faculty of ScienceAl-Azhar UniversityNaser City11884CairoEgypt Department of Pharmacy Practice Faculty of PharmacyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Medical Laboratory Technology Faculty of Applied Medical SciencesKing Abdulaziz UniversityJeddah21589Saudi Arabia Molecular Diagnostic Lab King Abdulaziz University HospitalKing Abdulaziz UniversityJeddah21589Saudi Arabia Special Infectious Agent Unit King Fahd Medical Research CenterKing Abdulaziz UniversityJeddah21589Saudi Arabia Electrical and Computer Engineering Department Faculty of EngineeringKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Mathematics Faculty of ScienceTaif UniversityTaif21944Saudi Arabia Department of Mathematics Faculty of ScienceSohag UniversitySohag82524Egypt
Rapid advancements of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)pose serious security issues by revealing secret ***,security data becomes a crucial issue in IIoT communication where secrec... 详细信息
来源: 评论
Universal Scaling Bounds on a Quantum Heat Current
收藏 引用
Physical Review Letters 2023年 第9期131卷 090401-090401页
作者: Shunsuke Kamimura Kyo Yoshida Yasuhiro Tokura Yuichiro Matsuzaki Faculty of Pure and Applied Sciences University of Tsukuba Tsukuba 305-8571 Japan Research Center for Emerging Computing Technologies National Institute of Advanced Industrial Science and Technology (AIST) 1-1-1 Umezono Tsukuba Ibaraki 305-8568 Japan
In this Letter, we derive new bounds on a heat current flowing into a quantum L-particle system coupled with a Markovian environment. By assuming that a system Hamiltonian and a system-environment interaction Hamilton... 详细信息
来源: 评论