咨询与建议

限定检索结果

文献类型

  • 2,858 篇 会议
  • 2,353 篇 期刊文献
  • 101 册 图书

馆藏范围

  • 5,312 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,050 篇 工学
    • 1,964 篇 计算机科学与技术...
    • 1,623 篇 软件工程
    • 634 篇 信息与通信工程
    • 423 篇 控制科学与工程
    • 393 篇 生物工程
    • 386 篇 生物医学工程(可授...
    • 338 篇 电气工程
    • 288 篇 核科学与技术
    • 285 篇 电子科学与技术(可...
    • 250 篇 光学工程
    • 205 篇 机械工程
    • 157 篇 化学工程与技术
    • 150 篇 仪器科学与技术
    • 125 篇 动力工程及工程热...
    • 110 篇 安全科学与工程
  • 2,222 篇 理学
    • 1,068 篇 物理学
    • 835 篇 数学
    • 452 篇 生物学
    • 275 篇 统计学(可授理学、...
    • 203 篇 系统科学
    • 168 篇 化学
    • 92 篇 天文学
  • 816 篇 管理学
    • 455 篇 管理科学与工程(可...
    • 403 篇 图书情报与档案管...
    • 251 篇 工商管理
  • 364 篇 医学
    • 317 篇 临床医学
    • 274 篇 基础医学(可授医学...
    • 194 篇 药学(可授医学、理...
    • 128 篇 公共卫生与预防医...
  • 119 篇 法学
    • 93 篇 社会学
  • 80 篇 教育学
  • 76 篇 经济学
  • 68 篇 农学
  • 13 篇 文学
  • 11 篇 军事学
  • 5 篇 艺术学

主题

  • 110 篇 machine learning
  • 101 篇 artificial intel...
  • 99 篇 deep learning
  • 94 篇 accuracy
  • 85 篇 informatics
  • 82 篇 computational mo...
  • 82 篇 hadron colliders
  • 79 篇 feature extracti...
  • 76 篇 training
  • 65 篇 support vector m...
  • 57 篇 internet of thin...
  • 57 篇 data models
  • 56 篇 convolutional ne...
  • 55 篇 data mining
  • 54 篇 forecasting
  • 51 篇 predictive model...
  • 49 篇 computer science
  • 47 篇 optimization
  • 46 篇 higgs bosons
  • 44 篇 visualization

机构

  • 416 篇 department for p...
  • 408 篇 faculty of scien...
  • 405 篇 kirchhoff-instit...
  • 403 篇 department of ph...
  • 391 篇 institute of phy...
  • 388 篇 department of ph...
  • 387 篇 department of ph...
  • 375 篇 institute of phy...
  • 369 篇 fakultät für phy...
  • 352 篇 instituto de fís...
  • 312 篇 department of ph...
  • 289 篇 dipartimento di ...
  • 288 篇 graduate school ...
  • 280 篇 department of ph...
  • 279 篇 department of ph...
  • 277 篇 nikhef national ...
  • 272 篇 universidade fed...
  • 268 篇 department of ph...
  • 265 篇 ictp trieste
  • 257 篇 yerevan physics ...

作者

  • 338 篇 c. alexa
  • 335 篇 j. m. izen
  • 334 篇 g. bella
  • 333 篇 d. calvet
  • 333 篇 c. amelung
  • 331 篇 j. strandberg
  • 327 篇 g. spigo
  • 327 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 320 篇 s. mohapatra
  • 312 篇 s. guindon
  • 308 篇 a. kaczmarska
  • 302 篇 y. tayalati
  • 302 篇 j. schaarschmidt
  • 293 篇 a. d. pilkington
  • 291 篇 l. chevalier
  • 286 篇 m. klein

语言

  • 4,748 篇 英文
  • 545 篇 其他
  • 17 篇 中文
  • 6 篇 日文
  • 4 篇 德文
  • 2 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Computer & Informatics Computer Engineering"
5312 条 记 录,以下是81-90 订阅
排序:
Improving bot detection of fake followers on Twitter via a hybrid B-HC optimisation algorithm  5
Improving bot detection of fake followers on Twitter via a h...
收藏 引用
5th IEEE International Conference on Electrical, computer and Communication Technologies, ICECCT 2023
作者: Alzeyadi, Haider Duran, Fecir Informatics Institute Department of Computer Science Gazi University Ankara Turkey Gazi University Engineering Faculty of Technology Department of Computer Engineering Ankara Turkey
Sophisticated cyber threats are seen on Online Social Networks (OSNs) social media accounts automated to imitate human behaviours has an impactful effect on distorting public thoughts and opinions. OSNs are weaponized... 详细信息
来源: 评论
Automating Cyber Defense: Enhancing Threat Intelligence with AI-Driven Annotation  7
Automating Cyber Defense: Enhancing Threat Intelligence with...
收藏 引用
7th International Conference on Signal Processing and Information Security, ICSPIS 2024
作者: Mostafa, Youssef Sayed, Samir G. Zamzam, Marwa Giza Egypt Helwan University Faculty of Engineering in Helwan Cairo Egypt German International University Faculty of Informatics and Computer Science Cairo Egypt
The cybersecurity landscape is increasingly challenged by the growing digital footprint and the sophistication of cyber threats, necessitating experts to stay updated and extract actionable insights from a deluge of C... 详细信息
来源: 评论
Bluffing the Hackers: Automated Decoy Creation and Real-Time Cyber Deception  7
Bluffing the Hackers: Automated Decoy Creation and Real-Time...
收藏 引用
7th International Conference on Signal Processing and Information Security, ICSPIS 2024
作者: Farrag, Mohamed Sayed, Samir G. Zamzam, Marwa German International University Faculty of Informatics and Computer Science Cairo Egypt Giza Egypt Helwan University Faculty of Engineering in Helwan Cairo Egypt
In the digital age, the proliferation of cyber threats necessitates advanced cybersecurity solutions. This paper introduces 'Bluff,' an innovative cybersecurity platform designed to enhance intrusion preventio... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
Improved Quasi-Random Designs with Constant Pool Sizes for Group Testing  18
Improved Quasi-Random Designs with Constant Pool Sizes for G...
收藏 引用
18th International Symposium on Information Theory and Its Applications, ISITA 2024
作者: Hamada, Ryouji Lu, Xiao-Nan Graduate School of Informatics and Engineering The University of Electro-Communications Department of Computer and Network Engineering Chofu-shi Tokyo Japan Gifu University Faculty of Engineering Department of Electrical Electronics and Computer Engineering Gifu-shi Gifu Japan
Group testing is a well-studied approach for identifying defective items among a large amount of items by conducting a relatively small number of tests on pools of items. In this paper, we propose a novel method for g... 详细信息
来源: 评论
Recommending Public Transit Route: Ant-Colony Optimization or Dijkstra?
Recommending Public Transit Route: Ant-Colony Optimization o...
收藏 引用
2023 International Conference on Modeling and E-Information Research, Artificial Learning and Digital Applications, ICMERALDA 2023
作者: Jabbar, Abdul Pinandito, Aryo Universitas Brawijaya Faculty of Computer Science Informatics Engineering Department Malang Indonesia Universitas Brawijaya Faculty of Computer Science Information System Department Malang Indonesia
Advances in algorithmic studies have been made recently, especially in the area of finding the shortest path. Despite taking a greedy approach, the Dijkstra algorithm is well recognized for its efficacy and has establ... 详细信息
来源: 评论
An Effective Hybrid Metaheuristic Algorithm for Solving Global Optimization Algorithms
收藏 引用
Multimedia Tools and Applications 2024年 第37期83卷 85103-85138页
作者: Seyyedabbasi, Amir Tareq Tareq, Wadhah Zeyad Bacanin, Nebojsa Computer Engineering Deptartment Faculty of Engineering and Natural Sciences Istinye University Istanbul Turkey Department of Mathematics Saveetha School of Engineering SIMATS Thandalam Tamilnadu India Faculty of Informatics and Computing Singidunum University Belgrade Serbia MEU Research Unit Middle East University Amman Jordan
Recently, the Honey Badger Algorithm (HBA) was proposed as a metaheuristic algorithm. Honey badger hunting behaviour inspired the development of this algorithm. In the exploitation phase, HBA performs poorly and stagn... 详细信息
来源: 评论
Detection and Counting Bacilli Tuberculosis Images using Classical Image Processing and Deep Learning  24
Detection and Counting Bacilli Tuberculosis Images using Cla...
收藏 引用
2nd International Conference on Communications, Computing and Artificial Intelligence, CCCAI 2024
作者: Yuniarti, Heny Fatichah, Chastine Sigit, Riyanto Department of Informatics Faculty of Intelligent Electrical and Informatics Technology Institut Teknologi Sepuluh Nopember Indonesia Department of Computer Engineering Politeknik Elektronika Negeri Surabaya Indonesia
Tuberculosis (TB) has been known as the top two murdering disease worldwide after HIV/AIDS. Indonesia is the second country with the highest number of tuberculosis. One of the reasons for the high number of cases is t... 详细信息
来源: 评论
Augmenting Internet of Medical Things Security:Deep Ensemble Integration and Methodological Fusion
收藏 引用
computer Modeling in engineering & Sciences 2024年 第12期141卷 2185-2223页
作者: Hamad Naeem Amjad Alsirhani Faeiz MAlserhani Farhan Ullah Ondrej Krejcar Faculty of Informatics and Management Center for Basic and Applied ResearchUniversity of Hradec KraloveHradec Kralove50003Czech Republic Department of Computer Science College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Department of Computer Engineering&Networks College of Computer and Information SciencesJouf UniversityAl Jouf72388Saudi Arabia Cybersecurity Center Prince Mohammad Bin Fahd UniversityAl JawharahKhobarDhahran34754Saudi Arabia
When it comes to smart healthcare business systems,network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network *** protect IoMT devices and networks in healt... 详细信息
来源: 评论
The Impact of Weather Conditions on Renewable Energy Production: A Machine Learning Approach
The Impact of Weather Conditions on Renewable Energy Product...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Özbay, Recep Çelebi, Merve Yavanoǧlu, Uraz Gazi University Graduate School of Informatics Dept. Of Computer Forensics Ankara Turkey Hatay Mustafa Kemal University Faculty of Education Dept. Of Computer Education and Instructional Technologies Hatay Turkey Gazi University Faculty of Engineering Dept. of Computer Engineering Ankara Turkey
In recent decades, obtaining energy from wind, solar, and hydro energy has brought hope for a sustainable future. Machine learning (ML) significantly impacts the field of energy systems. ML techniques have emerged as ... 详细信息
来源: 评论