咨询与建议

限定检索结果

文献类型

  • 2,852 篇 会议
  • 2,349 篇 期刊文献
  • 101 册 图书

馆藏范围

  • 5,302 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,928 篇 工学
    • 1,977 篇 计算机科学与技术...
    • 1,631 篇 软件工程
    • 638 篇 信息与通信工程
    • 425 篇 控制科学与工程
    • 395 篇 生物工程
    • 390 篇 生物医学工程(可授...
    • 340 篇 电气工程
    • 287 篇 电子科学与技术(可...
    • 252 篇 光学工程
    • 207 篇 机械工程
    • 157 篇 化学工程与技术
    • 157 篇 核科学与技术
    • 150 篇 仪器科学与技术
    • 124 篇 动力工程及工程热...
    • 111 篇 安全科学与工程
    • 90 篇 建筑学
  • 2,233 篇 理学
    • 1,070 篇 物理学
    • 836 篇 数学
    • 453 篇 生物学
    • 275 篇 统计学(可授理学、...
    • 204 篇 系统科学
    • 167 篇 化学
  • 817 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 404 篇 图书情报与档案管...
    • 253 篇 工商管理
  • 369 篇 医学
    • 323 篇 临床医学
    • 277 篇 基础医学(可授医学...
    • 194 篇 药学(可授医学、理...
    • 130 篇 公共卫生与预防医...
  • 120 篇 法学
    • 94 篇 社会学
  • 80 篇 教育学
  • 76 篇 经济学
  • 70 篇 农学
  • 13 篇 文学
  • 11 篇 军事学
  • 5 篇 艺术学

主题

  • 110 篇 machine learning
  • 101 篇 artificial intel...
  • 99 篇 deep learning
  • 92 篇 accuracy
  • 90 篇 hadron colliders
  • 85 篇 informatics
  • 82 篇 computational mo...
  • 78 篇 feature extracti...
  • 76 篇 training
  • 64 篇 support vector m...
  • 63 篇 higgs bosons
  • 57 篇 data models
  • 57 篇 convolutional ne...
  • 56 篇 internet of thin...
  • 55 篇 data mining
  • 54 篇 forecasting
  • 49 篇 computer science
  • 49 篇 predictive model...
  • 47 篇 proton-proton in...
  • 46 篇 optimization

机构

  • 412 篇 department for p...
  • 404 篇 faculty of scien...
  • 401 篇 kirchhoff-instit...
  • 399 篇 department of ph...
  • 386 篇 department of ph...
  • 385 篇 department of ph...
  • 384 篇 institute of phy...
  • 370 篇 institute of phy...
  • 369 篇 fakultät für phy...
  • 346 篇 instituto de fís...
  • 308 篇 department of ph...
  • 284 篇 graduate school ...
  • 284 篇 dipartimento di ...
  • 280 篇 department of ph...
  • 278 篇 department of ph...
  • 272 篇 nikhef national ...
  • 270 篇 universidade fed...
  • 265 篇 department of ph...
  • 265 篇 ictp trieste
  • 259 篇 yerevan physics ...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 332 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 325 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 318 篇 s. mohapatra
  • 311 篇 s. guindon
  • 306 篇 a. kaczmarska
  • 300 篇 y. tayalati
  • 300 篇 j. schaarschmidt
  • 290 篇 a. d. pilkington
  • 288 篇 l. chevalier
  • 284 篇 m. klein

语言

  • 5,080 篇 英文
  • 204 篇 其他
  • 15 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Computer Engineering and Informatics"
5302 条 记 录,以下是941-950 订阅
排序:
Weapons Detection for Security and Video Surveillance Using CNN and YOLO-V5s
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 2761-2775页
作者: Abdul Hanan Ashraf Muhammad Imran Abdulrahman M.Qahtani Abdulmajeed Alsufyani Omar Almutiry Awais Mahmood Muhammad Attique Mohamed Habib Department of Computer Science Shaheed Zulfikar Ali Bhutto Institute of Science and TechnologyIslamabad44000Pakistan Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia College of Applied Computer Science King Saud University(Almuzahmiyah Campus)Riyadh11543Saudi Arabia Department of Computer Science HITEC UniversityTaxila47080Pakistan College of Computing and Informatics Saudi Electronic UniversityRiyadhSaudi Arabia Faculty of Engineering Port Said UniversityPort Fuad CityEgypt
In recent years,the number of Gun-related incidents has crossed over 250,000 per year and over 85%of the existing 1 billion firearms are in civilian hands,manual monitoring has not proven effective in detecting *** is... 详细信息
来源: 评论
Bluffing the Hackers: Automated Decoy Creation and Real-Time Cyber Deception
Bluffing the Hackers: Automated Decoy Creation and Real-Time...
收藏 引用
International Conference on Signal Processing and Information Security (ICSPIS)
作者: Mohamed Farrag Samir G. Sayed Marwa Zamzam Faculty of Informatics and Computer Science German International University Cairo Egypt EG-CERT National Telecom Regulatory Authority (NTRA) Giza Egypt Faculty of Engineering in Helwan Helwan University Cairo Egypt
In the digital age, the proliferation of cyber threats necessitates advanced cybersecurity solutions. This paper introduces “Bluff,” an innovative cybersecurity platform designed to enhance intrusion prevention thro... 详细信息
来源: 评论
Modelling and Use of Adaptive Control Using Petri Nets  27
Modelling and Use of Adaptive Control Using Petri Nets
收藏 引用
27th International Conference on Knowledge Based and Intelligent Information and engineering Sytems, KES 2023
作者: Balogh, Zoltán Fodor, Kristián Francisti, Jan Drozda, Martin Cavojský, Maroš Department of Computer Science Constantine the Philosopher University in Nitra Nitra949 01 Slovakia Institute of Informatics and Mathematics Slovak University of Technology in Bratislava Bratislava811 07 Slovakia Kándó Kálmán Faculty of Electrical Engineering Óbuda University Budapest Hungary
The issue of modeling holds significant importance for the applicability of control theory, particularly at higher control levels where the verbal description of control objects becomes increasingly crucial. However, ... 详细信息
来源: 评论
Real-Time Driver Sleepiness Detection and Classification Using Fusion Deep Learning Algorithm  5th
Real-Time Driver Sleepiness Detection and Classification Usi...
收藏 引用
5th International Conference on Recent Innovations in Computing, ICRIC 2022
作者: Rajawat, Anand Singh Goyal, S.B. Bhaladhare, Pawan Bedi, Pradeep Verma, Chaman Florin-Emilian, Țurcanu Candin, Mihaltan Traian School of Computer Science and Engineering Sandip University Nashik India Faculty of Information Technology City University Malaysia Petaling Jaya Malaysia Galgotias University Greater Noida India Faculty of Informatics University of Eötvös Loránd Budapest1053 Hungary Department of Building Services Faculty of Civil Engineering and Building Services Gheorghe Asachi Technical University of Iasi Jassy700050 Romania Faculty of Building Services Cluj-Napoca Technical University of Cluj-Napoca Cluj-Napoca400114 Romania
In the past few years, driving while tired has become one of the main causes of car accidents. This kind of dangerous driving can cause serious injuries or even death and huge financial losses. The face, a significant... 详细信息
来源: 评论
The Effect of Digital Marketing on Micro, Small and Medium Enterprise in Indonesia  1
收藏 引用
International Conference on Applied informatics and Media Design, AIMD 2019
作者: Sasongko, Alvin Igo Widjaja, Gregorius Christian Theodore, Jason Afriliana, Nunik Matsuo, Tokuro Gaol, Ford Lumban School of Information System Bina Nusantara University Jakarta Indonesia Faculty of Engineering and Informatics Universitas Multimedia Nusantara Tangerang Indonesia Computer Science Department Bina Nusantara University Jakarta Indonesia Graduate School of Industrial Technology Advanced Institute of Industrial Technology Tokyo Japan
Digital Marketing is a product marketing strategy using digital media and internet networks. Nowadays, digital marketing is a necessity for companies that thrive in the digital world. It greatly affects the growth of ... 详细信息
来源: 评论
Unveiling the Digital Fingerprints: Analysis of Internet attacks based on website fingerprints
arXiv
收藏 引用
arXiv 2024年
作者: Rexha, Blerim Musa, Arbena Vishi, Kamer Martiri, Edlira University of Prishtina Faculty of Electrical and Computer Engineering Kodra e Deillit pn Prishtina1000 Serbia University of Oslo Department of Informatics Oslo Norway University of Tirana Faculty of Economics Tirana Albania
Parallel to our physical activities our virtual presence also leaves behind our unique digital fingerprints, while navigating on the Internet. These digital fingerprints have the potential to unveil users’ activities... 详细信息
来源: 评论
Optimizing Convolutional Neural Network by Hybridized Elephant Herding Optimization Algorithm for Magnetic Resonance Image Classification of Glioma Brain Tumor Grade
Optimizing Convolutional Neural Network by Hybridized Elepha...
收藏 引用
2021 Zooming Innovation in Consumer Technologies Conference, ZINC 2021
作者: Bezdan, Timea Milosevic, Stefan Venkatachalam, K. Zivkovic, Miodrag Bacanin, Nebojsa Strumberger, Ivana Singidunum University Faculty of Informatics and Computing Belgrade Serbia Vit University School of Computer Science and Engineering Bhopal India
Gliomas belong to the group of the most frequent types of brain tumors. For this specific type of brain tumors, in its beginning stages, it is extremely complex to get the exact diagnosis. Even with the works from the... 详细信息
来源: 评论
Deep Learning Based Topic Classification for Sensitivity Assignment to Personal Data  6
Deep Learning Based Topic Classification for Sensitivity Ass...
收藏 引用
6th International Conference on computer Science and engineering, UBMK 2021
作者: Yayık, Apdullah Apik, Hasan Tosun, Ayşe Mobildev R&D Istanbul Turkey Faculty of Computer and Informatics Engineering Istanbul Technical University Istanbul Turkey
This study aims to understand non-linear relations in Turkish textual contents to predict their topic with the help of machine learning models and to discuss contributions of the models to compliance with Personal Dat... 详细信息
来源: 评论
Automated Recognition of Structures in Scanning Electron Microscopy Images Using Specialized Algorithms in MATLAB and Python: An Overview  16
Automated Recognition of Structures in Scanning Electron Mic...
收藏 引用
16th International Conference on Electronics, computers and Artificial Intelligence, ECAI 2024
作者: Marascu, Valentina Mihailescu, Marius Iulian Nita, Stefania Loredana Rogobete, Marius 'Spiru Haret' University Scientific Research Center in Mathematics and Informatics Faculty of Engineering and Computer Science Bucharest Romania National Institute for Laser Plasma and Radiation Physics Low Temperature Plasma Department Bucharest Romania 'Ferdinand i' Military Technical Academy Department of Computers and Cybersecurity Bucharest Romania Telematics Harman International Bucharest Romania
Applied physics serves as the bridge connecting theoretical principles with their practical implementations in everyday situations. informatics plays a crucial role in this subject because of its comprehensive and int... 详细信息
来源: 评论
Evaluation of Three Different Operators for Object Highlighting in Medical RGB Images: Canny, Roberts, and LoG in Independent Color Spaces  25
Evaluation of Three Different Operators for Object Highlight...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Ababneh, Jafar Abu-Jassar, Amer Abuowaida, Suhaila Liubchenko, Valentyn Lyashenko, Vyacheslav Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan University of Business and Technology College of Engineering Jeddah21448 Saudi Arabia Amman Arab University College of of Computer Sciences and Information Amman Jordan Al Al-Bayt University Faculty of Information Technology Department of Computer Science Al-Mafraq Jordan Kharkiv National University of Radio Electronics Department of Informatics Kharkiv Ukraine Kharkiv National University of Radio Electronics Department of Media Systems and Technology Kharkiv Ukraine
The research presents a comparative analysis of the selection of objects of interest in color medical cytology images. For these purposes, the individual edge detection operators studied are Canny, Roberts, and LoG. T... 详细信息
来源: 评论