咨询与建议

限定检索结果

文献类型

  • 8,579 篇 会议
  • 5,852 篇 期刊文献
  • 231 册 图书

馆藏范围

  • 14,662 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,686 篇 工学
    • 6,103 篇 计算机科学与技术...
    • 4,939 篇 软件工程
    • 2,199 篇 信息与通信工程
    • 1,413 篇 控制科学与工程
    • 1,150 篇 电气工程
    • 1,121 篇 生物工程
    • 1,060 篇 电子科学与技术(可...
    • 874 篇 生物医学工程(可授...
    • 736 篇 机械工程
    • 624 篇 光学工程
    • 556 篇 仪器科学与技术
    • 449 篇 动力工程及工程热...
    • 421 篇 化学工程与技术
    • 385 篇 网络空间安全
    • 332 篇 安全科学与工程
    • 297 篇 交通运输工程
  • 5,086 篇 理学
    • 2,414 篇 数学
    • 1,768 篇 物理学
    • 1,251 篇 生物学
    • 802 篇 统计学(可授理学、...
    • 565 篇 系统科学
    • 474 篇 化学
  • 2,547 篇 管理学
    • 1,575 篇 管理科学与工程(可...
    • 1,046 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 936 篇 医学
    • 789 篇 临床医学
    • 674 篇 基础医学(可授医学...
    • 411 篇 药学(可授医学、理...
    • 380 篇 公共卫生与预防医...
  • 400 篇 法学
    • 326 篇 社会学
  • 282 篇 经济学
  • 214 篇 农学
  • 200 篇 教育学
  • 64 篇 文学
  • 38 篇 军事学
  • 34 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 444 篇 deep learning
  • 285 篇 machine learning
  • 260 篇 feature extracti...
  • 241 篇 accuracy
  • 234 篇 computational mo...
  • 215 篇 information tech...
  • 214 篇 internet of thin...
  • 207 篇 optimization
  • 187 篇 support vector m...
  • 181 篇 computer science
  • 181 篇 artificial intel...
  • 174 篇 predictive model...
  • 169 篇 data mining
  • 146 篇 training
  • 134 篇 neural networks
  • 123 篇 covid-19
  • 122 篇 real-time system...
  • 116 篇 computational in...
  • 110 篇 image segmentati...
  • 110 篇 wireless communi...

机构

  • 287 篇 faculty of scien...
  • 287 篇 department for p...
  • 286 篇 department of ph...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 273 篇 kirchhoff-instit...
  • 266 篇 department of ph...
  • 265 篇 department of ph...
  • 260 篇 faculté des scie...
  • 243 篇 institute of phy...
  • 242 篇 fakultät für phy...
  • 231 篇 yerevan physics ...
  • 228 篇 institut für ast...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 212 篇 department of ph...
  • 210 篇 department of ph...
  • 197 篇 department of ph...
  • 197 篇 institute of phy...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 253 篇 s. guindon
  • 251 篇 d. guest

语言

  • 14,076 篇 英文
  • 481 篇 其他
  • 96 篇 中文
  • 23 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Faculty of Computer Engineering and Information Technology"
14662 条 记 录,以下是91-100 订阅
A Parallel Color Image Encryption Algorithm Based on a 2D Logistic-Rulkov Neuron Map
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 18115-18124页
作者: Gao, Suo Zhang, Zheyi Ho-Ching Iu, Herbert Ding, Siqi Mou, Jun Erkan, Uğur Toktas, Abdurrahim Li, Qi Wang, Chunpeng Cao, Yinghong The School of Information Science and Engineering Dalian Polytechnic University Dalian116034 China School of Electrical Electronic and Computer Engineering The University of Western Australia Perth6009 Australia School of Mathematical Sciences Dalian University of Technology Dalian116024 China Department of Computer Engineering Faculty of Engineering Karamanoglu Mehmetbey University Karaman70200 Turkey Department of Artificial Intelligence and Data Engineering Engineering Faculty Ankara University Ankara06830 Turkey Jinan250000 China
Images are widely used in social networks, necessitating efficient and secure transmission, especially in bandwidth-constrained environments. This paper aims to develop a color image encryption algorithm that enhances... 详细信息
来源: 评论
Leveraging ChatGPT for enhanced stock selection and portfolio optimization
收藏 引用
Neural Computing and Applications 2025年 第8期37卷 6163-6179页
作者: Huang, Zhendai Liao, Bolin Hua, Cheng Cao, Xinwei Li, Shuai College of Computer Science and Engineering Jishou University Jishou416000 China School of Business Jiangnan University Wuxi214122 China Faculty of Information Technology and Electrical Engineering University of Oulu Oulu90570 Finland VTT-Technology Research Center of Finland Kaitovayla 1 Oulu90570 Finland
The public release of ChatGPT represents a significant milestone in generative AI technology, enabling the autonomous generation of content based on pre-training. This breakthrough presents new opportunities for advan... 详细信息
来源: 评论
A decentralized and privacy-preserving framework for electronic health records using blockchain
收藏 引用
Alexandria engineering Journal 2025年 126卷 196-203页
作者: Alahmari, Saad Alshardan, Amal Al-Wesabi, Fahd N. Sorour, Shaymaa Alghushairy, Omar Alsini, Raed Khadidos, Alaa O. Duhayyim, Mesfer Al Department of Computer Science Applied College Northern Border University Arar Saudi Arabia Department of Information Systems College of Computer and Information Sciences Princess Nourah bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia Department of Computer Science Applied College at Mahayil King Khalid University Saudi Arabia Department of Management Information Systems College of Business Administration King Faisal University Al-Ahsa31982 Saudi Arabia Department of Information Systems and Technology College of Computer Science and Engineering University of Jeddah Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah Saudi Arabia Department of Computer Science College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University Al-Kharj16273 Saudi Arabia
As healthcare services have become increasingly digitized, Electronic Health Records (EHRs) have become widely adopted, providing seamless data exchange among providers. Conventional EHRs, however, are extremely vulne... 详细信息
来源: 评论
Current and Voltage Calculations of the 400 kV Transmission Line Using Laboratory Measurements and computer Simulation  33rd
Current and Voltage Calculations of the 400 kV Transmission...
收藏 引用
33rd International Conference on Organization and technology of Maintenance, OTO 2024
作者: Torma, Matej Fekete, Krešimir Kljajić, Ružica Čvek, Kristijan Faculty of Electrical Engineering Computer Science and Information Technology Osijek University of Osijek Kneza Trpimira 2b Osijek31000 Croatia
In this paper, the current, voltages, as well as active and reactive power of the 400 kV transmission line are calculated using three different methods. The objective of the paper is to demonstrate and compare th... 详细信息
来源: 评论
Face image authentication scheme based on MTCNN and SLT
收藏 引用
Multimedia Tools and Applications 2025年 1-43页
作者: Thabit, Rasha Al-Askari, Mohanad A. Mohammed, Dunya Zeki Anaam, Elham Abdulwahab Mahmood, Zainab H. Jabbar, Dina Jamal Salih, Zahraa Aqeel Information System Department College of Computer Sciences and Information Technology University of Al-Anbar Al-Anbar Iraq Computer Engineering Department College of Engineering Al-Iraqia University Baghdad Iraq Electronic and Communications Engineering Department College of Engineering Gilgamesh University Baghdad Iraq Faculty of Computing and Informatics Multimedia University Selangor Cyberjaya Malaysia Department of Cybersecurity Engineering College of Information Engineering Al-Nahrain University Baghdad Iraq Electrical Engineering Technical Collage Middle Technical University Baghdad Iraq Department of Business Administration Alamaal University College Baghdad Iraq
DeepFakes and face image manipulation methods have been widely distributed in the last few years and several techniques have been presented to check the authenticity of the face image and detect manipulation if exists... 详细信息
来源: 评论
An Intelligent Optimization Technique Of Automatic Speech Recognition For Smart Homes  13
An Intelligent Optimization Technique Of Automatic Speech Re...
收藏 引用
13th International Conference on Research in ComputIng at Feminine, RIF 2024
作者: Aly, Rabab Hamed M. Hussein, Aziza I. The Higher Institute for Management and Information Technology Minya Egypt Electrical and Computer Engineering Department College of Engineering Effat University Jeddah Saudi Arabia Computer Science Department Faculty of Computer Science Nahda University Beni Suef Egypt
The creation of new approaches to the design and configuration of smart buildings relies heavily on AI tools and Machine Learning (ML) algorithms, particularly optimization techniques. The widespread use of electronic... 详细信息
来源: 评论
AFuNet: an attention-based fusion network to classify texts in a resource-constrained language
收藏 引用
Neural Computing and Applications 2025年 第9期37卷 6725-6748页
作者: Hossain, Md. Rajib Hoque, Mohammed Moshiul Dewan, M. Ali Akber Hoque, Enamul Siddique, Nazmul Department of Computer Science & Engineering Chittagong University of Engineering & Technology Chittagong4349 Bangladesh School of Computing and Information Systems Faculty of Science and Technology Athabasca University AthabascaABT9S 3A3 Canada School of Information Technology York University TorontoONM3J 1P3 Canada School of Computing Engineering and Intelligent Systems Ulster University Coleraine United Kingdom
In the era of widespread Internet use and extensive social media interaction, the digital realm is accumulating vast amounts of unstructured text data. This unstructured data often contain undesirable information, nec... 详细信息
来源: 评论
Boundary Extraction for Unseen Entities Prediction Using Bidirectional Long Short-Term Memory  17th
Boundary Extraction for Unseen Entities Prediction Using Bid...
收藏 引用
17th International Conference on Multi-disciplinary Trends in Artificial Intelligence, MIWAI 2024
作者: Kuntichod, Watcharet Lee, Wilaiporn Prayote, Akara Department of Computer and Information Science King Mongkut’s University of Technology North Bangkok Bangkok10800 Thailand Department of Electrical and Computer Engineering Faculty of Engineering King Mongkut’s University of Technology North Bangkok Bangkok10800 Thailand
Named Entities Recognition (NER), which is a task to identify and classify named entities within text, has gained significant popularity in recent years. This task often requires pre-labeled data and large datasets to... 详细信息
来源: 评论
Image Contrast Enhancement using Fuzzy Logic with Metaheuristics  24
Image Contrast Enhancement using Fuzzy Logic with Metaheuris...
收藏 引用
11th International Conference on Networking, Systems and Security, NSysS 2024
作者: Kabir, Mohimenul Mobin, Jaiaid Hassanat, Ahmad Sohel Rahman, M. Department of Computer Science Bangladesh University of Engineering and Technology Dhaka Bangladesh Rochester Institute of Technology Rochester United States Faculty of Information Technology Mutah University Karak Mutah Jordan Bangladesh University of Engineering and Technology Dhaka Bangladesh
In this work, we present a method to enhance image contrast using a fuzzy logic-based transformation function. Our goal is to develop an image-specific transformation by tuning the fuzzy system. We employ Hill Climbin... 详细信息
来源: 评论
Deep learning-based method for detection of copy-move forgery in videos
收藏 引用
Neural Computing and Applications 2025年 第14期37卷 8451-8464页
作者: Elbarougy, Reda Abdelfatah, Osama Behery, G.M. El-Badry, Noha M. Department of Artificial Intelligence and Data Science College of Computer Science and Engineering University of Ha’il Ha’il81481 Saudi Arabia Department of Information Technology Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Computer Science Faculty of Computer and Artificial Intelligence Damietta University New Damietta Kafr Saad Egypt Department of Mathematics Faculty of Science Damietta University New Damietta Kafr Saad Egypt
Video forgery is one of the most serious problems affecting the credibility and reliability of video content. Therefore, detecting video forgery presents a major challenge for researchers due to the diversity of forge... 详细信息
来源: 评论