咨询与建议

限定检索结果

文献类型

  • 8,576 篇 会议
  • 5,838 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 14,420 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,674 篇 工学
    • 6,094 篇 计算机科学与技术...
    • 4,937 篇 软件工程
    • 2,199 篇 信息与通信工程
    • 1,413 篇 控制科学与工程
    • 1,149 篇 电气工程
    • 1,121 篇 生物工程
    • 1,057 篇 电子科学与技术(可...
    • 874 篇 生物医学工程(可授...
    • 736 篇 机械工程
    • 624 篇 光学工程
    • 556 篇 仪器科学与技术
    • 449 篇 动力工程及工程热...
    • 421 篇 化学工程与技术
    • 385 篇 网络空间安全
    • 332 篇 安全科学与工程
    • 297 篇 交通运输工程
  • 5,084 篇 理学
    • 2,413 篇 数学
    • 1,767 篇 物理学
    • 1,251 篇 生物学
    • 802 篇 统计学(可授理学、...
    • 564 篇 系统科学
    • 474 篇 化学
  • 2,547 篇 管理学
    • 1,575 篇 管理科学与工程(可...
    • 1,046 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 936 篇 医学
    • 789 篇 临床医学
    • 674 篇 基础医学(可授医学...
    • 411 篇 药学(可授医学、理...
    • 380 篇 公共卫生与预防医...
  • 400 篇 法学
    • 326 篇 社会学
  • 282 篇 经济学
  • 214 篇 农学
  • 200 篇 教育学
  • 64 篇 文学
  • 38 篇 军事学
  • 34 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 444 篇 deep learning
  • 275 篇 machine learning
  • 264 篇 feature extracti...
  • 244 篇 accuracy
  • 239 篇 computational mo...
  • 215 篇 information tech...
  • 214 篇 internet of thin...
  • 206 篇 optimization
  • 187 篇 support vector m...
  • 181 篇 computer science
  • 178 篇 predictive model...
  • 170 篇 data mining
  • 146 篇 training
  • 134 篇 neural networks
  • 123 篇 covid-19
  • 123 篇 real-time system...
  • 110 篇 image segmentati...
  • 110 篇 wireless communi...
  • 109 篇 quality of servi...
  • 106 篇 security

机构

  • 287 篇 faculty of scien...
  • 287 篇 department for p...
  • 286 篇 department of ph...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 273 篇 kirchhoff-instit...
  • 266 篇 department of ph...
  • 265 篇 department of ph...
  • 260 篇 faculté des scie...
  • 246 篇 institute of phy...
  • 244 篇 fakultät für phy...
  • 232 篇 yerevan physics ...
  • 228 篇 institut für ast...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 212 篇 department of ph...
  • 211 篇 department of ph...
  • 199 篇 institute of phy...
  • 197 篇 department of ph...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 253 篇 s. guindon
  • 251 篇 d. guest

语言

  • 13,834 篇 英文
  • 481 篇 其他
  • 96 篇 中文
  • 23 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Faculty of Computer Engineering and Information Technology"
14420 条 记 录,以下是171-180 订阅
排序:
Automated BPMN Diagram Generation  6
Automated BPMN Diagram Generation
收藏 引用
6th International Conference on Advancements in Computing, ICAC 2024
作者: Ajmal, Farhath Wijekoon, Poorna Dhanamina, Haritha Ravishan, Yasiru Nawinna, Dasuni Attanayaka, Buddhima Sri Lanka Institute of Information Technology Faculty of Computing Department of Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Computing Department of Computer Systems Engineering Malabe Sri Lanka
The automation of business process modelling has become crucial for organizations seeking to improve their operational efficiency. This research presents a novel methodology that leverages fine-tuned GPT models to aut... 详细信息
来源: 评论
Comment Analyzer by Sentimental Analysis through Natural Language Processing  10
Comment Analyzer by Sentimental Analysis through Natural Lan...
收藏 引用
10th International Conference on Communication and Signal Processing, ICCSP 2024
作者: Chinnasamy, P. Ayyasamy, Ramesh Kumar Madhukar, Gadde Karthik, Gaddamidi Bhargav, Tanneru Nayak, Dungavath Yuva Kiran Mlr Institute of Technology Department of Computer Science and Engineering Hyderabad India Faculty of Information and Communication Technology Kampar Malaysia
Comment analyzers were widely employed across industries for sentiment analysis, social media monitoring, and customer feedback evaluation. These tools facilitated insight into public opinions and sentiments expressed... 详细信息
来源: 评论
Machine Learning-Based Methods for Materials Inverse Design: A Review
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1463-1492页
作者: Yingli Liu Yuting Cui Haihe Zhou Sheng Lei Haibin Yuan Tao Shen Jiancheng Yin Faculty of Information Engineering and Automation Kunming University of Science and TechnologyKunming650093China Yunnan Key Laboratory of Computer Technologies Application Kunming University of Science and TechnologyKunming650500China Yunnan Tin Company Limited Tin Industry Branch Gejiu661000China Faculty of Materials Science and Engineering Kunming University of Science and TechnologyKunming650093China
Finding materials with specific properties is a hot topic in materials *** materials design relies on empirical and trial-and-error methods,requiring extensive experiments and time,resulting in high *** the developmen... 详细信息
来源: 评论
Blockchain-Based Trust Model for Inter-Domain Routing
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4821-4839页
作者: Qiong Yang Li Ma Sami Ullah Shanshan Tu Hisham Alasmary Muhammad Waqas Faculty of Information Technology Beijing University of TechnologyBeijing100124China School of Information Science and Technology North China University of TechnologyBeijing100144China Department of Computer Science Shaheed Benazir Bhutto UniversitySheringal18050Pakistan Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia School of Computing andMathematical Sciences Faculty of Engineering and ScienceUniversity of GreenwichLondonSE109LSUK School of Engineering Edith Cowan UniversityPerthWA 6027Australia
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,com... 详细信息
来源: 评论
Urban Electric Vehicle Charging Station Placement Optimization with Graylag Goose Optimization Voting Classifier
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 1163-1177页
作者: Amel Ali Alhussan Doaa Sami Khafaga El-Sayed M.El-kenawy Marwa M.Eid Abdelhameed Ibrahim Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute for Engineering and TechnologyMansoura35511Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt
To reduce the negative effects that conventional modes of transportation have on the environment,researchers are working to increase the use of electric *** demand for environmentally friendly transportation may be ha... 详细信息
来源: 评论
Smart Glove with Mobile Application to Detect Static Arabic Hijaiyah Hand Code for Quran Recitation  21
Smart Glove with Mobile Application to Detect Static Arabic ...
收藏 引用
21st International Learning and technology Conference, L and T 2024
作者: Elshareif, Mohamed Elgilani Eltahir Ahmad Alias, Nurul Aswani Jomhari, Nazean Sofian, Hazrina University of Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur Malaysia
The use of assistive technology in the field of education is now a common practice in today's tech-driven era. The implementation is quite rampant in all levels and sections of education, including by special need... 详细信息
来源: 评论
5G Slice Mutation to Overcome Distributed Denial of Service Attacks Using Reinforcement Learning  17
5G Slice Mutation to Overcome Distributed Denial of Service ...
收藏 引用
17th International Conference on Security of information and Networks, SIN 2024
作者: Javadpour, Amir Ja'fari, Forough Taleb, Tarik Benzaid, Chafika Ictficial Oy Espoo Finland Sharif University of Technology Department of Computer Engineering Iran Ruhr University Bochum Faculty of Electrical Engineering and Information Technology Bochum Germany University of Oulu Faculty of Information Technology and Electrical Engineering Oulu Finland
5G slices are susceptible to indirect Distributed Denial of Service (DDoS) attacks, where overwhelming traffic directed to one slice can also disrupt other slices sharing the same infrastructure Many current mitigatio... 详细信息
来源: 评论
Exploring Algorithmic Efficiency of A-Star and Dijkstra for Optimal Route Planning in Green Transportation
收藏 引用
International Journal of Intelligent Transportation Systems Research 2025年 1-11页
作者: Elshaer, A.M. Elmanfaloty, Rania A. Abou-Bakr, Ehab Elrakaiby, Mahmoud Saada, Khaled College of Artificial Intelligence Arab Academy for Science Technology and Maritime Transport P.O. B 1029 Alamein Egypt Department of Electrical and Computer Engineering Faculty of Engineering King Abdulaziz University P.O.B 21589 Jeddah Saudi Arabia Department of Computer Science and Information Technology Jeddah International College P.O.B 23831 Jeddah Saudi Arabia Department of Computer Engineering Higher Institute of Engineering and Technology El- Beheira Egypt Faculty of Information Technology & Computer Science Sinai University– Arish Branch Arish Egypt
Efficient navigation across complex maps is a critical challenge in domains such as GPS systems, robotics, and sustainable logistics. Optimal route planning plays a key role in minimizing resource consumption, reducin... 详细信息
来源: 评论
VeFog - Efficient Message Dissemination in VANETs based on Edge, Fog and Cloud Computing  47
VeFog - Efficient Message Dissemination in VANETs based on E...
收藏 引用
47th ICT and Electronics Convention, MIPRO 2024
作者: Jelić, Borna Gluhaković, Mario Mijić, David Ivešić, Toni Balen, Josip TTTech Auto Osijek Croatia Faculty Of Electrical Engineering Computer Science And Information Technology Osijek Croatia
Technological progress has had a dramatic impact on the automotive industry and the concept of intelligent and connected vehicles is developing rapidly. Vehicles are being equipped with various in-vehicle and environm... 详细信息
来源: 评论
Enhancing Automated Android Application Security through Hybrid Static and Dynamic Analysis Techniques  6
Enhancing Automated Android Application Security through Hyb...
收藏 引用
6th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2024
作者: Manukulasooriya, G.E. Munasingha, R.S.I. Fernando, Harinda Uthpali, H.K.I. Yeshani, A.V.S.H. Siriwardana, Deemantha Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
The rapid growth of mobile applications has led to serious security challenges, resulting in vulnerabilities. Automation in security testing methods is becoming popular, with the Automated Vulnerability Detection meth... 详细信息
来源: 评论