咨询与建议

限定检索结果

文献类型

  • 8,580 篇 会议
  • 5,973 篇 期刊文献
  • 230 册 图书

馆藏范围

  • 14,783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,790 篇 工学
    • 6,171 篇 计算机科学与技术...
    • 4,979 篇 软件工程
    • 2,245 篇 信息与通信工程
    • 1,437 篇 控制科学与工程
    • 1,202 篇 电气工程
    • 1,121 篇 生物工程
    • 1,075 篇 电子科学与技术(可...
    • 876 篇 生物医学工程(可授...
    • 748 篇 机械工程
    • 633 篇 光学工程
    • 559 篇 仪器科学与技术
    • 452 篇 动力工程及工程热...
    • 429 篇 化学工程与技术
    • 397 篇 网络空间安全
    • 336 篇 安全科学与工程
    • 301 篇 交通运输工程
  • 5,141 篇 理学
    • 2,435 篇 数学
    • 1,793 篇 物理学
    • 1,260 篇 生物学
    • 808 篇 统计学(可授理学、...
    • 568 篇 系统科学
    • 479 篇 化学
  • 2,562 篇 管理学
    • 1,587 篇 管理科学与工程(可...
    • 1,050 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 945 篇 医学
    • 792 篇 临床医学
    • 677 篇 基础医学(可授医学...
    • 411 篇 药学(可授医学、理...
    • 384 篇 公共卫生与预防医...
  • 402 篇 法学
    • 328 篇 社会学
  • 281 篇 经济学
  • 215 篇 农学
  • 200 篇 教育学
  • 64 篇 文学
  • 38 篇 军事学
  • 34 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 451 篇 deep learning
  • 292 篇 machine learning
  • 261 篇 feature extracti...
  • 239 篇 accuracy
  • 233 篇 computational mo...
  • 216 篇 internet of thin...
  • 214 篇 information tech...
  • 211 篇 optimization
  • 186 篇 support vector m...
  • 184 篇 artificial intel...
  • 181 篇 computer science
  • 173 篇 predictive model...
  • 170 篇 data mining
  • 149 篇 training
  • 135 篇 neural networks
  • 123 篇 real-time system...
  • 122 篇 covid-19
  • 116 篇 computational in...
  • 110 篇 image segmentati...
  • 110 篇 wireless communi...

机构

  • 287 篇 faculty of scien...
  • 287 篇 department for p...
  • 285 篇 department of ph...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 273 篇 kirchhoff-instit...
  • 266 篇 department of ph...
  • 265 篇 department of ph...
  • 260 篇 faculté des scie...
  • 242 篇 fakultät für phy...
  • 241 篇 institute of phy...
  • 231 篇 yerevan physics ...
  • 228 篇 institut für ast...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 212 篇 department of ph...
  • 209 篇 department of ph...
  • 197 篇 department of ph...
  • 197 篇 institute of phy...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 253 篇 s. guindon
  • 251 篇 d. guest

语言

  • 14,170 篇 英文
  • 507 篇 其他
  • 96 篇 中文
  • 23 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Faculty of Computer Engineering and Information Technology"
14783 条 记 录,以下是191-200 订阅
排序:
Epileptic seizure detection in EEG signals via an enhanced hybrid CNN with an integrated attention mechanism
收藏 引用
Mathematical Biosciences and engineering 2025年 第1期22卷 73-105页
作者: Mekruksavanich, Sakorn Phaphan, Wikanda Jitpattanakul, Anuchit Department of Computer Engineering School of Information and Communication Technology University of Phayao Phayao56000 Thailand Department of Applied Statistics Faculty of Applied Science King Mongkut’s University of Technology North Bangkok Bangkok10800 Thailand Department of Mathematics Faculty of Applied Science King Mongkut’s University of Technology North Bangkok Bangkok10800 Thailand Intelligent and Nonlinear Dynamic Innovations Research Center Science and Technology Research Institute King Mongkut’s University of Technology North Bangkok Bangkok10800 Thailand
Epileptic seizures, a prevalent neurological condition, necessitate precise and prompt identification for optimal care. Nevertheless, the intricate characteristics of electroencephalography (EEG) signals, noise, and t... 详细信息
来源: 评论
SPUFChain: Permissioned Blockchain Lightweight Authentication Scheme for Supply Chain Management Using PUF of IoT
收藏 引用
IEEE Access 2025年 13卷 88662-88682页
作者: Assaqty, Mohammad Iqbal Saryuddin Gao, Ying Alqarni, Abeer D. Khan, Siraj Chakraborty, Mohuya Siddiqi, Hafied Nur Ahmad, Sadique South China University of Technology School of Computer Science and Engineering Guangzhou510006 China Universitas Nahdlatul Ulama Indonesia Faculty of Engineering and Computer Science Jakarta10320 Indonesia College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Department of Information Technology PO Box 84428 Riyadh11671 Saudi Arabia Shenzhen University College of Computer Science & Software Engineering Shenzhen518060 China University of Engineering and Management Cybersecurity Centre of Excellence Kolkata700160 India Prince Sultan University EIAS Data Science and Blockchain Laboratory CCIS Riyadh12435 Saudi Arabia
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in ... 详细信息
来源: 评论
Hybrid Machine Learning Approach for Enhanced Vulnerability Detection in Cloud Environments Using NIST and MITRE Frameworks  5
Hybrid Machine Learning Approach for Enhanced Vulnerability ...
收藏 引用
5th International Conference on Advanced Research in Computing, ICARC 2025
作者: Lasantha, N W Chanaka Maduranga, M.W.P. Abeysekara, Ruvan Tilwari, Valmik Chakraborty, Nilotpal Sharma, Debashree Iic University of Technology Faculty of Graduate Studies Phnom Penh Cambodia University of Sri Jayewardenepura Department of Electrical and Electronic Engineering Nugegoda Sri Lanka Bcas Campus Faculty of Computing Colombo Sri Lanka Indian Institute of Information Technology Department of Computer Science Engineering Guwahati India Indian Institute of Information Technology Department of Electronics & Communication Engineering Guwahati India
Cloud security is challenged by constant adaptive cyber threats and traditional detection methods lack real time adaptability. In this paper, we propose a new hybrid ML approach stitching data from National Institute ... 详细信息
来源: 评论
An Enhanced Product Recommendation System Using Decision Tree Algorithm  7th
An Enhanced Product Recommendation System Using Decision Tre...
收藏 引用
7th International Conference on Communication, Device and Networking, ICCDN 2024
作者: Awotunde, Joseph Bamidele Sur, Samarendra Nath Imoize, Agbotiname Lucky Akinyoola, Oluwatimilehin Moses Department of Computer Science Faculty of Information and Communication Sciences University of Ilorin Kwara State Ilorin240003 Nigeria Department of Electronics and Communication Engineering Sikkim Manipal Institute of Technology Sikkim Manipal University Sikkim India Department of Electrical and Electronics Engineering Faculty of Engineering University of Lagos Akoka Lagos 100213 Nigeria Department of Electrical Engineering and Information Technology Institute of Digital Communication Ruhr University Bochum44801 Germany
Product recommendation systems are a critical element of e-commerce platforms, as they enable customers to identify the items that best meet their needs. Product recommendation systems are important tools used by orga... 详细信息
来源: 评论
Unveiling Effective Heuristic Strategies: A Review of Cross-Domain Heuristic Search Challenge Algorithms
收藏 引用
computer Modeling in engineering & Sciences 2025年 第2期142卷 1233-1288页
作者: Mohamad Khairulamirin Md Razali MasriAyob Abdul Hadi Abd Rahman Razman Jarmin Chian Yong Liu Muhammad Maaya Azarinah Izaham Graham Kendall Faculty of Information Science and Technology Universiti Kebangsaan MalaysiaBangi43600SelangorMalaysia Center for Artificial Intelligence Technology Universiti Kebangsaan MalaysiaBangi43600SelangorMalaysia Faculty of Medicine Universiti Kebangsaan Malaysia Medical CentreCheras56000Kuala LumpurMalaysia School of Engineering and Computing MILA UniversityNilai71800Negeri SembilanMalaysia School of Computer Science University of Nottingham-Malaysia CampusSemenyih43500SelangorMalaysia
The Cross-domain Heuristic Search Challenge(CHeSC)is a competition focused on creating efficient search algorithms adaptable to diverse problem *** hyper-heuristics are a class of algorithms that dynamically choose he... 详细信息
来源: 评论
Enhancing single-lead electrocardiogram arrhythmia detection with empirical mode decomposition
收藏 引用
Neural Computing and Applications 2025年 1-23页
作者: Issa, Mohamed F. Yousry, Ahmed Tuboly, Gergely Wang, Zeyu Zoltan, Juhasz Selim, Mazen M. AbuEl-Atta, Ahmed H. Department of Scientific Computing Faculty of Computers and Artificial Intelligence Benha University Benha13511 Egypt Department of Computer Science Faculty of Computers and Artificial Intelligence Benha University Benha13511 Egypt Department of Electrical Engineering and Information Systems University of Pannonia Veszprem8200 Hungary Department of Mechatronics Delta University for Science and Technology Gamasa35712 Egypt
Cardiac arrhythmias pose a significant challenge to health care, requiring accurate and reliable detection methods to enable early diagnosis and treatment. However, traditional ECG beat classification methods often la... 详细信息
来源: 评论
Forecasting New Mobile Site Location Suitability Using Machine Learning  8
Forecasting New Mobile Site Location Suitability Using Machi...
收藏 引用
8th International Conference on Data Science and Machine Learning Applications, CDMA 2025
作者: Rabbani, Zeeshan Ebrahim Hosseini, Seyed Pervez Chattha, Shahbaz Alandjani, Gasim Abosaq, Nasser Abdul Majid, Mazlina School of Information Technology Whitecliffe College Auckland New Zealand School of Information Technology Whitecliffe College Christchurch New Zealand School of Information Technology Whitecliffe College Wellington New Zealand Yanbu Industrial College Computer Science and Engineering Yanbu Saudi Arabia Universi Malaysia Pahang Al-Sultan Faculty of Computing Abdullah Pekan Malaysia
The increasing density of mobile networks has made the identification of optimal new coverage sites a critical challenge for mobile operators. Traditional methods relying on manual inspections and council plans are la... 详细信息
来源: 评论
An Enhanced Keylogger Detection Systems Using Recurrent Neural Networks Enabled with Feature Selection Model  7th
An Enhanced Keylogger Detection Systems Using Recurrent Neur...
收藏 引用
7th International Conference on Communication, Device and Networking, ICCDN 2024
作者: Awotunde, Joseph Bamidele Sur, Samarendra Nath Imoize, Agbotiname Lucky Rodríguez, Demóstenes Zegarra Akanji, Boluwatife Department of Computer Science Faculty of Information and Communication Sciences University of Ilorin Kwara State Ilorin240003 Nigeria Department of Electronics and Communication Engineering Sikkim Manipal Institute of Technology Sikkim Manipal University Sikkim India Department of Electrical and Electronics Engineering Faculty of Engineering University of Lagos Akoka Lagos 100213 Nigeria Department of Electrical Engineering and Information Technology Institute of Digital Communication Ruhr University Bochum44801 Germany Department of Computer Science Federal University of Lavras Minas Gerais Lavras Brazil
Keyloggers are malicious software programs that record keystrokes of users without their consent or knowledge. They can steal sensitive information like credit card numbers and passwords. They pose a significant threa... 详细信息
来源: 评论
Lightweight Adaptive Learning Algorithm for Energy-Latency Tradeoff in IoMT-Enabled Edge Computing  17
Lightweight Adaptive Learning Algorithm for Energy-Latency T...
收藏 引用
17th International Conference on Machine Vision, ICMV 2024
作者: Yadav, Rahul Shafiq, Muhammad Kumar, Mohit Wei, Li Elaziz, Mohamed Abd College of Computer Science and Technology Harbin Engineering University Harbin China Cyberspace Institute of Advance Technology Guangzhou University Guangzhou China Department of Information Technology National Institute of Technology Jalandhar India Department of Mathematics Faculty of Science Zagazig University Zagazig Egypt
Smart Healthcare is witnessing widespread implementation of Internet-of-Medical-Things (IoMT) devices. These devices play a crucial role in collecting vast amounts of data from various smart healthcare applications, w... 详细信息
来源: 评论
Automated explainable and interpretable framework for anomaly detection and human activity recognition in smart homes
收藏 引用
Neural Computing and Applications 2025年 1-14页
作者: Kim, Tae Hoon Ojo, Stepehn Krichen, Moez Alamro, Meznah A. Mihoub, Alaeddine Sampedro, Gabriel Avelino School of Information and Electronic Engineering Zhejiang University of Science and Technology No. 318 Zhejiang Hangzhou China Department of Electrical and Computer Engineering College of Engineering Anderson Anderson University AndersonSC29621 United States Al-Baha University Al-Baha65528 Saudi Arabia ReDCAD Laboratory University of Sfax Sfax3038 Tunisia Department of Information Technology College of Computer and Information Science Princess Nourah Bint Abdul Rahman University Riyadh11564 Saudi Arabia Department of Management Information Systems College of Business and Economics Qassim University P.O. Box: 6640 Buraidah51452 Saudi Arabia College of Computer Studies De La Salle University 2401 Taft Ave. Malate Manila1004 Philippines Faculty of Information and Communication Studies University of the Philippines Open University Los Baños4031 Philippines
This paper presents a comprehensive framework for activity recognition and anomaly detection in smart home environments, targeting applications in convenience, efficiency, responsiveness, and healthcare. The proposed ... 详细信息
来源: 评论