咨询与建议

限定检索结果

文献类型

  • 8,580 篇 会议
  • 5,973 篇 期刊文献
  • 230 册 图书

馆藏范围

  • 14,783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,790 篇 工学
    • 6,171 篇 计算机科学与技术...
    • 4,979 篇 软件工程
    • 2,245 篇 信息与通信工程
    • 1,437 篇 控制科学与工程
    • 1,202 篇 电气工程
    • 1,121 篇 生物工程
    • 1,075 篇 电子科学与技术(可...
    • 876 篇 生物医学工程(可授...
    • 748 篇 机械工程
    • 633 篇 光学工程
    • 559 篇 仪器科学与技术
    • 452 篇 动力工程及工程热...
    • 429 篇 化学工程与技术
    • 397 篇 网络空间安全
    • 336 篇 安全科学与工程
    • 301 篇 交通运输工程
  • 5,141 篇 理学
    • 2,435 篇 数学
    • 1,793 篇 物理学
    • 1,260 篇 生物学
    • 808 篇 统计学(可授理学、...
    • 568 篇 系统科学
    • 479 篇 化学
  • 2,562 篇 管理学
    • 1,587 篇 管理科学与工程(可...
    • 1,050 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 945 篇 医学
    • 792 篇 临床医学
    • 677 篇 基础医学(可授医学...
    • 411 篇 药学(可授医学、理...
    • 384 篇 公共卫生与预防医...
  • 402 篇 法学
    • 328 篇 社会学
  • 281 篇 经济学
  • 215 篇 农学
  • 200 篇 教育学
  • 64 篇 文学
  • 38 篇 军事学
  • 34 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 451 篇 deep learning
  • 292 篇 machine learning
  • 261 篇 feature extracti...
  • 239 篇 accuracy
  • 233 篇 computational mo...
  • 216 篇 internet of thin...
  • 214 篇 information tech...
  • 211 篇 optimization
  • 186 篇 support vector m...
  • 184 篇 artificial intel...
  • 181 篇 computer science
  • 173 篇 predictive model...
  • 170 篇 data mining
  • 149 篇 training
  • 135 篇 neural networks
  • 123 篇 real-time system...
  • 122 篇 covid-19
  • 116 篇 computational in...
  • 110 篇 image segmentati...
  • 110 篇 wireless communi...

机构

  • 287 篇 faculty of scien...
  • 287 篇 department for p...
  • 285 篇 department of ph...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 273 篇 kirchhoff-instit...
  • 266 篇 department of ph...
  • 265 篇 department of ph...
  • 260 篇 faculté des scie...
  • 242 篇 fakultät für phy...
  • 241 篇 institute of phy...
  • 231 篇 yerevan physics ...
  • 228 篇 institut für ast...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 212 篇 department of ph...
  • 209 篇 department of ph...
  • 197 篇 department of ph...
  • 197 篇 institute of phy...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 253 篇 s. guindon
  • 251 篇 d. guest

语言

  • 14,170 篇 英文
  • 507 篇 其他
  • 96 篇 中文
  • 23 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Faculty of Computer Engineering and Information Technology"
14783 条 记 录,以下是31-40 订阅
排序:
Predicting Student Behavior Using a Neutrosophic Deep Learning Model
收藏 引用
Neutrosophic Sets and Systems 2025年 76卷 288-310页
作者: Shitaya, Ahmed Mohamed Wahed, Mohamed El Syed Abd El Khalek, Saied Helemy Ismail, Amr Shams, Mahmoud Y. Salama, A.A. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Computer Science Faculty of computer and information sciences Suez Canal University Egypt Department. of Communication and Computer Engineering Air Defense University Egypt Department of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah51418 Saudi Arabia Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt
We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed dat... 详细信息
来源: 评论
ABL-SMOTE: A Novel Resampling Method by Handling Noisy and Borderline Challenge for Imbalanced Dataset for Software Defect Prediction
收藏 引用
IEEE Access 2025年 13卷 78781-78794页
作者: Bashir, Kamal Abdelwahab Ghorashi, Sara Ahmed, Ali Khader, Abdolraheem Karary University College of Computer Science and Information Technology Department of Information Technology Omdurman12304 Sudan Princess Nourah bint Abdulrahman University College of Computer and Information Sciences Department of Computer Sciences P.O. Box 84428 Riyadh11671 Saudi Arabia King Abdulaziz University Faculty of Computing and Information Technology Jeddah21589 Saudi Arabia Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China
Machine learning algorithms face important implementation difficulties due to imbalanced learning since the Synthetic Minority Oversampling Technique (SMOTE) helps improve performance through the creation of new minor... 详细信息
来源: 评论
Enhancing Performance of Machine Learning Models in Healthcare: An Analytical Framework for Assessing and Improving Data Quality  5th
Enhancing Performance of Machine Learning Models in Healthca...
收藏 引用
5th International Conference on Advances in information Communication technology and Computing, AICTC 2024
作者: Al-Hgaish, Areen Atan, Rodziah Yaakob, Razali Osman, Mohd Hafeez Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang44330 Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia Serdang44330 Malaysia
The utilization of Data-Driven Machine Learning (DDML) models in the healthcare sector poses unique challenges due to the crucial nature of clinical decision-making and its impact on patient outcomes. A primary concer... 详细信息
来源: 评论
Rethinking the Design of Backdoor Triggers and Adversarial Perturbations: A Color Space Perspective
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2823-2840页
作者: Jiang, Wenbo Li, Hongwei Xu, Guowen Ren, Hao Yang, Haomiao Zhang, Tianwei Yu, Shui University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Sichuan University School of Cyber Science and Engineering Chengdu610017 China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore University of Technology Sydney School of Computer Science in the Faculty of Engineering and Information Technology SydneyNSW2007 Australia
Deep neural networks (DNNs) are known to be susceptible to various malicious attacks, such as adversarial and backdoor attacks. However, most of these attacks utilize additive adversarial perturbations (or backdoor tr... 详细信息
来源: 评论
Software design and FPGA implementation of optimized medical image fusion techniques
收藏 引用
Multimedia Tools and Applications 2025年 1-31页
作者: Elshazly, E.A. El-Shafai, Walid El-Hoseny, Heba El-Rabaie, El-Sayed M Zahran, O. Abdelwahab, Safey A. S. El-Halawany, M.M. Fikry, R.M. Elaraby, S.M. Faragallah, Osama S. Mohamed, Wael A. Mahmoud, Korany R. Abd El-Samie, Fathi E. Cairo Egypt Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Faculty of Computer Studies Arab Open University 11681 Riyadh Saudi Arabia Department of Information Technology College of Computers and Information Technology Taif University 11099 Taif21944 Saudi Arabia Department of Electrical Engineering Faculty of Engineering Benha University Benha Egypt Electronics and Communications Engineering Department Faculty of Engineering Helwan University Helwan Egypt Giza Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh11671 Saudi Arabia
Nowadays, medical image fusion plays a crucial role in enhancing the diagnosis accuracy and the clinical decision-making process in various healthcare applications. This research work presents a comprehensive stu... 详细信息
来源: 评论
Thermal Model of a Soldering Iron  33rd
Thermal Model of a Soldering Iron
收藏 引用
33rd International Conference on Organization and technology of Maintenance, OTO 2024
作者: Barić, Tomislav Glavaš, Hrvoje Dubravac, Anto Faculty of Electrical Engineering Computer Science and Information Technology Osijek University of Osijek Osijek Croatia
Soldering irons are a hand tool that is indispensable in the process of making small series of electronic devices. Soldering irons have evolved from very simple devices without temperature control to devices with comp... 详细信息
来源: 评论
DDT-Net:Deep Detail Tracking Network for Image Tampering Detection
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 3451-3469页
作者: Jim Wong Zhaoxiang Zang Hubei Key Laboratory of Intelligent Vision Based Monitoring for Hydroelectric Engineering China Three Gorges UniversityYichang443002China College of Computer and Information Technology ChinaThree Gorges UniversityYichang443002China Faculty of Information Engineering and Automation Kunming University of Science and TechnologyKunming650504China
In the field of image forensics,image tampering detection is a critical and challenging *** methods based on manually designed feature extraction typically focus on a specific type of tampering operation,which limits ... 详细信息
来源: 评论
ClipArtGAN: An Application of Pix2Pix Generative Adversarial Network for Clip Art Generation
收藏 引用
Multimedia Tools and Applications 2025年 1-25页
作者: Elnabawy, Reham H. Abdennadher, Slim Hellwich, Olaf Eldawlatly, Seif Technische Universität Berlin Berlin Germany Computer Science and Engineering Department Faculty of Media Engineering and Technology German University in Cairo Cairo Egypt Computer Science Department Faculty of Informatics and Computer Science German International University New Administrative Capital Egypt Computer and Systems Engineering Department Faculty of Engineering Ain Shams University 1 El-sarayat st. Abbassia Cairo Egypt Computer Science and Engineering Department The American University in Cairo Cairo Egypt School of Information Technology New Giza University Giza Egypt
An image can convey a thousand words. This statement emphasizes the importance of illustrating ideas visually rather than writing them down. Although detailed image representation is typically instructive, there are s... 详细信息
来源: 评论
A new metaheuristic optimization algorithm based on the participation of smart students to increase the class performance
收藏 引用
Soft Computing 2025年 第6期29卷 2829-2844页
作者: Pira, Einollah Rouhi, Alireza Faculty of Information Technology and Computer Engineering Azarbaijan Shahid Madani University Tabriz-Maragheh East-Azarbaijan Tabriz*** Iran
The learning and teaching power of the students in different courses can be different according to their intelligence and talent. One student can be smart in a single course while he/she is lazy in other courses. Afte... 详细信息
来源: 评论
Ordered Clustering-Based Semantic Music Recommender System Using Deep Learning Selection
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 3025-3057页
作者: Weitao Ha Sheng Gang Yahya D.Navaei Abubakar S.Gezawa Yaser A.Nanehkaran School of Computer Science and Technology Weinan Normal UniversityWeinan714099China School of Information&Engineering Yancheng Teachers UniversityYancheng224002China Department of Computer and Technology Engineering Qazvin BranchIslamic Azad UniversityQazvin34199-15195Iran School of Information Engineering Sanming UniversitySanming365004China Department ofManagement Information Systems Faculty of Economics and Administrative SciencesCankayaUniversityAnkara06790Türkiye
Music recommendation systems are essential due to the vast amount of music available on streaming platforms,which can overwhelm users trying to find new tracks that match their *** systems analyze users’emotional res... 详细信息
来源: 评论