咨询与建议

限定检索结果

文献类型

  • 8,580 篇 会议
  • 5,973 篇 期刊文献
  • 230 册 图书

馆藏范围

  • 14,783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,790 篇 工学
    • 6,171 篇 计算机科学与技术...
    • 4,979 篇 软件工程
    • 2,245 篇 信息与通信工程
    • 1,437 篇 控制科学与工程
    • 1,202 篇 电气工程
    • 1,121 篇 生物工程
    • 1,075 篇 电子科学与技术(可...
    • 876 篇 生物医学工程(可授...
    • 748 篇 机械工程
    • 633 篇 光学工程
    • 559 篇 仪器科学与技术
    • 452 篇 动力工程及工程热...
    • 429 篇 化学工程与技术
    • 397 篇 网络空间安全
    • 336 篇 安全科学与工程
    • 301 篇 交通运输工程
  • 5,141 篇 理学
    • 2,435 篇 数学
    • 1,793 篇 物理学
    • 1,260 篇 生物学
    • 808 篇 统计学(可授理学、...
    • 568 篇 系统科学
    • 479 篇 化学
  • 2,562 篇 管理学
    • 1,587 篇 管理科学与工程(可...
    • 1,050 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 945 篇 医学
    • 792 篇 临床医学
    • 677 篇 基础医学(可授医学...
    • 411 篇 药学(可授医学、理...
    • 384 篇 公共卫生与预防医...
  • 402 篇 法学
    • 328 篇 社会学
  • 281 篇 经济学
  • 215 篇 农学
  • 200 篇 教育学
  • 64 篇 文学
  • 38 篇 军事学
  • 34 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 451 篇 deep learning
  • 292 篇 machine learning
  • 261 篇 feature extracti...
  • 239 篇 accuracy
  • 233 篇 computational mo...
  • 216 篇 internet of thin...
  • 214 篇 information tech...
  • 211 篇 optimization
  • 186 篇 support vector m...
  • 184 篇 artificial intel...
  • 181 篇 computer science
  • 173 篇 predictive model...
  • 170 篇 data mining
  • 149 篇 training
  • 135 篇 neural networks
  • 123 篇 real-time system...
  • 122 篇 covid-19
  • 116 篇 computational in...
  • 110 篇 image segmentati...
  • 110 篇 wireless communi...

机构

  • 287 篇 faculty of scien...
  • 287 篇 department for p...
  • 285 篇 department of ph...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 273 篇 kirchhoff-instit...
  • 266 篇 department of ph...
  • 265 篇 department of ph...
  • 260 篇 faculté des scie...
  • 242 篇 fakultät für phy...
  • 241 篇 institute of phy...
  • 231 篇 yerevan physics ...
  • 228 篇 institut für ast...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 212 篇 department of ph...
  • 209 篇 department of ph...
  • 197 篇 department of ph...
  • 197 篇 institute of phy...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 253 篇 s. guindon
  • 251 篇 d. guest

语言

  • 14,170 篇 英文
  • 507 篇 其他
  • 96 篇 中文
  • 23 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Faculty of Computer Engineering and Information Technology"
14783 条 记 录,以下是4841-4850 订阅
排序:
An adaptive algorithm for managing gradient topology in peer-to-peer networks
An adaptive algorithm for managing gradient topology in peer...
收藏 引用
Conference on information and Knowledge technology
作者: Sara Fathipour Deiman Ali Mohammad Saghiri Mohammad Reza Meybodi Faculty of Computer and Information Technology Engineering Islamic Azad University Tehran Iran Computer Engineering and Information Technology Department Amirkabir University of Technology (Tehran Polytechnic) Tehran Iran
Super-peer network is a type of peer-to-peer networks. In a super-peer network, a super-peer is a peer that has more ability than other peers have and is responsible for some of the tasks of network management. Since ... 详细信息
来源: 评论
Centrality Based Geocasting for Opportunistic Networks  33rd
Centrality Based Geocasting for Opportunistic Networks
收藏 引用
33rd International Conference on Advanced information Networking and Applications, AINA-2019
作者: Singh, Jagdeep Dhurandher, Sanjay K. Woungang, Isaac Takizawa, Makoto CAITFS Division of Information Technology Netaji Subhas Institute of Technology University of Delhi New Delhi India CAITFS Department of Information Technology Netaji Subhas University of Technology New Delhi India Department of Computer Science Ryerson University TorontoON Canada Department of Advanced Sciences Faculty of Science and Engineering Hosei University Tokyo Japan
Opportunistic networks (OppNets) are a subclass of delay tolerant networks characterized by unstable topology, intermittent connectivity, and no guarantee of the existence of an end-to-end path to carry the messages f... 详细信息
来源: 评论
The Empirical Evaluation of Artificial Intelligence-based Techniques for Improving Cyber Security  2
The Empirical Evaluation of Artificial Intelligence-based Te...
收藏 引用
2nd International Conference on Electronics and Renewable Systems, ICEARS 2023
作者: Nayak, Chhaya Rao, Chintala Lakshmana Alam, Tanweer Singh, Shalini Islam, Shaziya Maginmani, Umme Habiba Pimpri Chinchwad College of Engineering Pune India School of Law Visakhapatnam India Islamic University of Madinah Faculty of Computer and Information Systems Department of Computer Science Madinah Saudi Arabia Graphic Era Deemed to Be University Department of Ece Uttarakhand Dehradun248002 India Rungta College of Engineering and Technology Bhilai India Secab Institute of Engineering and Technology Department of Computer Science and Engineering Karnataka Vijayapur India
Artificial intelligence (AI) technologies have been recently developed, and their advantages can be observed in a wide range of domains, from image processing to face detection. AI-based approaches can assist opponent... 详细信息
来源: 评论
Depth-Awareness in a System for Mixed-Reality Aided Surgical Procedures  15th
Depth-Awareness in a System for Mixed-Reality Aided Surgical...
收藏 引用
15th International Conference on Intelligent Computing, ICIC 2019
作者: Sylos Labini, Mauro Gsaxner, Christina Pepe, Antonio Wallner, Juergen Egger, Jan Bevilacqua, Vitoantonio Institute for Computer Graphics and Vision Faculty of Computer Science and Biomedical Engineering Graz University of Technology Graz Austria Computer Algorithms for Medicine Laboratory Graz Austria Department of Electrical and Information Engineering Polytechnic University of Bari Bari Italy Department of Oral and Maxillofacial Surgery Medical University of Graz Graz Austria
computer-assisted surgery is a trending topic in research, with many different approaches which aim at supporting surgeons in the operating room. Existing surgical planning and navigation solutions are often considere... 详细信息
来源: 评论
Applying rough sets to information tables containing possibilistic values
Applying rough sets to information tables containing possibi...
收藏 引用
作者: Nakata, Michinori Sakai, Hiroshi Faculty of Management and Information Science Josai International University 1 Gumyo Togane Chiba 283-8555 Japan Department of Mathematics and Computer Aided Sciences Faculty of Engineering Kyushu Institute of Technology Tobata Kitakyushu 804-8550 Japan
Rough sets are applied to information tables containing imprecise values that are expressed in a normal possibility distribution. A method of weighted equivalence classes is proposed, where each equivalence class is a... 详细信息
来源: 评论
Real-time collision detection with two-level spatial hashing on GPU  22
Real-time collision detection with two-level spatial hashing...
收藏 引用
22nd Pacific Conference on computer Graphics and Applications, PG 2014
作者: Hong, Yang Wu, Wen Chen, Hui Department of Computer and Information Science Faculty of Science and Technology University of Macau China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong Beijing Key Lab of Human-Computer Interaction Institute of Software Chinese Academy of Science Beijing China
In this paper, a two-level parallel spatial hashing method is presented for real-time collision detection of deformable objects based on modern GPU architecture. The second-level of spatial hashing is used to improve ... 详细信息
来源: 评论
A review on WEP wireless security protocol
收藏 引用
Journal of Theoretical and Applied information technology 2012年 第1期40卷 39-43页
作者: Juwaini, Muhammad Alsaqour, Raed Abdelhaq, Maha Alsukour, Ola School of Computer Science Faculty of Information Science and Technology University Kebangsaan Malaysia 43600 Bangi Selangor Malaysia Department of Computer Engineering Faculty of Engineering and Technology The University of Jordan 11942 Amman Jordan
WEP (Wired Equivalent Protocol) is a wireless security protocol ratified by IEEE (The Institute of Electrical and Electronics Engineers) in 1999. Since then, WEP is widely used in telecommunication field. In daily usa... 详细信息
来源: 评论
Image cyberbullying detection and recognition using transfer deep machine learning
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 14-26页
作者: Almomani, Ammar Nahar, Khalid Alauthman, Mohammad Al-Betar, Mohammed Azmi Yaseen, Qussai Gupta, Brij B. School of Computing Skyline University College University City of Sharjah P.O. Box 1797 Sharjah United Arab Emirates I.T. department Al-Huson University College AlBalqa Applied University Irbid Jordan Computer Science Department Faculty of I.T. Yarmouk University Irbid Jordan Department of Information Security Faculty of Information Technology University of Petra Amman Jordan Ajman University Ajman United Arab Emirates Department of Computer Science and Information Engineering Asia University Taichung413 Taiwan Symbiosis International University Pune India Department of Electrical and Computer Engineering Lebanese American University Beirut1102 Lebanon Dehradun India
Cyberbullying detection on social media platforms is increasingly important, necessitating robust computational methods. Current approaches, while promising, have not fully leveraged the combined strengths of deep lea... 详细信息
来源: 评论
Applied Computation and Security Systems  1
收藏 引用
丛书名: Advances in Intelligent Systems and Computing
1000年
作者: Rituparna Chaki Khalid Saeed Sankhayan Choudhury Nabendu Chaki
来源: 评论
Using Artificial Neural Networks to Determine Ontologies Most Relevant to Scientific Texts  22
Using Artificial Neural Networks to Determine Ontologies Mos...
收藏 引用
22nd Conference information Technologies - Applications and Theory, ITAT 2022
作者: Korel, Lukáš Behr, Alexander S. Kockmann, Norbert Holeňa, Martin Faculty of Information Technology CTU Prague Czech Republic Faculty of Biochemical and Chemical Engineering TU Dortmund University Germany Institute of Computer Science Czech Academy of Sciences Prague Czech Republic Leibniz Institute for Catalysis Rostock Germany
This paper provides an insight into the possibility of how to find ontologies most relevant to scientific texts using artificial neural networks. The basic idea of the presented approach is to select a representative ... 详细信息
来源: 评论