咨询与建议

限定检索结果

文献类型

  • 13,468 篇 会议
  • 8,387 篇 期刊文献
  • 302 册 图书

馆藏范围

  • 22,157 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,770 篇 工学
    • 9,476 篇 计算机科学与技术...
    • 7,738 篇 软件工程
    • 2,932 篇 信息与通信工程
    • 1,887 篇 控制科学与工程
    • 1,504 篇 生物工程
    • 1,367 篇 电气工程
    • 1,164 篇 电子科学与技术(可...
    • 1,164 篇 生物医学工程(可授...
    • 958 篇 机械工程
    • 759 篇 光学工程
    • 680 篇 仪器科学与技术
    • 619 篇 化学工程与技术
    • 532 篇 动力工程及工程热...
    • 509 篇 网络空间安全
    • 462 篇 安全科学与工程
  • 7,504 篇 理学
    • 3,591 篇 数学
    • 2,486 篇 物理学
    • 1,723 篇 生物学
    • 1,168 篇 统计学(可授理学、...
    • 843 篇 系统科学
    • 646 篇 化学
  • 4,214 篇 管理学
    • 2,448 篇 管理科学与工程(可...
    • 1,932 篇 图书情报与档案管...
    • 1,241 篇 工商管理
  • 1,303 篇 医学
    • 1,099 篇 临床医学
    • 934 篇 基础医学(可授医学...
    • 560 篇 药学(可授医学、理...
    • 518 篇 公共卫生与预防医...
  • 655 篇 法学
    • 543 篇 社会学
  • 442 篇 经济学
    • 440 篇 应用经济学
  • 380 篇 教育学
  • 305 篇 农学
  • 132 篇 文学
  • 55 篇 军事学
  • 50 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 614 篇 deep learning
  • 497 篇 computer science
  • 410 篇 accuracy
  • 393 篇 information tech...
  • 385 篇 machine learning
  • 384 篇 feature extracti...
  • 296 篇 computational mo...
  • 294 篇 support vector m...
  • 292 篇 internet of thin...
  • 286 篇 data mining
  • 252 篇 artificial intel...
  • 245 篇 training
  • 201 篇 optimization
  • 190 篇 neural networks
  • 178 篇 image segmentati...
  • 169 篇 covid-19
  • 156 篇 predictive model...
  • 154 篇 reliability
  • 151 篇 computer archite...
  • 143 篇 data models

机构

  • 291 篇 faculty of scien...
  • 290 篇 department for p...
  • 285 篇 department of ph...
  • 282 篇 departamento de ...
  • 276 篇 department of ph...
  • 265 篇 department of ph...
  • 265 篇 department of ph...
  • 261 篇 kirchhoff-instit...
  • 259 篇 faculté des scie...
  • 229 篇 yerevan physics ...
  • 228 篇 fakultät für phy...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 212 篇 institute of phy...
  • 211 篇 department of ph...
  • 205 篇 institut für ast...
  • 201 篇 department of ph...
  • 197 篇 department of ph...
  • 181 篇 institute of phy...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 262 篇 g. gaudio
  • 262 篇 s. mohapatra
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 258 篇 y. nagasaka
  • 250 篇 d. guest
  • 246 篇 s. guindon

语言

  • 21,388 篇 英文
  • 630 篇 其他
  • 117 篇 中文
  • 31 篇 日文
  • 5 篇 法文
  • 4 篇 斯洛文尼亚文
  • 3 篇 德文
  • 2 篇 俄文
  • 1 篇 荷兰文
检索条件"机构=Faculty of Computer Science&Information Technology"
22157 条 记 录,以下是4861-4870 订阅
排序:
A review on knowledge audit process  17
A review on knowledge audit process
收藏 引用
17th Pacific Asia Conference on information Systems, PACIS 2013
作者: Shukor, Nur Syufiza Ahmad Rahman, Azizah Abdul Iahad, Noorminshah A. Faculty of Computer Science and Information Technology Universiti Selangor Bestari Jaya Selangor Malaysia Faculty of Computing Universiti Teknologi Malaysia Johor Bahru Johor Malaysia
Knowledge audit output helps organizations to make recommendation of KM strategy which later can be used for better managing the knowledge. This paper reviews literature on knowledge audit process with the aim to unde... 详细信息
来源: 评论
Artificial intelligence in physiological characteristics recognition for internet of things authentication
收藏 引用
Digital Communications and Networks 2024年 第3期10卷 740-755页
作者: Zhimin Zhang Huansheng Ning Fadi Farha Jianguo Ding Kim-Kwang Raymond Choo School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing100083China Faculty of Informatics Engineering Aleppo UniversityAleppoSyria Department of Computer Science Blekinge Institute of Technology37179KarlskronaSweden Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249-0631USA
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma... 详细信息
来源: 评论
Wind Driven Optimization-Based Medical Image Encryption for Blockchain-Enabled Internet of Things Environment
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3219-3233页
作者: C.S.S.Anupama Raed Alsini N.Supriya E.Laxmi Lydia Seifedine Kadry Sang-Soo Yeo Yongsung Kim Department of Electronics&Instrumentation Engineering V.R.Siddhartha Engineering CollegeVijayawada520007India Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science and Engineering Malla Reddy Engineering College(A)Hyderabad500100India Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Applied Data Science Noroff University College4612KristiansandNorway Department of Computer Engineering Mokwon UniversityDaejeon35349Korea Department of Technology Education Chungnam National University 99Daehak-roYuseong-guDaejeon34134Korea
Internet of Things(IoT)and blockchain receive significant interest owing to their applicability in different application areas such as healthcare,finance,transportation,*** image security and privacy become a critical... 详细信息
来源: 评论
Using graph embeddings to improve the performance of embedding based recommender Systems  3
Using graph embeddings to improve the performance of embeddi...
收藏 引用
3rd International Conference on Innovative Research in Applied science, Engineering and technology, IRASET 2023
作者: Ragab, Ahmed Hussein El-Kafrawy, Passant Fawzi, Sahar Ali School of Technolofy and Computer Science Nile University Computer Science Department Cairo Egypt Cis Research Center Nile University Egypt Effat College of Engineering Jedah Menoufia University Sa Faculty of Science Computer Science Department School of Information Technology and Computer Science Egypt
This paper discusses the use of node2vec graph embeddings to improve the performance of wide and deep recommenders by substituting the embedding layer with graph embeddings to leverage its representational power witho... 详细信息
来源: 评论
Knowledge Transfer Challenges: A Practical Study of Yemen Public Telecommunication Corporation  1
Knowledge Transfer Challenges: A Practical Study of Yemen Pu...
收藏 引用
1st International Conference on Emerging Technologies for Dependable Internet of Things, ICETI 2024
作者: Al-Taweel, Sadik Ali, Ghassan Ahmed Alhazbi, Saleh Yousef, Walid Al-Fuhaidi, Belal Albater, Thamer Hezzam, Essa Ghallab, Abdullatif Department of Information Systems University of Science and Technology Sana’a Yemen Faculty of Islamic Technology Universiti Islam Sultan Sharif Ali Brunei Darussalam Brunei Dept. of Computer Science & Eng. Qatar University Doha Qatar Dept. of Information Technology University of Science and Technology Sana’a Yemen Department of Computer Science University of Science and Technology Sana’a Yemen Faculty of Business Open University Malaysia Sana’a Yemen Department of Information Systems Taibah University Medina Saudi Arabia
The success of organizations today relies heavily on their intellectual capital, as knowledge is a key resource for value creation. Sharing and transferring knowledge enhances its value, embedding it within an organiz... 详细信息
来源: 评论
Designing virtual environments to support cooperation in the real world
收藏 引用
Virtual Reality 2002年 第2期6.0卷 63-74页
作者: Crabtree, A. Rodden, T. Mariani, J. School of Computer Science and Information Technology University of Nottingham Nottingham United Kingdom Computing Department Faculty of Applied Sciences Lancaster University Lancaster United Kingdom School of Computer Science and Information Technology University of Nottingham Nottingham NG8 1BB Wollaton Road United Kingdom
Much of the current research in the design of virtual environments is centred on laboratory prototypes and emphasis is placed on supporting cooperation within the virtual world itself. By way of contrast, this paper p... 详细信息
来源: 评论
Applying an agent-based user authentication and access control model for cloud servers
Applying an agent-based user authentication and access contr...
收藏 引用
2013 International Conference on information and Communication technology Convergence, ICTC 2013
作者: Hajivali, Mostafa Alrashdan, Maen T. Fatemi Moghaddam, Faraz Alothmani, Abdualeem Z. M. Faculty of Computer Science Staffordshire University Kuala Lumpur United Kingdom Kuala Lumpur Malaysia Faculty of Computer Science and Information Technology U.P.M. University Kuala Lumpur Malaysia Kuala Lumpur Malaysia
Cloud computing is an emerging developed technology and the next natural step in the evolution of on-demand information technology services and products that uses concepts of virtualization, storage, processing power,... 详细信息
来源: 评论
ITE Review 2019 Series (1);The Trend of Three Dimensional Image technology
收藏 引用
Kyokai Joho Imeji Zasshi/Journal of the Institute of Image information and Television Engineers 2019年 第1期73卷 90-95页
作者: Horikoshi, Tsutomu Takaki, Yasuhiro Yoshikawa, Hiroshi Koike, Takafumi Ujike, Hiroyasu Yamamoto, Hirotsugu Kiyokawa, Kiyoshi Department of Information Science Shonan Institute of Technology Kanagawa Japan Institute of Engineering Tokyo University of Agriculture and Technology Tokyo Japan College of Science and Technology Nihon University Chiba Japan Faculty of Computer and Information Sciences Hosei University Tokyo Japan Human Technology Research Institute National Institute of Advanced Industrial Science and Technology Ibaraki Japan Center for Optical Research and Education Utsunomiya University Tochigi Japan Cybermedia Center Osaka University Osaka Japan
来源: 评论
Growing Greener: Exploring the Creative Potential of Deep Learning in Agricultural Disease Control
Growing Greener: Exploring the Creative Potential of Deep Le...
收藏 引用
2024 International Conference on Signal Processing, Computation, Electronics, Power and Telecommunication, IConSCEPT 2024
作者: Kiran, Ajmeera Rahman, Syed Ziaur Sreelatha, P. Dhanasekaran, S. Ayyasamy, Ramesh Kumar Swetha, Devulapally MLR Institute of Technology Department of Computer Science and Engineering Hyderabad India Majan University College Faculty of Information Technology Oman A.P Tirupati India Kalasalingam Academy of Research and Education Deemed to be University Department of Information Technology Tamilnadu India Faculty of Information and Communication Technology Kampar Malaysia Vaagdevi Engineering College Department of Computer Science and Engineering Telangana Bolli Kunta India
According to estimates, by mid-2030, there will be 8.6 billion people on the planet. The human population has been growing exponentially. There will be a rise in food production and consumption due to the massive popu... 详细信息
来源: 评论
Multimodal attention-driven visual question answering for Malayalam
收藏 引用
Neural Computing and Applications 2024年 第24期36卷 14691-14708页
作者: Kovath, Abhishek Gopinath Nayyar, Anand Sikha, O.K. Department of Computer Science and Engineering Amrita School of Computing Coimbatore Amrita Vishwa Vidyapeetham Coimbatore India Graduate School Faculty of Information Technology Duy Tan University Da Nang550000 Viet Nam
Visual question answering is a challenging task that necessitates for sophisticated reasoning over the visual elements to provide an accurate answer to a question. Majority of the state-of-the-art VQA models are only ... 详细信息
来源: 评论