咨询与建议

限定检索结果

文献类型

  • 13,531 篇 会议
  • 8,311 篇 期刊文献
  • 304 册 图书

馆藏范围

  • 22,146 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,764 篇 工学
    • 9,472 篇 计算机科学与技术...
    • 7,731 篇 软件工程
    • 2,914 篇 信息与通信工程
    • 1,912 篇 控制科学与工程
    • 1,506 篇 生物工程
    • 1,332 篇 电气工程
    • 1,171 篇 生物医学工程(可授...
    • 1,167 篇 电子科学与技术(可...
    • 953 篇 机械工程
    • 759 篇 光学工程
    • 677 篇 仪器科学与技术
    • 614 篇 化学工程与技术
    • 533 篇 动力工程及工程热...
    • 505 篇 网络空间安全
    • 456 篇 安全科学与工程
  • 7,480 篇 理学
    • 3,581 篇 数学
    • 2,478 篇 物理学
    • 1,713 篇 生物学
    • 1,167 篇 统计学(可授理学、...
    • 838 篇 系统科学
    • 646 篇 化学
  • 4,212 篇 管理学
    • 2,440 篇 管理科学与工程(可...
    • 1,941 篇 图书情报与档案管...
    • 1,243 篇 工商管理
  • 1,295 篇 医学
    • 1,097 篇 临床医学
    • 928 篇 基础医学(可授医学...
    • 559 篇 药学(可授医学、理...
    • 519 篇 公共卫生与预防医...
  • 659 篇 法学
    • 546 篇 社会学
  • 441 篇 经济学
    • 440 篇 应用经济学
  • 381 篇 教育学
  • 308 篇 农学
  • 132 篇 文学
  • 54 篇 军事学
  • 50 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 616 篇 deep learning
  • 498 篇 computer science
  • 422 篇 accuracy
  • 392 篇 information tech...
  • 389 篇 feature extracti...
  • 374 篇 machine learning
  • 304 篇 computational mo...
  • 300 篇 support vector m...
  • 290 篇 internet of thin...
  • 284 篇 data mining
  • 249 篇 artificial intel...
  • 244 篇 training
  • 204 篇 optimization
  • 186 篇 neural networks
  • 179 篇 image segmentati...
  • 167 篇 covid-19
  • 158 篇 predictive model...
  • 153 篇 reliability
  • 152 篇 computer archite...
  • 148 篇 data models

机构

  • 289 篇 faculty of scien...
  • 288 篇 department for p...
  • 283 篇 department of ph...
  • 280 篇 departamento de ...
  • 274 篇 department of ph...
  • 267 篇 department of ph...
  • 265 篇 department of ph...
  • 258 篇 faculté des scie...
  • 257 篇 kirchhoff-instit...
  • 229 篇 fakultät für phy...
  • 227 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 217 篇 physics division...
  • 213 篇 department of ph...
  • 212 篇 institute of phy...
  • 204 篇 institut für ast...
  • 202 篇 department of ph...
  • 197 篇 department of ph...
  • 179 篇 institute of phy...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 262 篇 m. klein
  • 262 篇 r. ströhmer
  • 262 篇 m. rijssenbeek
  • 262 篇 s. jin
  • 261 篇 g. gaudio
  • 261 篇 s. mohapatra
  • 259 篇 h. a. gordon
  • 259 篇 h. sakamoto
  • 257 篇 y. nagasaka
  • 249 篇 d. guest
  • 245 篇 s. guindon

语言

  • 21,013 篇 英文
  • 998 篇 其他
  • 122 篇 中文
  • 31 篇 日文
  • 6 篇 斯洛文尼亚文
  • 4 篇 德文
  • 3 篇 法文
  • 3 篇 俄文
检索条件"机构=Faculty of Computer Science and Information of Technology"
22146 条 记 录,以下是111-120 订阅
排序:
Exploring Extractive and Abstractive Approaches for Myanmar Language Text Summarization  5
Exploring Extractive and Abstractive Approaches for Myanmar ...
收藏 引用
5th International Conference on Advanced information Technologies, ICAIT 2024
作者: Theint, Khin Nyo Nyo Minn, Tun Ye Myat, Aung Khant Wai, Thinn Thinn Tar, Hmway Hmway Thant, Win Win Zin, Thet Thet University of Information Technology Yangon Myanmar University of Information Technology Faculty of Computer Science Yangon Myanmar
Text summarization is one of the most difficult natural language processing (NLP) tasks. It is the process of creating concise, intelligent summaries from a variety of sources, including books, news articles, and soci... 详细信息
来源: 评论
Customer Segmentation Based on Recency, Frequency, Monetary, Variety and Duration (RFMVD)  2
Customer Segmentation Based on Recency, Frequency, Monetary,...
收藏 引用
2nd International Conference on technology Innovation and Its Applications, ICTIIA 2024
作者: Sundari, Agus Lydia, Maya Silvi Muchtar, Muhammad Anggia Universitas Sumatera Utara Faculty of Computer Science and Information Technology Department of Data Science and Artificial Intelligence Medan Indonesia Universitas Sumatera Utara Faculty of Computer Science and Information Technology Department of Computer Science Medan Indonesia
In banking, maintaining customer retention and customer satisfaction are important. Effective customer segmentation can be a strategic tool to improve customer loyalty and business performance. This research can assis... 详细信息
来源: 评论
Optimizing Electric Vehicle Charging Infrastructure through Machine Learning: A Study of Charging Patterns and Energy Consumption
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2024年 第21期18卷 149-170页
作者: Alsarhan, Ayoub Alnatsheh, Athari Aljaidi, Mohammad Al Makkawi, Tuqa Aljamal, Mahmoud Alsarhan, Tamam Department of Information Technology Faculty of Prince Al-Hussien bin Abdullah for IT The Hashemite University Zarqa Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa Jordan King Abdullah II School of Information Technology The University of Jordan Amman Jordan
The rapid adoption of electric vehicles (EVs) has created a pressing need for efficient charging infrastructure. but challenges such as inconsistent demand and poor placement remain. An effective distribution of suffi... 详细信息
来源: 评论
Enhancing Acoustic-based Speech Emotion Recognition Using CNN  5
Enhancing Acoustic-based Speech Emotion Recognition Using CN...
收藏 引用
5th International Conference on Advanced information Technologies, ICAIT 2024
作者: Hlaing, Hnin Oo Thet Zin, Thet Wai, Thinn Thinn Nway Oo, Aung University of Information Technology Yangon Myanmar University of Information Technology Faculty of Computer Science Yangon Myanmar
Speech Emotion Recognition (SER) is a crucial field aiming to enhance machine understanding of human emotions. Among all the variety of data sources, we choose the acoustic features of the speech to explore both posit... 详细信息
来源: 评论
Sentiment Analysis on Twitter and Instagram Data towards Nuclear Waste
Sentiment Analysis on Twitter and Instagram Data towards Nuc...
收藏 引用
2024 International Conference on Electronics and Devices, Computational science, ICEDCS 2024
作者: Bing, Chao Universiti Putra Malaysia Faculty of Computer Science and Information Technology Department of Computer Science Selangor Malaysia
A magnitude 9.0 earthquake on March 11, 2011, caused core meltdowns at Fukushima Daiichi Nuclear Power Plant, leading Japan to begin discharging treated wastewater into the Pacific Ocean on August 24, 2023. This decis... 详细信息
来源: 评论
Custom Object Detection for Fresh and Rotten Fruit Classification  5
Custom Object Detection for Fresh and Rotten Fruit Classific...
收藏 引用
5th International Conference on Advanced information Technologies, ICAIT 2024
作者: Thant, Khine Zin Khant Paing, Minn Thant, Win Win Hmway Tar, Hmway Oo, Aung Nway University of Information Technology Yangon Myanmar University of Information Technology Faculty of Computer Science Yangon Myanmar
Automated grading and processing of fruits is a complex task which requires the creation of effective fruit vision detection systems. This paper presents an introduction of Fruit detection and recognition system for g... 详细信息
来源: 评论
EduGym Post-Mortem: Open Educational Resource for Educational Game
EduGym Post-Mortem: Open Educational Resource for Educationa...
收藏 引用
2025 International Conference on Advancement in Data science, E-learning and information System, ICADEIS 2025
作者: Tarigan, Jos Timanta Zamzami, Elviawaty Muisa Zendrato, Niskarto Nababan, Anandhini Medianty Universitas Sumatera Utara Faculty of Computer Science and Information Technology Medan Indonesia
This paper aims to delve into the development of EduGym, an educational microlearning game specifically designed for mobile platforms. The discussion highlights the implementation and integration of Open Educational R... 详细信息
来源: 评论
A survey on graph-based methods for Software Vulnerability Detection  1
A survey on graph-based methods for Software Vulnerability D...
收藏 引用
1st International Conference on Emerging Technologies for Dependable Internet of Things, ICETI 2024
作者: Abu-Huliqah, Ebtsam N.A. Al Gaphari, Ghaleb H. Ghurab, Mossa Department of Computer Science Faculty of Computer and Information Technology Sana’a University Sana’a Yemen
In computer security, finding software vulnerabilities is essential since they provide serious security hazards to both individuals and companies. Known vulnerability variations or recently undiscovered vulnerabilitie... 详细信息
来源: 评论
A novel medical steganography technique based on Adversarial Neural Cryptography and digital signature using least significant bit replacement
收藏 引用
International Journal of Cognitive Computing in Engineering 2024年 第1期5卷 379-397页
作者: Hameed, Mohamed Abdel Hassaballah, M. Abdelazim, Riem Sahu, Aditya Kumar Department of Computer Science Faculty of Computers and Information Luxor University Luxor85951 Egypt Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University AlKharj16278 Saudi Arabia Department of Computer Science Faculty of Computers and Information South Valley University Qena Egypt Department of Information Systems College of Information Technology Misr University for Science and Technology Giza Egypt Amrita School of Computing Amrita Vishwa Vidyapeetham Andhra Pradesh Amaravati522503 India
With recent advances in technology protecting sensitive healthcare data is challenging. Particularly, one of the most serious issues with medical information security is protecting of medical content, such as the priv... 详细信息
来源: 评论
Predicting Student Behavior Using a Neutrosophic Deep Learning Model
收藏 引用
Neutrosophic Sets and Systems 2025年 76卷 288-310页
作者: Shitaya, Ahmed Mohamed Wahed, Mohamed El Syed Abd El Khalek, Saied Helemy Ismail, Amr Shams, Mahmoud Y. Salama, A.A. Department of Mathematics and Computer Science Faculty of Science Port Said University Egypt Department of Computer Science Faculty of computer and information sciences Suez Canal University Egypt Department. of Communication and Computer Engineering Air Defense University Egypt Department of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah51418 Saudi Arabia Faculty of Artificial Intelligence Kafrelsheikh University Kafrelsheikh33516 Egypt
We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed dat... 详细信息
来源: 评论