咨询与建议

限定检索结果

文献类型

  • 13,531 篇 会议
  • 8,236 篇 期刊文献
  • 307 册 图书

馆藏范围

  • 22,074 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,697 篇 工学
    • 9,425 篇 计算机科学与技术...
    • 7,724 篇 软件工程
    • 2,894 篇 信息与通信工程
    • 1,889 篇 控制科学与工程
    • 1,506 篇 生物工程
    • 1,308 篇 电气工程
    • 1,171 篇 生物医学工程(可授...
    • 1,143 篇 电子科学与技术(可...
    • 949 篇 机械工程
    • 763 篇 光学工程
    • 681 篇 仪器科学与技术
    • 608 篇 化学工程与技术
    • 530 篇 动力工程及工程热...
    • 498 篇 网络空间安全
    • 454 篇 安全科学与工程
  • 7,448 篇 理学
    • 3,568 篇 数学
    • 2,466 篇 物理学
    • 1,710 篇 生物学
    • 1,164 篇 统计学(可授理学、...
    • 836 篇 系统科学
    • 641 篇 化学
  • 4,210 篇 管理学
    • 2,441 篇 管理科学与工程(可...
    • 1,936 篇 图书情报与档案管...
    • 1,243 篇 工商管理
  • 1,290 篇 医学
    • 1,097 篇 临床医学
    • 930 篇 基础医学(可授医学...
    • 560 篇 药学(可授医学、理...
    • 523 篇 公共卫生与预防医...
  • 661 篇 法学
    • 546 篇 社会学
  • 440 篇 经济学
    • 439 篇 应用经济学
  • 381 篇 教育学
  • 309 篇 农学
  • 131 篇 文学
  • 53 篇 军事学
  • 50 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 604 篇 deep learning
  • 498 篇 computer science
  • 418 篇 accuracy
  • 393 篇 information tech...
  • 383 篇 feature extracti...
  • 364 篇 machine learning
  • 306 篇 computational mo...
  • 299 篇 support vector m...
  • 288 篇 data mining
  • 287 篇 internet of thin...
  • 248 篇 artificial intel...
  • 243 篇 training
  • 204 篇 optimization
  • 186 篇 neural networks
  • 177 篇 image segmentati...
  • 167 篇 covid-19
  • 158 篇 predictive model...
  • 153 篇 reliability
  • 152 篇 computer archite...
  • 147 篇 data models

机构

  • 289 篇 faculty of scien...
  • 289 篇 department for p...
  • 283 篇 department of ph...
  • 281 篇 departamento de ...
  • 274 篇 department of ph...
  • 268 篇 department of ph...
  • 265 篇 department of ph...
  • 258 篇 faculté des scie...
  • 258 篇 kirchhoff-instit...
  • 228 篇 fakultät für phy...
  • 227 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 217 篇 physics division...
  • 213 篇 department of ph...
  • 211 篇 institute of phy...
  • 205 篇 institut für ast...
  • 202 篇 department of ph...
  • 197 篇 department of ph...
  • 180 篇 institute of phy...

作者

  • 265 篇 c. alexa
  • 265 篇 j. m. izen
  • 265 篇 g. bella
  • 265 篇 j. strandberg
  • 265 篇 d. calvet
  • 265 篇 c. amelung
  • 265 篇 g. spigo
  • 265 篇 a. c. könig
  • 264 篇 f. siegert
  • 262 篇 m. klein
  • 262 篇 r. ströhmer
  • 262 篇 m. rijssenbeek
  • 262 篇 s. jin
  • 262 篇 g. gaudio
  • 262 篇 s. mohapatra
  • 259 篇 h. a. gordon
  • 259 篇 h. sakamoto
  • 258 篇 y. nagasaka
  • 249 篇 d. guest
  • 246 篇 s. guindon

语言

  • 20,947 篇 英文
  • 988 篇 其他
  • 122 篇 中文
  • 31 篇 日文
  • 6 篇 斯洛文尼亚文
  • 4 篇 德文
  • 3 篇 法文
  • 3 篇 俄文
检索条件"机构=Faculty of Computer Science and Information of Technology"
22074 条 记 录,以下是191-200 订阅
排序:
Incorporating syntax information into attention mechanism vector for improved aspect-based opinion mining
收藏 引用
Neural Computing and Applications 2024年 第22期36卷 13957-13974页
作者: Aziz, Makera Moayad Yaakub, Mohd Ridzwan Bakar, Azuraliza Abu Computer Science Department College of Computer Science and Mathematics University of Mosul Nineveh Mosul41002 Iraq Center for Artificial Intelligence Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Selangor Bangi43600 Malaysia
In Aspect-based Sentiment Analysis (ABSA), accurately determining the sentiment polarity of specific aspects within text requires a nuanced understanding of linguistic elements, including syntax. Traditional ABSA appr... 详细信息
来源: 评论
Expert Review on Big Data Analytics Quality Model in Enhancing Healthcare Organizational Performance  9
Expert Review on Big Data Analytics Quality Model in Enhanci...
收藏 引用
9th International Conference on information Management, ICIM 2023
作者: Nasir, Wan Mohd Haffiz Mohd Jusoh, Yusmadi Yah Binti Abdullah, Rusli Bin Abdullah, Salfarina Binti Faculty of Computer Science and Information Technology Selangor Malaysia
Big Data Analytics implementation in healthcare can provide an end-to-end solution with better information value insights. This paper will highlight expert opinion in verifying the quality factors in big data analytic... 详细信息
来源: 评论
Harmful Brain Activity Classification Using Ensemble Deep Learning  66
Harmful Brain Activity Classification Using Ensemble Deep Le...
收藏 引用
66th International Symposium ELMAR, ELMAR 2024
作者: Habijan, Marija Sojo, Robert Tolic, Ivana Hartmann Galic, Irena Faculty of Electrical Engineering Computer Science and Information Technology Osijek Osijek Croatia
Electroencephalography (EEG) is a crucial tool for monitoring electrical brain activity and diagnosing neurological conditions. Manual analysis of EEG signals is time-consuming and prone to variability, necessitating ... 详细信息
来源: 评论
Visualizing Adidas and Nike Customer Segments Using K-Means Clustering  8
Visualizing Adidas and Nike Customer Segments Using K-Means ...
收藏 引用
8th International Conference on Electrical, Telecommunication and computer Engineering, ELTICOM 2024
作者: Br Ginting, Dewi Sartika Maulana Manru, Muhammad Azi Sachio, Wilbert Neilson Tarigan, Abiyan Agitia Marianto, Ivanny Putri Universitas Sumatera Utara Faculty of Computer Science and Information Technology Medan Indonesia
This study explores the application of the K-Means Clustering algorithm to categorize Adidas and Nike customers based on their behavior and preferences. The analysis was conducted on a dataset of 3,268 products from A... 详细信息
来源: 评论
Systematic Literature Review for Optimization System with Advection-Diffusion-Reaction Non-Linear Equation in Water Quality
收藏 引用
IAENG International Journal of Applied Mathematics 2024年 第12期54卷 2541-2554页
作者: Suryana, Ino Chaerani, Diah Abdullah, Atje Setiawan Prabuwono, Anton Satria Muslihin, Khoirunnisa Rohadatul Aisy Irmansyah, Athaya Zahrani Department of Computer Sciences Faculty of Mathematics and Natural Science Universitas Padjadjaran Sumedang45363 Indonesia Department of Mathematics Faculty of Mathematics and Natural Science Universitas Padjadjaran Sumedang45363 Indonesia Department of Computer Sciences Faculty of Mathematics and Natural Science Universitas Padjadjaran Sumedang45363 Indonesia Department of Information Technology Faculty of Computing and Information Technology in Rabigh King Abdul Aziz University Saudi Arabia Faculty of Mathematics and Natural Science Universitas Padjadjaran Indonesia
Water quality is an essential component of environmental health and sustainability, including various parameters such as chemical, physical, and biological attributes. These parameters determine the suitability of wat... 详细信息
来源: 评论
MoBShield:A Novel XML Approach for Securing Mobile Banking
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2123-2149页
作者: Saeed Seraj Ali Safaa Sadiq OmprakashKaiwartya Mohammad Aljaidi Alexandros Konios Mohammed Ali Mohammed Abazeed Department of Computer Science Nottingham Trent UniversityClifton LaneNottinghamNG118NSUK Department of Computer Science Faculty of Information TechnologyZarqa UniversityZarqa13110Jordan Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia
Mobile banking security has witnessed significant R&D attention from both financial institutions and *** is due to the growing number of mobile baking applications and their reachability and usefulness to ***,thes... 详细信息
来源: 评论
Dynamic UAV Deployment in Multi-UAV Wireless Networks: A Multi-Modal Feature-Based Deep Reinforcement Learning Approach
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 18765-18778页
作者: Bai, Yu Xie, Boxuan Liu, Ying Chang, Zheng Jäntti, Riku Aalto University Department of Information and Communications Engineering Espoo02150 Finland University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China University of Jyväskylä Faculty of Information Technology Jyväskylä40014 Finland
The use of Unmanned Aerial Vehicles (UAVs) as aerial base stations has attracted increasing research interest in recent years. A key challenge in this field is determining how to deploy multiple UAVs in dynamic enviro... 详细信息
来源: 评论
Simulation of Vehicular Bots-Based DDoS Attacks in Connected Vehicles Networks
HighTech and Innovation Journal
收藏 引用
HighTech and Innovation Journal 2023年 第4期4卷 854-869页
作者: Abdul Razak, Siti Fatimah Fang, Ku Yee Kamis, Noor Hisham Muhammad Amin, Anang Hudaya Yogarayan, Sumendra Faculty of Information Science and Technology Multimedia University Melaka75450 Malaysia Computer and Information Science Department Higher Colleges of Technology Dubai Men's College United Arab Emirates
Connected vehicles are more vulnerable to attacks than wired networks since they involve rapid mobility, continuous data flow across connected nodes, and dynamic network design in a distributed network environment. Di... 详细信息
来源: 评论
Machine Learning-Based Methods for Materials Inverse Design: A Review
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 1463-1492页
作者: Yingli Liu Yuting Cui Haihe Zhou Sheng Lei Haibin Yuan Tao Shen Jiancheng Yin Faculty of Information Engineering and Automation Kunming University of Science and TechnologyKunming650093China Yunnan Key Laboratory of Computer Technologies Application Kunming University of Science and TechnologyKunming650500China Yunnan Tin Company Limited Tin Industry Branch Gejiu661000China Faculty of Materials Science and Engineering Kunming University of Science and TechnologyKunming650093China
Finding materials with specific properties is a hot topic in materials *** materials design relies on empirical and trial-and-error methods,requiring extensive experiments and time,resulting in high *** the developmen... 详细信息
来源: 评论
TL-IDS: A Transfer Learning Technique for Botnet Detection in IoT  6
TL-IDS: A Transfer Learning Technique for Botnet Detection i...
收藏 引用
6th International Conference on Computing and Informatics, ICCI 2024
作者: Abdelhamid, Salma Hegazy, Islam Aref, Mostafa Roushdy, Mohamed Computer Science Department Faculty of Computers and Information Technology Future University in Egypt Cairo Egypt Computer Science Department Faculty of Computer and Information Sciences Ain Shams University Cairo Egypt
With the exponential rise of Internet of Things (IoT) devices in our modern-day lifestyle, the potential danger of botnet intrusions has become inevitable. These botnet attacks cause extensive damage to both individua... 详细信息
来源: 评论