咨询与建议

限定检索结果

文献类型

  • 8,580 篇 会议
  • 5,973 篇 期刊文献
  • 230 册 图书

馆藏范围

  • 14,783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,790 篇 工学
    • 6,171 篇 计算机科学与技术...
    • 4,979 篇 软件工程
    • 2,245 篇 信息与通信工程
    • 1,437 篇 控制科学与工程
    • 1,202 篇 电气工程
    • 1,121 篇 生物工程
    • 1,075 篇 电子科学与技术(可...
    • 876 篇 生物医学工程(可授...
    • 748 篇 机械工程
    • 633 篇 光学工程
    • 559 篇 仪器科学与技术
    • 452 篇 动力工程及工程热...
    • 429 篇 化学工程与技术
    • 397 篇 网络空间安全
    • 336 篇 安全科学与工程
    • 301 篇 交通运输工程
  • 5,141 篇 理学
    • 2,435 篇 数学
    • 1,793 篇 物理学
    • 1,260 篇 生物学
    • 808 篇 统计学(可授理学、...
    • 568 篇 系统科学
    • 479 篇 化学
  • 2,562 篇 管理学
    • 1,587 篇 管理科学与工程(可...
    • 1,050 篇 图书情报与档案管...
    • 748 篇 工商管理
  • 945 篇 医学
    • 792 篇 临床医学
    • 677 篇 基础医学(可授医学...
    • 411 篇 药学(可授医学、理...
    • 384 篇 公共卫生与预防医...
  • 402 篇 法学
    • 328 篇 社会学
  • 281 篇 经济学
  • 215 篇 农学
  • 200 篇 教育学
  • 64 篇 文学
  • 38 篇 军事学
  • 34 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 451 篇 deep learning
  • 292 篇 machine learning
  • 261 篇 feature extracti...
  • 239 篇 accuracy
  • 233 篇 computational mo...
  • 216 篇 internet of thin...
  • 214 篇 information tech...
  • 211 篇 optimization
  • 186 篇 support vector m...
  • 184 篇 artificial intel...
  • 181 篇 computer science
  • 173 篇 predictive model...
  • 170 篇 data mining
  • 149 篇 training
  • 135 篇 neural networks
  • 123 篇 real-time system...
  • 122 篇 covid-19
  • 116 篇 computational in...
  • 110 篇 image segmentati...
  • 110 篇 wireless communi...

机构

  • 287 篇 faculty of scien...
  • 287 篇 department for p...
  • 285 篇 department of ph...
  • 281 篇 departamento de ...
  • 277 篇 department of ph...
  • 273 篇 kirchhoff-instit...
  • 266 篇 department of ph...
  • 265 篇 department of ph...
  • 260 篇 faculté des scie...
  • 242 篇 fakultät für phy...
  • 241 篇 institute of phy...
  • 231 篇 yerevan physics ...
  • 228 篇 institut für ast...
  • 222 篇 department of ph...
  • 221 篇 department of ph...
  • 218 篇 physics division...
  • 212 篇 department of ph...
  • 209 篇 department of ph...
  • 197 篇 department of ph...
  • 197 篇 institute of phy...

作者

  • 267 篇 c. alexa
  • 267 篇 j. m. izen
  • 267 篇 g. bella
  • 267 篇 j. strandberg
  • 267 篇 d. calvet
  • 267 篇 c. amelung
  • 267 篇 g. spigo
  • 267 篇 a. c. könig
  • 266 篇 f. siegert
  • 264 篇 m. klein
  • 264 篇 r. ströhmer
  • 264 篇 m. rijssenbeek
  • 264 篇 s. jin
  • 264 篇 g. gaudio
  • 263 篇 s. mohapatra
  • 262 篇 y. nagasaka
  • 261 篇 h. a. gordon
  • 261 篇 h. sakamoto
  • 253 篇 s. guindon
  • 251 篇 d. guest

语言

  • 14,170 篇 英文
  • 507 篇 其他
  • 96 篇 中文
  • 23 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Faculty of Computer and Information Technology Engineering"
14783 条 记 录,以下是141-150 订阅
排序:
Enhanced Speech Emotion and Gender Recognition Using Hybrid CNN-LSTM Models  4
Enhanced Speech Emotion and Gender Recognition Using Hybrid ...
收藏 引用
4th International Conference on Sentiment Analysis and Deep Learning, ICSADL 2025
作者: Priyadharshini, S. Sundar, G. Naveen Narmadha, D. Thangavel, Senthil Kumar Ajibesin, Adeyemi Abel Kolandapalayam Shanmugam, Selvanayaki Karunya Institute of Technology and Sciences Department of Computer Science and Engineering Coimbatore India Amrita School of Computing Department of Computer Science and Engineering Coimbatore India Cape Peninsula University of Technology Faculty of Informatics and Design Department of Information Technology South Africa Ashland University Department of Mathematics and Computer Science United States
The current paper proposes a new approach for peripheral speech emotion analysis and gender estimation incorporating the best machine learning architectures such as CNNs and LSTMs. Its correct depiction of emotions an... 详细信息
来源: 评论
Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第3期19卷 170-190页
作者: Al-Nawashi, Malek M. Al-Hazaimeh, Obaida M. Tahat, Nedal M. Gharaibeh, Nasr Abu-Ain, Waleed A. Abu-Ain, Tarik Al-Huson University College Al-Balqa Applied University Irbid Jordan Faculty of Information Technology Department of Information Security and Cybersecurity Philadelphia University Amman Jordan Faculty of Science The Hashemite University Zarqa Jordan College of Science and Computer Engineering Taibah University Yanbu Saudi Arabia College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia
The detection of cyberattacks has been increasingly emphasized in recent years, focusing on both infrastructure and people. Conventional security measures such as intrusion detection, firewalls, and encryption are ins... 详细信息
来源: 评论
Water Quality Classification Using an Artificial Neural Network  1st
Water Quality Classification Using an Artificial Neural Netw...
收藏 引用
1st International Conference on Intelligent Systems, Blockchain, and Communication Technologies, ISBCom 2024
作者: Mohsen, Saeed Abdel-Rehim, Wael M. F. Abdel-Aziz, M. Electronics and Communications Engineering Department Al-Madinah Higher Institute for Engineering and Technology Giza12947 Egypt South Sinai46511 Egypt Department of Computer Science Faculty of Computers and Information Suez University Suez43512 Egypt Department of Basic Sciences Faculty of Computer and Information Sciences Ain Shams University Cairo11566 Egypt
Water quality is vital for public health and ecosystem sustainability. However, approximately 2 billion people worldwide do not have access to drinking water that is appropriately managed, contributing to significant ... 详细信息
来源: 评论
MetaCon: Revitalizing Internet Congestion Control with Meta-Reinforcement Learning
MetaCon: Revitalizing Internet Congestion Control with Meta-...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Bai, He Li, Hui Que, Jianming Zhang, Minglong Chong, Peter Han Joo Sudheera, Kalupahana Liyanage Kushan Pei, Xinyuan School of Electronic and Computer Engineering Peking University Shenzhen China School of Computer Science Fuyao University of Science and Technology Fuzhou China Department of Electrical and Computer Engineering Mississippi State University Starkville United States School of Engineering Computer and Mathematical Sciences Auckland University of Technology Auckland New Zealand Department of Electrical and Information Engineering Faculty of Engineering University of Ruhuna Sri Lanka
Effective congestion control algorithms (CCAs) are crucial for the smooth operation of Internet communication infrastructure. CCAs adjust transmission rates based on congestion signals, optimizing resource utilization... 详细信息
来源: 评论
Propagation of EM Waves Through Biomaterial Based on Harvest Waste - Influence of Biomaterial Density, Moisture and Temperature  33rd
Propagation of EM Waves Through Biomaterial Based on Harvest...
收藏 引用
33rd International Conference on Organization and technology of Maintenance, OTO 2024
作者: Mandrić, Vanja Rupčić, Slavko Pavković, Bogdan Bogdanović, Nataša Faculty of Electrical Engineering Computer Science and Information Technology Osijek Osijek Croatia Faculty of Technical Sciences University of Novi Sad Novi Sad Serbia Department of Information and Communication Technologies Academy of Applied Technical and Preschool Studies Niš Serbia
This paper deals with the simulation calculation of the transmission (S21) parameter in a biomaterial calculated parametrically on the basis harvest waste (residues) as a function of the density, moisture and temperat... 详细信息
来源: 评论
StegMamba: Distortion-Free Immune-Cover for Multi-Image Steganography With State Space Model
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年 第5期35卷 4576-4591页
作者: Luo, Ting Zhou, Yuhang He, Zhouyan Jiang, Gangyi Xu, Haiyong Qi, Shuren Zhang, Yushu Ningbo University College of Science and Technology Ningbo315212 China Ningbo University Faculty of Information Science and Engineering Ningbo315211 China The Chinese University of Hong Kong Department of Mathematics Hong Kong Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing211106 China
Multi-image steganography ensures privacy protection while avoiding suspicion from third parties by embedding multiple secret images within a cover image. However, existing multi-image steganographic methods fail to m... 详细信息
来源: 评论
Evaluating BERT-based language models for detecting misinformation
收藏 引用
Neural Computing and Applications 2025年 第16期37卷 9937-9968页
作者: Anggrainingsih, Rini Hassan, Ghulam Mubashar Datta, Amitava Information Technology and Data Science Faculty Sebelas Maret University Ir Sutami 36A Central Java Surakarta57126 Indonesia Computer Science and Software Engineering The University of Western Australia 35 Stirling Highway PerthWA6009 Australia
Online misinformation poses a significant challenge due to its rapid spread and limited supervision. To address this issue, automated rumour detection techniques are essential for countering the negative impact of fal... 详细信息
来源: 评论
Designing Quantum-Resilient Blockchain Frameworks: Enhancing Transactional Security with Quantum Algorithms in Decentralized Ledgers
收藏 引用
International Journal of Advanced computer Science and Applications 2025年 第4期16卷 618-628页
作者: Kale, Meenal R. Baker El-Ebiary, Yousef A. Sathiya, L. Burugari, Vijay Kumar Yulduz, Erkiniy Muniyandy, Elangovan Alanazi, Rakan Department of Humanities Yeshwantrao Chavan College of Engineering Hingna Nagpur India Faculty of Informatics and Computing UniSZA University Malaysia Department of CSE Panimalar Engineering College Chennai India Dept of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh Guntur India Automatic Control and Computer Engineering Department Turin Polytechnic University in Tashkent Tashkent Uzbekistan Department of Biosciences-Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai India Applied Science Research Center Applied Science Private University Amman Jordan Department of Information Technology Faculty of Computing and Information Technology Northern Border University Rafha Saudi Arabia
Quantum computing is progressing at a fast rate and there is a real threat that classical cryptographic methods can be compromised and therefore impact the security of blockchain networks. All of the ways used to secu... 详细信息
来源: 评论
AI-driven intrusion prevention system: leveraging mathematical foundations for advanced threats detection
收藏 引用
International Journal of information technology (Singapore) 2025年 1-6页
作者: Vashistha, Avneesh Alghamdi, Tami Abdulrahman Almalki, Sultan Ahmed Ead, Waleed M. Kaur, Gaganpreet Department of Computer Science and Engineering SRM Institute of Science and Technology Delhi-NCR Campus Modinagar Ghaziabad India Computer Science Department Faculty of Computing and Information Al-Baha University Al-Baha Saudi Arabia Computer Department Applied College Najran University Najran Saudi Arabia Faculty of Computing and Information Al-Baha University Al-Baha Saudi Arabia Faculty of Computers and Artificial Intelligence Beni-Suef University Beni-Suef Egypt Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura India
The given paper introduces a multi-staged AI-driven intrusion prevention system (IPS) that utilizes mathematical foundations like statistical analysis, probabilistic models, and optimization techniques to design strat... 详细信息
来源: 评论
Few-shot relation extraction method based on self-supervised learning prototypical networks  5
Few-shot relation extraction method based on self-supervised...
收藏 引用
5th International Conference on Physics and engineering Mathematics, ICPEM 2024
作者: Qian, Shenyi Sun, Yifan Cheng, Jia Li, Daiyi Fu, Yilong Li, Kunlin Wei, Mengyi College of Computer Science and Technology Zhengzhou University of Light Industry Zhengzhou450000 China Faculty of Information Engineering Zhengzhou College of Finance and Economics Zhengzhou450000 China
Few-shot relation extraction (FSRE) is a key task in information extraction that aims to train models using a small number of labeled samples to identify relation categories in sentences. Existing research widely adop... 详细信息
来源: 评论