咨询与建议

限定检索结果

文献类型

  • 8,632 篇 会议
  • 5,911 篇 期刊文献
  • 231 册 图书

馆藏范围

  • 14,774 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,799 篇 工学
    • 6,173 篇 计算机科学与技术...
    • 4,975 篇 软件工程
    • 2,232 篇 信息与通信工程
    • 1,455 篇 控制科学与工程
    • 1,174 篇 电气工程
    • 1,126 篇 生物工程
    • 1,080 篇 电子科学与技术(可...
    • 880 篇 生物医学工程(可授...
    • 746 篇 机械工程
    • 636 篇 光学工程
    • 560 篇 仪器科学与技术
    • 452 篇 动力工程及工程热...
    • 425 篇 化学工程与技术
    • 393 篇 网络空间安全
    • 333 篇 安全科学与工程
    • 299 篇 交通运输工程
  • 5,127 篇 理学
    • 2,431 篇 数学
    • 1,787 篇 物理学
    • 1,253 篇 生物学
    • 807 篇 统计学(可授理学、...
    • 565 篇 系统科学
    • 481 篇 化学
  • 2,565 篇 管理学
    • 1,583 篇 管理科学与工程(可...
    • 1,058 篇 图书情报与档案管...
    • 752 篇 工商管理
  • 942 篇 医学
    • 792 篇 临床医学
    • 673 篇 基础医学(可授医学...
    • 410 篇 药学(可授医学、理...
    • 382 篇 公共卫生与预防医...
  • 404 篇 法学
    • 329 篇 社会学
  • 283 篇 经济学
  • 217 篇 农学
  • 203 篇 教育学
  • 64 篇 文学
  • 37 篇 军事学
  • 34 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 457 篇 deep learning
  • 290 篇 machine learning
  • 256 篇 feature extracti...
  • 247 篇 accuracy
  • 239 篇 computational mo...
  • 215 篇 information tech...
  • 212 篇 internet of thin...
  • 210 篇 optimization
  • 189 篇 support vector m...
  • 184 篇 artificial intel...
  • 182 篇 computer science
  • 169 篇 data mining
  • 169 篇 predictive model...
  • 147 篇 training
  • 134 篇 neural networks
  • 123 篇 covid-19
  • 119 篇 real-time system...
  • 116 篇 computational in...
  • 113 篇 wireless communi...
  • 110 篇 image segmentati...

机构

  • 285 篇 faculty of scien...
  • 285 篇 department for p...
  • 284 篇 department of ph...
  • 279 篇 departamento de ...
  • 275 篇 department of ph...
  • 271 篇 kirchhoff-instit...
  • 268 篇 department of ph...
  • 265 篇 department of ph...
  • 259 篇 faculté des scie...
  • 244 篇 fakultät für phy...
  • 241 篇 institute of phy...
  • 229 篇 yerevan physics ...
  • 226 篇 institut für ast...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 214 篇 department of ph...
  • 211 篇 department of ph...
  • 197 篇 department of ph...
  • 194 篇 institute of phy...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 263 篇 g. gaudio
  • 262 篇 s. mohapatra
  • 261 篇 y. nagasaka
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 252 篇 s. guindon
  • 250 篇 d. guest

语言

  • 13,867 篇 英文
  • 800 篇 其他
  • 99 篇 中文
  • 23 篇 日文
  • 4 篇 德文
  • 3 篇 法文
  • 3 篇 斯洛文尼亚文
  • 2 篇 俄文
检索条件"机构=Faculty of Computer and Information Technology Engineering"
14774 条 记 录,以下是741-750 订阅
排序:
Bi-LSTM-Based Deep Stacked Sequence-to-Sequence Autoencoder for Forecasting Solar Irradiation and Wind Speed
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 6375-6393页
作者: Neelam Mughees Mujtaba Hussain Jaffery Abdullah Mughees Anam Mughees Krzysztof Ejsmont Department of Electrical and Computer Engineering COMSATS University IslamabadLahore Campus45550Pakistan School of Engineering and Technology National Textile UniversityFaisalabad37610Pakistan Department of Electrical Engineering Information Technology UniversityLahore54000Pakistan Department of Electrical Engineering GC UniversityFaisalabad38000Pakistan Faculty of Mechanical and Industrial Engineering Warsaw University of Technology02-524WarsawPoland
Wind and solar energy are two popular forms of renewable energy used in microgrids and facilitating the transition towards net-zero carbon emissions by ***,they are exceedingly unpredictable since they rely highly on ... 详细信息
来源: 评论
Cross-Layer Distributed Attack Detection Model for the IoT
收藏 引用
International Journal of Ambient Computing and Intelligence 2022年 第1期13卷 1-17页
作者: Ahmed, Hassan I. Nasr, Abdurrahman A. Abdel-Mageid, Salah M. Aslan, Heba K. Informatics Department Electronics Research Institute Cairo Egypt Computer Engineering Faculty of Engineering Al-Azhar University Cairo Egypt Computer Engineering Department College of Computer Science and Engineering Taibah University Saudi Arabia Center of Informatics Science Faculty of Information Technology and Computer Science Nile University Egypt
The security of IoT that is based on layered approaches has shortcomings such as the redundancy, inflexibility, and inefficiently of security solutions. There are many harmful attacks in IoT networks such as DoS and D... 详细信息
来源: 评论
A New Approach to Road Incident Detection Leveraging Live Traffic Data: An Empirical Investigation  2
A New Approach to Road Incident Detection Leveraging Live Tr...
收藏 引用
2nd International Conference on Machine Learning and Data engineering, ICMLDE 2023
作者: Kumar Gannina, Aswin Ram Jaffarullah, Aadhil Ahamed Reddy, Tiyyagura Mohit Subba Reddy, Sabbella Manoj Vikas, Ambati Sai Mathi, Senthilkumar Ramalingam, Venkadeshan Department of Computer Science and Engineering Amrita School of Computing Amrita Vishwa Vidyapeetham Coimbatore India Faculty in Information Technology Department University of Technology and Applied Sciences-Shinas Oman
Accidents can have a significant impact on road safety and the efficiency of transport. With the ever-increasing number of vehicles on the road, it is crucial to quickly detect and respond to such events to decrease t... 详细信息
来源: 评论
Improving Date Fruit Classification Using Cycle GAN-Generated Dataset
收藏 引用
computer Modeling in engineering & Sciences 2022年 第4期131卷 331-348页
作者: Dina M.Ibrahim Nada M.Elshennawy Department of Information Technology College of ComputerQassim UniversityBuraydah51452Saudi Arabia Computers and Control Engineering Department Faculty of EngineeringTanta UniversityTanta37133Egypt
Dates are an important part of human *** are high in essential nutrients and provide a number of health *** fruits are also known to protect against a number of diseases,including cancer and heart *** fruits have seve... 详细信息
来源: 评论
Sentiment Analysis of ChatGPT Healthcare Discourse: Insights from Twitter Data  15
Sentiment Analysis of ChatGPT Healthcare Discourse: Insights...
收藏 引用
15th International Conference on Software, Knowledge, information Management and Applications, SKIMA 2023
作者: Kumar, Roshan Ayyasamy, Ramesh Kumar Sangodiah, Anbuselvan Krishnan, Kesavan Jebna, Abdulkarim Kanaan Theam, Lim Jit Universiti Tunku Abdul Rahman Faculty of Information and Comunication Technology Kampar Malaysia Quest International University Faculty of Computing and Engineering Ipoh Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Kuala Lumpur Malaysia
This paper explores the application of Chat Generative Pretrained Transformer (ChatGPT) in the healthcare domain, introducing a sentiment analysis model to evaluate ChatGPT-related tweets in healthcare contexts. The s... 详细信息
来源: 评论
Classification of Sleep-Related Disorders Using Machine Learning Techniques  25
Classification of Sleep-Related Disorders Using Machine Lear...
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Nasir, Ola Alazaidah, Raed Al-Safarini, Maram Y. Alamleh, Amneh Zaid, Ali Abu Mansur, Hasan Elrashidi, Ali Alzoubi, Haneen Bani-Bakr, Alaa Zarqa University Faculty of Information Technology Department of Computer Science Zarqa Jordan Zarqa University Faculty of Information Technology Department of Data Science and Ai Zarqa Jordan Zarqa University Faculty of Information Technology Department of Cyber Security Zarqa Jordan American University of Madaba Faculty of Business Department of Accounting Madaba Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Private University Faculty of It Applied Science Department of Computer Science Amman Jordan
Several people suffer from irregular sleep patterns, a problem that negatively affects their daily lives. It presents a multitude of challenges, including daytime distress, disturbances in sleep-wake patterns, feeling... 详细信息
来源: 评论
An Improved Reverse Distillation Model for Unsupervised Anomaly Detection  17
An Improved Reverse Distillation Model for Unsupervised Anom...
收藏 引用
17th International Conference on Ubiquitous information Management and Communication, IMCOM 2023
作者: Van Duc, Nguyen Bach, Hoang Huu Trang, Le Hong Faculty of Computer Science and Engineering Ho Chi Minh City Viet Nam Faculty of Information Technology Ha Noi Hanoi Viet Nam
Using knowledge distillation for unsupervised anomaly detection problems is more efficient. Recently, a reverse distillation (RD) model has been presented a novel teacher-student (T-S) model for the problem [7]. In th... 详细信息
来源: 评论
Intelligent-Based Extraction of Business Capabilities from Company Descriptions  7
Intelligent-Based Extraction of Business Capabilities from C...
收藏 引用
7th International Conference on information technology, information Systems and Electrical engineering, ICITISEE 2023
作者: Fahmi, Faisal Hamid, Siti Hafizah Ab Yuadi, Imam Airlangga University Faculty of Political and Social Science Department of Library and Information Science Indonesia Universiti Malaya Faculty of Computer Science & Information Technology Department of Software Engineering Malaysia
In the era of Big Data, information can be generated, extracted, and utilized in diverse ways. In business, information about business capabilities can be a crucial aspect in understanding the strengths and competenci... 详细信息
来源: 评论
Attacks Detection in 6G Wireless Networks using Machine Learning  9
Attacks Detection in 6G Wireless Networks using Machine Lear...
收藏 引用
9th International Conference on computer and Communication engineering, ICCCE 2023
作者: Saeed, Mamoon M. Saeed, Rashid A. Gaid, Abdulguddoos S. A. Mokhtar, Rania A. Khalifa, Othman O. Ahmed, Zeinab E. Faculty of Engineering Department of Communications and Electronics Engineering Yemen Taif University College of Computers and Information Technology Department of Computer Engineering P.O. Box 11099 Taif21944 Saudi Arabia Taiz University Faculty of Engineering & Information Technology Department of Communication & Computer Engineering Taiz Yemen International Islamic University Malaysia Department of Electrical and Computer Engineering Malaysia Libyan Center for Engineering Research and Information Technology Bani Waleed Libya International Islamic University Malaysia Electrical and Computer Engineering Dept Malaysia University of Gezira Computer Engineering Dept Sudan
Unlike the fifth generation (5G), which is well recognized for network cloudification with micro-service-oriented design, the sixth generation (6G) of networks is directly tied to intelligent network orchestration and... 详细信息
来源: 评论
A heuristic ant colony optimization approach for allocating and packing multi-module satellite payloads  4
A heuristic ant colony optimization approach for allocating ...
收藏 引用
4th International Conference on computers and Artificial Intelligence technology, CAIT 2023
作者: Wang, Shiya Zhang, Tingting Zeng, Peng Nie, Jun Guangdong University of Science and Technology Faculty of Computer Guangdong China Xiantang University School of Information and Engineering Guangdong China
It is effective to pack multi-module satellite payloads for existing heuristic and evolutionary approaches. But for them, the multi-module payload allocation optimization is not considered before packing. In addition,... 详细信息
来源: 评论