咨询与建议

限定检索结果

文献类型

  • 2,261 篇 会议
  • 1,327 篇 期刊文献
  • 74 册 图书

馆藏范围

  • 3,662 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,955 篇 工学
    • 1,461 篇 计算机科学与技术...
    • 1,217 篇 软件工程
    • 417 篇 信息与通信工程
    • 269 篇 生物工程
    • 265 篇 控制科学与工程
    • 235 篇 生物医学工程(可授...
    • 153 篇 电气工程
    • 135 篇 光学工程
    • 132 篇 电子科学与技术(可...
    • 124 篇 机械工程
    • 107 篇 化学工程与技术
    • 89 篇 仪器科学与技术
    • 87 篇 安全科学与工程
    • 71 篇 动力工程及工程热...
  • 1,354 篇 理学
    • 585 篇 数学
    • 493 篇 物理学
    • 314 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 136 篇 系统科学
    • 104 篇 化学
  • 660 篇 管理学
    • 366 篇 管理科学与工程(可...
    • 315 篇 图书情报与档案管...
    • 203 篇 工商管理
  • 262 篇 医学
    • 222 篇 临床医学
    • 192 篇 基础医学(可授医学...
    • 123 篇 公共卫生与预防医...
    • 107 篇 药学(可授医学、理...
  • 103 篇 法学
    • 87 篇 社会学
  • 93 篇 教育学
    • 86 篇 教育学
  • 86 篇 经济学
    • 82 篇 应用经济学
  • 63 篇 农学
  • 10 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 82 篇 accuracy
  • 79 篇 machine learning
  • 71 篇 artificial intel...
  • 66 篇 deep learning
  • 62 篇 internet of thin...
  • 62 篇 predictive model...
  • 62 篇 training
  • 57 篇 feature extracti...
  • 55 篇 covid-19
  • 55 篇 informatics
  • 52 篇 computational mo...
  • 50 篇 convolutional ne...
  • 47 篇 optimization
  • 45 篇 support vector m...
  • 45 篇 data models
  • 44 篇 forecasting
  • 41 篇 data mining
  • 39 篇 monitoring
  • 38 篇 students
  • 35 篇 education

机构

  • 94 篇 faculty of compu...
  • 57 篇 faculty of infor...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 department of ph...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 38 篇 institute of phy...

作者

  • 43 篇 bacanin nebojsa
  • 42 篇 alfred rayner
  • 35 篇 mustafa mamat
  • 35 篇 zivkovic miodrag
  • 33 篇 nebojsa bacanin
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein

语言

  • 3,533 篇 英文
  • 117 篇 其他
  • 13 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 日文
检索条件"机构=Faculty of Computing and Informatics"
3662 条 记 录,以下是131-140 订阅
排序:
Feature Extraction and Preprocessing Techniques on Open-Ended Concept Mapping Activity Log Data  7
Feature Extraction and Preprocessing Techniques on Open-Ende...
收藏 引用
7th International Conference on Vocational Education and Electrical Engineering, ICVEE 2024
作者: Prasetya, Didik Dwi Muhtadi, Muis Azizah, Hanifah Nur Zain, Azlan Mohd State University of Malang Department of Electrical Engineering and Informatics Malang Indonesia Universiti Teknologi Malaysia Faculty of Computing Johor Bahru Malaysia
Concept maps are graphic representations of unique ideas widely used in learning. Concept mapping activities are often stored in an activity log which contains a record of data based on a particular time. The high act... 详细信息
来源: 评论
Unleashing the Potential of Blockchain and Internet of Things (IoT) Convergence: A Comprehensive Study  20
Unleashing the Potential of Blockchain and Internet of Thing...
收藏 引用
20th IEEE International Colloquium on Signal Processing and Its Applications, CSPA 2024
作者: Kadir, Khairunnisa A. Wahab, Nur Haliza Abdul Hartomom, Kristoko Dwi Harun, Siti Zaleha College Of Computing Informatics And Mathematics Pahang Branch Raub Campus Pahang Raub27600 Malaysia Universiti Teknologi Malaysia Faculty Of Computing Johor Skudai Malaysia Satya Wacana Christian University Faculty Of Technology Information Salatiga Indonesia
This comprehensive review explores the synergistic intersection of blockchain technology and the Internet of Things (IoT), revealing how the fusion of these two innovative technologies is revolutionizing both network ... 详细信息
来源: 评论
Cultural Heritage in The Digital Age: Evaluating User Experience in Virtual Reality Cultural Heritage Learning Application  27
Cultural Heritage in The Digital Age: Evaluating User Experi...
收藏 引用
27th International Conference on Advanced Communications Technology, ICACT 2025
作者: Afendi bin Abdul Ghani, Mohamad Shahfik Kiffli, Sudirman bin Kuan, Tenh Hock Shamsuddin, Syadiah Nor binti Wan Rahim, Normala binti Faculty of Creative Technology and Heritage Universiti Malaysia Kelantan Kelantan Bachok16300 Malaysia Faculty of Informatics and Computing Universiti Sultan Zainal Abidin Terengganu Kuala Nerus21300 Malaysia
The Fourth Industrial Revolution (IR4.0) has transformed various sectors, including cultural heritage preservation, education, and tourism, through advanced technologies like virtual reality (VR). This study explores ... 详细信息
来源: 评论
A Review of Deep Convolutional Neural Networks in Mobile Face Recognition
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2023年 第23期17卷 4-19页
作者: Chi, Jing On, Chin Kim Zhang, Haopeng Chai, Soo See Faculty of Computing and Informatics University Malaysia Sabah Sabah Malaysia School Information and Electrical Engineering Hebei University of Engineering Hebei China Faculty of Computer Science and Information Technology Universiti Malaysia Sarawak Sarawak Malaysia
With the emergence of deep learning, Convolutional Neural Network (CNN) models have been proposed to advance the progress of various applications, including face recognition, object detection, pattern recognition, and... 详细信息
来源: 评论
Utilizing Fine-Tuning ResNet-18 for Acute Leukemia Diagnosis from Blood Smear Images  2
Utilizing Fine-Tuning ResNet-18 for Acute Leukemia Diagnosis...
收藏 引用
2nd International Conference on Technology Innovation and Its Applications, ICTIIA 2024
作者: Sinaga, Triandes Candra, Ade Purnama, Bedy Universitas Sumatera Utara Faculty of Computer and Information Technology Medan Indonesia Telkom University Department of Informatics School of Computing Bandung Indonesia
This study explores fine-tuning ResNet-18 to enhance the accuracy of acute leukemia diagnosis from blood smear images. Early detection is crucial for patient outcomes, but the application of ResNet-18 in this context ... 详细信息
来源: 评论
Financial Sustainability of Automotive Software Compliance and Industry Quality Standards  8th
Financial Sustainability of Automotive Software Compliance ...
收藏 引用
8th International Congress on Information and Communication Technology, ICICT 2023
作者: Dakić, Pavle Todorović, Vladimir Vranić, Valentino Faculty of Informatics and Computing Singidunum University Belgrade Serbia Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology in Bratislava Bratislava Slovakia Faculty of Business Studies and Law MB University Belgrade Serbia
Achieving a high level of quality in the AV industry involves understanding the complexity of the production cycle with the constant challenges of applying appropriate standards. The need for compliance based on relev... 详细信息
来源: 评论
A Scalable and Lightweight Authentication Architecture for the Internet of Things (IoT) in Smart Home Applications  2
A Scalable and Lightweight Authentication Architecture for t...
收藏 引用
2nd Zimbabwe Conference on Information Communication and Technology, ZCICT 2023
作者: Gamundani, Attlee M. Phillips, Amelia Muyingi, Hippolyte N. Namibia University of Science and Technology Faculty of Computing & Informatics Cyber Security Department Windhoek Namibia University of the Cumberlands School of Computer and Information Sciences WilliamsburgKY United States Namibia University of Science and Technology Faculty of Computing & Informatics Windhoek Namibia
In the evolving landscape of smart home applications, ensuring robust and efficient authentication within the Internet of Things (IoT) environments is paramount. This paper presents a scalable, lightweight authenticat... 详细信息
来源: 评论
E-mail Spam Classification Using Grasshopper Optimization Algorithm and Neural Networks
收藏 引用
Computers, Materials & Continua 2022年 第6期71卷 4749-4766页
作者: Sanaa A.A.Ghaleb Mumtazimah Mohamad Syed Abdullah Fadzli Waheed A.H.M.Ghanem Faculty of Informatics and Computing Universiti Sultan Zainal AbidinKuala Terengganu22200Malaysia Faculty of Ocean Engineering Technology and Informatics Universiti Malaysia TerengganuKuala Terengganu21030Malaysia Faculty of Engineering University of AdenAdenYemen Faculty of Education(Aden-Saber) University of AdenAdenYemen
Spam has turned into a big predicament these days,due to the increase in the number of spam emails,as the recipient regularly receives piles of *** only is spam wasting users’time and *** addition,it limits the stora... 详细信息
来源: 评论
Comparison of Dark Channel Prior and Contrast Limited Histogram Equalization for the Enhancement of Underwater Fish Image  4
Comparison of Dark Channel Prior and Contrast Limited Histog...
收藏 引用
4th IEEE International Conference on Artificial Intelligence in Engineering and Technology, IICAIET 2022
作者: Ahmad Hijazi, Mohd Hanafi Mei, Leong Jing Universiti Malaysia Sabah Faculty of Computing and Informatics Sabah Malaysia
The application of artificial intelligence (AI) in aquaculture may improve the efficiency of fish farming management. Computer vision is one of the fields in AI beneficial for aquaculture. However, the underwater imag... 详细信息
来源: 评论
Treat Assessment Framework in Analysing Network Threat Occurrence  8
Treat Assessment Framework in Analysing Network Threat Occur...
收藏 引用
8th IEEE International Conference on Recent Advances and Innovations in Engineering, ICRAIE 2023
作者: Awang, Norkhushaini Samy, Ganthan A-L Narayana Hassan, Noor Hafizah Binti Universiti Teknologi MARA College of Computing Informatics and Mathematics Selangor Malaysia Universiti Teknologi Malaysia Razak Faculty of Technology and Informatics Kuala Lumpur Malaysia
Threat assessment of network security assists in identifying potential risks and vulnerabilities. By understanding the threats, their potential impact, and the probability of their occurrence, organizations can proact... 详细信息
来源: 评论