咨询与建议

限定检索结果

文献类型

  • 2,876 篇 会议
  • 2,373 篇 期刊文献
  • 101 册 图书

馆藏范围

  • 5,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,946 篇 工学
    • 1,990 篇 计算机科学与技术...
    • 1,636 篇 软件工程
    • 651 篇 信息与通信工程
    • 435 篇 控制科学与工程
    • 397 篇 生物工程
    • 389 篇 生物医学工程(可授...
    • 341 篇 电气工程
    • 288 篇 电子科学与技术(可...
    • 252 篇 光学工程
    • 208 篇 机械工程
    • 163 篇 仪器科学与技术
    • 161 篇 化学工程与技术
    • 160 篇 核科学与技术
    • 127 篇 动力工程及工程热...
    • 112 篇 安全科学与工程
    • 90 篇 网络空间安全
  • 2,244 篇 理学
    • 1,078 篇 物理学
    • 839 篇 数学
    • 454 篇 生物学
    • 274 篇 统计学(可授理学、...
    • 204 篇 系统科学
    • 182 篇 化学
  • 831 篇 管理学
    • 467 篇 管理科学与工程(可...
    • 413 篇 图书情报与档案管...
    • 255 篇 工商管理
  • 373 篇 医学
    • 321 篇 临床医学
    • 276 篇 基础医学(可授医学...
    • 194 篇 药学(可授医学、理...
    • 128 篇 公共卫生与预防医...
  • 121 篇 法学
    • 95 篇 社会学
  • 81 篇 教育学
  • 78 篇 经济学
  • 71 篇 农学
  • 13 篇 文学
  • 11 篇 军事学
  • 5 篇 艺术学

主题

  • 112 篇 machine learning
  • 104 篇 deep learning
  • 102 篇 artificial intel...
  • 94 篇 accuracy
  • 90 篇 hadron colliders
  • 85 篇 informatics
  • 82 篇 computational mo...
  • 80 篇 feature extracti...
  • 76 篇 training
  • 65 篇 support vector m...
  • 63 篇 higgs bosons
  • 57 篇 internet of thin...
  • 57 篇 data models
  • 56 篇 convolutional ne...
  • 55 篇 data mining
  • 54 篇 forecasting
  • 51 篇 predictive model...
  • 49 篇 computer science
  • 48 篇 optimization
  • 47 篇 proton-proton in...

机构

  • 417 篇 department for p...
  • 410 篇 faculty of scien...
  • 406 篇 kirchhoff-instit...
  • 401 篇 department of ph...
  • 392 篇 institute of phy...
  • 387 篇 department of ph...
  • 386 篇 department of ph...
  • 378 篇 institute of phy...
  • 370 篇 fakultät für phy...
  • 352 篇 instituto de fís...
  • 310 篇 department of ph...
  • 289 篇 graduate school ...
  • 289 篇 dipartimento di ...
  • 282 篇 department of ph...
  • 281 篇 department of ph...
  • 277 篇 nikhef national ...
  • 275 篇 universidade fed...
  • 268 篇 ictp trieste
  • 265 篇 department of ph...
  • 259 篇 yerevan physics ...

作者

  • 338 篇 c. alexa
  • 335 篇 j. m. izen
  • 334 篇 g. bella
  • 333 篇 d. calvet
  • 333 篇 c. amelung
  • 331 篇 j. strandberg
  • 327 篇 g. spigo
  • 327 篇 f. siegert
  • 320 篇 r. ströhmer
  • 320 篇 m. rijssenbeek
  • 320 篇 s. jin
  • 320 篇 g. gaudio
  • 320 篇 s. mohapatra
  • 312 篇 s. guindon
  • 308 篇 a. kaczmarska
  • 302 篇 y. tayalati
  • 302 篇 j. schaarschmidt
  • 293 篇 a. d. pilkington
  • 291 篇 l. chevalier
  • 286 篇 m. klein

语言

  • 4,611 篇 英文
  • 720 篇 其他
  • 19 篇 中文
  • 6 篇 日文
  • 4 篇 德文
  • 2 篇 俄文
  • 2 篇 土耳其文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Informatics and Computer Engineering"
5350 条 记 录,以下是461-470 订阅
排序:
Investigation of the separation zone for split-domain light field visualization  28
Investigation of the separation zone for split-domain light ...
收藏 引用
2024 28th International Conference on Information Technology, IT 2024
作者: Javidi, Kamran Martini, Maria G. Kara, Peter A. School of Computer Science and Mathematics Faculty of Engineering Computing and the Environment Kingston University Wireless Multimedia and Networking Research Group Department of Computer Science Penrhyn Road Campus Kingston upon Thames LondonKT1 2EE United Kingdom Budapest University of Technology and Economics Faculty of Electrical Engineering and Informatics Department of Networked Systems and Services Budapest1111 Hungary
Light field visualization commonly provides a single content over the entire field of view. However, the angularly-selective nature of the technology enables the simultaneous visualization of different contents at dif... 详细信息
来源: 评论
Generating All Invertible Matrices by Row Operations  35
Generating All Invertible Matrices by Row Operations
收藏 引用
35th International Symposium on Algorithms and Computation, ISAAC 2024
作者: Gregor, Petr Hoang, Hung P. Merino, Arturo Mička, Ondřej Department of Theoretical Computer Science and Mathematical Logic Charles University Prague Czech Republic Algorithm and Complexity Group Faculty of Informatics TU Wien Austria Institute of Engineering Sciences Universidad de O’Higgins Rancagua Chile
We show that all invertible n × n matrices over any finite field Fq can be generated in a Gray code fashion. More specifically, there exists a listing such that (1) each matrix appears exactly once, and (2) two c... 详细信息
来源: 评论
Enhancing IT Risk Management in XYZ Vocational School: Leveraging COBIT 5 Framework with the APO12 Domain
Enhancing IT Risk Management in XYZ Vocational School: Lever...
收藏 引用
2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems, ICETSIS 2024
作者: Winanti Fernando, Erick Gate, Jullend Universitas Insan Pembangunan Department of Information Systems Indonesia Universitas Multimedia Nusantara Information System Faculty of Engineering and Informatics Tangerang Indonesia Bina Nusantara University Binus Online Learning Computer Science Department Jakarta Indonesia
This article explores the importance of IT risk management, especially at XYZ Vocational School. The agency is equipped to manage business risks, emphasizing the need to improve decision-making and risk mitigation by ... 详细信息
来源: 评论
Efficient Detection of Knee Osteoporosis Using the Swin Transformer on X-Ray Images
Efficient Detection of Knee Osteoporosis Using the Swin Tran...
收藏 引用
2024 International Conference on computer and Applications, ICCA 2024
作者: Sultana, Rahat Zaman, Muhammad Ivković, Nikola Cengiz, Korhan Rafaqat, Iqra Akhunzada, Adnan The University of Lahore Faculty of Computer Science Sargodha Pakistan Comsats University Islamabad Department of Computer Science Islamabad Pakistan University of Zagreb Faculty of Organization and Informatics Varaždin Croatia Biruni University Department of E&e Engineering Istanbul Turkey University of Doha for Science and Technology Department of Data and Cybersecurity Doha24449 Qatar
Knee Osteoporosis (KOP) is a skeletal disease that is caused by low bone mineral density and the degradation of bone tissue. It increases the risk of bone fractures in the knee region and is commonly seen in older peo... 详细信息
来源: 评论
Comparative Analysis of Brain Waves for EEG-Based Depression Detection in the Prefrontal Cortex Lobe using LSTM
Comparative Analysis of Brain Waves for EEG-Based Depression...
收藏 引用
Conference on New Media Studies (CoNMedia)
作者: Monica Pratiwi Department of Computer Engineering Faculty of Engineering and Informatics Universitas Multimedia Nusantara Tangerang Indonesia
Global anxiety and depression have become 25% more prevalent, with teenagers and women being the most affected. Approximately 280 million people suffer from depression. Doctors and psychologists are able to diagnose d...
来源: 评论
Improved Accuracy of Decision Tree with XGBoost Technique in Cat Skin Disease Diagnosis
Improved Accuracy of Decision Tree with XGBoost Technique in...
收藏 引用
Science and Information Technology in Smart Administration (ICSINTESA), International Conference of
作者: Nanda Safrina Maya Silvi Lydia Benny Benyamin Nasution Master of Informatics Faculty of Computer Science and Information Technology Universitas Sumatera Utara Medan Indonesia Department of Computer Engineering and Informatics Politeknik Negeri Medan Medan Indonesia
This research aims to develop an expert system for initial diagnoses of skin diseases in cats using the Decision Tree method. It assists cat owners in identifying skin diseases based on observed symptoms. Data from ex... 详细信息
来源: 评论
A Deep Learning Driven Feature Based Steganalysis Approach
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 2213-2225页
作者: Yuchen Li Baohong Ling Donghui Hu Shuli Zheng Guoan Zhang College of Computer Science and Information Engineering Hefei University of TechnologyHefei230009China College of Information Engineering Anhui Broadcasting Movie and Television CollegeHefei230011China Department of Informatics Faculty of Natural&Mathematical SciencesKing’s College LondonLondonWC2R2LSUK
The goal of steganalysis is to detect whether the cover carries the secret information which is embedded by steganographic *** traditional ste-ganalysis detector is trained on the stego images created by a certain typ... 详细信息
来源: 评论
Optimization Accuracy of CNN Model by Utilizing CLAHE Parameters in Image Classification Problems
Optimization Accuracy of CNN Model by Utilizing CLAHE Parame...
收藏 引用
2023 International Conference on Networking, Electrical engineering, computer Science, and Technology, IConNECT 2023
作者: Wanto, Anjar Yuhandri, Yuhandri Okfalisa, Okfalisa Universitas Putra Indonesia Yptk Padang Information Technology Faculty of Computer Science Padang Indonesia Universitas Putra Indonesia Yptk Padang Faculty of Computer Science Department of Information Technology Padang Indonesia Universitas Islam Negeri Sultan Syarif Faculty of Science and Technology Department Informatics Engineering Kasim Riau Indonesia
This study aims to optimize popular Convolutional Neural Network (CNN) models, such as ResNet50, InceptionV4, VGG19, MobileNetV1, MobileNetV2, MobileNetV3 Small, and MobileNetV3 Large, by utilizing the CLAHE (Contrast... 详细信息
来源: 评论
An Automated Real-Time Face Mask Detection System Using Transfer Learning with Faster-RCNN in the Era of the COVID-19 Pandemic
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 4151-4166页
作者: Maha Farouk S.Sabir Irfan Mehmood Wafaa Adnan Alsaggaf Enas Fawai Khairullah Samar Alhuraiji Ahmed S.Alghamdi Ahmed A.Abd El-Latif Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversitySaudi Arabia Centre for Visual Computing Faculty of Engineering and InformaticsUniversity of BradfordBradfordU.K Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahP.O.Box 23713Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahSaudi Arabia Department of Mathematics and Computer Science Faculty of ScienceMenoufia University32511Egypt
Today,due to the pandemic of COVID-19 the entire world is facing a serious health *** to the World Health Organization(WHO),people in public places should wear a face mask to control the rapid transmission of *** gove... 详细信息
来源: 评论
Comparison of Kernels on Support Vector Machine (SVM) Methods for Analysis of Cyberbullying  6
Comparison of Kernels on Support Vector Machine (SVM) Method...
收藏 引用
6th International Conference on Information Technology, Information Systems and Electrical engineering, ICITISEE 2022
作者: Wijayanti, Sal Sabila Utami, Ema Yaqin, Ainul Universitas Amikom Yogyakarta Master of Informatics Engineering Yogyakarta Indonesia Universitas Amikom Yogyakarta Computer Science Faculty Yogyakarta Indonesia
Along with the development of social media, there are various abuses and deviations from the ethics of interaction by its users. One form of social media abuse is cyberbullying. Recently, cyberbullying has become more... 详细信息
来源: 评论