咨询与建议

限定检索结果

文献类型

  • 30,328 篇 会议
  • 15,066 篇 期刊文献
  • 430 册 图书

馆藏范围

  • 45,824 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 27,068 篇 工学
    • 19,575 篇 计算机科学与技术...
    • 15,822 篇 软件工程
    • 6,517 篇 信息与通信工程
    • 4,764 篇 控制科学与工程
    • 3,143 篇 电气工程
    • 3,070 篇 生物工程
    • 2,844 篇 电子科学与技术(可...
    • 2,527 篇 生物医学工程(可授...
    • 2,104 篇 机械工程
    • 1,586 篇 仪器科学与技术
    • 1,538 篇 光学工程
    • 1,419 篇 动力工程及工程热...
    • 1,268 篇 安全科学与工程
    • 1,167 篇 化学工程与技术
    • 1,117 篇 网络空间安全
    • 1,084 篇 交通运输工程
  • 14,735 篇 理学
    • 7,087 篇 数学
    • 4,613 篇 物理学
    • 3,519 篇 生物学
    • 2,317 篇 统计学(可授理学、...
    • 2,002 篇 系统科学
    • 1,293 篇 化学
  • 8,389 篇 管理学
    • 5,227 篇 管理科学与工程(可...
    • 3,593 篇 图书情报与档案管...
    • 2,641 篇 工商管理
  • 2,828 篇 医学
    • 2,411 篇 临床医学
    • 2,113 篇 基础医学(可授医学...
    • 1,270 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,436 篇 法学
    • 1,152 篇 社会学
  • 946 篇 经济学
  • 716 篇 农学
  • 714 篇 教育学
  • 224 篇 文学
  • 117 篇 军事学
  • 87 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,375 篇 computer science
  • 1,104 篇 deep learning
  • 1,085 篇 accuracy
  • 911 篇 machine learning
  • 907 篇 feature extracti...
  • 849 篇 internet of thin...
  • 810 篇 computational mo...
  • 682 篇 training
  • 567 篇 information tech...
  • 561 篇 real-time system...
  • 561 篇 artificial intel...
  • 543 篇 support vector m...
  • 505 篇 data mining
  • 487 篇 security
  • 454 篇 predictive model...
  • 406 篇 monitoring
  • 388 篇 cloud computing
  • 359 篇 optimization
  • 354 篇 reliability
  • 350 篇 data models

机构

  • 297 篇 faculty of scien...
  • 290 篇 department for p...
  • 281 篇 department of ph...
  • 280 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 272 篇 department of ph...
  • 270 篇 department of ph...
  • 253 篇 faculté des scie...
  • 235 篇 department of ph...
  • 232 篇 department of co...
  • 230 篇 department of ph...
  • 218 篇 physics division...
  • 195 篇 cavendish labora...
  • 172 篇 yerevan physics ...
  • 169 篇 institute of phy...
  • 169 篇 school of physic...
  • 168 篇 institute of phy...
  • 162 篇 department of ph...
  • 162 篇 kirchhoff-instit...

作者

  • 276 篇 c. alexa
  • 274 篇 c. amelung
  • 273 篇 j. m. izen
  • 272 篇 g. bella
  • 272 篇 j. strandberg
  • 272 篇 d. calvet
  • 270 篇 g. spigo
  • 268 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 256 篇 s. jin
  • 255 篇 g. gaudio
  • 253 篇 h. a. gordon
  • 251 篇 a. c. könig
  • 248 篇 y. tayalati
  • 245 篇 s. mohapatra
  • 243 篇 h. sakamoto
  • 235 篇 d. guest
  • 217 篇 y. nagasaka

语言

  • 40,466 篇 英文
  • 4,887 篇 其他
  • 471 篇 中文
  • 62 篇 日文
  • 19 篇 德文
  • 17 篇 法文
  • 14 篇 斯洛文尼亚文
  • 7 篇 俄文
  • 2 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45824 条 记 录,以下是1511-1520 订阅
排序:
EDSA-Ensemble: an Event Detection Sentiment Analysis Ensemble Architecture
收藏 引用
IEEE Transactions on Affective Computing 2024年 第2期16卷 1-18页
作者: PETRESCU, Alexandru TRUICA, Ciprian-Octavian APOSTOL, Elena-Simona PASCHKE, Adrian Computer Science and Engineering Department Faculty of Automatic Control and Computers National University of Science and Technology Politehnica Bucharest Bucharest Romania Fraunhofer Institute for Open Communication Systems Berlin Germany
As global digitization continues to grow, technology becomes more affordable and easier to use, and social media platforms thrive, becoming the new means of spreading information and news. Communities are built around... 详细信息
来源: 评论
Advancing Mixed Reality Game Development: An Evaluation of a Visual Game Analytics Tool in Action-Adventure and FPS Genres
收藏 引用
Proceedings of the ACM on Human-computer Interaction 2024年 第CHI PLAY期8卷 1-32页
作者: Sargolzaei, Parisa Rastogi, Mudit Zaman, Loutfouz Faculty of Business and Information Technology Ontario Tech University 2000 Simcoe St N OshawaONL1G 0C5 Canada Computer Science and Technology SRM Institute of Science and Technology SRM Nagar Chengalpattu District Tamil Nadu Kattankulathur603203 India
In response to the unique challenges of Mixed Reality (MR) game development, we developed GAMR, an analytics tool specifically designed for MR games. GAMR aims to assist developers in identifying and resolving gamepla... 详细信息
来源: 评论
High-Performance Intelligent system for Real-Time Medical Image Using Deep Learning and Augmented Reality  4th
High-Performance Intelligent System for Real-Time Medical Im...
收藏 引用
4th International Conference on IoT Based Control Networks and Intelligent systems, ICICNIS 2023
作者: Senthil, G.A. Prabha, R. Rajesh Kanna, R. Umadevi Venkat, G. Deepa, R. Department of Information Technology Agni College of Technology Chennai India Department of Electronics and Communication Engineering Sri Sai Ram Institute of Technology Chennai India Department of Computer Science and Engineering Agni College of Technology Chennai India Department of Computer Science and Engineering Vels Institute of Science and Technology and Advanced Studies Chennai India
Evolving new diseases demand the need for technology to identify the disease in an effective way. Medical imaging in the field of disease identification helps to identify the disease by scanning the human parts, there... 详细信息
来源: 评论
Image-Based Automatic Energy Meter Reading Using Deep Learning
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 203-216页
作者: Muhammad Imran Hafeez Anwar Muhammad Tufail Abdullah Khan Murad Khan Dzati Athiar Ramli Institute of Computer Sciences and Information Technology Faculty of Management and Computer SciencesThe University of AgriculturePeshawarPakistan Department of Electrical and Computer Engineering COMSATS University IslamabadAttock CampusAttock CityPakistan Kuwait College of Science and Technology Kuwait CityKuwait School of Electrical&Electronic Engineering USM Engineering CampusUniversiti Sains MalaysiaPenang14300Malaysia
We propose to perform an image-based framework for electrical energy meter *** aim is to extract the image region that depicts the digits and then recognize them to record the consumed *** the readings of serial numbe... 详细信息
来源: 评论
Text Prediction Zero Probability Problem Handling with N-gram Model and Laplace Smoothing
Text Prediction Zero Probability Problem Handling with N-gra...
收藏 引用
2022 International Conference on Advancement in Electrical and Electronic Engineering, ICAEEE 2022
作者: Mimi, Raonak Jahan Masud, Md Abdul Rahman, Rifat Dina, Nusrat Sultana Patuakhali Science and Technology University Faculty of Computer Science and Engineering Bangladesh Patuakhali Science and Technology University Department of Computer Science and Information Technology Bangladesh
In Natural Language Processing, text prediction represents the process of predicting the word with the highest probability through a predictive language model from a series of text corpus. The N-gram model is familiar... 详细信息
来源: 评论
Beyond Boundaries:Strengthening the Fabric of IoT Security through Blockchain Innovations  18
Beyond Boundaries:Strengthening the Fabric of IoT Security t...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Nisa, Khair Ul Alqahtani, Hanan Saad Fatima, Ummatul Lhioui, Chahira Helali, Rasha Gaffer Mohammed Hussain, Gousiya University of Bisha Department of Computer Science and Information Technology Saudi Arabia King Khalid University Department of Computer Saudi Arabia Aligarh Muslim University Faculty of Science Department of Statistics and Operations Research Aligarh India Mewar University Department of Computer Sciences Chittorgarh India
Blockchain technology has been utilized to bypass regulations on IoT security. Blockchain technology provides numerous benefits that can improve the security of Internet of Things devices with limited resources, such ... 详细信息
来源: 评论
Cloud computing-enabled IIOT system for neurosurgical simulation using augmented reality data acces
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 347-357页
作者: Jun Liu Kai Qian Zhibao Qin Mohammad Dahman Alshehri Qiong Li Yonghang Tai Yunnan Key Laboratory of Opto-electronic Information Technology Yunnan Normal UniversityKunming650500China Department of Thoracic Surgery Institute of The First People's Hospital of Yunnan ProvinceKunmingChina Faculty of Life and Biotechnology Kunming University of Science and TechnologyKunmingChina Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia
In recent years,statistics have indicated that the number of patients with malignant brain tumors has increased ***,most surgeons still perform surgical training using the traditional autopsy and prosthesis model,whic... 详细信息
来源: 评论
Intense Triad Defender for End-User Security in Cyber Physical system  2
Intense Triad Defender for End-User Security in Cyber Physic...
收藏 引用
2nd IEEE International Conference on Networking and Communications, ICNWC 2024
作者: Sheryl Sharon, G. Maranco, M. Nidhya, R. Sivakumar, M. Coimbatore Institute of Technology Department of Computer Science and Engineering Coimbatore641014 India SRM Institute of Science and Technology School of Computing Faculty of Engineering and Technology Department of Networking and Communications Kattankulathur603203 India Madanapalle Institute of Technology and Science Department of Computer Science and Engineering Andhra Pradesh Madanapalle India
The rapid advancement of technology has undoubtedly brought comfort to humanity, but it also necessitates robust authentication measures to ensure security in the ever-expanding e-world. This research aims to address ... 详细信息
来源: 评论
L1Norm Minimization in ISAR Imaging  23
L1Norm Minimization in ISAR Imaging
收藏 引用
23rd International Symposium on Electrical Apparatus and Technologies, SIELA 2024
作者: Lazarov, Andon Minchev, Dimitar Nikola Vaptzarov Naval Academy Information Technology Department Varna Bulgaria Burgas Free University Computer Science and Engineering Faculty Burgas Bulgaria
This work deals with an ISAR (Inverse Synthetic Aperture Radar) image enhancement algorithm using target's sparse image and image's l1 norm minimization. As calculation of l1 norm of two-dimensional (2D) image... 详细信息
来源: 评论
Expert Phishing Detection system
Expert Phishing Detection System
收藏 引用
2024 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications technology, IAICT 2024
作者: Alsarhan, Ayoub Al-Aiash, Issa Al-Fraihat, Dimah Aljaidi, Mohammad Abu Laila, Dena Abd Al Hakem Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Cybersecurity Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman11622 Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa13110 Jordan Department of Cyber Security Faculty of Information Technology Zarqa Technical Intermediate College Zarqa Jordan
Phishing attacks are a threat that continuously emphasizes the need for effective detection methods. This paper presents a machine learning detection method that employs a random forest classifier, which is an adaptab... 详细信息
来源: 评论