咨询与建议

限定检索结果

文献类型

  • 30,099 篇 会议
  • 15,249 篇 期刊文献
  • 424 册 图书

馆藏范围

  • 45,772 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 27,053 篇 工学
    • 19,677 篇 计算机科学与技术...
    • 15,871 篇 软件工程
    • 6,594 篇 信息与通信工程
    • 4,787 篇 控制科学与工程
    • 3,258 篇 电气工程
    • 3,079 篇 生物工程
    • 2,875 篇 电子科学与技术(可...
    • 2,528 篇 生物医学工程(可授...
    • 2,125 篇 机械工程
    • 1,597 篇 仪器科学与技术
    • 1,560 篇 光学工程
    • 1,439 篇 动力工程及工程热...
    • 1,288 篇 安全科学与工程
    • 1,183 篇 化学工程与技术
    • 1,139 篇 网络空间安全
    • 1,102 篇 交通运输工程
  • 14,867 篇 理学
    • 7,110 篇 数学
    • 4,649 篇 物理学
    • 3,544 篇 生物学
    • 2,302 篇 统计学(可授理学、...
    • 2,011 篇 系统科学
    • 1,307 篇 化学
  • 8,421 篇 管理学
    • 5,250 篇 管理科学与工程(可...
    • 3,604 篇 图书情报与档案管...
    • 2,645 篇 工商管理
  • 2,862 篇 医学
    • 2,427 篇 临床医学
    • 2,137 篇 基础医学(可授医学...
    • 1,276 篇 公共卫生与预防医...
    • 1,221 篇 药学(可授医学、理...
  • 1,439 篇 法学
    • 1,154 篇 社会学
  • 954 篇 经济学
  • 722 篇 农学
  • 712 篇 教育学
  • 226 篇 文学
  • 118 篇 军事学
  • 88 篇 艺术学
  • 8 篇 哲学
  • 5 篇 历史学

主题

  • 1,374 篇 computer science
  • 1,088 篇 deep learning
  • 1,042 篇 accuracy
  • 928 篇 machine learning
  • 888 篇 feature extracti...
  • 844 篇 internet of thin...
  • 795 篇 computational mo...
  • 667 篇 training
  • 564 篇 information tech...
  • 560 篇 artificial intel...
  • 535 篇 support vector m...
  • 524 篇 real-time system...
  • 497 篇 data mining
  • 479 篇 security
  • 444 篇 predictive model...
  • 402 篇 monitoring
  • 379 篇 cloud computing
  • 352 篇 optimization
  • 340 篇 data models
  • 339 篇 databases

机构

  • 297 篇 faculty of scien...
  • 287 篇 department for p...
  • 284 篇 department of ph...
  • 282 篇 departamento de ...
  • 276 篇 department of ph...
  • 274 篇 department of ph...
  • 271 篇 department of ph...
  • 266 篇 department of ph...
  • 256 篇 faculté des scie...
  • 232 篇 department of ph...
  • 229 篇 department of co...
  • 228 篇 department of ph...
  • 216 篇 physics division...
  • 192 篇 cavendish labora...
  • 174 篇 yerevan physics ...
  • 169 篇 institute of phy...
  • 169 篇 institute of phy...
  • 168 篇 school of physic...
  • 164 篇 department of ph...
  • 163 篇 kirchhoff-instit...

作者

  • 275 篇 c. alexa
  • 273 篇 j. m. izen
  • 273 篇 c. amelung
  • 271 篇 g. bella
  • 271 篇 j. strandberg
  • 271 篇 d. calvet
  • 270 篇 g. spigo
  • 268 篇 f. siegert
  • 262 篇 m. klein
  • 261 篇 r. ströhmer
  • 259 篇 m. rijssenbeek
  • 255 篇 s. jin
  • 253 篇 h. a. gordon
  • 253 篇 g. gaudio
  • 251 篇 a. c. könig
  • 247 篇 y. tayalati
  • 243 篇 h. sakamoto
  • 241 篇 s. mohapatra
  • 236 篇 d. guest
  • 214 篇 y. nagasaka

语言

  • 43,894 篇 英文
  • 1,399 篇 其他
  • 452 篇 中文
  • 61 篇 日文
  • 11 篇 法文
  • 8 篇 德文
  • 5 篇 斯洛文尼亚文
  • 4 篇 荷兰文
  • 2 篇 朝鲜文
  • 2 篇 俄文
检索条件"机构=Faculty of Science Computer & Information Technology Department of Computer System and Technology"
45772 条 记 录,以下是4941-4950 订阅
排序:
Zone-of-Interest Strategy for the Creation of High-Resolution Adversarial Images Against Convolutional Neural Networks  15
Zone-of-Interest Strategy for the Creation of High-Resolutio...
收藏 引用
15th International Conference on information technology and Electrical Engineering, ICITEE 2023
作者: Leprévost, Franck Topal, Ali Osman Mancellari, Enea Lavangnananda, Kittichai University of Luxembourg Faculty of Science Technology and Medicine Department of Computer Science Luxembourg
Trained convolutional neural networks (CNNs) are among the leading tools used for the automatic classification of images. They are nevertheless exposed to attacks: Given an input clean image classified by a CNN in a c... 详细信息
来源: 评论
A Secure User Authenticated Scheme in Intelligent Manufacturing system  23rd
A Secure User Authenticated Scheme in Intelligent Manufactur...
收藏 引用
23rd International computer Symposium, ICS 2018
作者: Chen, Ming-Te Liu, Hao-Yu Lai, Chien-Hung Wang, Wen-Shiang Huang, Chao-Yang Department of Computer Science and Information Technology National Chin-Yi University of Technology Taichung Taiwan
In recently years, intelligent manufacturing system is getting grown up. There are many manufacturing vendors that investigate to develop their intelligent manufacturing systems in their product line. Our government a... 详细信息
来源: 评论
Machine Learning Approaches for Quality Control in Pulp Packaging Manufacturers  20
Machine Learning Approaches for Quality Control in Pulp Pack...
收藏 引用
20th International Joint Conference on computer science and Software Engineering, JCSSE 2023
作者: Ceesay, Rattana Boonchoo, Thapana Rattanatamrong, Prapaporn Thammasat University Faculty of Science and Technology Department of Computer Science Pathumthani Thailand
In molded pulp packaging manufacturing, defect detection and classification processes are critical to ensuring the products meet quality criteria. Yet most manufacturers still rely on human-based manual visual defect ... 详细信息
来源: 评论
Interaction between sunlight and the sky colour with 3D objects in the outdoor virtual environment
Interaction between sunlight and the sky colour with 3D obje...
收藏 引用
Asia Modelling Symposium 2010: 4th International Conference on Mathematical Modelling and computer Simulation, AMS2010
作者: Halawani, Sami M. Sunar, Mohd Shahrizal Faculty of Computing and Information Technology King Abdulaziz University Rabigh Saudi Arabia ViCubeLab Faculty of Computer Science and Information System Universiti Teknologi Malaysia Skudai Johor Malaysia
The sky has always been the crucial element in modeling the background of an outdoor scene. The position of the sun during the day gives a different impact on the sky colour. The sky colour indirectly affects the colo... 详细信息
来源: 评论
ExploreCSEd: Exploring skills and difficulties in programming education  05
ExploreCSEd: Exploring skills and difficulties in programmin...
收藏 引用
ITiCSE 2005: 10th Annual SIGCSE Conference on Innovation and technology in computer science Education
作者: Stamouli, Ioanna Begum, Marjahan Mancy, Rebecca Computer Science Department University of Dublin Trinity College School of Computer Science and Information Technology University of Nottingham Centre for Science Education Faculty of Education University of Glasgow
ExploreCSEd is a collaborative project funded by the HE Academy - information and computer sciences. The aim of the project is to investigate the skills and difficulties involved in learning to program by gathering da... 详细信息
来源: 评论
Iterative Learning Control for Linear systems with Markov Data Dropouts:Noise-free Case  36
Iterative Learning Control for Linear Systems with Markov Da...
收藏 引用
第36届中国控制会议
作者: Dong Shen Jian-Xin Xu College of Information Science and Technology Beijing University of Chemical Technology Department of Electrical and Computer Engineering National University of Singapore
This paper contributes to the convergence analysis of iterative learning control(ILC) for a linear time-varying system with measurement data dropouts,where the data dropout problem is formulated by a Markov chain *** ... 详细信息
来源: 评论
An approach to detect known and unknown worm attacks by using vulnerability analysis model
An approach to detect known and unknown worm attacks by usin...
收藏 引用
9th International Conference on Intelligent Technologies, Intech'08
作者: Jain, Navneet Santiprabhob, Pratit Department of Computer Science Faculty of Science and Technology Assumption University Bangkok Thailand
computer security has always been threatened by viruses and worms. Buffer overflow type of worm attacks are the most common attack methods because of the existence of buffer overflow vulnerability in huge number of so... 详细信息
来源: 评论
Implement of salary prediction system to improve student motivation using data mining technique  11
Implement of salary prediction system to improve student mot...
收藏 引用
11th International Conference on Knowledge, information and Creativity Support systems, KICSS 2016
作者: Khongchai, Pornthep Songmuang, Pokpong Department of Computer Science Faculty of Science and Technology Thammasat University Pathumthani Thailand
This paper presents a salary prediction system using a profile of graduated students as a model. A data mining technique is applied to generate a model to predict a salary for individual students who have similar attr... 详细信息
来源: 评论
Bug Prioritization Using Average One Dependence Estimator
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3517-3533页
作者: Kashif Saleem Rashid Naseem Khalil Khan Siraj Muhammad Ikram Syed Jaehyuk Choi Department of IT and Computer Science Institute of Applied Sciences and TechnologyPakAustriaFochhshuleHaripurPakistan Faculty of Computer Sciences and Information Technology Superior UniversityLahore54660Pakistan Department of Computer Science Shaheed Benazir Bhutto UniversitySheringalUpper DirKhyber PakhtunkhwaPakitan School of Computing Gachon University1342Seongnam-daeroSujeong-guSeongnam-si13120Korea
Automation software need to be continuously updated by addressing software bugs contained in their ***,bugs have different levels of importance;hence,it is essential to prioritize bug reports based on their sever-ity ... 详细信息
来源: 评论
Towards integration of FP weights into CP class complexity evaluation for effort estimation
Towards integration of FP weights into CP class complexity e...
收藏 引用
5th International Conference on New Trends in information science and Service science, NISS 2011
作者: Wei, Koh Tieng Selamat, Mohd Hasan Ghani, Abdul Azim Abdul Abdullah, Rusli Department of Information Systems Faculty of Computer Science and Information Technology University Putra Malaysia 43400 Selangor Darul Ehsan Malaysia
Software development effort estimation is vital to project success. Both underestimates and overestimates of software effort are universal phenomenon in the software industry, which is critical for resource allocation... 详细信息
来源: 评论