咨询与建议

限定检索结果

文献类型

  • 528 篇 会议
  • 291 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 837 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 519 篇 工学
    • 399 篇 计算机科学与技术...
    • 332 篇 软件工程
    • 92 篇 信息与通信工程
    • 87 篇 控制科学与工程
    • 53 篇 生物工程
    • 50 篇 生物医学工程(可授...
    • 42 篇 电气工程
    • 38 篇 电子科学与技术(可...
    • 34 篇 机械工程
    • 27 篇 光学工程
    • 24 篇 安全科学与工程
    • 23 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 18 篇 动力工程及工程热...
    • 18 篇 土木工程
    • 17 篇 建筑学
    • 15 篇 交通运输工程
  • 236 篇 理学
    • 127 篇 数学
    • 67 篇 生物学
    • 66 篇 物理学
    • 48 篇 统计学(可授理学、...
    • 37 篇 系统科学
    • 17 篇 化学
  • 172 篇 管理学
    • 118 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 53 篇 工商管理
  • 49 篇 医学
    • 43 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 22 篇 药学(可授医学、理...
  • 27 篇 法学
    • 21 篇 社会学
  • 14 篇 经济学
  • 12 篇 教育学
  • 11 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学

主题

  • 26 篇 deep learning
  • 24 篇 software enginee...
  • 23 篇 machine learning
  • 19 篇 artificial intel...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 16 篇 software testing
  • 12 篇 computer science
  • 12 篇 data mining
  • 12 篇 feature extracti...
  • 11 篇 computer communi...
  • 11 篇 optimization
  • 11 篇 computers
  • 11 篇 mathematical mod...
  • 10 篇 monitoring
  • 10 篇 software
  • 9 篇 internet of thin...
  • 9 篇 surveys
  • 9 篇 reliability
  • 9 篇 servers

机构

  • 12 篇 faculty of compu...
  • 12 篇 faculty of softw...
  • 11 篇 department of so...
  • 11 篇 faculty of compu...
  • 10 篇 state key labora...
  • 9 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 department of so...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 faculty of compu...
  • 8 篇 department of co...
  • 8 篇 dept. of technol...
  • 8 篇 itmo university ...
  • 8 篇 university of re...
  • 7 篇 faculty of infoc...
  • 7 篇 gamf faculty of ...
  • 6 篇 saint-petersburg...
  • 6 篇 department of ap...

作者

  • 19 篇 zamli kamal z.
  • 12 篇 ahmed bestoun s.
  • 12 篇 noraziah ahmad
  • 10 篇 ahmad noraziah
  • 9 篇 herawan tutut
  • 8 篇 bei zeng
  • 8 篇 ali zeeshan ijaz
  • 8 篇 nisar ali
  • 8 篇 ali raja hashim
  • 8 篇 jasni mohamad za...
  • 8 篇 zhengfeng ji
  • 8 篇 ali nisar
  • 8 篇 raja hashim ali
  • 7 篇 zain ul abideen
  • 7 篇 din fakhrud
  • 7 篇 usama arshad
  • 7 篇 omatu s.
  • 7 篇 arshad usama
  • 7 篇 sidek roslina mo...
  • 7 篇 mohamad m.s.

语言

  • 803 篇 英文
  • 27 篇 其他
  • 5 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Software Engineering and Computer Systems Itmo University"
837 条 记 录,以下是241-250 订阅
排序:
An Efficient Hardware Accelerator For Lossless Data Compression
An Efficient Hardware Accelerator For Lossless Data Compress...
收藏 引用
International Conference on Communications, Signal Processing, and their Applications (ICCSPA)
作者: Adel Mahmoud Samuel Medhat Mark Maged Othman Mohamed Reham Karam Khaled Salah M. Watheq El-Kharashi Department of computer and systems Faculty of engineering Ain Shams University Cairo Egypt Siemens Digital Industries Software Fremont USA
Data compression is a trending field that is used in data storage and data transmission systems. Lossy compression means that data cannot be completely retrieved while in lossless compression the compressed data must ... 详细信息
来源: 评论
On Understanding Sports–HAR: Hierarchical, Mobile, Multi-Sensor based Classification of Table–Tennis Strokes
On Understanding Sports–HAR: Hierarchical, Mobile, Multi-Se...
收藏 引用
Intelligent Methods, systems, and Applications (IMSA)
作者: Mustafa Ezzeldin Amr S. Ghoneim Laila Abdelhamid Ayman Atia Faculty of Computers and AI Software Engineering Helwan University Cairo Egypt Faculty of Computers and AI Computer Science Helwan University Cairo Egypt Faculty of Computers and AI Information Systems Helwan University Cairo Egypt HCI-LAB Faculty of Computers and AI Computer Science Helwan Univeristy Cairo Egypt Faculty of Computer Science October University for Modern Sciences and Arts (MSA) Giza Egypt
Table Tennis is a renowned competitive and recreational sport. An Olympic sport since 1988, table tennis in-cludes several movements, shots (i.e., strokes), and positions. Consequently, many factors can affect the str...
来源: 评论
Intelligent Gender Recognition System for Classification of Gender in Malaysian Demographic  5th
Intelligent Gender Recognition System for Classification of ...
收藏 引用
5th International Conference on Electrical, Control and computer engineering, InECCE 2019
作者: Chi, Yap Su Kamarulzaman, Syafiq Fauzi Faculty of Computer Systems & Software Engineering University of Malaysia Pahang Kuantan Malaysia
Identification of a person gender as a man or woman based on the past experiences through features of face such as eyes, mouth, cheek can be obtained through an intelligent gender recognition system. Detection of a pe... 详细信息
来源: 评论
Transformative Applications and Key Challenges of Generative AI
Transformative Applications and Key Challenges of Generative...
收藏 引用
International IEEE Conference and Workshop: Óbuda on Electrical and Power engineering (CANDO-EPE)
作者: Attila Kovari Jozsef Katona Institute of Electronics and Communication Systems Kandó Kálmán Faculty of Electrical Engineering Obuda University Budapest Hungary Institute of Digital Technology Faculty of Computer Science Eszterházy Károly Catholic University Eger Hungary Department of Institute of Engineering University of Dunaújváros Dunaujvaros Hungary GAMF Faculty of Engineering and Computer Science John Von Neumann University Kecskemét Hungary Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Business University Budapest Hungary
The paper discusses the integration and use of generative artificial intelligence technologies in education. Generative AI, such as OpenAI, in particular the GPT model, has fundamentally changed the way humans interac... 详细信息
来源: 评论
N-Gram-Based Machine Learning Approach for Bot or Human Detection from Text Messages  22
N-Gram-Based Machine Learning Approach for Bot or Human Dete...
收藏 引用
6th International Conference on Intelligent systems, Metaheuristics and Swarm Intelligence, ISMSI 2022
作者: Kavadi, Durga Prasad Sanaboina, Chandra Sekhar Patan, Rizwan Gandomi, Amir Department Of Information Technology B V Raju Institute Of Technology Narsapur Telangana India Department Of Computer Science And Engineering University College Of Engineering Kakinada Jawaharlal Nehru Technological University Kakinada India Decentralized Science Lab College Of Computing And Software Engineering Kennesaw State University MariettaGA30060 United States Faculty Of Engineering And Information Systems University Of Technology Sydney UltimoNSW Australia
Social bots are computer programs created for automating general human activities like the generation of messages. The rise of bots in social network platforms has led to malicious activities such as content pollution... 详细信息
来源: 评论
Data-Filtered Prediction with Decomposition and Amplitude-Aware Permutation Entropy for Workload and Resource Utilization in Cloud Data Centers
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yuan, Haitao Hu, Qinglong Wang, Meijia Wang, Shen Bi, Jing Buyya, Rajkumar Shi, Shuyuan Yang, Jinhong Zhang, Jia Zhou, MengChu Beihang University School of Automation Science and Electrical Engineering Beijing100191 China City University of Hong Kong Department of Computer Science Hong Kong999077 Hong Kong Beijing University of Technology School of Software Engineering The Faculty of Information Technology Beijing100124 China Lab School of Computing and Information Systems MelbourneVIC3010 Australia Beihang University School of Integrated Circuit Science and Engineering Beijing China CSSC Systems Engineering Research Institute Beijing China Southern Methodist University Department of Computer Science The Lyle School of Engineering DallasTX75205 United States New Jersey Institute of Technology Department of Electrical and Computer Engineering NewarkNJ07102 United States
In recent years, cloud computing has witnessed widespread applications across numerous organizations. Predicting workload and computing resource data can facilitate proactive service operation management, leading to s... 详细信息
来源: 评论
A Review of Algorithms’s Complexities on Different Valued Sorted and Unsorted Data
A Review of Algorithms’s Complexities on Different Valued S...
收藏 引用
IT and Industrial Technologies (ICIT), International Conference on
作者: Attia Shabbir Asad Majeed Mahnoor Iftikhar Raja Hashim Ali Usama Arshad Muhammad Zeeshan Shabbir Ali Zeeshan Ijaz Nisar Ali Ali Aftab Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany Department of Electrical Engineering University of Engineering & Technology (UET) Lahore Pakistan Faculty of Electronic Systems Engineering University of Regina Regina Canada
Sorting and searching are critical processes for effecttive data analysis. In this paper, we evaluate the performance of various sorting and searching algorithms and compare their time and space complexities on both s...
来源: 评论
Student Perceptions of AI-Enhanced Adaptive Learning systems: A Pilot Survey
Student Perceptions of AI-Enhanced Adaptive Learning Systems...
收藏 引用
International IEEE Conference and Workshop: Óbuda on Electrical and Power engineering (CANDO-EPE)
作者: Klara Ida Katonane Gyonyoru Jozsef Katona Department of Organizational Development and Communication Science Institute of Social Sciences University of Dunaujvaros Dunaujvaros Hungary Institute of Electronics and Communication Systems Kandó Kálmán Faculty of Electrical Engineering Obuda University Budapest Hungary Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary GAMF Faculty of Engineering and Computer Science John Von Neumann University Kecskemet Hungary Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Business University Budapest Hungary
Artificial Intelligence (AI) significantly enhances adaptive learning by personalizing and tailoring instruction to individual student needs. AI analyzes data in real-time to create personalized learning paths based o... 详细信息
来源: 评论
Determinants of under-five mortality in Zimbabwe: Evidence from the 2015–2016 Zimbabwe demographic Health Survey data
Women and Children Nursing
收藏 引用
Women and Children Nursing 2024年 第1期2卷 1-8页
作者: Elliot Mbunge Garikayi Chemhaka Tafadzwa Dzinamarira Enos Moyo Stephen Fashoto Benhildah Muchemwa Jolly Buwerimwe Ester Petrus Department of Computer Science Faculty of Science and Engineering University of Eswatini Kwaluseni Campus Kwaluseni M201 South Africa Department of Statistics and Demography Faculty of Social Sciences University of Eswatini Kwaluseni Campus Kwaluseni M201 South Africa School of Health Systems and Public Health University of Pretoria Pretoria 0002 South Africa StellenBosch University Matieland 7602 Stellenbosch South Africa Software Department Faculty of ICT International University of Management Windhoek Namibia
Background Child mortality is an important measure of a population’s health status. It is included in the third sustainable development goal that aims to improve global health by reducing under-five mortality to at l... 详细信息
来源: 评论
IP SafeGuard - An AI-Driven Malicious IP Detection Framework
收藏 引用
IEEE Access 2025年 13卷 90249-90261页
作者: Siam, Abdullah Al Alazab, Moutaz Awajan, Albara Hasan, Md Rakibul Obeidat, Areej Faruqui, Nuruzzaman Daffodil International University Daffodil Smart City Birulia Department of Software Engineering Dhaka1216 Bangladesh Oryx Universal College with Liverpool John Moores University School of Computing and Data Sciences Cybersecurity Department Doha34110 Qatar Al-Balqa Applied University Faculty of Artificial Intelligence Department of Intelligent Systems Al-Salt19385 Jordan Department of Computer Science and Engineering Dhaka Bangladesh Amman Jordan
The rising frequency and sophistication of cyberattacks have made real-time malicious IP detection a critical challenge for modern Security Operations Center (SOC). Traditional solutions, such as static blacklists and... 详细信息
来源: 评论