咨询与建议

限定检索结果

文献类型

  • 2,275 篇 会议
  • 1,317 篇 期刊文献
  • 74 册 图书

馆藏范围

  • 3,666 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,959 篇 工学
    • 1,448 篇 计算机科学与技术...
    • 1,210 篇 软件工程
    • 414 篇 信息与通信工程
    • 266 篇 控制科学与工程
    • 266 篇 生物工程
    • 234 篇 生物医学工程(可授...
    • 151 篇 电气工程
    • 134 篇 光学工程
    • 134 篇 电子科学与技术(可...
    • 125 篇 机械工程
    • 107 篇 化学工程与技术
    • 88 篇 仪器科学与技术
    • 88 篇 安全科学与工程
    • 72 篇 网络空间安全
  • 1,343 篇 理学
    • 588 篇 数学
    • 493 篇 物理学
    • 308 篇 生物学
    • 168 篇 统计学(可授理学、...
    • 134 篇 系统科学
    • 103 篇 化学
  • 659 篇 管理学
    • 365 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 201 篇 工商管理
  • 260 篇 医学
    • 219 篇 临床医学
    • 194 篇 基础医学(可授医学...
    • 124 篇 公共卫生与预防医...
    • 108 篇 药学(可授医学、理...
  • 101 篇 法学
    • 85 篇 社会学
  • 92 篇 教育学
    • 85 篇 教育学
  • 84 篇 经济学
    • 80 篇 应用经济学
  • 62 篇 农学
  • 9 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 84 篇 accuracy
  • 80 篇 machine learning
  • 71 篇 artificial intel...
  • 64 篇 deep learning
  • 63 篇 predictive model...
  • 62 篇 training
  • 61 篇 internet of thin...
  • 59 篇 feature extracti...
  • 57 篇 covid-19
  • 55 篇 informatics
  • 52 篇 computational mo...
  • 50 篇 convolutional ne...
  • 47 篇 optimization
  • 46 篇 support vector m...
  • 45 篇 data models
  • 44 篇 forecasting
  • 41 篇 data mining
  • 39 篇 monitoring
  • 37 篇 students
  • 35 篇 education

机构

  • 95 篇 faculty of compu...
  • 59 篇 faculty of infor...
  • 41 篇 department for p...
  • 40 篇 department of ph...
  • 40 篇 faculty of scien...
  • 40 篇 departamento de ...
  • 40 篇 department of ph...
  • 40 篇 yerevan physics ...
  • 40 篇 institute of phy...
  • 39 篇 department of ph...
  • 39 篇 kirchhoff-instit...
  • 39 篇 graduate school ...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 dipartimento di ...
  • 38 篇 fakultät für phy...
  • 37 篇 lehrstuhl für ex...
  • 37 篇 west university ...
  • 37 篇 institut für ast...
  • 37 篇 institute of phy...

作者

  • 44 篇 bacanin nebojsa
  • 42 篇 alfred rayner
  • 35 篇 mustafa mamat
  • 35 篇 zivkovic miodrag
  • 33 篇 nebojsa bacanin
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein

语言

  • 3,234 篇 英文
  • 418 篇 其他
  • 22 篇 中文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 日文
检索条件"机构=Faculty of computing and informatics"
3666 条 记 录,以下是281-290 订阅
排序:
Driving Simulator for Drivers Education with Artificial Intelligence Traffic and Virtual Reality: a Review  8th
Driving Simulator for Drivers Education with Artificial In...
收藏 引用
8th International Conference on Computational Science and Technology, ICCST 2021
作者: Cheng, Yun-Quan Mansor, Sarina Chin, Ji-Jian Karim, Hezerul Abdul Faculty of Engineering Multimedia University Selangor Cyberjaya Malaysia Faculty of Computing and Informatics Multimedia University Selangor Cyberjaya Malaysia
Simulators are games that give a sense of realism and simulate of the real world in a virtual world, such as racing games or serious medical training games. These have been widely documented to have positive effects o... 详细信息
来源: 评论
Geoelectrical subsurface characterization: A case study of saltwater intrusion in Kudat, Sabah  14
Geoelectrical subsurface characterization: A case study of s...
收藏 引用
14th Seminar on Science and Technology 2021, S and T 2021
作者: Ismail, Fatin Nabilahuda Musta, Baba Saleh, Hardianshah Yahya, Farashazillah Faculty of Science and Natural Resources Universiti Malaysia Sabah Malaysia Faculty of Computing and Informatics Universiti Malaysia Sabah Malaysia
Sa ltwa ter intrusion is one of the prima ry sources of groundwa ter conta mination, especia lly nea r the coa sta l line, a nd it is crucia l to monitor sa ltwa ter intrusion to protect fresh groundwa ter. Due to the... 详细信息
来源: 评论
CoinChain: Effective Coin Mixing Tool for Anonymous CryptoCurrency  8th
CoinChain: Effective Coin Mixing Tool for Anonymous CryptoCu...
收藏 引用
8th International Conference on Computational Science and Technology, ICCST 2021
作者: Chan, Wai Kok Chin, Ji-Jian Goh, Vik Tor Faculty of Informatics and Computing Multimedia University Cyberjaya63000 Malaysia Faculty of Engineering Multimedia University Cyberjaya63000 Malaysia
Many anonymous cryptocurrencies have been introduced to address the privacy issue in Bitcoin. Compared to traditional security schemes like hashing and encryption, the security measurement for cryptocurrency is less p... 详细信息
来源: 评论
Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第3期19卷 170-190页
作者: Al-Nawashi, Malek M. Al-Hazaimeh, Obaida M. Tahat, Nedal M. Gharaibeh, Nasr Abu-Ain, Waleed A. Abu-Ain, Tarik Al-Huson University College Al-Balqa Applied University Irbid Jordan Faculty of Information Technology Department of Information Security and Cybersecurity Philadelphia University Amman Jordan Faculty of Science The Hashemite University Zarqa Jordan College of Science and Computer Engineering Taibah University Yanbu Saudi Arabia College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia
The detection of cyberattacks has been increasingly emphasized in recent years, focusing on both infrastructure and people. Conventional security measures such as intrusion detection, firewalls, and encryption are ins... 详细信息
来源: 评论
Comparative Analysis of Machine Learning Classifiers for Phishing Detection  6
Comparative Analysis of Machine Learning Classifiers for Phi...
收藏 引用
6th International Conference on informatics and Computational Sciences, ICICoS 2022
作者: Razak, Mohd Faizal Ab Jaya, Mohd Izham Ernawan, Ferda Firdaus, Ahmad Nugroho, Fajar Agung Universiti Malaysia Pahang Faculty of Computing College of Computing & Applied Sciences Pahang Malaysia Diponegoro University Department of Informatics Semarang Indonesia
In recent years, communication over the Internet has become the most effective media for leveraging social interactions during the COVID-19 pandemic. Nevertheless, the rapid increase use of digital platforms has led t... 详细信息
来源: 评论
Iterative Method for Solving Nonlinear Fredholm Integral Equations Using Quarter-Sweep Newton-PKSOR Method  1
收藏 引用
9th International Conference on Computational Science and Technology, ICCST 2022
作者: Ali, L.H. Sulaiman, J. Saudi, A. Faculty of Science and Natural Resources Universiti Malaysia Sabah Kota Kinabalu Sabah88400 Malaysia Faculty of Computing and Informatics Universiti Malaysia Sabah Kota Kinabalu Sabah88400 Malaysia
This paper studies the combination of the quarter-sweep approach with the Newton-PKSOR iteration to solve the nonlinear Fredholm integral equations of the second kind. We call them the quarter-sweep Newton-PKSOR (QSNP... 详细信息
来源: 评论
Trip Itinerary Generation with 2-Opt Algorithm  22
Trip Itinerary Generation with 2-Opt Algorithm
收藏 引用
Proceedings of the 4th International Conference on Advanced Information Science and System
作者: Omar Challaf Sook-Ling Chua Lee Kien Foo Faculty of Computing and Informatics Multimedia University Malaysia
Advances in digital technologies and communications are impacting how people travel. However, there are still lacking of personalised digital-based tools to support people in trip planning. Although there are a number... 详细信息
来源: 评论
A Secure Model Based on Symmetric Encryption for REST API in Data Integration  27
A Secure Model Based on Symmetric Encryption for REST API in...
收藏 引用
27th International Computer Science and Engineering Conference, ICSEC 2023
作者: Yusof, Mohd Kamir Man, Mustafa Wan Hamzah, Wan Mohd Amir Fazamin Safei, Suhailan Haryani Tasani, Mimi Shah, Nurul Anis Alia Ahmad Universiti Sultan Zainal Abidin Faculty of Informatics and Computing Terengganu Besut22200 Malaysia Universiti Malaysia Terengganu Faculty of Ocean and Engineering K. Nerus Terengganu 21300 Malaysia
Data integration is currently demanding by organizations to extract the data from different data sources. A unified view of data structure is needs to allow the organization to access this data sources. REST API one o... 详细信息
来源: 评论
A Supervised Model to Detect Suspicious Activities in the Bitcoin Network  2nd
A Supervised Model to Detect Suspicious Activities in the Bi...
收藏 引用
2nd International Conference on Emerging Technologies and Intelligent Systems, ICETIS 2022
作者: Al-Hashedi, Khaled Gubran Magalingam, Pritheega Maarop, Nurazean Samy, Ganthan Narayana Rahim, Fiza Binti Abdul Shanmugam, Mohana Hasan, Mohammad Kamrul Advanced Informatics Department Razak Faculty of Technology and Informatics Universiti Teknologi Malaysia Kuala Lumpur Malaysia College of Computing and Informatics Universiti Tenaga Nasional Malaysia Selangor Kajang43000 Malaysia Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Selangor Bangi43600 Malaysia
Shortly after its official launch in 2009, Bitcoin has gained rapid popularity worldwide, which in return attracted a variety of people especially malicious attackers, who get the advantage of its pseudo-anonymity to ... 详细信息
来源: 评论
Estimating SIR Model Parameters for Predicting Covid-19 Cases in Bandung City  4
Estimating SIR Model Parameters for Predicting Covid-19 Case...
收藏 引用
4th International Conference on Intelligent Cybernetics Technology and Applications, ICICyTA 2024
作者: Bintang, Kahfi M. Binti Alias, Norma Kurniawan, Wandi Yusuf Patrianingsih, Ni Kadek Winda Reganata, Gde Palguna Gunawan, Putu Harry School of Computing Telkom University Bandung40257 Indonesia University Teknologi Malaysia Faculty of Science Johor Skudai81310 Malaysia Universitas Bali Internasional Informatics Department Denpasar Indonesia
The COVID-19 pandemic has profoundly impacted global public health, with Indonesia among the most severely af-fected. In response, the Bandung City Government implemented various control measures, including the Mayor&... 详细信息
来源: 评论