咨询与建议

限定检索结果

文献类型

  • 2,295 篇 会议
  • 1,328 篇 期刊文献
  • 74 册 图书

馆藏范围

  • 3,697 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,969 篇 工学
    • 1,467 篇 计算机科学与技术...
    • 1,219 篇 软件工程
    • 427 篇 信息与通信工程
    • 279 篇 控制科学与工程
    • 270 篇 生物工程
    • 238 篇 生物医学工程(可授...
    • 156 篇 电气工程
    • 138 篇 电子科学与技术(可...
    • 135 篇 光学工程
    • 127 篇 机械工程
    • 108 篇 化学工程与技术
    • 92 篇 仪器科学与技术
    • 89 篇 安全科学与工程
    • 74 篇 动力工程及工程热...
  • 1,364 篇 理学
    • 589 篇 数学
    • 498 篇 物理学
    • 314 篇 生物学
    • 164 篇 统计学(可授理学、...
    • 135 篇 系统科学
    • 108 篇 化学
  • 669 篇 管理学
    • 371 篇 管理科学与工程(可...
    • 322 篇 图书情报与档案管...
    • 202 篇 工商管理
  • 267 篇 医学
    • 221 篇 临床医学
    • 196 篇 基础医学(可授医学...
    • 127 篇 公共卫生与预防医...
    • 109 篇 药学(可授医学、理...
  • 103 篇 法学
    • 87 篇 社会学
  • 94 篇 教育学
    • 87 篇 教育学
  • 84 篇 经济学
    • 80 篇 应用经济学
  • 64 篇 农学
  • 9 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 86 篇 accuracy
  • 82 篇 machine learning
  • 72 篇 artificial intel...
  • 68 篇 deep learning
  • 63 篇 predictive model...
  • 63 篇 training
  • 61 篇 internet of thin...
  • 60 篇 feature extracti...
  • 57 篇 covid-19
  • 55 篇 informatics
  • 52 篇 computational mo...
  • 50 篇 convolutional ne...
  • 48 篇 optimization
  • 46 篇 support vector m...
  • 45 篇 forecasting
  • 45 篇 data models
  • 41 篇 data mining
  • 39 篇 monitoring
  • 37 篇 education
  • 37 篇 students

机构

  • 96 篇 faculty of compu...
  • 59 篇 faculty of infor...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 department of ph...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 38 篇 institute of phy...

作者

  • 44 篇 bacanin nebojsa
  • 42 篇 alfred rayner
  • 35 篇 mustafa mamat
  • 35 篇 zivkovic miodrag
  • 33 篇 nebojsa bacanin
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein

语言

  • 3,111 篇 英文
  • 572 篇 其他
  • 26 篇 中文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 日文
检索条件"机构=Faculty of computing and informatics"
3697 条 记 录,以下是291-300 订阅
排序:
Behavioural Characteristics and Cyberbullying Profiles among Malaysian Youngsters  1
Behavioural Characteristics and Cyberbullying Profiles among...
收藏 引用
1st International Visualization, informatics and Technology Conference, IVIT 2022
作者: Anwar, Rina Md. Din, Marina Md. Bakar, Asmidar Abu Abdul Latif, Aliza Rahim, Fiza Abdul Institute of Informatics and Computing Energy Kajang Selangor Malaysia Universiti Teknologi Malaysia Razak Faculty of Technology and Informatics Advanced Informatics Department Kuala Lumpur Malaysia
Cyberbullying is a variation of bullying that involves the use of technology to abuse others. This study examined the relationship between behavioural characteristics and cyberbullying profiles among youngsters. A tot... 详细信息
来源: 评论
Personality Analysis Based on The Handwriting Shape using Integration of Image Processing and Machine Learning Algorithm  7
Personality Analysis Based on The Handwriting Shape using In...
收藏 引用
7th International Conference on New Media Studies, CONMEDIA 2023
作者: Rosalina Sahuri, Genta Fahmi, Hasanul Moerland, Joe Wesley Mandala, Rila President University Informatics Study Program Indonesia President University Information System Study Program Indonesia President University Magister of Informatics Study Program Indonesia President University Faculty of Computing Indonesia
In Indonesia, mental health awareness is not as prominent as physical health, and many adolescents have experienced mental health problems. Some people hide their mental and emotional problems by appearing cheerful an... 详细信息
来源: 评论
The Detection of E-Commerce Manipulated Reviews Using GPT-4  1
The Detection of E-Commerce Manipulated Reviews Using GPT-4
收藏 引用
1st International Conference on Computer Science and Emerging Technologies, CSET 2023
作者: Al Wahshat, Hassan Abu-Ulbeh, Waheeb Yusoff, M Hafiz Zakaria, Muhammad D. Amir Fazamin Wan Hamzah, Wan Mohd Stenin, N.P. Ajloun National University Faculty of Business Department of Management Information System Ajloun Jordan Al-Istiqlal University Faculty of Administrative Sciences and Informatics Cybersecurity Department Jericho10 Palestine UniSZA Malaysia UniSZA Faculty of Informatics and Computing Malaysia Jain Deemed to Be University Bangalore India
In recent years, the exponential growth of e-commerce has transformed consumer purchasing behavior, with online reviews playing a crucial role in shaping buying decisions. Unfortunately, the prevalence of manipulated ... 详细信息
来源: 评论
The Concept of Cognition as Categorization in the Development of New Metaheuristics and Algorithms Inspired by Nature  46
The Concept of Cognition as Categorization in the Developmen...
收藏 引用
46th ICT and Electronics Convention, MIPRO 2023
作者: Tulicic, Domagoj Ivkovic, Nikola College for Information Technologies Department of Computer Systems and Networks Zagreb Croatia Faculty of Organization and Informatics Department of Computing and Technology Varaždin Croatia
The sensorimotor system is a crucial mechanism that enables organisms to categorize information in their environment, a skill necessary for survival. According to cognitive scientist Steven Harnad's 'To Cogniz... 详细信息
来源: 评论
A Smart Farming System for Rubber Nursery Management in Monitoring Plant Growth Performance Using IoT Technology  1
A Smart Farming System for Rubber Nursery Management in Moni...
收藏 引用
1st Engineering and Science International Conference 2024, ESIC 2024
作者: Sadikan, S.F.N. Aziz, M.L.H.A. Umor, M.A.S. Mahzan, S. Marjudi, S. Salamat, M.A. Dunne, R.S. Faculty of Plantation and Agrotechnology Universiti Teknologi MARA Merlimau Melaka77300 Malaysia College of Computing Informatics and Media Universiti Teknologi MARA Merlimau Melaka77300 Malaysia Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia Batu Pahat86400 Malaysia Faculty of Communication Visual art and Computing Universiti Selangor Kuala Selangor45600 Malaysia
Rubber plantations are an integral part of economy in Malaysia. However, inadequate soil moisture poses a significant problem for rubber trees as it can lead to water stress, ultimately hindering their growth, leaf de... 详细信息
来源: 评论
Impact of Selfish Nodes on the Performance of Delay-Tolerant Routing Protocols in Intermittently Connected Mobile Networks (ICMNs)
Impact of Selfish Nodes on the Performance of Delay-Tolerant...
收藏 引用
2024 International Conference on Recent Progresses in Science, Engineering and Technology, ICRPSET 2024
作者: Abubakar, Abdirahman M. Rahim, Muhammad Sajjadur Faculty of Computing and Informatics Amoud University Borama Somalia University of Rajshahi Department of Information and Communication Engineering Rajshahi 6205 Bangladesh
Delay-Tolerant Networks (DTNs) enable communication in challenging environments where intermittent connectivity is the norm. However, the presence of selfish nodes, which prioritize their own interests over network pe... 详细信息
来源: 评论
Driving Simulator for Drivers Education with Artificial Intelligence Traffic and Virtual Reality: a Review  8th
Driving Simulator for Drivers Education with Artificial In...
收藏 引用
8th International Conference on Computational Science and Technology, ICCST 2021
作者: Cheng, Yun-Quan Mansor, Sarina Chin, Ji-Jian Karim, Hezerul Abdul Faculty of Engineering Multimedia University Selangor Cyberjaya Malaysia Faculty of Computing and Informatics Multimedia University Selangor Cyberjaya Malaysia
Simulators are games that give a sense of realism and simulate of the real world in a virtual world, such as racing games or serious medical training games. These have been widely documented to have positive effects o... 详细信息
来源: 评论
Geoelectrical subsurface characterization: A case study of saltwater intrusion in Kudat, Sabah  14
Geoelectrical subsurface characterization: A case study of s...
收藏 引用
14th Seminar on Science and Technology 2021, S and T 2021
作者: Ismail, Fatin Nabilahuda Musta, Baba Saleh, Hardianshah Yahya, Farashazillah Faculty of Science and Natural Resources Universiti Malaysia Sabah Malaysia Faculty of Computing and Informatics Universiti Malaysia Sabah Malaysia
Sa ltwa ter intrusion is one of the prima ry sources of groundwa ter conta mination, especia lly nea r the coa sta l line, a nd it is crucia l to monitor sa ltwa ter intrusion to protect fresh groundwa ter. Due to the... 详细信息
来源: 评论
CoinChain: Effective Coin Mixing Tool for Anonymous CryptoCurrency  8th
CoinChain: Effective Coin Mixing Tool for Anonymous CryptoCu...
收藏 引用
8th International Conference on Computational Science and Technology, ICCST 2021
作者: Chan, Wai Kok Chin, Ji-Jian Goh, Vik Tor Faculty of Informatics and Computing Multimedia University Cyberjaya63000 Malaysia Faculty of Engineering Multimedia University Cyberjaya63000 Malaysia
Many anonymous cryptocurrencies have been introduced to address the privacy issue in Bitcoin. Compared to traditional security schemes like hashing and encryption, the security measurement for cryptocurrency is less p... 详细信息
来源: 评论
Deep Reinforcement Learning-Based Framework for Enhancing Cybersecurity
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第3期19卷 170-190页
作者: Al-Nawashi, Malek M. Al-Hazaimeh, Obaida M. Tahat, Nedal M. Gharaibeh, Nasr Abu-Ain, Waleed A. Abu-Ain, Tarik Al-Huson University College Al-Balqa Applied University Irbid Jordan Faculty of Information Technology Department of Information Security and Cybersecurity Philadelphia University Amman Jordan Faculty of Science The Hashemite University Zarqa Jordan College of Science and Computer Engineering Taibah University Yanbu Saudi Arabia College of Computing and Informatics Saudi Electronic University Riyadh Saudi Arabia
The detection of cyberattacks has been increasingly emphasized in recent years, focusing on both infrastructure and people. Conventional security measures such as intrusion detection, firewalls, and encryption are ins... 详细信息
来源: 评论