咨询与建议

限定检索结果

文献类型

  • 2,295 篇 会议
  • 1,328 篇 期刊文献
  • 74 册 图书

馆藏范围

  • 3,697 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,969 篇 工学
    • 1,467 篇 计算机科学与技术...
    • 1,219 篇 软件工程
    • 427 篇 信息与通信工程
    • 279 篇 控制科学与工程
    • 270 篇 生物工程
    • 238 篇 生物医学工程(可授...
    • 156 篇 电气工程
    • 138 篇 电子科学与技术(可...
    • 135 篇 光学工程
    • 127 篇 机械工程
    • 108 篇 化学工程与技术
    • 92 篇 仪器科学与技术
    • 89 篇 安全科学与工程
    • 74 篇 动力工程及工程热...
  • 1,364 篇 理学
    • 589 篇 数学
    • 498 篇 物理学
    • 314 篇 生物学
    • 164 篇 统计学(可授理学、...
    • 135 篇 系统科学
    • 108 篇 化学
  • 669 篇 管理学
    • 371 篇 管理科学与工程(可...
    • 322 篇 图书情报与档案管...
    • 202 篇 工商管理
  • 267 篇 医学
    • 221 篇 临床医学
    • 196 篇 基础医学(可授医学...
    • 127 篇 公共卫生与预防医...
    • 109 篇 药学(可授医学、理...
  • 103 篇 法学
    • 87 篇 社会学
  • 94 篇 教育学
    • 87 篇 教育学
  • 84 篇 经济学
    • 80 篇 应用经济学
  • 64 篇 农学
  • 9 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 86 篇 accuracy
  • 82 篇 machine learning
  • 72 篇 artificial intel...
  • 68 篇 deep learning
  • 63 篇 predictive model...
  • 63 篇 training
  • 61 篇 internet of thin...
  • 60 篇 feature extracti...
  • 57 篇 covid-19
  • 55 篇 informatics
  • 52 篇 computational mo...
  • 50 篇 convolutional ne...
  • 48 篇 optimization
  • 46 篇 support vector m...
  • 45 篇 forecasting
  • 45 篇 data models
  • 41 篇 data mining
  • 39 篇 monitoring
  • 37 篇 education
  • 37 篇 students

机构

  • 96 篇 faculty of compu...
  • 59 篇 faculty of infor...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 department of ph...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 38 篇 institute of phy...

作者

  • 44 篇 bacanin nebojsa
  • 42 篇 alfred rayner
  • 35 篇 mustafa mamat
  • 35 篇 zivkovic miodrag
  • 33 篇 nebojsa bacanin
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein

语言

  • 3,111 篇 英文
  • 572 篇 其他
  • 26 篇 中文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 日文
检索条件"机构=Faculty of computing and informatics"
3697 条 记 录,以下是3291-3300 订阅
排序:
A distributed algorithm for constructing minimum connected dominating set in mobile wireless network
A distributed algorithm for constructing minimum connected d...
收藏 引用
International Conference on Computer and Communication Engineering, ICCCE
作者: Jahangir Kheyrihassankandi Yashwant Prasad Singh Chin Kuan Ho Faculty of Computing and Informatics Multimedia University Selangor Darul Ehsan Malaysia
In this paper, we propose an Artificial Bee Colony (ABC) algorithm, a swarm-based artificial intelligence algorithm, for computing a connected dominating set (CDS) in ad hoc wireless networks, which include mobile ad ... 详细信息
来源: 评论
Comparison of ECC and RSA algorithm in multipurpose smart card application
Comparison of ECC and RSA algorithm in multipurpose smart ca...
收藏 引用
International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)
作者: Maryam Savari Mohammad Montazerolzohour Yeoh Eng Thiam Faculty of Computing and Informatics Multimedia University Cyberjaya Selangor Darul Ehsan Malaysia
The main role of encryption algorithms is to keep devises safe from attack. Using the best and more efficient algorithm for a device according to its storage and amount of data transfer is the most important part. Thi... 详细信息
来源: 评论
Combining encryption methods in multipurpose smart card
Combining encryption methods in multipurpose smart card
收藏 引用
International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)
作者: Maryam Savari Mohammad Montazerolzohour Yeoh Eng Thiam Faculty of Computing and Informatics Multimedia University Cyberjaya Selangor Darul Ehsan Malaysia
Smart cards have many applications such as health, ID verification and access control, electronic purse card, banking card, payphone card, passport card and license card. Since, there are many kinds of smart cards, it... 详细信息
来源: 评论
Composite subdivisions for 3D quad-triangle meshes
Composite subdivisions for 3D quad-triangle meshes
收藏 引用
International Conference on Computer & Information Science (ICCIS)
作者: K. W. Ng S. W. Andi K. I. Ghauth Faculty of Computing and Informatics Multimedia University Cyberjaya Selangor Darul Ehsan Malaysia
This paper researches on the real time subdivision of surface rendering using approximation scheme and focuses on two methods - Catmull-Clark and Loop subdivision. The two methods are commonly employed separately in m... 详细信息
来源: 评论
Dijkstra's shortest path algorithm serial and parallel execution performance analysis
Dijkstra's shortest path algorithm serial and parallel execu...
收藏 引用
Proceedings of the International Convention MIPRO
作者: Nadira Jasika Naida Alispahic Arslanagic Elma Kurtovic Ilvana Lagumdzija Elma Novica Nosovic Department for Computing and Informatics Faculty of Electrical Engineering University of Sarajevo Bosnia and Herzegovina
This article introduces the problem of parallelization of Dijkstra's algorithm, a well known algorithm for computing single-source shortest path in a graph. Dijkstra's algorithm can be applied to graphs with a... 详细信息
来源: 评论
Credit Card Fraud Detection: Personalized or Aggregated Model
Credit Card Fraud Detection: Personalized or Aggregated Mode...
收藏 引用
FTRA International Conference on Mobile, Ubiquitous, and Intelligent computing (MUSIC)
作者: Mohammed Ibrahim Alowais Lay-Ki Soon Faculty of Computing and Informatics Multimedia University Cyberjaya Selangor Darul Ehsan Malaysia
Banking industry suffers lost in millions of dollars each year caused by credit card fraud. Tremendous effort, time and money have been spent to detect fraud where there are studies done on creating personalized model... 详细信息
来源: 评论
WebSum: Enhanced SumBasic algorithm for Web site summarization
WebSum: Enhanced SumBasic algorithm for Web site summarizati...
收藏 引用
Conference on Data Mining and Optimization, DMO
作者: Jason Yong-Jin Tee Lay-Ki Soon Choo-Yee Ting Faculty of Computing and Informatics Multimedia University Cyberjaya Selangor Darul Ehsan Malaysia
Due to the rapid increase of information in the World Wide Web, there exists an explosion of information on the Web that may overwhelm the common Web user. The Web user may find it quicker or more efficient to browse ... 详细信息
来源: 评论
All about encryption in smart card
All about encryption in smart card
收藏 引用
International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)
作者: Maryam Savari Mohammad Montazerolzohour Faculty of Computing and Informatics Multimedia University Cyberjaya Selangor Darul Ehsan Malaysia
Smart cards are one of the efficient devices in providing security in some systems. Smart cards are secured with using encryption algorithms. Finding the best algorithm in smart cards is more of a concern these days. ... 详细信息
来源: 评论
Parallelization of array operations by using socket programming in .NET
Parallelization of array operations by using socket programm...
收藏 引用
Proceedings of the International Convention MIPRO
作者: Ersin Kurtanovic Emir Meholjic Nedim Hadzic Boris Davidovic Enes Ljevakovic Novica Nosovic Faculty of electrical engineering Department for Computing and Informatics University of Sarajevo Bosnia and Herzegovina
This paper describes the procedure and the results of measuring the speed of processing arrays on 1, 2, or 3 hosts, connected in LAN. The measurement scenario was based on having the fixed processing time for each arr...
来源: 评论
Collision detection optimization on mobile device for shoot'em up game
Collision detection optimization on mobile device for shoot'...
收藏 引用
International Conference on Computer & Information Science (ICCIS)
作者: K. W. Ng Y. W. Yeap Y. H. Tan K. I. Ghauth Faculty of Computing and Informatics Multimedia University Cyberjaya Selangor Darul Ehsan Malaysia
The limited computing resources on mobile device have always been an issue for game developers. With the open doors of mobile companies such as Apple and Android have provided, the barrier for entry into the game deve... 详细信息
来源: 评论