咨询与建议

限定检索结果

文献类型

  • 2,295 篇 会议
  • 1,328 篇 期刊文献
  • 74 册 图书

馆藏范围

  • 3,697 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,969 篇 工学
    • 1,467 篇 计算机科学与技术...
    • 1,219 篇 软件工程
    • 427 篇 信息与通信工程
    • 279 篇 控制科学与工程
    • 270 篇 生物工程
    • 238 篇 生物医学工程(可授...
    • 156 篇 电气工程
    • 138 篇 电子科学与技术(可...
    • 135 篇 光学工程
    • 127 篇 机械工程
    • 108 篇 化学工程与技术
    • 92 篇 仪器科学与技术
    • 89 篇 安全科学与工程
    • 74 篇 动力工程及工程热...
  • 1,364 篇 理学
    • 589 篇 数学
    • 498 篇 物理学
    • 314 篇 生物学
    • 164 篇 统计学(可授理学、...
    • 135 篇 系统科学
    • 108 篇 化学
  • 669 篇 管理学
    • 371 篇 管理科学与工程(可...
    • 322 篇 图书情报与档案管...
    • 202 篇 工商管理
  • 267 篇 医学
    • 221 篇 临床医学
    • 196 篇 基础医学(可授医学...
    • 127 篇 公共卫生与预防医...
    • 109 篇 药学(可授医学、理...
  • 103 篇 法学
    • 87 篇 社会学
  • 94 篇 教育学
    • 87 篇 教育学
  • 84 篇 经济学
    • 80 篇 应用经济学
  • 64 篇 农学
  • 9 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 86 篇 accuracy
  • 82 篇 machine learning
  • 72 篇 artificial intel...
  • 68 篇 deep learning
  • 63 篇 predictive model...
  • 63 篇 training
  • 61 篇 internet of thin...
  • 60 篇 feature extracti...
  • 57 篇 covid-19
  • 55 篇 informatics
  • 52 篇 computational mo...
  • 50 篇 convolutional ne...
  • 48 篇 optimization
  • 46 篇 support vector m...
  • 45 篇 forecasting
  • 45 篇 data models
  • 41 篇 data mining
  • 39 篇 monitoring
  • 37 篇 education
  • 37 篇 students

机构

  • 96 篇 faculty of compu...
  • 59 篇 faculty of infor...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 department of ph...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 38 篇 institute of phy...

作者

  • 44 篇 bacanin nebojsa
  • 42 篇 alfred rayner
  • 35 篇 mustafa mamat
  • 35 篇 zivkovic miodrag
  • 33 篇 nebojsa bacanin
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein

语言

  • 3,111 篇 英文
  • 572 篇 其他
  • 26 篇 中文
  • 2 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 日文
检索条件"机构=Faculty of computing and informatics"
3697 条 记 录,以下是401-410 订阅
排序:
Forecasting Solar Energy Substation Voltages Using Metaheuristic Optimized GRU
Forecasting Solar Energy Substation Voltages Using Metaheuri...
收藏 引用
Telecommunications Forum (TELFOR)
作者: Luka Jovanovic Nikola Jovic Aleksandar Petrovic Nebojsa Budimirovic Miodrag Zivkovic Nebojsa Bacanin Faculty of Informatics and Computing Singidunum University Belgrade Serbia Faculty of Technical Sciences Singidunum University Belgrade Serbia
As global energy demand grows, renewable sources offer a key alternative to fossil fuels. However, integrating these sources into power grids presents challenges, especially with supply unpredictability. This paper de... 详细信息
来源: 评论
The Use of LDAP for Query Operation in Trader Service
收藏 引用
Procedia Computer Science 2025年 259卷 297-305页
作者: Farkhana Binti Muchtar Mohd KuFaisal Bin Mohd Sidek Ismail Fauzi Bin Isnin Kiran Sanjay Degan Salmah Binti Fattah Muhammad Zafran Bin Muhammad Zaly Shah Nor Anita Fairos binti Ismail Zuraini binti Ali Shah Faculty of Computing Universiti Teknologi Malaysia 81310 Johor Bahru Johor Malaysia Symbiosis International University India Faculty of Computing and Informatics Universiti Malaysia Sabah Jalan UMS Jalan UMS 88400 Kota Kinabalu Sabah Malaysia
This research investigates the potential of the Lightweight Directory Access Protocol (LDAP) to optimize query operations in the Object Management Group (OMG) trading service, emphasizing the need for swift query resp... 详细信息
来源: 评论
Towards Swarm Intelligence Ontology for Formal Description of Metaheuristics Algorithms  4
Towards Swarm Intelligence Ontology for Formal Description o...
收藏 引用
4th International Conference on computing, Networking, Telecommunications and Engineering Sciences Applications, CoNTESA 2023
作者: Tulicic, Domagoj Horvat, Marko Lovrencic, Sandra University of Applied Science in Information Technology Department of Computer System and Networks Zagreb Croatia University of Zagreb Faculty of Electrical Engineering and Computing Department of Applied Computing Zagreb Croatia University of Zagreb Faculty of Organization and Informatics Foundations of Information Sciences Department of Theoretical and Applied Varaždin Croatia
Swarm intelligence is a class of nature-inspired metaheuristic algorithms, that is specifically derived from biological systems in nature with an emphasis on their social interactions. These algorithms have been prima... 详细信息
来源: 评论
Generative Adversarial Network for Data Augmentation and Substitution
Generative Adversarial Network for Data Augmentation and Sub...
收藏 引用
Zooming Innovation in Consumer Electronics International Conference (ZINC)
作者: Marko Stankovic Nebojsa Bacanin Miodrag Zivkovic Luka Jovanovic Marko Sarac Milos Antonijevic Faculty of Technical Sciences Singidunum University Belgrade Serbia Faculty of Informatics and Computing Singidunum University Belgrade Serbia
The healthcare industry undergoes a transformative shift with the integration of artificial intelligence (AI), particularly in medical imaging analysis. AI algorithms, trained on extensive datasets, demonstrate accura... 详细信息
来源: 评论
Modeling uncertainties associated with decision-making algorithms based on similarity measures of possibility belief interval-valued fuzzy hypersoft setting
收藏 引用
Neutrosophic Sets and Systems 2025年 77卷 282-309页
作者: Romdhini, Mamika Ujianita Al-Sharqi, Faisal Al-Obaidi, R.H. Rodzi, Zahari Md. Department of Mathematics Faculty of Mathematics and Natural Science University of Mataram Mataram83125 Indonesia Department of Mathematics Faculty of Education for Pure Sciences University of Anbar Ramadi55431 Iraq Fuel and Energy Techniques Engineering Department College of Engineering and Technologies Al-mustaqbal University Babylon51001 Iraq College of Computing Informatics and Mathematics UiTM Cawangan Negeri Sembilan Kampus Seremban Negeri Sembilan 72000 Malaysia
Hypersoft sets (HSSs) were initiated as an extension of soft sets (SSs) to address real-life scenarios involving multiple disjoint sets with different traits. One such extension is the interval-valued fuzzy hypersoft ... 详细信息
来源: 评论
Metaheuristics Algorithm for Tuning of PID Controller of Mobile Robot System
收藏 引用
Computers, Materials & Continua 2022年 第8期72卷 3481-3492页
作者: Harsh Goud Prakash Chandra Sharma Kashif Nisar Muhammad Reazul Haque Ag.Asri Ag.Ibrahim Narendra Singh Yadav Pankaj Swarnkar Manoj Gupta Laxmi Chand Indian Institute of Information Technology NagpurIndia School of Computing&Information Technology Manipal UniversityJaipurRajasthanIndia Faculty of Computing and Informatics University Malaysia SabahJalan UMSKota Kinabalu88400SabahMalaysia Faculty of Computing&Informatics Multimedia UniversityPersiaran MultimediaCyberjaya63100SelangorMalaysia Maulana Azad National Institute of Technology BhopalIndia Department of Electronics and Communication Engineering JECRC UniversityJaipurRajasthanIndia Department of Computer Science and Engineering Hanyang UniversitySeongdong-guSeoul04763Korea
Robots in the medical industry are becoming more common in daily life because of various advantages such as quick response,less human interference,high dependability,improved hygiene,and reduced aging *** is why,in re... 详细信息
来源: 评论
Message from Advisor
2023 International Conference on Emerging Trends in Networks...
收藏 引用
2023 International Conference on Emerging Trends in Networks and Computer Communications, ETNCC 2023 - Proceedings 2023年 VIII-IX页
作者: Stanley, Colin Faculty of Computing and Informatics Namibia University of Science and Technology Namibia
来源: 评论
Memory forensic: detecting unusual intrusion activity in dump of RAM memory using FTK imager
收藏 引用
International Journal of Information Technology (Singapore) 2025年 1-8页
作者: Pandey, Bishwajeet Kumar, Amit Acharya, Deepak Bhaskar Pandey, Pushpanjali Bakar, W.A.W.A. GL Bajaj Institute of Technology and Management Greater Noida India Gyancity Research Consultancy Greater Noida India The University of Alabama in Huntsville Huntsville AL United States Faculty of Informatics and Computing Universiti Sultan Zainul Abidin (UniSZA) Kuala Terengganu Malaysia
Memory forensics helps the forensic investigator to detect any unusual activity. In this paper, we have discussed memory forensics and how to dump the content of primary memory RAM (Random Access Memory) using the FTK... 详细信息
来源: 评论
G-PAT: A Group Peer Assessment Tool to Support Group Projects  7
G-PAT: A Group Peer Assessment Tool to Support Group Project...
收藏 引用
7th International Conference on Research and Innovation in Information Systems, ICRIIS 2021
作者: Tiew, Han-Bin Chua, Fang-Fang Chan, Gaik-Yee Multimedia University Faculty of Computing Informatics Cyberjaya Malaysia
Peer assessment is a type of assessment that allows students in taking their initiative to manage their study under the supervision of their peers to achieve the learning outcome. Students constantly need to reflect o... 详细信息
来源: 评论
A Hybrid Classification Approach For Artificial Speech Detection  5
A Hybrid Classification Approach For Artificial Speech Detec...
收藏 引用
5th IEEE International Conference on Artificial Intelligence in Engineering and Technology, IICAIET 2023
作者: Tan, Choon Beng Ahmad Hijazi, Mohd. Hanafi Ellyza Nohuddin, Puteri Nor Universiti Malaysia Sabah Faculty of Computing and Informatics Kota Kinabalu Malaysia Institute of IR4.0 Universiti Kebangsaan Malaysia Bangi Malaysia Higher Colleges of Technology Faculty of Business Sharjah United Arab Emirates
The emergence of voice biometrics has revolutionized user authentication methods by delivering enhanced security and convenience, steadily replacing less secure authentication techniques. However, the automatic speake... 详细信息
来源: 评论