咨询与建议

限定检索结果

文献类型

  • 2,273 篇 会议
  • 1,311 篇 期刊文献
  • 74 册 图书

馆藏范围

  • 3,658 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,952 篇 工学
    • 1,459 篇 计算机科学与技术...
    • 1,219 篇 软件工程
    • 415 篇 信息与通信工程
    • 268 篇 生物工程
    • 264 篇 控制科学与工程
    • 235 篇 生物医学工程(可授...
    • 152 篇 电气工程
    • 135 篇 光学工程
    • 132 篇 电子科学与技术(可...
    • 125 篇 机械工程
    • 107 篇 化学工程与技术
    • 89 篇 仪器科学与技术
    • 88 篇 安全科学与工程
    • 71 篇 动力工程及工程热...
  • 1,353 篇 理学
    • 586 篇 数学
    • 495 篇 物理学
    • 312 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 136 篇 系统科学
    • 104 篇 化学
  • 657 篇 管理学
    • 365 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 202 篇 工商管理
  • 262 篇 医学
    • 223 篇 临床医学
    • 195 篇 基础医学(可授医学...
    • 126 篇 公共卫生与预防医...
    • 107 篇 药学(可授医学、理...
  • 101 篇 法学
    • 85 篇 社会学
  • 91 篇 教育学
    • 85 篇 教育学
  • 84 篇 经济学
    • 80 篇 应用经济学
  • 63 篇 农学
  • 9 篇 文学
  • 8 篇 艺术学
  • 6 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 82 篇 accuracy
  • 79 篇 machine learning
  • 71 篇 artificial intel...
  • 64 篇 deep learning
  • 62 篇 predictive model...
  • 62 篇 training
  • 61 篇 internet of thin...
  • 58 篇 feature extracti...
  • 56 篇 covid-19
  • 55 篇 informatics
  • 52 篇 computational mo...
  • 50 篇 convolutional ne...
  • 47 篇 optimization
  • 45 篇 support vector m...
  • 45 篇 data models
  • 44 篇 forecasting
  • 41 篇 data mining
  • 39 篇 monitoring
  • 37 篇 students
  • 35 篇 education

机构

  • 95 篇 faculty of compu...
  • 58 篇 faculty of infor...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 department of ph...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 38 篇 institute of phy...

作者

  • 45 篇 bacanin nebojsa
  • 42 篇 alfred rayner
  • 36 篇 zivkovic miodrag
  • 35 篇 mustafa mamat
  • 33 篇 nebojsa bacanin
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein

语言

  • 3,461 篇 英文
  • 183 篇 其他
  • 18 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 日文
检索条件"机构=Faculty of computing and informatics"
3658 条 记 录,以下是41-50 订阅
排序:
Artificial Intelligence in Human-Computer Interaction: To Serve and Protect  16
Artificial Intelligence in Human-Computer Interaction: To Se...
收藏 引用
16th International Conference on Advanced Technologies, Systems and Services in Telecommunications, TELSIKS 2023
作者: Jevremovic, Aleksandar D. Singidunum University Faculty of Informatics and Computing Belgrade11000 Serbia
The rapid development and progress of artificial intelligence algorithms in the last decade has opened up many new possibilities and fields for its application. The field of human-computer interaction is not only not ... 详细信息
来源: 评论
Forecasting Solar Energy Substation Voltages Using Metaheuristic Optimized GRU  32
Forecasting Solar Energy Substation Voltages Using Metaheuri...
收藏 引用
32nd Telecommunications Forum, TELFOR 2024
作者: Jovanovic, Luka Jovic, Nikola Petrovic, Aleksandar Budimirovic, Nebojsa Zivkovic, Miodrag Bacanin, Nebojsa Singidunum University Faculty of Informatics and Computing Belgrade Serbia Singidunum University Faculty of Technical Sciences Belgrade Serbia
As global energy demand grows, renewable sources offer a key alternative to fossil fuels. However, integrating these sources into power grids presents challenges, especially with supply unpredictability. This paper de... 详细信息
来源: 评论
Maximizing complex features to minimize the detectability of content-adaptive steganography
收藏 引用
Multimedia Tools and Applications 2024年 1-19页
作者: Setiadi, De Rosal Ignatius Moses Rustad, Supriadi Andono, Pulung Nurtantio Shidik, Guruh Fajar Faculty of Computer Science Universitas Dian Nuswantoro Semarang50131 Indonesia Research Center for Quantum Computing and Materials Informatics Faculty of Computer Science Universitas Dian Nuswantoro Semarang50131 Indonesia
Content-adaptive steganography has three rules that need to be fulfilled to maximize the performance of the cost function, thereby increasing resistance to steganalysis attacks. This study proposes a combination metho... 详细信息
来源: 评论
The Application of Computer-Aided Under-Resourced Language Translation for Malay into Kadazandusun
Annals of Emerging Technologies in Computing
收藏 引用
Annals of Emerging Technologies in computing 2023年 第5期7卷 11-24页
作者: Sainin, Mohd Shamrie Sintian, Minah Alias, Suraya Tahir, Asni Language Engineering and Application Development Faculty of Computing and Informatics Universiti Malaysia Sabah Malaysia Faculty of Languages and Communication Universiti Pendidikan Sultan Idris Malaysia
A computer-aided language translation using a Machine translation (MT) is an application performed by computers (machines) that translates one natural language to another. There are many online language translation to... 详细信息
来源: 评论
PErformance Evaluation of Detection Mechanisms Towards the Slow Ddos Attack of Edge computing  8
PErformance Evaluation of Detection Mechanisms Towards the S...
收藏 引用
8th IEEE International Conference on Software Engineering and Computer Systems, ICSECS 2023
作者: Lee, Xue Yi Leau, Yu-Beng Universiti Malaysia Sabah Faculty of Computing and Informatics Kota Kinabalu Malaysia Universiti Malaysia Sabah Cybersecurity Research Lab Faculty of Computing and Informatics Kota Kinabalu Malaysia
Edge computing is a network topology made up of three layers: Cloud Server Layer (CSL), Edge Server Layer (ESL), and Edge Device Layer (EDL). Therefore, it is vulnerable since the processing capacity of loT devices or... 详细信息
来源: 评论
Hybrid Deep Learning Architectures for Histological Image Segmentation  6
Hybrid Deep Learning Architectures for Histological Image Se...
收藏 引用
6th International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2024
作者: Hasan, Md Jahid Ahmad, Wan Siti Halimatul Munirah Wan Ahmad Fauzi, Mohammad Faizal Abas, Fazly Salleh Multimedia University Faculty of Engineering Cyberjaya Malaysia Multimedia University Center for Visual Computing Faculty of Computing and InformaticsFaculty of Engineering Cyberjaya Malaysia Multimedia University Faculty of Engineering and Technology Cyberjaya Malaysia
In histopathology image analysis, accurate segmentation of nuclei holds immense significance, particularly in the early detection and treatment of diseases like breast cancer. Nuclei segmentation is a fundamental but ... 详细信息
来源: 评论
ERBM:A Machine Learning-Driven Rule-Based Model for Intrusion Detection in IoT Environments
收藏 引用
Computers, Materials & Continua 2025年 第6期83卷 5155-5179页
作者: Arshad Mehmmod Komal Batool Ahthsham Sajid Muhammad Mansoor Alam Mazliham MohD Su’ud Inam Ullah Khan Department of Information Security and Data Science Riphah Institute of Systems EngineeringRiphah International UniversityIslamabad46000Pakistan Faculty of Computing Riphah International UniversityIslamabad46000Pakistan Faculty of Computing and Informatics Multimedia UniversityCyberjaya63100Malaysia
Traditional rule-based IntrusionDetection Systems(IDS)are commonly employed owing to their simple design and ability to detect known ***,as dynamic network traffic and a new degree of threats exist in IoT environments... 详细信息
来源: 评论
Statistical Analysis of CPU Power Consumption for Detecting DGA Botnet Command and Control Communication
Statistical Analysis of CPU Power Consumption for Detecting ...
收藏 引用
2024 IEEE International Conference on computing, ICOCO 2024
作者: Ibrahim, Zul-Azri Ismail, Saiful Adli Rahim, Fiza Abdul Abas, Muhammad Hazim bin Khairul Anuar, Muhammad Idris bin Azwan, Aiman Harith Bin Institute of Informatics and Computing in Energy College of Computing and Informatics Universiti Tenaga Nasional Selangor Kajang Malaysia Faculty Artificial Intelligence Universiti Teknologi Malaysia Wilayah Persekutuan Kuala Lumpur Kuala Lumpur Malaysia Department of Computing College of Computing and Informatics Universiti Tenaga Nasional Selangor Kajang Malaysia
Domain Generation Algorithms (DGA) Botnets represent a significant threat to network security due to their ability to mask Command and Control (C&C) communications with botmaster. Traditional detection methods lik... 详细信息
来源: 评论
Analyzing the Efficiency of Software Distribution Systems in AIoT Environments  8th
Analyzing the Efficiency of Software Distribution Systems in...
收藏 引用
8th EAI International Conference on Management of Manufacturing Systems, MMS 2023
作者: Jevremovic, Aleksandar Veinovic, Mladen Peraković, Dragan Faculty of Informatics and Computing Singidunum University Belgrade Serbia Faculty of Transport and Traffic Sciences University of Zagreb Zagreb Croatia
In the past few decades, the capabilities of hardware platforms designed for the development of specialized devices (such as mobile phones or embedded computers) have advanced tremendously. One significant consequence... 详细信息
来源: 评论
ShadowSense: a Multi-annotated Dataset for Evaluating Word Sense Induction  30
ShadowSense: a Multi-annotated Dataset for Evaluating Word S...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Herman, Ondřej Jakubíček, Miloš Lexical Computing Brno Czech Republic Faculty of Informatics Masaryk University Brno Czech Republic
In this paper we present a novel bilingual (Czech, English) dataset called ShadowSense developed for the purposes of word sense induction (WSI) evaluation. Unlike existing WSI datasets, ShadowSense is annotated by mul... 详细信息
来源: 评论