咨询与建议

限定检索结果

文献类型

  • 2,713 篇 会议
  • 2,072 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 4,824 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,742 篇 工学
    • 1,884 篇 计算机科学与技术...
    • 1,556 篇 软件工程
    • 528 篇 信息与通信工程
    • 400 篇 控制科学与工程
    • 285 篇 电气工程
    • 282 篇 电子科学与技术(可...
    • 273 篇 生物工程
    • 242 篇 生物医学工程(可授...
    • 212 篇 机械工程
    • 170 篇 光学工程
    • 149 篇 仪器科学与技术
    • 124 篇 化学工程与技术
    • 95 篇 材料科学与工程(可...
    • 88 篇 安全科学与工程
  • 1,917 篇 理学
    • 882 篇 物理学
    • 709 篇 数学
    • 363 篇 生物学
    • 248 篇 统计学(可授理学、...
    • 150 篇 系统科学
    • 138 篇 化学
  • 782 篇 管理学
    • 487 篇 管理科学与工程(可...
    • 338 篇 图书情报与档案管...
    • 273 篇 工商管理
  • 290 篇 医学
    • 241 篇 临床医学
    • 193 篇 基础医学(可授医学...
    • 101 篇 药学(可授医学、理...
    • 92 篇 公共卫生与预防医...
  • 146 篇 法学
    • 128 篇 社会学
  • 112 篇 教育学
    • 105 篇 教育学
  • 93 篇 经济学
    • 92 篇 应用经济学
  • 89 篇 农学
  • 17 篇 文学
  • 17 篇 军事学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 96 篇 deep learning
  • 85 篇 machine learning
  • 83 篇 computer science
  • 72 篇 computational mo...
  • 69 篇 artificial intel...
  • 68 篇 accuracy
  • 63 篇 training
  • 61 篇 students
  • 60 篇 feature extracti...
  • 51 篇 data mining
  • 49 篇 data models
  • 47 篇 proton-proton in...
  • 45 篇 higgs bosons
  • 43 篇 visualization
  • 41 篇 hadron colliders
  • 41 篇 sentiment analys...
  • 39 篇 internet of thin...
  • 39 篇 education
  • 39 篇 semantics
  • 38 篇 decision making

机构

  • 295 篇 department for p...
  • 294 篇 faculty of scien...
  • 288 篇 department of ph...
  • 279 篇 departamento de ...
  • 275 篇 department of ph...
  • 274 篇 kirchhoff-instit...
  • 273 篇 department of ph...
  • 272 篇 department of ph...
  • 271 篇 institute of phy...
  • 264 篇 institute of phy...
  • 255 篇 faculté des scie...
  • 251 篇 fakultät für phy...
  • 233 篇 institut für ast...
  • 231 篇 instituto de fís...
  • 228 篇 department of ph...
  • 227 篇 department of ph...
  • 223 篇 yerevan physics ...
  • 219 篇 department of ph...
  • 218 篇 physics division...
  • 214 篇 department of ph...

作者

  • 270 篇 c. alexa
  • 270 篇 j. m. izen
  • 270 篇 g. bella
  • 270 篇 j. strandberg
  • 270 篇 d. calvet
  • 270 篇 c. amelung
  • 270 篇 g. spigo
  • 269 篇 f. siegert
  • 265 篇 m. klein
  • 264 篇 r. ströhmer
  • 262 篇 a. c. könig
  • 262 篇 m. rijssenbeek
  • 261 篇 s. jin
  • 261 篇 g. gaudio
  • 260 篇 s. mohapatra
  • 259 篇 h. a. gordon
  • 256 篇 s. guindon
  • 255 篇 a. kaczmarska
  • 252 篇 y. nagasaka
  • 251 篇 h. sakamoto

语言

  • 4,578 篇 英文
  • 181 篇 其他
  • 36 篇 日文
  • 34 篇 中文
检索条件"机构=Graduate Program of Computer Science Faculty of Computer Science and Information Technology"
4824 条 记 录,以下是221-230 订阅
排序:
Shadow learner system: implementation of CNN with explainable AI model for bone radiology image classification
收藏 引用
Soft Computing 2025年 第7期29卷 3571-3588页
作者: Wu, Yaoyang Fong, Simon Liu, Liansheng Department of Computer and Information Science University of Macau Taipa Macao Medical Imaging Department The Sixth Affiliated Hospital of Jinan University Guangdong China Faculty of Digital Science and Technology Macau Millennium College Macao
Advancements in deep learning models for medical image classification have greatly improved accuracy, yet the challenge of explainability persists, making it difficult for clinicians to trust and effectively utilize t... 详细信息
来源: 评论
Security Risks and Best Practices for Blockchain and Smart Contracts: A Systematic Literature Review  8
Security Risks and Best Practices for Blockchain and Smart C...
收藏 引用
8th International Conference on information Management and technology, ICIMTech 2023
作者: Yulianto, Semi Hendric Spits Warnars, Harco Leslie Prabowo, Harjanto Meyliana Hidayanto, Achmad Nizar Bina Nusantara University Binus Graduate Program - Doctor of Computer Science Computer Science Department Jakarta11480 Indonesia Binus Business School Undergraduate Program Bina Nusantara University Management Department Jakarta11480 Indonesia School of Information Systems Bina Nusantara University Information Systems Department Jakarta11480 Indonesia Universitas Indonesia Faculty of Computer Science Depok Indonesia
The rise of blockchain technology and smart contracts has brought widespread attention due to their capacity to transform multiple industrial sectors through decentralized, transparent, secure transactions. However, d... 详细信息
来源: 评论
Identifying The Types and Platforms of the Metaverse - a Systematic Literature Review
Identifying The Types and Platforms of the Metaverse - a Sys...
收藏 引用
2022 IEEE Creative Communication and Innovative technology, ICCIT 2022
作者: Suryodiningrat, Satrio Pradono Prabowo, Harjanto Ramadhan, Arief Santoso, Harry Budi Bina Nusantara University Computer Science Binus Graduate Program Jakarta Indonesia Bina Nusantara University Computer Science Graduate Program Jakarta Indonesia Universitas Indonesia Faculty of Computer Science Depok Indonesia
Metaverse is gaining a lot of traction lately, especially after Mark Zuckerberg's Facebook changed its name to Meta as a preparation to enter another universe called metaverse. The eXtended Reality (XR) technology... 详细信息
来源: 评论
Optimal Deep Canonically Correlated Autoencoder-Enabled Prediction Model for Customer Churn Prediction
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3757-3769页
作者: Olfat M.Mirza GJose Moses R.Rajender E.Laxmi Lydia Seifedine Kadry Cheadchai Me-Ead Orawit Thinnukool Department of Computer Science College of Computers and Information SystemsUmm Al-Qura UniversityMakkahSaudi Arabia Department of Computer Science Engineering Malla Reddy Engineering College500100India Department of Computer Science Engineering Lendi Institute of Engineering&TechnologyDenkada535005India Department of Computer Science and Engineering Vignan’s Institute of Information TechnologyVisakhapatnam530049India Department of Applied Data Science Noroff University CollegeNorway Program in Statistics and Information Management Faculty of ScienceMaejo UniversityChiang Mai50290Thailand Department of Modern Management and Information Technology College of Arts Media and TechnologyChiang Mai UniversityChiang Mai50200Thailand
Presently,customer retention is essential for reducing customer churn in telecommunication *** churn prediction(CCP)is important to predict the possibility of customer retention in the quality of *** risks of customer... 详细信息
来源: 评论
Enhancing Healthcare Data Security: Computational Efficiency of Blockchain-Based Digital Signatures  5th
Enhancing Healthcare Data Security: Computational Efficiency...
收藏 引用
5th Doctoral Symposium on Computational Intelligence, DoSCI 2024
作者: Xu, Li Goyal, S.B. Rajawat, Anand Singh Niranjala, T. H. A. Shyama Heshini City Graduate School City University Petaling Jaya46100 Malaysia Nanchang Institute of Science and Technology Nanchang China Faculty of Information Technology City University Petaling Jaya46100 Malaysia School of Computer Science and Engineering Sandip University Nashik India
This study aims to examine the computational efficiency of blockchain-based digital signature technologies with respect to healthcare data security. When thinking about the revolutionary opportunities and risks posed ... 详细信息
来源: 评论
Impact of Remote Working During Covid-19 Pandemic on Scrum Team: Experts View on Indonesian E-Commerce Companies Case  2022
Impact of Remote Working During Covid-19 Pandemic on Scrum T...
收藏 引用
5th International Conference on Software Engineering and information Management, ICSIM 2022
作者: Nuraga Sani, Kretawiweka Budiardjo, Eko Mahatma, Kodrat Master of Information Technology Faculty of Computer Science Universitas Indonesia Indonesia Faculty of Computer Science Universitas Indonesia Indonesia
The Covid-19 pandemic has changed many things in our activities, including how we work. Almost all countries, including Indonesia, require remote working or working from home, including technology companies. Many tech... 详细信息
来源: 评论
Current and Voltage Calculations of the 400 kV Transmission Line Using Laboratory Measurements and computer Simulation  33rd
Current and Voltage Calculations of the 400 kV Transmission...
收藏 引用
33rd International Conference on Organization and technology of Maintenance, OTO 2024
作者: Torma, Matej Fekete, Krešimir Kljajić, Ružica Čvek, Kristijan Faculty of Electrical Engineering Computer Science and Information Technology Osijek University of Osijek Kneza Trpimira 2b Osijek31000 Croatia
In this paper, the current, voltages, as well as active and reactive power of the 400 kV transmission line are calculated using three different methods. The objective of the paper is to demonstrate and compare th... 详细信息
来源: 评论
Effect of Introducing Leucine Residues into 2-Aminoisobutyric Acid-Based Amphiphilic Helical Peptides on Intermolecular Interactions and Peptide Self-Assembly
收藏 引用
ACS Omega 2025年 第21期10卷 22184-22190页
作者: Yamaguchi, Kasumi Kusumoto, Tomoichiro Araki, Takeshi Gomibuchi, Yuki Yasunaga, Takuo Osada, Satoshi Taira, Junichi Department of Chemistry and Applied Chemistry Faculty of Science and Engineering Saga University Saga 840-8502 Japan Department of Bioscience and Bioinformatics Fukuoka 820-8502 Japan Department of Physics and Information Technology Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology Fukuoka 820-8502 Japan
In recent years, self-assembling de novo-designed peptides have attracted increasing attention as materials for constructing submicrometer-scale structures. We have previously conducted structure-activity relationship...
来源: 评论
Analyzing the Effect of Observer Node Addition Strategy on Bitcoin Double-Spending Attack Detection Using Graph Neural Network  24
Analyzing the Effect of Observer Node Addition Strategy on B...
收藏 引用
24th Asia-Pacific Network Operations and Management Symposium, APNOMS 2023
作者: Kang, Changhoon Woo, Jongsoo Hong, James Won-Ki Department of Computer Science and Engineering POSTECH Korea Republic of Graduate School of Information Technology POSTECH Korea Republic of
Bitcoin transactions are created through the concept called Unspent Transaction Output (UTXO). Users put their own UTXOs as inputs into a transaction for Bitcoin transfer and create multiple outputs, each specifying t... 详细信息
来源: 评论
An Extended Euclidean Algorithm Implementation over Ciphertext Space  2nd
An Extended Euclidean Algorithm Implementation over Ciphert...
收藏 引用
2nd International Conference on Security and information Technologies with AI, Internet Computing and Big-data Applications, SITAIBA 2023
作者: Chi, Po-Wen Lin, Yuan-Pang Wang, Ming-Hung Chuang, Yun-Hsin Department of Computer Science and Information Engineering National Taiwan Normal University Taiwan Taipei Taiwan Department of Computer Science and Information Engineering National Chung Cheng University Taiwan Chiayi Taiwan Engineering Management Graduate Program College of Engineering National Cheng Kung University Taiwan Tainan Taiwan
Fully homomorphic encryption (FHE) is a useful cryptographic primitive. It makes a third-party manipulate data in the ciphertext space and therefore is a key technology for privacy-preserving outsourcing services. The... 详细信息
来源: 评论