咨询与建议

限定检索结果

文献类型

  • 16,747 篇 会议
  • 11,199 篇 期刊文献
  • 461 册 图书

馆藏范围

  • 28,407 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 16,319 篇 工学
    • 11,819 篇 计算机科学与技术...
    • 9,643 篇 软件工程
    • 3,603 篇 信息与通信工程
    • 2,315 篇 控制科学与工程
    • 1,913 篇 生物工程
    • 1,675 篇 电气工程
    • 1,576 篇 生物医学工程(可授...
    • 1,466 篇 电子科学与技术(可...
    • 1,147 篇 机械工程
    • 1,036 篇 光学工程
    • 878 篇 仪器科学与技术
    • 836 篇 化学工程与技术
    • 676 篇 动力工程及工程热...
    • 567 篇 网络空间安全
    • 560 篇 安全科学与工程
  • 10,204 篇 理学
    • 4,718 篇 数学
    • 3,682 篇 物理学
    • 2,225 篇 生物学
    • 1,488 篇 统计学(可授理学、...
    • 1,055 篇 系统科学
    • 908 篇 化学
  • 5,214 篇 管理学
    • 2,988 篇 管理科学与工程(可...
    • 2,435 篇 图书情报与档案管...
    • 1,555 篇 工商管理
  • 1,719 篇 医学
    • 1,463 篇 临床医学
    • 1,252 篇 基础医学(可授医学...
    • 760 篇 药学(可授医学、理...
    • 677 篇 公共卫生与预防医...
  • 807 篇 法学
    • 670 篇 社会学
  • 544 篇 经济学
    • 543 篇 应用经济学
  • 476 篇 教育学
  • 397 篇 农学
  • 149 篇 文学
  • 61 篇 艺术学
  • 59 篇 军事学
  • 5 篇 哲学
  • 4 篇 历史学

主题

  • 684 篇 deep learning
  • 571 篇 computer science
  • 513 篇 accuracy
  • 488 篇 machine learning
  • 473 篇 feature extracti...
  • 407 篇 artificial intel...
  • 384 篇 information tech...
  • 384 篇 computational mo...
  • 349 篇 support vector m...
  • 339 篇 internet of thin...
  • 336 篇 training
  • 290 篇 data mining
  • 203 篇 covid-19
  • 198 篇 image segmentati...
  • 190 篇 computer archite...
  • 189 篇 reliability
  • 188 篇 optimization
  • 181 篇 predictive model...
  • 181 篇 data models
  • 172 篇 neural networks

机构

  • 542 篇 department of ph...
  • 420 篇 dipartimento di ...
  • 381 篇 department for p...
  • 372 篇 faculty of scien...
  • 356 篇 department of ph...
  • 353 篇 department of ph...
  • 345 篇 horia hulubei na...
  • 337 篇 department of ph...
  • 320 篇 kirchhoff-instit...
  • 297 篇 institute of phy...
  • 292 篇 department of ph...
  • 285 篇 physikalisches i...
  • 282 篇 institute of phy...
  • 280 篇 infn laboratori ...
  • 269 篇 indian institute...
  • 269 篇 china institute ...
  • 266 篇 school of physic...
  • 264 篇 instituto de fís...
  • 263 篇 fakultät für phy...
  • 262 篇 department of ph...

作者

  • 310 篇 c. alexa
  • 308 篇 j. m. izen
  • 307 篇 g. bella
  • 307 篇 d. calvet
  • 307 篇 c. amelung
  • 305 篇 j. strandberg
  • 304 篇 g. spigo
  • 302 篇 f. siegert
  • 288 篇 r. ströhmer
  • 280 篇 m. rijssenbeek
  • 278 篇 y. tayalati
  • 275 篇 s. jin
  • 272 篇 g. gaudio
  • 264 篇 s. mohapatra
  • 254 篇 m. klein
  • 241 篇 f. pastore
  • 234 篇 n. orlando
  • 222 篇 s. guindon
  • 213 篇 a. kaczmarska
  • 209 篇 j. schaarschmidt

语言

  • 26,926 篇 英文
  • 1,282 篇 其他
  • 163 篇 中文
  • 60 篇 日文
  • 10 篇 德文
  • 7 篇 斯洛文尼亚文
  • 4 篇 俄文
  • 3 篇 法文
  • 2 篇 西班牙文
检索条件"机构=Informatics/Faculty of Computer Science and Information Technology"
28407 条 记 录,以下是91-100 订阅
排序:
Multi-Task Learning Model with Data Augmentation for Arabic Aspect-Based Sentiment Analysis
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4419-4444页
作者: Arwa Saif Fadel Osama Ahmed Abulnaja Mostafa Elsayed Saleh Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Faculty of Computer Sciences and EngineeringHodeidah UniversityYemen
Aspect-based sentiment analysis(ABSA)is a fine-grained *** fundamental subtasks are aspect termextraction(ATE)and aspect polarity classification(APC),and these subtasks are dependent and closely ***,most existing work... 详细信息
来源: 评论
Predictive Value Chain Analysis to Improve Generalization Accuracy In Quality Assurance
Predictive Value Chain Analysis to Improve Generalization Ac...
收藏 引用
2024 International Conference on Control and Automation, Electronics, Robotics, Internet of Things, and Artificial Intelligence, CERIA 2024
作者: Harmayani Sihombing, Poltak Mahyudin Elveny, Marischa Universitas Sumatera Utara Postgraduate Program in Computer Science Faculty of Computer Science and Information Technology Medan Indonesia Universitas Sumatera Utara Faculty of Computer Science and Information Technology Medan Indonesia Universitas Sumatera Utara Faculty of Computer Science and Information Technology Postgraduate Doctorate in Computer Science Medan Indonesia
Adaptive predictive analysis model utilizing Spiking Neural Networks (SNNs) to enhance quality assurance processes in Smart Campus environments. Traditional predictive models often struggle with the dynamic and comple... 详细信息
来源: 评论
High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 183-211页
作者: Murad Njoum Rossilawati Sulaiman Zarina Shukur Faizan Qamar Center of Cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan MalaysiaBangiSelangor43600Malaysia Computer Science and Cyber Security Faculty of Engineering and Information TechnologyBirZeit UniversityBirZeitRamallahP.O.Box 14Palestine
Random pixel selection is one of the image steganography methods that has achieved significant success in enhancing the robustness of hidden *** property makes it difficult for steganalysts’powerful data extraction t... 详细信息
来源: 评论
Enhancing Drone Security Through Multi-Sensor Anomaly Detection and Machine Learning
收藏 引用
SN computer science 2024年 第5期5卷 651页
作者: Alzahrani, Mohammed Y. Department of Information Technology Faculty of Computer Science & amp Information Technology AlBaha University AlBaha Saudi Arabia
Unmanned Aerial Vehicles (UAVs), commonly referred to as drones, have determined numerous applications across industries, ranging from aerial surveillance to package shipping. As drones are used in vital operations, e... 详细信息
来源: 评论
Adaptive Optimal Discrete-Time Output-Feedback Using an Internal Model Principle and Adaptive Dynamic Programming
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第1期11卷 131-140页
作者: Zhongyang Wang Youqing Wang Zdzisław Kowalczuk the College of Information Science and Technology Beijing University of Chemical TechnologyBeijing 100029China IEEE the Department of Robotics and Decision Systems Faculty of ElectronicsTelecommunications and InformaticsGdańsk University of TechnologyGdansk 80-233Poland
In order to address the output feedback issue for linear discrete-time systems, this work suggests a brand-new adaptive dynamic programming(ADP) technique based on the internal model principle(IMP). The proposed metho... 详细信息
来源: 评论
A three-step SEM-Bayesian network approach for predicting the determinants of CloudIoT-based healthcare adoption
收藏 引用
International Journal of information technology (Singapore) 2024年 1-21页
作者: Altawaiha, Iyad Atan, Rodziah Yaakob, Razali Bin Abdullah, Rusli Bin Hj Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia
Adopting the CloudIoT-based healthcare paradigm provides various prospects for medical IT and considerably enhances healthcare services. However, compared to the advanced development of CloudIoT-based healthcare syste... 详细信息
来源: 评论
Assessing and prioritizing crucial drivers for CloudIoT-based healthcare adoption: an analytic hierarchy process approach
收藏 引用
International Journal of information technology (Singapore) 2024年 1-18页
作者: Altawaiha, Iyad Atan, Rodziah Yaakob, Razali Bin Abdullah, Rusli Bin Hj Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia
The CloudIoT paradigm has profoundly transformed the healthcare industry, providing outstanding innovation and practical applications. However, despite its many advantages, the adoption of this paradigm in healthcare ... 详细信息
来源: 评论
Machine Learning and Deep Learning Approaches for Fake News Detection: A Systematic Review of Techniques, Challenges, and Advancements
收藏 引用
IEEE Access 2025年 13卷 90433-90466页
作者: Bashaddadh, Omar Omar, Nazlia Mohd, Masnizah Khalid, Mohd Nor Akmal Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Centre for Artificial Intelligence Technology Bangi43600 Malaysia Seiyun University College of Computers Department of Computer Science Hadhramout Yemen Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Centre for Cyber Security Bangi43600 Malaysia
In response to the escalating threat of fake news on social media, this systematic literature review analyzes recent advancements in machine learning and deep learning approaches for its automated detection. Following... 详细信息
来源: 评论
Towards the Development of a Copyright Risk Checker Tool for Generative Artificial Intelligence Systems
收藏 引用
Digital Government: Research and Practice 2024年 第4期5卷 1-21页
作者: Billiris, Grace Gill, Asif Oppermann, Ian Niazi, Mahmood Faculty of Engineering and Information Technology University of Technology SydneyNSW Australia Computer Science University of Technology SydneyNSW Australia University of Technology SydneyNSW Australia King Fahd University of Petroleum and Minerals Department of Information and Computer Science Dhahran Saudi Arabia
Generative Artificial Intelligence (GAI) is fundamentally changing the ways of working and blurring the boundaries between human and machine-generated contents. While there is an increasing interest in the adoption of... 详细信息
来源: 评论
A Review of Deep Convolutional Neural Networks in Mobile Face Recognition
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2023年 第23期17卷 4-19页
作者: Chi, Jing On, Chin Kim Zhang, Haopeng Chai, Soo See Faculty of Computing and Informatics University Malaysia Sabah Sabah Malaysia School Information and Electrical Engineering Hebei University of Engineering Hebei China Faculty of Computer Science and Information Technology Universiti Malaysia Sarawak Sarawak Malaysia
With the emergence of deep learning, Convolutional Neural Network (CNN) models have been proposed to advance the progress of various applications, including face recognition, object detection, pattern recognition, and... 详细信息
来源: 评论