咨询与建议

限定检索结果

文献类型

  • 9,293 篇 会议
  • 5,798 篇 期刊文献
  • 296 册 图书

馆藏范围

  • 15,387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,802 篇 工学
    • 6,066 篇 计算机科学与技术...
    • 4,945 篇 软件工程
    • 2,045 篇 信息与通信工程
    • 1,279 篇 控制科学与工程
    • 1,202 篇 生物工程
    • 1,194 篇 生物医学工程(可授...
    • 954 篇 电气工程
    • 856 篇 电子科学与技术(可...
    • 766 篇 光学工程
    • 565 篇 机械工程
    • 491 篇 仪器科学与技术
    • 387 篇 化学工程与技术
    • 360 篇 动力工程及工程热...
    • 310 篇 安全科学与工程
    • 265 篇 交通运输工程
    • 258 篇 建筑学
  • 5,597 篇 理学
    • 2,617 篇 数学
    • 1,908 篇 物理学
    • 1,387 篇 生物学
    • 864 篇 统计学(可授理学、...
    • 604 篇 系统科学
    • 439 篇 化学
  • 2,354 篇 管理学
    • 1,354 篇 管理科学与工程(可...
    • 1,102 篇 图书情报与档案管...
    • 743 篇 工商管理
  • 1,162 篇 医学
    • 994 篇 临床医学
    • 889 篇 基础医学(可授医学...
    • 580 篇 药学(可授医学、理...
    • 409 篇 公共卫生与预防医...
  • 406 篇 法学
    • 345 篇 社会学
  • 250 篇 经济学
  • 218 篇 教育学
  • 211 篇 农学
  • 51 篇 文学
  • 21 篇 军事学
  • 21 篇 艺术学
  • 7 篇 哲学
  • 1 篇 历史学

主题

  • 477 篇 informatics
  • 250 篇 computational mo...
  • 214 篇 computer archite...
  • 212 篇 deep learning
  • 198 篇 machine learning
  • 187 篇 computer science
  • 182 篇 data mining
  • 160 篇 artificial intel...
  • 157 篇 image segmentati...
  • 157 篇 optimization
  • 153 篇 internet of thin...
  • 141 篇 feature extracti...
  • 139 篇 quality of servi...
  • 131 篇 wireless sensor ...
  • 127 篇 support vector m...
  • 127 篇 resource managem...
  • 125 篇 neural networks
  • 125 篇 bandwidth
  • 123 篇 monitoring
  • 122 篇 accuracy

机构

  • 411 篇 department for p...
  • 404 篇 faculty of scien...
  • 401 篇 department of ph...
  • 393 篇 kirchhoff-instit...
  • 385 篇 department of ph...
  • 384 篇 department of ph...
  • 358 篇 fakultät für phy...
  • 339 篇 institute of phy...
  • 329 篇 institute of phy...
  • 305 篇 department of ph...
  • 280 篇 department of ph...
  • 273 篇 instituto de fís...
  • 268 篇 graduate school ...
  • 268 篇 universidade fed...
  • 267 篇 department of ph...
  • 264 篇 ictp trieste
  • 254 篇 yerevan physics ...
  • 252 篇 department of ph...
  • 248 篇 department of ph...
  • 246 篇 nikhef national ...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 331 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 324 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 317 篇 s. mohapatra
  • 305 篇 s. guindon
  • 299 篇 y. tayalati
  • 299 篇 a. kaczmarska
  • 283 篇 m. klein
  • 281 篇 j. schaarschmidt
  • 267 篇 a. d. pilkington
  • 259 篇 f. pastore

语言

  • 14,571 篇 英文
  • 710 篇 其他
  • 98 篇 中文
  • 13 篇 日文
  • 4 篇 德文
  • 2 篇 斯洛文尼亚文
  • 1 篇 爱沙尼亚文
  • 1 篇 法文
  • 1 篇 俄文
  • 1 篇 土耳其文
检索条件"机构=Informatics and Computer Engineering Department"
15387 条 记 录,以下是4591-4600 订阅
排序:
Spatial Adaptive Cooperative Graph Convolution Attention for Person Re-Identification
SSRN
收藏 引用
SSRN 2023年
作者: Xiong, Mingfu Xiong, Jiefan Wang, Zhongyuan Chen, Jia Hu, Ruimin Muhammad, Khan Xiong, Zixiang School of Computer Science and Artificial Intelligence Wuhan Textile University Wuhan430200 China Wuhan University Wuhan430072 China Department of Applied Artificial Intelligence School of Convergence College of Computing and Informatics Sungkyunkwan University Seoul03063 Korea Republic of The Department of Electrical and Computer Engineering Texas A&M University College StationTX7784 United States
Recently, person re-identification (person Re-ID) equipped with attention mechanism (AM) has gradually emerged as one of the prevalent study highlights. In fact, the existing attention-based methods still remain the c... 详细信息
来源: 评论
On the Distortion of Committee Election with 1-Euclidean Preferences and Few Distance Queries
arXiv
收藏 引用
arXiv 2024年
作者: Fotakis, Dimitris Gourvès, Laurent Patsilinakos, Panagiotis School of Electrical and Computer Engineering National Technical University of Athens Athens15780 Greece Archimedes Research Unit Athena RC Athens15121 Greece Université Paris Dauphine-PSL CNRS LAMSADE Paris75016 France Department of Informatics Athens University of Economics and Business Athens10434 Greece
We consider committee election of k ≥ 2 (out of m ≥ k + 1) candidates, where the voters and the candidates are associated with locations on the real line. Each voter's cardinal preferences over candidates corres... 详细信息
来源: 评论
Adaptive latent fingerprint image segmentation and matching using Chan-vese technique based on EDTV model  2
Adaptive latent fingerprint image segmentation and matching ...
收藏 引用
2nd International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2021
作者: Hilles, Shadi M S Liban, Abdilahi Altrad, Abdullah Mahmoud Miaikil, Othman A.M. El-Ebiary, Yousef A. Baker Contreras, Jennifer Hilles, Mohanad M Istanbul OKAN University Software Engineering Department Istanbul Turkey Hargeisa University Computer Science Department Hargeisa Somalia Al-Madinah International University Computer Science Department Kuala Lumpur Malaysia Universiti Sultan Zainal Abidin Faculty of Informatics and Computing Trengganu Malaysia FEU Institute of Technology Department of Information Technology Manila Philippines University College of Applied Science Information Technology Department Gaza Palestine
Biometrics such as face, fingerprint, iris, voice and palm prints are the most widely used, and as well the fingerprints are one of the most frequently used biometrics to identify individuals and authenticate their id... 详细信息
来源: 评论
Mqtt Routing Optimizing Based Intrusion Detection for Internet of Things Using Hybrid Machine Learning
Mqtt Routing Optimizing Based Intrusion Detection for Intern...
收藏 引用
Decision Aid Sciences and Application (DASA), International Conference on
作者: Haider K. Hoomod Mohammad Alaa Al-Hamami Aqeel Kamil Kadhim Qutaiba Humadi Mohammed Jolan Rokan Niaf College of Education Mustansiriyah University Baghdad Iraq Department of Management Information Systems Applied Science University Manama Kingdom of Bahrain Computer Techniques Engineering Department Imam Al-Kadhim College Baghdad Iraq College of Nursing University of Baghdad Baghdad Iraq Informatics Institute for Postgraduate Studies University of Information Technology and Communications Baghdad Iraq
With the advent of the Internet of Things, a world was born in which everything could be uniquely identified and monitored, tracked, and managed by computer programs. Items can self-configure using a predefined commun... 详细信息
来源: 评论
An In-Depth Evaluation of Federated Learning on Biomedical Natural Language Processing
arXiv
收藏 引用
arXiv 2023年
作者: Peng, Le Luo, Gaoxiang Zhou, Sicheng Chen, Jiandong Xu, Ziyue Zhang, Rui Sun, Ju Department of Computer Science and Engineering University of Minnesota MinneapolisMN United States Department of Computer and Information Science University of Pennsylvania PhiladelphiaPA United States Institute for Health Informatics University of Minnesota MinneapolisMN United States Nvidia Corporation Santa ClaraCA United States Division of Computational Health Sciences Department of Surgery University of Minnesota MinneapolisMN United States
Language models (LMs) such as BERT and GPT have revolutionized natural language processing (NLP). However, the medical field faces challenges in training LMs due to limited data access and privacy constraints imposed ... 详细信息
来源: 评论
Low-Cost Air Box Application for Indoor Environment Classification and LSTM Microclimate Prediction
Low-Cost Air Box Application for Indoor Environment Classifi...
收藏 引用
International Conference on Control and Robots (ICCR)
作者: Hu Hsun-Jui Chiu Yu-Hsien Yang Pei-Ching Master Degree Program in Information and Design Chang Jung Christian University Tainan Taiwan Department of Healthcare Administration and Medical Informatics Kaohsiung Medical University Kaohsiung Taiwan Artificial Intelligence Research Center Chang Jung Christian University Tainan Taiwan Department of Computer Science and Information Engineering Chang Jung Christian University Tainan Taiwan
Air pollution is a significant issue because it burdens human health and the environment. Particulate matter with a diameter of 2.5 micrometers or smaller (PM2.5) can penetrate the lungs and enter the bloodstream, ser... 详细信息
来源: 评论
A Bionic Data-driven Approach for Long-distance Underwater Navigation with Anomaly Resistance
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Songnan Zhang, Xiaohui Zhang, Shiliang Ma, Xuehui Bai, Wenqi Li, Yushuai Huang, Tingwen The School of Automation and Information Engineering Xi’an University of Technology Shaanxi 710048 China The Institute of Advanced Navigation and Electromagnetics Xi’an University of Technology Shaanxi 710048 China The Department of Informatics University of Oslo Oslo0316 Norway The Department of Computer Science Aalborg University Aalborg9220 Denmark Texas A&M University at Qatar Doha23874 Qatar
Various animals exhibit accurate navigation using environment cues. The Earth’s magnetic field has been proved a reliable information source in long-distance fauna migration. Inspired by animal navigation, this work ... 详细信息
来源: 评论
Digital Technology in Health Education Trend Mapping through Bibliometrics Analysis
Digital Technology in Health Education Trend Mapping through...
收藏 引用
International Conference on informatics, Multimedia, Cyber and Information System (ICIMCIS)
作者: Fairuz Iqbal Maulana Dian Lestari Vandha Pradwiyasma Widartha Nirwana Haidar Wahyu Dirgantara Computer Science Department School of Computer Science Bina Nusantara University Jakarta Indonesia Faculty of Medicine Airlangga University Surabaya Indonesia Information System of Industrial Engineering Faculty Telkom University Bandung Indonesia Informatics Engineering Study Program University of Madura Pamekasan Indonesia Department of Electrical Engineering University of Merdeka Malang Malang Indonesia
This study examines the mapping of research data on digital technology in the field of health education using bibliometric analysis method. Data was collected by identifying keywords in the Scopus database and sorting... 详细信息
来源: 评论
Explainable machine learning versus known nomogram for predicting non-sentinel lymph node metastases in breast cancer patients: A comparative study
收藏 引用
computers in Biology and Medicine 2025年 184卷 109412-109412页
作者: Fattahi, Asieh Sadat Hoseini, Maryam Dehghani, Toktam Nezhad Noor Nia, Raheleh Ghouchan Naseri, Zeinab Ebrahimzadeh, Amirali Mahri, Ali Eslami, Saeid Department of Surgery Faculty of Medicine Endoscopic and Minimally Invasive Research Center Mashhad University of Medical Sciences Mashhad Iran General Surgeon Department of Surgery Endoscopic and Minimally Invasive Research Center Mashhad University of Medical Sciences Mashhad Iran Department of Medical Informatics Faculty of Medicine Mashhad University of Medical Sciences Mashhad Iran Computer Engineering Sharif University of Technology Tehran Iran Endoscopic and Minimally Invasive Research Center Mashhad University of Medical Sciences Mashhad Iran Pharmaceutical Research Center Faculty of Medicine Mashhad University of Medical Sciences Mashhad Iran Department of Medical Informatics UMC-Location AMC University of Amsterdam Amsterdam Netherlands
Introduction: Axillary lymph node dissection (ALND) is the standard of care for breast cancer patients with positive sentinel lymph nodes (SLN), which are the first lymph nodes that drain the breast. However, many pat... 详细信息
来源: 评论
Latent fingerprint enhancement and segmentation technique based on hybrid edge adaptive DTV model  2
Latent fingerprint enhancement and segmentation technique ba...
收藏 引用
2nd International Conference on Smart Computing and Electronic Enterprise, ICSCEE 2021
作者: Hilles, Shadi M S Liban, Abdilahi Miaikil, Othman A.M. Mahmoud Altrad, Abdullah Baker El-Ebiary, Yousef A. Hilles, Mohanad M Contreras, Jennifer Istanbul OKAN University Software Engineering Department Istanbul Turkey Hargeisa University Computer Science Department Hargeisa Somalia Al-Madinah International University Computer Science Department Kuala Lumpur Malaysia Universiti Sultan Zainal Abidin Faculty of Informatics and Computing Trengganu Malaysia University College of Applied Science Information Technology Department Gaza Palestine FEU Institute of Technology Department of Information Technology Manila Philippines
Image enhancement and segmentation is widely used for fingerprint identification and authorization in biometrics devices, criminal scene is most challenges due to low quality of fingerprint, the most significant effor... 详细信息
来源: 评论