咨询与建议

限定检索结果

文献类型

  • 199 篇 期刊文献
  • 188 篇 会议
  • 3 册 图书

馆藏范围

  • 390 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 209 篇 工学
    • 129 篇 计算机科学与技术...
    • 106 篇 软件工程
    • 27 篇 生物医学工程(可授...
    • 25 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 控制科学与工程
    • 17 篇 电子科学与技术(可...
    • 16 篇 生物工程
    • 15 篇 光学工程
    • 13 篇 化学工程与技术
    • 12 篇 土木工程
    • 10 篇 力学(可授工学、理...
    • 9 篇 材料科学与工程(可...
    • 8 篇 船舶与海洋工程
    • 8 篇 安全科学与工程
    • 7 篇 机械工程
  • 166 篇 理学
    • 97 篇 数学
    • 38 篇 物理学
    • 29 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 19 篇 化学
    • 19 篇 系统科学
  • 63 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 26 篇 工商管理
    • 23 篇 图书情报与档案管...
  • 29 篇 医学
    • 21 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 11 篇 公共卫生与预防医...
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 7 篇 法学
    • 7 篇 社会学
  • 5 篇 教育学
  • 4 篇 农学
  • 2 篇 军事学

主题

  • 12 篇 computer science
  • 8 篇 positrons
  • 7 篇 computational mo...
  • 7 篇 semantics
  • 5 篇 power engineerin...
  • 5 篇 petri nets
  • 5 篇 automata
  • 5 篇 polynomials
  • 5 篇 artificial intel...
  • 4 篇 polarization
  • 4 篇 hidden markov mo...
  • 4 篇 informatics
  • 4 篇 education
  • 4 篇 laboratories
  • 4 篇 optimization
  • 4 篇 data mining
  • 4 篇 contrastive lear...
  • 4 篇 production
  • 4 篇 computers
  • 4 篇 decision making

机构

  • 15 篇 beijing key labo...
  • 12 篇 gaoling school o...
  • 8 篇 faculty of physi...
  • 8 篇 institute for fo...
  • 8 篇 pedagogical univ...
  • 8 篇 department of so...
  • 8 篇 department of nu...
  • 7 篇 agh university o...
  • 7 篇 department of ap...
  • 7 篇 infn laboratori ...
  • 6 篇 department of ph...
  • 6 篇 university of ch...
  • 6 篇 gamf faculty of ...
  • 5 篇 budapest busines...
  • 5 篇 faculty of physi...
  • 5 篇 institute of ele...
  • 5 篇 high energy depa...
  • 5 篇 institute of com...
  • 5 篇 department of nu...
  • 5 篇 school of comput...

作者

  • 12 篇 dulski k.
  • 12 篇 kubicz e.
  • 12 篇 kozik t.
  • 12 篇 korcyl g.
  • 12 篇 moskal p.
  • 12 篇 silarski m.
  • 12 篇 gorgol m.
  • 12 篇 marek r. ogiela
  • 12 篇 gajos a.
  • 11 篇 skurzok m.
  • 11 篇 kowalski p.
  • 11 篇 hiesmayr b.c.
  • 11 篇 sharma s.
  • 11 篇 curceanu c.
  • 11 篇 rudy z.
  • 10 篇 tomasz hachaj
  • 10 篇 shopa r.y.
  • 10 篇 kisielewska d.
  • 10 篇 krawczyk n.
  • 10 篇 mohammed m.

语言

  • 363 篇 英文
  • 25 篇 其他
  • 1 篇 德文
  • 1 篇 俄文
  • 1 篇 中文
检索条件"机构=Institute of Computer Science and Computer Methods"
390 条 记 录,以下是1-10 订阅
排序:
Evolving Safety Protocols: Deep Learning-Enabled Detection of Personal Protective Equipment  1
收藏 引用
4th International Conference on computer Vision, High-Performance Computing, Smart Devices, and Networks, CHSN 2023
作者: Alahmid, Mustafa Bhimani, Kishankumar Saradva, Khushbu Ghildiyal, Sushil Saeedi, Sayed Aryan Ali, Saraa Yan, Han Filippov, Evgeny Faculty of Computer Science and Technology Saint Petersburg Electrotechnical University "LETI" Saint Petersburg Russia Laboratory on AI for Computational Biology Faculty of Computer Science HSE University Moscow Russia Department of Computer Science and Engineering Indian Institute of Technology Ropar Punjab India Laboratory of Methods for Big Data Analysis Faculty of Computer Science HSE University Moscow Russia Deggendorf Institute of Technology Bavaria Germany
To give shift in safety protocols, we have employed advanced deep learning algorithms and frameworks (Shrestha and Mahmood in IEEE Access 7:53,040–53,065, 2019 [25]) to construct an innovative AI model. The designed ... 详细信息
来源: 评论
ControlVideo: conditional control for one-shot text-driven video editing and beyond
收藏 引用
science China(Information sciences) 2025年 第3期68卷 150-162页
作者: Min ZHAO Rongzhen WANG Fan BAO Chongxuan LI Jun ZHU Department of Computer Science and Technology Institute for AI Tsinghua-Bosch Joint ML CenterTsinghua Laboratory of Brain and Intelligence Lab Tsinghua University ShengShu Technology Gaoling School of Artificial Intelligence Renmin University of China Beijing Key Laboratory of Big Data Management and Analysis Methods Pazhou Laboratory (Huangpu)
This paper presents ControlVideo for text-driven video editing — generating a video that aligns with a given text while preserving the structure of the source video. Building on a pre-trained text-to-image diffusion ... 详细信息
来源: 评论
A Large-Scale Group Decision-Making Approach Employing Large Language Models to Detect Assertive Groups  23
A Large-Scale Group Decision-Making Approach Employing Large...
收藏 引用
23rd International Conference on New Trends in Intelligent Software Methodologies, Tools and Techniques, SoMeT 2024
作者: Carbó-García, Santiago Trillo, José Ramón Tapia, Juan Miguel Pérez, Ignacio Javier Herrera-Viedma, Enrique Cabrerizo, Francisco Javier Andalusian Research Institute in Data Science and Computational Intelligence Department of Computer Science and Artificial Intelligence University of Granada Granada Spain Department of Quantitative Methods for Business and Economics University of Granada Granada Spain
Large-Scale Group Decision-Making, propelled by the advent of Large Language Models and the imperative for assertiveness in decision-making processes, emerges as a pivotal area of research. This paper navigates throug... 详细信息
来源: 评论
Verification of Genuineness of Educational Internet Resources Using Machine Learning methods  4
Verification of Genuineness of Educational Internet Resource...
收藏 引用
4th International Conference on Technology Enhanced Learning in Higher Education, TELE 2024
作者: Privalov, Aleksandr N. Smirnov, Vadim A. Institute of Advanced Information Technologies Tula State Lev Tolstoy Pedagogical University Tula Russia Ivanovo State University Department of Mathematics Computer Science and Teaching Methods Shuya Russia
The analysis of various sources has been carried out, confirming the demand for protective solutions against information threats from fake websites of organizations. The relevance of the research topic is confirmed by... 详细信息
来源: 评论
Comparative Analysis of COVID-19 Detection methods Based on Neural Network
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 1127-1150页
作者: Inès Hilali-Jaghdam Azhari A Elhag Anis Ben Ishak Bushra M.Elamin Elnaim Omer Eltag Mohammed Elhag Feda Muhammed Abuhaimed S.Abdel-Khalek Computer Sciences and Information Technology Programs Applied CollegePrincess Nourah bint Abdulrahman UniversityRiyadhSaudi Arabia Department of Mathematics and Statistics College of ScienceTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Quantitative Methods Higher Institute of ManagementUniversity of Tunis1073Tunisia Department of Computer Science College of Science and Humanities in Al-SulailPrince Sattam Bin Abdulaziz UniversityAl KharjSaudi Arabia Department of Computer Science Faculty of Science and ArtsKing Khalid UniversityAbha61421Saudi Arabia Department of Mathematics Faculty of ScienceSohag UniversitySohagEgypt
In 2019,the novel coronavirus disease 2019(COVID-19)ravaged the *** of July 2021,there are about 192 million infected people worldwide and 4.1365 million *** present,the new coronavirus is still spreading and circulat... 详细信息
来源: 评论
Heuristic Algorithm for Solving Travelling Salesman Problem: Adding the Endpoints of the Longest Edges  5
Heuristic Algorithm for Solving Travelling Salesman Problem:...
收藏 引用
5th International Conference on Problems of Cybernetics and Informatics, PCI 2023
作者: Nuriyeva, Fidan Dokuz Eylul University Department of Computer Science Izmir Turkey Institute of Control Systems Laboratory of Recognition Identification and Methods of Optimal Solutions Baku Azerbaijan
This study proposes, a new heuristic algorithm based on insertion heuristic to solve the symmetric Travelling Salesman Problem. In the proposed algorithm, firstly the two longest edges are selected and the starting to... 详细信息
来源: 评论
Autoencoder Neural Networks for Anomaly Detection in Wind Turbines  19th
Autoencoder Neural Networks for Anomaly Detection in Wind Tu...
收藏 引用
19th International Conference on Soft Computing Models in Industrial and Environmental Applications, SOCO 2024
作者: Coronel, D. Guevara, C. Santos, M. Computer Science Faculty Complutense University of Madrid Madrid28040 Spain Quantitative Methods Department CUNEF University Madrid28040 Spain Institute of Knowledge Technology Complutense University of Madrid Madrid28040 Spain
Wind energy has emerged as a crucial solution in the search for sustainable and environmentally friendly energy sources. As global energy demand grows rapidly and the need to reduce greenhouse gas emissions increases,... 详细信息
来源: 评论
Enhancing Password Security: Analyzing Password Management Practices Among IT Students  7
Enhancing Password Security: Analyzing Password Management P...
收藏 引用
7th IEEE International Conference and Workshop Obuda on Electrical and Power Engineering, CANDO-EPE 2024
作者: Kollar, Anita Mihalovicsne Katona, Jozsef Institute of Computer Engineering University of Dunaujvaros Department of Software Development and Application Dunaujvaros Hungary John Von Neumann University GAMF Faculty of Engineering and Computer Science Kecskemet Hungary Budapest Business University Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Hungary
Today, with the digital world in its full swing, strong password management is key to protecting sensitive information from both internal and external threats. The current research explores the passwords managing beha... 详细信息
来源: 评论
Transformative Applications and Key Challenges of Generative AI  7
Transformative Applications and Key Challenges of Generative...
收藏 引用
7th IEEE International Conference and Workshop Obuda on Electrical and Power Engineering, CANDO-EPE 2024
作者: Kovari, Attila Katona, Jozsef Eszterházy Károly Catholic University Institute of Digital Technology Faculty of Computer Science Eger Hungary University of Dunaújváros Department of Institute of Engineering Dunaujvaros Hungary John Von Neumann University GAMF Faculty of Engineering and Computer Science Kecskemét Hungary Institute of Computer Engineering University of Dunaujvaros Department of Software Development and Application Dunaujvaros Hungary Budapest Business University Faculty of Finance and Accountancy Department of Applied Quantitative Methods Budapest Hungary
The paper discusses the integration and use of generative artificial intelligence technologies in education. Generative AI, such as OpenAI, in particular the GPT model, has fundamentally changed the way humans interac... 详细信息
来源: 评论
Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2515-2532页
作者: Usman Ali Mohd Yamani Idna Idris Jaroslav Frnda Mohamad Nizam Bin Ayub Roobaea Alroobaea Fahad Almansour Nura Modi Shagari Insaf Ullah Ihsan Ali Department of Computer System and Technology Faculty of Computer Science and Information TechnologyUniversity of MalayaKuala Lumpur50603Malaysia Department of Computer Science University of SwatSaidu Sharif19130Pakistan Center for Research in Mobile Cloud Computing University of MalayaKuala Lumpur50603Malaysia Department of Quantitative Methods and Economic Informatics Faculty of Operation and Economics of Transport and CommunicationsUniversity of Zilina01026 ZilinaSlovakia Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Computer Science College of Sciences and Arts in RassQassim UniversityBuraydah51452Saudi Arabia Department of Computer Science Hamdard Institute of Engineering and TechnologyIslamabad44000Pakistan
Industrial internet of things (IIoT) is the usage of internet of things(IoT) devices and applications for the purpose of sensing, processing andcommunicating real-time events in the industrial system to reduce the unn... 详细信息
来源: 评论