咨询与建议

限定检索结果

文献类型

  • 4,458 篇 会议
  • 3,244 篇 期刊文献
  • 177 册 图书

馆藏范围

  • 7,879 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,391 篇 工学
    • 2,847 篇 计算机科学与技术...
    • 2,338 篇 软件工程
    • 1,010 篇 信息与通信工程
    • 606 篇 生物医学工程(可授...
    • 581 篇 生物工程
    • 535 篇 控制科学与工程
    • 453 篇 电气工程
    • 449 篇 电子科学与技术(可...
    • 430 篇 光学工程
    • 281 篇 机械工程
    • 269 篇 仪器科学与技术
    • 212 篇 化学工程与技术
    • 174 篇 核科学与技术
    • 154 篇 动力工程及工程热...
    • 148 篇 材料科学与工程(可...
    • 120 篇 交通运输工程
  • 2,926 篇 理学
    • 1,243 篇 数学
    • 1,198 篇 物理学
    • 685 篇 生物学
    • 410 篇 统计学(可授理学、...
    • 263 篇 系统科学
    • 234 篇 化学
  • 1,086 篇 管理学
    • 615 篇 管理科学与工程(可...
    • 497 篇 图书情报与档案管...
    • 348 篇 工商管理
  • 615 篇 医学
    • 512 篇 临床医学
    • 460 篇 基础医学(可授医学...
    • 303 篇 药学(可授医学、理...
    • 191 篇 公共卫生与预防医...
  • 167 篇 法学
    • 140 篇 社会学
  • 119 篇 经济学
  • 99 篇 农学
  • 85 篇 教育学
  • 22 篇 文学
  • 10 篇 军事学
  • 10 篇 艺术学
  • 2 篇 哲学

主题

  • 257 篇 informatics
  • 140 篇 artificial intel...
  • 134 篇 machine learning
  • 113 篇 computer archite...
  • 109 篇 computational mo...
  • 105 篇 data mining
  • 95 篇 quality of servi...
  • 95 篇 feature extracti...
  • 92 篇 deep learning
  • 91 篇 wireless sensor ...
  • 90 篇 hadron colliders
  • 88 篇 computer science
  • 77 篇 resource managem...
  • 76 篇 image segmentati...
  • 76 篇 optimization
  • 76 篇 monitoring
  • 76 篇 predictive model...
  • 74 篇 protocols
  • 73 篇 training
  • 69 篇 application soft...

机构

  • 411 篇 department for p...
  • 404 篇 faculty of scien...
  • 400 篇 kirchhoff-instit...
  • 398 篇 department of ph...
  • 385 篇 department of ph...
  • 385 篇 department of ph...
  • 368 篇 fakultät für phy...
  • 364 篇 institute of phy...
  • 363 篇 institute of phy...
  • 306 篇 instituto de fís...
  • 305 篇 department of ph...
  • 281 篇 graduate school ...
  • 280 篇 department of ph...
  • 269 篇 department of ph...
  • 268 篇 universidade fed...
  • 264 篇 ictp trieste
  • 258 篇 yerevan physics ...
  • 258 篇 dipartimento di ...
  • 253 篇 department of ph...
  • 252 篇 department of ph...

作者

  • 336 篇 c. alexa
  • 334 篇 j. m. izen
  • 332 篇 g. bella
  • 331 篇 d. calvet
  • 331 篇 c. amelung
  • 329 篇 j. strandberg
  • 326 篇 g. spigo
  • 324 篇 f. siegert
  • 318 篇 r. ströhmer
  • 318 篇 m. rijssenbeek
  • 318 篇 s. jin
  • 318 篇 g. gaudio
  • 317 篇 s. mohapatra
  • 307 篇 s. guindon
  • 305 篇 a. kaczmarska
  • 299 篇 y. tayalati
  • 296 篇 j. schaarschmidt
  • 284 篇 a. d. pilkington
  • 283 篇 m. klein
  • 280 篇 l. chevalier

语言

  • 7,472 篇 英文
  • 330 篇 其他
  • 72 篇 中文
  • 9 篇 日文
  • 4 篇 德文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"机构=Institute of Informatics and Computer Engineering"
7879 条 记 录,以下是11-20 订阅
排序:
Deep Learning Quantitative Susceptibility Mapping With Reduced Training Time Based on Local Field Transformation
收藏 引用
IEEE Transactions on Emerging Topics in Computational Intelligence 2025年 第2期9卷 1527-1538页
作者: Wu, Ming-Long Huang, De-Rong Cheng, Jhih-Shan National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan National Cheng Kung University Institute of Medical Informatics Tainan701 Taiwan
A quantitative susceptibility mapping (QSM) approach using single-orientation imaging data is proposed in this study. The proposed method generates local field maps at five predefined orientations via deep learning fr... 详细信息
来源: 评论
UNRAVELING THE EFFECTIVENESS OF THE K-NN ALGORITHM FOR IMBALANCED DATA IN RESEARCH TOPIC RECOMMENDATIONS
收藏 引用
Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University 2024年 第1期59卷 271-282页
作者: Muludi, Kurnia Aisyah, Nonik Nama, Gigih Forda Lumbanraja, Favorisen R. Informatics & Business Institute Darmajaya Bandar Lampung35142 Indonesia Computer Science Department Faculty of Science The University of Lampung Bandar Lampung Indonesia Informatics Engineering Department Faculty of Science The University of Lampung Bandar Lampung Indonesia
This study addresses the challenge of selecting research topics for undergraduate students, focusing on computer science, by evaluating a recommendation model based on the k-Nearest Neighbor algorithm (kNN). The objec... 详细信息
来源: 评论
A machine learning approach for skin lesion classification on iOS: implementing and optimizing a convolutional transfer learning model with Create ML
收藏 引用
International Journal of computers and Applications 2024年 第8期46卷 666-685页
作者: Benedek Szabo, Aron Katona, Jozsef Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary Department of Instrumentation and Automation Institute of Electronics and Communication Systems Kandó Kálmán Faculty of Electrical Engineering Obuda University Budapest Hungary Department of Informatics GAMF Faculty of Engineering and Computer Science Kecskemét Hungary
The integration of machine learning (ML) into mobile applications presents unique challenges, particularly in resource-constrained environments such as iOS devices. Skin lesion classification is a critical task in der... 详细信息
来源: 评论
Sensitive Content Detection in Social Networks Using Deep Learning Models and Explainability Techniques  9
Sensitive Content Detection in Social Networks Using Deep Le...
收藏 引用
9th IEEE/ACIS International Conference on Big Data, Cloud Computing, and Data Science, BCD 2024
作者: Perikos, Isidoros University of Patras Computer Engineering and Informatics Department Patras Greece University of Peloponnese Computer Technology Institute and Press 'Diophantus' Electrical and Computer Engineering Dept. Patras Greece
In the dynamic landscape of online social networks, recognizing sensitive content is essential for safeguarding user privacy, fostering inclusivity, and enhancing diversity awareness. Building on prior research, this ... 详细信息
来源: 评论
(POSTER) A Holistic IoT-Enabled Approach for Indoor Air Quality Control  19
(POSTER) A Holistic IoT-Enabled Approach for Indoor Air Qual...
收藏 引用
19th Annual International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2023
作者: Kalioras, Fotios Filios, Gabriel Karatzas, Stylianos Nikoletseas, Sotiris University of Patras Department of Computer Engineering and Informatics Greece University of Patras Computer Technology Institute and Press Diophantus Department of Computer Engineering and Informatics Greece University of Patras Department of Civil Engineering Greece
Indoor air quality (IAQ) is an important yet often overlooked aspect of public health, with poor IAQ contributing to a significant number of diverse health problems worldwide. Existing air quality standards have faile... 详细信息
来源: 评论
Distributed computing and shared memory-based utility list buffer miner with parallel frameworks for high utility itemset mining
收藏 引用
International Journal of Business Intelligence and Data Mining 2023年 第2期23卷 125-149页
作者: Atmaja, Eduardus Hardika Sandy Sonawane, Kavita Department of Computer Engineering St. Francis Institute of Technology Mumbai India Department of Informatics Sanata Dharma University Yogyakarta Indonesia
High utility itemset mining (HUIM) is a well-known pattern mining technique. It considers the utility of the items that leads to finding high profit patterns which are more useful for real conditions. Handling large a... 详细信息
来源: 评论
Text Analysis and Recognition of Emotional Content Using Deep Learning Methods and BERT  23
Text Analysis and Recognition of Emotional Content Using Dee...
收藏 引用
23rd IEEE/ACIS International Conference on computer and Information Science, ICIS 2023
作者: Andrikakis, Efthymios Perikos, Isidoros Paraskevas, Michael Hatzilygeroudis, Ioannis University of Patras Department of Computer Engineering & Informatics Patras Greece University of Patras Computer Technology Institute and Press Diophantus Department of Computer Engineering & Informatics Patras Greece Department of Electrical and Computer Engineering University of Peloponnese Computer Technology Institute and Press Diophantus Patras Greece
Recognizing the emotional content of Natural Language sentences can improve the way humans communicate with a computer system by enabling them to recognize and imitate emotional expressions. In this paper, deep learni... 详细信息
来源: 评论
A MLP-Mixer and mixture of expert model for remaining useful life prediction of lithium-ion batteries
收藏 引用
Frontiers of computer Science 2024年 第5期18卷 1-10页
作者: Lingling ZHAO Shitao SONG Pengyan WANG Chunyu WANG Junjie WANG Maozu GUO Faculty of Computing Harbin Institute of TechnologyHarbin 150001China School of Electrical Engineering Liaoning University of TechnologyJinzhou 121004China School of Computer Science Northeast Electric Power UniversityJilin 132000China Department of Medical Informatics School of Biomedical Engineering and InformaticsNanjing Medical UniversityNanjing 211166China School of Electrical and Information Engineering Beijing University of Civil Engineering and ArchitectureBeijing 100044China
Accurately predicting the Remaining Useful Life(RUL)of lithium-ion batteries is crucial for battery management *** learning-based methods have been shown to be effective in predicting RUL by leveraging battery capacit... 详细信息
来源: 评论
Lockstep Vs Microarchitecture: A Comparison  37
Lockstep Vs Microarchitecture: A Comparison
收藏 引用
37th IEEE International System-on-Chip Conference, SOCC 2024
作者: Mach, Jan Kohutka, Lukas Cicak, Pavel Slovak University of Technology Institute of Computer Engineering and Applied Informatics Bratislava842 16 Slovakia Slovak University of Technology Institute of Informatics Information Systems and Software Engineering Bratislava842 16 Slovakia
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple locks... 详细信息
来源: 评论
IoT: Communication protocols and security threats
收藏 引用
Internet of Things and Cyber-Physical Systems 2023年 第1期3卷 1-13页
作者: Gerodimos, Apostolos Maglaras, Leandros Ferrag, Mohamed Amine Ayres, Nick Kantzavelou, Ioanna School of Computer Science and Informatics University of Thessaly Lamia Greece School of Computing at Edinburgh Napier University Edinburgh United Kingdom Technology Innovation Institute Abu Dhabi United Arab Emirates School of Computer Science and Informatics De Montfort University Leicester United Kingdom School of Engineering Dept.of Informatics and Computer Engineering University of West Attica Athens Greece
In this study, we review the fundamentals of IoT architecture and we thoroughly present the communication protocols that have been invented especially for IoT technology. Moreover, we analyze security threats, and gen... 详细信息
来源: 评论