咨询与建议

限定检索结果

文献类型

  • 341 篇 会议
  • 213 篇 期刊文献
  • 22 册 图书

馆藏范围

  • 576 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 338 篇 工学
    • 281 篇 计算机科学与技术...
    • 241 篇 软件工程
    • 80 篇 信息与通信工程
    • 50 篇 控制科学与工程
    • 42 篇 生物工程
    • 25 篇 电气工程
    • 25 篇 生物医学工程(可授...
    • 20 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 化学工程与技术
    • 16 篇 建筑学
    • 15 篇 电子科学与技术(可...
    • 15 篇 交通运输工程
    • 13 篇 动力工程及工程热...
    • 12 篇 仪器科学与技术
    • 11 篇 土木工程
  • 158 篇 理学
    • 84 篇 数学
    • 49 篇 生物学
    • 30 篇 物理学
    • 25 篇 系统科学
    • 21 篇 统计学(可授理学、...
    • 15 篇 化学
  • 127 篇 管理学
    • 72 篇 图书情报与档案管...
    • 57 篇 管理科学与工程(可...
    • 22 篇 工商管理
  • 43 篇 医学
    • 35 篇 临床医学
    • 26 篇 基础医学(可授医学...
    • 16 篇 公共卫生与预防医...
    • 13 篇 药学(可授医学、理...
  • 12 篇 教育学
    • 9 篇 教育学
  • 11 篇 法学
  • 9 篇 农学
  • 8 篇 经济学
  • 3 篇 文学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 32 篇 knowledge engine...
  • 30 篇 artificial intel...
  • 20 篇 semantics
  • 18 篇 computer science
  • 18 篇 data mining
  • 17 篇 deep learning
  • 16 篇 training
  • 14 篇 information syst...
  • 14 篇 machine learning
  • 13 篇 feature extracti...
  • 13 篇 information stor...
  • 12 篇 computational mo...
  • 10 篇 ontologies
  • 10 篇 database managem...
  • 10 篇 databases
  • 10 篇 testing
  • 9 篇 internet of thin...
  • 9 篇 support vector m...
  • 9 篇 accuracy
  • 8 篇 neural networks

机构

  • 25 篇 college of compu...
  • 21 篇 school of comput...
  • 14 篇 school of inform...
  • 12 篇 lovely professio...
  • 9 篇 department of in...
  • 8 篇 key laboratory o...
  • 8 篇 massive informat...
  • 8 篇 beijing key labo...
  • 8 篇 institute of aer...
  • 7 篇 key laboratory o...
  • 7 篇 department of in...
  • 6 篇 intelligent know...
  • 6 篇 department of co...
  • 6 篇 school of comput...
  • 6 篇 department of ma...
  • 5 篇 lloyd institute ...
  • 5 篇 department of in...
  • 5 篇 new horizon coll...
  • 5 篇 college of techn...
  • 5 篇 department of co...

作者

  • 11 篇 arnon rungsawang
  • 9 篇 kao hung-yu
  • 8 篇 rungsawang arnon
  • 7 篇 du xiaoyong
  • 7 篇 zhu liehuang
  • 7 篇 manaskasemsak bu...
  • 6 篇 niyato dusit
  • 6 篇 sun geng
  • 6 篇 othman nashwan a...
  • 6 篇 liu hongyan
  • 6 篇 he jun
  • 6 篇 du xiaojiang
  • 6 篇 guizani mohsen
  • 6 篇 katsiri elefther...
  • 6 篇 wanli zuo
  • 5 篇 liang shuang
  • 5 篇 malik bader alaz...
  • 5 篇 song zhenbo
  • 5 篇 huang jimmy xian...
  • 5 篇 an ning

语言

  • 535 篇 英文
  • 36 篇 其他
  • 5 篇 中文
  • 1 篇 西班牙文
检索条件"机构=Massive Information & Knowledge Engineering Department of Computer Engineering"
576 条 记 录,以下是1-10 订阅
排序:
Detecting Fake News Sources on Twitter Using Deep Neural Network  11
Detecting Fake News Sources on Twitter Using Deep Neural Net...
收藏 引用
11th International Conference on information and Education Technology, ICIET 2023
作者: Bhatia, Thanaphan Manaskasemsak, Bundit Rungsawang, Arnon Kasetsart University Massive Information & Knowledge Engineering Laboratory Department of Computer Engineering Faculty of Engineering Bangkok10900 Thailand
Social media provides a rapid, simple, and accessible platform for people to communicate and share news through the Internet. However, the information published on this platform is not always trustworthy. As a result,... 详细信息
来源: 评论
Fine-Grained Cross-Modal Fusion Based Refinement for Text-to-Image Synthesis
收藏 引用
Chinese Journal of Electronics 2023年 第6期32卷 1329-1340页
作者: SUN Haoran WANG Yang LIU Haipeng QIAN Biao Department of Computer Science and Information Engineering Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of EducationHefei University of Technology
Text-to-image synthesis refers to generating visual-realistic and semantically consistent images from given textual descriptions. Previous approaches generate an initial low-resolution image and then refine it to be h... 详细信息
来源: 评论
Efficient Communication in Wireless Sensor Networks Using Optimized Energy Efficient Engroove Leach Clustering Protocol
收藏 引用
Tsinghua Science and Technology 2024年 第4期29卷 985-1001页
作者: N.Meenakshi Sultan Ahmad A.V.Prabu J.Nageswara Rao Nashwan Adnan Othman Hikmat A.M.Abdeljaber R.Sekar Jabeen Nazeer SRM Institute of Science and Technology KattankulathurChennai 603203India Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharj 11942Saudi Arabia University Center for Research and Development(UCRD) Department of Computer Science and EngineeringChandigarh UniversityGharuanMohali 140413India Department of ECE Koneru Lakshmaiah Education FoundationVaddeswaramGuntur 522502India Department of Computer Science and Engineering Lakireddy Balireddy College of Engineering(A)NTR District 521230India Department of Computer Engineering College of EngineeringKnowledge UniversityErbil 44001Iraq Department of Computer Science Faculty of Information TechnologyApplied Science Private UniversityAmman 11937Jordan Department of Electronics and Communication Engineering(ECE) School of EngineeringPresidency UniversityBangalore 834001India
The Wireless Sensor Network(WSN)is a network that is constructed in regions that are inaccessible to human *** widespread deployment of wireless micro sensors will make it possible to conduct accurate environmental mo... 详细信息
来源: 评论
LSTM-XGBoost: An Ensemble Model for Blood Demand Distribution Forecasting – A Case Study in Zakho City, Kurdistan Region, Iraq
收藏 引用
Operations Research Forum 2025年 第1期6卷 1-22页
作者: Zebari, Rizgar R. Zebari, Gheyath M. Al-zebari, Adel Mohammed, Marwan Aziz Department of Computer Science College of Science Knowledge University Erbil 44001 Iraq Department of Information Technology Technical College of Informatics Akre University for Applied Sciences Kurdistan Akre Iraq Department of Computer Engineering College of Engineering Knowledge University Erbil 44001 Iraq
A safe and adequate blood supply is essential for healthcare systems to function effectively. Accurately forecasting blood demand plays a key role in efficient inventory management and resource allocation. Traditional... 详细信息
来源: 评论
Exploring Deep Insights from Vast Data: An Overview of Deep Learning Techniques for Big Data  4
Exploring Deep Insights from Vast Data: An Overview of Deep ...
收藏 引用
4th International Conference on Electrical engineering and computer Science, ICECOS 2024
作者: Baez Hasan, Sarhad Kareem, Shahab Wahhab Ameen, Didar Dlshad Hamad Soran University Faculty of Science Computer Science Department Soran Iraq Erbil Polytechnic University College of Engineering Knowledge University Department of Information System Engineering Department of Computer Engineering Erbil Iraq
Big data has emerged very fast, and this has brought both opportunities and problems that are related to the application of deep learning. This paper explores how deep learning can be implemented using big data and in... 详细信息
来源: 评论
SUSTEM: An Improved Rule-based Sundanese Stemmer
收藏 引用
ACM Transactions on Asian and Low-Resource Language information Processing 2024年 第6期23卷 1-29页
作者: Setiawan, Irwan Kao, Hung-Yu Department of Computer and Informatics Engineering Politeknik Negeri Bandung Bandung Indonesia Intelligent Knowledge Management Lab Department of Computer Science and Information Engineering National Cheng Kung University No. 1 Daxue Rd. East Dist. Tainan City701 Taiwan
Current Sundanese stemmers either ignore reduplication words or define rules to handle only affixes. There is a significant amount of reduplication words in the Sundanese language. Because of that, it is impossible to... 详细信息
来源: 评论
Lay Summarization of Biomedical Documents with Discourse Structure-Based Prompt Tuning  28th
Lay Summarization of Biomedical Documents with Discourse S...
收藏 引用
28th International Conference on Technologies and Applications of Artificial Intelligence, TAAI 2023
作者: Wu, Yu-Hsuan Chiu, Chi-Min Kao, Hung-Yu Intelligent Knowledge Management Lab Department of Computer Science and Information Engineering National Cheng Kung University Tainan Taiwan
Transforming complex biomedical texts into accessible lay summaries is a critical endeavor in Natural Language Generation (NLG). This study addresses the challenges associated with this task by employing a multi-aspec... 详细信息
来源: 评论
Detecting Fake News Sources on Twitter Using Deep Neural Network
Detecting Fake News Sources on Twitter Using Deep Neural Net...
收藏 引用
information and Education Technology (ICIET), International Conference on
作者: Thanaphan Bhatia Bundit Manaskasemsak Arnon Rungsawang Department of Computer Engineering Faculty of Engineering Massive Information & Knowledge Engineering Laboratory Kasetsart University Bangkok Thailand
Social media provides a rapid, simple, and accessible platform for people to communicate and share news through the Internet. However, the information published on this platform is not always trustworthy. As a result,... 详细信息
来源: 评论
Drawing Order Diagrams Through Two-Dimension Extension
收藏 引用
Journal of Graph Algorithms and Applications 2023年 第9期27卷 783-802页
作者: Dürrschnabel, Dominik Hanika, Tom Stumme, Gerd Knowledge & Data Engineering Group Research Center for Information System Design & Department of Electrical Engineering and Computer Science University of Kassel Germany Institute of Computer Science University of Hildesheim Germany Berlin School of Library and Information Science Humboldt-Universität zu Berlin Germany
Ordinal real-world data such as concept hierarchies, ontologies, genealogies, or task dependencies in scheduling often has the property to not only contain pairwise comparable, but also incomparable elements. Order di... 详细信息
来源: 评论
Intrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model
收藏 引用
computer Modeling in engineering & Sciences 2025年 第4期143卷 639-671页
作者: Noveela Iftikhar Mujeeb Ur Rehman Mumtaz Ali Shah Mohammed J.F.Alenazi Jehad Ali Knowledge Unit of Systems and Technology University of Management and TechnologySialkot51310Pakistan Department of Computer Science University ofWahWah Cantt47010Pakistan Department of Computer Engineering College of Computer and Information Sciences(CCIS)King Saud UniversityRiyadh11451Saudi Arabia Department of AI Convergence Network Ajou UniversitySuwon16499Republic of Korea
Intrusion attempts against Internet of Things(IoT)devices have significantly increased in the last few *** devices are now easy targets for hackers because of their built-in security *** a Self-Organizing Map(SOM)hybr... 详细信息
来源: 评论