咨询与建议

限定检索结果

文献类型

  • 1,387 篇 会议
  • 1,230 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 2,657 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,610 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 979 篇 软件工程
    • 347 篇 信息与通信工程
    • 234 篇 生物工程
    • 233 篇 控制科学与工程
    • 175 篇 生物医学工程(可授...
    • 143 篇 电气工程
    • 139 篇 光学工程
    • 116 篇 电子科学与技术(可...
    • 87 篇 机械工程
    • 67 篇 化学工程与技术
    • 64 篇 材料科学与工程(可...
    • 60 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 53 篇 建筑学
  • 951 篇 理学
    • 440 篇 数学
    • 315 篇 物理学
    • 269 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 86 篇 系统科学
    • 76 篇 化学
  • 453 篇 管理学
    • 246 篇 管理科学与工程(可...
    • 215 篇 图书情报与档案管...
    • 130 篇 工商管理
  • 206 篇 医学
    • 180 篇 临床医学
    • 162 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 105 篇 法学
    • 89 篇 社会学
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 54 篇 教育学
  • 40 篇 农学
  • 8 篇 文学
  • 8 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 63 篇 machine learning
  • 55 篇 training
  • 52 篇 accuracy
  • 48 篇 deep learning
  • 45 篇 computational mo...
  • 44 篇 artificial intel...
  • 36 篇 feature extracti...
  • 35 篇 security
  • 35 篇 data models
  • 34 篇 analytical model...
  • 33 篇 internet of thin...
  • 33 篇 predictive model...
  • 31 篇 educational inst...
  • 31 篇 cloud computing
  • 29 篇 computer archite...
  • 29 篇 real-time system...
  • 28 篇 convolutional ne...
  • 26 篇 visualization
  • 25 篇 covid-19
  • 25 篇 informatics

机构

  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 institute of phy...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 39 篇 school of comput...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 department of ph...
  • 38 篇 lehrstuhl für ex...
  • 38 篇 west university ...
  • 38 篇 institut für ast...
  • 37 篇 faculté des scie...

作者

  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic
  • 32 篇 m. rijssenbeek

语言

  • 2,454 篇 英文
  • 185 篇 其他
  • 17 篇 中文
  • 3 篇 德文
  • 2 篇 日文
  • 1 篇 西班牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computing and Informatics Technology"
2657 条 记 录,以下是451-460 订阅
排序:
Mobile commerce and its apps - Opportunities and threats in Malaysia  2
Mobile commerce and its apps - Opportunities and threats in ...
收藏 引用
2nd International Conference on Smart computing and Electronic Enterprise, ICSCEE 2021
作者: Baker El-Ebiary, Yousef A. Aseh, Khairi Bamansoor, Samer Pande, Bishwajeet Abu-Ulbeh, Waheeb Yusoff, M. Hafiz Pathmanathan, P. Ravindran Jusoh, Julaily Aida Al Moaiad, Yazeed UniSZA Faculty of Informatics and Computing Malaysia International Institute of Applied Science Swiss School of Management Netherlands MEDIU Faculty of Computer and Information Technology Malaysia Gyancity Research Consultancy Pvt Ltd Motihari India Faculty of Computer Science and Informatics Cybersecurity Department Jordan Albukhary International University School of Computing and Informatic Kedah Malaysia Faculty of Informatics and Computing UniSZA Malaysia
The purpose of this study is to discuss on opportunities and threats of Foodpanda as an online E-commerce platform including their strength and weaknesses. Electronic Commerce commonly known as E - Commerce means buyi... 详细信息
来源: 评论
Utilization of Blockchain technology in Human Resource Management  2
Utilization of Blockchain Technology in Human Resource Manag...
收藏 引用
2nd IEEE International Conference on AI in Cybersecurity, ICAIC 2023
作者: Anaam, Elham Ghazal, Taher M. Haw, Su-Cheng Alzoubi, Haitham M. Alshurideh, Muhammad Turki Mamun, Abdullah Al Faculty of Information Science and Technology Bangi Selangor43600 Malaysia School of IT Skyline University College Sharjah United Arab Emirates Multimedia University Jalan Multimedia Faculty of Computing and Informatics Cyberjaya63100 Malaysia School of Business Skyline University College Sharjah United Arab Emirates School of Business The University of Jordan Department of Marketing Amman11942 Jordan Graduate School of Management Universiti Kebangsaan Malaysia Bangi43600 Malaysia
With the advancement of time and the advancement scientific knowledge, the blockchain technology has expanded in various applications. The security and data privacy of employee recruitment system has been compromised.... 详细信息
来源: 评论
Identifying Gamified Teaching Elements in Computer Science Course  9
Identifying Gamified Teaching Elements in Computer Science C...
收藏 引用
9th International Conference on Platform technology and Service, PlatCon 2023
作者: Tanalol, Hasnah Hashim, Hazmi Turumogan, Punitha Noor, Noorsidi Aizuddin Mat Baharum, Aslina Deris, Farhana Diana Universiti Malaysia Sabah Preparatory Center for Science & Technology Kota Kinabalu Malaysia University Malaysia Sabah Faculty of Computing and Informatics Kota Kinabalu Malaysia Tunku Abdul Rahman University of Management and Technology Department of Computing and Information Technology Penang Malaysia Universiti Teknologi Malaysia Mass Appraisal Housing and Planning Research Group Centre for Real Estate Studies Faculty of Built Environment and Surveying Real Estate Department Johor Johor Bahru81310 Malaysia School of Engineering and Technology Sunway University Computing and Information System Bandar Sunway Selangor Malaysia Universiti Teknologi Malaysia Universiti Malaysia Sabah Faculty of Social Sciences and Humanities Johor Johor Bahru81310 Malaysia
Traditional education methods, having said, lack motivation and self-regulation. The 5G and 6G technology have improved education;one such is gamification. Gamification applies gaming mechanisms to non-gaming platform... 详细信息
来源: 评论
XorshiftH128+: A hybrid random number generator for lightweight IoT
XorshiftH128+: A hybrid random number generator for lightwei...
收藏 引用
2023 IEEE International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2023
作者: Sandakly, Serge Salem, Charbel Challita, Khalil Dass, Shuvalaxmi Azar, Joseph Abdo, Jacques Bou Demerjian, Jacques LaRRIS Faculty of Sciences Lebanese University Fanar Lebanon Department of Computer Science University of Warwick Coventry United Kingdom School of Computing and Informatics University of Louisiana at Lafayette LA United States FEMTO-ST Institute UMR 6174 CNRS Universite de Franche-Comte France School of Information Technology University of Cincinnati OH United States Jounieh Lebanon
The main purpose of this paper is to develop a Hybrid Random Number Generator for resource-constrained slim nodes operating within a lightweight Internet of Things network. Our algorithm extends the lightweight Xorshi... 详细信息
来源: 评论
RAT-Cycle-GAN for Text to Image
RAT-Cycle-GAN for Text to Image
收藏 引用
作者: Chenlong Yin Weiheng Su Zheyong Lin Yuyang Xu School of Computer Science and Technology University of Science and Technology of China School of Informatics Computingand Cyber SystemsNorthern Arizona University School of Geodesy and Geomatics Wuhan University Division of General Studies University of Illinois at Urbana Champaign
We present a method that enhances the RATGAN using the idea of CycleGAN to prevent the model from *** generator with the proposed recurrent affine transformation for text-to-image synthesis and the fusion blocks are c... 详细信息
来源: 评论
Pose Estimation of Spacecraft Using Dual Transformers and Efficient Bayesian Hyperparameter Optimization
收藏 引用
International Journal of Advanced Computer Science and Applications 2025年 第4期16卷 629-644页
作者: Raja, N. Kannaiya Ramesh, Janjhyam Venkata Naga El-Ebiary, Yousef A. Baker Muniyandy, Elangovan Reddy, N. Konda Kumar, Vanipenta Ravi Devarasetty, Prasad School of Computing Science and Engineering VIT Bhopal University Madhya Pradesh Bhopal466114 India Department of CSE Graphic Era Hill University Dehradun248002 India Department of CSE Graphic Era Deemed To Be University Uttarakhand Dehradun248002 India Faculty of Informatics and Computing UniSZA University Malaysia Department of Biosciences Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai602 105 India Applied Science Research Center Applied Science Private University Amman Jordan Department of Engineering Mathematics K L University Greenfields Guntur Dist Andhra Pradesh Vaddeswaram522302 India Department of Mathematics Annamacharya University New Boyanapalli Rajampet India Department of Computer Science and Engineering DVR & Dr HS MIC College of Technology Andhra Pradesh Kanchikacherla India
Spacecraft pose estimation is an essential contribution to facilitating central space mission activities like autonomous navigation, rendezvous, docking, and on-orbit servicing. Nonetheless, methods like Convolutional... 详细信息
来源: 评论
Classification of SEMG Signal Based Hand Movements by Using Support Vector Machine
Classification of SEMG Signal Based Hand Movements by Using ...
收藏 引用
IEEE Symposium on Computers & informatics (ISCI)
作者: Syeda Rabail Zahra Sadia Ismail Muhammad Danish Ali Muhammad Amir Khan Mohamad Yusof Darus Tahseen Mazhar Institute of Computing & Information Technology GOMAL University Dera Ismail Khan Pakistan Computer Science COMSATS University Islamabad Abbottabad Pakistan School of Computing Sciences College of Computing Informatics and Mathematics Universiti Teknologi MARA Shah Alam Selangor Malaysia Department of Computer Science Virtual University of Pakistan
This paper explores the application of Surface Electromyography (SEMG) for hand movement classification using machine learning techniques. SEMG signals play a crucial role in sports medicine, rehabilitation, prosthesi... 详细信息
来源: 评论
Obfuscated Malware Detection: Impacts on Detection Methods  15th
Obfuscated Malware Detection: Impacts on Detection Methods
收藏 引用
15th International scientific conferences on research and applications in the field of intelligent information and database systems, ACIIDS 2023
作者: Gorment, Nor Zakiah Selamat, Ali Krejcar, Ondrej Malaysia-Japan International Institute of Technology Universiti Teknologi Malaysia Jalan Sultan Yahya Petra Kuala Lumpur54100 Malaysia School of Computing Faculty of Engineering Universiti Teknologi Malaysia Johor Bahru Johor81310 Malaysia Universiti Teknologi Malaysia Johor Bahru Johor81310 Malaysia College of Computing and Informatics Universiti Tenaga Nasional Jalan IKRAM-UNITEN Selangor Kajang43000 Malaysia Center for Basic and Applied Research Faculty of Informatics and Management University of Hradec Kralove Hradec Kralove50003 Czech Republic
Obfuscated malware poses a challenge to traditional malware detection methods as it uses various techniques to disguise its behavior and evade detection. This paper focuses on the impacts of obfuscated malware detecti... 详细信息
来源: 评论
A Steganographic Method for Color Images using the Salp Swarm Algorithm and Chaotic Maps
A Steganographic Method for Color Images using the Salp Swar...
收藏 引用
Conference on Local Computer Networks (LCN)
作者: Aya Jaradat Moad Mowafi Eyad Taqieddin Network Engineering and Security Dept Jordan University of Science and Technology Irbid Jordan School of Computing and Informatics Al Hussein Technical University Amman Jordan
The availability of high resolution images allows for using steganography to hide the presence of secret information. An issue of importance is to guarantee that the hidden data neither affects the quality of the imag...
来源: 评论
RiskQ: risk-sensitive multi-agent reinforcement learning value factorization  23
RiskQ: risk-sensitive multi-agent reinforcement learning val...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Siqi Shen Chennan Ma Chao Li Weiquan Liu Yongquan Fu Songzhu Mei Xinwang Liu Cheng Wang Fujian Key Laboratory of Sensing and Computing for Smart Cities School of Informatics Xiamen University (XMU) China and Key Laboratory of Multimedia Trusted Perception and Efficient Computing XMU China School of Computer National University of Defense Technology China
Multi-agent systems are characterized by environmental uncertainty, varying policies of agents, and partial observability, which result in significant risks. In the context of Multi-Agent Reinforcement Learning (MARL)...
来源: 评论