咨询与建议

限定检索结果

文献类型

  • 2,334 篇 会议
  • 1,971 篇 期刊文献
  • 96 册 图书

馆藏范围

  • 4,401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,708 篇 工学
    • 1,954 篇 计算机科学与技术...
    • 1,573 篇 软件工程
    • 510 篇 信息与通信工程
    • 434 篇 生物工程
    • 405 篇 控制科学与工程
    • 346 篇 生物医学工程(可授...
    • 261 篇 电气工程
    • 243 篇 光学工程
    • 210 篇 电子科学与技术(可...
    • 192 篇 机械工程
    • 112 篇 化学工程与技术
    • 111 篇 安全科学与工程
    • 107 篇 交通运输工程
    • 106 篇 动力工程及工程热...
    • 99 篇 仪器科学与技术
  • 1,584 篇 理学
    • 816 篇 数学
    • 487 篇 生物学
    • 437 篇 物理学
    • 295 篇 统计学(可授理学、...
    • 177 篇 系统科学
    • 111 篇 化学
  • 746 篇 管理学
    • 432 篇 管理科学与工程(可...
    • 338 篇 图书情报与档案管...
    • 245 篇 工商管理
  • 331 篇 医学
    • 288 篇 临床医学
    • 275 篇 基础医学(可授医学...
    • 166 篇 药学(可授医学、理...
    • 125 篇 公共卫生与预防医...
  • 155 篇 法学
    • 139 篇 社会学
  • 94 篇 经济学
    • 93 篇 应用经济学
  • 75 篇 教育学
  • 64 篇 农学
  • 12 篇 军事学
  • 5 篇 艺术学
  • 4 篇 文学

主题

  • 102 篇 machine learning
  • 92 篇 computational mo...
  • 83 篇 semantics
  • 74 篇 deep learning
  • 69 篇 feature extracti...
  • 65 篇 artificial intel...
  • 65 篇 training
  • 62 篇 accuracy
  • 59 篇 data models
  • 58 篇 visualization
  • 57 篇 computer archite...
  • 53 篇 cloud computing
  • 47 篇 informatics
  • 47 篇 predictive model...
  • 47 篇 forecasting
  • 45 篇 internet of thin...
  • 45 篇 software
  • 44 篇 real-time system...
  • 43 篇 educational inst...
  • 42 篇 optimization

机构

  • 104 篇 school of comput...
  • 94 篇 school of comput...
  • 51 篇 school of comput...
  • 49 篇 school of comput...
  • 44 篇 school of comput...
  • 42 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 40 篇 institute of phy...
  • 40 篇 luddy school of ...
  • 39 篇 dipartimento di ...
  • 39 篇 fakultät für phy...
  • 39 篇 institute of phy...
  • 38 篇 department of ph...
  • 38 篇 department of ph...

作者

  • 35 篇 liu lantao
  • 32 篇 c. alexa
  • 32 篇 j. m. izen
  • 32 篇 s. veneziano
  • 32 篇 g. bella
  • 32 篇 j. strandberg
  • 32 篇 d. calvet
  • 32 篇 c. amelung
  • 32 篇 n. orlando
  • 32 篇 h. a. gordon
  • 32 篇 y. tayalati
  • 32 篇 g. spigo
  • 32 篇 v. chiarella
  • 32 篇 f. siegert
  • 32 篇 a. c. könig
  • 32 篇 m. klein
  • 32 篇 r. ströhmer
  • 32 篇 h. sakamoto
  • 32 篇 g. h. a. viehhau...
  • 32 篇 s. nektarijevic

语言

  • 3,728 篇 英文
  • 632 篇 其他
  • 43 篇 中文
  • 4 篇 德文
  • 2 篇 日文
检索条件"机构=School of Engineering in Computing and Informatics"
4401 条 记 录,以下是51-60 订阅
排序:
User-Centered Phishing Detection through Personalized Edge computing  24
User-Centered Phishing Detection through Personalized Edge C...
收藏 引用
27th ACM Conference on Computer-Supported Cooperative Work and Social computing, CSCW Companion 2024
作者: Das, Sanchari Kim, DongInn Abbott, Jacob Jean Camp, L. Ritchie School of Engineering and Computer Science University of Denver DenverCO United States Luddy School of Informatics Computing and Engineering Indiana University Bloomington BloomingtonIN United States
Ensuring user-centered phishing detection is a significant challenge due to the difficulty in distinguishing threats. To address this, we propose a personalized tool - Holistic User-Centered Identification of Threats ... 详细信息
来源: 评论
Reinforcement Learning Approach for Commodity Market Trading Strategy  1
收藏 引用
13th National Technical Symposium on Unmanned System Technology, NUSYS 2023
作者: Wong, Pei Yuin Moung, Ervin Gubin Farzamnia, Ali Yahya, Farashazillah Obit, Joe Henry Sani, Zaidatol Haslinda Abdullah Faculty of Computing and Informatics Universiti Malaysia Sabah Kota Kinabalu Malaysia Faculty of Engineering Universiti Malaysia Sabah Kota Kinabalu Malaysia School of Computing and Engineering University of Huddersfield Huddersfield United Kingdom
The apparent phenomena of commodity price fluctuations significantly affect the cost of living. Most current studies utilize datasets collected before the Russo-Ukrainian War and Covid-19. Moreover, many people are fo... 详细信息
来源: 评论
What Makes a Technology Privacy Enhancing? Laypersons’ and Experts’ Descriptions, Uses, and Perceptions of Privacy Enhancing Technologies  18th
What Makes a Technology Privacy Enhancing? Laypersons’ and...
收藏 引用
18th International Conference on Information for a Better World: Normality, Virtuality, Physicality, Inclusivity, iConference 2023
作者: Elmimouni, Houda Shusas, Erica Skeba, Patrick Baumer, Eric P. S. Forte, Andrea Luddy School of Informatics Computing and Engineering BloomingtonIN United States College of Computing and Informatics Drexel University PhiladelphiaPA United States Computer Science and Engineering Lehigh University BethlehemPA United States
What makes a technology privacy-enhancing? In this study, we construct an explanation grounded in the technologies and practices that people report using to enhance their privacy. We conducted an online survey of priv... 详细信息
来源: 评论
Automated Sleep Staging Classification System Based on Convolutional Neural Network Using Polysomnography Signals  1
收藏 引用
13th National Technical Symposium on Unmanned System Technology, NUSYS 2023
作者: Azrin, Muhd Luqman Bin Farzamnia, Ali Fan, Liau Chung Moung, Ervin Gubin Faculty of Engineering Universiti Malaysia Sabah Kota Kinabalu Malaysia Faculty of Computing and Informatics Universiti Malaysia Sabah Kota Kinabalu Malaysia School of Computing and Engineering University of Huddersfield Huddersfield United Kingdom
Sleep is a crucial bodily process that plays a vital role in maintaining overall health and well-being. When diagnosing and treating sleep disorders, the initial step is sleep staging. However, manual sleep staging by... 详细信息
来源: 评论
Online Conversation-Based Social engineering Detection Using Machine Learning  1
收藏 引用
13th National Technical Symposium on Unmanned System Technology, NUSYS 2023
作者: Ulaganathan, Thurairaj A/L R. Moung, Ervin Gubin Farzamnia, Ali Yahya, Farashazillah Sze, Florence Sia Fui Hung, Lai Po Faculty of Computing and Informatics Universiti Malaysia Sabah Kota Kinabalu Malaysia Faculty of Engineering Universiti Malaysia Sabah Kota Kinabalu Malaysia School of Computing and Engineering University of Huddersfield Huddersfield United Kingdom
Social engineering through online conversations can occur via phone calls, Skype, or Google Meet, among others. This paper presents a machine learning-based classifier for detecting scam conversations in various onlin... 详细信息
来源: 评论
A Cocoa Ripeness Detection and Classification Model Based on Improved YOLOv5s  10
A Cocoa Ripeness Detection and Classification Model Based on...
收藏 引用
10th International Conference on Advanced informatics: Concept, Theory and Application, ICAICTA 2023
作者: Ayubi, Aula Faiz, Muhammad Situmorang, George B. Ramadhani, Kurniawan Nur Utama, Nugraha P. School of Electrical Engineering and Informatics Bandung Institute of Technology Bandung Indonesia Telkom University of School of Computing Bandung Indonesia
The present study introduces a novel approach to identifying the maturity of cacao fruits, utilizing YOLOv5s in tandem with the Convolutional Block Attention Module (CBAM). The efficacy of this method was evaluated on... 详细信息
来源: 评论
Retrieval and validation of long-term aerosol optical depth from AVHRR data over China
收藏 引用
International Journal of Digital Earth 2022年 第1期15卷 1817-1832页
作者: Chunlin Jin Yong Xue Xingxing Jiang Shuhui Wu Yuxin Sun School of Environment and Spatial Informatics China University of Mining and TechnologyXuzhouPeople’s Republic of China School of Computing and Engineering College of Science and EngineeringUniversity of DerbyDerbyUK
Advanced Very High Resolution Radiometer(AVHRR)onboard National Oceanic and Atmospheric Administration(NOAA)satellites can provide over 40 years of global remote sensing observations,which can be used to retrieve long... 详细信息
来源: 评论
Powering the Future: The Latest Breakthrough in Wireless Charging for Electric Vehicles  4
Powering the Future: The Latest Breakthrough in Wireless Cha...
收藏 引用
4th IEEE International Conference in Power engineering Applications, ICPEA 2024
作者: Fry, Matthew Islam, Muhammad Usama Islam, Syed Zahurul Uddin, Jasim Cardiff Metropolitan University Department of Applied Computing and Engineering United Kingdom University of Louisiana at Lafayette School of Computing and Informatics United States Universiti Tun Hussein Onn Faculty of Electrical and Electronics Engineering Malaysia
Recently, the Electric Vehicle (EV) market has experienced significant growth and is projected to expand exponentially with the advancement of technology. Major industries are increasingly adopting the concept of prod... 详细信息
来源: 评论
Data-To-Question Generation Using Deep Learning  4
Data-To-Question Generation Using Deep Learning
收藏 引用
4th International Conference on Big Data Analytics and Practices, IBDAP 2023
作者: Koshy, Nicole Rachel Dixit, Anshuman Jadhav, Siddhi Shrikant Penmatsa, Arun V Samanthapudi, Sagar V Kumar, Mothi Gowtham Ashok Anuyah, Sydney Oghenetega Vemula, Gourav Herzog, Patricia Snell Bolchini, Davide Indiana Univeristy Purdue University Indianapolis Luddy School of Informatics Computing and Engineering Indianapolis United States
Many publicly available datasets exist that can provide factual answers to a wide range of questions that benefit the public. Indeed, datasets created by governmental and nongovernmental organizations often have a man... 详细信息
来源: 评论
Cyberbullying Sexism Harassment Identification by Metaheurustics-Tuned eXtreme Gradient Boosting
收藏 引用
Computers, Materials & Continua 2024年 第9期80卷 4997-5027页
作者: Milos Dobrojevic Luka Jovanovic Lepa Babic Miroslav Cajic Tamara Zivkovic Miodrag Zivkovic Suresh Muthusamy Milos Antonijevic Nebojsa Bacanin Technical Faculty Singidunum UniversityBelgrade11000Serbia Informatics and Computing Singidunum UniversityBelgrade11000Serbia Business Economics Singidunum UniversityBelgrade11000Serbia Computing and Informatics Sinergija UniversityBijeljina76300Bosnia and Herzegovina Department for Information Systems and Technologies University“Union Nikola Tesla”Cara DusanaBelgrade11080Serbia Department for Computer Science and Informatics School of Electrical EngineeringUniversity of BelgradeBelgrade11000Serbia Department of Electrical and Electronics Engineering Kongu Engineering College(Autonomous)PerunduraiErode638060India Department of Mathematics Saveetha School of Engineering(Deemed to be University)SIMATS ThandalamChennai602105India MEU Research Unit Middle East UniversityAmman11831Jordan
Cyberbullying is a form of harassment or bullying that takes place online or through digital devices like smartphones,computers,or *** can occur through various channels,such as social media,text messages,online forum... 详细信息
来源: 评论