咨询与建议

限定检索结果

文献类型

  • 1,478 篇 期刊文献
  • 1,270 篇 会议
  • 60 册 图书

馆藏范围

  • 2,808 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,633 篇 工学
    • 1,157 篇 计算机科学与技术...
    • 926 篇 软件工程
    • 349 篇 信息与通信工程
    • 324 篇 控制科学与工程
    • 215 篇 电气工程
    • 187 篇 电子科学与技术(可...
    • 186 篇 生物工程
    • 155 篇 机械工程
    • 154 篇 生物医学工程(可授...
    • 114 篇 光学工程
    • 92 篇 仪器科学与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 网络空间安全
    • 66 篇 化学工程与技术
    • 63 篇 交通运输工程
  • 1,016 篇 理学
    • 442 篇 物理学
    • 380 篇 数学
    • 231 篇 生物学
    • 114 篇 统计学(可授理学、...
    • 98 篇 系统科学
    • 76 篇 化学
  • 507 篇 管理学
    • 344 篇 管理科学与工程(可...
    • 179 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 215 篇 医学
    • 175 篇 临床医学
    • 132 篇 基础医学(可授医学...
    • 79 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 69 篇 法学
    • 57 篇 社会学
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 51 篇 农学
  • 37 篇 教育学
  • 12 篇 艺术学
  • 10 篇 文学
  • 4 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 114 篇 deep learning
  • 83 篇 machine learning
  • 65 篇 artificial intel...
  • 47 篇 proton-proton in...
  • 47 篇 information tech...
  • 45 篇 feature extracti...
  • 43 篇 internet of thin...
  • 40 篇 optimization
  • 39 篇 accuracy
  • 36 篇 computational mo...
  • 35 篇 computer science
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 35 篇 training
  • 33 篇 testing
  • 31 篇 predictive model...
  • 29 篇 covid-19
  • 29 篇 collisions (nucl...
  • 29 篇 nuclear counters
  • 28 篇 convolutional ne...

机构

  • 166 篇 faculty of scien...
  • 166 篇 departamento de ...
  • 166 篇 department for p...
  • 166 篇 department of ph...
  • 164 篇 department of ph...
  • 161 篇 faculté des scie...
  • 161 篇 yerevan physics ...
  • 158 篇 kirchhoff-instit...
  • 157 篇 department of ph...
  • 157 篇 department of ph...
  • 156 篇 department of ph...
  • 154 篇 institute of phy...
  • 152 篇 institute of phy...
  • 150 篇 fakultät für phy...
  • 150 篇 physikalisches i...
  • 147 篇 national scienti...
  • 147 篇 dsm/irfu cea sac...
  • 147 篇 instituto de fís...
  • 146 篇 physics departme...
  • 143 篇 institut für ast...

作者

  • 162 篇 c. alexa
  • 162 篇 j. m. izen
  • 162 篇 k. bos
  • 162 篇 g. bella
  • 162 篇 j. strandberg
  • 162 篇 d. calvet
  • 162 篇 c. amelung
  • 162 篇 h. a. gordon
  • 162 篇 g. spigo
  • 162 篇 e. hines
  • 162 篇 a. c. könig
  • 161 篇 f. siegert
  • 160 篇 m. klein
  • 159 篇 r. ströhmer
  • 158 篇 h. sakamoto
  • 158 篇 s. nektarijevic
  • 158 篇 m. rijssenbeek
  • 158 篇 f. marroquim
  • 158 篇 s. jin
  • 158 篇 g. gaudio

语言

  • 2,658 篇 英文
  • 136 篇 其他
  • 9 篇 日文
  • 9 篇 中文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Section Computer Engineering Faculty of Information Technology and Systems"
2808 条 记 录,以下是651-660 订阅
排序:
Extractive Text Summarization of Long Documents Using Word and Sentence Encoding
Extractive Text Summarization of Long Documents Using Word a...
收藏 引用
Novel Intelligent and Leading Emerging Sciences Conference (NILES)
作者: Amany A. Abdelrahman Wafaa S. El-Kassas Hoda K. Mohamed Department of Computer and Systems Engineering Faculty of Engineering Ain Shams University Cairo Egypt Faculty of Computers and Information Technology The National Egyptian E-Learning University (EELU) Giza Egypt
Automatic Text Summarization (ATS) for long documents is a very challenging task. A long document includes more than one topic, so it is required to construct a summary that covers the most important contextual inform...
来源: 评论
Survey on compressed sensing over the past two decades
Memories - Materials, Devices, Circuits and Systems
收藏 引用
Memories - Materials, Devices, Circuits and systems 2023年 4卷
作者: Hosny, Sherif El-Kharashi, M. Watheq Abdel-Hamid, Amr T. Department of Computer and Systems Engineering Ain Shams University Cairo Egypt STMicroelectronics Cairo Egypt Department of Electrical and Computer Engineering University of Victoria VictoriaBC Canada Faculty of Information Engineering and Technology German University in Cairo Cairo Egypt
Compressed Sensing (CS) is a novel data acquisition theorem exploiting the signals sparsity differing from traditional Nyquist theorem in the ability of obtaining all information of such signal in fewer samples. CS ca... 详细信息
来源: 评论
An Efficient Sound and Data Steganography Based Secure Authentication System
收藏 引用
computers, Materials & Continua 2021年 第4期67卷 723-751页
作者: Debajit Datta Lalit Garg Kathiravan Srinivasan Atsushi Inoue G.Thippa Reddy M.Praveen Kumar Reddy K.Ramesh Nidal Nasser School of Computer Science and Engineering Vellore Institute of Technology(VIT)Vellore632014India Faculty of Information and Communication Technology University of MaltaMsidaMSD2080Malta School of Information Technology and Engineering Vellore Institute of Technology(VIT)Vellore632014India Department of Information Systems&Business Analytics Eastern Washington UniversitySpokaneWA99202USA Department of Computer Science Karnataka State Akkamahadevi Women’s UniversityVijayapuraIndia College of Engineering Alfaisal UniversityRiyadh1153Saudi Arabia
The prodigious advancements in contemporary technologies have also brought in the situation of unprecedented ***,the pin-based security system is an inadequate mechanism for handling such a *** reason is that hackers ... 详细信息
来源: 评论
A Review of 5G technology: Architecture and Challenges  8
A Review of 5G Technology: Architecture and Challenges
收藏 引用
8th IEEE International Conference on Computing, engineering and Design, ICCED 2022
作者: Attarbashi, Zainab S. Altaleb, Abdulazeez E. Mohd Aman, Azana Hafizah Hassan Abdalla Hashim, Aisha Eker, Sebahattin International Islamic University Malaysia Information Communication Technology Kuala Lumpur Malaysia Informatics Institute Istanbul Technical University Communication Systems Department Istanbul Turkey University Kebangsaan Malaysia Faculty of Information Science Technology Bangi Malaysia International Islamic University Malaysia Computer Information Engineering Kuala Lumpur Malaysia
5G Networks are considered as a new evolution since it aims to increase the wireless capacity 1000 times the previous generations. By 2025, it is expected that 5G will be connecting around 3 billion people and 41.6 bi... 详细信息
来源: 评论
Enhancing Extractive Text Summarization of Long Documents Using Features Dimensionality Reduction
Enhancing Extractive Text Summarization of Long Documents Us...
收藏 引用
Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), International
作者: Amany A. Abdelrahman Wafaa S. El-Kassas Hoda K. Mohamed Department of Computer and Systems Engineering Faculty of Engineering Ain Shams University Cairo Egypt Faculty of Computers and Information Technology The National Egyptian E-Learning University (EELU) Giza Egypt
Automatic Text Summarization (ATS) task is considered one of the most challenging tasks in Natural Language Processing field, especially for long documents. There are many techniques for ATS, including Artificial Inte...
来源: 评论
Data-driven machine learning approaches for simultaneous prediction of peak particle velocity and frequency induced by rock blasting in mining
Rock Mechanics Bulletin
收藏 引用
Rock Mechanics Bulletin 2025年 第1期4卷 29-52页
作者: Yewuhalashet Fissha Prashanth Ragam Hajime Ikeda N.Kushal Kumar Tsuyoshi Adachi P.S.Paul Youhei Kawamura Department of Geosciences Geotechnologyand Materials Engineering for ResourcesGraduate School of International Resource SciencesAkita UniversityAkita010-8502Japan Department of Mining Engineering Aksum UniversityAksum7080TigrayEthiopia School of Computer Science and Engineering VIT-AP UniversityAmaravatiAndhra PradeshIndia Department of Systems Controland Information EngineeringNational Institute of TechnologyAsahikawa College2-2-1-6 Syunkodai Asahikawa city Hokkaido071-8142Japan Department of Mining Engineering Indian Institute of Technology(Indian School of Mines)Dhanbad826004India Faculty of Engineering Hokkaido UniversityKita 8Nishi 5Kita-KuSapporo0608628Japan
The vibrations generated by rock blasting are a serious and hazardous outcome of these activities,causing harmful effects on the surrounding environment as well as the nearby *** the local ecology and human communitie... 详细信息
来源: 评论
The Effect of Data Augmentation on the Accuracy of Fish Species Classification Using Deep Learning
The Effect of Data Augmentation on the Accuracy of Fish Spec...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Ellya Helmud Catur Edi Widodo Oky Dwi Nurhayati Doctor Information System Postgraduate Diponegoro University Semarang Indonesia Faculty of Information Technology Information Systems Study Program Atma Luhur Institute of Science and Business Pangkalpinang Indonesia Physics Department Faculty of Science and Mathematics Diponegoro University Semarang Indonesia Department of Computer Engineering Faculty of Engineering Diponegoro University Semarang Indonesia
Fish image classification presents an intriguing challenge in the field of computer vision. This research aims to develop an accurate classification model to differentiate between four different fish species using a c... 详细信息
来源: 评论
Enhancing IoT Intelligence: A Transformer-based Reinforcement Learning Methodology
Enhancing IoT Intelligence: A Transformer-based Reinforcemen...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Gaith Rjoub Saidul Islam Jamal Bentahar Mohammed Amin Almaiah Rana Alrawashdeh Faculty of Information Technology Aqaba University of Technology Aqaba Jordan Concordia Institute for Information Systems Engineering Concordia University Montreal Canada Department of Computer Science Khalifa University Abu Dhabi UAE King Abdullah II School of Information Technology The University of Jordan Amman Jordan Faculty of Information Technology Applied Science Private University Amman Jordan Department of Information and Computer Science King Fahd University of Petroleum & Minerals Dhahran KSA
The proliferation of the Internet of Things (IoT) has led to an explosion of data generated by interconnected devices, presenting both opportunities and challenges for intelligent decision-making in complex environmen... 详细信息
来源: 评论
Performance Analysis of Energy and Secure Efficient Routing for Wireless Sensor Networks
Performance Analysis of Energy and Secure Efficient Routing ...
收藏 引用
Decision Aid Sciences and Application (DASA), International Conference on
作者: Amjed Abbas Ahmed Zainab Mohammed Hussein Ali Hamza Najim Khattab M. Ali Alheeti Nurhizam Safie Mohd Satar Aisha Hassan Abdallah Hashim Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Malaysia Department of Computer Techniques Engineering Imam AlKadhum College (IKC) Baghdad Iraq Department of Computer Science Information System University of Technology Imam AIKadhum College (IKC) Baghdad Iraq Department of Computer Technical Engineering Imam Al-Kadhum College (IKC) Al-Diwaniyah Iraq Computer Networking Systems Department College of Computer and Information Technology University of Anbar Anbar Iraq Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia (UKM) Bangi Malaysia Department of Electrical and Computer Engineering Faculty of Engineering International Islamic University Malaysia Selangor Malaysia
Wireless Sensor Networks (WSNs) are essential for various applications, but their architecture makes them vulnerable to attacks. While traditional security methods like authentication and encryption offer some protect... 详细信息
来源: 评论
Sustainability of Load Balancing Techniques in Fog Computing Environment: Review  18
Sustainability of Load Balancing Techniques in Fog Computing...
收藏 引用
18th International Conference on Mobile systems and Pervasive Computing, MobiSPC 2021, The 16th International Conference on Future Networks and Communications, FNC 2021 and the 11th International Conference on Sustainable Energy information technology, SEIT 2021
作者: Sulimani, Hamza Alghamdi, Wael Y. Jan, Tony Bharathy, Gnana Prasad, Mukesh Faculty of Engineering and Information Technology University of Technology Sydney SydneyNSW Australia Faculty of Computer Science and Information Technology Ta 'If University Ta'if Saudi Arabia School of IT and Engineering Melbourne Institute of Technology Sydney Australia School of Information Systems and Modelling University of Technology Sydney Sydney Australia
The extreme workloads on the fog layer caused a misalignment in some fog nodes that affect its efficiency and degenerate fog technology's primary goal. Therefore, creating a balanced computing environment via the ... 详细信息
来源: 评论