咨询与建议

限定检索结果

文献类型

  • 1,711 篇 会议
  • 51 篇 期刊文献
  • 21 册 图书

馆藏范围

  • 1,783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,245 篇 工学
    • 1,036 篇 计算机科学与技术...
    • 602 篇 软件工程
    • 253 篇 电气工程
    • 235 篇 信息与通信工程
    • 134 篇 生物工程
    • 118 篇 控制科学与工程
    • 115 篇 生物医学工程(可授...
    • 64 篇 机械工程
    • 62 篇 化学工程与技术
    • 54 篇 电子科学与技术(可...
    • 51 篇 光学工程
    • 47 篇 仪器科学与技术
    • 40 篇 安全科学与工程
    • 38 篇 动力工程及工程热...
    • 36 篇 建筑学
    • 32 篇 材料科学与工程(可...
  • 449 篇 理学
    • 239 篇 数学
    • 142 篇 生物学
    • 88 篇 统计学(可授理学、...
    • 84 篇 物理学
    • 63 篇 系统科学
    • 58 篇 化学
  • 324 篇 管理学
    • 175 篇 图书情报与档案管...
    • 165 篇 管理科学与工程(可...
    • 98 篇 工商管理
  • 125 篇 医学
    • 114 篇 临床医学
    • 96 篇 基础医学(可授医学...
    • 63 篇 药学(可授医学、理...
  • 56 篇 法学
    • 47 篇 社会学
  • 47 篇 教育学
    • 36 篇 教育学
  • 26 篇 经济学
  • 24 篇 农学
  • 3 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 57 篇 informatics
  • 48 篇 cloud computing
  • 31 篇 big data
  • 28 篇 feature extracti...
  • 22 篇 computational mo...
  • 22 篇 machine learning
  • 21 篇 support vector m...
  • 21 篇 students
  • 19 篇 internet of thin...
  • 19 篇 data mining
  • 18 篇 neural networks
  • 17 篇 testing
  • 16 篇 information syst...
  • 16 篇 monitoring
  • 16 篇 artificial intel...
  • 15 篇 computer archite...
  • 15 篇 visualization
  • 15 篇 accuracy
  • 15 篇 mathematical mod...
  • 15 篇 forecasting

机构

  • 12 篇 department of in...
  • 10 篇 school of comput...
  • 8 篇 departement of i...
  • 8 篇 college of pharm...
  • 7 篇 national institu...
  • 6 篇 faculty of engin...
  • 6 篇 department of in...
  • 5 篇 lebanese america...
  • 5 篇 alexandria unive...
  • 5 篇 college of compu...
  • 5 篇 misr internation...
  • 5 篇 shandong provinc...
  • 5 篇 benha university...
  • 5 篇 faculty of compu...
  • 5 篇 dept. of informa...
  • 5 篇 african centre o...
  • 5 篇 school of inform...
  • 5 篇 middle east univ...
  • 5 篇 department of in...
  • 4 篇 school of inform...

作者

  • 9 篇 tohari ahmad
  • 8 篇 chouvarda i.
  • 7 篇 wan azani mustaf...
  • 7 篇 maglaveras n.
  • 6 篇 leau yu-beng
  • 6 篇 syahputra m.f.
  • 6 篇 andayani u.
  • 5 篇 prendinger helmu...
  • 5 篇 madbouly magda m...
  • 5 篇 jin zhou
  • 5 篇 ahmad tohari
  • 5 篇 bo yang
  • 5 篇 abualigah laith
  • 5 篇 abdelminaam diaa...
  • 5 篇 lin wang
  • 5 篇 segundo moisés t...
  • 5 篇 xiuyang zhao
  • 5 篇 luis enrique maf...
  • 4 篇 abbas hameed abd...
  • 4 篇 hiam alquran

语言

  • 1,753 篇 英文
  • 21 篇 其他
  • 10 篇 中文
  • 1 篇 法文
  • 1 篇 土耳其文
检索条件"任意字段=3rd International Conference on Informatics and Computing, ICIC 2018"
1783 条 记 录,以下是41-50 订阅
排序:
A Deep Learning-Based Framework for Detecting Depression from Electroencephalogram Signals  3rd
A Deep Learning-Based Framework for Detecting Depression fro...
收藏 引用
3rd international conference on Trends in Electronics and Health informatics, TEHI 2023
作者: Singh, Akshay Kumar Singh, Pawan Kumar Kaiser, M. Shamim Mahmud, Mufti Department of Information Technology Jadavpur University Jadavpur University Second Campus Plot No. 8 Salt Lake Bypass LB Block Sector III Salt Lake City West Bengal Kolkata700106 India Institute of Information Technology Jahangirnagar University Savar Dhaka1342 Bangladesh School of Science and Technology Nottingham Trent University Clifton NottinghamNG11 8NS United Kingdom Department of Computer Science Nottingham Trent University Clifton NottinghamNG11 8NS United Kingdom Medical Technologies Innovation Facility Nottingham Trent University NottinghamNG11 8 NS United Kingdom Computing and Informatics Research Centre Nottingham Trent University NottinghamNG11 8 NS United Kingdom
Depression is a serious mental disorder that affects millions of people around the world. One of the challenges in dealing with depression is to detect it early and accurately. In this study, we use electroencephalogr... 详细信息
来源: 评论
BMFT: Achieving Fairness via Bias-Based Weight Masking Fine-Tuning  2nd
BMFT: Achieving Fairness via Bias-Based Weight Masking Fine...
收藏 引用
2nd international Workshop on Fairness of AI in Medical Imaging, FAIMI 2024, and 3rd international Workshop on Ethical and Philosophical Issues in Medical Imaging, EPIMI 2024, Held in Conjunction with the international conference on Medical Image computing and Computer Assisted Interventions, MICCAI 2024
作者: Xue, Yuyang Yan, Junyu Dutt, Raman Haider, Fasih Liu, Jingshuai McDonagh, Steven Tsaftaris, Sotirios A. School of Engineering The University of Edinburgh EdinburghEH9 3FG United Kingdom School of Informatics The University of Edinburgh EdinburghEH8 9AB United Kingdom
Developing models with robust group fairness properties is paramount, particularly in ethically sensitive domains such as medical diagnosis. Recent approaches to achieving fairness in machine learning require a substa... 详细信息
来源: 评论
A Design of Nested Photonic Crystal Fiber for OAM Mode Propagation  3rd
A Design of Nested Photonic Crystal Fiber for OAM Mode Pro...
收藏 引用
3rd international conference on Intelligent computing Techniques for Smart Energy Systems, ICTSES 2023
作者: Punia, Sushma Saharia, Ankur Ismail, Yaseera Petruccione, Francesco Bourdine, Anton V. Demidov, Vladimir V. Morozov, Oleg G. Yin, Juan Singh, Ghanshyam Tiwari, Manish Optoelectronics and Photonics Research Lab Department of Electronics and Communication Engineering Manipal University Jaipur Jaipur303007 India Department of Physics Stellenbosch University Stellenbosch7600 South Africa School of Data Science and Computational Thinking Stellenbosch University Stellenbosch7602 South Africa Stellenbosch South Africa Department of Communication Lines Povolzhskiy State University of Telecommunications and Informatics 23 Lev Tolstoy Street Samara Oblast443010 Russia JSC Scientific Production Association State Optical Institute Named after Vavilov S.I. 36/1 Babushkin Street St. Petersburg192171 Russia Department of Photonics and Communication Links Saint Petersburg State University of Telecommunications Named after M.A. Bonch-Bruevich 22 Bolshevikov Avenue St. Petersburg193232 Russia Department of Radiophotonics and Microwave Technologies Kazan National Research State University named after A.N. Tupolev-KAI 10 Karl Marx Street Kazan420111 Russia Division of Quantum Physics and Quantum Information University of Science and Technology of China 99 Xiupu Road Pudong District Shanghai200093 China Department of ECE Malaviya National Institute of Technology Jaipur Jaipur302017 India
This work is intended to present a nested Photonic Crystal Fiber (PCF) for OAM mode propagation. The proposed PCF comprises of a dense flint SF6 and a very light flint LLF1. The finite-element method (FEM) is used for... 详细信息
来源: 评论
Generative Adversarial Networks for Synthetic Data Generation in Privacy-Preserving Health informatics
Generative Adversarial Networks for Synthetic Data Generatio...
收藏 引用
international Symposium on Advanced computing and Communication (ISACC)
作者: Vineet Kumar Hassan Safi Ahmed M. Shailaja B Karthikeyan Malik Bader Alazzam R Saravanakumar Symbiosis Centre for Management Studies Pune Symbiosis International (Deemed University) Pune Maharashtra India Department of Biomedical Engineering Al-Farahidi University Baghdad Iraq Department of DataScience MallaReddy University Hyderabad Telangana India Department of CSE KPR Institute of Engineering and Technology Coimbatore India Faculty of Information Technology Jadara University Irbid Jordan Department of ECE Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Saveetha University Chennai India
Privacy preserving health informatics deals with the problem of how to obtain informative analysis from the health-related information while ensuring that the privacy of individuals is protected. This paper presents t... 详细信息
来源: 评论
Frequency Encoding of High Cardinality Categorical Features to Detect SPAM Botnet Activity
Frequency Encoding of High Cardinality Categorical Features ...
收藏 引用
international Symposium on Advanced computing and Communication (ISACC)
作者: Daffa Muhamad Azhar Tohari Ahmad Muhammad Aidiel Rachman Putra Adifa Widyadhani Chanda D’Layla Department of Informatics Institut Teknologi Sepuluh Nopember Surabaya Indonesia
Network attacks are diverse, with botnets being among the most dangerous. SPAM is a common botnet threat, making botnet detection a critical focus in classifying botnet and non-botnet network traffic. Since most detec... 详细信息
来源: 评论
Android Malware Detection Based on CTGAN and LightGBM
Android Malware Detection Based on CTGAN and LightGBM
收藏 引用
international Symposium on Advanced computing and Communication (ISACC)
作者: Zydhan Linnar Putra Tohari Ahmad Muhammad Aidiel Rachman Putra Adifa Widyadhani Chanda D'Layla Department of Informatics Institut Teknologi Sepuluh Nopember Surabaya Indonesia
Android OS vulnerabilities necessitate improved malware mitigation. Machine learning (ML) offers solutions but struggles with imbalanced datasets, reducing effectiveness in detecting minority classes. Traditional meth... 详细信息
来源: 评论
REXIO: Indexing for Low Write Amplification by Reducing Extra I/Os in Key-Value Store Under Mixed Read/Write Workloads  25th
REXIO: Indexing for Low Write Amplification by Reducing Ex...
收藏 引用
25th international conference on Web Information Systems Engineering, WISE 2024
作者: Wang, Zizhao Qu, Qiang Han, Nan Deng, Zhelang Ma, Yizhuo Huang, Xiaowen Meng, Jintao Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China University of Chinese Academy of Sciences Beijing China Shenzhen University Shenzhen China Department of Health Technology and Informatics The Hong Kong Polytechnic University Hong Kong Laboratory of Intelligent Collaborative Computing University of Electronic Science and Technology of China Chengdu China
In mixed read/write (r/w) workloads, Key-Value stores that utilize Log-Structured Merge trees face significant write amplification (WA) due to frequent writing, resulting in extensive data compaction. While current LS... 详细信息
来源: 评论
Lightweight Botnet Detection for IoT: Autoencoder-Based Approach Using Packet Length
Lightweight Botnet Detection for IoT: Autoencoder-Based Appr...
收藏 引用
international Symposium on Advanced computing and Communication (ISACC)
作者: Muhammad Arifuddin Aljufri Tohari Ahmad Muhammad Aidiel Adifa Widyadhani Chanda D'Layla Department of Informatics Institut Teknologi Sepuluh Nopember Surabaya Indonesia
The growing prevalence of botnet attacks poses a significant threat, particularly as the demand for IoT devices continues to rise. This underscores the need for effective botnet detection techniques tailored for IoT e... 详细信息
来源: 评论
Hybrid GAN-Based Transfer Learning Model for Advanced Threat Detection in Cloud computing
Hybrid GAN-Based Transfer Learning Model for Advanced Threat...
收藏 引用
Device Intelligence, computing and Communication Technologies, (DICCT), international conference on
作者: Agha Salman Haider Md Tabrez Nafis Ihtiram Raza Khan Syed Taha Owais Nida Fatima Department of CSE Jamia Hamdard New Delhi India National Informatics Centre New Delhi
In the realm of cloud computing, reliable detection of threats forms a very important aspect since systems might be at risk. In this research, they proposed a new model that incorporates GANs with transfer learning to... 详细信息
来源: 评论
Adaptive Dictionary Optimization for LSTM-Based Detection of Low-Rate FTP Attacks with Noisy Training Sets
Adaptive Dictionary Optimization for LSTM-Based Detection of...
收藏 引用
international Symposium on Advanced computing and Communication (ISACC)
作者: Angela Oryza Prabowo Tohari Ahmad Muhammad Aidiel Rachman Putra Adifa Widyadhani Chanda D’Layla Department of Informatics Institut Teknologi Sepuluh Nopember Surabaya Indonesia
Network Intrusion Detection Systems (NIDS) face challenges from low-rate attacks that evade traditional methods, but deep learning models like Long Short-Term Memory (LSTM) networks offer a solution by analyzing netwo... 详细信息
来源: 评论