咨询与建议

限定检索结果

文献类型

  • 4,992 篇 会议
  • 2,887 篇 期刊文献
  • 35 册 图书

馆藏范围

  • 7,914 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,659 篇 工学
    • 3,290 篇 计算机科学与技术...
    • 2,638 篇 软件工程
    • 951 篇 信息与通信工程
    • 727 篇 控制科学与工程
    • 446 篇 电气工程
    • 430 篇 电子科学与技术(可...
    • 428 篇 生物工程
    • 360 篇 机械工程
    • 330 篇 生物医学工程(可授...
    • 270 篇 仪器科学与技术
    • 255 篇 光学工程
    • 215 篇 化学工程与技术
    • 175 篇 动力工程及工程热...
    • 172 篇 交通运输工程
    • 163 篇 安全科学与工程
    • 144 篇 网络空间安全
  • 2,657 篇 理学
    • 1,233 篇 数学
    • 911 篇 物理学
    • 493 篇 生物学
    • 418 篇 统计学(可授理学、...
    • 292 篇 系统科学
    • 219 篇 化学
  • 1,438 篇 管理学
    • 869 篇 管理科学与工程(可...
    • 662 篇 图书情报与档案管...
    • 400 篇 工商管理
  • 357 篇 医学
    • 302 篇 临床医学
    • 246 篇 基础医学(可授医学...
    • 140 篇 药学(可授医学、理...
  • 217 篇 法学
    • 176 篇 社会学
  • 158 篇 经济学
    • 157 篇 应用经济学
  • 113 篇 教育学
  • 88 篇 农学
  • 36 篇 文学
  • 18 篇 军事学
  • 18 篇 艺术学

主题

  • 238 篇 computer science
  • 173 篇 feature extracti...
  • 163 篇 deep learning
  • 150 篇 data mining
  • 146 篇 information syst...
  • 140 篇 computational mo...
  • 125 篇 machine learning
  • 113 篇 accuracy
  • 106 篇 training
  • 92 篇 semantics
  • 87 篇 neural networks
  • 86 篇 predictive model...
  • 85 篇 optimization
  • 78 篇 genetic algorith...
  • 74 篇 support vector m...
  • 74 篇 security
  • 72 篇 databases
  • 72 篇 artificial intel...
  • 69 篇 testing
  • 68 篇 computer archite...

机构

  • 260 篇 faculty of scien...
  • 259 篇 department for p...
  • 259 篇 department of ph...
  • 253 篇 departamento de ...
  • 251 篇 department of ph...
  • 246 篇 kirchhoff-instit...
  • 246 篇 institute of phy...
  • 245 篇 department of ph...
  • 241 篇 department of ph...
  • 239 篇 institute of phy...
  • 236 篇 faculté des scie...
  • 232 篇 fakultät für phy...
  • 220 篇 institut für ast...
  • 209 篇 graduate school ...
  • 207 篇 yerevan physics ...
  • 206 篇 department of ph...
  • 201 篇 department of ph...
  • 200 篇 department of ph...
  • 199 篇 instituto de fís...
  • 195 篇 physics division...

作者

  • 237 篇 c. alexa
  • 237 篇 j. m. izen
  • 237 篇 g. bella
  • 237 篇 j. strandberg
  • 237 篇 d. calvet
  • 237 篇 c. amelung
  • 237 篇 y. tayalati
  • 237 篇 g. spigo
  • 237 篇 f. siegert
  • 237 篇 a. c. könig
  • 234 篇 m. klein
  • 233 篇 r. ströhmer
  • 233 篇 m. rijssenbeek
  • 233 篇 s. jin
  • 233 篇 g. gaudio
  • 233 篇 s. mohapatra
  • 232 篇 y. nagasaka
  • 231 篇 h. a. gordon
  • 230 篇 h. sakamoto
  • 230 篇 s. guindon

语言

  • 7,468 篇 英文
  • 320 篇 其他
  • 124 篇 中文
  • 6 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science and Computer Information System departments"
7914 条 记 录,以下是151-160 订阅
排序:
Evaluation of REAL-ESRGAN Using Different Types of Image Degradation  11
Evaluation of REAL-ESRGAN Using Different Types of Image Deg...
收藏 引用
11th International Conference on ICT for Smart Society, ICISS 2024
作者: Andriadi, Kus Zarlis, Muhammad Heryadi, Yaya Chowanda, Andry Binus Graduate Program Bina Nusantara University Computer Science Department Jakarta Indonesia Binus Graduate Program Bina Nusantara University Information System Management Department Jakarta11480 Indonesia School of Computer Science Binus University Computer Science Department Jakarta Indonesia
This study evaluates the performance of the REAL-ESRGAN [1] model on images with varying levels of degradation using the DIV2K dataset [2], such as the Wild, the Mild, the Difficult, and the x8 subsets. REAL-ESRGAN wa... 详细信息
来源: 评论
Covert Channel Detection and Generation Techniques: A Survey  3
Covert Channel Detection and Generation Techniques: A Survey
收藏 引用
3rd International Conference on Emerging Smart Technologies and Applications, eSmarTA 2023
作者: Al-Khulaidi, Nesmah A. Zahary, Ammar T. Hazaa, Muneer A.S Nasser, Adel A. Yemen Academy for Graduate Studies Department of Computer Networks Sana'a Yemen University of Science and Technology Faculty of Computing and It Department of Computer Science Sana'a Yemen Thamar University Faculty of Computer and Information System Department of Computer Science Thamar Yemen Sa'adah University Faculty of Sciences Department of Information Systems and Computer Science Sa'adah Yemen
The use of covert communications has become more widespread recently as a solution to the information security issue. information security can be partially solved by the discovery and creation of covert routes. Covert... 详细信息
来源: 评论
ResPocket: A Multi-Scale Feature Fusion Method for Improving Protein Binding Site Detection
ResPocket: A Multi-Scale Feature Fusion Method for Improving...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Lin, Xiaoli Yang, Wenli Chen, Yaoyu Liao, Xiongwei Wu, Zimo Zhang, Xiaolong Wuhan University of Science and Technology Hubei Key Laboratory of Intelligent Information Processing and Real-Time Industrial System School of Computer Science and Technology China
Accurate detection of protein binding sites is critical for facilitating drug design. Most existing models rely on features at a single scale, leading to the loss of crucial global or local structural information. The... 详细信息
来源: 评论
Neural controller design for a class of nonlinear systems with time-varying delay: A bibliometric analysis-based short literature review
Neural controller design for a class of nonlinear systems wi...
收藏 引用
2023 International Conference on computer science, information Technology and Engineering, ICCoSITE 2023
作者: Wijaya, Santo Gaol, Ford Lumban Wibowo, Antoni Zarlis, Muhammad Bina Nusantara University BINUS Graduate Program - Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University BINUS Graduate Program - Master of Computer Science Computer Science Department Jakarta11480 Indonesia Bina Nusantara University BINUS Graduate Program - Master of Information System Management Information System Management Department Jakarta11480 Indonesia
Real-world practical systems inherently exhibit non-linearities in their dynamics. Also, it is known that a time-varying delay exists in the system state or input-output. Combined, it affects the stability of the clos... 详细信息
来源: 评论
Artificial Fish Swarm Optimization with Deep Learning Enabled Opinion Mining Approach
收藏 引用
computer systems science & Engineering 2023年 第4期45卷 737-751页
作者: Saud S.Alotaibi Eatedal Alabdulkreem Sami Althahabi Manar Ahmed Hamza Mohammed Rizwanullah Abu Sarwar Zamani Abdelwahed Motwakel Radwa Marzouk Department of Information Systems College of Computing and Information SystemUmm Al-Qura UniversityMecca24382Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversityAbha62529Saudi Arabia Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAl-Kharj16278Saudi Arabia Department of Mathematics Faculty of ScienceCairo UniversityGiza12613Egypt
Sentiment analysis or opinion mining(OM)concepts become familiar due to advances in networking technologies and social ***,massive amount of text has been generated over Internet daily which makes the pattern recognit... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Automated Machine Learning Enabled Cybersecurity Threat Detection in Internet of Things Environment
收藏 引用
computer systems science & Engineering 2023年 第4期45卷 687-700页
作者: Fadwa Alrowais Sami Althahabi Saud S.Alotaibi Abdullah Mohamed Manar Ahmed Hamza Radwa Marzouk Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversitySaudi Arabia Department of Information Systems College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Research Centre Future University in EgyptNew Cairo11745Egypt Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam Bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Mathematics Faculty of ScienceCairo UniversityGiza12613Egypt
Recently,Internet of Things(IoT)devices produces massive quantity of data from distinct sources that get transmitted over public *** becomes a challenging issue in the IoT environment where the existence of cyber thre... 详细信息
来源: 评论
High-Performance Chip Design With Parallel Architecture for Magnetic Field Imaging system
收藏 引用
IEEE Transactions on Instrumentation and Measurement 2024年 73卷 1-13页
作者: Lin, Ming-Yi Hsieh, Sheng-Hsien Chen, Ching-Han Lin, Chun-Hung Yuan Ze University Department of Computer Science and Engineering Taoyuan320315 Taiwan National Pingtung University of Science and Technology Program of Artificial Intelligence and Mechatronics Pingtung912301 Taiwan National Central University Department of Computer Science and Information Engineering Taoyuan32001 Taiwan International Games System Company Ltd. New Taipei City248 Taiwan
To address the limitations of typical coil detection systems and enhance the performance of traditional magnetic field imaging (MFI) systems, we propose a MFI system that uses a 4×4 array of anisotropic magnetore... 详细信息
来源: 评论
Disclosure Privacy information Social Media on TikTok  9
Disclosure Privacy Information Social Media on TikTok
收藏 引用
9th International Conference on information Management and Technology, ICIMTech 2024
作者: Syamsuar, Dedy Fahrezi, Fazri Favian, Ahnaf Irwansyah, Edy Irawan, Achmad Fakhri School of Information System Bina Nusantara University Faculty of Engineering Professional Engineer Program Dept. Information System Department Jakarta11480 Indonesia School of Information System Bina Nusantara University Information System Department Jakarta11480 Indonesia School of Information System Bina Nusantara University Computer Science Department Jakarta11480 Indonesia
With the rapid development of technology, the use of social media by the public, especially among young people, is increasing. One of the social media platforms currently used by young people is the TikTok application... 详细信息
来源: 评论
Reshaping Automated Writing Evaluator for English as Foreign Language Users  3
Reshaping Automated Writing Evaluator for English as Foreign...
收藏 引用
3rd IEEE International Conference on Social sciences and Intelligence Management, SSIM 2023
作者: Prawati, Maria Tamarina Hasani, Muhammad Fikri Christian, Lay Ivana, Jane Bina Nusantara University Faculty of Humanities English Department Jakarta Indonesia School of Computer Science Bina Nusantara University Computer Science Jakarta Indonesia School of Information System Bina Nusantara University Information System Department Jakarta Indonesia
To understand the role of the human rating and automatic writing evaluator (AWE), we compared their scores. There was a notable score difference in Focus and Purposes as a metric. This result indicated the need to val... 详细信息
来源: 评论