咨询与建议

限定检索结果

文献类型

  • 3,515 篇 会议
  • 2,139 篇 期刊文献
  • 37 册 图书

馆藏范围

  • 5,691 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,366 篇 工学
    • 2,042 篇 计算机科学与技术...
    • 1,641 篇 软件工程
    • 668 篇 信息与通信工程
    • 631 篇 控制科学与工程
    • 473 篇 电气工程
    • 429 篇 电子科学与技术(可...
    • 367 篇 生物工程
    • 304 篇 机械工程
    • 300 篇 生物医学工程(可授...
    • 251 篇 光学工程
    • 228 篇 仪器科学与技术
    • 208 篇 动力工程及工程热...
    • 185 篇 化学工程与技术
    • 147 篇 交通运输工程
    • 126 篇 材料科学与工程(可...
    • 108 篇 安全科学与工程
  • 1,839 篇 理学
    • 856 篇 数学
    • 566 篇 物理学
    • 424 篇 生物学
    • 284 篇 统计学(可授理学、...
    • 227 篇 系统科学
    • 182 篇 化学
  • 903 篇 管理学
    • 609 篇 管理科学与工程(可...
    • 322 篇 图书情报与档案管...
    • 277 篇 工商管理
  • 310 篇 医学
    • 263 篇 临床医学
    • 205 篇 基础医学(可授医学...
    • 138 篇 药学(可授医学、理...
  • 138 篇 法学
    • 113 篇 社会学
  • 107 篇 经济学
    • 107 篇 应用经济学
  • 69 篇 农学
  • 51 篇 教育学
  • 17 篇 文学
  • 17 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 206 篇 computer science
  • 114 篇 deep learning
  • 97 篇 feature extracti...
  • 94 篇 computational mo...
  • 92 篇 control systems
  • 91 篇 systems engineer...
  • 88 篇 machine learning
  • 88 篇 accuracy
  • 87 篇 data mining
  • 78 篇 neural networks
  • 76 篇 artificial intel...
  • 70 篇 optimization
  • 70 篇 training
  • 67 篇 laboratories
  • 67 篇 costs
  • 65 篇 hardware
  • 61 篇 humans
  • 57 篇 testing
  • 56 篇 protocols
  • 54 篇 information syst...

机构

  • 72 篇 department of co...
  • 36 篇 national enginee...
  • 29 篇 college of compu...
  • 24 篇 department of co...
  • 24 篇 department of co...
  • 24 篇 department of co...
  • 23 篇 department of co...
  • 22 篇 key laboratory o...
  • 22 篇 department of sy...
  • 22 篇 department of el...
  • 22 篇 university of ch...
  • 22 篇 distributed mult...
  • 20 篇 department of el...
  • 18 篇 school of comput...
  • 18 篇 frontiers scienc...
  • 18 篇 department of co...
  • 17 篇 distributed mult...
  • 17 篇 national enginee...
  • 17 篇 department of el...
  • 16 篇 smart network sy...

作者

  • 25 篇 mei-ling shyu
  • 24 篇 shu-ching chen
  • 24 篇 hai jin
  • 21 篇 chen shu-ching
  • 21 篇 abdelwahed motwa...
  • 21 篇 yang yang
  • 20 篇 dutta paramartha
  • 17 篇 wang xingjun
  • 16 篇 han zhu
  • 15 篇 shyu mei-ling
  • 15 篇 paramartha dutta
  • 13 篇 mohamed k.nour
  • 13 篇 tei-wei kuo
  • 13 篇 yunhao liu
  • 13 篇 bowers john e.
  • 13 篇 ai bo
  • 12 篇 kazuyuki kobayas...
  • 12 篇 hayashi eiji
  • 12 篇 liu qi
  • 12 篇 huo yuankai

语言

  • 5,406 篇 英文
  • 164 篇 其他
  • 111 篇 中文
  • 14 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=Computer Science and System Engineering Department"
5691 条 记 录,以下是341-350 订阅
排序:
Super-resolution GANs for upscaling unplanned urban settlements from remote sensing satellite imagery - the case of Chinese urban village detection
收藏 引用
International Journal of Digital Earth 2023年 第1期16卷 2623-2643页
作者: Alessandro Crivellari Hong Wei Chunzhu Wei Yuhui Shi Department of Computer Science and Engineering SouthernUniversity of Science and TechnologyShenzhenPeople’s Republic of China Ministry of Education Ecological Field Station for East Asian Migratory Birds Department of Earth System ScienceInstitute for Global Change StudiesTsinghua UniversityBeijingPeople’s Republic of China School of Geography and Planning Sun Yat-sen UniversityGuangzhouPeople’s Republic of China Southern Marine Science and Engineering Guangdong Laboratory(Zhuhai) ZhuhaiPeople’s Republic of China
The semantic segmentation of informal urban settlements represents an essential contribution towards renovation strategies and reconstruction *** this context,however,a big challenge remains unsolved when dealing with... 详细信息
来源: 评论
AsT: An Asymmetric-Sensitive Transformer for Osteonecrosis of the Femoral Head Detection  37
AsT: An Asymmetric-Sensitive Transformer for Osteonecrosis o...
收藏 引用
37th AAAI Conference on Artificial Intelligence, AAAI 2023
作者: Chen, Haoyang Liu, Shuai Lu, Feng Li, Wei Sheng, Bin Li, Mi Jin, Hai Zomaya, Albert Y. National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology China Centre for Distributed and High Performance Computing School of Computer Science The University of Sydney Australia Department of Computer Science and Engineering Shanghai Jiao Tong University China Tongji Hospital Tongji Medical College Huazhong University of Science and Technology China
Early diagnosis of osteonecrosis of the femoral head (ONFH) can inhibit the progression and improve femoral head preservation. The radiograph difference between early ONFH and healthy ones is not apparent to the naked... 详细信息
来源: 评论
Enhancing IT Risk Management in XYZ Vocational School: Leveraging COBIT 5 Framework with the APO12 Domain
Enhancing IT Risk Management in XYZ Vocational School: Lever...
收藏 引用
2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent systems, ICETSIS 2024
作者: Winanti Fernando, Erick Gate, Jullend Universitas Insan Pembangunan Department of Information Systems Indonesia Universitas Multimedia Nusantara Information System Faculty of Engineering and Informatics Tangerang Indonesia Bina Nusantara University Binus Online Learning Computer Science Department Jakarta Indonesia
This article explores the importance of IT risk management, especially at XYZ Vocational School. The agency is equipped to manage business risks, emphasizing the need to improve decision-making and risk mitigation by ... 详细信息
来源: 评论
AutoLoRaConfig: Automated Registration Procedure for LoRaWAN Devices
AutoLoRaConfig: Automated Registration Procedure for LoRaWAN...
收藏 引用
Conference on Local computer Networks (LCN)
作者: Vicente Torres-Sanz Julio A. Sanguesa Francisco J. Martinez Piedad Garrido Carlos T. Calafate Computer Science and System Engineering Department University of Zaragoza Department of Computer Engineering Universitat Politècnica de València Spain
LoRaWAN (Long Range Wide Area Network) is a communications protocol stack based on LoRa which provides long-range connectivity and low power consumption, making it a strong candidate for Internet of Things (IoT) devic... 详细信息
来源: 评论
Honeypot Comparison of Attack Detection and Mitigation of SSH Attack  3
Honeypot Comparison of Attack Detection and Mitigation of SS...
收藏 引用
3rd IEEE Delhi Section Flagship Conference, DELCON 2024
作者: Ali, Wasif Sajid, Ahthasham Ghodke, Tanvi Ajit Malik, Rida Malik, Neeru Kaushik, Keshav Riphah Institute of System Engineering Riphah International University Department of Cyber Security Islamabad Pakistan Pimpri Chinchwad University Department of Computer Science and Engineering Maharashtra India School of Engineering & Technology Pimpri Chinchwad University Maharashtra Pune India Amity School of Engineering and Technology Amity University Mohali India
This research study addresses the importance of honeypots at multiple levels, which includes but not limited to placement in network or group of networks working alongside in an organization. This paper talks about th... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Multi-party secure communication using blockchain over 5G
Multi-party secure communication using blockchain over 5G
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Archana, K. Kareem, Z.H. Al-Farhani, Liwa H. Bagyalakshmi, K. Jenvi, Ignatia K. Majella Kumar, Ashok Department of Computer Engineering Pimpri Chinchwad College of Engineering and Research Maharashtra Pune India Medical Instrumentation Techniques Engineering Department Al-Mustaqbal University College Babylon Iraq System Analysis Control and Information Processing dep Academy of Engineering RUDN University Moscow Russia Sri Ranganathar Institute of Engineering and Technology Coimbatore India Mathematics Department Saveetha School of Engineering SIMATS Saveetha Nagar Chennai India Department of Computer Science Banasthali Vidyapith Rajasthan Banasthali India
One of the most critical problems facing the blockchain technology industry right now is how to protect the privacy of users’ data on the blockchain in a way that is both effective and cheap. Based on the Pedersen co... 详细信息
来源: 评论
Design of syntactic adaptive interactive system based on human perception state estimation within scenario context
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第12期14卷 16933-16948页
作者: Jin, Dian Yu, Weiwei Srivastava, Gautam Yang, Xinliang School of Mechanical Engineering Northwestern Polytechnical University No. 127 West Youyi Road Shaanxi Xi’an710072 China Unmanned System Research Institute Northwestern Polytechnical University No. 127 West Youyi Road Shaanxi Xi’an710072 China Department of Math and Computer Science Brandon University Brandon Canada Department of Computer Science and Math Lebanese American University Beirut Lebanon
Adaptive interactive systems can be divided into two categories: Semantic adaptations affect the system’s function, and syntactic adaptations affect the presentation of information through the operator interface with... 详细信息
来源: 评论
Identifying Inaccurate Stories: Leveraging High Knowledge and Big Data  15
Identifying Inaccurate Stories: Leveraging High Knowledge an...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Khan, Mohammad Ahmar Verma, Pushpendra Kumar Ghaldiyal, Shivangi Balaji, N.V. Francis, G. Arun Patil, Swati Bula Department of Management Information System College of Commerce & Business Administration Dhofar University Country Sultanate of Oman Oman School of Computer Science and Applications IIMT University Meerut India Department of Computer Applications Invertis University Uttar Pradesh Bareilly India Department of Computer Science Karpagam Academy of Higher Education Tamil Nadu Coimbatore India Department of Electronics and Communication Engineering Karpagam College of Engineering Tamil Nadu Coimbatore India IT Vishwakarma Institute of Technology Pune India
Research on fake news has gained significant traction in a number of fields, We describe how the issue is tackled from a natural language processing standpoint in this research with the aim of developing identify fals... 详细信息
来源: 评论
DUCK: A Drone-Urban Cyber-Defense Framework Based on Pareto-Optimal Deontic Logic Agents  37
DUCK: A Drone-Urban Cyber-Defense Framework Based on Pareto-...
收藏 引用
37th AAAI Conference on Artificial Intelligence, AAAI 2023
作者: Deb, Tonmoay Dix, Jürgen Jeong, Mingi Molinaro, Cristian Pugliese, Andrea Li, Alberto Quattrini Santos, Eugene Subrahmanian, V.S. Yang, Shanchieh Zhang, Youzhi Department of Computer Science Northwestern University EvanstonIL United States Department of Computer Science Dartmouth College HanoverNH United States Department of Informatics Modeling Electronics and System Engineering University of Calabria Rende Italy Department of Informatics Technical University of Clausthal Clausthal Germany Department of Computer Engineering Rochester Institute of Technology RochesterNY United States CAIR Hong Kong Institute of Science and Innovation Hong Kong
Drone based terrorist attacks are increasing daily. It is not expected to be long before drones are used to carry out terror attacks in urban areas. We have developed the DUCK multiagent testbed that security agencies... 详细信息
来源: 评论