咨询与建议

限定检索结果

文献类型

  • 3,306 篇 会议
  • 2,000 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 5,325 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,292 篇 工学
    • 2,285 篇 计算机科学与技术...
    • 1,844 篇 软件工程
    • 716 篇 信息与通信工程
    • 525 篇 控制科学与工程
    • 345 篇 电子科学与技术(可...
    • 328 篇 电气工程
    • 321 篇 生物工程
    • 291 篇 机械工程
    • 208 篇 仪器科学与技术
    • 207 篇 生物医学工程(可授...
    • 195 篇 光学工程
    • 163 篇 化学工程与技术
    • 130 篇 动力工程及工程热...
    • 122 篇 交通运输工程
    • 104 篇 安全科学与工程
    • 99 篇 材料科学与工程(可...
    • 93 篇 网络空间安全
  • 1,767 篇 理学
    • 913 篇 数学
    • 494 篇 物理学
    • 355 篇 生物学
    • 296 篇 统计学(可授理学、...
    • 213 篇 系统科学
    • 170 篇 化学
  • 938 篇 管理学
    • 573 篇 管理科学与工程(可...
    • 405 篇 图书情报与档案管...
    • 230 篇 工商管理
  • 221 篇 医学
    • 185 篇 临床医学
    • 146 篇 基础医学(可授医学...
  • 148 篇 法学
    • 121 篇 社会学
  • 101 篇 经济学
    • 100 篇 应用经济学
  • 64 篇 农学
  • 61 篇 教育学
  • 21 篇 文学
  • 16 篇 艺术学
  • 15 篇 军事学

主题

  • 130 篇 feature extracti...
  • 129 篇 deep learning
  • 102 篇 accuracy
  • 88 篇 computer science
  • 87 篇 training
  • 86 篇 computational mo...
  • 86 篇 semantics
  • 78 篇 machine learning
  • 76 篇 optimization
  • 73 篇 data mining
  • 60 篇 predictive model...
  • 55 篇 internet of thin...
  • 52 篇 support vector m...
  • 51 篇 information syst...
  • 51 篇 neural networks
  • 50 篇 security
  • 50 篇 data models
  • 48 篇 artificial intel...
  • 48 篇 testing
  • 47 篇 genetic algorith...

机构

  • 182 篇 hubei province k...
  • 128 篇 school of comput...
  • 109 篇 college of compu...
  • 98 篇 department of co...
  • 58 篇 college of infor...
  • 54 篇 hubei province k...
  • 54 篇 school of softwa...
  • 45 篇 tsinghua nationa...
  • 45 篇 national key lab...
  • 42 篇 school of comput...
  • 41 篇 the key laborato...
  • 41 篇 national enginee...
  • 37 篇 department of co...
  • 36 篇 school of inform...
  • 31 篇 college of infor...
  • 30 篇 shandong provinc...
  • 27 篇 university of ch...
  • 25 篇 key laboratory f...
  • 21 篇 college of compu...
  • 20 篇 key laboratory f...

作者

  • 27 篇 ren jiadong
  • 23 篇 shen linlin
  • 22 篇 liu jun
  • 21 篇 abdelwahed motwa...
  • 21 篇 zhang xiaolong
  • 21 篇 gaol ford lumban
  • 20 篇 li peng
  • 19 篇 dan feng
  • 19 篇 ishfaq yaseen
  • 19 篇 mesfer al duhayy...
  • 18 篇 mohamed k.nour
  • 18 篇 xiaolong zhang
  • 18 篇 jin hai
  • 17 篇 manar ahmed hamz...
  • 17 篇 zhang kai
  • 16 篇 matsuo tokuro
  • 16 篇 hai jin
  • 15 篇 liu zhe
  • 15 篇 wei hu
  • 15 篇 wang wei

语言

  • 5,059 篇 英文
  • 141 篇 其他
  • 124 篇 中文
  • 6 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=Computer System and Information Technology"
5325 条 记 录,以下是191-200 订阅
排序:
Fine-Grained Software Vulnerability Detection via Neural Architecture Search  28th
Fine-Grained Software Vulnerability Detection via Neural Ar...
收藏 引用
28th International Conference on Database systems for Advanced Applications, DASFAA 2023
作者: Du, Qianjin Kuang, Xiaohui Li, Xiang Zhao, Gang The Department of Computer Science and Technology Tsinghua University Beijing100084 China National Key Laboratory of Science and Technology on Information System Security Beijing100084 China
Vulnerability detection methods based on the deep learning have achieved remarkable performance improvements compared to traditional methods. Current deep learning-based detectors mostly use a single RNN or its varian... 详细信息
来源: 评论
Sentiment Analysis of Public Opinion on Twitter about the Implementation of the Merdeka Curriculum Using the Support Vector Machine Algorithm
Sentiment Analysis of Public Opinion on Twitter about the Im...
收藏 引用
2023 International Conference on Modeling and E-information Research, Artificial Learning and Digital Applications, ICMERALDA 2023
作者: Ramadhanti, Intan Widodo Nugraheni, Murien Universitas Negeri Jakarta Informatics and Computer Engineering Education Jakarta Indonesia Universitas Negeri Jakarta Information System and Technology Jakarta Indonesia
In 2022 the Head of Standards, Curriculum, Education Assessment (BSKAP) No. 0441HIKR/2022 issued a Decree (SK) regarding Education Units for the Implementation of the Merdeka Curriculum in 140 thousand educational uni... 详细信息
来源: 评论
Optimizing Structural Modification Operation for B+-Tree on Byte-Addressable Devices  42
Optimizing Structural Modification Operation for B+-Tree on ...
收藏 引用
42nd IEEE International Conference on computer Design, ICCD 2024
作者: Hong, Dingze Hu, Jinlei Chen, Jianxi Feng, Dan Liu, Jian School of Computer Science and Technology Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System of MoE China The Fifth Electronics Research Institute of Miit China
Persistent Memory (PM) offers both byte-address ability and non-volatility, making it well-suited for accelerating B+-Tree indexes. However, existing persistent B+-Tree indexes face significant performance challenges ... 详细信息
来源: 评论
Moodle-based Learning Management system Design as a Learning Media at SMKN 40 Jakarta  7
Moodle-based Learning Management System Design as a Learning...
收藏 引用
7th International Conference on New Media Studies, CONMEDIA 2023
作者: Setya, Oktaviano Nanda Prima Widodo Nugraheni, Murien State Jakarta University Informatics and Computer Engineering Education Jakarta Indonesia State Jakarta University Information System and Technology Jakarta Indonesia
Indonesia is currently in the final stages of the COVID-19 pandemic, which has changed the world of the online learning. Online learning has many benefits, one of which students can learn anywhere and anytime. SMK Neg... 详细信息
来源: 评论
Chiang Rai Phra That Nine Choms Attraction Promoting Mobile Application for Cultural Tourism  20
Chiang Rai Phra That Nine Choms Attraction Promoting Mobile ...
收藏 引用
20th International Conference on Electrical Engineering/Electronics, computer, Telecommunications and information technology, ECTI-CON 2023
作者: Chaidee, Kamonlak Boontasri, Kanchana Chaidee, Ekkachai Wongchai, Wiwat Phamon, Suphakorn Preedee, Suruswadee Rajamangala University of Technology Lanna Chiangrai Faculty of Business Administration and Liberal Arts Department of Computer Information System Chiang Rai Thailand
This study aimed to create a mobile application to promote and guide the cultural tourism attraction Phra That Nine Choms in Chiang Rai Province, Thailand. The critical information about Phra That Nine Choms is gather... 详细信息
来源: 评论
MAML MOT: Multiple Object Tracking Based on Meta-Learning
MAML MOT: Multiple Object Tracking Based on Meta-Learning
收藏 引用
2024 IEEE International Conference on systems, Man, and Cybernetics, SMC 2024
作者: Chen, Jiayi Deng, Chunhua School of Computer Science and Technology Wuhan University of Science and Technology Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan430065 China
With the advancement of video analysis technology, the multi-object tracking (MOT) problem in complex scenes involving pedestrians is gaining increasing importance. This challenge primarily involves two key tasks: ped... 详细信息
来源: 评论
A Mathematical Model for COVID-19 Image Enhancement based on Mittag-Leffler-Chebyshev Shift
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 1307-1316页
作者: Ibtisam Aldawish Hamid A.Jalab Department of Mathematics and Statistics College of ScienceImam Mohammad Ibn Saud Islamic UniversityRiyadh11432Saudi Arabia Department of Computer System&Technology Faculty of Computer Scienceand Information TechnologyUniversiti Malaya50603Kuala LumpurMalaysia
The lungs CT scan is used to visualize the spread of the disease across the lungs to obtain better knowledge of the state of the COVID-19 *** diagnosing of COVID-19 disease is a complex challenge that medical system f... 详细信息
来源: 评论
Clustering Mechanism in Particle Swarm Optimization Algorithm for Data Aggregation  13
Clustering Mechanism in Particle Swarm Optimization Algorith...
收藏 引用
13th IEEE Symposium on computer Applications and Industrial Electronics, ISCAIE 2023
作者: Sharmin, Sharmin Ahmedy, Ismail Noor, Rafidah Md Ismail, Habibah Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Univesrsiti Teknologi MARA Computer Science Unit Centre of Foundation Studies Selangor Dengkil43800 Malaysia
Wireless Sensor Networks (WSNs) consist of numerous sensor nodes with distinct resources working together to achieve a common objective efficiently. A critical issue is extending the network lifetime of WSNs, especial... 详细信息
来源: 评论
Anomaly Detection in Microservice systems Using Autoencoders  4
Anomaly Detection in Microservice Systems Using Autoencoders
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: de Silva, Manul Daniel, Sam Kumarapeli, Manith Mahadura, Sashika Rupasinghe, Lakmal Liyanapathirana, Chethana Computer System Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
The adaptation of microservice architecture has increased massively during the last few years with the emergence of the cloud. Containers have become a common choice for microservices architecture instead of VMs (Virt... 详细信息
来源: 评论
Relationship Quality Analysis Using technology in the Business Sector  11
Relationship Quality Analysis Using Technology in the Busine...
收藏 引用
11th International Conference on Cyber and IT Service Management, CITSM 2023
作者: Aini, Qurotul Sediyono, Eko Hartomo, Kristoko Dwi Manongga, Danny Rahardja, Untung Sembiring, Irwan Santoso, Nesti Anggraini Satya Wacana Christian University Computer Science and Technology Central Java Indonesia Satya Wacana Christian University Information System Central Java Indonesia University of Technology Malaysia Computer Science and Technology Malaysia University of Raharja Computer Science and Technology Tangerang Indonesia
In the current era of Industry 5.0, the use of technology in the business sector, namely Digital Marketing, is put to good use by business actors. With social media as a medium of communication, business actors must e... 详细信息
来源: 评论