咨询与建议

限定检索结果

文献类型

  • 3,368 篇 会议
  • 2,007 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 5,395 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,320 篇 工学
    • 2,302 篇 计算机科学与技术...
    • 1,853 篇 软件工程
    • 720 篇 信息与通信工程
    • 528 篇 控制科学与工程
    • 342 篇 电子科学与技术(可...
    • 329 篇 电气工程
    • 320 篇 生物工程
    • 292 篇 机械工程
    • 210 篇 仪器科学与技术
    • 205 篇 生物医学工程(可授...
    • 198 篇 光学工程
    • 163 篇 化学工程与技术
    • 130 篇 动力工程及工程热...
    • 123 篇 交通运输工程
    • 103 篇 安全科学与工程
    • 99 篇 材料科学与工程(可...
    • 94 篇 建筑学
  • 1,766 篇 理学
    • 906 篇 数学
    • 503 篇 物理学
    • 355 篇 生物学
    • 291 篇 统计学(可授理学、...
    • 213 篇 系统科学
    • 170 篇 化学
  • 935 篇 管理学
    • 567 篇 管理科学与工程(可...
    • 407 篇 图书情报与档案管...
    • 232 篇 工商管理
  • 221 篇 医学
    • 186 篇 临床医学
    • 146 篇 基础医学(可授医学...
  • 148 篇 法学
    • 121 篇 社会学
  • 102 篇 经济学
    • 101 篇 应用经济学
  • 65 篇 教育学
  • 63 篇 农学
  • 21 篇 文学
  • 16 篇 艺术学
  • 15 篇 军事学

主题

  • 145 篇 feature extracti...
  • 134 篇 deep learning
  • 121 篇 accuracy
  • 99 篇 computational mo...
  • 91 篇 semantics
  • 90 篇 training
  • 88 篇 computer science
  • 81 篇 optimization
  • 79 篇 data mining
  • 78 篇 machine learning
  • 63 篇 predictive model...
  • 57 篇 internet of thin...
  • 54 篇 data models
  • 53 篇 support vector m...
  • 52 篇 neural networks
  • 52 篇 security
  • 51 篇 information syst...
  • 50 篇 artificial intel...
  • 50 篇 testing
  • 49 篇 visualization

机构

  • 183 篇 hubei province k...
  • 138 篇 school of comput...
  • 107 篇 college of compu...
  • 100 篇 department of co...
  • 59 篇 hubei province k...
  • 58 篇 college of infor...
  • 56 篇 shandong provinc...
  • 55 篇 school of softwa...
  • 48 篇 national enginee...
  • 47 篇 national key lab...
  • 44 篇 tsinghua nationa...
  • 44 篇 school of comput...
  • 43 篇 key laboratory o...
  • 41 篇 the key laborato...
  • 37 篇 department of co...
  • 36 篇 school of inform...
  • 31 篇 university of ch...
  • 31 篇 college of infor...
  • 26 篇 key laboratory f...
  • 25 篇 college of compu...

作者

  • 29 篇 ren jiadong
  • 27 篇 shen linlin
  • 21 篇 abdelwahed motwa...
  • 21 篇 zhang xiaolong
  • 21 篇 gaol ford lumban
  • 19 篇 li peng
  • 19 篇 liu jun
  • 19 篇 ishfaq yaseen
  • 19 篇 mesfer al duhayy...
  • 19 篇 jin hai
  • 18 篇 mohamed k.nour
  • 18 篇 xiaolong zhang
  • 18 篇 dan feng
  • 17 篇 matsuo tokuro
  • 17 篇 manar ahmed hamz...
  • 16 篇 xu xin
  • 16 篇 wang wei
  • 16 篇 hai jin
  • 15 篇 liu zhe
  • 15 篇 wei hu

语言

  • 4,790 篇 英文
  • 481 篇 其他
  • 129 篇 中文
  • 6 篇 日文
  • 4 篇 斯洛文尼亚文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
检索条件"机构=Computer System and Information Technology"
5395 条 记 录,以下是921-930 订阅
排序:
Development of User Management in Ihya Digital Ecosystem Using Iterative Incremental Method  4
Development of User Management in Ihya Digital Ecosystem Usi...
收藏 引用
4th International Conference Advancement in Data Science, E-Learning and information systems, ICADEIS 2022
作者: Priandhika Izzulhaq, Afif Fauzi, Rahmat Suakanto, Sinung Kadir Hassan Disina, Abdul Mahdin, Hairulnizam Anka Salihu, Ibrahim Information System Telkom University Bandung Indonesia Nigeria Army University Biu Borno State Department of Cyber Security Nigeria Universiti Tun Hussein Onn Malaysia Faculty of Computer Science and Information Technology Johor Malaysia Nile University of Nigeria Abuja Nigeria
information systems have an essential role in the development of technology and information in Indonesia. information systems are employed and utilized in many facets of society and organizations. Digitizing and utili... 详细信息
来源: 评论
Petri net-based illegal information flow detection method for node-chain access control model  23
Petri net-based illegal information flow detection method fo...
收藏 引用
Proceedings of the 2023 International Conference on Communication Network and Machine Learning
作者: Binyong Li Jie Fang Xianhui Deng Yuhan Sheng School of Cybersecurity (Xin Gu Industrial College) Chengdu University of Information Technology China and Advanced Cryptography and System Security Key Laboratory of Sichuan Province China Sichuan Institute of Computer Sciences China School of Cybersecurity Chengdu University of Information Technology China
To address the problem of illegal information flow in the node chain access control model constructed by the existing attribute-based access control (ABAC) model when applied to a large-scale node chain scenario with ...
来源: 评论
User Interface Design’s Impact on Customer Satisfaction and Loyalty in SaaS E-Commerce
User Interface Design’s Impact on Customer Satisfaction and...
收藏 引用
Creative Communication and Innovative technology (ICCIT), IEEE
作者: Eka Purnama Harahap Pandu Hermawan Dhiyah Ayu Rini Kusumawardhani Nina Rahayu Maulana Arif Komara Harry Agustian Master of Technology Information University of Raharja Tangerang Indonesia Dept. of Information System Bina Bangsa University Serang Indonesia Dept. of Information System Pandawan Sejahtera Indonesia Tangerang Indonesia Dept. of Computer Systems University of Raharja Tangerang Indonesia Dept. of Digital Bussiness CAI Sejahtera Indonesia Tangerang Indonesia Dept. of Computer Systems Sesindo Tangerang Indonesia
This study aims to analyze the impact of user interface (UI) design on customer satisfaction and loyalty in SaaS e-commerce applications, using a quantitative approach to measure the perceptions of SaaS e-commerce app... 详细信息
来源: 评论
Enhancing Network Intrusion Detection Using Effective Stacking of Ensemble Classifiers With Multi-Pronged Feature Selection Technique  2
Enhancing Network Intrusion Detection Using Effective Stacki...
收藏 引用
2nd International Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering, ETECTE 2023
作者: Rahman, Saifur Mursal, Salim Nasar Faraj Latif, Muhammad Armghan Mushtaq, Zohaib Irfan, Muhammad Waqar, Ali Najran University College of Engineering Department of Electrical Engineering Najran Saudi Arabia Cleveland State University Department of Computer and Information System United States University of Sargodha College of Engineering and Technology Department of Electrical Engineering Sargodha Pakistan North China electric power University Beijing China
information security depends on Network Intrusion Detection (NID), which properly identifies network threats. This work explores simulating a NID system by stacking ensemble classifiers with various feature selection ... 详细信息
来源: 评论
Modified Aquila Optimizer Feature Selection Approach and Support Vector Machine Classifier for Intrusion Detection system
收藏 引用
Multimedia Tools and Applications 2024年 第21期83卷 59887-59913页
作者: Abualigah, Laith Ahmed, Saba Hussein Almomani, Mohammad H. Zitar, Raed Abu Alsoud, Anas Ratib Abuhaija, Belal Hanandeh, Essam Said Jia, Heming Elminaam, Diaa Salama Abd Elaziz, Mohamed Abd Computer Science Department Al Al-Bayt University Mafraq25113 Jordan Department of Electrical and Computer Engineering Lebanese American University Byblos13-5053 Lebanon Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman19328 Jordan MEU Research Unit Middle East University Amman11831 Jordan Applied Science Research Center Applied Science Private University Amman11931 Jordan School of Computer Sciences Universiti Sains Malaysia Pulau Pinang11800 Malaysia School of Engineering and Technology Sunway University Malaysia Petaling Jaya27500 Malaysia Department of Mathematics Facility of Science The Hashemite University P.O box 330127 Zarqa13133 Jordan Sorbonne Center of Artificial Intelligence Sorbonne University-Abu Dhabi Abu Dhabi United Arab Emirates Department of Computer Science Wenzhou-Kean University Wenzhou China Department of Computer Information System Zarqa University P.O. Box 13132 Zarqa Jordan School of Information Engineering Sanming University Sanming365004 China Information Systems Department Faculty of Computers and Artificial Intelligence Benha University Benha12311 Egypt Computer Science Department Faculty of Computer Science Misr International University Cairo12585 Egypt Faculty of Computer Science & Engineering Galala University Suze435611 Egypt Ajman University Ajman346 United Arab Emirates Department of Mathematics Faculty of Science Zagazig University Zagazig44519 Egypt
With the ever-expanding ubiquity of the Internet, wireless networks have permeated every facet of modern life, escalating concerns surrounding network security for users. Consequently, the demand for a robust Intrusio... 详细信息
来源: 评论
A Hierarchical Traffic Sign Image Recognition Algorithm Keeping the Local Topology
A Hierarchical Traffic Sign Image Recognition Algorithm Keep...
收藏 引用
Advanced Algorithms and Control Engineering (ICAACE), International Conference on
作者: Longhui Liu Wenhui Gong Wenjie Wang Zhiqiang Zeng Wei Li Xiamen Global Navigation Satellite System Development & Application Co. Ltd. Xiamen China School of Computer and Information Engineering Xiamen University of Technology Xiamen China
Traffic sign recognition is crucial in enabling intelligent driving. This paper proposes a robust hierarchical traffic sign image recognition algorithm that maintains local topology. The algorithm is divided into two ... 详细信息
来源: 评论
Robust Phishing URL Classification Using FastText Character Embeddings and Hybrid Deep Learning  3
Robust Phishing URL Classification Using FastText Character ...
收藏 引用
3rd IEEE International Conference on Robotics, Automation, Artificial-Intelligence and Internet-of-Things, RAAICON 2024
作者: Al-Sakib, Abdullah Limon, Zishad Hossain Sakib, Anamul Pranto, Md Nuruzzaman Islam, Md Ariful Sultana, Shayma Ahmed, Md. Redwan Rahman, Shafiur Westcliff University Dept. of Information Technology CA92614 United States Westcliff University Dept. of Computer Science CA92614 United States International American University Dept. of Business Administration CA90010 United States International American University Dept. of Management Information System CA90010 United States East West University Dept. of Computer Science and Engineering Dhaka1212 Bangladesh Daffodil International University Dept. of Software Engineering Dhaka1216 Bangladesh
Phishing attacks are a major cybersecurity threat that resulted in over 1.2 million incidents in the first half of 2020. These attacks caused substantial financial losses and posed risks to individuals and organizatio... 详细信息
来源: 评论
Improved Attentive Recurrent Network for Applied Linguistics-Based Offensive Speech Detection
收藏 引用
computer systems Science & Engineering 2023年 第11期47卷 1691-1707页
作者: Manar Ahmed Hamza Hala J.Alshahrani Khaled Tarmissi Ayman Yafoz Amira Sayed A.Aziz Mohammad Mahzari Abu Sarwar Zamani Ishfaq Yaseen Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Applied Linguistics College of LanguagesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversityMakkahSaudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Digital Media Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt Department of English College of Science&HumanitiesPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia
Applied linguistics is one of the fields in the linguistics domain and deals with the practical applications of the language studies such as speech processing,language teaching,translation and speech *** ever-growing ... 详细信息
来源: 评论
A Comparative Analysis of Joomla, Drupal, Wordpress and ***: Exploring Features, Performance, and Suitability
A Comparative Analysis of Joomla, Drupal, Wordpress and ***:...
收藏 引用
computer Science and Data Engineering (CSDE), IEEE Asia-Pacific Conference on
作者: Ashwin Ashika Prasad Neeraj Anand Sharma Anal Kumar Department of Computer Science and Mathematics School of Science and Technology The University of Fiji Department of Computing Sciences and Information System College of Engineering Science and Technology Fiji National University
In the dynamic landscape of web development, the judicious choice of platform and structure plays a pivotal role. This comprehensive study conducts a thorough comparison of four prominent web development technologies:...
来源: 评论
A Comparison Study of FC-RDVM and RIWM Router Placement Methods for WMNs: Performance Evaluation Results by WMN-PSOHC Simulation system Considering Chi-Square Distribution and Different Instances  1
收藏 引用
37th International Conference on Advanced information Networking and Applications, AINA 2023
作者: Sakamoto, Shinji Barolli, Admir Liu, Yi Kulla, Elis Barolli, Leonard Takizawa, Makoto Department of Information and Computer Science Kanazawa Institute of Technology 7-1 Ohgigaoka Ishikawa Nonoichi921-8501 Japan Department of Information Technology Aleksander Moisiu University of Durres L.1 Rruga e Currilave Durres Albania Department of Computer Science National Institute of Technology Oita College 1666 Maki Oita870-0152 Japan Department of System Management Fukuoka Institute of Technology 3-30-1 Wajiro-Higashi Higashi-Ku Fukuoka811-0295 Japan Department of Information and Communication Engineering Fukuoka Institute of Technology 3-30-1 Wajiro-Higashi Higashi-Ku Fukuoka811-0295 Japan Department of Advanced Sciences Faculty of Science and Engineering Hosei University Tokyo Kajino-Machi Koganei-Shi184-8584 Japan
In this work, we deal with the node placement problem in Wireless Mesh Networks (WMNs). We present a hybrid intelligent simulation system called WMN-PSOHC, which combines Particle Swarm Optimization (PSO) and Hill Cli... 详细信息
来源: 评论