咨询与建议

限定检索结果

文献类型

  • 3,313 篇 会议
  • 2,003 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 5,341 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,279 篇 工学
    • 2,150 篇 计算机科学与技术...
    • 1,736 篇 软件工程
    • 766 篇 信息与通信工程
    • 561 篇 控制科学与工程
    • 398 篇 电子科学与技术(可...
    • 393 篇 电气工程
    • 328 篇 生物工程
    • 292 篇 机械工程
    • 218 篇 仪器科学与技术
    • 210 篇 生物医学工程(可授...
    • 188 篇 光学工程
    • 171 篇 动力工程及工程热...
    • 153 篇 化学工程与技术
    • 105 篇 材料科学与工程(可...
    • 105 篇 交通运输工程
    • 100 篇 土木工程
    • 99 篇 网络空间安全
  • 1,688 篇 理学
    • 840 篇 数学
    • 481 篇 物理学
    • 358 篇 生物学
    • 289 篇 统计学(可授理学、...
    • 220 篇 系统科学
    • 146 篇 化学
  • 927 篇 管理学
    • 575 篇 管理科学与工程(可...
    • 397 篇 图书情报与档案管...
    • 246 篇 工商管理
  • 210 篇 医学
    • 185 篇 临床医学
    • 132 篇 基础医学(可授医学...
  • 145 篇 法学
    • 121 篇 社会学
  • 101 篇 经济学
    • 100 篇 应用经济学
  • 60 篇 教育学
  • 58 篇 农学
  • 21 篇 文学
  • 14 篇 军事学
  • 12 篇 艺术学

主题

  • 127 篇 deep learning
  • 112 篇 feature extracti...
  • 108 篇 computer science
  • 100 篇 data mining
  • 99 篇 accuracy
  • 84 篇 computational mo...
  • 84 篇 machine learning
  • 81 篇 training
  • 69 篇 neural networks
  • 69 篇 optimization
  • 69 篇 semantics
  • 62 篇 internet of thin...
  • 62 篇 protocols
  • 61 篇 information syst...
  • 58 篇 artificial intel...
  • 54 篇 support vector m...
  • 53 篇 security
  • 48 篇 predictive model...
  • 48 篇 testing
  • 47 篇 wireless sensor ...

机构

  • 59 篇 college of infor...
  • 47 篇 national enginee...
  • 46 篇 hubei province k...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 36 篇 school of inform...
  • 29 篇 department of el...
  • 28 篇 school of comput...
  • 27 篇 department of co...
  • 26 篇 college of compu...
  • 26 篇 department of co...
  • 24 篇 department of co...
  • 24 篇 national compute...
  • 23 篇 college of compu...
  • 23 篇 department of el...
  • 22 篇 guangdong provin...
  • 21 篇 department of sy...
  • 21 篇 distributed mult...
  • 20 篇 key laboratory f...
  • 20 篇 school of comput...

作者

  • 31 篇 yang yang
  • 31 篇 mei-ling shyu
  • 31 篇 shu-ching chen
  • 28 篇 shen linlin
  • 28 篇 ren jiadong
  • 27 篇 zongli lin
  • 24 篇 chen shu-ching
  • 24 篇 robbi rahim
  • 24 篇 shyu mei-ling
  • 23 篇 abdelwahed motwa...
  • 15 篇 hu shengshan
  • 15 篇 zhang leo yu
  • 15 篇 ai bo
  • 15 篇 mohamed i.eldeso...
  • 14 篇 mohamed k.nour
  • 14 篇 han zhu
  • 14 篇 dong jun
  • 14 篇 ishfaq yaseen
  • 14 篇 huang guoyan
  • 14 篇 manar ahmed hamz...

语言

  • 4,776 篇 英文
  • 447 篇 其他
  • 114 篇 中文
  • 6 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Computer and Information System Engineering"
5341 条 记 录,以下是171-180 订阅
排序:
Integrated operating room planning and scheduling: an ILP-Based off-line approach for emergency responsiveness at a local hospital in Naples
收藏 引用
Soft Computing 2024年 第20期28卷 11987-12003页
作者: Boccia, Maurizio Mancuso, Andrea Masone, Adriano Sterle, Claudio Department of Electrical Engineering and Information Technology University of Naples "Federico II" Via Claudio 21 Naples80125 Italy Institute for System Analysis and Computer Science "Antonio Ruberti" National Research Council of Italy via dei Taurini 19 Rome00185 Italy
This paper addresses a real-world Integrated Operating Room Planning and Scheduling (IORPS) problem encountered by a local hospital in Naples, characterized by stringent emergency management constraints, requiring tre... 详细信息
来源: 评论
High-performance self-powered ultraviolet to near-infrared photodetector based on WS_(2)/InSe van der Waals heterostructure
收藏 引用
Nano Research 2023年 第5期16卷 7851-7857页
作者: Jinping Chen Zhen Zhang Yi Ma Jiying Feng Xiaoyu Xie Xiaoxuan Wang Aoqun Jian Yuanzheng Li Zhuxin Li Heng Guo Yizhi Zhu Qiannan Cui Zengliang Shi Chunxiang Xu State Key Laboratory of Bioelectronics School of Biological Science and Medical EngineeringSoutheast UniversityNanjing 210096China Micro Nano System Research Center Key Laboratory of Advanced Transducers and Intelligent Control System of the Ministry of Education&College of Information Engineering and ComputerTaiyuan University of TechnologyTaiyuan 030024China Key Laboratory of UV-Emitting Materials and Technology of Ministry of Education Northeast Normal UniversityChangchun 130024China
van der Waals heterostructures(vdWHs)based on two-dimensional(2D)materials without the crystal lattice matching constraint have great potential for high-performance optoelectronic ***,a WS_(2)/InSe vdWH photodiode is ... 详细信息
来源: 评论
Traffic sign recognition based on deformable convolutions  8
Traffic sign recognition based on deformable convolutions
收藏 引用
8th International Conference on Intelligent Informatics and Biomedical Sciences, ICIIBMS 2023
作者: Li, Wenju Yu, Jie Liye, Sha Liu, Cui Shanghai Institute of Technology School of Computer Science and Information Engineering Shanghai China Shanghai Precision Dosing & Weighing System Co Shanghai China
A traffic sign recognition model based on deformable convolution is proposed to address the low accuracy of existing traffic sign recognition algorithms for small and occluded targets. Firstly, replace some convolutio... 详细信息
来源: 评论
Cross-modal change detection flood extraction based on self-supervised contrastive pre-training
Cross-modal change detection flood extraction based on self-...
收藏 引用
2024 ISPRS Technical Commission I Mid-term Symposium on Intelligent Sensing and Remote Sensing Application
作者: Feng, Wenqing Guan, Fangli Sun, Chenhao Xu, Wei School of Computer Science Hangzhou Dianzi University Hangzhou China Electrical & Information Engineering School Changsha University of Science & Technology Changsha China Information System and Management College National University of Defense Technology Changsha China
Flood extraction is a critical issue in remote sensing analysis. Accurate flood extraction faces challenges such as complex scenes, image differences across modalities, and a shortage of labeled samples. Traditional s... 详细信息
来源: 评论
Covertvasion: Depicting threats through covert channels based novel evasive attacks in android
收藏 引用
International Journal of Intelligent Networks 2023年 第1期4卷 337-348页
作者: Gautam, Sunil Pattani, Ketaki Zuhair, Mohd Rashid, Mamoon Ahmad, Nazir Department of Computer Science and Engineering Institute of Technology Nirma University Ahmedabad Gujarat India Department of Computer Sciences and Engineering Institute of Advanced Research Gujarat Gandhinagar India School of Information Communication and Technology Bahrain Polytechnic Isa Town Bahrain Department of Information System College of Applied Sciences King Khalid University P.O. Box 61913 Muhayel63317 Saudi Arabia
Privacy and security issues concerning mobile devices have substantial consequences for individuals, groups, governments, and businesses. The Android operating system bolsters smartphone data protection by imposing re... 详细信息
来源: 评论
Enhancing IT Risk Management in XYZ Vocational School: Leveraging COBIT 5 Framework with the APO12 Domain
Enhancing IT Risk Management in XYZ Vocational School: Lever...
收藏 引用
2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent systems, ICETSIS 2024
作者: Winanti Fernando, Erick Gate, Jullend Universitas Insan Pembangunan Department of Information Systems Indonesia Universitas Multimedia Nusantara Information System Faculty of Engineering and Informatics Tangerang Indonesia Bina Nusantara University Binus Online Learning Computer Science Department Jakarta Indonesia
This article explores the importance of IT risk management, especially at XYZ Vocational School. The agency is equipped to manage business risks, emphasizing the need to improve decision-making and risk mitigation by ... 详细信息
来源: 评论
A novel myocarditis detection combining deep reinforcement learning and an improved differential evolution algorithm
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第6期9卷 1347-1360页
作者: Jing Yang Touseef Sadiq Jiale Xiong Muhammad Awais Uzair Aslam Bhatti Roohallah Alizadehsani Juan Manuel Gorriz Department of Computer System and Technology Faculty of Computer Science and Information TechnologyUniversiti MalayaKuala LumpurMalaysia Centre for Artificial Intelligence Research(CAIR) Department of Information and Communication TechnologyUniversity of AgderGrimstadNorway Department of Creative Technologies Air UniversityIslamabadPakistan School of Information and Communication Engineering Hainan UniversityHaikouHainanChina Institute for Intelligent Systems Research and Innovation(IISRI) Deakin UniversityWaurn PondsVictoriaAustralia Data Science and Computational Intelligence Institute University of GranadaGranadaSpain
Myocarditis is a serious cardiovascular ailment that can lead to severe consequences if not promptly *** is triggered by viral infections and presents symptoms such as chest pain and heart *** detection is crucial for... 详细信息
来源: 评论
A Review on Binary Code Analysis Datasets  18th
A Review on Binary Code Analysis Datasets
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing systems and Applications, WASA 2024
作者: Huang, Zhijian Song, Shuguang Liu, Han Kuang, Hongyu Zhang, Jingjing Hu, Pengfei National Key Laboratory of Science and Technology on Information System Security Systems Engineering Institute Academy of Military Sciences Beijing China School of Computer Science and Technology Shandong University Qingdao China
Binary code analysis serves as the foundation for research in vulnerability discovery, software protection, and malicious code analysis. However, analyzing binary files is challenging due to the lack of high-level sem... 详细信息
来源: 评论
A lightweight point cloud analysis network based on graph walking  8
A lightweight point cloud analysis network based on graph wa...
收藏 引用
8th International Conference on Intelligent Informatics and Biomedical Sciences, ICIIBMS 2023
作者: Li, Wenju Ji, Qianqian Sha, Liye Cui, Liu Shanghai Institute of Technology School of Computer Science and Information Engineering Shanghai China Shanghai Precision Dosing & Weighing System Co Shanghai China
Based on the irregularity and permutation invariance of point clouds, graph neural networks have been widely used in 3D point cloud analysis tasks in recent years. However, these works suffer from insufficient feature... 详细信息
来源: 评论
A Review of Fintech Management and Security Development  10
A Review of Fintech Management and Security Development
收藏 引用
10th IEEE information Technology International Seminar, ITIS 2024
作者: Ritonga, Ali Akbar Zuhri Harahap, Syaiful Sooai, Adri Gabriel Nugroho, Aryo Samsir Prasetyo Adi, Puput Dani Universitas Labuhanbatu Faculty of Science and Technology Department of Informatics Management North Sumatera Labuhanbatu Indonesia Universitas Labuhanbatu Faculty of Science and Technology Department of Information System North Sumatera Labuhanbatu Indonesia Universitas Katolik Widya Mandira Faculty of Computer Science Department of Computer Engineering NTT Kupang Indonesia Universitas Narotama Faculty of Computer Science Department of Information System Surabaya Indonesia Universitas Labuhanbatu Faculty of Computer Science Department of Informatics Engineering North Sumatera Labuhanbatu Indonesia Department of Telecommunication Bandung Indonesia
This research focuses on the review of Fintech and its development on the IoT Platform and also the risks that can be posed to the IoT network used. Finance is the most essential side of several other sectors which in... 详细信息
来源: 评论