咨询与建议

限定检索结果

文献类型

  • 4,132 篇 会议
  • 2,674 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,932 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,351 篇 工学
    • 3,323 篇 计算机科学与技术...
    • 2,683 篇 软件工程
    • 855 篇 信息与通信工程
    • 677 篇 控制科学与工程
    • 467 篇 生物工程
    • 421 篇 电气工程
    • 313 篇 机械工程
    • 302 篇 生物医学工程(可授...
    • 280 篇 电子科学与技术(可...
    • 219 篇 光学工程
    • 166 篇 仪器科学与技术
    • 160 篇 动力工程及工程热...
    • 150 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 133 篇 建筑学
  • 1,972 篇 理学
    • 1,017 篇 数学
    • 530 篇 生物学
    • 496 篇 物理学
    • 315 篇 统计学(可授理学、...
    • 262 篇 系统科学
    • 155 篇 化学
  • 1,468 篇 管理学
    • 906 篇 管理科学与工程(可...
    • 666 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 352 篇 医学
    • 303 篇 临床医学
    • 252 篇 基础医学(可授医学...
    • 160 篇 公共卫生与预防医...
  • 246 篇 法学
    • 207 篇 社会学
  • 188 篇 经济学
    • 187 篇 应用经济学
  • 158 篇 教育学
    • 149 篇 教育学
  • 81 篇 农学
  • 26 篇 文学
  • 21 篇 艺术学
  • 18 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 190 篇 deep learning
  • 181 篇 machine learning
  • 140 篇 computational mo...
  • 125 篇 artificial intel...
  • 123 篇 information syst...
  • 105 篇 training
  • 104 篇 software enginee...
  • 99 篇 accuracy
  • 95 篇 cloud computing
  • 94 篇 internet of thin...
  • 94 篇 semantics
  • 91 篇 feature extracti...
  • 91 篇 software
  • 86 篇 data mining
  • 84 篇 information tech...
  • 83 篇 predictive model...
  • 79 篇 security
  • 77 篇 data models
  • 75 篇 educational inst...
  • 73 篇 optimization

机构

  • 163 篇 school of comput...
  • 51 篇 school of comput...
  • 42 篇 department of in...
  • 41 篇 state key labora...
  • 39 篇 school of comput...
  • 38 篇 information syst...
  • 38 篇 university of ch...
  • 37 篇 department of in...
  • 36 篇 school of inform...
  • 32 篇 department of co...
  • 30 篇 faculty of infor...
  • 28 篇 college of compu...
  • 27 篇 department of in...
  • 27 篇 school of comput...
  • 26 篇 school of softwa...
  • 26 篇 department of co...
  • 25 篇 college of intel...
  • 24 篇 faculty of infor...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 36 篇 buyya rajkumar
  • 28 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 25 篇 xiong zehui
  • 23 篇 john grundy
  • 23 篇 grundy john
  • 21 篇 el-sayed m.el-ke...
  • 21 篇 zidong wang
  • 20 篇 bailey james
  • 18 篇 abdelwahed motwa...
  • 18 篇 choo kim-kwang r...
  • 18 篇 lo david
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao

语言

  • 6,503 篇 英文
  • 377 篇 其他
  • 53 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 西班牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6932 条 记 录,以下是451-460 订阅
排序:
Improved YOLOv8 for Complex Environmental Fish Detection
Improved YOLOv8 for Complex Environmental Fish Detection
收藏 引用
IEEE Advanced information technology, Electronic and Automation Control Conference (IAEAC)
作者: Tonglin Cheng Juan Li Jintao Luo Zhihui Li Faculty of Information Technology Beijing University of Technology Beijing Engineering Research Center for loT Software and Systems
With the rapid development of computer vision and deep learning technologies, object detection plays a crucial role in various fields. Due to the complexity and diversity of underwater environments, underwater vision ...
来源: 评论
Content Moderation in Social Media: The Characteristics, Degree, and Efficiency of User Engagement  3
Content Moderation in Social Media: The Characteristics, Deg...
收藏 引用
3rd Asia Symposium on Signal Processing, ASSP 2022
作者: Wang, Kanlun Fu, Zhe Zhou, Lina Zhu, Yunqin The University of North Carolina at Charlotte Business Information Systems and Operations Management Charlotte United States The University of North Carolina at Charlotte Software and Information Systems Charlotte United States University of Science and Technology of China Information Science and Technology Hefei China
Social media emerge as common platforms for knowledge sharing/exchange in online communities. Meanwhile, they also become a hotbed for the diffusion of misinformation. Content moderation is one of the measures for pre... 详细信息
来源: 评论
COVID-19 Lung CT Image Segmentation: A Comparison of Various U-Net Variants  2nd
COVID-19 Lung CT Image Segmentation: A Comparison of Various...
收藏 引用
2nd International Conference on Intelligent Manufacturing and Robotics, ICIMR 2024
作者: Alebiosu, David Olayemi Folayan, Adeola Chen, Wei Tolulope, Abejide Ajibade, Samuel-Soma M. School of Engineering and Technology Department of Computing and Information Systems Sunway University Petaling Jaya Malaysia School of Medical and Health Science Monash University Petaling Jaya Malaysia School of Intelligent Manufacturing Ecosystem Xi’an Jiaotong-Liverpool University Suzhou Taicang215400 China College of Science and Engineering University of Derby Derby United Kingdom Department of Computing and Information Systems Sunway University Petaling Jaya Malaysia Department of Computer Engineering Istanbul Ticaret Universitesi Istanbul Turkey
Lung segmentation has become a bedrock in the effective diagnosis, and classification of coronavirus (COVID-19) from radiological images such as computed tomography (CT) and X-ray images. Since the coronavirus (COVID-... 详细信息
来源: 评论
Allocation and Migration of Virtual Machines Using Machine Learning
收藏 引用
Computers, Materials & Continua 2022年 第2期70卷 3349-3364页
作者: Suruchi Talwani Khaled Alhazmi Jimmy Singla Hasan JAlyamani Ali Kashif Bashir School of Computer Science&Engg. Lovely Professional UniversityPunjabIndia National Center for Robotics and Internet of Things Technology Communication and Information Technology Research InstituteKing Abdulaziz City for Science and Technology(KACST)Riyadh11442Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology in RabighKing Abdulaziz UniversityRabigh21911Saudi Arabia Department of Computing and Mathematics ManchesterMetropolitan UniversityManchesterM156BHUK
Cloud computing promises the advent of a new era of service boosted by means of virtualization *** process of virtualization means creation of virtual infrastructure,devices,servers and computing resources needed to d... 详细信息
来源: 评论
A Novel Parallel computing Confidentiality Scheme Based on Hindmarsh-Rose Model
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 1325-1341页
作者: Jawad Ahmad Mimonah Al Qathrady Mohammed SAlshehri Yazeed Yasin Ghadi Mujeeb Ur Rehman Syed Aziz Shah School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghEH105DTUK Department of Information Systems College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Computer Science Al Ain UniversityAbu Dhabi112612United Arab Emirates School of Science Technology and HealthYork St John UniversityYorkYO317EXUK Research Centre for Intelligent Healthcare Coventry UniversityCoventryCV15FBUK
Due to the inherent insecure nature of the Internet,it is crucial to ensure the secure transmission of image data over this ***,given the limitations of computers,it becomes evenmore important to employ efficient and ... 详细信息
来源: 评论
Mitigating Smishing: Challenges and Future Work
arXiv
收藏 引用
arXiv 2024年
作者: Faklaris, Cori Department of Software and Information Systems College of Computing and Informatics University of North Carolina at Charlotte CharlotteNC United States
U.S. Federal Trade Commission data for 2020-2022 shows that 23% of all fraud reports include Text as the contact method, with reported losses in the same period rising 279%, to $326 million. These numbers, and estimat... 详细信息
来源: 评论
Analysis of Machine Learning (ML) and Internet of Things (IoT): A Scientometric Review  20
Analysis of Machine Learning (ML) and Internet of Things (Io...
收藏 引用
20th IEEE International Colloquium on Signal Processing and Its Applications, CSPA 2024
作者: Ajibade, Samuel-Soma M. Jasser, Muhammed Basheer Legaspino, Rosie Fe B. Gimeno, Anabella R. Ypanto, Leomar A. Baird, Jeem Clyde C. Adediran, Anthonia Oluwatosin Sunway University School Of Engineering And Technology Department Of Computing And Information Systems Selangor Malaysia Cebu Technological University Cebu Moalboal Philippines Federal University Of Uberlandia Faculty Of Architecture And Urban Design Uberlândia Brazil
The objective of this paper is to critically examine the publication's trends and research landscape on the Internet of Things and Machine Learning (Io T-ML) research through bibliometric analysis (BA). The Elsevi... 详细信息
来源: 评论
LightEnsemble-Guard: An Optimized Ensemble Learning Framework for Securing Resource-Constrained IoT systems
收藏 引用
IEEE Access 2025年 13卷 101764-101781页
作者: Tanveer, Muhammad Usama Munir, Kashif Amjad, Madiha Alyamani, Hasan J. Bermak, Amine Rehman, Atiq Ur Khwaja Fareed University of Engineering and Information Technology Institute of Information Technology Rahim Yar Khan 64200 Pakistan King Abdulaziz University Faculty of Computing and Information Technology in Rabigh Department of Information Systems Jeddah 21589 Saudi Arabia Hamad Bin Khalifa University Division of Information and Computing Technology College of Science and Engineering Doha Qatar
The rapid proliferation of real-time Internet of Things (IoT) devices has increased the need for efficient and accurate security mechanisms. Real-time IoT devices are highly vulnerable to cyberattacks due to their con... 详细信息
来源: 评论
A New RISC-V CPU for Safety-Critical systems  12
A New RISC-V CPU for Safety-Critical Systems
收藏 引用
12th Mediterranean Conference on Embedded computing, MECO 2023
作者: Mach, Jan Kohutka, Lukas Cicak, Pavel Institute of Computer Engineering and Applied Informatics Slovak University of Technology Bratislava842 16 Slovakia Institute of Informatics Information Systems and Software Engineering Slovak University of Technology Bratislava842 16 Slovakia
In this paper, we propose a novel hardening technique against Single Event Effects, which enables high-frequency operation and does not cause large power consumption and area overhead. The protection is based on redun... 详细信息
来源: 评论
Digital Twin-Driven Intrusion Detection for IoT and Cyber-Physical System
Digital Twin-Driven Intrusion Detection for IoT and Cyber-Ph...
收藏 引用
2024 International Conference on Intelligent Algorithms for Computational Intelligence systems, IACIS 2024
作者: Ramamoorthy, Saravanan Kandaneri Sindhu, L. Valarmathi, K. Gobinath, C. Umaeswari, P. College of Non-Medicine University: Texila American University Guyana Sona College of Technology Department of Information Technology Salem India S. A. Engineering College Department of Information Technology Chennai India Reva University School of Computing and Information Technology Bengaluru India R.M.K. Engineering College Department of Computer Science and Business Systems Kavaraipettai India
From smart homes to industrial automation, the efficiency and connectivity of many applications have been greatly improved by the fast expansion of the Internet of Things (IoT) and Cyber-Physical systems (CPS). Sophis... 详细信息
来源: 评论