咨询与建议

限定检索结果

文献类型

  • 4,132 篇 会议
  • 2,674 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,932 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,351 篇 工学
    • 3,323 篇 计算机科学与技术...
    • 2,683 篇 软件工程
    • 855 篇 信息与通信工程
    • 677 篇 控制科学与工程
    • 467 篇 生物工程
    • 421 篇 电气工程
    • 313 篇 机械工程
    • 302 篇 生物医学工程(可授...
    • 280 篇 电子科学与技术(可...
    • 219 篇 光学工程
    • 166 篇 仪器科学与技术
    • 160 篇 动力工程及工程热...
    • 150 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 133 篇 建筑学
  • 1,972 篇 理学
    • 1,017 篇 数学
    • 530 篇 生物学
    • 496 篇 物理学
    • 315 篇 统计学(可授理学、...
    • 262 篇 系统科学
    • 155 篇 化学
  • 1,468 篇 管理学
    • 906 篇 管理科学与工程(可...
    • 666 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 352 篇 医学
    • 303 篇 临床医学
    • 252 篇 基础医学(可授医学...
    • 160 篇 公共卫生与预防医...
  • 246 篇 法学
    • 207 篇 社会学
  • 188 篇 经济学
    • 187 篇 应用经济学
  • 158 篇 教育学
    • 149 篇 教育学
  • 81 篇 农学
  • 26 篇 文学
  • 21 篇 艺术学
  • 18 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 190 篇 deep learning
  • 181 篇 machine learning
  • 140 篇 computational mo...
  • 125 篇 artificial intel...
  • 123 篇 information syst...
  • 105 篇 training
  • 104 篇 software enginee...
  • 99 篇 accuracy
  • 95 篇 cloud computing
  • 94 篇 internet of thin...
  • 94 篇 semantics
  • 91 篇 feature extracti...
  • 91 篇 software
  • 86 篇 data mining
  • 84 篇 information tech...
  • 83 篇 predictive model...
  • 79 篇 security
  • 77 篇 data models
  • 75 篇 educational inst...
  • 73 篇 optimization

机构

  • 163 篇 school of comput...
  • 51 篇 school of comput...
  • 42 篇 department of in...
  • 41 篇 state key labora...
  • 39 篇 school of comput...
  • 38 篇 information syst...
  • 38 篇 university of ch...
  • 37 篇 department of in...
  • 36 篇 school of inform...
  • 32 篇 department of co...
  • 30 篇 faculty of infor...
  • 28 篇 college of compu...
  • 27 篇 department of in...
  • 27 篇 school of comput...
  • 26 篇 school of softwa...
  • 26 篇 department of co...
  • 25 篇 college of intel...
  • 24 篇 faculty of infor...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 36 篇 buyya rajkumar
  • 28 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 25 篇 xiong zehui
  • 23 篇 john grundy
  • 23 篇 grundy john
  • 21 篇 el-sayed m.el-ke...
  • 21 篇 zidong wang
  • 20 篇 bailey james
  • 18 篇 abdelwahed motwa...
  • 18 篇 choo kim-kwang r...
  • 18 篇 lo david
  • 17 篇 r. takahashi
  • 17 篇 k. komori
  • 17 篇 t. kajita
  • 17 篇 t. sawada
  • 17 篇 c. kim
  • 17 篇 yue zhao

语言

  • 6,503 篇 英文
  • 377 篇 其他
  • 53 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 西班牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6932 条 记 录,以下是481-490 订阅
排序:
Development of a Statistical Analyzer to Identify Malicious Code in information systems
Development of a Statistical Analyzer to Identify Malicious ...
收藏 引用
International Russian Smart Industry Conference (SmartIndustryCon)
作者: Aung Kyaw Myo Evgeni M. Portnov Alexey R. Fedorov Institute of Systems and Software Engineering and Information Technology National Research University of Electronic Technology (MIET) Zelenograd Moscow Russia
Currently, the search for malicious code in information systems is relevant. The analysis showed that existing static analyzers detect vulnerabilities in the code, but not malicious code, as a result of which it was d... 详细信息
来源: 评论
Tactile Data Comics: A Step-by-step Multimodal Presentation Method on a Refreshable Tactile Display for Blind and Visually Impaired Individuals
Tactile Data Comics: A Step-by-step Multimodal Presentation ...
收藏 引用
2025 CHI Conference on Human Factors in computing systems, CHI EA 2025
作者: Sun, Ruoting Luo, Rong Yao, Xiwen She, Xinran Hara, Kotaro Jiao, Yang Tsinghua University Beijing China University of Science and Technology Beijing Beijing China South China University of Technology GuangZhou China School of Computing and Information Systems Singapore Management University Singapore Singapore
Refreshable tactile displays (RTDs) could present dynamic tactile graphics to support blind and low-vision individuals in learning. However, existing research offers limited evidence on the effectiveness of dynamic ta... 详细信息
来源: 评论
EEG and fMRI Artifact Detection Techniques: A Survey of Recent Developments
收藏 引用
SN Computer Science 2023年 第5期4卷 528页
作者: Mili, Rahma Bouaziz, Bassem Maalel, Ahmed Gargouri, Faiez Multimedia InfoRmation Systems and Advanced Computing Laboratory (MIRACL) Faculty of Economics and Management of Sfax University of Sfax Sfax 3021 Tunisia Multimedia InfoRmation Systems and Advanced Computing Laboratory (MIRACL) Higher Institute of Computer and Multimedia of Sfax Sfax 3021 Tunisia RIADI Laboratory National School of Computer Sciences University of Manouba Manouba 2010 Tunisia Higher Institute of Applied Sciences and Technology University of Sousse Sousse 4003 Tunisia
The evolution of different techniques for exploring cerebral activity and the development of signal processing and analysis methods have enabled a better understanding of the dynamic cerebral mechanisms in favor of fi... 详细信息
来源: 评论
Development of Load Balancing Method in a Microservice Architecture System
Development of Load Balancing Method in a Microservice Archi...
收藏 引用
International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM)
作者: Aung Kyaw Myo Evgeni M. Portnov Alexander S. Alekseev Institute of Systems and Software Engineering and Information Technology National Research University of Electronic Technology (MIET) Zelenograd Moscow Russia
This paper presents a novel load balancing method for microservice architectures, focusing on optimizing resource utilization and enhancing system performance. The proposed approach employs a dynamic load balancer tha... 详细信息
来源: 评论
Vibrating Particles System Algorithm for Solving Classification Problems
收藏 引用
Computer systems Science & Engineering 2022年 第12期43卷 1189-1206页
作者: Mohammad Wedyan Omar Elshaweesh Enas Ramadan Ryan Alturki Department of Autonomous Systems Faculty of Artificial IntelligenceAl-Balqa Applied UniversityAl-Salt19117Jordan Department of Software Engineering Information Technology CollegeAL-Hussein bin Talal UniversityMa’an71111Jordan Department of Computer Science Prince Abdullah Bin Ghazi Faculty of Communication and Information TechnologyAl-Balqa Applied UniversityAl-Salt19117Jordan Department of Information Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21961Saudi Arabia
Big data is a term that refers to a set of data that,due to its largeness or complexity,cannot be stored or processed with one of the usual tools or applications for data management,and it has become a prominent word... 详细信息
来源: 评论
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论
Designing of a Voice-Based Programming IDE for Source Code Generation: A Machine Learning Approach
Designing of a Voice-Based Programming IDE for Source Code G...
收藏 引用
2022 International Research Conference on Smart computing and systems Engineering, SCSE 2022
作者: Nizzad, A.R.M. Thelijjagoda, Samantha British College of Applied Studies School of Computing Sri Lanka Sri Lanka Institute of Information Technology Department of Information Systems Engineering Sri Lanka
Humans are precise in recognizing natural languages and responding contextually unlike machines. However, speech recognition or Automatic speech recognition often refers to converting human speech or voice to textual ... 详细信息
来源: 评论
A Scoring Model for Public Administration Process Prioritization in Germany  6
A Scoring Model for Public Administration Process Prioritiza...
收藏 引用
6. Fachtagung Rechts- und Verwaltungsinformatik, RVI 2023 - 6th Conference on Legal and Public Administrative Informatics, RVI 2023
作者: Pidun, Tim Müller, Dirk HTWD University of Applied Sciences Chair of Information Systems/Digital Administration Friedrich-List-Platz 1 Dresden01069 Germany HTWD University of Applied Sciences Chair of Software Technology/Operating Systems Friedrich-List-Platz 1 Dresden01069 Germany
The German public administration still struggles on becoming digital though considerable effort has been made by accompanying laws and institutions and a good will to digitalize all user-centered processes. But still ... 详细信息
来源: 评论
A New S-Box Design System for Data Encryption Using Artificial Bee Colony Algorithm
收藏 引用
Computers, Materials & Continua 2023年 第10期77卷 781-797页
作者: Yazeed Yasin Ghadi Mohammed SAlshehri Sultan Almakdi Oumaima Saidani Nazik Alturki Fawad Masood Muhammad Shahbaz Khan Department of Computer Science Al Ain UniversityAbu Dhabi112612United Arab Emirates Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Electrical Engineering Institute of Space TechnologyIslamabad4400Pakistan School of Computing Engineering and the Built EnvironmentEdinburgh Napier UniversityEdinburghEH105DTUK
Securing digital image data is a key concern in today’s information-driven *** encryption techniques are required to protect sensitive image data,with the Substitution-box(S-box)often playing a pivotal role in many s... 详细信息
来源: 评论
Bullyproof Sentinel: Fortifying Online Spaces Against Bullying using Machine Learning  7
Bullyproof Sentinel: Fortifying Online Spaces Against Bullyi...
收藏 引用
7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2023
作者: Dilshani, M.M.T. Vinoshan, T. Wijesinghe, W.A.S.D. Jathushan, V. Senarathne, Amila Gunasinghe, Amali Sri Lanka Institute of Information Technology Faculty of Computing Cyber Security Specialization Malabe Sri Lanka Sliit Cisco Academy Sri Lanka Institute of Information Technology Industry Engagement Unit Department of Computer Systems Engineering Manager Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka
In the current social media landscape, cyberbullying and online harassment remain pressing issues. Therefore, we planned a cyberbullying detection system for social media platforms. It can protect online communities f... 详细信息
来源: 评论