咨询与建议

限定检索结果

文献类型

  • 144 篇 会议
  • 49 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 195 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 112 篇 工学
    • 86 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 30 篇 信息与通信工程
    • 15 篇 生物工程
    • 14 篇 电气工程
    • 13 篇 控制科学与工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物医学工程(可授...
    • 7 篇 光学工程
    • 7 篇 仪器科学与技术
    • 6 篇 动力工程及工程热...
    • 6 篇 网络空间安全
    • 5 篇 环境科学与工程(可...
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
  • 65 篇 理学
    • 32 篇 数学
    • 18 篇 生物学
    • 12 篇 物理学
    • 8 篇 系统科学
    • 6 篇 统计学(可授理学、...
    • 4 篇 化学
  • 36 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 11 篇 法学
    • 11 篇 社会学
  • 10 篇 医学
    • 9 篇 基础医学(可授医学...
    • 9 篇 临床医学
    • 5 篇 药学(可授医学、理...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 5 篇 教育学
    • 5 篇 教育学

主题

  • 11 篇 computer science
  • 11 篇 cryptography
  • 8 篇 artificial intel...
  • 7 篇 proposals
  • 6 篇 fuzzy sets
  • 6 篇 data privacy
  • 6 篇 data mining
  • 6 篇 public key
  • 5 篇 public key crypt...
  • 5 篇 peer to peer com...
  • 5 篇 electronic mail
  • 5 篇 information tech...
  • 5 篇 educational inst...
  • 5 篇 computer securit...
  • 5 篇 internet
  • 5 篇 databases
  • 5 篇 security
  • 5 篇 protocols
  • 4 篇 statistics
  • 4 篇 ontologies

机构

  • 11 篇 department of co...
  • 9 篇 department of ma...
  • 6 篇 department of co...
  • 6 篇 department of co...
  • 4 篇 department of el...
  • 4 篇 school of advanc...
  • 4 篇 department of in...
  • 3 篇 engineering math...
  • 3 篇 department of co...
  • 3 篇 college of compu...
  • 3 篇 faculty of elect...
  • 3 篇 school of comput...
  • 3 篇 universitat rovi...
  • 3 篇 college of compu...
  • 3 篇 department of ma...
  • 3 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 math/cs departme...
  • 2 篇 department of ma...
  • 2 篇 school of comput...

作者

  • 12 篇 j. domingo-ferre...
  • 11 篇 domingo-ferrer j...
  • 9 篇 bo qin
  • 7 篇 qianhong wu
  • 7 篇 lei zhang
  • 7 篇 a. martinez-ball...
  • 6 篇 zhou tao
  • 6 篇 josep domingo-fe...
  • 6 篇 f. sebe
  • 5 篇 tao zhou
  • 4 篇 aloisio alessand...
  • 4 篇 haijun li
  • 4 篇 huiling lu
  • 4 篇 lu huiling
  • 4 篇 selvakumar v.
  • 4 篇 li haijun
  • 3 篇 sarigiannidis pa...
  • 3 篇 lagkas thomas
  • 3 篇 zhang yanchun
  • 3 篇 hoshang kolivand

语言

  • 192 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"机构=Department of Computer Engineering and Maths"
195 条 记 录,以下是1-10 订阅
排序:
Fuzz-classification(p,l)-Angel:An enhanced hybrid artificial intelligence based fuzzy logic for multiple sensitive attributes against privacy breaches
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1131-1140页
作者: Tehsin Kanwal Hasina Attaullah Adeel Anjum Abid Khan Gwanggil Jeon Department of Computer Science COMSATS University IslamabadPakistan Department of Information Technology Quaid-e-Azam University IslamabadPakistan College of Science and Engineering School of Computing and MathsUniversity of DerbyDE221GBUK Department of Embedded Systems Engineering Incheon National UniversitySouth Korea
The inability of traditional privacy-preserving models to protect multiple datasets based on sensitive attributes has prompted researchers to propose models such as SLOMS,SLAMSA,(p,k)-Angelization,and(p,l)-Angelizatio... 详细信息
来源: 评论
AITA: A new framework for Trading Forward Testing with an Artificial Intelligence Engine
AITA: A new framework for Trading Forward Testing with an Ar...
收藏 引用
2023 Italia Intelligenza Artificiale - Thematic Workshops, Ital-IA 2023
作者: Letteri, Ivan University of L'Aquila Department of Information Engineering Computer Science and Maths via Vetoio snc AQ Coppito67100 Italy
In general, traders test their trading strategies by applying them to historical market data (backtesting), and then reapply those that have made the most profit on that past data. In this article, we propose AITA (Ar... 详细信息
来源: 评论
Performance Analysis of Data Processing in Distributed File Systems with Near Data Processing
Performance Analysis of Data Processing in Distributed File ...
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Hou, Shiyue Tallent, Nathan R. Wang, Li Mi, Ningfang Northeastern University Department of Electrical and Computer Engineering MA United States Pacific Northwest National Laboratory Advanced Computations and Maths Division RichlandWA United States
In the era of big data, the escalating volume and velocity of data generation pose significant challenges in data processing. Traditional systems like Spark [1] and Hadoop [2] manage the increasing amount and velocity... 详细信息
来源: 评论
Online Banking Security: An Experimental Study of Transaction Authorization Usability
Online Banking Security: An Experimental Study of Transactio...
收藏 引用
2023 International Conference on New Frontiers in Communication, Automation, Management and Security, ICCAMS 2023
作者: Prasad, J Siva Ram Kumar, K. Parish Venkata Reddy, S Srihari Chaitanya, Pagadala Ravi Kumar, E.S.R. Reddy, G Venkata Ramana V. R. Siddhartha Engineering College Department of Maths Vijayawada India Brindavan Institute of Technology & Science Department of Computer Science and Engineering Kurnool India St.Martin's Engineering College Dhulapally Department of Computer Science and Engineering Secunderabad India Koneru Lakshmaiah Education Foundation Department of Computer Science and Engineering Vaddeswaram India
The security measures used for online banking have undergone significant transformations throughout the comparatively short duration of its existence. The first implementations of authenticating and identity managemen... 详细信息
来源: 评论
Classification of EEG Signals on SEED Dataset Using Improved CNN  2
Classification of EEG Signals on SEED Dataset Using Improved...
收藏 引用
2nd International Conference on Edge Computing and Applications, ICECAA 2023
作者: Ramar, B. Ramalakshmi, R. Gandhi, Vaibhav Pandiselvam, P. Kalasalingam Academy of Research and Education Department of Computer Applications Tamilnadu Krishnankoil India Kalasalingam Academy of Research and Education Department of Computer Science and Engineering Tamilnadu Krishnankoil India Middlesex University Department of Design Engineering and Maths Education London United Kingdom
The proposed research introduces an Improved Convolutional Neural Network (ICNN) to construct EEG-based emotion detection models. This study has utilized an EEG dataset of 15 subjects available from a BCMI laboratory.... 详细信息
来源: 评论
Stress Prediction of Working Employees in Different Environments using Machine Learning Techniques  6
Stress Prediction of Working Employees in Different Environm...
收藏 引用
6th International Conference on Mobile Computing and Sustainable Informatics, ICMCSI 2025
作者: Shanmugapriya, P. Balasubramanie, P. Dhivyaa, C.R. Senthil Raja, D. Dhivya, P. Department of CSE Kongu Engineering College Tamilnadu Erode India School of Computer Science & Engineering VIT Tamilnadu Vellore India Dept of Maths K S Rangasamy College of Technology Tamilnadu Tiruchengode India Department of CT-PG Kongu Engineering College Tamilnadu Erode India
Mental stress is a growing concern, especially among employees across sectors, affecting both well-being and job performance. Stressors like excessive workload, tight deadlines, and high employer expectations often le... 详细信息
来源: 评论
Point-based Gesture Recognition Techniques  15
Point-based Gesture Recognition Techniques
收藏 引用
15th International Conference on Developments in eSystems engineering, DeSE 2023
作者: Sharma, Varun Kolivand, Hoshang Asadianfam, Shiva Al-Jumeily, Dhiya Jayabalan, Manoj Liverpool John Moores University Department Computer Science Liverpool United Kingdom School of Computer Science and Maths Liverpool John Moores University Liverpool United Kingdom Qom University of Technology Faculty of Electrical and Computer Engineering Qom Iran Islamic Azad University Qom Branch Department of Computer Engineering Qom Iran
Gesture recognition is a computing process that attempts to recognize and interpret human gestures through the use of mathematical algorithms. In this paper, we describe Point Based Gesture Recognition and Point Cloud... 详细信息
来源: 评论
Gesture Recognition Techniques  15
Gesture Recognition Techniques
收藏 引用
15th International Conference on Developments in eSystems engineering, DeSE 2023
作者: Sharma, Varun Kolivand, Hoshang Asadianfam, Shiva Al-Jumeily, Dhiya Jayabalan, Manoj Liverpool John Moores University Department Computer Science Liverpool United Kingdom School of Computer Science and Maths Liverpool John Moores University Liverpool United Kingdom Qom University of Technology Faculty of Electrical and Computer Engineering Qom Iran Islamic Azad University Qom Department of Computer Engineering Branch Qom Iran
Gesture recognition is a topic in computer science and language technology with the goal of interpreting human gestures via mathematical algorithms. It is a subdiscipline of computer vision. In this paper, we describe... 详细信息
来源: 评论
Exploiting Intrinsic Multi-Agent Heterogeneity for Spatial Interference Reduction in an Idealised Foraging Task
Exploiting Intrinsic Multi-Agent Heterogeneity for Spatial I...
收藏 引用
2022 Conference on Artificial Life, ALIFE 2022
作者: Bennett, Chris Lawry, Jonathan Bullock, Seth Department of Engineering Maths University of Bristol Bristol United Kingdom Department of Computer Science University of Bristol Bristol United Kingdom
Typically, collective behaviour research has tended to focus on behaviour arising in populations of homogeneous agents. However, humans, animals, robots and software agents typically exhibit various forms of heterogen... 详细信息
来源: 评论
Scalable Edge Blocking Algorithms for Defending Active Directory Style Attack Graphs  37
Scalable Edge Blocking Algorithms for Defending Active Direc...
收藏 引用
37th AAAI Conference on Artificial Intelligence, AAAI 2023
作者: Guo, Mingyu Ward, Max Neumann, Aneta Neumann, Frank Nguyen, Hung School of Computer and Mathematical Sciences University of Adelaide Australia School of Physics Maths and Computing Computer Science and Software Engineering University of Western Australia Australia Department of Molecular and Cellular Biology Harvard University CambridgeMA United States
Active Directory (AD) is the default security management system for Windows domain networks. An AD environment naturally describes an attack graph where nodes represent computers/accounts/security groups, and edges re... 详细信息
来源: 评论