咨询与建议

限定检索结果

文献类型

  • 1,070 篇 会议
  • 685 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 1,768 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,043 篇 工学
    • 810 篇 计算机科学与技术...
    • 678 篇 软件工程
    • 204 篇 信息与通信工程
    • 157 篇 控制科学与工程
    • 92 篇 生物工程
    • 80 篇 机械工程
    • 75 篇 生物医学工程(可授...
    • 72 篇 电子科学与技术(可...
    • 66 篇 电气工程
    • 52 篇 光学工程
    • 52 篇 仪器科学与技术
    • 45 篇 建筑学
    • 44 篇 安全科学与工程
    • 40 篇 化学工程与技术
    • 37 篇 土木工程
    • 36 篇 网络空间安全
  • 516 篇 理学
    • 205 篇 数学
    • 177 篇 物理学
    • 110 篇 生物学
    • 78 篇 统计学(可授理学、...
    • 59 篇 系统科学
    • 45 篇 化学
  • 404 篇 管理学
    • 269 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 128 篇 工商管理
  • 113 篇 医学
    • 96 篇 临床医学
    • 64 篇 基础医学(可授医学...
    • 46 篇 公共卫生与预防医...
  • 59 篇 法学
    • 49 篇 社会学
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 34 篇 教育学
  • 30 篇 农学
  • 16 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 68 篇 deep learning
  • 50 篇 machine learning
  • 47 篇 computer science
  • 44 篇 information syst...
  • 40 篇 data mining
  • 36 篇 feature extracti...
  • 32 篇 multimedia syste...
  • 28 篇 information tech...
  • 25 篇 internet of thin...
  • 24 篇 neural networks
  • 24 篇 computational mo...
  • 24 篇 artificial intel...
  • 23 篇 security
  • 22 篇 application soft...
  • 22 篇 testing
  • 22 篇 accuracy
  • 21 篇 support vector m...
  • 20 篇 decision making
  • 20 篇 humans
  • 19 篇 authentication

机构

  • 38 篇 department of co...
  • 23 篇 distributed mult...
  • 22 篇 department of el...
  • 22 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 department of el...
  • 17 篇 distributed mult...
  • 17 篇 department of in...
  • 16 篇 department of co...
  • 12 篇 department of co...
  • 12 篇 department of in...
  • 12 篇 department of co...
  • 12 篇 faculty of commu...
  • 10 篇 department of ap...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 department of sy...
  • 8 篇 computer science...
  • 8 篇 applied science ...

作者

  • 25 篇 abdelwahed motwa...
  • 25 篇 shu-ching chen
  • 24 篇 mei-ling shyu
  • 20 篇 mesfer al duhayy...
  • 19 篇 chen shu-ching
  • 18 篇 shyu mei-ling
  • 18 篇 manar ahmed hamz...
  • 17 篇 ishfaq yaseen
  • 16 篇 mohamed k.nour
  • 13 篇 abu sarwar zaman...
  • 13 篇 pinandito aryo
  • 13 篇 abdullah rusli
  • 12 篇 saud s.alotaibi
  • 11 篇 shahaboddin sham...
  • 10 篇 radwa marzouk
  • 10 篇 shamshirband sha...
  • 10 篇 anwer mustafa hi...
  • 10 篇 hala j.alshahran...
  • 10 篇 ahmedy ismail
  • 10 篇 rusli abdullah

语言

  • 1,702 篇 英文
  • 59 篇 其他
  • 9 篇 中文
检索条件"机构=Department of Computer Graphics and Multimedia Faculty of Computer Science and Information System"
1768 条 记 录,以下是611-620 订阅
排序:
Detection of Email Spam using Natural Language Processing Based Random Forest Approach
Research Square
收藏 引用
Research Square 2021年
作者: Rayan, Alanazi Taloba, Ahmed I. Department of Computer Science College of Science & Arts Jouf University Saudi Arabia Information System Department Faculty of Computers and Information Assiut University Egypt
An unsolicited means of digital communications in the internet world is the spam email, which could be sent to an individual or a group of individuals or a company. These spam emails may cause serious threat to the us... 详细信息
来源: 评论
Analysis of Longitudinal Data with Missing Values in the Response and Covariates Using the Stochastic EM Algorithm
arXiv
收藏 引用
arXiv 2022年
作者: Gad, Ahmed M. Darwish, Nesma M. Business Administration Department Faculty of Business Administration Economics and Political Science The British University in Egypt Cairo Egypt Management and information system Department Higher Institute of computer and information technology El_Shrouk Academy Cairo Egypt
In longitudinal data a response variable is measured over time, or under different conditions, for a cohort of individuals. In many situations all intended measurements are not available which results in missing value... 详细信息
来源: 评论
Corrections to “A systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords”
收藏 引用
IEEE Access 2024年 12卷 115775-115775页
作者: Lip Yee Por Ian Ouii Ng Yen-Lin Chen Jing Yang Chin Soon Ku Department of Computer System and Technology Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia Department of Computer Science and Information Engineering National Taipei University of Technology Taipei Taiwan Department of Computer Science Universiti Tunku Abdul Rahman Kampar Malaysia
Presents corrections to the paper, A systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords.
来源: 评论
RFID authentication scheme based on hyperelliptic curve signcryption
TechRxiv
收藏 引用
TechRxiv 2021年
作者: Ali, Usman Idris, Mohd Yamani Idna Ayub, Mohamad Nizam Ullah, Insaf Ali, Ihsan Nandy, Tarak Yahuza, Muktar Khan, Nouman Department of Computer System & Technology Faculty of Computer Science & Information Technology University of Malaya Malaysia Department of Computer Science University of Swat Saidu Sharif Swat Pakistan Department of Information Technology Hazara University Mansehra Dhodial 21120 Pakistan
The implementation of efficient security mechanisms for Radio Frequency Identification (RFID) system has always been a continuous challenge due to its limited computing resources. Previously,hash-based, symmetric-key ... 详细信息
来源: 评论
Attention-effective multiple instance learning on weakly stem cell colony segmentation
arXiv
收藏 引用
arXiv 2022年
作者: Yudistira, Novanto Kavitha, Muthu Subash Rajan, Jeny Kurita, Takio Intelligent System Lab Faculty of Computer Science Brawijaya University Indonesia School of Information and Data Sciences Nagasaki University Nagasaki Japan Department of Computer Science and Engineering National Institute of Technology Karnataka Surathkal India Graduate School of Advanced Science and Engineering Hiroshima University Hiroshima Japan
The detection of induced pluripotent stem cell (iPSC) colonies often needs the precise extraction of the colony features. However, existing computerized systems relied on segmentation of contours by preprocessing for ... 详细信息
来源: 评论
Image-based Freeform Handwriting Authentication with Energy-oriented Self-Supervised Learning
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Jingyao Mou, Luntian Zheng, Changwen Gao, Wen The University of Chinese Academy of Sciences Beijing100049 China The National Key Laboratory of Space Integrated Information System Institute of Software Chinese Academy of Sciences Beijing100086 China Beijing Institute of Artiicial Intelligence Faculty of Information Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Multimedia and Intelligent Software Technology Beijing100124 China The School of Electronics Engineering and Computer Science Peking University Beijing100871 China
Freeform handwriting authentication verifies a person’s identity from their writing style and habits in messy handwriting data. This technique has gained widespread attention in recent years as a valuable tool for va... 详细信息
来源: 评论
Online Media as a Price Monitor: Text Analysis using Text Extraction Technique and Jaro-Winkler Similarity Algorithm
Online Media as a Price Monitor: Text Analysis using Text Ex...
收藏 引用
2020 International Conference on Emerging Technology in Computing, Communication and Electronics, ETCCE 2020
作者: Nurcahyawati, Vivine Mustaffa, Zuriani Faculty Technology and Informatics Universitas Dinamika Department of Information System Surabaya Indonesia Science Faculty Computing Universiti Malaysia Pahang Department of Computer Pahang Malaysia
Online media has become an essential part of everyday life in modern society. Everyone or organization is free to share their opinions and feelings about any topic on it, including information or news about commodity ... 详细信息
来源: 评论
Acceptance of Virtual Campus Tour Using the TAM Approach: a Case Study in UPN Veteran Jawa Timur, Indonesia
Acceptance of Virtual Campus Tour Using the TAM Approach: a ...
收藏 引用
information Technology International Seminar (ITIS)
作者: Tri Lathif Mardhi Suryanto Efri Kusuma Dian Ningtias Eristya Maya Safitri Nur Cahyo Wibowo Asif Faroqi Arista Pratama Department of Information System Faculty of Computer Science University of Pembangunan Nasional &#x201C Veteran&#x201D Jawa Timur Surabaya Indonesia
Various policies regarding the application of information and communication technology are one form of effort to realize efficient and effective information delivery, one of the institutions or agencies that implement... 详细信息
来源: 评论
Service Quality Analysis of M-Health Application Satisfaction And Continual Usage
Service Quality Analysis of M-Health Application Satisfactio...
收藏 引用
information Technology International Seminar (ITIS)
作者: Arista Pratama Doddy Ridwandono Tri Lathif Mardi Suryanto Eristya Maya Safitri Asmaul Khusna Department of Information System Faculty of Computer Science University of Pembangunan Nasional &#x201C Veteran&#x201D Jawa Timur Surabaya Indonesia
Smartphone technology in health is critical, especially in improving health services quality and quality. The use of smartphone technology in health services is called Mobile Health (M-Health). The application of M-he... 详细信息
来源: 评论
How is HCI taught, practiced, and supported in Malaysia?  22
How is HCI taught, practiced, and supported in Malaysia?
收藏 引用
Asian HCI Symposium'22
作者: Masitah Ghazali Ashok Sivaji Juliana Aida Abu Bakar Chui Yin Wong Noris Mohd Norowi School of Computing Universiti Teknologi Malaysia Malaysia MIMOS Technology Solutions Sdn Bhd Malaysia School of Creative Industry Management & Performing Arts Universiti Utara Malaysia Malaysia Intel Corporation Malaysia Multimedia Department Faculty of Computer Science and Information Technology Universiti Putra Malaysia Malaysia
This paper aims to describe how Human-computer Interaction (HCI) is taught at academic and also how UI-UX is practiced in industry in Malaysia by a group of panelists from HCI academic and also industry UX practitione...
来源: 评论