咨询与建议

限定检索结果

文献类型

  • 1,070 篇 会议
  • 685 篇 期刊文献
  • 13 册 图书

馆藏范围

  • 1,768 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,043 篇 工学
    • 810 篇 计算机科学与技术...
    • 678 篇 软件工程
    • 204 篇 信息与通信工程
    • 157 篇 控制科学与工程
    • 92 篇 生物工程
    • 80 篇 机械工程
    • 75 篇 生物医学工程(可授...
    • 72 篇 电子科学与技术(可...
    • 66 篇 电气工程
    • 52 篇 光学工程
    • 52 篇 仪器科学与技术
    • 45 篇 建筑学
    • 44 篇 安全科学与工程
    • 40 篇 化学工程与技术
    • 37 篇 土木工程
    • 36 篇 网络空间安全
  • 516 篇 理学
    • 205 篇 数学
    • 177 篇 物理学
    • 110 篇 生物学
    • 78 篇 统计学(可授理学、...
    • 59 篇 系统科学
    • 45 篇 化学
  • 404 篇 管理学
    • 269 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 128 篇 工商管理
  • 113 篇 医学
    • 96 篇 临床医学
    • 64 篇 基础医学(可授医学...
    • 46 篇 公共卫生与预防医...
  • 59 篇 法学
    • 49 篇 社会学
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 34 篇 教育学
  • 30 篇 农学
  • 16 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 68 篇 deep learning
  • 50 篇 machine learning
  • 47 篇 computer science
  • 44 篇 information syst...
  • 40 篇 data mining
  • 36 篇 feature extracti...
  • 32 篇 multimedia syste...
  • 28 篇 information tech...
  • 25 篇 internet of thin...
  • 24 篇 neural networks
  • 24 篇 computational mo...
  • 24 篇 artificial intel...
  • 23 篇 security
  • 22 篇 application soft...
  • 22 篇 testing
  • 22 篇 accuracy
  • 21 篇 support vector m...
  • 20 篇 decision making
  • 20 篇 humans
  • 19 篇 authentication

机构

  • 38 篇 department of co...
  • 23 篇 distributed mult...
  • 22 篇 department of el...
  • 22 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 department of el...
  • 17 篇 distributed mult...
  • 17 篇 department of in...
  • 16 篇 department of co...
  • 12 篇 department of co...
  • 12 篇 department of in...
  • 12 篇 department of co...
  • 12 篇 faculty of commu...
  • 10 篇 department of ap...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 department of sy...
  • 8 篇 computer science...
  • 8 篇 applied science ...

作者

  • 25 篇 abdelwahed motwa...
  • 25 篇 shu-ching chen
  • 24 篇 mei-ling shyu
  • 20 篇 mesfer al duhayy...
  • 19 篇 chen shu-ching
  • 18 篇 shyu mei-ling
  • 18 篇 manar ahmed hamz...
  • 17 篇 ishfaq yaseen
  • 16 篇 mohamed k.nour
  • 13 篇 abu sarwar zaman...
  • 13 篇 pinandito aryo
  • 13 篇 abdullah rusli
  • 12 篇 saud s.alotaibi
  • 11 篇 shahaboddin sham...
  • 10 篇 radwa marzouk
  • 10 篇 shamshirband sha...
  • 10 篇 anwer mustafa hi...
  • 10 篇 hala j.alshahran...
  • 10 篇 ahmedy ismail
  • 10 篇 rusli abdullah

语言

  • 1,702 篇 英文
  • 59 篇 其他
  • 9 篇 中文
检索条件"机构=Department of Computer Graphics and Multimedia Faculty of Computer Science and Information System"
1768 条 记 录,以下是61-70 订阅
排序:
User Interface Rendering Time in Android Applications: Revealing the Effects of Design Patterns  23
User Interface Rendering Time in Android Applications: Revea...
收藏 引用
8th International Conference on Sustainable information Engineering and Technology, SIET 2023
作者: Paramadani, Rizky Bagus Akbar, Muhammad Aminul Pinandito, Aryo Informatics Engineering Departement Faculty of Computer Science Universitas Brawijaya Malang Indonesia Information System Department Universitas Brawijaya Faculty of Computer Science Indonesia
The Google Play platform boasts a total of 2,597,819 applications. A pivotal gauge of an application's success rests on its practical utility in daily life, coupled with its demonstrated strong performance metrics... 详细信息
来源: 评论
Static Analysis Techniques for Fixing Software Defects in MPI-Based Parallel Programs
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 3139-3173页
作者: Norah Abdullah Al-Johany Sanaa Abdullah Sharaf Fathy Elbouraey Eassa Reem Abdulaziz Alnanih Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Software Engineering and Distributed System Research Group King Abdulaziz UniversityJeddah21589Saudi Arabia
The Message Passing Interface (MPI) is a widely accepted standard for parallel computing on distributed ***, MPI implementations can contain defects that impact the reliability and performance of parallelapplications.... 详细信息
来源: 评论
Enhancing IT Risk Management in XYZ Vocational School: Leveraging COBIT 5 Framework with the APO12 Domain
Enhancing IT Risk Management in XYZ Vocational School: Lever...
收藏 引用
2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent systems, ICETSIS 2024
作者: Winanti Fernando, Erick Gate, Jullend Universitas Insan Pembangunan Department of Information Systems Indonesia Universitas Multimedia Nusantara Information System Faculty of Engineering and Informatics Tangerang Indonesia Bina Nusantara University Binus Online Learning Computer Science Department Jakarta Indonesia
This article explores the importance of IT risk management, especially at XYZ Vocational School. The agency is equipped to manage business risks, emphasizing the need to improve decision-making and risk mitigation by ... 详细信息
来源: 评论
Performance Analysis of RouteSegmentation Algorithm in Identifying Perimeter Area Around Travel Route  16
Performance Analysis of RouteSegmentation Algorithm in Ident...
收藏 引用
16th International Conference on information Technology and Electrical Engineering, ICITEE 2024
作者: Bachmid, Muhammad Avied Anshari Haq, Muhammad Yasir Mumtaz, Muhammad Rafly Pinandito, Aryo Universitas Brawijaya Faculty of Computer Science Media Game and Mobile Laboratory Department of Informatics Engineering Malang Indonesia Universitas Brawijaya Faculty of Computer Science Malang Indonesia Universitas Brawijaya Faculty of Computer Science Media Game and Mobile Laboratory Department of Information System Malang Indonesia
Prior study has developed the RouteSegmentation algorithm to identify the perimeter area surrounding a route. In this study, a comparative experiment was carried out to investigate the performance of the RouteSegmenta... 详细信息
来源: 评论
IoT-Based Monitoring of Chili Plant Growth  6
IoT-Based Monitoring of Chili Plant Growth
收藏 引用
6th International Conference on Cybernetics and Intelligent system, ICORIS 2024
作者: Mustaffa, Mas Rina Rizal, Norul Safinaz Norul Department of Multimedia Faculty of Computer Science and Information Technology Universiti Putra Malaysia UPM Serdang Selangor Darul Ehsan 43400 Malaysia
The Internet of Things (IoT) has the potential to revolutionize agriculture by enabling precise monitoring and control of environmental conditions. However, in certain areas, the application of IoT in agriculture is s... 详细信息
来源: 评论
Exploring Deep Insights from Vast Data: An Overview of Deep Learning Techniques for Big Data  4
Exploring Deep Insights from Vast Data: An Overview of Deep ...
收藏 引用
4th International Conference on Electrical Engineering and computer science, ICECOS 2024
作者: Baez Hasan, Sarhad Kareem, Shahab Wahhab Ameen, Didar Dlshad Hamad Soran University Faculty of Science Computer Science Department Soran Iraq Erbil Polytechnic University College of Engineering Knowledge University Department of Information System Engineering Department of Computer Engineering Erbil Iraq
Big data has emerged very fast, and this has brought both opportunities and problems that are related to the application of deep learning. This paper explores how deep learning can be implemented using big data and in... 详细信息
来源: 评论
Battery Monitoring system on IoT-Based Smart Micro Grid  4
Battery Monitoring System on IoT-Based Smart Micro Grid
收藏 引用
4th International Conference on Electronic and Electrical Engineering and Intelligent system, ICE3IS 2024
作者: Iksan, Nur Widodo, Djoko Adi Djuniadi, Djuniadi Putri, Riana Defi Mahadji Suryanto, Agus Udayanti, Erika Devi Universitas Negeri Semarang Faculty of Engineering Department of Electrical Engineering Indonesia Universitas Dian Nuswantoro Faculty of Computer Science Department of Information System Indonesia
The use of batteries as an energy storage medium has a very important role in the installation of renewable energy power plants, such as photovoltaics to overcome intermittency in photovoltaics and to maintain stable ... 详细信息
来源: 评论
Maintaining Image Size by Developing the Cropping Rectangle Method on CT-Scan Images  12
Maintaining Image Size by Developing the Cropping Rectangle ...
收藏 引用
12th IEEE International Conference on Communication, Networks and Satellite, COMNETSAT 2023
作者: Guslendra Yuhandri Defit, Sarjon Universitas Putra Indonesia Yptk Computer Science Faculty Department of Information System Padang Indonesia Universitas Putra Indonesia Yptk Computer Science Faculty Department of Information Technology Padang Indonesia
CT-Scan is a computer-based imaging technology, but it presents certain weaknesses, including interpretation challenges, lengthy analysis times, and visualization limitations. The progress in digital image processing ... 详细信息
来源: 评论
Hybrid Grey Wolf and Dipper Throated Optimization in Network Intrusion Detection systems
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2695-2709页
作者: Reem Alkanhel Doaa Sami Khafaga El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Rashid Amin Mostafa Abotaleb B.M.El-den Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of Computer Science University of Engineering and TechnologyTaxilaPakistan Department of System Programming South Ural State UniversityChelyabinsk454080Russia
The Internet of Things(IoT)is a modern approach that enables connection with a wide variety of devices *** to the resource constraints and open nature of IoT nodes,the routing protocol for low power and lossy(RPL)netw... 详细信息
来源: 评论
Covert Channel Detection and Generation Techniques: A Survey  3
Covert Channel Detection and Generation Techniques: A Survey
收藏 引用
3rd International Conference on Emerging Smart Technologies and Applications, eSmarTA 2023
作者: Al-Khulaidi, Nesmah A. Zahary, Ammar T. Hazaa, Muneer A.S Nasser, Adel A. Yemen Academy for Graduate Studies Department of Computer Networks Sana'a Yemen University of Science and Technology Faculty of Computing and It Department of Computer Science Sana'a Yemen Thamar University Faculty of Computer and Information System Department of Computer Science Thamar Yemen Sa'adah University Faculty of Sciences Department of Information Systems and Computer Science Sa'adah Yemen
The use of covert communications has become more widespread recently as a solution to the information security issue. information security can be partially solved by the discovery and creation of covert routes. Covert... 详细信息
来源: 评论