咨询与建议

限定检索结果

文献类型

  • 1,802 篇 会议
  • 1,272 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 3,089 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,938 篇 工学
    • 1,319 篇 计算机科学与技术...
    • 1,058 篇 软件工程
    • 419 篇 信息与通信工程
    • 339 篇 控制科学与工程
    • 211 篇 电子科学与技术(可...
    • 197 篇 电气工程
    • 183 篇 生物工程
    • 170 篇 机械工程
    • 136 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 116 篇 光学工程
    • 87 篇 动力工程及工程热...
    • 77 篇 化学工程与技术
    • 66 篇 材料科学与工程(可...
    • 65 篇 交通运输工程
    • 63 篇 网络空间安全
  • 1,017 篇 理学
    • 500 篇 数学
    • 294 篇 物理学
    • 207 篇 生物学
    • 166 篇 统计学(可授理学、...
    • 130 篇 系统科学
    • 83 篇 化学
  • 560 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 221 篇 图书情报与档案管...
    • 145 篇 工商管理
  • 172 篇 医学
    • 146 篇 临床医学
    • 105 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 92 篇 法学
    • 74 篇 社会学
  • 67 篇 经济学
    • 67 篇 应用经济学
  • 42 篇 教育学
  • 40 篇 农学
  • 15 篇 文学
  • 11 篇 军事学
  • 7 篇 艺术学

主题

  • 87 篇 deep learning
  • 64 篇 computer science
  • 59 篇 machine learning
  • 52 篇 accuracy
  • 47 篇 feature extracti...
  • 45 篇 computational mo...
  • 42 篇 internet of thin...
  • 40 篇 optimization
  • 37 篇 data mining
  • 37 篇 training
  • 35 篇 artificial intel...
  • 32 篇 information syst...
  • 32 篇 security
  • 29 篇 information tech...
  • 29 篇 cloud computing
  • 28 篇 routing
  • 28 篇 hardware
  • 27 篇 support vector m...
  • 27 篇 algorithm design...
  • 26 篇 computer archite...

机构

  • 99 篇 department of co...
  • 50 篇 school of softwa...
  • 40 篇 tsinghua nationa...
  • 37 篇 department of co...
  • 23 篇 key laboratory f...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 national enginee...
  • 18 篇 department of in...
  • 17 篇 hubei province k...
  • 16 篇 department of co...
  • 14 篇 department of co...
  • 14 篇 national key lab...
  • 13 篇 department of co...
  • 13 篇 ieee
  • 13 篇 key laboratory f...
  • 13 篇 university of ch...
  • 13 篇 institute of sys...
  • 12 篇 department of me...
  • 12 篇 department of co...

作者

  • 21 篇 abdelwahed motwa...
  • 20 篇 mesfer al duhayy...
  • 19 篇 ishfaq yaseen
  • 18 篇 mohamed k.nour
  • 17 篇 manar ahmed hamz...
  • 15 篇 gaol ford lumban
  • 15 篇 paramartha dutta
  • 14 篇 han zhu
  • 14 篇 zhao junqiao
  • 13 篇 robbi rahim
  • 13 篇 yunhao liu
  • 13 篇 yang jing
  • 12 篇 abu sarwar zaman...
  • 12 篇 shamshirband sha...
  • 12 篇 hayashi eiji
  • 12 篇 hala j.alshahran...
  • 12 篇 zheng changwen
  • 11 篇 chen yen-lin
  • 11 篇 ye chen
  • 11 篇 wang jianmin

语言

  • 2,876 篇 英文
  • 145 篇 其他
  • 64 篇 中文
  • 5 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer System and Information Technology"
3089 条 记 录,以下是261-270 订阅
排序:
Arrays in Practice An Empirical Study of Array Access Patterns on the JVM
arXiv
收藏 引用
arXiv 2024年
作者: Åkerblom, Beatrice Castegren, Elias Department of Computer and System Sciences Stockholm University Sweden Department of Information Technology Uppsala University Sweden
The array is a data structure used in a wide range of programs. Its compact storage and constant time random access makes it highly efficient, but arbitrary indexing complicates the analysis of code containing array a... 详细信息
来源: 评论
Critical Factors of Immersive Learning in Higher Education: A systematic Literature Review  10
Critical Factors of Immersive Learning in Higher Education: ...
收藏 引用
10th International Conference on ICT for Smart Society, ICISS 2023
作者: Sunardi Meyliana Ramadhan, Arief Rosmansyah, Yusep Bina Nusantara University BINUS Graduate Program Doctor of Computer Science Computer Science Department Jakarta Indonesia School of Information System Bina Nusantara University Information System Departement Jakarta Indonesia School of Computing Telkom University Bandung Indonesia School of Electrical Engineering and Informatics Bandung Institute of Technology Bandung Indonesia
Immersive learning has gained significant attention with the rising trend of spatial computing, particularly in the after-pandemic era. Numerous research has explored the potential of immersive learning in higher educ... 详细信息
来源: 评论
Model for Assessment information Security Awareness Level for Data Stewardship by Understanding the Context of Use  2022
Model for Assessment Information Security Awareness Level fo...
收藏 引用
11th International Conference on Software and computer Applications, ICSCA 2022
作者: Lubis, Muharman Azies Muslim, Abdul Ridho Lubis, Arif Alkhowarizmi, Alkhowarizmi Department of Information System Telkom University Indonesia Department of Computer Engineering and Informatics Politeknik Negeri Medan Indonesia Department of Information Technology Universitas Muhammadiyah Sumatera Utara Indonesia
The role of data stewardship satisfies various requirement for the users, employee or staff to provide necessary awareness in ensuring information security strategy take place accordingly. It relates to have properly ... 详细信息
来源: 评论
Optimizing Steering Angle Predictive Convolutional Neural Network for Autonomous Car
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2285-2302页
作者: Hajira Saleem Faisal Riaz Asadullah Shaikh Khairan Rajab Adel Rajab Muhammad Akram Mana Saleh Al Reshan Control Automotive and Robotics Lab Affiliated lab of National Center of Robotics and Automation(NCRA HEC Pakistan)and with the Department of Computer Science and Information TechnologyMirpur University of Science and Technology(MUST)Mirpur Azad Kashmir10250Pakistan College of Computer Science and Information System Najran UniversityNajran61441Saudi Arabia College of Computer Science and Engineering University of South FloridaTampa33620United States
Deep learning techniques,particularly convolutional neural networks(CNNs),have exhibited remarkable performance in solving visionrelated problems,especially in unpredictable,dynamic,and challenging *** autonomous vehi... 详细信息
来源: 评论
An authenticated spectrum acquirement and transmission of encrypted images over fusion centre
收藏 引用
Multimedia Tools and Applications 2024年 1-24页
作者: V, Thanikaiselvan Y, PiyaDessi S, Renuga devi Shanthini, S. Suba Mahalingam, Hemalatha S, Aashiq Banu R, Dhivya V.M, Padmapriya Amirtharajan, Rengarajan School of Electronics Engineering Vellore Institute of Technology Vellore Vellore India School of Information Technology Vellore Institute of Technology Vellore India Department of Electrical and Computer Engineering Faculty of Engineering King Abdulaziz University Jeddah22254 Saudi Arabia System Engineering Department Military Technological College Muscat Oman Department of Electronics and Communication Engineering Mepco Schlenk Engineering College Tamilnadu Sivakasi626005 India Department of Computer Sciences Marquette University MilwaukeeWI53233 United States School of Electrical & amp Electronics Engineering SASTRA Deemed University 613 401 Thanjavur India
These days, spectrum insufficiency is the most common issue. If the number of smartphone users who access the radio spectrum grows, the radio spectrum becomes increasingly scarce. Certain types of technology equipment... 详细信息
来源: 评论
Social Engineering Attacks Detection Approach  13
Social Engineering Attacks Detection Approach
收藏 引用
13th International Conference on Dependable systems, Services and Technologies, DESSERT 2023
作者: Lysenko, Sergii Vorobiov, Volodymyr Bokhonko, Oleksandr Gaj, Piotr Savenko, Oleg Woloszyn, Jacek Khmelnitsky National University Department of Computer Engineering and Information Systems Khmelnitsky Ukraine Silesian University of Technology Gliwice Poland Khmelnitsky National University Department of Computer Engineering and System Programming Khmelnitsky Ukraine Kazimierz Pulaski University of Technology and Humanities in Radom Department of Informatics and Teleinformatics Radom Poland
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq... 详细信息
来源: 评论
Robotic Anchoring system with Two Locomotion Modes for Preoperative Localization of Colorectal Cancer
Robotic Anchoring System with Two Locomotion Modes for Preop...
收藏 引用
2024 IEEE International Conference on Robotics and Biomimetics, ROBIO 2024
作者: Wang, Jiale Ren, Hao Yang, Liu Zhao, Haoxiang Zhang, Ruijia Shen, Yajing Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Kowloon Hong Kong City University of Hong Kong Department of Biomedical Engineering Kowloon Hong Kong Institute of Robotics and Automatic Information System Nankai University China
At present, colorectal cancer is one of the most prevalent cancers in the world. Colectomy serves as an effective treatment option for this disease. Preoperative localization plays a vital role in the colectomy proced... 详细信息
来源: 评论
A Framework for Deepfake Detection using Convolutional Neural Network and Deep Features
收藏 引用
Procedia computer Science 2025年 258卷 3640-3648页
作者: Soundarya B C Gururaj H L Naveen Kumar C M Department of Information Technology Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Manipal India Department of Computer Science and Business System Malnad College of Engineering Hassan India
With the advancement of Artificial Intelligence, facial recognition has become a crucial biometric feature. Deepfake technology leverages AI and can create hyper-realistic digitally manipulated videos of people appear... 详细信息
来源: 评论
Improved Metaheuristics with Deep Learning Enabled Movie Review Sentiment Analysis
收藏 引用
computer systems Science & Engineering 2023年 第10期47卷 1249-1266页
作者: Abdelwahed Motwakel Najm Alotaibi Eatedal Alabdulkreem Hussain Alshahrani MohamedAhmed Elfaki Mohamed K Nour Radwa Marzouk Mahmoud Othman Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Prince Saud AlFaisal Institute for Diplomatic Studies RiyadhSaudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Computing and Information TechnologyShaqra UniversityShaqraSaudi Arabia Department of Computer Sciences College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science Faculty of Computers and Information TechnologyFuture University in EgyptNew Cairo11835Egypt
Sentiment Analysis(SA)of natural language text is not only a challenging process but also gains significance in various Natural Language Processing(NLP)*** SA is utilized in various applications,namely,education,to im... 详细信息
来源: 评论
Multi-Speaker Diarization using Long-Short Term Memory Network  3
Multi-Speaker Diarization using Long-Short Term Memory Netwo...
收藏 引用
3rd IEEE International Conference on Artificial Intelligence, ICAI 2023
作者: Aafaq, Nayyer Qamar, Usama Khan, Sohaib Ali Khan, Zeashan Hameed Department of Avionics Engineering College of Aeronautical Engineering National University of Sciences and Technology NUST Islamabad Pakistan N.E.D UET Department of Computer & Information System Engineering Karachi Pakistan
The task of multi-speaker diarization involves de-tection of number of speakers and segregate the audio seg-ments corresponding to each speaker. Despite the tremendous advancements in deep learning, the problem of mul... 详细信息
来源: 评论