咨询与建议

限定检索结果

文献类型

  • 809 篇 会议
  • 544 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,354 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 727 篇 工学
    • 522 篇 计算机科学与技术...
    • 433 篇 软件工程
    • 152 篇 信息与通信工程
    • 103 篇 生物工程
    • 88 篇 控制科学与工程
    • 83 篇 电气工程
    • 77 篇 生物医学工程(可授...
    • 63 篇 电子科学与技术(可...
    • 57 篇 光学工程
    • 41 篇 机械工程
    • 34 篇 化学工程与技术
    • 32 篇 安全科学与工程
    • 30 篇 动力工程及工程热...
    • 27 篇 环境科学与工程(可...
    • 26 篇 材料科学与工程(可...
  • 483 篇 理学
    • 203 篇 数学
    • 184 篇 物理学
    • 130 篇 生物学
    • 76 篇 统计学(可授理学、...
    • 36 篇 化学
    • 30 篇 系统科学
  • 241 篇 管理学
    • 125 篇 管理科学与工程(可...
    • 125 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 114 篇 医学
    • 95 篇 临床医学
    • 82 篇 基础医学(可授医学...
    • 44 篇 公共卫生与预防医...
    • 36 篇 药学(可授医学、理...
  • 46 篇 教育学
    • 41 篇 教育学
  • 43 篇 法学
    • 38 篇 社会学
  • 34 篇 农学
  • 23 篇 经济学
  • 4 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 29 篇 machine learning
  • 24 篇 data mining
  • 24 篇 feature extracti...
  • 24 篇 training
  • 23 篇 internet of thin...
  • 23 篇 technological in...
  • 21 篇 accuracy
  • 19 篇 covid-19
  • 19 篇 deep learning
  • 18 篇 computational mo...
  • 16 篇 computer science
  • 15 篇 neural networks
  • 15 篇 visualization
  • 14 篇 education
  • 14 篇 information tech...
  • 13 篇 predictive model...
  • 13 篇 real-time system...
  • 13 篇 students
  • 13 篇 collaboration
  • 13 篇 data models

机构

  • 16 篇 advanced institu...
  • 15 篇 faculty of commu...
  • 14 篇 applied computer...
  • 12 篇 king mongkut's u...
  • 11 篇 faculty of infor...
  • 11 篇 advanced institu...
  • 11 篇 graduate program...
  • 11 篇 department of el...
  • 11 篇 media technology...
  • 10 篇 department of co...
  • 10 篇 king mongkut's u...
  • 9 篇 graduate program...
  • 9 篇 faculty of compu...
  • 9 篇 department of in...
  • 8 篇 health managemen...
  • 8 篇 tércio pacitti i...
  • 8 篇 information syst...
  • 8 篇 doctoral program...
  • 8 篇 department of ma...
  • 7 篇 king mongkut's u...

作者

  • 28 篇 gaol ford lumban
  • 26 篇 muhammad zarlis
  • 21 篇 zarlis muhammad
  • 15 篇 ganokratanaa thi...
  • 14 篇 herman mawengkan...
  • 14 篇 thittaporn ganok...
  • 14 篇 matsuo tokuro
  • 14 篇 oktavia tanty
  • 13 篇 efendi syahril
  • 13 篇 syahril efendi
  • 12 篇 ketcham mahasak
  • 12 篇 poltak sihombing
  • 12 篇 patiyuth pramkea...
  • 11 篇 niyato dusit
  • 11 篇 mawengkang herma...
  • 11 篇 hosoda takaaki
  • 11 篇 pramkeaw patiyut...
  • 10 篇 kurniasih nuning
  • 10 篇 narumol chumuang
  • 10 篇 mahasak ketcham

语言

  • 1,291 篇 英文
  • 49 篇 其他
  • 12 篇 中文
  • 4 篇 日文
检索条件"机构=Doctoral Program of Computer Science and Information Technology"
1354 条 记 录,以下是491-500 订阅
排序:
Diffusion-based Reinforcement Learning for Edge-enabled AI-Generated Content Services
arXiv
收藏 引用
arXiv 2023年
作者: Du, Hongyang Li, Zonghang Niyato, Dusit Kang, Jiawen Xiong, Zehui Huang, Huawei Mao, Shiwen The School of Computer Science and Engineering The Energy Research Institute @ NTU Interdisciplinary Graduate Program Nanyang Technological University Singapore The School of Information and Communication Engineering University of Electronic Sciences and Technology of China Chengdu China The School of Automation Guangdong University of Technology China The Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore The School of Software Engineering Sun Yat-Sen University Zhuhai China The Department of Electrical and Computer Engineering Auburn University Auburn United States
As Metaverse emerges as the next-generation Internet paradigm, the ability to efficiently generate content is paramount. AI-Generated Content (AIGC) emerges as a key solution, yet the resource-intensive nature of larg... 详细信息
来源: 评论
Reduction of the dataset of Baitul Mal aid recipients using the principal component analysis (PCA) method to improve C5.0 algorithm classification results
收藏 引用
AIP Conference Proceedings 2024年 第1期3222卷
作者: Evi Susanti Sawaluddin Poltak Sihombing Master of Informatics Program Faculty of Computer Science and Information Technology Universitas Sumatera Utara Medan Indonesia
This research raises problems among Baitul Mal aid recipients regarding aid to micro businesses. The process of assisting is an important activity to develop micro-businesses so that they can continue to operate and d...
来源: 评论
Hybrid cryptosystem enhanced RSA and RC4 chaotic map: A tutorial
收藏 引用
AIP Conference Proceedings 2024年 第1期3222卷
作者: Arief Rahman Hakim Mohammad Andri Budiman Mahyuddin K. M. Nasution Master of Informatics Program Faculty of Computer Science and Information Technology Universitas Sumatera Utara Medan Indonesia
Since the RSA algorithm is no longer secure and a lot of research has been done to break down RSA security, it is necessary to do research by making a combination of modifications of RSA algorithms, in this case using...
来源: 评论
A Novel Hybrid Framework for Energy-Efficient Clustering and Routing in Heterogeneous IoT-Driven Wireless Sensor Networks
A Novel Hybrid Framework for Energy-Efficient Clustering and...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Gopal Kumar Gupta Arpit Jain Khemraj Sharma P. M. Ashok Kumar Shubhi Gupta Sheenu Agarwal Symbiosis Institute Of Technology Nagpur Campus Symbiosis International (Deemed University) Pune India Department of Computer Science Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram AP India Department of Business Administration Doctoral Program in Management Sciences NANHUA UNIVERSITY Dalin Chiayi R.O.C Department of Computer Science and Engineering Amity University Greater Noida Uttar Pradesh India Department of Electronics and Communication Engineering Uttarakhand Technical University Dehradun U.K. India
Smart computing has been particularly notable in the development of wireless sensor networks (WSNs), which have many applications. Battery-powered, self-configuring sensor nodes are the basis of these networks. Energy... 详细信息
来源: 评论
SRGAN with Total Variation Loss in Face Super-Resolution  7
SRGAN with Total Variation Loss in Face Super-Resolution
收藏 引用
7th NAFOSTED Conference on information and computer science, NICS 2020
作者: Nguyen-Truong, Hai Nguyen, Khoa N. A. Cao, San Advanced Program in Computer Science Faculty of Information Technology Vietnam National University Ho Chi Minh city Viet Nam
Facial image super-resolution is a crucial preprocessing for facial image analysis, face recognition, and image-based 3D face reconstruction. Convolutional neural networks were earlier used to produce high-resolution ... 详细信息
来源: 评论
Utilization of GPS technology in the Maritime Sector on Motor Sailing Yachts  8
Utilization of GPS Technology in the Maritime Sector on Moto...
收藏 引用
8th International Seminar on Ocean and Coastal Engineering, Environmental and Natural Disaster Management, ISOCEEN 2020
作者: Quintania, Melani Faturachman, Danny Husain, T. Pasupati, Bayu Taufik, Ahmad Management Department Faculty of Economy Darma Persada University Indonesia Marine Engineering Department Faculty of Marine Technology Darma Persada University Indonesia Information System Department School of Management and Computer Science STMIK Widuri Jakarta Indonesia Student of Doctoral Management YAI Persada University Indonesia
The utilization of technology only aims to be fast, precise, and accurate in each implementation and find a better solution at that time in several sectors. This study aims to identify the use of Global Positioning Te... 详细信息
来源: 评论
Multicast Routing Technique for Augmenting Routing Efficiency in Mobile WSN
Multicast Routing Technique for Augmenting Routing Efficienc...
收藏 引用
International Conference on Computing Methodologies and Communication (ICCMC)
作者: K. Anand M. Rajkumar Srikanth MS S. Radhika Department of Computer Science and Engineering Rajalakshmi Engineering College Chennai Tamil Nadu India School of Information Technology and Engineering VIT University Vellore Tamil Nadu India Program Specialist TNS India Foundation Bangalore Karnataka India Department of Computer Science and Engineering Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Chennai Tamil Nadu India
Mobile Wireless Sensor Network (MWSN) is an active network completely self-governing from a fixed structure. Also, MWSN has small channel bandwidth, great node movement, and inadequate battery energy. In WSN, flooding... 详细信息
来源: 评论
UNIFORM CYCLIC GROUP FACTORIZATIONS OF FINITE GROUPS
arXiv
收藏 引用
arXiv 2023年
作者: Kanai, Kazuki Miyamoto, Kengo Nuida, Koji Shinagawa, Kazumasa General Education Program National Institute of Technology Kure College Hiroshima737-8506 Japan Department of Computer and Information Science Ibaraki University Ibaraki316-8511 Japan Kyushu University Fukuoka819-0395 Japan Tokyo135-0064 Japan
In this paper, we introduce a kind of decomposition of a finite group called a uniform group factorization, as a generalization of exact factorizations of a finite group. A group G is said to admit a uniform group fac... 详细信息
来源: 评论
Hybrid ACO and PSO to minimize makespan in job shop scheduling problems
收藏 引用
AIP Conference Proceedings 2024年 第1期3222卷
作者: Priljen Habeahan Erna Budhiarti Nababan Mahyuddin K. M. Nasution Informatics Engineering Master Program Faculty of Computer Science and Information Technology Universitas Sumatera Utara Medan Indonesia Data Science and Artificial Intelligence Faculty of Computer Science and Information Technology Universitas Sumatera Utara Medan Indonesia
The lowest time search in the dataset that E. Taillard utilized employs a heuristic approach based on tabu search techniques to get the predicted solution. Glover’s study gives a broad description of tabu search, whi...
来源: 评论
Web Security and Vulnerability: A Literature Review  2
Web Security and Vulnerability: A Literature Review
收藏 引用
2nd International Conference on computer, science, Engineering, and technology, ICComSET 2019
作者: Yulianton, H. Warnars, H.L.H.S. Soewito, B. Gaol, F.L. Abdurachman, E. Computer Science Department BINUS Graduate Program - Doctor of Computer Science Bina Nusantara University Jakarta11480 Indonesia Faculty of Information Technology Universitas Stikubank Semarang50243 Indonesia
The web continues to grow and attacks against the web continue to increase. This paper focuses on the literature review on scanning web vulnerabilities and solutions to mitigate web attacks. Vulnerability scanning met... 详细信息
来源: 评论