咨询与建议

限定检索结果

文献类型

  • 423 篇 会议
  • 402 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 826 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 449 篇 工学
    • 244 篇 计算机科学与技术...
    • 200 篇 软件工程
    • 98 篇 信息与通信工程
    • 58 篇 生物工程
    • 47 篇 电气工程
    • 47 篇 电子科学与技术(可...
    • 46 篇 控制科学与工程
    • 43 篇 生物医学工程(可授...
    • 33 篇 光学工程
    • 32 篇 材料科学与工程(可...
    • 30 篇 机械工程
    • 26 篇 化学工程与技术
    • 24 篇 仪器科学与技术
    • 21 篇 环境科学与工程(可...
    • 19 篇 力学(可授工学、理...
    • 18 篇 动力工程及工程热...
  • 323 篇 理学
    • 144 篇 物理学
    • 94 篇 数学
    • 93 篇 生物学
    • 28 篇 化学
    • 28 篇 统计学(可授理学、...
    • 23 篇 系统科学
  • 136 篇 管理学
    • 75 篇 图书情报与档案管...
    • 63 篇 管理科学与工程(可...
    • 41 篇 工商管理
  • 80 篇 医学
    • 61 篇 临床医学
    • 48 篇 基础医学(可授医学...
    • 31 篇 公共卫生与预防医...
  • 31 篇 法学
    • 29 篇 社会学
  • 31 篇 教育学
    • 29 篇 教育学
  • 26 篇 农学
  • 14 篇 经济学
  • 3 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 12 篇 covid-19
  • 12 篇 deep learning
  • 12 篇 feature extracti...
  • 11 篇 students
  • 9 篇 gravitational wa...
  • 9 篇 machine learning
  • 9 篇 training
  • 8 篇 legged locomotio...
  • 8 篇 force
  • 8 篇 education
  • 8 篇 cameras
  • 8 篇 optimization
  • 8 篇 accuracy
  • 7 篇 computer science
  • 7 篇 information syst...
  • 7 篇 support vector m...
  • 7 篇 prototypes
  • 7 篇 data mining
  • 7 篇 predictive model...
  • 7 篇 visualization

机构

  • 16 篇 advanced institu...
  • 15 篇 institute for pl...
  • 14 篇 university of so...
  • 13 篇 department of ph...
  • 12 篇 department of as...
  • 12 篇 scuola di ingegn...
  • 12 篇 infn sezione di ...
  • 12 篇 dipartimento di ...
  • 12 篇 università degli...
  • 12 篇 infn trento inst...
  • 12 篇 max planck insti...
  • 12 篇 université paris...
  • 12 篇 universiteit gen...
  • 12 篇 gran sasso scien...
  • 12 篇 université libre...
  • 11 篇 infn sezione di ...
  • 11 篇 national tsing h...
  • 11 篇 department of ph...
  • 11 篇 department of ph...
  • 11 篇 department of ph...

作者

  • 26 篇 gaol ford lumban
  • 15 篇 sho yokota
  • 14 篇 matsuo tokuro
  • 13 篇 g. moreno
  • 13 篇 r. gray
  • 12 篇 r. takahashi
  • 12 篇 j. c. bayley
  • 12 篇 k. komori
  • 12 篇 t. kajita
  • 12 篇 f. hellman
  • 12 篇 niyato dusit
  • 12 篇 m. kinley-hanlon
  • 12 篇 t. mcrae
  • 12 篇 a. parisi
  • 12 篇 t. sawada
  • 12 篇 s. rowan
  • 12 篇 s. m. aronson
  • 12 篇 v. p. mitrofanov
  • 12 篇 g. hemming
  • 12 篇 p. fritschel

语言

  • 781 篇 英文
  • 31 篇 其他
  • 9 篇 中文
  • 6 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Graduate Program in Information Technology"
826 条 记 录,以下是191-200 订阅
排序:
An Efficient Three-Factor Authenticated Key Agreement Technique Using FCM Under HC-IoT Architectures
收藏 引用
Computers, Materials & Continua 2022年 第7期72卷 1373-1389页
作者: Chandrashekhar Meshram Agbotiname Lucky Imoize Sajjad Shaukat Jamal Parkash Tambare Adel R.Alharbi Iqtadar Hussain Department of Post Graduate Studies and Research in Mathematics Jayawanti Haksar Government Post-Graduation CollegeCollege of Chhindwara UniversityBetul460001M.P.India Department of Electrical and Electronics Engineering Faculty of EngineeringUniversity of LagosAkokaLagos100213Nigeria Department of Electrical Engineering and Information Technology Institute of Digital CommunicationRuhr University44801BochumGermany Department of Mathematics College of ScienceKing Khalid UniversityAbhaSaudi Arabia Water Resources&Applied Mathematics Research Lab Nagpur440027India College of Computing and Information Technology University of TabukTabuk71491Saudi Arabia Mathematics Program Department of MathematicsStatistics and PhysicsCollege of Arts and SciencesQatar University2713DohaQatar
The Human-Centered Internet of Things(HC-IoT)is fast becoming a hotbed of security and privacy *** users can establish a common session key through a trusted server over an open communication channel using a three-par... 详细信息
来源: 评论
ZeroCAN: Anomaly-Based Zero-Day Attack Detection in Vehicular CAN Bus Networks
ZeroCAN: Anomaly-Based Zero-Day Attack Detection in Vehicula...
收藏 引用
Euromicro Conference on Parallel, Distributed and Network-Based Processing
作者: Jonathan Rendel William Balte Harrison Kurunathan Hazem Ismail Ali Alexandre Dos Santos Roque Wagner Ourique De Morais Mahdi Fazeli Department for Computing and Electronics for Real-time and Embedded Systems (CERES) School of Information Technology (ITE) Halmstad University Halmstad Sweden CISTER/ISEP Polytechnic Institute of Porto Portugal Graduate Program of Electrical Engineering Federal University of Rio Grande do Sul - UFRGS Porto Alegre Brazil
Zero-day attacks present a significant security threat to vehicular networks, exploiting vulnerabilities at both software and hardware levels within such systems that remain undiscovered. Mitigating these threats is e... 详细信息
来源: 评论
Factors that Influence E-Satisfaction and Their Impact on Online Purchase Intention of Telemedicine Applications
Factors that Influence E-Satisfaction and Their Impact on On...
收藏 引用
International Conference on Computing, Engineering, and Design (ICCED)
作者: Anderes Gui Idris Gautama So Dea Novantia Elfindah Princes Nesti Fronika Sianipar Hasnah Haron Information System Program School of Information Systems Bina Nusantara University Jakarta Indonesia Management Department Binus Business School Bina Nusantara University Jakarta Indonesia Information Systems Management Department Binus Graduate Program-Master of Information Systems Management Bina Nusantara University Jakarta Indonesia Food Technology Department Faculty of Engineering Bina Nusantara University Jakarta Indonesia Faculty of Economics and Muamalat Universiti Sains Islam Malaysia Nilai Malaysia
This study embarked on a rigorous examination of the factors driving user satisfaction and usage behavior in the context of telehealth applications. Utilizing a well- structured Google Form survey, distributed through...
来源: 评论
The Social Media Implications on the Sales of Business Products
The Social Media Implications on the Sales of Business Produ...
收藏 引用
Smart Data Intelligence (ICSMDI), International Conference on
作者: Elvina Jacia Gabriel Dyan Amelia Ifan Ford Lumban Gaol Tokuro Matsuo Department of Information System Bina Nusantara University Alam Sutera Indonesia Computer Science Department BINUS Graduate Program-Doctor of Computer Science Bina Nusantara University Jakarta Indonesia Advanced Institute of Industrial Technology Tokyo Japan
The use of technology nowadays does not feel strange. Everyday people who use technology for their daily needs, starting with each other, seeking knowledge, can even earn income by doing business using technology. Soc... 详细信息
来源: 评论
Unmasking Illusions: Understanding Human Perception of Audiovisual Deepfakes
arXiv
收藏 引用
arXiv 2024年
作者: Hashmi, Ammarah Shahzad, Sahibzada Adil Lin, Chia-Wen Tsao, Yu Wang, Hsin-Min Social Networks and Human-Centered Computing Program Taiwan International Graduate Program Institute of Information Science Academia Sinica Taipei11529 Taiwan Institute of Information Systems and Applications National Tsing Hua University Hsinchu300044 Taiwan Department of Computer Science National Chengchi University Taipei11529 Taiwan Department of Electrical Engineering Institute of Communications Engineering National Tsing Hua University Hsinchu300044 Taiwan Research Center for Information Technology Innovation Academia Sinica Taipei11529 Taiwan Institute of Information Science Academia Sinica Taipei11529 Taiwan
The emergence of contemporary deepfakes has attracted significant attention in machine learning research, as artificial intelligence (AI) generated synthetic media increases the incidence of misinterpretation and is d... 详细信息
来源: 评论
On using Euler's Factorization Algorithm to Factor RSA Modulus  4
On using Euler's Factorization Algorithm to Factor RSA Modul...
收藏 引用
4th International Conference on Computing and Applied Informatics 2019, ICCAI 2019
作者: Budiman, M.A. Zarlis, M. Sitompul, O.S. Mawengkang, H. Graduate Program of Computer Science Faculty of Computer Science and Information Technology Universitas Sumatera Utara Medan Indonesia
The RSA public key cryptosystem was among the first algorithms to implement the Diffie-Hellman key exchange protocol. At the core of RSA's security is the problem of factoring its modulus, a very large integer, in... 详细信息
来源: 评论
Understanding Audiovisual Deepfake Detection: Techniques, Challenges, Human Factors and Perceptual Insights
arXiv
收藏 引用
arXiv 2024年
作者: Hashmi, Ammarah Shahzad, Sahibzada Adil Lin, Chia-Wen Tsao, Yu Wang, Hsin-Min The Social Networks and Human-Centered Computing Program Taiwan International Graduate Program Institute of Information Science Academia Sinica Taipei11529 Taiwan The Institute of Information Systems and Applications National Tsing Hua University Hsinchu300044 Taiwan The Department of Computer Science National Chengchi University Taipei11529 Taiwan The Department of Electrical Engineering The Institute of Communications Engineering National Tsing Hua University Hsinchu300044 Taiwan The Research Center for Information Technology Innovation Academia Sinica Taipei11529 Taiwan The Institute of Information Science Academia Sinica Taipei11529 Taiwan
Deep Learning has been successfully applied in diverse fields, and its impact on deepfake detection is no exception. Deepfakes are fake yet realistic synthetic content that can be used deceitfully for political impers... 详细信息
来源: 评论
HAAQI-Net: A Non-intrusive Neural Music Audio Quality Assessment Model for Hearing Aids
arXiv
收藏 引用
arXiv 2024年
作者: Wisnu, Dyah A.M.G. Rini, Stefano Zezario, Ryandhimas E. Wang, Hsin-Min Tsao, Yu Taiwan International Graduate Program—Social Network and Human Centered Computing Institute of Information Science Academia Sinica Taipei Taiwan College of Informatics National Chengchi University Taipei Taiwan Institute of Communications Engineering National Yang Ming Chiao Tung University Hsinchu Taiwan Research Center for Information Technology Innovation Academia Sinica Taipei Taiwan Institute of Information Science Academia Sinica Taipei Taiwan
This paper introduces HAAQI-Net, a non-intrusive deep learning-based music audio quality assessment model for hearing aid users. Unlike traditional methods like the Hearing Aid Audio Quality Index (HAAQI) that require... 详细信息
来源: 评论
Adaptive Contextual Caching for Mobile Edge Large Language Model Service
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Guangyuan Liu, Yinqiu Wang, Jiacheng Du, Hongyang Niyato, Dusit Kang, Jiawen Xiong, Zehui College of Computing and Data Science The Energy Research Institute @ NTU Interdisciplinary Graduate Program Nanyang Technological University Singapore College of Computing and Data Science Nanyang Technological University Singapore Department of Electrical and Electronic Engineering University of Hong Kong Hong Kong School of Automation Guangdong University of Technology China Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore
Mobile edge Large Language Model (LLM) deployments face inherent constraints, such as limited computational resources and network bandwidth. Although Retrieval-Augmented Generation (RAG) mitigates some challenges by i... 详细信息
来源: 评论
Player's stress reduction in competitive online game by presenting calm scent  9
Player's stress reduction in competitive online game by pres...
收藏 引用
9th IEEE Global Conference on Consumer Electronics, GCCE 2020
作者: Goto, Toshiki Shibuya, Yu Kyoto Institute of Technology Master's Program of Information Science Graduate School of Science and Technology Kyoto Japan Kyoto Institute of Technology Faculty of Information and Human Sciences Kyoto Japan
Playing competitive online games is usually fun but sometimes player feels unpleasant and is stressed regardless of games content. When a player is stressed, her/his motivation for games decrease. The purpose of this ... 详细信息
来源: 评论