咨询与建议

限定检索结果

文献类型

  • 146 篇 会议
  • 62 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 209 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 114 篇 工学
    • 95 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 23 篇 信息与通信工程
    • 16 篇 控制科学与工程
    • 14 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 网络空间安全
    • 4 篇 安全科学与工程
    • 3 篇 仪器科学与技术
    • 3 篇 化学工程与技术
    • 3 篇 航空宇航科学与技...
    • 3 篇 农业工程
    • 2 篇 光学工程
    • 2 篇 建筑学
  • 42 篇 理学
    • 22 篇 数学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 2 篇 化学
  • 27 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 8 篇 教育学
    • 8 篇 教育学
  • 6 篇 法学
    • 5 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 15 篇 accuracy
  • 13 篇 feature extracti...
  • 10 篇 machine learning
  • 9 篇 deep learning
  • 9 篇 neural networks
  • 9 篇 computational mo...
  • 9 篇 training
  • 8 篇 noise
  • 8 篇 predictive model...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 measurement
  • 7 篇 privacy
  • 6 篇 transformers
  • 6 篇 data mining
  • 6 篇 correlation
  • 6 篇 federated learni...
  • 6 篇 data models
  • 5 篇 uniform resource...

机构

  • 49 篇 shandong provinc...
  • 45 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 10 篇 shandong enginee...
  • 9 篇 key laboratory o...
  • 9 篇 shandong fundame...
  • 7 篇 information secu...
  • 6 篇 shandong branch ...
  • 6 篇 college of compu...
  • 6 篇 hubei key labora...
  • 6 篇 department of in...
  • 6 篇 school of inform...
  • 6 篇 department of co...
  • 5 篇 china telecom di...
  • 5 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 faculty of infor...
  • 4 篇 school of intell...
  • 4 篇 qilu university ...
  • 4 篇 jordan universit...

作者

  • 12 篇 darwish omar
  • 11 篇 jing zhao
  • 9 篇 tang xiaohu
  • 9 篇 zhenyu yang
  • 8 篇 tashtoush yahya
  • 7 篇 mohammad alauthm...
  • 7 篇 omar darwish
  • 7 篇 fathi amsaad
  • 7 篇 ammar almomani
  • 6 篇 wahl harald
  • 6 篇 hu liang
  • 6 篇 qin lu
  • 6 篇 winiwarter werne...
  • 6 篇 yahya tashtoush
  • 5 篇 yushui geng
  • 5 篇 jianqiang zhang
  • 5 篇 gongpeng song
  • 5 篇 yiwen li
  • 5 篇 zeng xiangyong
  • 5 篇 zhijun li

语言

  • 198 篇 英文
  • 11 篇 其他
检索条件"机构=Information Security and Applied Computing"
209 条 记 录,以下是151-160 订阅
排序:
Data Mining and Text Mining Approach: Query based information Retrieval using Genetic Algorithm
Data Mining and Text Mining Approach: Query based Informatio...
收藏 引用
Image Processing and Capsule Networks (ICIPCN), International Conference on
作者: S. Ananthi R. Venkateswaran G. Vijaya J. Arun R. Sathya Advanced Research Centre for Future Networks and Digital Twin Sri Eshwar College of Engineering Coimbatore India Faculty-Cyber and Information Security College of Computing & Information SciencesUniversity of Technology and Applied Sciences Salalah Oman Dept. of CSE Sri Krishna College of Engineering and Tech Coimbatore India Dept. of ECE Sri Eshwar College of Engineering Coimbatore India Department of IT Kongunadu College of Engg and Tech Namakkal India
information Retrieval system facilitates the retrieval efficiency of the user’s requirement from a collection of information resources. In this research work, Genetic Algorithm (GA) with various fitness functions are... 详细信息
来源: 评论
Multiobjective Forecasting Model Based on the Interval Discrete Type-2 Fuzzy Sets and Genetic Algorithm
Multiobjective Forecasting Model Based on the Interval Discr...
收藏 引用
International Conference on information Technologies (InfoTech)
作者: Liliya Anatolievna Demidova Maksim Anatolievich Stepanov Department of Intelligent Systems of Information Security Institute of Integrated Safety and Special Instrumentation Russian Technological University – MIREA Vernadsky Avenue78 Moscow Russia Department of Computational and Applied Mathematics Faculty of Computing Engineering Ryazan State Radio Engineering University named after V.F. Utkin Gagarin Str. 59/1 Ryazan Russia
The forecasting task for the short time series has been investigated. The main problem of this task is the availability of a small amount of relevant information. Such tasks can be considered as the tasks in the condi... 详细信息
来源: 评论
Reappraising Business Resumption
收藏 引用
EDPACS 2006年 第11期29卷 5-16页
作者: Belden Menkus The editor of EDPACS and the consulting editor of the Auerbach Information Management Service on EDP Auditing. He is a principal in Menkus Associates consultants in IT auditing security and quality of Manchester Tennessee. Menkus co-developed the basic computing disaster recovery response methodology in 1964 under contract to what was at the time a component of the U.S. Department of Defense. This methodology has been applied in many different settings in subsequent years. Menkus can be reached by e-mail at bmenkus@***.
The September 2001 attacks on New York City's World Trade Center and the Pentagon in Arlington, Virginia, call for a reap-praisal of the assumptions and practices of business resump-tion efforts (sometimes referre...
来源: 评论
Blockchain Solution For SMEs Cybersecurity Threats In E-Commerce
Blockchain Solution For SMEs Cybersecurity Threats In E-Comm...
收藏 引用
Computer Science and Emerging Technologies (CSET), International Conference on
作者: Firas H. Zawaideh Waheeb Abu-Ulbeh Salameh A. Mjlae Yousef A. Baker El-Ebiary Yazeed Al Moaiad Sunanda Das Department of Cyber Security Faculty of Science and Informaiton Technology Irbid National University Irbid Jordan Cybersecurity Department Faculty of Administrative sciences and Informatics Al-Istiqlal University Palestine CS Department Prince Abdullah bin Ghazi Faculty of Information Technology Al-Balqa Applied University (BAU) Jordan Faculty of Informatics and Computing UniSZA Malaysia Faculty of Computer and Information Technology MEDIU Malaysia School of Computer Science and Engineering Jain University Bangalore India
The rapid growth of electronic commerce (e-commerce) has revolutionized the way Small and Medium-sized Enterprises (SMEs) conduct business, enabling them to reach global markets and unlock new growth opportunities. Ho...
来源: 评论
Deep generative network for image inpainting with gradient semantics and spatial-smooth attention
收藏 引用
Journal of Visual Communication and Image Representation 2024年 98卷
作者: Sheng, Ziqi Xu, Wenbo Lin, Cong Lu, Wei Ye, Long School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Applied Laboratory of Dig Data and Education Statistics School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510320 China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China
As a powerful forgery operation in the image content security area, image inpainting based on deep generative networks can yield visually appealing outputs but often produces ambiguous artifacts, especially in boundar... 详细信息
来源: 评论
Distributed Pinning Set Stabilization of Large-Scale Boolean Networks
arXiv
收藏 引用
arXiv 2022年
作者: Zhu, Shiyong Lu, Jianquan Sun, Liangjie Cao, Jinde The Department of Systems Science School of Mathematics Southeast University Nanjing210096 China The Advanced Modeling and Applied Computing Laboratory Department of Mathematics The University of Hong Kong Hong Kong The School of Mathematics Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China The Purple Mountain Laboratories Nanjing211111 China The Yonsei Frontier Lab Yonsei University Seoul03722 Korea Republic of
In this article, we design the distributed pinning controllers to globally stabilize a Boolean network (BN), specially a sparsely connected large-scale one, towards a preassigned subset of state space through the node... 详细信息
来源: 评论
Cutting-Edge Predictive Methods for Enhancing Short-Term Load Prediction
Cutting-Edge Predictive Methods for Enhancing Short-Term Loa...
收藏 引用
Electrical and Computer Engineering Researches (ICECER), International Conference on
作者: Taher M. Ghazal Jamshaid Iqbal Janjua Walid Abushiba Munir Ahmad Tahir Abbas Karamath Ateeq College of Arts & Science Applied Science University Manama Kingdom of Bahrain Center for Cyber Security Faculty of Information Science and Technology Universiti Kebangsaan Malaysia Bangi Selangor Malaysia Al-Khawarizimi Institute of Computer Science (KICS) University of Engineering & Technology (UET) Lahore Pakistan College of Engineering Applied Science University Bahrain College of Informatics Korea University Seoul Republic of Korea Department of Computer Science TIMES Institute Multan Pakistan School of Computing Skyline University College University City Sharjah Sharjah UAE
Efficient management and cost-related factors in the power sector call for accurate short-term load forecasting as it enables better planning with the electric grid and achieving stability within it. This paper looks ... 详细信息
来源: 评论
FEST: Feature Enhancement Swin Transformer for Remote Sensing Image Semantic Segmentation
FEST: Feature Enhancement Swin Transformer for Remote Sensin...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Ronghuan Zhang Jing Zhao Ming Li Qingzhi Zou Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Intelligence and Information Engineering Shandong University of Traditional Chinese Medicine Jinan China
The global context is crucial for the precise segmentation of remote sensing images. However, the large volumes and high spatial resolutions of remote sensing images make efficient analysis of the entire scene challen... 详细信息
来源: 评论
Hybrid Deep Relation Matrix Bidirectional Approach for Relational Triple Extraction
Hybrid Deep Relation Matrix Bidirectional Approach for Relat...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Yushuai Hu Jing Zhao Ming Li Lin Yuan Qingzhi Zou Ronghuan Zhang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China School of Intelligence and Information Engineering Shandong University of Traditional Chinese Medicine Jinan China
Relation extraction is a crucial task within information extraction, and numerous models have demonstrated impressive results. However, most of the tagging-based relation triple extraction methods employ unidirectiona... 详细信息
来源: 评论
Topic-based Multi-layer Knowledge Filtering for Emotion Recognition in Conversation
Topic-based Multi-layer Knowledge Filtering for Emotion Reco...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xiaoyang Li Zhenyu Yang Yiwen Li Zhijun Li Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Emotion recognition in conversation (ERC) is a prominent research topic in natural language processing, widely applicable in various scenarios. However, accessing external commonsense knowledge and related dialogue to... 详细信息
来源: 评论