咨询与建议

限定检索结果

文献类型

  • 1,915 篇 会议
  • 351 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 2,324 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,448 篇 工学
    • 1,094 篇 计算机科学与技术...
    • 875 篇 软件工程
    • 352 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 167 篇 电气工程
    • 129 篇 生物工程
    • 122 篇 生物医学工程(可授...
    • 120 篇 电子科学与技术(可...
    • 79 篇 光学工程
    • 70 篇 机械工程
    • 66 篇 仪器科学与技术
    • 60 篇 安全科学与工程
    • 59 篇 交通运输工程
    • 54 篇 动力工程及工程热...
    • 53 篇 化学工程与技术
  • 693 篇 理学
    • 411 篇 数学
    • 150 篇 物理学
    • 145 篇 生物学
    • 122 篇 统计学(可授理学、...
    • 105 篇 系统科学
    • 54 篇 化学
  • 426 篇 管理学
    • 268 篇 管理科学与工程(可...
    • 198 篇 图书情报与档案管...
    • 181 篇 工商管理
  • 111 篇 医学
    • 102 篇 临床医学
    • 94 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 77 篇 法学
    • 69 篇 社会学
  • 77 篇 教育学
    • 76 篇 教育学
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 31 篇 农学
  • 9 篇 文学
  • 5 篇 艺术学
  • 4 篇 军事学

主题

  • 60 篇 accuracy
  • 43 篇 artificial intel...
  • 39 篇 computational mo...
  • 37 篇 feature extracti...
  • 32 篇 predictive model...
  • 32 篇 machine learning
  • 31 篇 data mining
  • 31 篇 training
  • 30 篇 computer science
  • 30 篇 software
  • 29 篇 neural networks
  • 29 篇 real-time system...
  • 28 篇 internet of thin...
  • 28 篇 data models
  • 25 篇 wireless sensor ...
  • 25 篇 security
  • 23 篇 students
  • 22 篇 information syst...
  • 22 篇 optimization
  • 22 篇 visualization

机构

  • 17 篇 school of inform...
  • 12 篇 networking and i...
  • 11 篇 international is...
  • 10 篇 international is...
  • 10 篇 dept. of compute...
  • 9 篇 dept. of compute...
  • 9 篇 sri lanka instit...
  • 8 篇 state key labora...
  • 8 篇 dept. computer s...
  • 8 篇 dept. of compute...
  • 7 篇 state key lab. o...
  • 7 篇 electrical and c...
  • 7 篇 state key labora...
  • 7 篇 dept. of compute...
  • 7 篇 dept. of informa...
  • 6 篇 volgograd state ...
  • 6 篇 dept. of informa...
  • 6 篇 computer and com...
  • 6 篇 information syst...
  • 6 篇 dept. of compute...

作者

  • 16 篇 fotiadis dimitri...
  • 15 篇 mesaritakis char...
  • 14 篇 nikumani choudhu...
  • 14 篇 zhu xiaoyan
  • 13 篇 huang minlie
  • 13 篇 xi zhang
  • 13 篇 bogris adonis
  • 10 篇 kartiwi mira
  • 10 篇 gunawan teddy su...
  • 9 篇 bossek jakob
  • 9 篇 gupta deepti
  • 9 篇 ioannis ch. pasc...
  • 9 篇 deligiannidis st...
  • 9 篇 dimitrios i. fot...
  • 8 篇 fotiadis d.i.
  • 8 篇 qiangfu zhao
  • 8 篇 petryshyn mykhai...
  • 8 篇 larsson aron
  • 8 篇 zhang xi
  • 8 篇 koushik reddy ch...

语言

  • 2,099 篇 英文
  • 203 篇 其他
  • 16 篇 中文
  • 4 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Information Systems and Computer Programming Dept."
2324 条 记 录,以下是291-300 订阅
Optimal Auto Calling Algorithm for Real-Time Condition Reporting by Corruption Handling Officer  3
Optimal Auto Calling Algorithm for Real-Time Condition Repor...
收藏 引用
3rd International Conference on Electrical, Communication and computer Engineering, ICECCE 2021
作者: Ida Gani, Hamdan Faisal, Muhammad Rosnani Stmik Professional Dept. of Information System Makassar Indonesia Stmik Handayani Dept. of Computer Systems Makassar Indonesia
Corruption is a primary development challenge in Indonesia's economic and social field. In order to overcome these threats, Indonesia's government has been established the Corruption Eradication Commission (Ko... 详细信息
来源: 评论
CyberExpert: Towards an Automated Framework for Cybersecurity Expertise Acquisition and Mastery  53
CyberExpert: Towards an Automated Framework for Cybersecurit...
收藏 引用
53rd IEEE ASEE Frontiers in Education International Conference, FIE 2023
作者: Hatcher, William Harrison, Tyler Brown, Truman Hammad, Eman Texas A&m University - Commerce Rellis ISTAR Lab Computer Science & Information Systems Dept. BryanTX United States Texas A&m University ISTAR Lab College StationTX United States
The continuously increasing gap in cybersecurity workforce in numbers and in skill level, demands a fundamental shift in how we approach cybersecurity education and training. The complex and ever-evolving cybersecurit... 详细信息
来源: 评论
Optimizing Engagement Dynamics in E-Learning Environments with Insights and Strategic Approaches
Optimizing Engagement Dynamics in E-Learning Environments wi...
收藏 引用
Creative Communication and Innovative Technology (ICCIT), IEEE
作者: Novi Cholisoh Rio Wahyudin Anugrah Muhammad Faizal Fazri Syahrul Mu’Arif Wahid Reza Dani Pramudya Dept. of Information Management University of Raharja Tangerang Indonesia Dept. of Computer Systems Pandawan Sejahtera Indonesia Tangerang Indonesia Dept. of Business Intelligence Bosindo Tangerang Indonesia Dept. of Digital Business Sesindo Tangerang Indonesia Dept. of Information Technology Pandawan Sejahtera Indonesia Tangerang Indonesia
This study explores the factors influencing student engagement in e-learning and proposes strategies for improvement. It incorporates a mixed-method approach, combining quantitative data from a learner survey with qua... 详细信息
来源: 评论
Secure Deduplication with Dynamic Key Management in Fog Enabled Internet of Things
Secure Deduplication with Dynamic Key Management in Fog Enab...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Jay Dave Nikumani Choudhury Utkarsh Tiwari Samyu Kamtam Kudapa Sai Rohith Dept. of Computer Science & Information Systems Birla Institute of Technology & Science Pilani Hyderabad India
Fog computing is an extension of cloud computing and presents additional devices called fog devices near IoT devices providing services on behalf of cloud servers. Although fog computing brings several advantages, rap...
来源: 评论
What Kinds of Contracts Do ML APIs Need?
arXiv
收藏 引用
arXiv 2023年
作者: Khairunnesa, Samantha Syeda Ahmed, Shibbir Imtiaz, Sayem Mohammad Rajan, Hridesh Leavens, Gary T. Dept. of Computer Science and Information Systems Bradley University United States Dept. of Computer Science Iowa State University United States Dept. of Computer Science University of Central Florida United States
Recent work has shown that Machine Learning (ML) programs are error-prone and called for contracts for ML code. Contracts, as in the design by contract methodology, help document APIs and aid API users in writing corr... 详细信息
来源: 评论
An Automatic Generation of Test Cases in JUnit Testing Framework Using Genetic Algorithm
An Automatic Generation of Test Cases in JUnit Testing Frame...
收藏 引用
International Conference on systems and Control (ICSC)
作者: Mabroukah Amarif Aisha Alfitouri Zaydan Allag Dept. of Information Systems Faculty of Information Technology Sebha University of Libya Sebha Libya Dept. of Computer Sciences Faculty of Information Technology Sebha University of Libya Sebha Libya Dept. of Computer Sciences Information Technology Faculty Sebha University of Libya Sebha Libya
The testing phase is one of the most important phases of the software life cycle, which ensures the efficiency and quality of the software product. Many tests are conducted on the software, not only to detect errors, ...
来源: 评论
Utilizing low-cost optical sensor for the measurement of particulate matter and calculating Pearson's correlation coefficient  16
Utilizing low-cost optical sensor for the measurement of par...
收藏 引用
16th International Conference on Correlation Optics, COR 2023
作者: Kirešová, Simona Rusyn, Volodymyr Guzan, Milan Vorobets, George Sobota, Branislav Vorobets, Oleksandr Dept. of Theoretical and Industrial Electrical Engineering Technical University of Košice Letná 9 Košice042 00 Slovakia Dept. of Radio Engineering and Information Security Yuriy Fedkovych Chernivtsi National University 2 Kotsjubynskyi Str. Chernivtsi58000 Ukraine Dept. of Computer Systems and Networks Yuriy Fedkovych Chernivtsi National University 2 Kotsjubynskyi Str. Chernivtsi58000 Ukraine Dept. of Computers and Informatics Technical University of Košice Letná 9 Košice042 00 Slovakia
This article discusses the possibilities of measuring Particulate Matter using optical low-cost sensors. Depending on the sensor used, not only can there be problems with the positioning of the sensor with respect to ... 详细信息
来源: 评论
Aligning Value Creation in Ecosystems through Roadmapping
Aligning Value Creation in Ecosystems through Roadmapping
收藏 引用
2022 Informatik in den Naturwissenschaften, INFORMATIK 2022 - 2022 computer Science in the Natural Sciences, INFORMATIK 2022
作者: Petrik, Dimitri Trieflinger, Stefan Schönhofen, Felix University of Stuttgart Dept. VIII: Information Systems II Stuttgart70174 Germany Hochschule Reutlingen Computer Science Alteburgstraße 150 Reutlingen72762 Germany
There is a growing consensus in research and practice that value-creating networks and ecosystems are supplementing the traditional distinction between the internal firm and market perspectives. To achieve joint value... 详细信息
来源: 评论
Does Sri Lanka Have a Good Maritime Strategy to Stop Cyber-Terrorist Attacks
Does Sri Lanka Have a Good Maritime Strategy to Stop Cyber-T...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Samaraweera S. A. R. P Siriwardana S. M. D. N W. D. V. Fernando D. N. Rajakarunaratne Dept. of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
Maritime cyber-terrorist attacks have become a major concern to the entire world in recent decades. Everyone should be more aware of marine strategies to prevent cyberterrorist attacks, both locally and globally. This...
来源: 评论
TangiGuru: Tangible E-Learning Solution for Early Childhood Development  4
TangiGuru: Tangible E-Learning Solution for Early Childhood ...
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Hettiarachchi, Thiwanka Cholitha Semasinghe, Lakisuru Sathyajith Lokuliyana, Shashika Gamage, Narmada de Silva, Rajitha Dept. Computer Systems Engineering Sri Lanka Institute of Information Technology Sri Lanka Lincoln Institute for Agri-Food Technology University of Lincoln United Kingdom
Exploration and manipulation of physical objects are essential for early childhood learning. Previous investigations found several TUI uses in other fields. Less research has been done on tangible learning for youngst... 详细信息
来源: 评论