咨询与建议

限定检索结果

文献类型

  • 1,911 篇 会议
  • 352 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 2,321 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,447 篇 工学
    • 1,093 篇 计算机科学与技术...
    • 875 篇 软件工程
    • 352 篇 信息与通信工程
    • 214 篇 控制科学与工程
    • 167 篇 电气工程
    • 129 篇 生物工程
    • 123 篇 生物医学工程(可授...
    • 121 篇 电子科学与技术(可...
    • 79 篇 光学工程
    • 71 篇 机械工程
    • 67 篇 仪器科学与技术
    • 60 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 54 篇 动力工程及工程热...
    • 53 篇 化学工程与技术
  • 695 篇 理学
    • 412 篇 数学
    • 150 篇 物理学
    • 146 篇 生物学
    • 123 篇 统计学(可授理学、...
    • 105 篇 系统科学
    • 54 篇 化学
  • 426 篇 管理学
    • 268 篇 管理科学与工程(可...
    • 198 篇 图书情报与档案管...
    • 180 篇 工商管理
  • 112 篇 医学
    • 103 篇 临床医学
    • 95 篇 基础医学(可授医学...
    • 56 篇 药学(可授医学、理...
  • 78 篇 法学
    • 70 篇 社会学
  • 77 篇 教育学
    • 76 篇 教育学
  • 49 篇 经济学
    • 49 篇 应用经济学
  • 31 篇 农学
  • 10 篇 文学
  • 5 篇 艺术学
  • 4 篇 军事学

主题

  • 58 篇 accuracy
  • 43 篇 artificial intel...
  • 39 篇 computational mo...
  • 36 篇 feature extracti...
  • 32 篇 predictive model...
  • 32 篇 machine learning
  • 31 篇 data mining
  • 31 篇 training
  • 30 篇 computer science
  • 30 篇 software
  • 29 篇 neural networks
  • 28 篇 internet of thin...
  • 28 篇 real-time system...
  • 28 篇 data models
  • 25 篇 wireless sensor ...
  • 25 篇 security
  • 23 篇 students
  • 22 篇 information syst...
  • 22 篇 optimization
  • 22 篇 visualization

机构

  • 17 篇 school of inform...
  • 12 篇 networking and i...
  • 11 篇 international is...
  • 10 篇 international is...
  • 10 篇 dept. of compute...
  • 9 篇 dept. of compute...
  • 9 篇 sri lanka instit...
  • 8 篇 state key labora...
  • 8 篇 dept. computer s...
  • 8 篇 dept. of compute...
  • 7 篇 state key lab. o...
  • 7 篇 electrical and c...
  • 7 篇 state key labora...
  • 7 篇 dept. of compute...
  • 7 篇 dept. of informa...
  • 6 篇 volgograd state ...
  • 6 篇 dept. of informa...
  • 6 篇 computer and com...
  • 6 篇 information syst...
  • 6 篇 dept. of compute...

作者

  • 16 篇 fotiadis dimitri...
  • 15 篇 mesaritakis char...
  • 14 篇 nikumani choudhu...
  • 14 篇 zhu xiaoyan
  • 13 篇 huang minlie
  • 13 篇 xi zhang
  • 13 篇 bogris adonis
  • 10 篇 kartiwi mira
  • 10 篇 gunawan teddy su...
  • 9 篇 bossek jakob
  • 9 篇 gupta deepti
  • 9 篇 ioannis ch. pasc...
  • 9 篇 deligiannidis st...
  • 9 篇 dimitrios i. fot...
  • 8 篇 fotiadis d.i.
  • 8 篇 qiangfu zhao
  • 8 篇 petryshyn mykhai...
  • 8 篇 larsson aron
  • 8 篇 zhang xi
  • 8 篇 koushik reddy ch...

语言

  • 2,257 篇 英文
  • 42 篇 其他
  • 16 篇 中文
  • 4 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Information Systems and Computer Programming Dept."
2321 条 记 录,以下是61-70 订阅
排序:
A Taxonomic Classification of Insider Threats: Existing Techniques, Future Directions & Recommendations
收藏 引用
Journal of Cyber Security and Mobility 2023年 第2期12卷 221-252页
作者: Rauf, Usman Mohsen, Fadi Wei, Zhiyuan Dept. of Math. & Computer Science Mercy College NY United States Information Systems Group Bernoulli Institute for Mathematics Computer Science and Artificial Intelligence University of Groningen Groningen9712 CP Netherlands
In the last two decades, the number of rapidly increasing cyber incidents (i.e., data theft and privacy breaches) shows that it is becoming enormously difficult for conventional defense mechanisms and architectures to... 详细信息
来源: 评论
(POSTER) Insights from Executing TinyML Models on Smartphones and Microcontrollers  19
(POSTER) Insights from Executing TinyML Models on Smartphone...
收藏 引用
19th Annual International Conference on Distributed Computing in Smart systems and the Internet of Things, DCOSS-IoT 2023
作者: Singh, Harman M. Agashe, Shrishailya Jain, Shreyans Ghosh, Surjya Challa, Aditya Danda, Sravan Sen, Sougata Bits Pilani K K Birla Goa Campus Dept. of Computer Science and Information Systems India
In this paper, we empirically compare the system-level performances of executing a machine learning task on a resource-constrained IoT device and compare its performance to offloading the task to a more capable device... 详细信息
来源: 评论
Design of a Graduate level Software Engineering Program with a Product Perspective and a Product Management Specialization  35
Design of a Graduate level Software Engineering Program with...
收藏 引用
35th IEEE International Conference on Software Engineering Education and Training, CSEE and T 2023
作者: Pawar, Pravin Balasubramaniam, Sundar Ramachandran, Anita Bits Pilani Dept. of Computer Science & Information Systems Pune India Independent Consultant Bangalore India
While Software Engineering practice in the industry had matured well over the second half of the twentieth century, the first two decades of this millennium have witnessed disruptive growth of the field arising out of... 详细信息
来源: 评论
Architecture development of middleware and API for IOT-based Red Onion farming
Architecture development of middleware and API for IOT-based...
收藏 引用
2023 International Seminar on Application for Technology of information and Communication, iSemantic 2023
作者: Steven, Alvin Suharnawi Alzami, Farrikh Saputra, Filmada Ocky Megantara, Rama Aria Andono, Pulung Nurtantio Universitas Dian Nuswantoro Dept. of Information Systems Indonesia Universitas Dian Nuswantoro Dept. of Information Engineering Indonesia Universitas Dian Nuswantoro Faculty of Computer Science Indonesia
IoT plays a crucial role in transforming the agricultural industry by offering diverse use cases starting from crop monitoring and precision farming to yield optimization. The fundamental reason why the agricultural c... 详细信息
来源: 评论
A Sequential Pattern Mining Approach for Situation-Aware Human Activity Projection
A Sequential Pattern Mining Approach for Situation-Aware Hum...
收藏 引用
2024 IEEE International Conference on systems, Man, and Cybernetics, SMC 2024
作者: D'Aniello, Giuseppe Falcone, Roberto Gaeta, Matteo Rehman, Zia Ur Fortino, Giancarlo University of Salerno Dept. Information and Electrical Engineering and Applied Mathematics SA Fisciano Italy University of Calabria Dept. Computer Engineering Modeling Electronics and Systems Cs Rende Italy
Human activity prediction has become increasingly prevalent in a plethora of time-critical applications. To realize accurate identification and prediction of human behaviour, we propose a situation-aware wearable comp... 详细信息
来源: 评论
Mobile-Based Monitoring Application for Self-Isolation of COVID-19 Patients  6
Mobile-Based Monitoring Application for Self-Isolation of CO...
收藏 引用
6th International Conference on computer and Informatics Engineering, IC2IE 2023
作者: Miranda, Eka Zakiyyah, Alfi Yusrotis Richard Arvuni, Mediyana Kumbangsila, Meyske Dian Sano, Albert Verasius School of Information Systems Bina Nusantara University Dept. of Information Systems Karawang Indonesia School of Computer Science Bina Nusantara University Dept. of Mathematics Jakarta Indonesia Medical Doctor Community Health Service Jakarta Indonesia School of Computer Science Bina Nusantara University Dept. of Computer Science Jakarta Indonesia
This researcher intended to create a mobile-based Covid-19 patient monitoring application for primary health care as a safeguard for public health services to answer the research question of how to build a mobile-base... 详细信息
来源: 评论
Enhancing Human Resources Management with Blockchain Technology: A Case Study Approach  3
Enhancing Human Resources Management with Blockchain Technol...
收藏 引用
3rd International Conference on Creative Communication and Innovative Technology, ICCIT 2024
作者: Indiyati, Dian Rahardja, Untung Rusilowati, Umi Millah, Shofiyul Faturahman, Adam Fitriani, Anandha Telkom University School of Economics and Business Bandung Indonesia Universiti Teknologi Malaysia Dept. of Computer Science Johor Malaysia Pamulang University Dept. of Management South Tangerang Indonesia University of Raharja Dept. of Information Systems Tangerang Indonesia University of Raharja Dept. of Computer Systems Tangerang Indonesia Cai Sejahtera Indonesia0 Dept. of Digital Business Tangerang Indonesia
Blockchain technology has emerged as a transformative force in various sectors, including Human Resources (HR), promising enhanced security, transparency, and efficiency. The objective of this study is to explore the ... 详细信息
来源: 评论
Human Activity Recognition in Free Living Using a Wearable Sensor: A Two-Stage Approach  12
Human Activity Recognition in Free Living Using a Wearable S...
收藏 引用
12th International Conference on Awareness Science and Technology, iCAST 2023
作者: Li, Tianhui Zhou, Xue Kokubun, Kota Chen, Wenxi Division of Information System The University of Aizu Aizu-Wakamatsu Japan Dept. of Computer and Information Systems The University of Aizu Aizu-Wakamatsu Japan Dept. of Computer Science and Engineering The University of Aizu Aizu-Wakamatsu Japan
A novel two-stage approach for human activity recognition (HAR) using a wearable sensor is proposed in this study. The goal is to achieve both coarse-level and fine-level recognition of activities. The study focuses o... 详细信息
来源: 评论
Evaluation of Meteorological Factors’ Effect on Daily Heart Rate Variability Over Five Years  12
Evaluation of Meteorological Factors’ Effect on Daily Heart...
收藏 引用
12th International Conference on Awareness Science and Technology, iCAST 2023
作者: Kokubun, Kota Li, Tianhui Chen, Wenxi Dept. of Computer and Information Systems The University of Aizu Aizu-Wakamatsu Japan Division of Information System The University of Aizu Aizu-Wakamatsu Japan Dept. of Computer Science and Engineering The University of Aizu Aizu-Wakamatsu Japan
The aim of this study is to investigate the effect of meteorological factors on heart rate variability (HRV) derived from daily electrocardiogram (ECG) data. Daily meteorological data were obtained from the Japan Mete... 详细信息
来源: 评论
Security in remote access, based on Zero Trust Model concepts and SSH authentication with signed certificates  11
Security in remote access, based on Zero Trust Model concept...
收藏 引用
Advanced Topics in Optoelectronics, Microelectronics, and Nanotechnologies XI 2022
作者: Iță, Cristina-Raluca Constantinescu, Rodica-Claudia Vlădescu, Alexandru Alexandrescu, Bogdan Information and Computer Systems Engineering POLITEHNICA University of Bucharest Romania Applied Electronics and Information Engineering Dept. POLITEHNICA University of Bucharest Romania
This paper aims to resume the information on the various ways in which security can be achieved when it comes to accessing external resources from the outside through company devices or personal devices. When planning... 详细信息
来源: 评论