咨询与建议

限定检索结果

文献类型

  • 24,314 篇 会议
  • 11,156 篇 期刊文献
  • 21 册 图书
  • 11 篇 学位论文

馆藏范围

  • 35,502 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21,331 篇 工学
    • 16,181 篇 计算机科学与技术...
    • 12,865 篇 软件工程
    • 4,699 篇 信息与通信工程
    • 3,163 篇 控制科学与工程
    • 2,041 篇 电气工程
    • 2,030 篇 生物工程
    • 1,673 篇 电子科学与技术(可...
    • 1,490 篇 生物医学工程(可授...
    • 1,348 篇 机械工程
    • 947 篇 光学工程
    • 906 篇 仪器科学与技术
    • 735 篇 动力工程及工程热...
    • 724 篇 安全科学与工程
    • 707 篇 化学工程与技术
  • 10,049 篇 理学
    • 5,571 篇 数学
    • 2,310 篇 生物学
    • 2,223 篇 物理学
    • 1,793 篇 统计学(可授理学、...
    • 1,422 篇 系统科学
    • 773 篇 化学
  • 7,282 篇 管理学
    • 4,249 篇 管理科学与工程(可...
    • 3,511 篇 图书情报与档案管...
    • 2,585 篇 工商管理
  • 1,645 篇 医学
    • 1,406 篇 临床医学
    • 1,199 篇 基础医学(可授医学...
    • 699 篇 公共卫生与预防医...
    • 674 篇 药学(可授医学、理...
  • 1,266 篇 法学
    • 1,043 篇 社会学
  • 977 篇 经济学
    • 967 篇 应用经济学
  • 938 篇 教育学
    • 896 篇 教育学
  • 407 篇 农学
  • 188 篇 文学
  • 87 篇 军事学
  • 76 篇 艺术学
  • 23 篇 哲学
  • 10 篇 历史学

主题

  • 1,361 篇 information syst...
  • 1,324 篇 computer science
  • 587 篇 computational mo...
  • 560 篇 deep learning
  • 494 篇 machine learning
  • 471 篇 data mining
  • 443 篇 feature extracti...
  • 390 篇 training
  • 363 篇 accuracy
  • 357 篇 internet of thin...
  • 355 篇 application soft...
  • 341 篇 computer archite...
  • 290 篇 support vector m...
  • 269 篇 educational inst...
  • 268 篇 routing
  • 261 篇 neural networks
  • 259 篇 information tech...
  • 259 篇 semantics
  • 245 篇 testing
  • 238 篇 protocols

机构

  • 168 篇 school of inform...
  • 164 篇 department of in...
  • 150 篇 school of comput...
  • 78 篇 institute of inf...
  • 74 篇 information syst...
  • 73 篇 school of comput...
  • 72 篇 school of comput...
  • 66 篇 department of in...
  • 63 篇 department of co...
  • 54 篇 department of sy...
  • 53 篇 faculty of compu...
  • 43 篇 department of la...
  • 43 篇 school of comput...
  • 42 篇 department of sy...
  • 39 篇 school of comput...
  • 35 篇 department of in...
  • 34 篇 computer science...
  • 34 篇 faculty of compu...
  • 33 篇 department of in...
  • 31 篇 school of comput...

作者

  • 114 篇 niyato dusit
  • 65 篇 abdelwahed motwa...
  • 43 篇 xiong zehui
  • 40 篇 sun maosong
  • 39 篇 guo hong
  • 38 篇 prabowo harjanto
  • 38 篇 radwa marzouk
  • 34 篇 liu yang
  • 33 篇 abu sarwar zaman...
  • 31 篇 qiangfu zhao
  • 31 篇 shen xuemin
  • 29 篇 bernhard schölko...
  • 28 篇 mohammed rizwanu...
  • 27 篇 jie li
  • 26 篇 dina fitria mura...
  • 26 篇 xi zhang
  • 25 篇 li li
  • 25 篇 el-bakry hazem m...
  • 24 篇 mastorakis nikos
  • 24 篇 warnars harco le...

语言

  • 34,331 篇 英文
  • 904 篇 其他
  • 253 篇 中文
  • 24 篇 日文
  • 9 篇 德文
  • 6 篇 斯洛文尼亚文
  • 2 篇 西班牙文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 2 篇 土耳其文
检索条件"机构=Information and Computer Systems in Systems in"
35502 条 记 录,以下是4981-4990 订阅
排序:
Scenario-Based Field Testing of Drone Missions
Scenario-Based Field Testing of Drone Missions
收藏 引用
Euromicro Conference on Software Engineering and Advanced Applications (SEAA)
作者: Michael Vierhauser Kristof Meixner Stefan Biffl Department of Computer Science University of Innsbruck Austria CDL-SQI Vienna Austria Institute of Information Systems Engineering TU Wien Vienna Austria CDP Vienna Austria
Testing and validating Cyber-Physical systems (CPSs) in the aerospace domain, such as field testing of drone rescue missions, poses challenges due to volatile mission environments, such as weather conditions. While te... 详细信息
来源: 评论
Social Media as an Instant Source of Feedback on Water Quality
IEEE Transactions on Technology and Society
收藏 引用
IEEE Transactions on Technology and Society 2023年 第4期4卷 325-333页
作者: Ahmad, K. Ayub, M.A. Ahmad, K. Khan, J. Ahmad, Nasir Al-Fuqaha, A. Jeonbuk National University Department of Information and Electronics Engineering Jeonju54896 Korea Republic of University of Engineering and Technology Peshawar Department of Computer Systems Engineering Peshawar2500 Pakistan Munster Technological University Department of Computer Science Cork021 T12 P928 Ireland AJOU University Department of Artificial Intelligence Suwon16499 Korea Republic of Hamad Bin Khalifa University College of Science and Engineering Doha Qatar
This article focuses on an important environmental challenge: the measurement of water quality, by analyzing the potential of social media to be harnessed as an immediate source of feedback. The goal of the work is to... 详细信息
来源: 评论
Enhancing 3D Human Pose Estimation Amidst Severe Occlusion with Dual Transformer Fusion
arXiv
收藏 引用
arXiv 2024年
作者: Ghafoor, Mehwish Mahmood, Arif Bilal, Muhammad Department of Computer Science Information Technology University Lahore Pakistan Center of Excellence in Intelligent Engineering Systems Department of Electrical and Computer Engineering Faculty of Engineering King Abdulaziz University Jeddah21589 Saudi Arabia
In the field of 3D Human Pose Estimation from monocular videos, the presence of diverse occlusion types presents a formidable challenge. Prior research has made progress by harnessing spatial and temporal cues to infe... 详细信息
来源: 评论
Baby Bump: A Monitoring System for Pregnant Mothers and Babies
Baby Bump: A Monitoring System for Pregnant Mothers and Babi...
收藏 引用
International Conference for Convergence of Technology (I2CT)
作者: Dhanuka Balasooriya Sasini Perera Dinuka R. Wijendra Sahani Rathnayaka Rajendra Kishan Karthiga Rajendran Markandu Thirukumar Department of Computer Systems and Software Engineering Sri Lankan Institute of Information Technology Malabe Sri Lanka Department of Obstetrics & Gynaecology Teaching Hospital Batticaloa Sri Lanka
In contemporary times, nations like Sri Lanka are actively enhancing their efforts to improve the life expectancy of their citizens, with a strong focus on public health. The relationship between health and life expec... 详细信息
来源: 评论
Employing Two-Dimensional Word Embedding for Difficult Tabular Data Stream Classification
arXiv
收藏 引用
arXiv 2024年
作者: Zyblewski, Pawel Department of Systems and Computer Networks Faculty of Information and Communication Technology Wroclaw University of Science and Technology Wybrzeże Wyspiańskiego 27 Wroclaw50-370 Poland
Rapid technological advances are inherently linked to the increased amount of data, a substantial portion of which can be interpreted as data stream, capable of exhibiting the phenomenon of concept drift and having a ... 详细信息
来源: 评论
Unveiling the Black Box: Neural Cryptanalysis with XAI
Unveiling the Black Box: Neural Cryptanalysis with XAI
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Yue-Tian Goi Shu-Min Leong Raphaël C.-W. Phan Shangqi Lai Ana Sălăgean School of Information Technology Monash University Distributed Systems Security Group CSIRO's Data61 Australia Department of Computer Science Loughborough University UK
At CRYPTO'19, Gohr[1] presented ResNet-based neural distinguishers (ND) for the round-reduced SPECK32/64 cipher. However, due to the black-box use of such deep learning models, it is hard for humans to understand ... 详细信息
来源: 评论
Behavioral Cybersecurity: Dynamic Persuasive Strategies to Enhance Password Security
Behavioral Cybersecurity: Dynamic Persuasive Strategies to E...
收藏 引用
International Conference of computer and Informatics Engineering (IC2IE)
作者: Husam Lahza Badr Alsamani Information Technology Department. Faculty of Computing and Information Technology King Abdulaziz University (KAU) Jeddah Saudi Arabia Information Systems Department. College of Computer and Information Sciences Imam Mohammad Ibn Saud Islamic University (IMSIU) Riyadh Saudi Arabia
This paper introduces dynamic, persuasive strategies within the realm of behavioral cybersecurity to combat the persistent issue of password vulnerabilities. Utilizing the principles of the Fogg Behavioral Model, we d... 详细信息
来源: 评论
An Adaptive Decision-Making Approach for Better Selection of Blockchain Platform for Health Insurance Frauds Detection with Smart Contracts: Development and Performance Evaluation  14
An Adaptive Decision-Making Approach for Better Selection of...
收藏 引用
14th International Conference on Ambient systems, Networks and Technologies Networks, ANT 2023 and The 6th International Conference on Emerging Data and Industry 4.0, EDI40 2023
作者: Kaafarani, Rima Ismail, Leila Zahwe, Oussama ICCS-Lab Computer Science Department American University of Culture and Education Beirut1507 Lebanon Laboratory School of Computing and Information Systems The University of Melbourne Melbourne Australia Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University Abu Dhabi United Arab Emirates National Water and Energy Center United Arab Emirates University Abu Dhabi United Arab Emirates
Blockchain technology has piqued the interest of businesses of all types, while consistently improving and adapting to business requirements. Several blockchain platforms have emerged, making it challenging to select ... 详细信息
来源: 评论
Dynamic Programming Algorithm using Furniture Industry 0/1 Knapsack Problem
Dynamic Programming Algorithm using Furniture Industry 0/1 K...
收藏 引用
International Conference on Cybernetics and Intelligent System (ICORIS)
作者: Mietha Anditta Natashya Amartya Laurens Spits Warnars Harco Leslie Hendric Spits Warnars Arief Ramadhan Teddy Siswanto Teddy Mantoro Nurulhuda Noordin Computer Science Departement School of Computer Science Bina Nusantara University Jakarta Indonesia Information Systems Departement School of Information Systems Bina Nusantara University Jakarta Indonesia Computer Science Departement BINUS Graduate Program - Computer Science Bina Nusantara University Jakarta Indonesia PJJ Informatika Telkom University Bandung Indonesia Information Systems Department Trisakti University Jakarta Indonesia Faculty of Engineering and Technology Sampoerna University Jakarta Indonesia School of Computing Sciences College of Computing Informatics and Mathematics Universiti Teknologi MARA Selangor Malaysia
Dynamic programming is a fundamental algorithm that can be found in our daily lives easily. One of the dynamic programming algorithm implementations consists of solving the 0/1 knapsack problem. A 0/1 knapsack problem...
来源: 评论
Leveraging Explainable AI for Actionable Insights in IoT Intrusion Detection
Leveraging Explainable AI for Actionable Insights in IoT Int...
收藏 引用
IEEE International Conference on System of systems Engineering (SoSE)
作者: Sohan Gyawali Jiaqi Huang Yili Jiang Department of Technology Systems East Carolina University Greenville North Carolina Department of Computer Science and Cybersecurity University of Central Missouri Warrensburg Missouri Department of Computer and Information Science University of Mississippi University Mississippi
The rise of IoT networks has heightened the risk of cyber attacks, necessitating the development of robust detection methods. Although deep learning and complex models show promise in identifying sophisticated attacks... 详细信息
来源: 评论