咨询与建议

限定检索结果

文献类型

  • 1,693 篇 会议
  • 1,349 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 3,109 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,027 篇 工学
    • 1,545 篇 计算机科学与技术...
    • 1,263 篇 软件工程
    • 450 篇 信息与通信工程
    • 255 篇 生物工程
    • 242 篇 控制科学与工程
    • 212 篇 电气工程
    • 160 篇 光学工程
    • 152 篇 电子科学与技术(可...
    • 146 篇 机械工程
    • 140 篇 生物医学工程(可授...
    • 72 篇 动力工程及工程热...
    • 72 篇 化学工程与技术
    • 70 篇 仪器科学与技术
    • 68 篇 安全科学与工程
    • 67 篇 网络空间安全
  • 1,023 篇 理学
    • 560 篇 数学
    • 285 篇 生物学
    • 272 篇 物理学
    • 168 篇 统计学(可授理学、...
    • 96 篇 系统科学
    • 88 篇 化学
  • 593 篇 管理学
    • 369 篇 管理科学与工程(可...
    • 249 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 148 篇 医学
    • 132 篇 临床医学
    • 111 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 108 篇 法学
    • 84 篇 社会学
  • 55 篇 经济学
    • 54 篇 应用经济学
  • 55 篇 教育学
  • 33 篇 农学
  • 17 篇 军事学
  • 12 篇 文学
  • 6 篇 艺术学
  • 2 篇 哲学

主题

  • 79 篇 computer science
  • 77 篇 machine learning
  • 72 篇 deep learning
  • 71 篇 software enginee...
  • 65 篇 training
  • 62 篇 feature extracti...
  • 53 篇 data mining
  • 53 篇 computational mo...
  • 52 篇 artificial intel...
  • 47 篇 accuracy
  • 42 篇 semantics
  • 41 篇 cloud computing
  • 39 篇 internet of thin...
  • 37 篇 predictive model...
  • 36 篇 software
  • 35 篇 optimization
  • 35 篇 data models
  • 34 篇 authentication
  • 32 篇 neural networks
  • 31 篇 support vector m...

机构

  • 70 篇 college of compu...
  • 64 篇 state key labora...
  • 46 篇 sri lanka instit...
  • 44 篇 school of comput...
  • 43 篇 school of inform...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 30 篇 sri lanka instit...
  • 30 篇 institute of inf...
  • 30 篇 department of co...
  • 28 篇 national enginee...
  • 27 篇 shenzhen institu...
  • 26 篇 university of ch...
  • 25 篇 department of in...
  • 24 篇 guangdong key la...
  • 23 篇 school of comput...
  • 23 篇 school of comput...
  • 23 篇 shanghai key lab...
  • 23 篇 institute of sof...
  • 22 篇 software enginee...

作者

  • 51 篇 shen linlin
  • 32 篇 das ashok kumar
  • 25 篇 mohammad s. obai...
  • 25 篇 du bo
  • 24 篇 fan guisheng
  • 23 篇 chen liqiong
  • 22 篇 obaidat mohammad...
  • 19 篇 mahmood khalid
  • 18 篇 ashok kumar das
  • 17 篇 yu huiqun
  • 16 篇 kasthurirathna d...
  • 16 篇 linlin shen
  • 16 篇 xie weicheng
  • 15 篇 tao dacheng
  • 15 篇 qiu daowen
  • 14 篇 wang wei
  • 13 篇 dharshana kasthu...
  • 13 篇 wei sun
  • 13 篇 xiaorui zhang
  • 13 篇 zhang liangpei

语言

  • 2,840 篇 英文
  • 220 篇 其他
  • 54 篇 中文
  • 2 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Software and Theory of Information Science and Engineering Institute"
3109 条 记 录,以下是421-430 订阅
排序:
Application of Neural Networks for Network Traffic Monitoring and Analysis  8
Application of Neural Networks for Network Traffic Monitorin...
收藏 引用
8th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2024
作者: Kushnerov, Oleksandr Murr, Pierre Herasymov, Serhii Milevskyi, Stanislav Melnyk, Marharyta Golovashych, Sergii Sumy State University Department of Economic Cybernetics Sumy Ukraine International University of Science and Technology in Kuwait Computer Engineering Department Kuwait Kuwait 'Kharkiv polytechnic institute' Cybersecurity department National Technical University Kharkiv Ukraine Set University Department of Cyber Security and information protection Kyiv Ukraine National Technical University 'Kharkiv polytechnic institute' Department of Software Engineering and Management Intelligent Technologies Kharkiv Ukraine
Monitoring and analyzing network traffic are critically important tasks in the context of increasing cyber threats. Traditional data processing methods often struggle to handle the large volumes and complexity of mode... 详细信息
来源: 评论
CDNet: Cross-frequency Dual-branch Network for Face Anti-Spoofing
CDNet: Cross-frequency Dual-branch Network for Face Anti-Spo...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Xiaobin Huang Qiufu Li Linlin Shen Xingwei Chen Computer Vision Institute School of Computer Science and Software Engineering. Shenzhen University Shenzhen Huafu Information Technology Co Ltd
Face anti-spoofing (FAS) defends the facial image recognition systems against the spoof attacks. While the imperceptible spoof cues in the facial images are usually represented in the images' high-frequency compon...
来源: 评论
Web Application to predict Skin Disease: An Approach Using Deep Learning Algorithm
Web Application to predict Skin Disease: An Approach Using D...
收藏 引用
Human-computer Interaction, Optimization and Robotic Applications (HORA), International Congress on
作者: Eelanila Thayalan Ayingaran Arumugavel Sharujan Ganeshan Makenthiran Dalaxshan Harinda Fernando Kaushalya Rajapakse Department of Information Technology Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
The Disease Prediction System revolutionizes healthcare with advanced machine learning techniques for early detection of skin diseases, notably focusing on skin cancer. Through image processing and Transfer Learning, ... 详细信息
来源: 评论
Smart Expiry Tracker and Product Recommender using Google ML Kit OCR Engine  2
Smart Expiry Tracker and Product Recommender using Google ML...
收藏 引用
2nd International Conference on Computational Intelligence and Network Systems, CINS 2024
作者: Krishanamurthy, Vallidevi Kurumthottam, Aleena Bosco Ali, Shireen Aliza Anandan, Paul Danny Kavitha, Muthu Subash Karthikeyan, K. Kumaresh, V. Manikandan, S. School of Computer Science and Engineering Vellore Institute of Technology Chennai India School of Mechanical Electrical and Manufacturing Engineering Loughborough University United Kingdom School of Information and Data Sciences Nagasaki University Japan Senior Data Analyst Ninjacart Bangalore India Software Development Engineer Vegrow Chennai India iOS App Developer Facilio Chennai India
Expiration dates play a crucial role in both personal and business contexts, influencing everything from health management to operational efficiency. Track Expiry Dates (TED) is a comprehensive mobile application desi... 详细信息
来源: 评论
AI Integration in the IT Professional Workplace: A Scoping Review and Interview Study with Implications for Education and Professional Competencies  2024
AI Integration in the IT Professional Workplace: A Scoping R...
收藏 引用
29th Working Group Reports on Innovation and Technology in computer science Education, ITiCSE WGR 2024
作者: Clear, Tony Cajander, Åsa Clear, Alison Mcdermott, Roger Daniels, Mats Divitini, Monica Forshaw, Matthew Humble, Niklas Kasinidou, Maria Kleanthous, Styliani Kultur, Can Parvini, Ghazaleh Polash, Mohammad Zhu, Tingting Department of Computer Science and Software Engineering Auckland University of Technology Auckland New Zealand Department of Information Technology Uppsala University Uppsala Sweden School of Business Eastern Institute of Technology Auckland New Zealand School of Computing Robert Gordon University Aberdeen United Kingdom Dpt. of Computer Science Norwegian University of Science and Technology Trondheim Norway The Alan Turing Institute Newcastle Upon Tyne United Kingdom Open University of Cyprus Nicosia Cyprus The Open University of Cyprus Nicosia Cyprus School of Computer Science Carnegie Mellon University PittsburghPA United States Manning College of Information and Computer Sciences University of Massachusetts Amherst Amherst United States School of Computer Science University of Sydney Sydney Australia Department of Geography Geomatics and Environment University of Toronto Mississauga Toronto Canada School of Computer Science Newcastle University Newcastle upon Tyne United Kingdom
As Artificial Intelligence (AI) continues transforming workplaces globally, particularly within the information Technology (IT) industry, understanding its impact on IT professionals and computing curricula is crucial... 详细信息
来源: 评论
Intelligent Gen: An Efficient On-Demand Access Protocol in MANETs using Network Simulator - 2  18
Intelligent Gen: An Efficient On-Demand Access Protocol in M...
收藏 引用
18th INDIAcom;11th International Conference on Computing for Sustainable Global Development, INDIACom 2024
作者: Ganesan, T. Murali, N. Murugan, S. Palani Peter, M. Chandrakumar Raj, P. Anand Manikandan, S. E.G.S. Pillay Engineering College Department of Computer Science and Engineering Tamil Nadu Nagapattinam India E.G.S. Pillay Engineering College Department of Artificial Intelligence & Data Science Tamil Nadu Nagapattinam India Periyar Maniammai Institute of Science & Technology Department of Software Engineering Tamil Nadu Thanjavur India E.G.S. Pillay Engineering College Department of Computer Science and Business Systems Tamil Nadu Nagapattinam India E.G.S. Pillay Engineering College Department of Information Technology Tamil Nadu Nagapattinam India
Mobile Ad-Hoc network is a self-configuring and multi-hop collection of mobile devices for making successful communication. The wireless and mobile communication process are encountered based on bandwidth, process con... 详细信息
来源: 评论
An LWE-Based Multi-Key Privacy-Preserving Distributed Deep Learning∗  23
An LWE-Based Multi-Key Privacy-Preserving Distributed Deep L...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Antwi-Boasiako, Emmanuel Zhou, Shijie Liao, Yongjian Danso, Ebenezer Kwaku School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Ghana Institute of Management and Public Administration Computer Science Department Accra Ghana China University for Development Studies Ghana
Privacy preservation in distributed deep learning (DDL) has received a lot of attention recently. One key approach to preserving privacy for DDL is the use of Homomorphic Encryption (HE), which allows computation on c... 详细信息
来源: 评论
Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture
收藏 引用
Journal of Advanced Research 2024年 62卷 155-163页
作者: Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Kharel, Rupak Das, Ashok Kumar Shetty, Sachin Rodrigues, Joel J.P.C. School of Psychology and Computer Science University of Central Lancashire Preston United Kingdom Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Yunlin 64002 Taiwan Department of Software Engineering The University of Lahore Lahore 54590 Pakistan Department of Computer Science University of Sahiwal Punjab Sahiwal 57000 Pakistan Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India Department of Modeling Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center and Center for Cybersecurity Education and Research Old Dominion University Suffolk 23435 VA United States COPELABS Lusófona University Campo Grande 376 Lisbon 1749-024 Portugal
Introduction: The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical... 详细信息
来源: 评论
A Real-time Cutting Model Based on Finite Element and Order Reduction
收藏 引用
computer Systems science & engineering 2022年 第10期43卷 1-15页
作者: Xiaorui Zhang Wenzheng Zhang Wei Sun Hailun Wu Aiguo Song Sunil Kumar Jha Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory of Bioelectronics Jiangsu Key Lab of Remote Measurement and ControlSchool of Instrument Science and EngineeringSoutheast UniversityNanjing210096China IT Fundamentals and Education Technologies Applications University of Information Technology and Management in RzeszowRzeszow Voivodeship100031Poland
Telemedicine plays an important role in Corona Virus Disease 2019(COVID-19).The virtual surgery simulation system,as a key component in telemedicine,requires to compute in ***,this paper proposes a realtime cutting mo... 详细信息
来源: 评论
Energy Efficiency Optimization for UAV-Assisted Cellular Networks: A Periodic Clustering-Based MATD3 Approach
Energy Efficiency Optimization for UAV-Assisted Cellular Net...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Liu, Fuhao Chen, Haoqiang Miao, Jiansong Zhang, Tao Zhang, Chuan Kang, Jiawen Niyato, Dusit Beijing University of Posts and Telecommunications School of Information and Communication Engineering Beijing China Beijing Smartchip Microelectronics Technology Company Limited Beijing China Beijing Jiaotong University School of Software Engineering Beijing China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing China Guangdong University of Technology School of Automation Guangzhou China Nanyang Technological University School of Computer Science and Engineering Singapore Singapore
With the advancement of unmanned aerial vehicles (UAVs) technology, UAV-assisted cellular networks (UACNs) have emerged as a new communication paradigm aimed at enhancing the coverage and capacity of ground networks. ... 详细信息
来源: 评论