咨询与建议

限定检索结果

文献类型

  • 1,330 篇 会议
  • 893 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 2,238 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,403 篇 工学
    • 873 篇 计算机科学与技术...
    • 679 篇 软件工程
    • 331 篇 信息与通信工程
    • 254 篇 控制科学与工程
    • 170 篇 电子科学与技术(可...
    • 150 篇 电气工程
    • 133 篇 机械工程
    • 111 篇 生物工程
    • 106 篇 光学工程
    • 98 篇 仪器科学与技术
    • 76 篇 生物医学工程(可授...
    • 70 篇 土木工程
    • 58 篇 动力工程及工程热...
    • 58 篇 交通运输工程
    • 55 篇 材料科学与工程(可...
    • 55 篇 化学工程与技术
    • 50 篇 建筑学
    • 49 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 744 篇 理学
    • 351 篇 数学
    • 221 篇 物理学
    • 127 篇 生物学
    • 120 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 64 篇 化学
  • 352 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 134 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 104 篇 医学
    • 87 篇 临床医学
    • 61 篇 基础医学(可授医学...
  • 59 篇 法学
  • 39 篇 经济学
  • 27 篇 教育学
  • 27 篇 农学
  • 9 篇 军事学
  • 8 篇 艺术学
  • 5 篇 文学

主题

  • 53 篇 deep learning
  • 41 篇 computational mo...
  • 41 篇 feature extracti...
  • 39 篇 machine learning
  • 37 篇 optimization
  • 36 篇 computer science
  • 33 篇 accuracy
  • 31 篇 data mining
  • 31 篇 training
  • 28 篇 quality of servi...
  • 28 篇 semantics
  • 25 篇 hardware
  • 25 篇 convolutional ne...
  • 24 篇 internet of thin...
  • 24 篇 predictive model...
  • 23 篇 real-time system...
  • 23 篇 security
  • 23 篇 protocols
  • 22 篇 routing
  • 22 篇 genetic algorith...

机构

  • 34 篇 hubei province k...
  • 32 篇 department of co...
  • 27 篇 national enginee...
  • 25 篇 college of compu...
  • 24 篇 university of ch...
  • 18 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 big data science...
  • 14 篇 advanced institu...
  • 13 篇 institute of sys...
  • 12 篇 college of compu...
  • 12 篇 department of me...
  • 12 篇 graduate school ...
  • 12 篇 ieee
  • 12 篇 guangdong provin...
  • 11 篇 shenzhen huazhon...
  • 11 篇 science & techno...
  • 11 篇 department of co...
  • 11 篇 national compute...
  • 11 篇 college of infor...

作者

  • 21 篇 gaol ford lumban
  • 21 篇 shen linlin
  • 16 篇 matsuo tokuro
  • 14 篇 zheng changwen
  • 12 篇 hayashi eiji
  • 11 篇 robbi rahim
  • 11 篇 qiang wenwen
  • 11 篇 jun tao
  • 10 篇 darmawan napitup...
  • 10 篇 srinivas m.b.
  • 10 篇 thapliyal himans...
  • 10 篇 xiong hui
  • 10 篇 gao guohong
  • 10 篇 paramartha dutta
  • 9 篇 ye chen
  • 9 篇 kuang xiaohui
  • 9 篇 zhi zhang
  • 9 篇 arabnia hamid r.
  • 9 篇 zhao junqiao
  • 8 篇 liu zhe

语言

  • 2,102 篇 英文
  • 79 篇 其他
  • 56 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Institute of Information System and Engineer-Computer Technology"
2238 条 记 录,以下是211-220 订阅
排序:
Digital Image Encryption Based On Elliptic Curve Cryptography
Digital Image Encryption Based On Elliptic Curve Cryptograph...
收藏 引用
Sciences and Techniques of Automatic Control and computer engineering MI-STA, IEEE International Maghreb Meeting of the Conference on
作者: Mahmoud H. S. Hasan Medht H. S. H. Ahmed dept. Computer Science Alasmarya Islamic University College of Information Technology Zliten Libya dept. Communication Engineer Higher Institute of Engineering Technology Zliten Libya
information security is currently a major problem for data communication. Cryptography has emerged as a treatment and is essential to information security systems. Techniques for encryption can effectively prevent att... 详细信息
来源: 评论
An Enhanced Method for Detecting Attack in Collaborative Recommender system  1
An Enhanced Method for Detecting Attack in Collaborative Rec...
收藏 引用
1st International Conference in Advanced Innovation on Smart City, ICAISC 2023
作者: Zayed, Reda A. Hefny, Hesham A. Ibrahim, Lamiaa F. Salman, Hesham A. Cairo University Faculty of Graduate Studies for Statistical Research Computer Scinces Dep. Cairo Egypt Everyone's Smart University College of Informatics United Arab Emirates Higher Institute for Computers & Information Technology ElShorouk Management Information System Dep. Cairo Egypt
In recent decades, the advent of digital information services by YouTube, Amazon, Netflix, and many other web services of this kind have made recommendation systems more and more ubiquitous in our lives. rice field. T... 详细信息
来源: 评论
Stress Analysis and Care Prediction system for Online Workers  3
Stress Analysis and Care Prediction System for Online Worker...
收藏 引用
3rd International Conference on Advancements in Computing, ICAC 2021
作者: Amarasinghe, A.A.S.M. Malassri, I.M.S. Weerasinghe, K.C.N. Jayasingha, I.B. Abeygunawardhana, Pradeep K. W. Silva, Suranjini Sri Lanka Institute of Information Technology Department of Information Technology Colombo Sri Lanka Sri Lanka Institute of Information Technology Department of Computer System Engineering Colombo Sri Lanka
Working from home (WFH) online during the covid-19 pandemic has caused increased stress level. Online workers/students have been affecting by the crisis according to new researches. Natural response of body, to extern... 详细信息
来源: 评论
FogQSYM: An Industry 4.0 Analytical Model for Fog Applications
收藏 引用
computers, Materials & Continua 2021年 第12期69卷 3163-3178页
作者: M.Iyapparaja M.Sathish Kumar SSiva Rama Krishnan Chiranji Lal Chowdhary Byungun Yoon Saurabh Singh Gi Hwan Cho School of Information Technology and Engineering Vellore Institute of TechnologyVellore632014India Department of Industrial and System Engineering Dongguk UniversitySeoulKorea Division of Computer Science Jeonbuk National UniversityJeonjuKorea
Industry 4.0 refers to the fourth evolution of technology development,which strives to connect people to various industries in terms of achieving their expected outcomes ***,resource management in an Industry 4.0 netw... 详细信息
来源: 评论
Hotel information system Management Audit Using COBIT 2019 - APO12  2
Hotel Information System Management Audit Using COBIT 2019 -...
收藏 引用
2nd International Conference for Innovation in technology, INOCON 2023
作者: Utamajaya, Joy Nashar Supangat, Suhono Harso Gaol, Ford Lumban Ranti, Benny BINUS University BINUS Graduate Program School of Information System Jakarta Indonesia Bandung Institute of Technology School of Electrical Engineering and Informatic Bandung Indonesia Bina Nusantara University Computer Science Department BINUS Graduate Program Computer Science Jakarta Indonesia University of Indonesia Computer Science Department Faculty of Computer Science Depok Indonesia
In general, public or private organizations or companies have used information-based technology as a support to improve business performance to be more effective and efficient in order to achieve a company's busin... 详细信息
来源: 评论
Web Based User-Friendly Graphical Interface to Control Robots with ROS Environment  6
Web Based User-Friendly Graphical Interface to Control Robot...
收藏 引用
6th International Conference on information technology Research, ICITR 2021
作者: Rajapaksha, Dinodi Divyanjana Mohamed Nuhuman, Mohamed Nafeel Gunawardhana, Sewmini Dananji Sivalingam, Atchuthan Mohamed Hassan, Mohamed Nimran Rajapaksha, Samantha Jayawardena, Chandimal Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Computer System and Engineering Malabe Sri Lanka
We have proposed a web-based approach to controlling robots in simulation. This web application will provide a simple user interface to demonstrate the various capabilities of robots. It is intended to be used by begi... 详细信息
来源: 评论
Brain Tumour Identification Using MRI Images: Classification and Optimization Based Random-Coupled Neural Network with Cat Hunting Optimization
Brain Tumour Identification Using MRI Images: Classification...
收藏 引用
Machine Learning and Autonomous systems (ICMLAS), International Conference on
作者: Nandini N P. Vanajakshi Vidyarani H J Vani B A Vinod Kumar K P Shwethasree R Department of Computer Science and Engineering Dr. Ambedkar Institute of Technology Bangalore Karnataka Department of Information Science and Engineering Vivekananda Institute of Technology Bangalore Karnataka Department of Computer Science and Business System Dr. Ambedkar Institute of Technology Bangalore Karnataka Department of Information Science and Engineering Sri Krishna Institute of Technology Bangalore Karnataka Department of Computer Science and Engineering Dr Ambedkar Institute of Technology Bangalore Karnataka
Tumors in the brains may be Benign or malignant but they are growths of cells in the brain. Aches, seizures, vomiting, dementia, and impaired vision are generic symptoms of the ailment. In early diagnosis, detection o... 详细信息
来源: 评论
Analysis of EMI Mitigation Techniques in High Speed Printed Circuit Board  2
Analysis of EMI Mitigation Techniques in High Speed Printed ...
收藏 引用
2nd International Conference for Innovation in technology, INOCON 2023
作者: Anandan, M. Sajitha, L.P. Geerthik, S. Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of ECE Chennai India Agni College of Technology Department of Information Technology Chennai India R.M.K Engineering College Department of Computer Science and Business System Chennai India
To serve the numerous services, today's wireless communication devices require microwave network systems with multiband and multifunctional capabilities. A growing number of microwave circuits and parts that can h... 详细信息
来源: 评论
Decentralization of Identities Using Blockchain  10
Decentralization of Identities Using Blockchain
收藏 引用
10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and computer engineering, UPCON 2023
作者: Srivastava, Shreshth Grover, Veena Nallakaruppan, M.K. Krishwanth, B. Saravanan, K. Customer Engineering Qualcomm Hyderabad India School of Management Studies Noida Institute of Engineering and Technology Delhi NCR Noida India School of Computer Science Engineering and Information Systems Vit University Vellore India Cyber Security Engineer Datafoundry Private Limited India Kpr Institute of Engineering and Technology Department of Mechatronics Engineering Coimbatore India
Digital Identity Management has become an essential component of federal business units today. It involves the gathering and storing of an individual's personal information entrusted to identity providers. With an... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论