咨询与建议

限定检索结果

文献类型

  • 1,045 篇 会议
  • 642 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,690 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 892 篇 工学
    • 610 篇 计算机科学与技术...
    • 506 篇 软件工程
    • 188 篇 信息与通信工程
    • 125 篇 生物工程
    • 114 篇 电气工程
    • 111 篇 生物医学工程(可授...
    • 108 篇 控制科学与工程
    • 83 篇 电子科学与技术(可...
    • 77 篇 光学工程
    • 55 篇 化学工程与技术
    • 50 篇 机械工程
    • 42 篇 仪器科学与技术
    • 42 篇 材料科学与工程(可...
    • 41 篇 环境科学与工程(可...
    • 40 篇 安全科学与工程
    • 39 篇 动力工程及工程热...
  • 566 篇 理学
    • 210 篇 数学
    • 208 篇 物理学
    • 159 篇 生物学
    • 90 篇 统计学(可授理学、...
    • 67 篇 化学
  • 287 篇 管理学
    • 178 篇 管理科学与工程(可...
    • 115 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 154 篇 医学
    • 126 篇 临床医学
    • 110 篇 基础医学(可授医学...
    • 64 篇 药学(可授医学、理...
    • 55 篇 公共卫生与预防医...
  • 60 篇 法学
    • 52 篇 社会学
  • 45 篇 经济学
    • 45 篇 应用经济学
  • 41 篇 农学
  • 40 篇 教育学
  • 5 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 57 篇 accuracy
  • 46 篇 training
  • 45 篇 deep learning
  • 37 篇 machine learning
  • 33 篇 computational mo...
  • 30 篇 convolutional ne...
  • 27 篇 data mining
  • 25 篇 predictive model...
  • 25 篇 feature extracti...
  • 25 篇 artificial intel...
  • 24 篇 internet of thin...
  • 23 篇 support vector m...
  • 21 篇 forecasting
  • 19 篇 data models
  • 18 篇 fuzzy logic
  • 18 篇 education
  • 18 篇 information tech...
  • 18 篇 real-time system...
  • 17 篇 optimization
  • 16 篇 medical services

机构

  • 20 篇 computer science...
  • 20 篇 bioinformatics a...
  • 16 篇 bioinformatics a...
  • 16 篇 maharishi school...
  • 16 篇 faculty of commu...
  • 14 篇 computer science...
  • 14 篇 centre of interd...
  • 14 篇 information syst...
  • 14 篇 school of inform...
  • 12 篇 department of ma...
  • 12 篇 bioinformatics a...
  • 11 篇 department of in...
  • 11 篇 faculty of infor...
  • 11 篇 department of el...
  • 11 篇 computer science...
  • 11 篇 department of co...
  • 10 篇 department of co...
  • 10 篇 computer science...
  • 9 篇 information syst...
  • 9 篇 department of ma...

作者

  • 42 篇 bens pardamean
  • 35 篇 pardamean bens
  • 16 篇 rahutomo reza
  • 14 篇 reza rahutomo
  • 13 篇 suharjito
  • 12 篇 sfenrianto
  • 11 篇 niyato dusit
  • 11 篇 wahyu sardjono
  • 11 篇 du hongyang
  • 11 篇 utama ditdit nug...
  • 10 篇 kurniasih nuning
  • 10 篇 iskandar akbar
  • 10 篇 benfano soewito
  • 10 篇 kang jiawen
  • 9 篇 chang chin-chih
  • 9 篇 nuning kurniasih
  • 9 篇 fergyanto e. gun...
  • 9 篇 alam ahmad hiday...
  • 9 篇 xiong zehui
  • 9 篇 sfenrianto sfenr...

语言

  • 1,574 篇 英文
  • 91 篇 其他
  • 16 篇 中文
  • 8 篇 日文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
检索条件"机构=Master Program in Department of Information and Computer Engineering"
1690 条 记 录,以下是141-150 订阅
排序:
Understanding and Developing the Integration of Encapsulating Security Payload in Wireless Network Security
Understanding and Developing the Integration of Encapsulatin...
收藏 引用
2023 IEEE International Conference on Paradigm Shift in information Technologies with Innovative Applications in Global Scenario, ICPSITIAGS 2023
作者: Haroon, Syed Jangid, Pradeep Kumar Singh, Jagtej Naveena, S. Sathiya Manisha, P. Singh, Vaishali Department of Computer Science and Information Technology Karnataka Bangalore India Vivekananda Global University Department of Electrical Engineering Jaipur India Centre of Interdisciplinary Research in Business and Technology Chitkara University Institute of Engineering and Technology Chitkara University Punjab India Prince Shri Venkateshwara Padmavathy Engineering College Department of Master of Business Administration Chennai India Vishwakarma Institute of Information Technology Department of Computer Engineering Pune India Maharishi School of Engineering and Technology Maharishi University of Information Technology UP India
The integration of Encapsulating security Payload (ESP) right into a wireless community safety device calls for careful know-how and improvement. ESP is a crucial security protocol which offers an authentication heade... 详细信息
来源: 评论
Analyzing the Benefits of Applying Machine Learning to Real-Time Data Analysis  3
Analyzing the Benefits of Applying Machine Learning to Real-...
收藏 引用
3rd International Conference on Smart Generation Computing, Communication and Networking, SMART GENCON 2023
作者: Yadav, Rakesh Kumar Mahesh, T.R. Kumar, Ajay Jayadurga, R. Vishal, A. Sood, Gourav Maharishi School of Engineering and Technology Maharishi University of Information Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Computer Science and Engineering Karnataka Bangalore India Department of Computer Science & Engineering Vivekananda Global University Jaipur India Prince Shri Venkateshwara Padmavathy Engineering College Department of Master of Business Administration Chennai127 India Department of Computer Engineering Vishwakarma Institute of Information Technology Pune India Centre of Interdisciplinary Research in Business and Technology Chitkara University Institute of Engineering and Technology Chitkara University Punjab India
The application of device learning to actual-time data analysis has the potential to revolutionize the way businesses make decisions. With the capacity to procedure big volumes of data fast and correctly, system learn... 详细信息
来源: 评论
Multi-Normalization Residual Graph Convolutional Network for 3D Human Pose Estimation
Multi-Normalization Residual Graph Convolutional Network for...
收藏 引用
2025 International Workshop on Advanced Imaging Technology, IWAIT 2025
作者: Pramono, Andy Chang, I-Cheng Puspasari, Betty Dewi Animation Study Program Universitas Negeri Malang Jawa Timur Malang Indonesia Department of Computer Science and Information Engineering National Dong Hwa University Hualien Taiwan Department of Informatics Engineering Institut Teknologi Nasional Malang Jawa Timur Malang Indonesia
3D human pose estimation (HPE) has improved significantly through Graph Convolutional Networks (GCNs), which effectively model body part ***, GCNs have limitations, including uniform feature transformations across nod... 详细信息
来源: 评论
An Analysis of the Impact of DNS-Based Authentication on Wireless Network Security  1
An Analysis of the Impact of DNS-Based Authentication on Wir...
收藏 引用
1st IEEE International Conference on Emerging Research in Computational Science, ICERCS 2023
作者: Gawali, Piyush P. Das, Neeraj Rajesh, A. Shukla, Anupam Sohal, Jagmeet Jayadurga, R. Vishwakarma Institute of Information Technology Department of Computer Engineering Pune India Maharishi University of Information Technology Maharishi School of Engineering and Technology Uttar Pradesh India Faculty of Engineering and Technology Department of Computer Science Engineering Karnataka Bangalore India Vivekananda Global University Department of Computer Science & Engineering Jaipur India Chitkara University Institute of Engineering and Technology Chitkara University Centre of Interdisciplinary Research in Business and Technology Punjab India Prince Shri Venkateshwara Padmavathy Engineering College Department of Master of Business Administration Chennai127 India
This paper investigates the effect of DNS-primarily based authentication on wireless network safety. DNS-primarily based authentication is used to authenticate consumer credentials on Wi-Fi networks, generally primari... 详细信息
来源: 评论
Comparing Classification Algorithms to Analyze Twitter Sentiment on Public Opinion on Fuel Oil  24
Comparing Classification Algorithms to Analyze Twitter Senti...
收藏 引用
24th International Seminar on Intelligent Technology and Its Applications, ISITIA 2023
作者: Widarma, Gita Novita, Rice Mustakim Rozanda, Nesdi Evrilyan Universitas Islam Negeri Sultan Syarif Kasim Riau Graduate Program Information Systems Department Pekanbaru Indonesia Postgraduate Programs Universitas Negeri Padang Information Systems Pekanbaru Indonesia Postgraduate Programs Institut Pertanian Bogor Master of Informatics Engineering Pekanbaru Indonesia Postgraduate Programs Universiti Teknologi Malaysia Master of Information Systems Management Pekanbaru Indonesia
Twitter is currently used as one of the applications that is often used to convey opinions or unrest by the public such as the current issue that is currently rife, namely regarding the increase in fuel oil prices (BB... 详细信息
来源: 评论
Artificial Intelligence Identification Model for Chronic Kidney Disease  1
收藏 引用
5th International Conference on Innovative Computing, IC 2022
作者: Cheng, Ya-Fang Lee, Hsiu-An Hsu, Chien-Yeh Department of Information Management National Taipei University of Nursing and Health Sciences Taipei Taiwan Department of Computer Science and Information Engineering Tamkang University New Taipei Taiwan Master Program in Global Health and Development Taipei Medical University Taipei Taiwan
Many people suffer from Chronic Kidney Disease (CKD). Nowadays, CKD is one of the top ten causes of death. CKD should via invasive examination to understand participants health status. If a non-invasive identification... 详细信息
来源: 评论
Effective Bandwidth Based Distributed DoS Attack Detection and Source Identification Using Maximum Flow Techniques
Effective Bandwidth Based Distributed DoS Attack Detection a...
收藏 引用
Intelligent Data Communication Technologies and Internet of Things (IDCIoT), International Conference on
作者: T. Subburaj K. Suthendran Darshan P Deeraj C Jai Shankar M Pushpalatha G Department of Master of Computer Applications Rajarajeswari College of Engineering Bangalore Department of Information Technology Kalasalingam Academy of Research and Education TamilNadu
The DDoS attack is one of the most threatening factors affecting the internet services. Now days, most of the common attacks are targeting the gaming industry, online shopping web sites followed by the software and me... 详细信息
来源: 评论
The Efficient Traffic Sign Detection and Recognition for Taiwan Road Using YOLO Model with Hybrid Dataset
The Efficient Traffic Sign Detection and Recognition for Tai...
收藏 引用
International Conference on Applied System Innovation (ICASI)
作者: Taweelap Suwattanapunkul Lung-Jen Wang International Master Program in Information Technology and Applications National Pingtung University Taiwan Department of Computer Science and Information Engineering National Pingtung University Taiwan
According to the trend of worldwide car sales have grown up, this cause may increase accidents on the road due to human error. The self-driverless car has been developed to solve this problem. One task of the self-dri...
来源: 评论
On Efficient Processing of Queries for Live Multi-Streaming Soiree Organization
收藏 引用
IEEE Transactions on Services Computing 2023年 第4期16卷 2812-2826页
作者: Kankeu Fotsing, C.P. Shen, Chih-Ya Huang, Liang-Hao Chen, Yi-Shin Lee, Wang-Chien Yang, De-Nian International Graduate Program Academia Sinica Social Networks and Human-Centered Computing Program Taipei115 Taiwan National Tsing Hua University Institute of Information Systems and Applications Hsinchu300 Taiwan National Tsing Hua University Department of Computer Science Hsinchu300 Taiwan Academia Sinica Institute of Information Science Taipei115 Taiwan Pennsylvania State University Department of Computer Science and Engineering State CollegePA16801 United States
Real-time social interactions and multi-streaming are two critical features of live streaming services. In this paper, we formulate a new fundamental service query, Social-aware Diverse and Preferred Organization Quer... 详细信息
来源: 评论
Random Number Generator for Securing Data Exchange in Smart Factory: Recent Trends and Best Practices
Random Number Generator for Securing Data Exchange in Smart ...
收藏 引用
computer Technologies (ICCTech), International Conference on
作者: Andi Sama Meyliana Yaya Heryadi Taufik Roni Sahroni Computer Science Department Binus Graduate Program - Computer Science Bina Nusantara University Jakarta Indonesia Information System Department School of Information System Bina Nusantara University Jakarta Indonesia Computer Science Department BINUS Graduate Program-Doctor of Computer Science Jakarta Jakarta Indonesia Industrial Engineering Department BINUS Graduate Program - Master of Industrial Engineering Bina Nusantara University Jakarta Indonesia
IT/OT convergence in the form of a Cyber-Physical System (CPS) presents an opportunity to apply recent information Technology (IT) advancements to Operational Technology (OT). The IT/OT convergence introduces cyber se... 详细信息
来源: 评论