咨询与建议

限定检索结果

文献类型

  • 1,596 篇 会议
  • 1,337 篇 期刊文献

馆藏范围

  • 2,933 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,633 篇 工学
    • 939 篇 计算机科学与技术...
    • 765 篇 软件工程
    • 276 篇 信息与通信工程
    • 223 篇 电子科学与技术(可...
    • 214 篇 电气工程
    • 204 篇 生物工程
    • 196 篇 控制科学与工程
    • 178 篇 生物医学工程(可授...
    • 155 篇 光学工程
    • 147 篇 化学工程与技术
    • 126 篇 材料科学与工程(可...
    • 101 篇 机械工程
    • 87 篇 仪器科学与技术
    • 85 篇 动力工程及工程热...
    • 68 篇 土木工程
  • 1,178 篇 理学
    • 491 篇 物理学
    • 419 篇 数学
    • 289 篇 生物学
    • 175 篇 化学
    • 175 篇 统计学(可授理学、...
    • 71 篇 系统科学
  • 397 篇 管理学
    • 226 篇 管理科学与工程(可...
    • 191 篇 图书情报与档案管...
    • 134 篇 工商管理
  • 209 篇 医学
    • 164 篇 临床医学
    • 142 篇 基础医学(可授医学...
    • 66 篇 公共卫生与预防医...
    • 66 篇 药学(可授医学、理...
  • 99 篇 教育学
    • 93 篇 教育学
  • 80 篇 法学
    • 72 篇 社会学
  • 71 篇 农学
  • 52 篇 经济学
  • 8 篇 文学
  • 1 篇 哲学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 52 篇 computer science
  • 46 篇 accuracy
  • 42 篇 feature extracti...
  • 42 篇 machine learning
  • 39 篇 internet of thin...
  • 38 篇 deep learning
  • 36 篇 training
  • 34 篇 data mining
  • 34 篇 visualization
  • 34 篇 students
  • 33 篇 education
  • 33 篇 computational mo...
  • 31 篇 covid-19
  • 25 篇 predictive model...
  • 25 篇 artificial intel...
  • 22 篇 support vector m...
  • 22 篇 computer archite...
  • 22 篇 data models
  • 21 篇 real-time system...
  • 20 篇 optimization

机构

  • 27 篇 computer science...
  • 24 篇 school of physic...
  • 22 篇 department of ph...
  • 22 篇 department of ph...
  • 21 篇 kavli institute ...
  • 21 篇 university of ch...
  • 20 篇 computer science...
  • 19 篇 physics division...
  • 19 篇 enrico fermi ins...
  • 18 篇 applied mathemat...
  • 17 篇 department of as...
  • 16 篇 advanced institu...
  • 16 篇 harvey mudd coll...
  • 16 篇 computer science...
  • 16 篇 nist quantum dev...
  • 15 篇 fermi national a...
  • 14 篇 school of physic...
  • 14 篇 applied computer...
  • 14 篇 department of ph...
  • 13 篇 department of ph...

作者

  • 35 篇 gaol ford lumban
  • 29 篇 muhammad zarlis
  • 22 篇 jasra ajay
  • 21 篇 heryadi yaya
  • 20 篇 halverson n.w.
  • 20 篇 benson b.a.
  • 20 篇 padin s.
  • 19 篇 everett w.
  • 19 篇 ruhl j.e.
  • 19 篇 bender a.n.
  • 18 篇 whitehorn n.
  • 18 篇 smecher g.
  • 18 篇 schaffer k.k.
  • 18 篇 bens pardamean
  • 18 篇 holzapfel w.l.
  • 18 篇 novosad v.
  • 18 篇 matsuo tokuro
  • 18 篇 holder g.p.
  • 17 篇 meyer s.s.
  • 17 篇 nibarger j.p.

语言

  • 2,832 篇 英文
  • 76 篇 其他
  • 17 篇 中文
  • 7 篇 日文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Program in Computer Science & Technology"
2933 条 记 录,以下是61-70 订阅
排序:
Features Reduction with PCA Technique for Malware Detection Using Machine Learning  9
Features Reduction with PCA Technique for Malware Detection ...
收藏 引用
9th IEEE International Conference on Computing, Engineering and Design, ICCED 2023
作者: Mantoro, Teddy Ginanjar, Agung Ayu, Media Anugerah Aditiawarman, Umar Sampoerna University Faculty of Engineering and Technology Department of Computer Science Jakarta Indonesia Nusa Putra University Postgraduate Program - School of Computer Science Sukabumi Indonesia
Malware had been a problem for quite some times since it spreads easily and can cause various problems. Currently, malware is also one of the big threats for internet users. With a huge number of internet users today,... 详细信息
来源: 评论
Climate change and artificial intelligence: assessing the global research landscape
收藏 引用
Discover Artificial Intelligence 2024年 第1期4卷 64页
作者: Lewis, Joanna I. Toney, Autumn Shi, Xinglan Science Technology and International Affairs Program Edmund A. Walsh School of Foreign Service Georgetown University WashingtonDC United States Center for Security and Emerging Technology Edmund A. Walsh School of Foreign Service Georgetown University WashingtonDC United States Department of Computer Science Georgetown University WashingtonDC United States Communications Culture and Technology Program Georgetown University WashingtonDC United States
Artificial Intelligence (AI) could revolutionize our ability to understand and address climate change. Studies to date have focused on specific AI applications to climate science, technologies, and policy. Yet despite... 详细信息
来源: 评论
HYPERTENSION SELF-MANAGEMENT SUCCESS IN 2 WEEKS;3 PILOT STUDIES  36
HYPERTENSION SELF-MANAGEMENT SUCCESS IN 2 WEEKS;3 PILOT STUD...
收藏 引用
36th Bled eConference, BLED 2023
作者: Simons, Luuk P.A. Wielaard, Bas Neerincx, Mark Delft University of Technology Faculty of Computer Science Delft Netherlands Health Coach Program Hague Netherlands
Platform business models like Uber Ride or Airbnb Lodging enable innovative business models by operating digital platforms to connect providers and consumers of products and services in two-sided markets. A particular... 详细信息
来源: 评论
New Media as a Tools to Improve Creative Thinking: A Systematic Literature Review  7
New Media as a Tools to Improve Creative Thinking: A Systema...
收藏 引用
7th International Conference on Information technology, Information Systems and Electrical Engineering, ICITISEE 2023
作者: Hermawan, Hellik Mahardika, Fajar Darmayanti, Irma Sumantri, R. Bagus Bambang Saputra, Dhanar Intan Surya Aminuddin, Afrig Universitas Amikom Purwokerto Faculty of Computer Science Department of Informatics Jawa Tengah Banyumas Indonesia Institut Teknologi Dan Sains Nahdlatul Computer Technology Study Program Faculty of Science and Technology Ulama Pekalongan Indonesia Universitas Amikom Purwokerto Faculty of Computer Science Department of Information Technology Jawa Tengah Banyumas Indonesia Universitas Harapan Information Systems Study Program Faculty of Science and Technology Bangsa Indonesia Universitas Amikom Yogyakarta Faculty of Computer Science Sleman Indonesia
This systematic literature review (SLR) study aims to analyze the role of New Media as a Tool to Improve Creative Thinking, with relevant articles from 2018 to 2023 taken from reputable international journals. It uses... 详细信息
来源: 评论
"Nyctophy": Assessing the effectiveness of serious game for nyctophobia based on virtual reality by usability and heart rate monitoring
收藏 引用
Procedia computer science 2024年 245卷 185-192页
作者: Elshad Ryan Ardiyanto Patrick Alexander Edyth Novian Putra Dimas Ramdhan Game Application & Technology Program Computer Science Department School of Computer Science Bina Nusantara University Jakarta
Nyctophobia is a phobia of the dark and is common among children but also found in adults. While the phobia itself is commonly known, the diversity of its treatment is still minimal. As technology has reached its high... 详细信息
来源: 评论
Advancements in Deep Learning Optimization for Post-Earthquake Building Damage Detection A Systematic Review
Advancements in Deep Learning Optimization for Post-Earthqua...
收藏 引用
2024 International Conference on Advanced Information Scientific Development, ICAISD 2024
作者: Sonang, Sahat Yuhandri, Y. Tajuddin, Muhammad Universitas Putra Indonesia Yptk Information Technology Study Program Padang Indonesia Universitas Bumigora Department of Computer Science Mataram Indonesia
This study conducts a systematic literature review (SLR) that focuses on optimizing deep-learning techniques for post-earthquake building damage detection. By employing the PRISMA protocol, this review aimed to collec... 详细信息
来源: 评论
A Multi-UAV Charging Station Enabling Free Landing by Grid Pattern Transmitter  14
A Multi-UAV Charging Station Enabling Free Landing by Grid P...
收藏 引用
14th Annual IEEE Applied Power Electronics Conference and Exposition, APEC 2025
作者: Kim, Jungho Jo, Hyunkyeong Seo, Seoktae Lee, Bonyoung Min, Hyungki Bien, Franklin Ulsan National Institute of Science and Technology School of Electrical and Computer Engineering Ulsan Korea Republic of Ulsan National Institute of Science and Technology Program in Information & Communication Technology Convergence Ulsan Korea Republic of
This paper proposed a novel landing platform with wireless power transfer (WPT) to charge multiple unmanned aerial vehicles (UAVs) without restrictions on landing locations or alignment. A transmitter is designed usin... 详细信息
来源: 评论
A Hybrid Approach with BRKGA and Data Mining for the Early/Tardy Scheduling Problem  13
A Hybrid Approach with BRKGA and Data Mining for the Early/T...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Mendonça, Israel Fatyanosa, Tirana Noor Aritsugi, Masayoshi Silva, Pedro Henrique González Kumamoto University Faculty of Advanced Science and Technology Kumamoto Japan Brawijaya University Faculty of Computer Science Malang Indonesia Federal University of Rio de Janeiro System Engineering and Computer Science Program Rio de Janeiro Brazil
This paper introduces a novel hybrid genetic algorithm combined with data mining to solve a version of the early/tardy scheduling problem in which no unforced idle time may be inserted in a sequence. The chromosome re... 详细信息
来源: 评论
Automatic Identification and Reconstruction 3D Image of the Rhinosinusitis Mucus  12
Automatic Identification and Reconstruction 3D Image of the ...
收藏 引用
12th International Conference on Information and Communication technology, ICoICT 2024
作者: Eka Putra, Ondra Sumijan Tajuddin, Muhammad Universitas Putra Indonesia YPTK Padang Faculty of Computer Science Department of Informatics Technology Padang Indonesia Doctoral Program in Information Technology Universitas Putra Indonesia YPTK Padang Padang Indonesia Bumigora University Department of Computer Science Mataram Indonesia
Rhinosinusitis Mucus is mucus produced by mucus glands found in the nose in the paranasal sinus area which indicates inflammation. Segmentation of rhinosinusitis mucus is very difficult to do because of the many chara... 详细信息
来源: 评论
Analyzing Human Observer Ability in Morphing Attack Detection - Where Do We Stand?
IEEE Transactions on Technology and Society
收藏 引用
IEEE Transactions on technology and Society 2023年 第2期4卷 125-145页
作者: Godage, Sankini Rancha Lovasdal, Froy Venkatesh, Sushma Raja, Kiran Ramachandra, Raghavendra Busch, Christoph Norwegian University of Science and Technology Department of Computer Science Trondheim 22 Gjovik2815 Norway National Police Directorate National Technology Team Euis Program Oslo0369 Norway Norwegian University of Science and Technology Department of Information Security and Communication Technology Trondheim 22 Gjovik2815 Norway
Morphing attacks are based on the technique of digitally fusing two (or more) face images into one, with the final visage resembling the contributing faces. Morphed images not only pose a challenge to Face-Recognition... 详细信息
来源: 评论