咨询与建议

限定检索结果

文献类型

  • 299 篇 会议
  • 191 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 491 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 312 篇 工学
    • 240 篇 计算机科学与技术...
    • 198 篇 软件工程
    • 52 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 23 篇 机械工程
    • 23 篇 电气工程
    • 21 篇 生物工程
    • 18 篇 仪器科学与技术
    • 17 篇 光学工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 动力工程及工程热...
    • 14 篇 交通运输工程
    • 13 篇 生物医学工程(可授...
    • 11 篇 建筑学
    • 11 篇 土木工程
    • 10 篇 化学工程与技术
    • 10 篇 安全科学与工程
  • 153 篇 理学
    • 83 篇 数学
    • 44 篇 物理学
    • 24 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 系统科学
    • 12 篇 化学
  • 113 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 21 篇 医学
    • 19 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 18 篇 法学
    • 16 篇 社会学
  • 12 篇 经济学
    • 12 篇 应用经济学
  • 7 篇 教育学
  • 4 篇 农学
  • 3 篇 文学
  • 3 篇 军事学

主题

  • 17 篇 computer science
  • 17 篇 accuracy
  • 13 篇 laboratories
  • 11 篇 semantics
  • 11 篇 feature extracti...
  • 11 篇 testing
  • 10 篇 optimization
  • 10 篇 data mining
  • 10 篇 training
  • 9 篇 deep learning
  • 8 篇 information syst...
  • 8 篇 information secu...
  • 7 篇 educational tech...
  • 7 篇 wireless sensor ...
  • 7 篇 visualization
  • 7 篇 social networkin...
  • 7 篇 machine learning
  • 7 篇 cloud computing
  • 7 篇 ontology
  • 6 篇 internet of thin...

机构

  • 72 篇 department of co...
  • 54 篇 school of softwa...
  • 41 篇 tsinghua nationa...
  • 25 篇 key laboratory f...
  • 14 篇 key laboratory f...
  • 12 篇 national enginee...
  • 10 篇 national key lab...
  • 9 篇 college of compu...
  • 9 篇 science & techno...
  • 8 篇 university of ch...
  • 7 篇 department of co...
  • 7 篇 computer vision ...
  • 6 篇 inria
  • 6 篇 guangdong provin...
  • 5 篇 school of softwa...
  • 5 篇 moe key laborato...
  • 5 篇 faculty of compu...
  • 5 篇 department of in...
  • 4 篇 department of co...
  • 4 篇 department of au...

作者

  • 13 篇 yunhao liu
  • 12 篇 qiang wenwen
  • 12 篇 zheng changwen
  • 11 篇 wang bin
  • 10 篇 wang jianmin
  • 9 篇 xiong hui
  • 9 篇 herawan tutut
  • 8 篇 sun fuchun
  • 8 篇 yong jun-hai
  • 7 篇 wang chaokun
  • 7 篇 li jiangmeng
  • 7 篇 palaiahnakote sh...
  • 6 篇 ming gu
  • 6 篇 paul jean-claude
  • 6 篇 tong lu
  • 6 篇 shen linlin
  • 6 篇 poomrittigul suv...
  • 6 篇 zhang hui
  • 5 篇 xiang-yang li
  • 5 篇 sun jiaguang

语言

  • 466 篇 英文
  • 17 篇 其他
  • 8 篇 中文
  • 1 篇 日文
检索条件"机构=Web Information System and Department of Software Technology"
491 条 记 录,以下是131-140 订阅
排序:
Cybersecurity Enhancement in IoT-Enabled Public Health information systems Using Deep Learning Techniques
Cybersecurity Enhancement in IoT-Enabled Public Health Infor...
收藏 引用
AI-Driven Smart Healthcare for Society 5.0
作者: Mahesh Kumar Mishra Lalit Mohan Trivedi Mansoor Farooq Divya Nimma Malik Bader Alazzam B Kiran Bala Sr SAP Consultant Delta System and Software Inc Texas USA Department of ASH Moradabad Institute of Technology Moradabad UP India Department of Cybersecurity American University of Bahrain Bahrain PhD in Computational Science University of Southern Mississippi Data Analyst in UMMC USA Faculty of Information Technology Jadara University Irbid Jordan Department of AI & DS K.Ramakrishnan College of Engineering Trichy India
The rising use of IoT devices in Public Health information systems (PHIS) has revolutionized the way patient surveillance and record keeping is being done in real-time, but this has exposed systems to serious cybersec... 详细信息
来源: 评论
NLP for Sentiment Analysis in Social Media Posts to Detect Suspicious Behaviour
NLP for Sentiment Analysis in Social Media Posts to Detect S...
收藏 引用
Intelligent Algorithms for Computational Intelligence systems (IACIS), International Conference on
作者: Abhishek Awasthi Mohammad Bdair A. Nandha Kumar Sanjog Thapa Nalini Devi S Bharathi Ramesh Kumar Software Developer Sporta Technology pvt Ltd Maharashtra India School of Architecture Computing & Engineering University of East London London United Kindom Department of EEE Bannari Amman Institute of Technology Sathyamangalam India Department of Information System and Analysis Lamar University Texas USA Department of Management Studies St. Joseph's Institute of Technology Chennai India Department of Mathematics Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Chennai India
In an era where social media is an almost omnipresent means of communication, online safety is crucial. Still, conventional sentiment analysis methods sometimes fall short of accurately spotting dubious conduct. A nov... 详细信息
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
arXiv
收藏 引用
arXiv 2024年
作者: Deng, Kaijun Zheng, Dezhi Xie, Jindong Wang, Jinbao Xie, Weicheng Shen, Linlin Song, Siyang Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China Department of Computer Science University of Exeter United Kingdom
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
Quantum reversible circuits for multiplicative inverse
收藏 引用
EPJ Quantum technology 2022年 第1期9卷 1-17页
作者: Luo, Qing-bin Yang, Guo-wu Li, Xiao-yu Li, Qiang Department of Computer Science and Technology School of Information Engineering Hubei Minzu University Enshi China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Big data research Center & School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Technology Chengdu China
The synthesis of quantum circuits for multiplicative inverse over $\operatorname{GF}(2^{8})$ are discussed in this paper. We first convert the multiplicative inverse operation in $\operatorname{GF}(2^{8})$ to arithmet...
来源: 评论
RETRACTED ARTICLE: Industrial-IoT-hardware security-improvement using plan load optimization method in cloud
收藏 引用
International Journal of system Assurance Engineering and Management 2023年 第1期14卷 578-578页
作者: Basheer, Shakila Gopu, Magesh Mathew, Rincy Merlin Bivi, Maryam Aysha Prabu, M. Department of Information System College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh Saudi Arabia Department of Software and Systems Engineering Vellore Institute of Technology Tamilnadu Vellore India Computer Science Department College of Science and Arts King Khalid University Khamis Mushayt Abha Saudi Arabia Department of Computer Science College of Computer Science King Khalid University Abha Saudi Arabia Department of Computer Science Christ University Karnataka Bangalore India
来源: 评论
Analysis and Design of a Personalized Recommendation system Based on a Dynamic User Interest Model
arXiv
收藏 引用
arXiv 2024年
作者: Mao, Chunyan Huang, Shuaishuai Sui, Mingxiu Yang, Haowei Wang, Xueshe School of Information and Communication Engineering Shanghai Jiao Tong University Shanghai China University of Science and Technology of China Department of Software Software system design Anhui Hefei China University of Iowa Department of Mathematics Iowa CityIA United States University of Houston Cullen College of Engineering Indusrial Enginnering HoustonTX United States Duke University Pratt School of Engineering Mechanical Engineering DurhamNC United States
With the rapid development of the internet and the explosion of information, providing users with accurate personalized recommendations has become an important research topic. This paper designs and analyzes a persona...
来源: 评论
Machine Learning Classifiers for Network Intrusion Detection system: Comparative Study
Machine Learning Classifiers for Network Intrusion Detection...
收藏 引用
2021 International Conference on information technology, ICIT 2021
作者: Almomani, Omar Almaiah, Mohammed Amin Alsaaidah, Adeeb Smadi, Sami Mohammad, Adel Hamdan Althunibat, Ahmad The World Islamic Sciences and Education University Department of Information System and Networks Jordan College of Computer Science and Information Technology King Faisal University Al-Ahsa31982 Saudi Arabia The World Islamic Sciences and Education University Department of Computer Science Amman Jordan Al-Zaytoonah University of Jordan Department of Software Engineering Amman11733 Jordan
Network security risks are increasing at an exponential rate as Internet technology advances. Keeping the network protected is one of the most challenging of network security. Many security mechanisms were implemented... 详细信息
来源: 评论
Multibiometric Identification of Computer Network Users in the Distance Learning Process
Multibiometric Identification of Computer Network Users in t...
收藏 引用
International Computer Sciences and information Technologies (CSIT)
作者: Tetiana Kovaliuk Nataliya Kobets Anastasia Shevchenko Nataliia Kunanets Software System and Technology Department Taras Shevchenko National University of Kyiv Kyiv Ukraine UNITY-BARS LLC Kyiv Ukraine Information Systems and Networks Department Lviv Polytechnic National University Lviv Ukraine
The article considers the multibiometric identification of a student to improve the quality and minimize errors in the process of his identification using voice and visual biometric features. Sound processing methods,... 详细信息
来源: 评论
Trainbot: A Conversational Interface to Train Crowd Workers for Delivering On-Demand Therapy  8th
Trainbot: A Conversational Interface to Train Crowd Workers ...
收藏 引用
8th AAAI Conference on Human Computation and Crowdsourcing, HCOMP 2020
作者: Abbas, Tahir Khan, Vassilis-Javed Gadiraju, Ujwal Markopoulos, Panos Industrial Design Department Eindhoven University of Technology Eindhoven Netherlands Software Engineering Dept Mirpur University of Science & Technology Mirpur AJK Pakistan Web Information Systems Delft University of Technology Netherlands
On-demand emotional support is an expensive and elusive societal need that is exacerbated in difficult times – as witnessed during the COVID-19 pandemic. Prior work in affective crowdsourcing has examined ways to ove... 详细信息
来源: 评论
Analysis of Financial Risk Behavior Prediction Using Deep Learning and Big Data Algorithms
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Haowei Cheng, Zhan Zhang, Zhaoyang Luo, Yuanshuai Huang, Shuaishuai Xiang, Ao University of Houston Cullen College of Engineering Industrial Engineering Houston United States University of California Irvine Donald Bren School of Information & Computer Science Master of Computer Science Irvine United States University of California San Diego Computational Science San Diego United States Southwest Jiaotong University School of Computing and Artificial Intelligence Computer Science and Technology Chengdu China University of Science and Technology of China Department of Software Software system design Hefei China Northern Arizona University Information Security and Assurance AZ United States
As the complexity and dynamism of financial markets continue to grow, traditional financial risk prediction methods increasingly struggle to handle large datasets and intricate behavior patterns. This paper explores t... 详细信息
来源: 评论