咨询与建议

限定检索结果

文献类型

  • 2,052 篇 会议
  • 871 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,979 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,741 篇 工学
    • 1,347 篇 计算机科学与技术...
    • 1,113 篇 软件工程
    • 333 篇 信息与通信工程
    • 301 篇 控制科学与工程
    • 165 篇 生物工程
    • 147 篇 电气工程
    • 121 篇 电子科学与技术(可...
    • 119 篇 生物医学工程(可授...
    • 116 篇 机械工程
    • 83 篇 光学工程
    • 83 篇 安全科学与工程
    • 73 篇 动力工程及工程热...
    • 66 篇 建筑学
    • 66 篇 土木工程
    • 65 篇 仪器科学与技术
    • 65 篇 化学工程与技术
    • 56 篇 网络空间安全
  • 779 篇 理学
    • 414 篇 数学
    • 190 篇 生物学
    • 147 篇 系统科学
    • 145 篇 物理学
    • 124 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 128 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 81 篇 法学
    • 62 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 54 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 78 篇 computational mo...
  • 75 篇 application soft...
  • 72 篇 deep learning
  • 71 篇 accuracy
  • 70 篇 laboratories
  • 68 篇 software systems
  • 67 篇 machine learning
  • 67 篇 software
  • 63 篇 artificial intel...
  • 61 篇 computer archite...
  • 58 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 47 篇 security
  • 46 篇 cloud computing

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...
  • 10 篇 school of softwa...
  • 10 篇 department of so...
  • 10 篇 school of intell...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,843 篇 英文
  • 119 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Engineering and Software Systems Department"
2979 条 记 录,以下是151-160 订阅
排序:
Proposed intelligence systems based on digital Forensics: Review paper
收藏 引用
Materials Today: Proceedings 2023年 80卷 2647-2651页
作者: Ismael Sahib, Hussein Qahatan AlSudani, Mustafa Hasan Ali, Mohammed Qassim Abbas, Haydar Moorthy, Kohbalan Mundher Adnan, Myasar Faculty of Computer Science and Information Technology UniversitiTun Hussein Onn Malaysia Computer Techniques Engineering Department Faculty of Information Technology Imam Ja'afar Al-sadiq University Najaf Iraq Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia Islamic University Najaf Iraq Faculty of Engineering School of Computing Universiti Teknologi Malaysia 81310 Johor Bahru Malaysia
The field of information security, in general, has seen shifts a traditional approach to an intelligence system. Moreover, an increasing of researchers to focus on propose intelligence systems and framework based on t... 详细信息
来源: 评论
Fusion of speech and handwritten signatures biometrics for person identification
收藏 引用
International Journal of Speech Technology 2023年 第4期26卷 833-850页
作者: Abushariah, Ahmad A. M. Abushariah, Mohammad A. M. Gunawan, Teddy Surya Chebil, J. Alqudah, Assal A. M. Ting, Hua-Nong Mustafa, Mumtaz Begum Peer Faculty of Engineering University of Malaya Kuala Lumpur50603 Malaysia Department of Computer Information Systems King Abdullah II School of Information Technology The University of Jordan Amman Jordan ECE Department Faculty of Engineering International Islamic University Malaysia Kuala Lumpur53100 Malaysia Department of Computer Science Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan Department of Biomedical Engineering Faculty of Engineering University of Malaya Kuala Lumpur50603 Malaysia Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur50603 Malaysia
Automatic person identification (API) using human biometrics is essential and highly demanded compared to traditional API methods, where a person is automatically identified using his/her distinct characteristics incl... 详细信息
来源: 评论
ML-Based Service Type Priority Decision Method Using Ambient Information for 5GB
ML-Based Service Type Priority Decision Method Using Ambient...
收藏 引用
2023 International Conference on Smart Applications, Communications and Networking, SmartNets 2023
作者: Altunan, Umut Sazak, Halenur Yazar, Ahmet Eskisehir Osmangazi University Department of Electrical and Electronics Engineering Eskisehir Turkey Eskisehir Osmangazi University Department of Computer Engineering Eskisehir Turkey Sakarya University Department of Information Systems Engineering Sakarya Turkey Eskisehir Osmangazi University Department of Software Engineering Eskisehir Turkey
5G communications systems offer several types of service groups include enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC), and massive machine-type communications (mMTC). The ability ... 详细信息
来源: 评论
Machine learning and deep learning algorithms in detecting COVID-19 utilizing medical images: a comprehensive review
收藏 引用
Iran Journal of computer Science 2024年 第3期7卷 699-721页
作者: Nurjahan Mahbub-Or-Rashid, Md. Satu, Md. Shahriare Tammim, Sanjana Ruhani Sunny, Farhana Akter Moni, Mohammad Ali Department of IoT and Robotics Engineering Bangabandhu Sheikh Mujibur Rahman Digital University Kaliakair Bangladesh Department of Computer Science and Engineering Bangladesh University of Business and Technology Mirpur Bangladesh Department of Management Information Systems Noakhali Science and Technology University Noakhali Bangladesh Department of Computer Science and Software Engineering Auburn University Auburn AL United States Department of Computer Science and Engineering Green University of Bangladesh Dhaka Bangladesh Faculty of Health and Behavioural Sciences School of Health and Rehabilitation Sciences The University of Queensland St Lucia Australia
The public’s health is seriously at risk from the coronavirus pandemic. Millions of people have already died as a result of this devastating illness, which affects countless people daily worldwide. Unfortunately, no ... 详细信息
来源: 评论
Don't Forget the Exception! : Considering Robustness Changes to Identify Design Problems  20
Don't Forget the Exception! : Considering Robustness Changes...
收藏 引用
20th IEEE/ACM International Conference on Mining software Repositories, MSR 2023
作者: Oliveira, Anderson Correia, Joao Sousa, Leonardo Assuncao, Wesley K. G. Coutinho, Daniel Garcia, Alessandro Oizumi, Willian Barbosa, Caio Uchoa, Anderson Pereira, Juliana Alves Informatics Department - Pontifical Catholic Rio de Janeiro Brazil Carnegie Mellon University Department of Electrical and Computer Engineering Pittsburgh United States Institute of Software Systems Engineering Linz Austria Itapajé Brazil
Modern programming languages, such as Java, use exception-handling mechanisms to guarantee the robustness of software systems. Although important, the quality of exception code is usually poor and neglected by develop... 详细信息
来源: 评论
Deepfake Detection Using a Hybrid Deep Learning Approach with Swin Transformers and ConvNeXt
Deepfake Detection Using a Hybrid Deep Learning Approach wit...
收藏 引用
International Research Conference on Smart Computing and systems engineering (SCSE)
作者: H M Sudith Amarasinghe S P Kasthuri Arachchi Department of Computer Systems Engineering University of Kelaniya Sri Lanka Department of Software Engineering University of Kelaniya Sri Lanka
The rapid advancement of artificial intelligence has led to the proliferation of deep-fake technology, which poses significant challenges to digital security and trust. As deepfakes become increasingly sophisticated, ... 详细信息
来源: 评论
Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health
收藏 引用
computer systems Science & engineering 2022年 第11期43卷 833-847页
作者: A.S.Anakath S.Ambika S.Rajakumar R.Kannadasan K.S.Sendhil Kumar School of Computing E.G.S.Pillay Engineering CollegeNagapattinam611002India Department of Computer Science and Engineering University College of Engineering AriyalurAriyalur621705India Department of Mathematics University College of Engineering AriyalurAriyalur621705India Department of Software Systems School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014India Department of IoT School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014India
Cloud computing becomes an important application development platform for processing user data with high *** providers are accustomed to providing storage centers outside the trusted location preferred by the data ***... 详细信息
来源: 评论
Enhancing Deep Reinforcement Learning with Scenario-Based Modeling
收藏 引用
SN computer Science 2023年 第2期4卷 1-13页
作者: Yerushalmi, Raz Amir, Guy Elyasaf, Achiya Harel, David Katz, Guy Marron, Assaf Department of Computer Science and Applied Mathematics Weizmann Institute of Science Rehovot 76100 Israel School of Computer Science and Engineering The Hebrew University of Jerusalem Jerusalem 91904 Israel Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva 8410501 Israel
Deep reinforcement learning agents have achieved unprecedented results when learning to generalize from unstructured data. However, the “black-box” nature of the trained DRL agents makes it difficult to ensure that ... 详细信息
来源: 评论
Gaussian Differential Privacy Integrated Machine Learning Model for Industrial Internet of Things
收藏 引用
SN computer Science 2023年 第5期4卷 454页
作者: Lazar, Arokia Jesu Prabhu Soundararaj, Sivaprakash Sonthi, Vijaya Krishna Palanisamy, Vishnu Raja Subramaniyan, Vanithamani Sengan, Sudhakar Department of Computer Science and Engineering AI & ML CMR Institute of Technology Telangana Hyderabad 501401 India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore 632014 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vaddeswaram 522502 India Department of Computer Science and Engineering Kongu Engineering College Tamil Nadu Perundurai 638060 India Master of Computer Applications M. Kumarasamy College of Engineering Tamil Nadu Karur 638060 India Department of Computer Science and Engineering PSN College of Engineering and Technology Tamil Nadu Tirunelveli 627152 India
Agriculture, energy, mining, healthcare, and transportation are a few of the top industries transformed by the industrial internet of things (IIoT). Industry 4.0 mainly relies on machine learning (ML) to use the vast ... 详细信息
来源: 评论
Implementation of Multi-Agent Energy Management for Secondary Control of a Microgrid
Implementation of Multi-Agent Energy Management for Secondar...
收藏 引用
2023 IEEE International Conference on Applied Superconductivity and Electromagnetic Devices, ASEMD 2023
作者: Yoldas, Yeliz Onen, Ahmet Alawasa, Khaled El Haffar, Abdelsalam Ahshan, Razzaqul Islam, Md. Rabiul Muyeen, S.M. Noorfatima, Nadya Jung, Jaesung Kayseri University Department of Software Engineering Kayseri Turkey Sultan Qaboos University Department of Electrical and Computer Engineering Muscat Oman University of Wollongong School of Electrical Computer and Telecommunications Engineering NSW Australia Qatar University Electrical Engineering Department Doha Qatar Ajou University Department of Energy Systems Research Suwon Korea Republic of
The multi-agent energy management system (EMS) is needed to coordinate multiple agents of a microgrid to provide efficient operation of the system. In this study, multi-agent EMS is seen as the middle controller betwe... 详细信息
来源: 评论