咨询与建议

限定检索结果

文献类型

  • 2,239 篇 会议
  • 911 篇 期刊文献

馆藏范围

  • 3,150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,862 篇 工学
    • 1,446 篇 计算机科学与技术...
    • 1,198 篇 软件工程
    • 350 篇 信息与通信工程
    • 312 篇 控制科学与工程
    • 172 篇 生物工程
    • 151 篇 电气工程
    • 129 篇 生物医学工程(可授...
    • 124 篇 机械工程
    • 120 篇 电子科学与技术(可...
    • 87 篇 光学工程
    • 86 篇 安全科学与工程
    • 76 篇 动力工程及工程热...
    • 72 篇 建筑学
    • 71 篇 化学工程与技术
    • 68 篇 土木工程
    • 66 篇 仪器科学与技术
  • 818 篇 理学
    • 434 篇 数学
    • 197 篇 生物学
    • 155 篇 物理学
    • 149 篇 系统科学
    • 129 篇 统计学(可授理学、...
    • 73 篇 化学
  • 551 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 215 篇 工商管理
    • 206 篇 图书情报与档案管...
  • 138 篇 医学
    • 126 篇 临床医学
    • 105 篇 基础医学(可授医学...
  • 88 篇 法学
    • 63 篇 社会学
  • 67 篇 教育学
    • 67 篇 教育学
  • 63 篇 经济学
    • 63 篇 应用经济学
  • 26 篇 农学
  • 13 篇 文学
  • 8 篇 军事学
  • 3 篇 艺术学

主题

  • 155 篇 software enginee...
  • 144 篇 computer science
  • 84 篇 application soft...
  • 82 篇 computational mo...
  • 76 篇 wireless sensor ...
  • 71 篇 software systems
  • 71 篇 deep learning
  • 70 篇 laboratories
  • 69 篇 software
  • 67 篇 accuracy
  • 65 篇 machine learning
  • 63 篇 training
  • 61 篇 computer archite...
  • 61 篇 quality of servi...
  • 51 篇 systems engineer...
  • 51 篇 resource managem...
  • 49 篇 security
  • 48 篇 cloud computing
  • 47 篇 grid computing
  • 47 篇 artificial intel...

机构

  • 48 篇 department of la...
  • 44 篇 department of in...
  • 34 篇 graduate school ...
  • 31 篇 beijing key labo...
  • 27 篇 department of co...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 16 篇 department of sy...
  • 16 篇 department of in...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 department of la...
  • 12 篇 school of inform...

作者

  • 66 篇 fatos xhafa
  • 65 篇 leonard barolli
  • 49 篇 arjan durresi
  • 46 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 21 篇 akio koyama
  • 19 篇 tao yang
  • 19 篇 xenofon koutsouk...
  • 18 篇 gjergji mino
  • 16 篇 song houbing
  • 16 篇 makoto ikeda
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned

语言

  • 3,039 篇 英文
  • 93 篇 其他
  • 15 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Languages and Systems and Software Engineering Department"
3150 条 记 录,以下是161-170 订阅
排序:
IOT Based Smart Parking System Using Ensemble Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第6期36卷 3637-3656页
作者: Walaa H.Elashmawi Ahmad Akram Mohammed Yasser Menna Hisham Manar Mohammed Noha Ihab Ahmed Ali Department of Computer Science Faculty of Computers and InformaticsSuez Canal University4.5 Km the Ring RoadIsmailiaIsmailia41522Egypt Department of Computer Engineering and Software Systems Faculty of EngineeringAin Shams UniversityAl-Abbaseya4543070Egypt Department of Computer Science Faculty of Computer ScienceMisr International University28 KM Cairo–Ismailia RoadCairo44971Egypt College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Higher Future Institute for Specialized Technological Studies Cairo3044Egypt
Parking space is usually very limited in major cities,especially Cairo,leading to traffic congestion,air pollution,and driver *** car parking systems tend to tackle parking issues in a non-digitized *** systems requir... 详细信息
来源: 评论
Efficient Fingerprint Database Organization for Optimized Recognition
Efficient Fingerprint Database Organization for Optimized Re...
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: Jeffrey Jeeva Dhas Adhip Koshy Nishit Dua D. Ajitha Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore Tamil Nadu India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore Vellore India
A popular biometric identification method, renowned for its dependability and individuality in personal identification, is fingerprint recognition. This article presents an efficient fingerprint identification system ... 详细信息
来源: 评论
A Novel Scheme for Malicious Nodes Detection in Cloud Markets Based on Fuzzy Logic Technique
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2022年 第3期16卷 136-150页
作者: Alsarhan, Ayoub Al-Ghuwairi, Abdel-Rahman Alshdaifat, Esra’a Idhaim, Hasan alkhawaldeh, Omar Department of Information Technology Hashemite University Zarqa Jordan Software Engineering Department Hashemite University Zarqa Jordan Computer Information Systems Department Hashemite University Zarqa Jordan Hashemite University Zarqa Jordan
Cloud security vulnerabilities have recently become more prevalent around the world, posing a threat to cloud service providers’ (CSPs) ability to respond to client demands. In cloud market, the requests are announce... 详细信息
来源: 评论
Fusion of speech and handwritten signatures biometrics for person identification
收藏 引用
International Journal of Speech Technology 2023年 第4期26卷 833-850页
作者: Abushariah, Ahmad A. M. Abushariah, Mohammad A. M. Gunawan, Teddy Surya Chebil, J. Alqudah, Assal A. M. Ting, Hua-Nong Mustafa, Mumtaz Begum Peer Faculty of Engineering University of Malaya Kuala Lumpur50603 Malaysia Department of Computer Information Systems King Abdullah II School of Information Technology The University of Jordan Amman Jordan ECE Department Faculty of Engineering International Islamic University Malaysia Kuala Lumpur53100 Malaysia Department of Computer Science Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman Jordan Department of Biomedical Engineering Faculty of Engineering University of Malaya Kuala Lumpur50603 Malaysia Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur50603 Malaysia
Automatic person identification (API) using human biometrics is essential and highly demanded compared to traditional API methods, where a person is automatically identified using his/her distinct characteristics incl... 详细信息
来源: 评论
Proposed intelligence systems based on digital Forensics: Review paper
收藏 引用
Materials Today: Proceedings 2023年 80卷 2647-2651页
作者: Ismael Sahib, Hussein Qahatan AlSudani, Mustafa Hasan Ali, Mohammed Qassim Abbas, Haydar Moorthy, Kohbalan Mundher Adnan, Myasar Faculty of Computer Science and Information Technology UniversitiTun Hussein Onn Malaysia Computer Techniques Engineering Department Faculty of Information Technology Imam Ja'afar Al-sadiq University Najaf Iraq Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia Islamic University Najaf Iraq Faculty of Engineering School of Computing Universiti Teknologi Malaysia 81310 Johor Bahru Malaysia
The field of information security, in general, has seen shifts a traditional approach to an intelligence system. Moreover, an increasing of researchers to focus on propose intelligence systems and framework based on t... 详细信息
来源: 评论
ML-Based Service Type Priority Decision Method Using Ambient Information for 5GB
ML-Based Service Type Priority Decision Method Using Ambient...
收藏 引用
2023 International Conference on Smart Applications, Communications and Networking, SmartNets 2023
作者: Altunan, Umut Sazak, Halenur Yazar, Ahmet Eskisehir Osmangazi University Department of Electrical and Electronics Engineering Eskisehir Turkey Eskisehir Osmangazi University Department of Computer Engineering Eskisehir Turkey Sakarya University Department of Information Systems Engineering Sakarya Turkey Eskisehir Osmangazi University Department of Software Engineering Eskisehir Turkey
5G communications systems offer several types of service groups include enhanced mobile broadband (eMBB), ultra-reliable low-latency communications (URLLC), and massive machine-type communications (mMTC). The ability ... 详细信息
来源: 评论
Machine learning and deep learning algorithms in detecting COVID-19 utilizing medical images: a comprehensive review
收藏 引用
Iran Journal of computer Science 2024年 第3期7卷 699-721页
作者: Nurjahan Mahbub-Or-Rashid, Md. Satu, Md. Shahriare Tammim, Sanjana Ruhani Sunny, Farhana Akter Moni, Mohammad Ali Department of IoT and Robotics Engineering Bangabandhu Sheikh Mujibur Rahman Digital University Kaliakair Bangladesh Department of Computer Science and Engineering Bangladesh University of Business and Technology Mirpur Bangladesh Department of Management Information Systems Noakhali Science and Technology University Noakhali Bangladesh Department of Computer Science and Software Engineering Auburn University Auburn AL United States Department of Computer Science and Engineering Green University of Bangladesh Dhaka Bangladesh Faculty of Health and Behavioural Sciences School of Health and Rehabilitation Sciences The University of Queensland St Lucia Australia
The public’s health is seriously at risk from the coronavirus pandemic. Millions of people have already died as a result of this devastating illness, which affects countless people daily worldwide. Unfortunately, no ... 详细信息
来源: 评论
Feasibility Analysis of Carbide Broaching Tools in the Machining of Inconel 718  19th
Feasibility Analysis of Carbide Broaching Tools in the Machi...
收藏 引用
19th Global Conference on Sustainable Manufacturing, GCSM 2023
作者: Sastoque-Pinilla, Leonardo del Olmo, Ander Tapia, Endika López-Novoa, Unai de Lacalle, Luis Norberto López Advanced Manufacturing Centre for Aeronautics University of the Basque Country Zamudio Biscay48170 Spain Department of Computer Languages and Systems University of the Basque Country Biscay Bilbao48013 Spain Department of Mechanical Engineering University of the Basque Country Biscay Bilbao48013 Spain
Broaching is a highly efficient process for producing high-quality parts with precise dimensions. However, process efficiency alone does not guarantee sustainability. To address this, several key factors need to be co... 详细信息
来源: 评论
Don't Forget the Exception! : Considering Robustness Changes to Identify Design Problems  20
Don't Forget the Exception! : Considering Robustness Changes...
收藏 引用
20th IEEE/ACM International Conference on Mining software Repositories, MSR 2023
作者: Oliveira, Anderson Correia, Joao Sousa, Leonardo Assuncao, Wesley K. G. Coutinho, Daniel Garcia, Alessandro Oizumi, Willian Barbosa, Caio Uchoa, Anderson Pereira, Juliana Alves Informatics Department - Pontifical Catholic Rio de Janeiro Brazil Carnegie Mellon University Department of Electrical and Computer Engineering Pittsburgh United States Institute of Software Systems Engineering Linz Austria Itapajé Brazil
Modern programming languages, such as Java, use exception-handling mechanisms to guarantee the robustness of software systems. Although important, the quality of exception code is usually poor and neglected by develop... 详细信息
来源: 评论
Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health
收藏 引用
computer systems Science & engineering 2022年 第11期43卷 833-847页
作者: A.S.Anakath S.Ambika S.Rajakumar R.Kannadasan K.S.Sendhil Kumar School of Computing E.G.S.Pillay Engineering CollegeNagapattinam611002India Department of Computer Science and Engineering University College of Engineering AriyalurAriyalur621705India Department of Mathematics University College of Engineering AriyalurAriyalur621705India Department of Software Systems School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014India Department of IoT School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014India
Cloud computing becomes an important application development platform for processing user data with high *** providers are accustomed to providing storage centers outside the trusted location preferred by the data ***... 详细信息
来源: 评论