咨询与建议

限定检索结果

文献类型

  • 3,246 篇 会议
  • 1,233 篇 期刊文献
  • 72 册 图书

馆藏范围

  • 4,551 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,662 篇 工学
    • 2,070 篇 计算机科学与技术...
    • 1,715 篇 软件工程
    • 494 篇 信息与通信工程
    • 430 篇 控制科学与工程
    • 236 篇 生物工程
    • 218 篇 电气工程
    • 177 篇 机械工程
    • 175 篇 电子科学与技术(可...
    • 173 篇 生物医学工程(可授...
    • 127 篇 光学工程
    • 113 篇 安全科学与工程
    • 101 篇 仪器科学与技术
    • 91 篇 动力工程及工程热...
    • 91 篇 土木工程
    • 88 篇 建筑学
    • 81 篇 化学工程与技术
  • 1,126 篇 理学
    • 587 篇 数学
    • 269 篇 生物学
    • 221 篇 物理学
    • 202 篇 系统科学
    • 178 篇 统计学(可授理学、...
    • 82 篇 化学
  • 813 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 316 篇 工商管理
    • 310 篇 图书情报与档案管...
  • 163 篇 医学
    • 152 篇 临床医学
    • 128 篇 基础医学(可授医学...
  • 120 篇 法学
    • 96 篇 社会学
  • 99 篇 经济学
    • 99 篇 应用经济学
  • 98 篇 教育学
    • 97 篇 教育学
  • 36 篇 农学
  • 14 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 1 篇 哲学

主题

  • 255 篇 software enginee...
  • 182 篇 computer science
  • 118 篇 computational mo...
  • 110 篇 software
  • 96 篇 software systems
  • 93 篇 application soft...
  • 86 篇 machine learning
  • 85 篇 laboratories
  • 85 篇 accuracy
  • 81 篇 deep learning
  • 80 篇 computer archite...
  • 79 篇 training
  • 74 篇 artificial intel...
  • 71 篇 feature extracti...
  • 69 篇 systems engineer...
  • 69 篇 data mining
  • 66 篇 software testing
  • 64 篇 cloud computing
  • 63 篇 wireless sensor ...
  • 62 篇 security

机构

  • 38 篇 college of compu...
  • 31 篇 beijing key labo...
  • 27 篇 state key labora...
  • 26 篇 grid computing a...
  • 25 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 21 篇 school of comput...
  • 19 篇 state key labora...
  • 19 篇 school of busine...
  • 18 篇 school of comput...
  • 18 篇 department of sy...
  • 17 篇 school of comput...
  • 17 篇 key laboratory o...
  • 17 篇 software systems...
  • 17 篇 college of compu...
  • 17 篇 software enginee...
  • 14 篇 zhongguancun lab...

作者

  • 51 篇 rajkumar buyya
  • 35 篇 junping du
  • 29 篇 buyya rajkumar
  • 28 篇 yingmin jia
  • 24 篇 ismail leila
  • 21 篇 noraziah ahmad
  • 19 篇 zamli kamal z.
  • 19 篇 xenofon koutsouk...
  • 19 篇 fashan yu
  • 17 篇 biswas gautam
  • 15 篇 song houbing
  • 15 篇 gautam biswas
  • 15 篇 jasni mohamad za...
  • 15 篇 herawan tutut
  • 14 篇 noraziah a.
  • 14 篇 m. parashar
  • 14 篇 jafer shafagh
  • 13 篇 ahmed bestoun s.
  • 13 篇 l.c. briand
  • 13 篇 veera boonjing

语言

  • 4,356 篇 英文
  • 164 篇 其他
  • 26 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer Systems and Software Engineering"
4551 条 记 录,以下是601-610 订阅
排序:
Effectiveness of Using Deep Learning for Blister Blight Identification in Sri Lankan Tea
Effectiveness of Using Deep Learning for Blister Blight Iden...
收藏 引用
2023 International Research Conference on Smart Computing and systems engineering, SCSE 2023
作者: Hewawitharana, G.H.A.U. Nawarathne, U.M.L.A. Hassan, A.S.F. Wijerathna, Lochana M. Sinniah, G.D. Vidhanaarachchi, Samitha P. Wickramarathne, Jagath Wijekoon, Janaka L. Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka Tea Research Institute of Sri Lanka Plant Pathology Division Talawakelle Sri Lanka Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Malabe Sri Lanka Military Technological College Systems Engineering Department Muscat Oman
Ceylon tea industry faces a major challenge in the form of pathogen-induced crop loss, with Blister Blight (BB) caused by Exobasidium vexans posing the greatest threat, leading to harvest losses of over 30%. This fung... 详细信息
来源: 评论
Towards Evidence-Based Cybersecurity Assessment of Programmable systems to Ensure the Protection of Critical IT Infrastructure  12
Towards Evidence-Based Cybersecurity Assessment of Programma...
收藏 引用
12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing systems: Technology and Applications, IDAACS 2023
作者: Illiashenko, Oleg Kharchenko, Vyacheslav Odarushchenko, Oleg National Aerospace University 'KhAI' Department of Computer Systems and Networks Kharkiv61070 Ukraine Institute of Information Science and Technologies 'Alessandro Faedo' - Isti Cnr Software Engineering & Dependable Computing Laboratory Pisa56124 Italy Research and Production Enterprise Rpc Radics Llc Kropyvnytskyi25009 Ukraine
The paper is devoted to developing scientific principles, methods, means, and information technology of model-oriented verification and evidence-based assessment using functional safety and cybersecurity cases for pro... 详细信息
来源: 评论
Prediction of Dental Fluorosis Infection based on Particle Optimized Scored KNN Approach  1
Prediction of Dental Fluorosis Infection based on Particle O...
收藏 引用
1st International Conference of Intelligent Methods, systems and Applications, IMSA 2023
作者: Montasser, Reem Kadry Ismael, Osama El-Kholy, Moataz October University for Modern Sciences and Arts Faculty of Computer Science Software Engineering Department Giza Egypt Cairo University Faculty of Computers and Artificial Intelligence Information Systems Department Giza Egypt October University for Modern Sciences and Arts Faculty of Dentistry Oral Pathology Department Giza Egypt
Due to its simplicity of usage across a variety of applications, the K-Nearest Neighbor algorithm is usually utilized as a classification approach. The K-Nearest Neighbor algorithm's accuracy is greatly impacted b... 详细信息
来源: 评论
Yolo Based License Plate Detection Of Triple Riders And Violators
Yolo Based License Plate Detection Of Triple Riders And Viol...
收藏 引用
International Conference on computer Communication and Informatics (ICCCI)
作者: R G Nandhakumar K. Nirmala Devi N. Krishnamoorthy S. Shanthi V R Pranesh S Nikhalyaa Department of Computer Science and Engineering Kongu Enginering College Perundurai Erode Tamilnadu India Department of Software Systems and Engineering School of Information and Engineering Vellore Institutte of Technology Vellore India
Road safety is of prime importance as road accidents are among the biggest causes of deaths in the country. Road Accidents are majorly due to violators and lawbreakers of road safety rules like not wearing helmets, tr... 详细信息
来源: 评论
Harnessing the Power of AI with Deep Learning: Innovations and Implications
Harnessing the Power of AI with Deep Learning: Innovations a...
收藏 引用
2025 IEEE International Conference on Computational, Communication and Information Technology, ICCCIT 2025
作者: Upender, Talluri Sathiyamoorthy, C. Udayakumar, K. Kirubakaran, D. Purushothaman, V. Raja, Kiruba Thangam CMR College of Engineering and Technology Department of CSE Medchal Telangana Hyderabad India Department of Commerce Tamil Nadu Chennai India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of CSE Tamil Nadu Chennai India R.M.K. Engineering College Department of Computer Science and Engineering Tamil Nadu Chennai India Chennai Institute of Technology Department of Electronics and Communication Engineering Tamil Nadu Chennai India VIT University Department of Software and Systems Engineering Tamil Nadu Vellore India
The rapid advancements in artificial intelligence (AI) and deep learning have revolutionized various sectors, enabling unprecedented levels of innovation and efficiency. This paper delves into the transformative impac... 详细信息
来源: 评论
Simulation-Based Study on False Alarms in Intrusion Detection systems for Organizations Facing Dual Phishing and Dos Attacks
Simulation-Based Study on False Alarms in Intrusion Detectio...
收藏 引用
Annual Modeling and Simulation Conference (ANNSIM)
作者: Jeongkeun Shin L. Richard Carley Kathleen M. Carley Department of Electrical and Computer Engineering Carnegie Mellon University Pittsburgh PA United States Software and Societal Systems Department Carnegie Mellon University Pittsburgh PA United States
Machine learning-based intrusion detection systems (IDS) have attracted considerable attention for their role in proactively identifying intrusion attempts and facilitating swift organizational response. While numerou... 详细信息
来源: 评论
SSVEPPoolformer: An Improved Poolformer Model With the Adaptive Denoising Algorithm for SSVEP-EEG Signal Classification
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Li, Chunquan Liao, Zhiyuan Cheng, Yuxin Wang, Zitao Wu, Junyun Liu, Ruijun Liu, Peter X. Nanchang University School of Information Engineering Nanchang330031 China Nanchang University School of Mathematics and Computer Science Nanchang330031 China Beihang University School of Software Beijing100191 China Carleton University School of Department of Systems and Computer Engineering OttawaK1S 5B6 Canada
Most EEG classification algorithms based on steady-state visual evoked potentials (SSVEP-EEG) require filtering for denoising. However, manually set thresholds may inadvertently remove useful information, leading to a... 详细信息
来源: 评论
A Deep Learning Approach for ECG Authentication on Implantable Medical Devices
A Deep Learning Approach for ECG Authentication on Implantab...
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Mustafa Mahjeed Geetha Thamilarasu Nicole Johnson Christian Alfonso Computing and Software Systems University of Washington Bothell Bothell WA Computer Engineering Northeastern University Boston MA Electrical Engineering Seattle Pacific University Seattle WA
The rise in smart healthcare systems have enhanced connectivity of implantable medical devices (IMD). Healthcare providers are able to wirelessly control and monitor these devices enabling quicker diagnosis and treatm...
来源: 评论
Data and Ensemble Machine Learning Fusion Based Intelligent software Defect Prediction System
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 6083-6100页
作者: Sagheer Abbas Shabib Aftab Muhammad Adnan Khan Taher MGhazal Hussam Al Hamadi Chan Yeob Yeun School of Computer Science National College of Business Administration&EconomicsLahore54000Pakistan Department of Computer Science Virtual University of PakistanLahore54000Pakistan Department of Software Faculty of Artificial Intelligence and SoftwareGachon UniversitySeongnam13120Korea Riphah School of Computing&Innovation Faculty of ComputingRiphah International UniversityLahore CampusLahore54000Pakistan School of Information Technology Skyline University CollegeUniversity City SharjahSharjahUAE Center for Cyber Security Faculty of Information Science and TechnologyUKMBangiSelangor43600Malaysia College of Engineering and IT University of Dubai14143UAE EECS Department Center for Cyber Physical SystemsKhalifa UniversityAbu Dhabi127788UAE
The software engineering field has long focused on creating high-quality software despite limited *** defects before the testing stage of software development can enable quality assurance engineers to con-centrate on ... 详细信息
来源: 评论
AI-Powered Conceptual Model for Scrum Framework
AI-Powered Conceptual Model for Scrum Framework
收藏 引用
Computing and Information Technology (ICCIT-1441), 2020 International Conference on
作者: Rana Mdallal Dania Alsawalmeh Dania Jarad Ammar Odeh Department of Software Engineering/Enterprise Systems Engineering (ESE) Princess Sumaya University for Technology (PSUT) Department of Computer Science/Cybersecurity Princess Sumaya University for Technology (PSUT)
Scrum is an incremental, interactive agile framework widely used to develop practical problems; the Scrum team focuses on achieving a common goal each cycle, "Sprint Goal" instead of the traditional sequenti...
来源: 评论