咨询与建议

限定检索结果

文献类型

  • 4,135 篇 会议
  • 2,693 篇 期刊文献
  • 126 册 图书

馆藏范围

  • 6,954 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,371 篇 工学
    • 3,340 篇 计算机科学与技术...
    • 2,690 篇 软件工程
    • 857 篇 信息与通信工程
    • 692 篇 控制科学与工程
    • 468 篇 生物工程
    • 427 篇 电气工程
    • 314 篇 机械工程
    • 305 篇 生物医学工程(可授...
    • 285 篇 电子科学与技术(可...
    • 220 篇 光学工程
    • 167 篇 仪器科学与技术
    • 162 篇 动力工程及工程热...
    • 151 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 133 篇 建筑学
  • 1,980 篇 理学
    • 1,017 篇 数学
    • 530 篇 生物学
    • 499 篇 物理学
    • 314 篇 统计学(可授理学、...
    • 262 篇 系统科学
    • 157 篇 化学
  • 1,471 篇 管理学
    • 908 篇 管理科学与工程(可...
    • 667 篇 图书情报与档案管...
    • 508 篇 工商管理
  • 354 篇 医学
    • 304 篇 临床医学
    • 253 篇 基础医学(可授医学...
    • 161 篇 公共卫生与预防医...
  • 248 篇 法学
    • 208 篇 社会学
  • 188 篇 经济学
    • 187 篇 应用经济学
  • 154 篇 教育学
    • 145 篇 教育学
  • 81 篇 农学
  • 27 篇 文学
  • 21 篇 艺术学
  • 19 篇 军事学
  • 3 篇 哲学
  • 3 篇 历史学

主题

  • 190 篇 deep learning
  • 181 篇 machine learning
  • 141 篇 computational mo...
  • 129 篇 artificial intel...
  • 123 篇 information syst...
  • 104 篇 software enginee...
  • 103 篇 training
  • 100 篇 accuracy
  • 95 篇 semantics
  • 95 篇 cloud computing
  • 94 篇 internet of thin...
  • 92 篇 feature extracti...
  • 92 篇 software
  • 86 篇 data mining
  • 84 篇 information tech...
  • 82 篇 predictive model...
  • 79 篇 security
  • 78 篇 data models
  • 75 篇 educational inst...
  • 73 篇 optimization

机构

  • 163 篇 school of comput...
  • 51 篇 school of comput...
  • 43 篇 department of in...
  • 41 篇 state key labora...
  • 39 篇 school of comput...
  • 38 篇 department of in...
  • 38 篇 information syst...
  • 37 篇 university of ch...
  • 34 篇 school of inform...
  • 32 篇 department of co...
  • 30 篇 faculty of infor...
  • 28 篇 college of compu...
  • 27 篇 department of in...
  • 26 篇 school of softwa...
  • 26 篇 school of comput...
  • 25 篇 department of co...
  • 25 篇 college of intel...
  • 24 篇 faculty of infor...
  • 24 篇 school of comput...
  • 24 篇 institute of sof...

作者

  • 43 篇 niyato dusit
  • 36 篇 buyya rajkumar
  • 28 篇 rajkumar buyya
  • 27 篇 david lo
  • 26 篇 ismail leila
  • 25 篇 xiong zehui
  • 23 篇 john grundy
  • 23 篇 grundy john
  • 21 篇 el-sayed m.el-ke...
  • 21 篇 zidong wang
  • 20 篇 bailey james
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 abdelwahed motwa...
  • 18 篇 lo david
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman

语言

  • 6,523 篇 英文
  • 380 篇 其他
  • 53 篇 中文
  • 6 篇 日文
  • 2 篇 德文
  • 1 篇 西班牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computing and Software Systems Information Technology and Systems"
6954 条 记 录,以下是101-110 订阅
排序:
Success Factors of Requirement Elicitation in the Field of software Engineering  4
Success Factors of Requirement Elicitation in the Field of S...
收藏 引用
4th International Conference on Advancements in computing, ICAC 2022
作者: Attanayaka, Buddhima Nawinna, Dasuni Manathunga, Kalpani Abeygunawardhana, Pradeep K.W. Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka Department of Computer Systems & Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka
Requirement elicitation (RE) is a cognitively challenging and time-consuming task in software development due to the numerous challenges associated with it including conflicting requirements, unspoken, or assumed requ... 详细信息
来源: 评论
A measured inclusion of an RTI tool for the South Pacific  24
A measured inclusion of an RTI tool for the South Pacific
收藏 引用
7th International Conference on software Engineering and information Management, ICSIM 2024
作者: Sharma, Bibhya Reddy, Pritika Singh, Vineet School of Information Technology Engineering Mathematics and Physics The University of the South Pacific Fiji Department of Computing Science and Information Systems Fiji National University Fiji
Good Governance of any country is reflected through transparency and accountability of its activities and the availability of information and open data in a timely manner to its citizens. The Right to information (RTI... 详细信息
来源: 评论
SNSVM:SqueezeNet-Guided SVM for Breast Cancer Diagnosis
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 2201-2216页
作者: Jiaji Wang Muhammad Attique Khan Shuihua Wang Yudong Zhang School of Computing and Mathematical Sciences University of LeicesterLeicesterLE17RHUK Department of Computer Science HITEC University TaxilaTaxilaPakistan Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia
Breast cancer is a major public health concern that affects women *** is a leading cause of cancer-related deaths among women,and early detection is crucial for successful ***,breast cancer can often go undetected unt... 详细信息
来源: 评论
Optimized Generative Adversarial Networks for Adversarial Sample Generation
收藏 引用
Computers, Materials & Continua 2022年 第8期72卷 3877-3897页
作者: Daniyal M.Alghazzawi Syed Hamid Hasan Surbhi Bhatia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversitySaudi Arabia
Detecting the anomalous entity in real-time network traffic is a popular area of research in recent *** few researches have focused on creating malware that fools the intrusion detection system and this paper focuses ... 详细信息
来源: 评论
An Improved Optimized Model for Invisible Backdoor Attack Creation Using Steganography
收藏 引用
Computers, Materials & Continua 2022年 第7期72卷 1173-1193页
作者: Daniyal M.Alghazzawi Osama Bassam J.Rabie Surbhi Bhatia Syed Hamid Hasan Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversitySaudi Arabia
The Deep Neural Networks(DNN)training process is widely affected by backdoor *** backdoor attack is excellent at concealing its identity in the DNN by performing well on regular samples and displaying malicious behavi... 详细信息
来源: 评论
Explainable Transformer-based Intrusion Detection in Internet of Medical Things (IoMT) Networks  23
Explainable Transformer-based Intrusion Detection in Interne...
收藏 引用
23rd IEEE International Conference on Machine Learning and Applications, ICMLA 2024
作者: Kalakoti, Rajesh Nomm, Sven Bahsi, Hayretdin School of Information Technology TalTech Tallinn Estonia School of Informatics Computing and Cyber Systems Northern Arizona University United States
Internet of Medical Things (IoMT) systems have brought transformative benefits to patient monitoring and remote diagnosis in healthcare. However, these systems are prone to various cyber attacks that have a high impac... 详细信息
来源: 评论
Artificial Intelligence Models in Power Generation for Energy Consumption Prediction  4
Artificial Intelligence Models in Power Generation for Energ...
收藏 引用
4th International Conference on Emerging Trends in Networks and Computer Communications, ETNCC 2024
作者: Tan, Lit Yang Chen Kwan, Charis Shwu Ajibade, Samuel-Soma M. Ramly, Athirah Mohd School of Engineering and Technology Sunway University Department of Computing and Information Systems Selangor Malaysia School of Architecture Computing and Engineering University of East London Department of Computing London United Kingdom
The incorporation of artificial intelligence (AI) into power-related applications signifies a new and unexplored domain in machine learning for predicting power generation. This novel method utilizes prediction models... 详细信息
来源: 评论
Recursive Weighted 2-Means Split Algorithm For Under-segmentation Reduction  28
Recursive Weighted 2-Means Split Algorithm For Under-segment...
收藏 引用
28th International Conference on information Society and University Studies, IVUS 2023
作者: Magylaitė, Kornelija Arlauskas, Lukas Ryselis, Karolis Software Engineering Department Kaunas University of Technology Lithuania Information Systems Department Kaunas University of Technology Lithuania
Human body segmentation is utilized in various applications as an intermediate step. This problem is best solved using supervised machine learning solutions, however, they require annotated data for training. Unfortun... 详细信息
来源: 评论
Spatial Correlation Module for Classification of Multi-Label Ocular Diseases Using Color Fundus Images
收藏 引用
Computers, Materials & Continua 2023年 第7期76卷 133-150页
作者: Ali Haider Khan Hassaan Malik Wajeeha Khalil Sayyid Kamran Hussain Tayyaba Anees Muzammil Hussain Department of Software Engineering Faculty of Computer SciencesLahore Garrison UniversityLahorePakistan Department of Computer Science School of Systems and TechnologyUniversity of Management and TechnologyLahore54000Pakistan Department of Computer Science&Information Technology University of Engineering and Technology(UET)PeshawarPakistan Department of Computer Science TIMES InstituteMultan60000Pakistan Department of Software Engineering School of Systems and TechnologyUniversity of Management and TechnologyLahore54000Pakistan
To prevent irreversible damage to one’s eyesight,ocular diseases(ODs)need to be recognized and treated *** fundus imaging(CFI)is a screening technology that is both effective and *** to CFIs,the early stages of the d... 详细信息
来源: 评论
Federated Collaborative Graph Neural Networks for Few-shot Graph Classification
收藏 引用
Machine Intelligence Research 2024年 第6期21卷 1077-1091页
作者: Yu Xie Yanfeng Liang Chao Wen A.K.Qin Maoguo Gong School of Computer and Information Technology Shanxi UniversityTaiyuan030000China Key Laboratory of Collaborative Intelligence Systems of Ministry of Education Xidian UniversityXi’an710071China Department of Computer Science and Software Engineering Swinburne University of TechnologyMelbourne3000Australia
Graph neural networks(GNNs)have achieved state-of-the-art performance on graph classification tasks,which aim to pre-dict the class labels of entire graphs and have widespread ***,existing GNN based methods for graph ... 详细信息
来源: 评论