咨询与建议

限定检索结果

文献类型

  • 14,903 篇 会议
  • 6,267 篇 期刊文献
  • 260 册 图书

馆藏范围

  • 21,430 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,948 篇 工学
    • 10,135 篇 计算机科学与技术...
    • 8,395 篇 软件工程
    • 2,617 篇 信息与通信工程
    • 1,773 篇 控制科学与工程
    • 1,403 篇 生物工程
    • 1,214 篇 电气工程
    • 978 篇 生物医学工程(可授...
    • 890 篇 电子科学与技术(可...
    • 841 篇 机械工程
    • 709 篇 光学工程
    • 526 篇 安全科学与工程
    • 491 篇 仪器科学与技术
    • 466 篇 动力工程及工程热...
    • 442 篇 化学工程与技术
    • 413 篇 建筑学
    • 385 篇 交通运输工程
  • 5,786 篇 理学
    • 3,341 篇 数学
    • 1,568 篇 生物学
    • 1,082 篇 物理学
    • 952 篇 统计学(可授理学、...
    • 802 篇 系统科学
    • 460 篇 化学
  • 3,905 篇 管理学
    • 2,418 篇 管理科学与工程(可...
    • 1,649 篇 图书情报与档案管...
    • 1,207 篇 工商管理
  • 941 篇 医学
    • 830 篇 临床医学
    • 744 篇 基础医学(可授医学...
    • 458 篇 药学(可授医学、理...
  • 616 篇 法学
    • 478 篇 社会学
  • 399 篇 教育学
  • 398 篇 经济学
    • 396 篇 应用经济学
  • 210 篇 农学
  • 102 篇 文学
  • 63 篇 军事学
  • 35 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,249 篇 software enginee...
  • 1,088 篇 computer science
  • 407 篇 application soft...
  • 396 篇 deep learning
  • 356 篇 computational mo...
  • 336 篇 computer archite...
  • 331 篇 software
  • 304 篇 machine learning
  • 301 篇 accuracy
  • 274 篇 data mining
  • 273 篇 software systems
  • 263 篇 training
  • 248 篇 feature extracti...
  • 245 篇 internet of thin...
  • 223 篇 programming
  • 219 篇 support vector m...
  • 191 篇 artificial intel...
  • 187 篇 testing
  • 185 篇 optimization
  • 177 篇 semantics

机构

  • 356 篇 college of compu...
  • 197 篇 department of co...
  • 122 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 113 篇 school of softwa...
  • 105 篇 department of co...
  • 91 篇 department of co...
  • 79 篇 school of inform...
  • 72 篇 department of co...
  • 70 篇 department of co...
  • 61 篇 school of comput...
  • 59 篇 department of co...
  • 52 篇 department of co...
  • 52 篇 department of co...
  • 52 篇 department of co...
  • 50 篇 software enginee...
  • 47 篇 department of co...
  • 46 篇 department of so...
  • 43 篇 school of comput...

作者

  • 67 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 29 篇 shen furao
  • 25 篇 muhammad waseem ...
  • 25 篇 rehman attique u...
  • 25 篇 sylvain martel
  • 25 篇 xiao qin
  • 24 篇 kotagiri ramamoh...
  • 24 篇 mian ajmal
  • 23 篇 wang lei
  • 23 篇 parizi reza m.
  • 22 篇 khomh foutse
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 22 篇 christopher leck...
  • 21 篇 qusay h. mahmoud
  • 21 篇 niyato dusit

语言

  • 20,356 篇 英文
  • 921 篇 其他
  • 161 篇 中文
  • 8 篇 德文
  • 6 篇 土耳其文
  • 4 篇 日文
  • 2 篇 俄文
  • 1 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Engineering and Software Engineering"
21430 条 记 录,以下是911-920 订阅
排序:
A new hybrid teaching learning based Optimization -Extreme learning Machine model based Intrusion-Detection system
收藏 引用
Materials Today: Proceedings 2023年 80卷 2701-2705页
作者: Qahatan Alsudani, Mustafa Abbdal Reflish, Salah H. Moorthy, Kohbalan Mundher Adnan, Myasar Computer Techniques Engineering Department Faculty of Information Technology Imam Ja'afar Al-sadiq University Najaf Iraq Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia Islamic University Najaf Iraq Faculty of Engineering School of Computing Universiti Teknologi Malaysia Johor Bahru81310 Malaysia
Currently, effective Intrusion-detection systems (IDS) still represent one of the important security tools. However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a s... 详细信息
来源: 评论
CONTEXT AWARE FACIAL EXPRESSION RECOGNITION WITH DEEP LEARNING ARCHITECTURES
CONTEXT AWARE FACIAL EXPRESSION RECOGNITION WITH DEEP LEARNI...
收藏 引用
2025 International Conference on Energy, Power, Environment, Control and Computing, ICEPECC 2025
作者: Bano, Nudrat Asif, Muhammad Zia, Muhammad Azam Bilal, Hafiz Muhammad Department of Computer Science University of Agriculture Faisalabad Faisalabad Pakistan Department of Computer and Software Engineering Information Technology University (ITU) Punjab Pakistan
Facial expression recognition (FER) plays a pivotal role in applications such as mental health diagnosis, security, marketing, human-robot interaction, healthcare, education, and gaming. However, challenges like varie... 详细信息
来源: 评论
Analysis of Decision-Making Strategies in Social Networks
Analysis of Decision-Making Strategies in Social Networks
收藏 引用
2025 International Conference on Energy, Power, Environment, Control and Computing, ICEPECC 2025
作者: Zafar, Remsha Zia, Muhammad Azam Asif, Muhammad Department of Computer Science University of Agriculture Faisalabad Faisalabad Pakistan Department of Computer and Software Engineering Information Technology University (ITU) Punjab Pakistan
In the era of social media, platforms have become integral to various domains, particularly business, where trends significantly influence decision-making processes. Despite numerous studies, effective decision-making... 详细信息
来源: 评论
ACE-PE: An Automated Code Evaluation software Tool For Programming Education  11
ACE-PE: An Automated Code Evaluation Software Tool For Progr...
收藏 引用
11th International Symposium on Digital Forensics and Security, ISDFS 2023
作者: Alper, Burcu Nazlioglu, Selma Kilic, Hurevren Bilkent Cyberpark Cybersoft Information Technologies Ankara Turkey Atilim University Department of Software Engineering Ankara Turkey Atilim University Department of Computer Engineering Ankara Turkey
An automated code evaluation tool that combines the usage of software quality metrics and object-oriented programming teaching subjects is designed and developed. The tool (called ACE-PE) gives flexibility to instruct... 详细信息
来源: 评论
VisioSLR: A Vision Data-Driven Framework for Sign Language Video Recognition and Performance Evaluation on Fine-Tuned YOLO Models  16
VisioSLR: A Vision Data-Driven Framework for Sign Language V...
收藏 引用
16th International Conference on Ambient Systems, Networks and Technologies Networks, ANT 2025 / 8th International Conference on Emerging Data and Industry 4.0, EDI40 2025
作者: Ismail, Leila Shahin, Nada Tesfaye, Henok Hennebelle, Alain Lab Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University United Arab Emirates
With the emergence of AI for good, there has been an increasing interest in building computer vision data-driven deep learning inclusive AI solutions. Sign language Recognition (SLR) has gained attention recently. It ... 详细信息
来源: 评论
Big Data Bot with a Special Reference to Bioinformatics
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4155-4173页
作者: Ahmad M.Al-Omari Shefa M.Tawalbeh Yazan H.Akkam Mohammad Al-Tawalbeh Shima’a Younis Abdullah A.Mustafa Jonathan Arnold Biomedical Systems and Informatics Engineering Department Yarmouk UniversityIrbid21163Jordan Department of Medicinal Chemistry and Pharmacognosy Yarmouk UniversityIrbid21163Jordan Department of Electrical Computer and Software EngineeringUniversity of Ontario Institute of TechnologyOshawaL1H7K4Canada Department of Mechanical Engineering University of MosulMosul41001Iraq Genetics Department University of GeorgiaAthens30602GAUSA
There are quintillions of data on deoxyribonucleic acid(DNA)and protein in publicly accessible data banks,and that number is expanding at an exponential *** scientific fields,such as bioinformatics and drug discovery,... 详细信息
来源: 评论
Accurate Anomaly Detection in Medical Images using Transfer Learning and Data Optimization: MRI and CT as Case Studies  5
Accurate Anomaly Detection in Medical Images using Transfer ...
收藏 引用
5th International Conference on Neural Networks and Neurotechnologies, NeuroNT 2024
作者: Nizamli, Yasser Filatov, Anton Yu. Fadel, Weaam Shichkina, Yulia A. Saint Petersburg Electrotechnical University 'LETI' Department of Software Engineering and Computer Applications Saint Petersburg Russia Saint Petersburg Electrotechnical University 'LETI' Department of Computer Science Saint Petersburg Russia
Today, medical imaging techniques are widely used to detect a variety of human conditions and diseases. To speed up the diagnostic process, systems are often automated using deep learning methods, which have been prov... 详细信息
来源: 评论
A High Availability Microservices Architecture Implementation using Saga and Backup Mechanism  10
A High Availability Microservices Architecture Implementatio...
收藏 引用
10th International Conference on Dependable Systems and Their Applications, DSA 2023
作者: Lee, Wen-Tin Song, Ping-Yi Tsai, Ming-Kai Wu, Meng-Hsien Ma, Shang-Pin National Kaohsiung Normal University Department of Software Engineering and Management Kaohsiung Taiwan National Taiwan Ocean University Department of Computer Science and Information Engineering Keelung Taiwan
In recent years, the proliferation of complex applications has led to the emergence of microservices architecture as the preferred approach for developing largescale applications. Consequently, numerous design pattern... 详细信息
来源: 评论
Image Steganography using Least Significant Bit (LSB)-A Systematic Literature Review  2
Image Steganography using Least Significant Bit (LSB)-A Syst...
收藏 引用
2nd International Conference on Computing and Information Technology, ICCIT 2022
作者: Aslam, Muhammad Adnan Rashid, Muhammad Azam, Farooque Abbas, Muhammad Rasheed, Yawar Alotaibi, Saud S. Anwar, Muhammad Waseem Department of Computer Software Engineering Islamabad Pakistan Umm Al-Qura University Computer Engineering Department Makkah Saudi Arabia
Digital image steganography is used to hide confidential data within a cover image. In this context, least significant bit (LSB) is a well-known steganography approach. As LSB is frequently applied for image steganogr... 详细信息
来源: 评论
Implementation of a Physically Unclonable Function on an FPGA
Implementation of a Physically Unclonable Function on an FPG...
收藏 引用
2023 IEEE International Conference on Smart Information Systems and Technologies, SIST 2023
作者: Baideldinov, Marat Usserbaev, Muratbek Mukanova, Zhanna L.N. Gumilyov Eurasian National University Department of 'Computer and Software Engineering' Astana Kazakhstan S.Seifullin Kazakh Agro Technical University Department 'Technological Machines and Equipment' Astana Kazakhstan Turan University Department of 'Computer and Software Engineering' Almaty Kazakhstan
This paper shows the implementation of a physically unclonable function (PUF) of the arbiter type and its modifications, the generation of random numbers and unique identifiers, and a statistical analysis of the gener... 详细信息
来源: 评论