咨询与建议

限定检索结果

文献类型

  • 1,461 篇 会议
  • 694 篇 期刊文献
  • 48 册 图书

馆藏范围

  • 2,203 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,308 篇 工学
    • 1,018 篇 计算机科学与技术...
    • 860 篇 软件工程
    • 224 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 128 篇 生物工程
    • 95 篇 电气工程
    • 92 篇 机械工程
    • 90 篇 生物医学工程(可授...
    • 71 篇 电子科学与技术(可...
    • 62 篇 安全科学与工程
    • 56 篇 光学工程
    • 47 篇 动力工程及工程热...
    • 46 篇 仪器科学与技术
    • 44 篇 土木工程
    • 43 篇 建筑学
    • 42 篇 网络空间安全
  • 568 篇 理学
    • 304 篇 数学
    • 147 篇 生物学
    • 115 篇 系统科学
    • 99 篇 物理学
    • 95 篇 统计学(可授理学、...
  • 378 篇 管理学
    • 269 篇 管理科学与工程(可...
    • 142 篇 工商管理
    • 139 篇 图书情报与档案管...
  • 102 篇 医学
    • 94 篇 临床医学
    • 79 篇 基础医学(可授医学...
    • 42 篇 公共卫生与预防医...
  • 57 篇 法学
    • 43 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 41 篇 教育学
    • 41 篇 教育学
  • 18 篇 农学
  • 8 篇 文学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 143 篇 software enginee...
  • 135 篇 computer science
  • 58 篇 deep learning
  • 57 篇 laboratories
  • 57 篇 machine learning
  • 55 篇 software systems
  • 53 篇 application soft...
  • 52 篇 accuracy
  • 51 篇 computational mo...
  • 49 篇 artificial intel...
  • 45 篇 cloud computing
  • 44 篇 training
  • 43 篇 computer archite...
  • 43 篇 software
  • 38 篇 grid computing
  • 37 篇 resource managem...
  • 37 篇 quality of servi...
  • 35 篇 systems engineer...
  • 35 篇 security
  • 34 篇 support vector m...

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 23 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 institute for so...
  • 12 篇 department of so...
  • 12 篇 school of inform...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...
  • 10 篇 max planck insti...
  • 10 篇 department of in...
  • 9 篇 cloud computing ...
  • 9 篇 school of softwa...
  • 9 篇 school of intell...

作者

  • 48 篇 rajkumar buyya
  • 35 篇 junping du
  • 35 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 24 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 gautam biswas
  • 14 篇 biswas gautam
  • 14 篇 zamli kamal z.
  • 13 篇 materwala huned
  • 12 篇 veera boonjing
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 choo kim-kwang r...
  • 11 篇 juergen rilling
  • 10 篇 cheng betty h. c...

语言

  • 1,992 篇 英文
  • 204 篇 其他
  • 9 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science - Software Systems Engineering Clausthal"
2203 条 记 录,以下是61-70 订阅
排序:
Weber Law Based Approach for Multi-Class Image Forgery Detection
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 145-166页
作者: Arslan Akram Javed Rashid Arfan Jaffar Fahima Hajjej Waseem Iqbal Nadeem Sarwar Department of Computer Science Superior UniversityLahore54000Pakistan Information Technology Services University of OkaraOkara56300Pakistan Departmet of Computer Science MLC LabOkara56300Pakistan Department of CS&SE International Islamic UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science Bahria UniversityLahore CampusLahore54600Pakistan
Today’s forensic science introduces a new research area for digital image analysis formultimedia ***,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegi... 详细信息
来源: 评论
Dual Approach in Autonomous Directional Drilling: Innovations with Drillbotics 1.5 Inch Automated RSS and Virtual Rig Platforms
Dual Approach in Autonomous Directional Drilling: Innovation...
收藏 引用
2025 SPE/IADC International Drilling Conference and Exhibition, DC 2025
作者: Soilemezidis, C. Mensah, J.S. Hollstein, W. Al Maasarani, K. Alkhawaja, A. Jamali, F. Dörfler, G. Hölzner, N. Jarbouh, K.A. Ustaoglu, D. Alukkal, A.T. Gudhane, L.A.Y. Jaeger, P. Feldmann, E. Carvajal, C.A.P. Yin, A.O. Sinkuu, L. Quayson, J. Amoah, F.B. Yahaya, H.S. Owusu, K.A. Dongoyo, C.K.N. Owusu, A. Amorin, R. Florence, F. Institute of Subsurface Energy Systems Clausthal University of Technology Lower Saxony Clausthal-Zellerfeld Germany Department of Petroleum and Natural Gas Engineering University of Mines and Technology Tarkwa Ghana Institute of Mechanical Engineering Clausthal University of Technology Lower Saxony Clausthal-Zellerfeld Germany Institute of Economics Clausthal University of Technology Lower Saxony Clausthal-Zellerfeld Germany Institute of Informatics Clausthal University of Technology Lower Saxony Clausthal-Zellerfeld Germany Department of Electrical and Electronics Engineering University of Mines and Technology Tarkwa Ghana Department of Computer Science and Engineering University of Mines and Technology Tarkwa Ghana Department of Petroleum Geoscience University of Mines and Technology Tarkwa Ghana Rig Operations AustinTX United States
SPE’s Drilling systems Automation Technical Section (DSATS) sponsors the Drillbotics® autonomous drilling contest to promote advanced learning at participating universities. Two groups worked separately to drill... 详细信息
来源: 评论
A Parallel Hybrid Testing Technique for Tri-Programming Model-Based software systems
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4501-4530页
作者: Huda Basloom Mohamed Dahab Abdullah Saad AL-Ghamdi Fathy Eassa Ahmed Mohammed Alghamdi Seif Haridi Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia KTH Royal Institute of Technology StockholmSweden
Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple ... 详细信息
来源: 评论
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4615-4630页
作者: Erssa Arif Syed Khuram Shahzad Muhammad Waseem Iqbal Muhammad Arfan Jaffar Abdullah S.Alshahrani Ahmed Alghamdi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Faculty of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword... 详细信息
来源: 评论
A Three-Dimensional Real-Time Gait-Based Age Detection System Using Machine Learning
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 165-182页
作者: Muhammad Azhar Sehat Ullah Khalil Ullah Habib Shah Abdallah Namoun Khaliq Ur Rahman Department of Computer Science&IT University of MalakandChakdara18800Pakistan Department of Software Engineering University of MalakandChakdara18800Pakistan College of Computer Science King Khalid UniversityAbha62529Saudi Arabia Faculty of Computer and Information Systems Islamic University of MadinahMadinah42351Saudi Arabia Department of Statistics Abdul Wali Khan UniversityMardan23200Pakistan
Human biometric analysis has gotten much attention due to itswidespread use in different research areas, such as security, surveillance,health, human identification, and classification. Human gait is one of the keyhum... 详细信息
来源: 评论
Convergence Track Based Adaptive Differential Evolution Algorithm(CTbADE)
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 1229-1250页
作者: Qamar Abbas Khalid Mahmood Malik Abdul Khader Jilani Saudagar Muhammad Badruddin Khan Mozaherul Hoque Abul Hasanat Abdullah AlTameem Mohammed AlKhathami Department of Computer Science and Software Engineering International Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Engineering Oakland UniversityRochesterMIUSA Information Systems Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)RiyadhSaudi Arabia
One of the challenging problems with evolutionary computing algorithms is to maintain the balance between exploration and exploitation capability in order to search global optima.A novel convergence track based adapti... 详细信息
来源: 评论
Injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3605-3622页
作者: Abdulgbar A.R.Farea Gehad Abdullah Amran Ebraheem Farea Amerah Alabrah Ahmed A.Abdulraheem Muhammad Mursil Mohammed A.A.Al-qaness School of Big Data&Software Engineering Chongqing UniversityChongqing401331China Department of Management Science Engineering Dalian University of TechnologyDalian116024China Software College Northeastern UniversityShenyang110169China Department of Information Systems College of Computer and Information ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Management Science and Engineering South China University of TechnologyGuangzhou510641China Department of Computer Engineering and Mathematics University of Rovira i VirgiliTarragonaSpain College of Physics and Electronic Information Engineering Zhejiang Normal UniversityJinhua321004China
E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely *** web developers may have varying lev... 详细信息
来源: 评论
Integrity Estimation of Twitter Based Event Recognition Using Scrutiny of Analyzed Data  2
Integrity Estimation of Twitter Based Event Recognition Usin...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Siva Rama Lingham, N. Parameswari, M. Karthick, P. Priya, T. Subha Rathi Rajesh, G. Jagannathan, J. Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India Knowledge Institute of Technology Department of Computer Science and Engineering Salem India Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College Department of Computer Science and Engineering Chennai India School of Engineering and Technology Jeppiaar University Chennai India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Department of Software and Systems Engineering Vellore Katpadi632014 India
Twitter has been observed to be one of the essential data resources for dependable event accreditation. In any case, Twitter-based event affirmation structures can't guarantee assessment concerning their attestati... 详细信息
来源: 评论
AI-Driven Virtual Mock Interview Development  13
AI-Driven Virtual Mock Interview Development
收藏 引用
Joint 13th International Conference on Soft Computing and Intelligent systems and 25th International Symposium on Advanced Intelligent systems, SCIS and ISIS 2024
作者: Mishra, Prabhat Kumar Arulappan, Arun Kumar Ra, In-Ho Thanga Mariappan, L. Gina Rose, G. Lee, Young-Seok School of Computer Science Engineering and Information Systems Vit University Vellore India School of Computer and Software Kunsan National University Gunsan Korea Republic of Anna University Department of Computer Technology Chennai India
The integration of Artificial Intelligence (AI) into educational technologies marks a significant shift in learning methodologies and operational dynamics within educational institutions. At the forefront is an AI-dri... 详细信息
来源: 评论
Robust In-Vehicle Diagnostic-Based Intrusion Detection System
Robust In-Vehicle Diagnostic-Based Intrusion Detection Syste...
收藏 引用
2024 International Symposium on Networks, computers and Communications, ISNCC 2024
作者: Shafee, Ahmed Awaad, Tasneem A. Moro, Ahmed Adams State University Department of Engineering and Computer Science AlamosaCO United States Ain Shams University Faculty of Engineering Department of Computer and Systems Engineering Cairo Egypt Siemens Eda Cairo Egypt Siemens Digital Industries Software Integrated Electrical Systems Segment Cairo Egypt
Cybersecurity has become a significant concern for automotive manufacturers as modern cars increasingly incorporate electronic components. Electronic Control Units (ECUs) have evolved to become the central control uni... 详细信息
来源: 评论