咨询与建议

限定检索结果

文献类型

  • 11,288 篇 会议
  • 5,205 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,722 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,273 篇 工学
    • 8,183 篇 计算机科学与技术...
    • 6,802 篇 软件工程
    • 2,007 篇 信息与通信工程
    • 1,350 篇 控制科学与工程
    • 1,100 篇 生物工程
    • 831 篇 电气工程
    • 730 篇 生物医学工程(可授...
    • 680 篇 机械工程
    • 605 篇 电子科学与技术(可...
    • 554 篇 光学工程
    • 414 篇 安全科学与工程
    • 350 篇 仪器科学与技术
    • 340 篇 化学工程与技术
    • 326 篇 动力工程及工程热...
    • 325 篇 建筑学
  • 4,531 篇 理学
    • 2,653 篇 数学
    • 1,236 篇 生物学
    • 827 篇 物理学
    • 747 篇 统计学(可授理学、...
    • 632 篇 系统科学
    • 348 篇 化学
  • 3,156 篇 管理学
    • 1,914 篇 管理科学与工程(可...
    • 1,357 篇 图书情报与档案管...
    • 947 篇 工商管理
  • 714 篇 医学
    • 623 篇 临床医学
    • 554 篇 基础医学(可授医学...
    • 327 篇 药学(可授医学、理...
  • 485 篇 法学
    • 373 篇 社会学
  • 328 篇 教育学
    • 318 篇 教育学
  • 320 篇 经济学
    • 318 篇 应用经济学
  • 173 篇 农学
  • 71 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,071 篇 computer science
  • 1,019 篇 software enginee...
  • 316 篇 deep learning
  • 303 篇 application soft...
  • 299 篇 computational mo...
  • 271 篇 data mining
  • 243 篇 computer archite...
  • 243 篇 machine learning
  • 229 篇 software
  • 202 篇 software systems
  • 201 篇 accuracy
  • 196 篇 feature extracti...
  • 196 篇 training
  • 188 篇 internet of thin...
  • 188 篇 support vector m...
  • 181 篇 programming
  • 171 篇 educational inst...
  • 169 篇 optimization
  • 169 篇 semantics
  • 168 篇 laboratories

机构

  • 356 篇 college of compu...
  • 197 篇 department of co...
  • 155 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 106 篇 school of softwa...
  • 105 篇 department of co...
  • 91 篇 department of co...
  • 86 篇 department of co...
  • 80 篇 school of inform...
  • 72 篇 department of co...
  • 72 篇 department of co...
  • 70 篇 department of co...
  • 66 篇 school of comput...
  • 52 篇 department of co...
  • 49 篇 department of co...
  • 48 篇 school of softwa...
  • 47 篇 department of co...
  • 46 篇 software enginee...
  • 46 篇 department of co...

作者

  • 66 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 47 篇 xiao qin
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 31 篇 mian ajmal
  • 30 篇 zhao jian
  • 29 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 parizi reza m.
  • 23 篇 christopher leck...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry
  • 21 篇 rehman attique u...
  • 21 篇 lin qiuzhen
  • 20 篇 wang lei

语言

  • 15,874 篇 英文
  • 737 篇 其他
  • 121 篇 中文
  • 8 篇 德文
  • 3 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Science Software Engineering"
16722 条 记 录,以下是41-50 订阅
排序:
Hybrid Color Texture Features Classification Through ANN for Melanoma
收藏 引用
Intelligent Automation & Soft Computing 2023年 第2期35卷 2205-2218页
作者: Saleem Mustafa Arfan Jaffar Muhammad Waseem Iqbal Asma Abubakar Abdullah S.Alshahrani Ahmed Alghamdi Faculty of Computer Science&Information Technology Superior UniversityLahore54600Pakistan Department of Software Engineering Superior UniversityLahore54600Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of Jeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia
Melanoma is of the lethal and rare types of skin *** is curable at an initial stage and the patient can survive *** is very difficult to screen all skin lesion patients due to costly *** are requiring a correct method ... 详细信息
来源: 评论
Provably secure authentication protocol for traffic exchanges in unmanned aerial vehicles
收藏 引用
High-Confidence Computing 2023年 第4期3卷 60-72页
作者: Vincent Omollo Nyangaresi Department of Computer Science&Software Engineering Jaramogi Oginga Odinga University of Science&TechnologyKenya
Unmanned aerial vehicles offer services such as military reconnaissance in potentially adversarial controlled *** addition,they have been deployed in civilian critical infrastructure *** this environment,real-time and... 详细信息
来源: 评论
Crowd dynamics analysis and behavior recognition in surveillance videos based on deep learning
收藏 引用
Multimedia Tools and Applications 2024年 1-35页
作者: Ilyas, Anum Bawany, Narmeen Center for Computing Research Department of Computer Science and Software Engineering Jinnah University for Women Karachi Pakistan
Video surveillance is widely adopted across various sectors for purposes such as law enforcement, COVID-19 isolation monitoring, and analyzing crowds for potential threats like flash mobs or violence. The vast amount ... 详细信息
来源: 评论
Leveraging the Potential of Large Language Models
收藏 引用
Informatica (Slovenia) 2024年 第8期48卷 1-16页
作者: Prasad, Shreya Gupta, Himank Ghosh, Arup Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore India Department of Computer Science and Information Technology Graceland University LamoniIA United States
This study focuses on enhancing Natural Language Processing (NLP) in generative AI chatbots through the utilization of advanced pre-trained models. We assessed five distinct Large Language Models (LLMs): TRANSFORMER M... 详细信息
来源: 评论
Is GPT-4 Conscious?
Journal of Artificial Intelligence and Consciousness
收藏 引用
Journal of Artificial Intelligence and Consciousness 2024年 第1期11卷 1-16页
作者: Tait, Izak Bensemann, Joshua Wang, Ziqi Computer Science and Software Engineering Department Auckland University of Technology NAOInstitute The University of Auckland
GPT-4 (Generative Pre-Trained Transformer 4) is often heralded as a leading commercial AI offering, sparking debates over its potential as a steppingstone toward Artificial General Intelligence. But does it possess co... 详细信息
来源: 评论
Caching Strategies in NDN Based Wireless Ad Hoc Network:A Survey
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 61-103页
作者: Ahmed Khalid Rana Asif Rehman Byung-Seo Kim Department of Computer Science FAST School of ComputingNational University of Computer and Emerging SciencesLahore54000Pakistan Department of Software and Communications Engineering Hongik UniversitySejong City30016Republic of Korea
Wireless Ad Hoc Networks consist of devices that are wirelessly *** Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc *** is used in wireless ... 详细信息
来源: 评论
Identification of software Bugs by Analyzing Natural Language-Based Requirements Using Optimized Deep Learning Features
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4379-4397页
作者: Qazi Mazhar ul Haq Fahim Arif Khursheed Aurangzeb Noor ul Ain Javed Ali Khan Saddaf Rubab Muhammad Shahid Anwar Department of Computer Science and Engineering and International Bachelor’s Program in Informatics Yuan Ze UniversityZhongliTaoyuan320315Taiwan Department of Computer Science National University of PakistanRawalpindiPunjab46000Pakistan Department of Computer Software Engineering MCSNational University of Sciences and TechnologyIslamabad44000Pakistan Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Department of Computer Science School of PhysicsEngineering and Computer ScienceUniversity of HertfordshireHatfieldAL109ABUK Department of Computer Engineering College of Computing and InformaticsUniversity of SharjahSharjah27272United Arab Emirates Department of AI and Software Gachon UniversitySeongnam-SI13120South Korea
software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty *** are exploring machine learning to predict softwa... 详细信息
来源: 评论
Systematic analysis of on-premise and cloud services
收藏 引用
International Journal of Cloud Computing 2024年 第3期13卷 214-242页
作者: Ali, Asif Laghari, Asif Ali Kandhro, Irfan Ahmed Kumar, Kamlesh Younus, Salman Department of Computer Science Sindh Madressatul Islam University Karachi Pakistan Department of Software Engineering Sindh Madressatul Islam University Karachi Pakistan
There are two key distinctions between cloud and on-premise (OP) software, the cost for each varies and so does the level of control. As organisations explore to reduce costs, many data and rules are migrating to mult... 详细信息
来源: 评论
Penetration Testing Operating Systems: Exploiting Vulnerabilities
Penetration Testing Operating Systems: Exploiting Vulnerabil...
收藏 引用
2024 IEEE International Conference on Communications, Computing, Cybersecurity and Informatics, CCCI 2024
作者: Gardner, Evan Singh, Gurmeet Qu, Weihao Software Engineering Monmouth University Department of Computer Science United States
The safeguarding of critical data stored on devices such as phones, computers, and tablets against unauthorized access has emerged as a central concern in modern society. Along with the increasing reliance on these de... 详细信息
来源: 评论
Spatial Correlation Module for Classification of Multi-Label Ocular Diseases Using Color Fundus Images
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 133-150页
作者: Ali Haider Khan Hassaan Malik Wajeeha Khalil Sayyid Kamran Hussain Tayyaba Anees Muzammil Hussain Department of Software Engineering Faculty of Computer SciencesLahore Garrison UniversityLahorePakistan Department of Computer Science School of Systems and TechnologyUniversity of Management and TechnologyLahore54000Pakistan Department of Computer Science&Information Technology University of Engineering and Technology(UET)PeshawarPakistan Department of Computer Science TIMES InstituteMultan60000Pakistan Department of Software Engineering School of Systems and TechnologyUniversity of Management and TechnologyLahore54000Pakistan
To prevent irreversible damage to one’s eyesight,ocular diseases(ODs)need to be recognized and treated *** fundus imaging(CFI)is a screening technology that is both effective and *** to CFIs,the early stages of the d... 详细信息
来源: 评论