咨询与建议

限定检索结果

文献类型

  • 2,041 篇 会议
  • 857 篇 期刊文献

馆藏范围

  • 2,898 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,724 篇 工学
    • 1,336 篇 计算机科学与技术...
    • 1,109 篇 软件工程
    • 332 篇 信息与通信工程
    • 297 篇 控制科学与工程
    • 162 篇 生物工程
    • 146 篇 电气工程
    • 118 篇 生物医学工程(可授...
    • 117 篇 电子科学与技术(可...
    • 114 篇 机械工程
    • 83 篇 安全科学与工程
    • 81 篇 光学工程
    • 72 篇 动力工程及工程热...
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
    • 56 篇 网络空间安全
  • 774 篇 理学
    • 413 篇 数学
    • 187 篇 生物学
    • 147 篇 系统科学
    • 144 篇 物理学
    • 123 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 125 篇 医学
    • 115 篇 临床医学
    • 95 篇 基础医学(可授医学...
  • 80 篇 法学
    • 60 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 55 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 149 篇 software enginee...
  • 135 篇 computer science
  • 75 篇 application soft...
  • 75 篇 computational mo...
  • 70 篇 laboratories
  • 68 篇 software systems
  • 68 篇 deep learning
  • 65 篇 machine learning
  • 65 篇 software
  • 65 篇 accuracy
  • 59 篇 computer archite...
  • 57 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 46 篇 cloud computing
  • 44 篇 security
  • 42 篇 data mining

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 19 篇 college of compu...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 16 篇 department of sy...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of softwa...
  • 10 篇 department of el...
  • 10 篇 department of in...

作者

  • 46 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,800 篇 英文
  • 81 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Systems and Software Engineering"
2898 条 记 录,以下是121-130 订阅
排序:
Weber Law Based Approach for Multi-Class Image Forgery Detection
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 145-166页
作者: Arslan Akram Javed Rashid Arfan Jaffar Fahima Hajjej Waseem Iqbal Nadeem Sarwar Department of Computer Science Superior UniversityLahore54000Pakistan Information Technology Services University of OkaraOkara56300Pakistan Departmet of Computer Science MLC LabOkara56300Pakistan Department of CS&SE International Islamic UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science Bahria UniversityLahore CampusLahore54600Pakistan
Today’s forensic science introduces a new research area for digital image analysis formultimedia ***,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegi... 详细信息
来源: 评论
From Data to Diagnosis: Investigating Approaches in Mental Illness Detection  2
From Data to Diagnosis: Investigating Approaches in Mental I...
收藏 引用
2nd International Conference of Intelligent Methods, systems and Applications, IMSA 2024
作者: Montasser, Reem Kadry Mazen, Sherif A. Helal, Iman M. A. October University for Modern Sciences and Arts Faculty of Computer Science Software Engineering Department Giza Egypt Cairo University Faculty of Computers and Artificial Intelligence Information Systems Department Giza Egypt
Mental illness is a considerable global public health problem, impacting both individual well-being and society's health. The growing popularity of social media and the increase of other data sources led to more r... 详细信息
来源: 评论
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4615-4630页
作者: Erssa Arif Syed Khuram Shahzad Muhammad Waseem Iqbal Muhammad Arfan Jaffar Abdullah S.Alshahrani Ahmed Alghamdi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Faculty of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword... 详细信息
来源: 评论
Network Traffic Classifiers for Internet of Things Intrusion Detection using Machine Learning Classifiers  3
Network Traffic Classifiers for Internet of Things Intrusion...
收藏 引用
3rd International Conference on Innovative Sustainable Computational Technologies, CISCT 2023
作者: Uniyal, Anita Mishra, Amit Kumar Manushi Pant, Yogesh Computer Science & Engineering GRD IMT Dehradun India Graphic Era Hill University Department of Computer Science & Engineering Dehradun India GRD IMT Department of Computer Science & Engineering Dehradun India Software Business Systems Consultanting India Private Limited India
In today's era smart devices are integral part of our life and every device becomes smart if it is equipped with sensors and having ability to connect with internet. Without any hindrance we can connect and intera... 详细信息
来源: 评论
Integrity Estimation of Twitter Based Event Recognition Using Scrutiny of Analyzed Data  2
Integrity Estimation of Twitter Based Event Recognition Usin...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Siva Rama Lingham, N. Parameswari, M. Karthick, P. Priya, T. Subha Rathi Rajesh, G. Jagannathan, J. Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India Knowledge Institute of Technology Department of Computer Science and Engineering Salem India Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College Department of Computer Science and Engineering Chennai India School of Engineering and Technology Jeppiaar University Chennai India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Department of Software and Systems Engineering Vellore Katpadi632014 India
Twitter has been observed to be one of the essential data resources for dependable event accreditation. In any case, Twitter-based event affirmation structures can't guarantee assessment concerning their attestati... 详细信息
来源: 评论
Improved Ingredients-based Recipe Recommendation software using Machine Learning  11
Improved Ingredients-based Recipe Recommendation Software us...
收藏 引用
11th IEEE International Conference on Intelligent Computing and Information systems, ICICIS 2023
作者: Ashraf, Mariam Tarek, Khadija Fathy, Naglaa Mahmoud, Mariam Emad, Rana Khaled, Khadija Amr, Noran Ain Shams University Faculty of Computer and Information Science Software Engineering Department Cairo Egypt Ain Shams University Faculty of Computer and Information Science Information Systems Department Cairo Egypt
In this paper we propose an improved recipe recommendation system that employs image recognition of food ingredients. The system is currently a mobile application that performs image recognition on uploaded or camera-... 详细信息
来源: 评论
computer-Aided Potato Disease Detection by Using Deep Learning Techniques
Computer-Aided Potato Disease Detection by Using Deep Learni...
收藏 引用
International Conference on Green Energy, Computing, and Intelligent Technology, GEn-CITy 2023
作者: Razaq, Fareeha Bilal, Muhammad Ramzan, Muhammad Naveed, Muhammad Razzaq, Samreen Department of Computer Science University of Sargodha Sargodha Pakistan Department of Computing and Information Systems School of Engineering and Technology Sunway University Petaling Jaya Malaysia Department of Software Engineering University of Sargodha Sargodha Pakistan School of Electronics and Computer Science University of Southampton Malaysia Iskandar Puteri Malaysia
Potato is the most widely grown and consumed food throughout the world. There are a number of potato crop diseases that affect production, and these diseases differ in symptoms, circumstances, and controls. Early dete... 详细信息
来源: 评论
High-Accuracy Hand Segmentation for Palmprint Biometric systems Improving Auto-Encoder Techniques  8
High-Accuracy Hand Segmentation for Palmprint Biometric Syst...
收藏 引用
8th International Symposium on Innovative Approaches in Smart Technologies, ISAS 2024
作者: Yalcin, Kadir Dogan, Ramazan Ozgur Dogan, Hulya Bingol, Ozkan Graduate Education Institute Gumushane University Department of Artificial Intelligence and Intelligent Systems Gumushane Turkey Trabzon University Faculty of Computer and Information Sciences Department of Artificial Intelligence Engineering Trabzon Turkey Karadeniz Technical University Faculty of Engineering Department of Software Engineering Trabzon Turkey Gumushane University Faculty of Eng. and Natural Sciences Department of Software Engineering Gumushane Turkey
Biometric technologies have been widely adopted in various commercial products, ranging from security systems to personal devices, due to their exceptional reliability and user-friendliness. Among these, palmprint bio... 详细信息
来源: 评论
Automated Surface Classification System Using Vibration Patterns - A Case Study With Wheelchairs
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第4期4卷 884-895页
作者: Yu, Haoxiang Raychoudhury, Vaskar Saha, Snehanshu Edinger, Janick Smith, Roger O. Gani, Md Osman The University of Texas at Austin Department of Electrical and Computer Engineering AustinTX78712 United States Miami University Department of Computer Science & Software Engineering OxfordOH45056 United States Bits Pilani K.K. Birla Goa Campus Department of Computer Science & Information Systems Appcair Zuarinagar403726 India University of Hamburg Department of Informatics & Distributed Operating Systems Hamburg20146 Germany University of Wisconsin-Milwaukee Department of Rehabilitation Sciences & Technology MilwaukeeWI53706 United States University of Maryland Baltimore County Department of Information Systems BaltimoreMD21250 United States
Finding a barrier-free accessible path through the built environment is necessary for wheelchair users. Researchers have identified the effect of surface vibration on the health of wheelchair users and proposed variou... 详细信息
来源: 评论
Development of Day-Ahead Peer-to-Peer Energy Trading with Time-Series Clustering
Development of Day-Ahead Peer-to-Peer Energy Trading with Ti...
收藏 引用
2023 IEEE International Conference on Applied Superconductivity and Electromagnetic Devices, ASEMD 2023
作者: Noorfatima, Nadya Jung, Jaesung Onen, Ahmet Yoldas, Yeliz Ajou University Department of Energy Systems Research Suwon Korea Republic of Sultan Qaboos University Department of Electrical and Computer Engineering Muscat Oman Kayseri University Department of Software Engineering Kayseri Turkey
Day-ahead trading of electricity has been applied to ensure the balance between the amount of electricity sold and bought. Even so, due to the intermittent distributed energy resources (DERs), the actual condition can... 详细信息
来源: 评论