咨询与建议

限定检索结果

文献类型

  • 2,043 篇 会议
  • 870 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 2,969 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,732 篇 工学
    • 1,341 篇 计算机科学与技术...
    • 1,109 篇 软件工程
    • 332 篇 信息与通信工程
    • 298 篇 控制科学与工程
    • 162 篇 生物工程
    • 146 篇 电气工程
    • 120 篇 电子科学与技术(可...
    • 118 篇 生物医学工程(可授...
    • 114 篇 机械工程
    • 83 篇 安全科学与工程
    • 81 篇 光学工程
    • 72 篇 动力工程及工程热...
    • 65 篇 仪器科学与技术
    • 65 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
    • 56 篇 网络空间安全
  • 775 篇 理学
    • 413 篇 数学
    • 188 篇 生物学
    • 147 篇 系统科学
    • 144 篇 物理学
    • 123 篇 统计学(可授理学、...
    • 67 篇 化学
  • 508 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 199 篇 工商管理
    • 191 篇 图书情报与档案管...
  • 126 篇 医学
    • 116 篇 临床医学
    • 96 篇 基础医学(可授医学...
  • 81 篇 法学
    • 61 篇 社会学
  • 60 篇 经济学
    • 60 篇 应用经济学
  • 56 篇 教育学
  • 23 篇 农学
  • 12 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 135 篇 computer science
  • 77 篇 computational mo...
  • 75 篇 application soft...
  • 70 篇 deep learning
  • 70 篇 laboratories
  • 68 篇 software systems
  • 67 篇 machine learning
  • 67 篇 accuracy
  • 65 篇 software
  • 63 篇 artificial intel...
  • 60 篇 computer archite...
  • 58 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 47 篇 grid computing
  • 46 篇 cloud computing
  • 45 篇 security

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 school of softwa...
  • 10 篇 school of intell...
  • 10 篇 department of el...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 song houbing
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 parashar manish

语言

  • 2,871 篇 英文
  • 81 篇 其他
  • 14 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Computer Systems and Software Engineering"
2969 条 记 录,以下是381-390 订阅
排序:
Empowering Personalized Health Data Queries with Knowledge Graph and GPT-Enhanced Voice Assistant  25
Empowering Personalized Health Data Queries with Knowledge G...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data Science and systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Wang, Xin Ul Hasan, Wordh Li, Juan Hendawi, Rasha Du, Yang Xie, Bo Tao, Cui North Dakota State University Department of Computer Science Fargo United States Valley City State University Department of Computer Systems and Software Engineering Valley City United States School of Nursing The University of Texas at Austin Austin United States School of Biomedical Informatics University of Texas Health Science Center at Houston Houston United States
The proliferation of digital health technologies has led to an abundance of personal health data. However, querying and retrieving specific health-related information from disparate sources can be challenging and inco... 详细信息
来源: 评论
Artificial Intelligence For Realtime Face Recognition Attendance Using College Classrooms and Buses
Artificial Intelligence For Realtime Face Recognition Attend...
收藏 引用
Electrical Electronics and Computing Technologies (ICEECT), International Conference on
作者: Ahila A Hosanna Princye P Poonguzhali A Kavivendhan M. Deepa A. Arthy R. Saravanakumar Department of Electronics and Communication Engineering Sri Sairam College of Engineering Anekal Bangalore India Department of Computer Science and Business Systems Francis Xavier Engineering College Tirunelveli Tamil Nadu India Software Analyst Iconix Software Solution Tirunelveli Tamil Nadu India
Teachers take attendance by having pupils sign in or check-in classes and transportation. Student absences often result from individual mistakes. This article examines a technology that records data from classroom pho... 详细信息
来源: 评论
Using Pi Zero SBCs as a Low-Cost Driver Monitoring Solution
Using Pi Zero SBCs as a Low-Cost Driver Monitoring Solution
收藏 引用
Robotics, Automation and Artificial Intelligence (RAAI), IEEE International Conference on
作者: Hady A. Khalil Sherif A. Hammad Hossam E. Abdelmunim Shady A. Maged Department of Mechatronics Engineering Faculty of Engineering Ain Shams University Cairo Egypt Garraio for Software Innovations Cairo Egypt Computer and Systems Engineering Faculty of Engineering Ain Shams University Cairo Egypt
Driver monitoring systems have become a vital component of Advanced Driver Assistance systems (ADAS) for vehicle safety. According to the U.S. National Highway Traffic Safety Administration, drowsy driving contributes... 详细信息
来源: 评论
Research and development of two-factor authentication methods using neural networks  4
Research and development of two-factor authentication method...
收藏 引用
4th IEEE International Conference on Smart Information systems and Technologies, SIST 2024
作者: Darbek, Temirkhan Mukasheva, Assel Bissembayev, Alibek Gnatyuk, Sergiy Mukammejanova, Dinargul The Department of Information Systems and Cybersecurity Almaty university of power engineering and telecommunications Almaty Kazakhstan The School of Information Technology and Engineering Kazakh-British Technical University Almaty Kazakhstan The School of Information Technology and Engineering Kazakh British Technical University Almaty Kazakhstan The Faculty of Cybersecurity Computer and Software Engineering at National Aviation University National Aviation University Kyiv Ukraine The Department of Artificial Intelligence and Big Data Kazakh National University named after Al-Farabi Almaty Kazakhstan
This article is devoted to the research and development of innovative two-factor authentication (2FA) methods using neural networks. 2FA plays a key role in ensuring the security of data and accounts in the modern dig... 详细信息
来源: 评论
Baby Bump: A Monitoring System for Pregnant Mothers and Babies
Baby Bump: A Monitoring System for Pregnant Mothers and Babi...
收藏 引用
International Conference for Convergence of Technology (I2CT)
作者: Dhanuka Balasooriya Sasini Perera Dinuka R. Wijendra Sahani Rathnayaka Rajendra Kishan Karthiga Rajendran Markandu Thirukumar Department of Computer Systems and Software Engineering Sri Lankan Institute of Information Technology Malabe Sri Lanka Department of Obstetrics & Gynaecology Teaching Hospital Batticaloa Sri Lanka
In contemporary times, nations like Sri Lanka are actively enhancing their efforts to improve the life expectancy of their citizens, with a strong focus on public health. The relationship between health and life expec... 详细信息
来源: 评论
Data-informed Healthy Cell Clustering Technique for Second-life Applications of Retired Electric Vehicle Batteries
Data-informed Healthy Cell Clustering Technique for Second-l...
收藏 引用
IEEE Transportation Electrification Conference and Expo (ITEC)
作者: Akash Samanta Dominic Karnehm Antje Neve Sheldon Williamson Department of Electrical Computer and Software Engineering Ontario Tech University Oshawa Canada Institute of Intelligent Distributed Systems University of the Bundeswehr Munich Neubiberg Germany
The electric vehicles (EVs) adoption rate has been significant in the last decade and keeps on increasing. Recently, the retired EV battery packs which no longer provide satisfactory performance to power an EV started... 详细信息
来源: 评论
Cyberbullying Classification Using a Natural Language Processing and Machine Learning Techniques
Cyberbullying Classification Using a Natural Language Proces...
收藏 引用
2024 International Conference on Advances in Computing Research on Science engineering and Technology, ACROSET 2024
作者: Mankar, Nikhilesh Pramod Mahure, Tushar Joshi, Anushka A. Pande, Sagar Dhanraj Khamparia, Aditya Nathe, Ankita Shrikrushna Turjman, Fadi Al Pune India Independent Researcher Amravati India Babasaheb Bhimrao Ambedkar University Department of Computer Science Amethi India Kavikulguru Institute of Technology and Science Department of Information Technology Nagpur India Ai and Robotics Institute Near East University Artificial Intelligence Software Information Systems Engineering Departments Nicosia Cyprus University of Kyrenia Research Center for Ai and IoT Faculty of Engineering Kyrenia Turkey
The usage of online entertainment has increased dramatically after some time with the enhancement of the Internet and has turned into the most compelling systems administration stage in this century. Notwithstanding, ... 详细信息
来源: 评论
Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore software Maintenance
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3827-3845页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Nadeem Iqbal Nazri Kama Azri Azmi Ahmad Salman Khan Yasir Mahmood Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyaKuwait
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ... 详细信息
来源: 评论
Unconditional Generation of Scalable Chinese Characters as Bézier Curve Sequences
Unconditional Generation of Scalable Chinese Characters as B...
收藏 引用
International Symposium on Artificial Intelligence and Signal Processing (AISP)
作者: Rohan Nolan Lasrado V. Vijayasherly School of Computer Science and Engineering VIT University Vellore India Department of Software Systems VIT University Vellore India
Neural generative modelling of sketches has been an active research direction. SketchRNN set a milestone with their sequence-to-sequence variational autoencoder architecture being able to generate hand drawn sketches ...
来源: 评论
Deepfake detection using deep learning methods: A systematic and comprehensive review
收藏 引用
Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 2024年 第2期14卷 e1520-e1520页
作者: Heidari, Arash Jafari Navimipour, Nima Dag, Hasan Unal, Mehmet Department of Software Engineering Haliç University Istanbul Turkey Department of Computer Engineering Kadir Has Universitesi Istanbul Turkey Future Technology Research Center National Yunlin University of Science and Technology Douliou Taiwan Management Information Systems Kadir Has Universitesi Istanbul Turkey Department of Computer Engineering Nisantasi Universitesi Istanbul Turkey
Deep Learning (DL) has been effectively utilized in various complicated challenges in healthcare, industry, and academia for various purposes, including thyroid diagnosis, lung nodule recognition, computer vision, lar... 详细信息
来源: 评论