咨询与建议

限定检索结果

文献类型

  • 2,239 篇 会议
  • 911 篇 期刊文献

馆藏范围

  • 3,150 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,862 篇 工学
    • 1,446 篇 计算机科学与技术...
    • 1,198 篇 软件工程
    • 350 篇 信息与通信工程
    • 312 篇 控制科学与工程
    • 172 篇 生物工程
    • 151 篇 电气工程
    • 129 篇 生物医学工程(可授...
    • 124 篇 机械工程
    • 120 篇 电子科学与技术(可...
    • 87 篇 光学工程
    • 86 篇 安全科学与工程
    • 76 篇 动力工程及工程热...
    • 72 篇 建筑学
    • 71 篇 化学工程与技术
    • 68 篇 土木工程
    • 66 篇 仪器科学与技术
  • 818 篇 理学
    • 434 篇 数学
    • 197 篇 生物学
    • 155 篇 物理学
    • 149 篇 系统科学
    • 129 篇 统计学(可授理学、...
    • 73 篇 化学
  • 551 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 215 篇 工商管理
    • 206 篇 图书情报与档案管...
  • 138 篇 医学
    • 126 篇 临床医学
    • 105 篇 基础医学(可授医学...
  • 88 篇 法学
    • 63 篇 社会学
  • 67 篇 教育学
    • 67 篇 教育学
  • 63 篇 经济学
    • 63 篇 应用经济学
  • 26 篇 农学
  • 13 篇 文学
  • 8 篇 军事学
  • 3 篇 艺术学

主题

  • 155 篇 software enginee...
  • 144 篇 computer science
  • 84 篇 application soft...
  • 82 篇 computational mo...
  • 76 篇 wireless sensor ...
  • 71 篇 software systems
  • 71 篇 deep learning
  • 70 篇 laboratories
  • 69 篇 software
  • 67 篇 accuracy
  • 65 篇 machine learning
  • 63 篇 training
  • 61 篇 computer archite...
  • 61 篇 quality of servi...
  • 51 篇 systems engineer...
  • 51 篇 resource managem...
  • 49 篇 security
  • 48 篇 cloud computing
  • 47 篇 grid computing
  • 47 篇 artificial intel...

机构

  • 48 篇 department of la...
  • 44 篇 department of in...
  • 34 篇 graduate school ...
  • 31 篇 beijing key labo...
  • 27 篇 department of co...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 16 篇 department of sy...
  • 16 篇 department of in...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 department of la...
  • 12 篇 school of inform...

作者

  • 66 篇 fatos xhafa
  • 65 篇 leonard barolli
  • 49 篇 arjan durresi
  • 46 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 21 篇 akio koyama
  • 19 篇 tao yang
  • 19 篇 xenofon koutsouk...
  • 18 篇 gjergji mino
  • 16 篇 song houbing
  • 16 篇 makoto ikeda
  • 15 篇 zamli kamal z.
  • 15 篇 gautam biswas
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 13 篇 materwala huned

语言

  • 3,039 篇 英文
  • 93 篇 其他
  • 15 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Languages and Computer Systems and Software Engineering"
3150 条 记 录,以下是11-20 订阅
排序:
APFormer: Anti-Phishing Transformer for Website-Phishing Detection Via Joint Feature Learning
APFormer: Anti-Phishing Transformer for Website-Phishing Det...
收藏 引用
2024 International Conference on engineering and Computing, ICECT 2024
作者: Memon, Anam Manjotho, Ali Asghar National University of Modern Languages Department of Computer Science Hyderabad Pakistan Mehran University of Engineering and Technology Department of Computer Systems Engineering Jamshoro Pakistan
Phishing is a cybercrime activity where the perpe-Trator tricks users into believing that a fraudulent website is authentic, revealing sensitive information. Recently, the frequency of phishing attacks has increased, ... 详细信息
来源: 评论
Enhancing Arabic Cyberbullying Detection with End-to-End Transformer Model
收藏 引用
computer Modeling in engineering & Sciences 2024年 第11期141卷 1651-1671页
作者: Mohamed A.Mahdi Suliman Mohamed Fati Mohamed A.G.Hazber Shahanawaj Ahamad Sawsan A.Saad Information and Computer Science Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Information Systems Department College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia Software Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Computer Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia
Cyberbullying,a critical concern for digital safety,necessitates effective linguistic analysis tools that can navigate the complexities of language use in online *** tackle this challenge,our study introduces a new ap... 详细信息
来源: 评论
Leveraging Geographic Information systems and Remote Sensing for Enhanced Water Resource Management in Kazakhstan  4
Leveraging Geographic Information Systems and Remote Sensing...
收藏 引用
4th International Conference on Technological Advancements in Computational Sciences, ICTACS 2024
作者: Hamada, Mohamed Ahmed Tolkyn, Orden Hamada, Gehad M. International It University Information Systems Department Almaty Kazakhstan International It University Computer Systems and Software Engineering Department Almaty Kazakhstan
Kazakhstan's deputy member is vast, and is one of sparse population, scattering and creating an overwhelming challenge to map and assess the water resources. Most of the waters are in remote and poorly equipped ar... 详细信息
来源: 评论
Test-Driven Development (TDD) in Small software Development Teams: Advantages and Challenges  5
Test-Driven Development (TDD) in Small Software Development ...
收藏 引用
5th International Conference on Advancements in Computational Sciences, ICACS 2024
作者: Ramzan, Hafiz Arslan Ramzan, Sadia Kalsum, Tehmina Institute of Computer and Software Engineering Khwaja Fareed University of Engineering and Information Technology Rahim Yar Khan Pakistan National University of Modern Languages Department of Computer Science Multan Pakistan University of Engineering and Technology Department of Software Engineering Taxila Pakistan
In the context of small software development teams, this research article gives a thorough investigation of the adoption of test-driven development (TDD) approaches. It aims to highlight the benefits that TDD offers, ... 详细信息
来源: 评论
Tracking daily paths in home contexts with RSSI fingerprinting based on UWB through deep learning models
收藏 引用
Multimedia Tools and Applications 2024年 1-25页
作者: Polo-Rodríguez, A. Valera, J.C. Peral, J. Gil, D. Medina-Quero, J. Department of Computer Engineering Automation and Robotics University of Granada Granada18071 Spain Alicante03690 Spain Department of Software and Computing Systems University of Alicante Alicante03690 Spain
The field of human activity recognition has evolved significantly, driven largely by advancements in Internet of Things (IoT) device technology, particularly in personal devices. This study investigates the use of ult... 详细信息
来源: 评论
Author profiling from Romanized Urdu text using transfer learning models
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4455-4470页
作者: Ali, Abid khan, Muhammad Sohail Khan, Muhammad Amin Khan, Sajid Ullah Khan, Faheem Department of Computer Software Engineering University of Engineering & Technology Mardan KPK Mardan23200 Pakistan Islamabad H-11/4 Islamabad44000 Pakistan Department of Information Systems College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Al-Kharj Saudi Arabia Department of Computer Engineering Gachon University Seongnam-Si Korea Republic of
This research concentrates on author profiling using transfer learning models for classifying age and gender. The investigation encompassed a diverse set of transfer learning techniques, including Roberta, BERT, ALBER... 详细信息
来源: 评论
Sentiment analysis in social internet of things using contextual representations and dilated convolution neural network
收藏 引用
Neural Computing and Applications 2024年 第20期36卷 12357-12370页
作者: Abid, Fazeel Rasheed, Jawad Hamdi, Mohammed Alshahrani, Hani Al Reshan, Mana Saleh Shaikh, Asadullah Department of Information Systems Dr. Hassan Murad School of Management University of Management and Technology Lahore Pakistan Department of Computer Engineering Istanbul Sabahattin Zaim University Istanbul34303 Turkey Department of Software Engineering Istanbul Nisantasi University Istanbul34394 Turkey Department Computer Science College of Computer Science and Information Systems Najran University Najran61441 Saudi Arabia Department Information Systems College of Computer Science and Information Systems Najran University Najran61441 Saudi Arabia
The methodologies based on neural networks are substantial to accomplish sentiment analysis in the Social Internet of Things (SIoT). With social media sentiment analysis, significant insights can produce efficient and... 详细信息
来源: 评论
Deepfake Detection: Emerging Techniques and Evolving Challenges  12
Deepfake Detection: Emerging Techniques and Evolving Challen...
收藏 引用
12th International Conference on Internet of Everything, Microwave, Embedded, Communication and Networks, IEMECON 2024
作者: Natarajan, Krishnaraj Mathur, Abeer Bhargava, Kshitiz Singh, Manvendra Tejpal, Moulik Department of Database Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India Department of Software Systems School of Computer Science & Engineering Vellore Institute of Technology Vellore India
Several newly developed techniques and tools for manipulating images, audio, and videos have been introduced as an outcome of the recent and rapid breakthroughs in AI, machine learning, and deep learning. While most a... 详细信息
来源: 评论
Scene and Aerial Image Classification Based on Advanced Deep Learning Technique  8th
Scene and Aerial Image Classification Based on Advanced Deep...
收藏 引用
8th World Conference on Smart Trends in systems Security and Sustainability, WorldS4 2024
作者: Mehmood, Maryam Hussain, Farhan Ijaz, Asad Department of Computer and Software Engineering National University of Sciences and Technology Islamabad44000 Pakistan Department of Software Engineering National University of Modern Languages Islamabad Pakistan Department of Mechanical Engineering Mirpur University of Science and Technology MUST AJK Mirpur Pakistan
Classifying scenes and aerial imagery is a critical component in applications such as land-use analysis, land cover mapping, and remote sensing technologies. Numerous existing models leverage Convolutional Neural Netw... 详细信息
来源: 评论
Countering Deepfakes using an Improved Advanced CNN and its Ensemble with Pretrained Models  3
Countering Deepfakes using an Improved Advanced CNN and its ...
收藏 引用
3rd International Conference on Electrical, Electronics, Information and Communication Technologies, ICEEICT 2024
作者: Mathur, Abeer Tejpal, Moulik Bhargava, Kshitiz Natarajan, Krishnaraj Singh, Manvendra Vellore Institute of Technology School of Computer Science & Engineering Department of Software Systems Vellore India Vellore Institute of Technology School of Computer Science & Engineering Department of Database Systems Vellore India
The extensive spread of DeepFake images on the internet has emerged as a significant challenge, with applications ranging from harmless entertainment to harmful acts like blackmail, misinformation, and spreading false... 详细信息
来源: 评论