咨询与建议

限定检索结果

文献类型

  • 6,631 篇 会议
  • 5,668 篇 期刊文献
  • 225 册 图书

馆藏范围

  • 12,524 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,749 篇 工学
    • 5,672 篇 计算机科学与技术...
    • 4,598 篇 软件工程
    • 1,852 篇 信息与通信工程
    • 1,240 篇 控制科学与工程
    • 1,003 篇 生物工程
    • 931 篇 电气工程
    • 790 篇 电子科学与技术(可...
    • 745 篇 生物医学工程(可授...
    • 637 篇 机械工程
    • 539 篇 光学工程
    • 434 篇 仪器科学与技术
    • 409 篇 动力工程及工程热...
    • 366 篇 网络空间安全
    • 316 篇 安全科学与工程
    • 313 篇 化学工程与技术
  • 4,383 篇 理学
    • 2,058 篇 数学
    • 1,490 篇 物理学
    • 1,144 篇 生物学
    • 664 篇 统计学(可授理学、...
    • 486 篇 系统科学
    • 386 篇 化学
  • 2,355 篇 管理学
    • 1,471 篇 管理科学与工程(可...
    • 944 篇 图书情报与档案管...
    • 686 篇 工商管理
  • 898 篇 医学
    • 745 篇 临床医学
    • 618 篇 基础医学(可授医学...
    • 386 篇 公共卫生与预防医...
    • 347 篇 药学(可授医学、理...
  • 388 篇 法学
    • 306 篇 社会学
  • 263 篇 经济学
    • 262 篇 应用经济学
  • 196 篇 教育学
  • 179 篇 农学
  • 61 篇 文学
  • 44 篇 军事学
  • 33 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 447 篇 deep learning
  • 343 篇 machine learning
  • 231 篇 computer science
  • 221 篇 computational mo...
  • 216 篇 accuracy
  • 213 篇 internet of thin...
  • 205 篇 artificial intel...
  • 200 篇 feature extracti...
  • 164 篇 optimization
  • 164 篇 predictive model...
  • 159 篇 support vector m...
  • 153 篇 data mining
  • 149 篇 information tech...
  • 139 篇 software enginee...
  • 123 篇 real-time system...
  • 111 篇 security
  • 110 篇 computational in...
  • 106 篇 neural networks
  • 101 篇 wireless sensor ...
  • 100 篇 covid-19

机构

  • 286 篇 department for p...
  • 285 篇 faculty of scien...
  • 285 篇 department of ph...
  • 280 篇 departamento de ...
  • 275 篇 department of ph...
  • 270 篇 kirchhoff-instit...
  • 268 篇 department of ph...
  • 266 篇 department of ph...
  • 259 篇 faculté des scie...
  • 248 篇 fakultät für phy...
  • 244 篇 institute of phy...
  • 231 篇 yerevan physics ...
  • 231 篇 institut für ast...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 218 篇 physics division...
  • 215 篇 department of ph...
  • 211 篇 department of ph...
  • 203 篇 institute of phy...
  • 197 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 263 篇 g. gaudio
  • 262 篇 s. mohapatra
  • 261 篇 y. nagasaka
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 256 篇 s. guindon
  • 250 篇 d. guest

语言

  • 11,990 篇 英文
  • 444 篇 其他
  • 88 篇 中文
  • 16 篇 日文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Department of Software Engineering Faculty of Computer Science and Information Technology"
12524 条 记 录,以下是31-40 订阅
排序:
Improved Hybrid Deep Collaborative Filtering Approach for True Recommendations
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5301-5317页
作者: Muhammad Ibrahim Imran Sarwar Bajwa Nadeem Sarwar Haroon Abdul Waheed Muhammad Zulkifl Hasan Muhammad Zunnurain Hussain Department of Computer Science The Islamia University of BahawalpurBahawalpurPakistan Department of Computer Science Bahria University Lahore CampusLahorePakistan Software Engineering Department Faculty of ITUniversity of Central PunjabLahorePakistan Faculty of Computer Science and Information Technology Universiti Putra MalaysiaSelangorMalaysia
Recommendation services become an essential and hot research topic for researchers *** data such asReviews play an important role in the recommendation of the *** was achieved by deep learning approaches for capturing... 详细信息
来源: 评论
DeepOCL:A deep neural network for Object Constraint Language generation from unrestricted nature language
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第1期9卷 250-263页
作者: Yilong Yang Yibo Liu Tianshu Bao Weiru Wang Nan Niu Yongfeng Yin School of Software Beihang UniversityBeijingChina College of Computer Science and Technology Guizhou UniversityGuiyangGuizhouChina Faculty of Information Technology Beijing University of TechnologyBeijingChina Department of Electrical Engineering and Computer Sciences University of CincinnatiCincinnatiOhioUSA
Object Constraint Language(OCL)is one kind of lightweight formal specification,which is widely used for software verification and validation in NASA and Object Management Group *** OCL provides a simple expressive syn... 详细信息
来源: 评论
A Systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords
收藏 引用
IEEE Access 2024年 12卷 53408-53423页
作者: Por, Lip Yee Ng, Ian Ouii Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
This systematic literature review delves into the dynamic realm of graphical passwords, focusing on the myriad security attacks they face and the diverse countermeasures devised to mitigate these threats. The core obj... 详细信息
来源: 评论
Advancing Bankruptcy Forecasting With Hybrid Machine Learning Techniques: Insights From an Unbalanced Polish Dataset
收藏 引用
IEEE Access 2024年 12卷 9369-9381页
作者: Ainan, Ummey Hany Por, Lip Yee Chen, Yen-Lin Yang, Jing Ku, Chin Soon Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia
The challenge of bankruptcy prediction, critical for averting financial sector losses, is amplified by the prevalence of imbalanced datasets, which often skew prediction models. Addressing this, our study introduces t... 详细信息
来源: 评论
Single-Valued Neutrosophic Graph with Heptapartitioend Structure
收藏 引用
Neutrosophic Sets and Systems 2025年 80卷 728-748页
作者: Fathi, Hanaa Myvizhi, M. Abdelhafeez, Ahmed Abdellah, Mohamed Refaat Eassa, Mohamed Sawah, Mohamed S. Elbehiery, Hussam College of Information Technology Amman Arab University Amman Jordan KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut... 详细信息
来源: 评论
Multi-Task Learning Model with Data Augmentation for Arabic Aspect-Based Sentiment Analysis
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 4419-4444页
作者: Arwa Saif Fadel Osama Ahmed Abulnaja Mostafa Elsayed Saleh Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science Faculty of Computer Sciences and EngineeringHodeidah UniversityYemen
Aspect-based sentiment analysis(ABSA)is a fine-grained *** fundamental subtasks are aspect termextraction(ATE)and aspect polarity classification(APC),and these subtasks are dependent and closely ***,most existing work... 详细信息
来源: 评论
A Deep Learning Approach for Landmines Detection Based on Airborne Magnetometry Imaging and Edge Computing
收藏 引用
computer Modeling in engineering & sciences 2024年 第5期139卷 2117-2137页
作者: Ahmed Barnawi Krishan Kumar Neeraj Kumar Bander Alzahrani Amal Almansour Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyDeemed to be UniversityPatialaIndia
Landmines continue to pose an ongoing threat in various regions around the world,with countless buried landmines affecting numerous human *** detonation of these landmines results in thousands of casualties reported w... 详细信息
来源: 评论
Modified Bat Algorithm: a newly proposed approach for solving complex and real-world problems
收藏 引用
Soft Computing 2024年 第13-14期28卷 7983-7998页
作者: Umar, Shahla U. Rashid, Tarik A. Ahmed, Aram M. Hassan, Bryar A. Baker, Mohammed Rashad Department of Software College of Computer Science and Information Technology University of Kirkuk Kirkuk Iraq Computer Science and Engineering Department School of Science and Engineering University of Kurdistan Hewler KRI Erbil Iraq Department of Computer Science College of Science Charmo University Sulaimani Chamchamal46023 Iraq
Bat Algorithm (BA) is a nature-inspired metaheuristic search algorithm designed to efficiently explore complex problem spaces and find near-optimal solutions. The algorithm is inspired by the echolocation behavior of ... 详细信息
来源: 评论
Project Assessment in Offshore software Maintenance Outsourcing Using Deep Extreme Learning Machines
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1871-1886页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala NerusMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyahKuwait Department of Computer Science Sharif College of Engineering&TechnologyLahore54000Pakistan
software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,includi... 详细信息
来源: 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 评论