咨询与建议

限定检索结果

文献类型

  • 11,211 篇 会议
  • 5,131 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,571 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,140 篇 工学
    • 8,077 篇 计算机科学与技术...
    • 6,752 篇 软件工程
    • 1,980 篇 信息与通信工程
    • 1,290 篇 控制科学与工程
    • 1,093 篇 生物工程
    • 808 篇 电气工程
    • 724 篇 生物医学工程(可授...
    • 671 篇 机械工程
    • 595 篇 电子科学与技术(可...
    • 545 篇 光学工程
    • 412 篇 安全科学与工程
    • 347 篇 仪器科学与技术
    • 336 篇 化学工程与技术
    • 324 篇 动力工程及工程热...
    • 319 篇 建筑学
  • 4,494 篇 理学
    • 2,638 篇 数学
    • 1,228 篇 生物学
    • 817 篇 物理学
    • 742 篇 统计学(可授理学、...
    • 630 篇 系统科学
    • 346 篇 化学
  • 3,139 篇 管理学
    • 1,907 篇 管理科学与工程(可...
    • 1,347 篇 图书情报与档案管...
    • 942 篇 工商管理
  • 707 篇 医学
    • 617 篇 临床医学
    • 547 篇 基础医学(可授医学...
    • 327 篇 药学(可授医学、理...
  • 481 篇 法学
    • 369 篇 社会学
  • 325 篇 教育学
    • 315 篇 教育学
  • 320 篇 经济学
    • 318 篇 应用经济学
  • 171 篇 农学
  • 71 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,069 篇 computer science
  • 1,014 篇 software enginee...
  • 303 篇 application soft...
  • 300 篇 deep learning
  • 296 篇 computational mo...
  • 268 篇 data mining
  • 244 篇 machine learning
  • 242 篇 computer archite...
  • 226 篇 software
  • 202 篇 software systems
  • 194 篇 accuracy
  • 193 篇 feature extracti...
  • 193 篇 training
  • 188 篇 internet of thin...
  • 186 篇 support vector m...
  • 180 篇 programming
  • 171 篇 educational inst...
  • 171 篇 optimization
  • 169 篇 laboratories
  • 169 篇 semantics

机构

  • 344 篇 college of compu...
  • 196 篇 department of co...
  • 156 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 105 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 85 篇 department of co...
  • 76 篇 school of inform...
  • 74 篇 department of co...
  • 73 篇 department of co...
  • 68 篇 department of co...
  • 65 篇 school of comput...
  • 52 篇 department of co...
  • 49 篇 school of softwa...
  • 49 篇 department of co...
  • 46 篇 department of co...
  • 46 篇 department of co...
  • 46 篇 software enginee...

作者

  • 66 篇 rajkumar buyya
  • 49 篇 xiao qin
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 30 篇 mian ajmal
  • 30 篇 zhao jian
  • 29 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 parizi reza m.
  • 23 篇 christopher leck...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry
  • 21 篇 rehman attique u...
  • 20 篇 wang lei
  • 20 篇 fattahi jaouhar

语言

  • 16,004 篇 英文
  • 457 篇 其他
  • 118 篇 中文
  • 8 篇 德文
  • 3 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Software Engineering and Computer Science"
16571 条 记 录,以下是571-580 订阅
排序:
Optimizing Secure Multi-User ISAC Systems With STAR-RIS: A Deep Reinforcement Learning Approach for 6G Networks
收藏 引用
IEEE Access 2025年 13卷 31472-31484页
作者: Kamal, Mian Muhammad Zain Ul Abideen, Syed Al-Khasawneh, M.A. Alabrah, Amerah Sohail Ahmed Larik, Raja Irfan Marwat, Muhammad Southeast University School of Electronic Science and Engineering Jiangning Jiangsu Nanjing211189 China Qingdao University College of Computer Science and Technology Qingdao266071 China Al-Ahliyya Amman University Hourani Center for Applied Scientific Research Amman19111 Jordan Skyline University College School of Computing University City Sharjah Sharjah United Arab Emirates King Saud University College of Computer and Information Science Department of Information Systems Riyadh11543 Saudi Arabia Ilma University Department of Computer Science Sindh Karachi75190 Pakistan University of Science and Technology Bannu Department of Software Engineering Bannu28100 Pakistan
The rapid evolution of wireless communication technologies and the increasing demand for multi-functional systems have led to the emergence of integrated sensing and communication (ISAC) as a key enabler for future 6G... 详细信息
来源: 评论
Spatiotemporal crowds features extraction of infrared images using neural network
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第4期15卷 2543-2556页
作者: Al-Oraiqat, Anas M. Drieiev, Oleksandr Drieieva, Hanna Meleshko, Yelyzaveta AlRawashdeh, Hazim Al-Oraiqat, Karim A. Hasan, Yassin M. Y. Maricar, Noor Khan, Sheroz Department of Computer Science College of Engineering and Information Technology Onaizah Colleges Qassim Saudi Arabia Department of Cybersecurity and Software Central Ukrainian National Technical University Kropyvnytskyi Ukraine Department of Artificial Intelligence Faculty of Information Technology Zarqa University Zarqa Jordan Department of Electrical Engineering College of Engineering and Information Technology Onaizah Colleges Qassim Saudi Arabia
Crowds can lead up to severe disasterous consequences resulting in fatalities. Videos obtained through public cameras or captured by drones flying overhead can be processed with artificial intelligence-based crowd ana... 详细信息
来源: 评论
TTAG+R: A Dataset of Google Play Store's Top Trending Android Games and User Reviews  22
TTAG+R: A Dataset of Google Play Store's Top Trending Androi...
收藏 引用
22nd IEEE International Conference on software Quality, Reliability and Security Companion, QRS-C 2022
作者: Chand, Raheela Rehman Khan, Saif Ur Hussain, Shahid Wang, Wenli Department of Computer Science Islamabad Pakistan School of Engineering Penn State University Department of Computer Science and Software Engineering United States
Context: Android games are gaining wide attention from users in recent years. However, the existing literature reports alarming statistics about banning popular and top-trending Android apps. The popular gaming apps h... 详细信息
来源: 评论
Artificial Intelligence For Realtime Face Recognition Attendance Using College Classrooms and Buses
Artificial Intelligence For Realtime Face Recognition Attend...
收藏 引用
2024 International Conference on Electrical, Electronics and Computing Technologies, ICEECT 2024
作者: Ahila, A. Hosanna Princye, P. Poonguzhali, A. Kavivendhan Deepa, M. Arthy, A. Saravanakumar, R. Sri Sairam College of Engineering Department of Electronics and Communication Engineering Anekal Bangalore India Francis Xavier Engineering College Department of Computer Science and Business Systems Tamil Nadu Tirunelveli India Iconix Software Solution Software Analyst Tamil Nadu Tirunelveli India
Teachers take attendance by having pupils sign in or check-in classes and transportation. Student absences often result from individual mistakes. This article examines a technology that records data from classroom pho... 详细信息
来源: 评论
Federated Non-Intrusive Load Monitoring for Smart Homes Utilizing Attention-Based Aggregation
Federated Non-Intrusive Load Monitoring for Smart Homes Util...
收藏 引用
2023 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology, IAICT 2023
作者: Kaspour, Shamisa Yassine, Abdulsalam Lakehead University Department of Computer Science Thunder Bay Canada Lakehead University Department of Software Engineering Thunder Bay Canada
Nowadays, Non-Intrusive Load Monitoring (NILM) with Federated Learning (FL) framework has become a growing study towards providing a secure energy disaggregation system in smart homes. This study aims at deploying an ... 详细信息
来源: 评论
Phase Re-Service in Reinforcement Learning Traffic Signal Control  27
Phase Re-Service in Reinforcement Learning Traffic Signal Co...
收藏 引用
27th IEEE International Conference on Intelligent Transportation Systems, ITSC 2024
作者: Zhang, Zhiyao Gunter, George Quinones-Grueiro, Marcos Zhang, Yuhang Barbour, William Biswas, Gautam Work, Daniel Institute for Software Integrated Systems Vanderbilt University Department of Civil and Environmental Engineering United States Institute for Software Integrated Systems Vanderbilt University United States Institute for Software Integrated Systems Vanderbilt University Department of Computer Science United States
This article proposes a novel approach to traffic signal control that combines phase re-service with reinforcement learning (RL). The RL agent directly determines the duration of the next phase in a pre-defined sequen... 详细信息
来源: 评论
A Secured and Optimized Clustering Approch in Vehicular Ad-hoc Network  4
A Secured and Optimized Clustering Approch in Vehicular Ad-h...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Khan, Imran Khan, Fazlullah Ali, Asad Alshawi, Bandar Alturki, Ryan Wedyan, Mohammad Abdul Wali Khan University Computer Science Department KPK Mardan Pakistan School of Computer Science University of Nottingham Ningbo China Faculty of Science and Engineering Zhejiang315104 China University of Engineering and Technology Department of Computer Science KPK Peshawar Pakistan College of Computing Umm Al-Qura University Department of Computer and Network Engineering Makkah Saudi Arabia College of Computing Umm Al-Qura University Department of Software Engineering Makkah Saudi Arabia Faculty of Information Technology and Computer Sciences Department of Computer Sciences Irbid21163 Jordan
Vehicular ad hoc networks (VANETs) take vital role in intelligent transportation systems, but they face challenges due to dynamic network topology, impacting communication efficiency, especially with increasing active... 详细信息
来源: 评论
Student Perceptions of Authentic Learning to Learn White-box Testing  2024
Student Perceptions of Authentic Learning to Learn White-box...
收藏 引用
55th ACM Technical Symposium on computer science Education, SIGCSE 2024
作者: Rahman, Akond Zhang, Yue Wu, Fan Shahriar, Hossain Department of Computer Science and Software Engineering Auburn University AuburnAL United States Department of Computer Science Tuskegee University TuskegeeAL United States Center for Cybersecurity University of West Florida PensacolaFL United States
The pivotal role of white-box testing with respect to software quality assurance, necessitates dissemination of education materials related to white-box testing in the course curriculum. In this poster, we describe ou... 详细信息
来源: 评论
Cyber Attack Detection with Encrypted Network Connection Analysis  12th
Cyber Attack Detection with Encrypted Network Connection Ana...
收藏 引用
12th International Symposium on Intelligent Manufacturing and Service Systems, IMSS 2023
作者: Gonen, Serkan Karacayilmaz, Gokce Artuner, Harun Bariskan, Mehmet Ali Yilmaz, Ercan Nurcan Software Engineering Department Istanbul Gelisim University Istanbul Turkey Hacettepe University Institute of Science Ankara Turkey Computer Engineering Department Hacattepe University Ankara Turkey Computer Engineering Department Istanbul Gelisim University Istanbul Turkey Electrical – Electronic Engineering Department Gazi University Ankara Turkey
The evolution of science and technology has led to increasingly complex cyber security threats, with advanced evasion techniques and encrypted communication channels making attacks harder to detect. While encryption h... 详细信息
来源: 评论
A Fractional Fourier Based Medical Image Authentication Approach
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 3133-3150页
作者: Fayez Alqahtani Mohammed Amoon Walid El-Shafai Department of Software Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11451Saudi Arabia Department of Computer Science Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical... 详细信息
来源: 评论