咨询与建议

限定检索结果

文献类型

  • 11,288 篇 会议
  • 5,205 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,722 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,273 篇 工学
    • 8,183 篇 计算机科学与技术...
    • 6,802 篇 软件工程
    • 2,007 篇 信息与通信工程
    • 1,350 篇 控制科学与工程
    • 1,100 篇 生物工程
    • 831 篇 电气工程
    • 730 篇 生物医学工程(可授...
    • 680 篇 机械工程
    • 605 篇 电子科学与技术(可...
    • 554 篇 光学工程
    • 414 篇 安全科学与工程
    • 350 篇 仪器科学与技术
    • 340 篇 化学工程与技术
    • 326 篇 动力工程及工程热...
    • 325 篇 建筑学
  • 4,531 篇 理学
    • 2,653 篇 数学
    • 1,236 篇 生物学
    • 827 篇 物理学
    • 747 篇 统计学(可授理学、...
    • 632 篇 系统科学
    • 348 篇 化学
  • 3,156 篇 管理学
    • 1,914 篇 管理科学与工程(可...
    • 1,357 篇 图书情报与档案管...
    • 947 篇 工商管理
  • 714 篇 医学
    • 623 篇 临床医学
    • 554 篇 基础医学(可授医学...
    • 327 篇 药学(可授医学、理...
  • 485 篇 法学
    • 373 篇 社会学
  • 328 篇 教育学
    • 318 篇 教育学
  • 320 篇 经济学
    • 318 篇 应用经济学
  • 173 篇 农学
  • 71 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,071 篇 computer science
  • 1,019 篇 software enginee...
  • 316 篇 deep learning
  • 303 篇 application soft...
  • 299 篇 computational mo...
  • 271 篇 data mining
  • 243 篇 computer archite...
  • 243 篇 machine learning
  • 229 篇 software
  • 202 篇 software systems
  • 201 篇 accuracy
  • 196 篇 feature extracti...
  • 196 篇 training
  • 188 篇 internet of thin...
  • 188 篇 support vector m...
  • 181 篇 programming
  • 171 篇 educational inst...
  • 169 篇 optimization
  • 169 篇 semantics
  • 168 篇 laboratories

机构

  • 356 篇 college of compu...
  • 197 篇 department of co...
  • 155 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 106 篇 school of softwa...
  • 105 篇 department of co...
  • 91 篇 department of co...
  • 86 篇 department of co...
  • 80 篇 school of inform...
  • 72 篇 department of co...
  • 72 篇 department of co...
  • 70 篇 department of co...
  • 66 篇 school of comput...
  • 52 篇 department of co...
  • 49 篇 department of co...
  • 48 篇 school of softwa...
  • 47 篇 department of co...
  • 46 篇 software enginee...
  • 46 篇 department of co...

作者

  • 66 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 47 篇 xiao qin
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 31 篇 mian ajmal
  • 30 篇 zhao jian
  • 29 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 parizi reza m.
  • 23 篇 christopher leck...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry
  • 21 篇 rehman attique u...
  • 21 篇 lin qiuzhen
  • 20 篇 wang lei

语言

  • 15,874 篇 英文
  • 737 篇 其他
  • 121 篇 中文
  • 8 篇 德文
  • 3 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Software Engineering and Computer Science"
16722 条 记 录,以下是731-740 订阅
排序:
Comparative Study for Identifying and Categorizing DDoS Attacks  21
Comparative Study for Identifying and Categorizing DDoS Atta...
收藏 引用
21st International Learning and Technology Conference, L and T 2024
作者: Saad, Asaad B. Hossny, Eman Omara, Fatma A. Cairo University Faculty of Computers and Artificial Intelligence Software Engineering Department Cairo Egypt Cairo University Faculty of Computers and Artificial Intelligence Computer Science Department Cairo Egypt
Distributed Denial of Service, known as DDoS attacks, significantly compromise network security and availability. Certain DDoS detection methods utilize machine learning techniques, whereas others are based on statist... 详细信息
来源: 评论
A study on the impact of pre-trained model on Just-In-Time defect prediction  23
A study on the impact of pre-trained model on Just-In-Time d...
收藏 引用
23rd IEEE International Conference on software Quality, Reliability, and Security, QRS 2023
作者: Guo, Yuxiang Gao, Xiaopeng Zhang, Zhenyu Chan, W.K. Jiang, Bo Beihang University State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China City University of Hong Kong Department of Computer Science Hong Kong
Previous researchers conducting Just-In-Time (JIT) defect prediction tasks have primarily focused on the performance of individual pre-trained models, without exploring the relationship between different pre-trained m... 详细信息
来源: 评论
Roman Urdu Fake Reviews Detection Using Stacked LSTM Architecture
收藏 引用
SN computer science 2022年 第6期3卷 470页
作者: Hayat, Umer Saeed, Ali Vardag, Muhammad Humayon Khan Ullah, Muhammad Farhat Iqbal, Nadeem Department of Software Engineering University of Lahore Lahore Pakistan Department of Software Engineering University of Central Punjab Lahore Pakistan Department of Computer Science and IT University of Lahore Lahore Pakistan
Fake reviews detection is a considerable challenge to the different e-commerce and online business settings. This task aims to develop such systems that could ensure the veracity of reviews. The research community has... 详细信息
来源: 评论
Enhancing Deep Reinforcement Learning with Scenario-Based Modeling
收藏 引用
SN computer science 2023年 第2期4卷 1-13页
作者: Yerushalmi, Raz Amir, Guy Elyasaf, Achiya Harel, David Katz, Guy Marron, Assaf Department of Computer Science and Applied Mathematics Weizmann Institute of Science Rehovot 76100 Israel School of Computer Science and Engineering The Hebrew University of Jerusalem Jerusalem 91904 Israel Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva 8410501 Israel
Deep reinforcement learning agents have achieved unprecedented results when learning to generalize from unstructured data. However, the “black-box” nature of the trained DRL agents makes it difficult to ensure that ... 详细信息
来源: 评论
Static Eccentricity Fault Analysis in Three-Phase Induction Motors Using Current Signal  2
Static Eccentricity Fault Analysis in Three-Phase Induction ...
收藏 引用
2nd Edition IEEE International Conference on Metrology for eXtended Reality, Artificial Intelligence and Neural engineering, MetroXRAINE 2023
作者: Refaat, Shady S. Al-Shemmery, Ahmed Abdulmawjood, Kais Kameli, Sayed Mohammad Abuelrub, Abdelaziz Texas A&m University at Qatar Electrical and Computer Engineering Department Doha Qatar School of Physics Engineering and Computer Science University of Hertfordshire Hatfield United Kingdom Ontario Tech University Department of Electrical Computer and Software Engineering Canada
Preventing mechanical faults in motors is often impossible, early detection of air gap eccentricity faults in induction motors is critical in preventing damage to the machine. Therefore, designing a reliable, effectiv... 详细信息
来源: 评论
Staging of Different Tumor by Utilizing Laser Guidance (@405 nm) in CT Scan Images Along with Statistical Analysis
收藏 引用
Lasers in engineering 2025年 第4-6期59卷 309-325页
作者: Amjad, M. Ullah, H. Siddique, M.A. Majid, M.A. Aleem, A. Akhtar, M. Gilanie, G. Abdullah-Al-Wadud, M. Farhan, M. Akram, A. Batool, Z. Nazir, A. Biophotonics Imaging Techniques Laboratory Institute of Physics The Islamia University of Bahawalpur 63100 Pakistan Department of Computer Science Faculty of Computing The Islamia University of Bahawalpur Bahawalpur Pakistan Dept. of Software Engineering College of Computer and Information Sciences King Saud University Riyadh11543 Saudi Arabia School of Earth Sciences and Engineering Hohai University Nanjing China
Early detection of lung cancer, liver cancer (HCC), and pancreatitis is crucial for effective treatment. This study assessed the use of laser guidance CT scans for diagnosis and staging. 26 patients of CT scan which w... 详细信息
来源: 评论
Identification and Visualization of Spatial and Temporal Trends in Textile Industry
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4165-4181页
作者: Umair Yousaf Muhammad Asif Shahbaz Ahmed Noman Tahir Azeem Irshad Akber Abid Gardezi Muhammad Shafiq Jin-Ghoo Choi Habib Hamam Department of Computer Science National Textile UniversityFaisalabad38000Pakistan Department of Computer Science and Software Engineering International Islamic UniversityIslamabad44000Pakistan Department of Computer Science COMSATS University IslamabadIslamabad45550Pakistan Department of Information and Communication Engineering Yeungnam UniversityGyeongsan38541Korea Faculty of Engineering Uni de MonctonMonctonNB E1A3E9Canada International Institute of Technology and Management Commune d’AkandaBPLibreville1989Gabon School of Electrical Engineering Department of Electrical and Electronic Eng.ScienceUniversity of JohannesburgJohannesburg2006South Africa Spectrum of Knowledge Production&Skills Development Sfax3027Tunisia
The research volume increases at the study rate,causing massive text *** to these enormous text corpora,we are drowning in data and starving for ***,recent research employed different text mining approaches to extract... 详细信息
来源: 评论
Metamorphic Relation Patterns for Metamorphic Testing, Exploration and Robustness
Metamorphic Relation Patterns for Metamorphic Testing, Explo...
收藏 引用
作者: Ying, Zhihao Towey, Dave Bellotti, Anthony Chua, Caslon Quan Zhou, Zhi School of Computer Science University of Nottingham Ningbo China Zhejiang Ningbo China Department of Computer Science and Software Engineering Swinburne University of Technology HawthornVIC Australia School of Computing and Information Technology University of Wollongong WollongongNSW Australia
Metamorphic testing (MT) is an effective software quality assurance method;it uses metamorphic relations (MRs) to examine the inputs and outputs of multiple test cases. Metamorphic exploration (ME) and metamorphic rob... 详细信息
来源: 评论
Visualizing the Path of a Photo Taker from Image Metadata  4
Visualizing the Path of a Photo Taker from Image Metadata
收藏 引用
4th International Informatics and software engineering Conference, IISEC 2023
作者: Majid, Rasty Shakhawan Varol, Cihan Varol, Asaf Nasab, Ahad Firat University Department of Software Engineering Erbil Iraq Sam Houston State University Computer Science Department HuntsvilleTX United States College of Engineering and Computer Science Dept. of Engineering Management and Technology ChattanoogaTN United States
One of the most challenging investigations in forensic analysis is the work conducted on smartphones. Specifically using smartphone data to provide evidence for a case is becoming a norm nowadays. Many Android device ... 详细信息
来源: 评论
Recursive Generation of Multi-Qubits Control Gate to Facilitate the Grover's Quantum Algorithm in Large Scale Database Search  24
Recursive Generation of Multi-Qubits Control Gate to Facilit...
收藏 引用
24th IEEE International Conference on software Quality, Reliability and Security Companion, QRS-C 2024
作者: Wang, Wen-Li Hussain, Shahid Rondinelli, Nathaniel V. Tang, Mei-Huei Rehman Khan, Saif Ur Penn State University Behrend Department of Computer Science and Software Engineering EriePA United States Gannon University Department of Computer Information Science EriePA United States Shifa Tameer-e-Millat University Department of Computing Islamabad44000 Pakistan
Context: Grover's algorithm is a powerful tool in the realm of quantum computing because it offers exponential speedup over classical linear searching for unstructured / unsorted search problems. However, it is ch... 详细信息
来源: 评论