咨询与建议

限定检索结果

文献类型

  • 2,066 篇 会议
  • 889 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 3,011 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,757 篇 工学
    • 1,359 篇 计算机科学与技术...
    • 1,122 篇 软件工程
    • 346 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 165 篇 生物工程
    • 153 篇 电气工程
    • 122 篇 电子科学与技术(可...
    • 119 篇 生物医学工程(可授...
    • 117 篇 机械工程
    • 91 篇 安全科学与工程
    • 83 篇 光学工程
    • 74 篇 动力工程及工程热...
    • 68 篇 建筑学
    • 68 篇 土木工程
    • 67 篇 化学工程与技术
    • 66 篇 仪器科学与技术
    • 60 篇 网络空间安全
  • 789 篇 理学
    • 419 篇 数学
    • 191 篇 生物学
    • 149 篇 物理学
    • 147 篇 系统科学
    • 125 篇 统计学(可授理学、...
    • 68 篇 化学
  • 524 篇 管理学
    • 373 篇 管理科学与工程(可...
    • 204 篇 工商管理
    • 201 篇 图书情报与档案管...
  • 132 篇 医学
    • 120 篇 临床医学
    • 99 篇 基础医学(可授医学...
  • 82 篇 法学
    • 64 篇 社会学
  • 61 篇 经济学
    • 61 篇 应用经济学
  • 54 篇 教育学
  • 24 篇 农学
  • 13 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 176 篇 software enginee...
  • 134 篇 computer science
  • 77 篇 computational mo...
  • 75 篇 application soft...
  • 73 篇 deep learning
  • 72 篇 accuracy
  • 70 篇 laboratories
  • 70 篇 machine learning
  • 68 篇 software systems
  • 67 篇 software
  • 62 篇 computer archite...
  • 60 篇 artificial intel...
  • 60 篇 training
  • 52 篇 quality of servi...
  • 52 篇 wireless sensor ...
  • 49 篇 systems engineer...
  • 49 篇 resource managem...
  • 49 篇 security
  • 47 篇 grid computing
  • 47 篇 cloud computing

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 24 篇 college of compu...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 18 篇 department of sy...
  • 18 篇 state key labora...
  • 17 篇 software enginee...
  • 12 篇 department of el...
  • 12 篇 department of so...
  • 12 篇 max planck insti...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 school of softwa...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 10 篇 computing and so...
  • 10 篇 school of intell...

作者

  • 49 篇 rajkumar buyya
  • 35 篇 junping du
  • 31 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 22 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 15 篇 song houbing
  • 15 篇 zamli kamal z.
  • 14 篇 m. parashar
  • 14 篇 biswas gautam
  • 14 篇 gautam biswas
  • 13 篇 materwala huned
  • 12 篇 jafer shafagh
  • 12 篇 veera boonjing
  • 12 篇 leung victor c.m...
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley

语言

  • 2,632 篇 英文
  • 362 篇 其他
  • 16 篇 中文
  • 3 篇 日文
  • 2 篇 俄文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Department of Software Engineering and Computer Systems"
3011 条 记 录,以下是171-180 订阅
排序:
Machine learning and deep learning algorithms in detecting COVID-19 utilizing medical images: a comprehensive review
收藏 引用
Iran Journal of computer Science 2024年 第3期7卷 699-721页
作者: Nurjahan Mahbub-Or-Rashid, Md. Satu, Md. Shahriare Tammim, Sanjana Ruhani Sunny, Farhana Akter Moni, Mohammad Ali Department of IoT and Robotics Engineering Bangabandhu Sheikh Mujibur Rahman Digital University Kaliakair Bangladesh Department of Computer Science and Engineering Bangladesh University of Business and Technology Mirpur Bangladesh Department of Management Information Systems Noakhali Science and Technology University Noakhali Bangladesh Department of Computer Science and Software Engineering Auburn University Auburn AL United States Department of Computer Science and Engineering Green University of Bangladesh Dhaka Bangladesh Faculty of Health and Behavioural Sciences School of Health and Rehabilitation Sciences The University of Queensland St Lucia Australia
The public’s health is seriously at risk from the coronavirus pandemic. Millions of people have already died as a result of this devastating illness, which affects countless people daily worldwide. Unfortunately, no ... 详细信息
来源: 评论
Don't Forget the Exception! : Considering Robustness Changes to Identify Design Problems  20
Don't Forget the Exception! : Considering Robustness Changes...
收藏 引用
20th IEEE/ACM International Conference on Mining software Repositories, MSR 2023
作者: Oliveira, Anderson Correia, Joao Sousa, Leonardo Assuncao, Wesley K. G. Coutinho, Daniel Garcia, Alessandro Oizumi, Willian Barbosa, Caio Uchoa, Anderson Pereira, Juliana Alves Informatics Department - Pontifical Catholic Rio de Janeiro Brazil Carnegie Mellon University Department of Electrical and Computer Engineering Pittsburgh United States Institute of Software Systems Engineering Linz Austria Itapajé Brazil
Modern programming languages, such as Java, use exception-handling mechanisms to guarantee the robustness of software systems. Although important, the quality of exception code is usually poor and neglected by develop... 详细信息
来源: 评论
Deepfake Detection Using a Hybrid Deep Learning Approach with Swin Transformers and ConvNeXt
Deepfake Detection Using a Hybrid Deep Learning Approach wit...
收藏 引用
International Research Conference on Smart Computing and systems engineering (SCSE)
作者: H M Sudith Amarasinghe S P Kasthuri Arachchi Department of Computer Systems Engineering University of Kelaniya Sri Lanka Department of Software Engineering University of Kelaniya Sri Lanka
The rapid advancement of artificial intelligence has led to the proliferation of deep-fake technology, which poses significant challenges to digital security and trust. As deepfakes become increasingly sophisticated, ... 详细信息
来源: 评论
Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health
收藏 引用
computer systems Science & engineering 2022年 第11期43卷 833-847页
作者: A.S.Anakath S.Ambika S.Rajakumar R.Kannadasan K.S.Sendhil Kumar School of Computing E.G.S.Pillay Engineering CollegeNagapattinam611002India Department of Computer Science and Engineering University College of Engineering AriyalurAriyalur621705India Department of Mathematics University College of Engineering AriyalurAriyalur621705India Department of Software Systems School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014India Department of IoT School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014India
Cloud computing becomes an important application development platform for processing user data with high *** providers are accustomed to providing storage centers outside the trusted location preferred by the data ***... 详细信息
来源: 评论
Enhancing Deep Reinforcement Learning with Scenario-Based Modeling
收藏 引用
SN computer Science 2023年 第2期4卷 1-13页
作者: Yerushalmi, Raz Amir, Guy Elyasaf, Achiya Harel, David Katz, Guy Marron, Assaf Department of Computer Science and Applied Mathematics Weizmann Institute of Science Rehovot 76100 Israel School of Computer Science and Engineering The Hebrew University of Jerusalem Jerusalem 91904 Israel Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva 8410501 Israel
Deep reinforcement learning agents have achieved unprecedented results when learning to generalize from unstructured data. However, the “black-box” nature of the trained DRL agents makes it difficult to ensure that ... 详细信息
来源: 评论
Gaussian Differential Privacy Integrated Machine Learning Model for Industrial Internet of Things
收藏 引用
SN computer Science 2023年 第5期4卷 454页
作者: Lazar, Arokia Jesu Prabhu Soundararaj, Sivaprakash Sonthi, Vijaya Krishna Palanisamy, Vishnu Raja Subramaniyan, Vanithamani Sengan, Sudhakar Department of Computer Science and Engineering AI & ML CMR Institute of Technology Telangana Hyderabad 501401 India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Vellore 632014 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Andhra Pradesh Vaddeswaram 522502 India Department of Computer Science and Engineering Kongu Engineering College Tamil Nadu Perundurai 638060 India Master of Computer Applications M. Kumarasamy College of Engineering Tamil Nadu Karur 638060 India Department of Computer Science and Engineering PSN College of Engineering and Technology Tamil Nadu Tirunelveli 627152 India
Agriculture, energy, mining, healthcare, and transportation are a few of the top industries transformed by the industrial internet of things (IIoT). Industry 4.0 mainly relies on machine learning (ML) to use the vast ... 详细信息
来源: 评论
Implementation of Multi-Agent Energy Management for Secondary Control of a Microgrid
Implementation of Multi-Agent Energy Management for Secondar...
收藏 引用
2023 IEEE International Conference on Applied Superconductivity and Electromagnetic Devices, ASEMD 2023
作者: Yoldas, Yeliz Onen, Ahmet Alawasa, Khaled El Haffar, Abdelsalam Ahshan, Razzaqul Islam, Md. Rabiul Muyeen, S.M. Noorfatima, Nadya Jung, Jaesung Kayseri University Department of Software Engineering Kayseri Turkey Sultan Qaboos University Department of Electrical and Computer Engineering Muscat Oman University of Wollongong School of Electrical Computer and Telecommunications Engineering NSW Australia Qatar University Electrical Engineering Department Doha Qatar Ajou University Department of Energy Systems Research Suwon Korea Republic of
The multi-agent energy management system (EMS) is needed to coordinate multiple agents of a microgrid to provide efficient operation of the system. In this study, multi-agent EMS is seen as the middle controller betwe... 详细信息
来源: 评论
Wheelchair Wheel Design with Transformable 'Wheel-Leg' Configuration for Climbing Stairs and Various Surfaces
Wheelchair Wheel Design with Transformable 'Wheel-Leg' Confi...
收藏 引用
2025 International Russian Smart Industry Conference, SmartIndustryCon 2025
作者: Magomedov, Islam Aygumov, Timur Kanametov, Anzor A. Kadyrov Chechen State University Grozny Russia Dagestan State Technical University Department of Software Engineering Computer Technology and Automated Systems Dagestan Russia Kabardino-Balkarian State University Department of Electronics and Digital Information Technologies Nalchik Russia
The dynamic and uneven terrain of our environment introduces complexity for locomotion vehicles to navigate easily across different settings. Wheelchairs belong to the category of vehicles that require locomotion acro... 详细信息
来源: 评论
Human Emotions Classification Using EEG via Audiovisual Stimuli and AI
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 5075-5089页
作者: Abdullah A Asiri Akhtar Badshah Fazal Muhammad Hassan A Alshamrani Khalil Ullah Khalaf A Alshamrani Samar Alqhtani Muhammad Irfan Hanan Talal Halawani Khlood M Mehdar Radiological Sciences Department College of Applied Medical SciencesNajran UniversityNajranSaudi Arabia Faculty of Computer Science and Engineering GIK Institute of Engineering Sciences and TechnologyTopi23460Pakistan Department of Electrical Engineering University of Engineering and TechnologyMardan23200Pakistan Department of Software Engineering University of MalakandDir LowerPakistan Department of Computer Science and Information Systems College of EngineeringNajran University Saudi ArabiaNajran61441Saudi Arabia Electrical Engineering Department College of EngineeringNajran University Saudi ArabiaNajran61441Saudi Arabia Computer Science Department College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Anatomy Department Medicine CollegeNajran UniversityNajranSaudi Arabia
Electroencephalogram(EEG)is a medical imaging technology that can measure the electrical activity of the scalp produced by the brain,measured and recorded chronologically the surface of the scalp from the *** recorded... 详细信息
来源: 评论
State-based Sandbox Tool for Distributed Malware Detection with Avoid Techniques  13
State-based Sandbox Tool for Distributed Malware Detection w...
收藏 引用
13th International Conference on Dependable systems, Services and Technologies, DESSERT 2023
作者: Rehida, Pavlo Markowsky, George Sachenko, Anatoliy Savenko, Oleg Khmelnytskyi National University Department of Computer Engineering and Information Systems Khmelnytskyi Ukraine Kennesaw State University Department of Software Engineering and Game Development Marietta United States Kazimierz Pulaski University of Technology and Humanities Department of Informatics Radom Poland Research Institute for Intelligent Computer Systems West Ukrainian National Unversity Ternopil Ukraine
This paper deals with the problem of detecting the malware by using emulation approach. Modern malware include various avoid techniques, to hide its anomaly actions. Advantages of using sandbox and emulation technolog... 详细信息
来源: 评论