咨询与建议

限定检索结果

文献类型

  • 1,763 篇 会议
  • 1,081 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,800 篇 工学
    • 1,454 篇 计算机科学与技术...
    • 1,201 篇 软件工程
    • 358 篇 信息与通信工程
    • 269 篇 控制科学与工程
    • 216 篇 生物工程
    • 165 篇 电气工程
    • 148 篇 生物医学工程(可授...
    • 106 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 87 篇 光学工程
    • 82 篇 安全科学与工程
    • 72 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 64 篇 交通运输工程
  • 813 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 165 篇 物理学
    • 140 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 568 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 158 篇 医学
    • 141 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 69 篇 公共卫生与预防医...
  • 81 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 72 篇 经济学
    • 71 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 125 篇 software enginee...
  • 83 篇 computer science
  • 74 篇 machine learning
  • 67 篇 computational mo...
  • 64 篇 deep learning
  • 62 篇 accuracy
  • 61 篇 software
  • 61 篇 training
  • 56 篇 cloud computing
  • 55 篇 internet of thin...
  • 51 篇 quality of servi...
  • 50 篇 resource managem...
  • 50 篇 feature extracti...
  • 48 篇 grid computing
  • 44 篇 computer archite...
  • 44 篇 security
  • 43 篇 application soft...
  • 40 篇 artificial intel...
  • 39 篇 data models
  • 38 篇 optimization

机构

  • 126 篇 college of compu...
  • 73 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 32 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 19 篇 school of softwa...
  • 18 篇 department of co...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 school of softwa...
  • 16 篇 institute of com...
  • 15 篇 department of co...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 17 篇 muhammad adnan k...
  • 16 篇 jiannong cao
  • 15 篇 wang xiaofei
  • 14 篇 tan kay chen
  • 14 篇 xiaofei wang
  • 13 篇 parizi reza m.
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 leila ismail

语言

  • 2,710 篇 英文
  • 166 篇 其他
  • 13 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Software Engineering and Computing"
2889 条 记 录,以下是471-480 订阅
排序:
Identify the potential pathways and candidate biomarkers of stroke associated with bipolar disorder: Bioinformatics and system biology approach
收藏 引用
Journal of Proteins and Proteomics 2025年 第2期16卷 141-159页
作者: Hosen, Md. Faruk Basar, Md. Abul Yasmin, Mst. Farjana Hasan, Md. Rakibul Uddin, Muhammad Shahin Department of Information and Communication Technology (ICT) Mawlana Bhashani Science and Technology University (MBSTU) Tangail Bangladesh Department of Computing and Information System (CIS) Daffodil International University (DIU) Dhaka Bangladesh Department of Computer Science and Engineering (CSE) Uttara University Dhaka Bangladesh Department of Software Engineering (SWE) Daffodil International University (DIU) Dhaka Bangladesh
The field of computational bioinformatics and systems biology analysis is rapidly expanding due to advancements in bioinformatics tools. Bipolar disorder (BD) is a severe psychiatric condition affecting both adults an...
来源: 评论
Explicitly Diverse Visual Question Generation
SSRN
收藏 引用
SSRN 2024年
作者: Xie, Jiayuan Zheng, Jiasheng Fang, Wenhao Cai, Yi Li, Qing School of Software Engineering South China University of Technology Guangzhou China Ministry of Education China Department of Computing Hong Kong Polytechnic University Hong Kong Institute of Software Chinese Academy of Sciences Beijing China
Visual question generation involves the generation of meaningful questions about an image. Although we have made significant progress in automatically generating a single high-quality question related to an image, exi...
来源: 评论
Assessing Cybersecurity Awareness among the Hashemite University Students in Terms of Computer Usage  16
Assessing Cybersecurity Awareness among the Hashemite Univer...
收藏 引用
16th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2024
作者: Aljammal, Ashraf H. Qawasmeh, Ahmad Taamneh, Salah Wedyan, Fadi Obiedat, Mamoon Salameh, Hani Bani The Hashemite University Prince Al Hussein Bin Abdullah Ii Faculty of Information Technology Department of Computer Science and Applications Zarqa Jordan Lewis University Department of Engineering Computing and Mathematical Sciences RomeovilleIL United States The Hashemite University Prince Al Hussein Bin Abdullah Ii Faculty of Information Technology Department of Information Technology Zarqa Jordan The Hashemite University Prince Al Hussein Bin Abdullah Ii Faculty of Information Technology Department of Software Engineering Zarqa Jordan
Internet usage among information technology users has expanded substantially, as have cybercrimes with potentially disastrous repercussions. Therefore, internet users have to employ the available security measures and... 详细信息
来源: 评论
Empirical Study on Mispronunciation Detection for Tajweed Rules during Quran Recitation
Empirical Study on Mispronunciation Detection for Tajweed Ru...
收藏 引用
computing and Informatics (ICCI), International Conference on
作者: Yousef S Alsahafi Muhammad Asad Department of Information technology Computing and Information technology at Khulis College University of Jeddah Jeddah Saudi Arabia Department of Computer and Software Engineering College of Electrical and Mechanical Engineering National University of Science and Technology Islamabad Pakistan
This paper presents an extensive empirical study aiming to identify the optimal combination of feature extraction techniques and machine learning algorithms, including deep learning, for automated mispronunciation det...
来源: 评论
Organizational governance: Resolving insufficient practice and quality expectation in Small software Companies.  22
Organizational governance: Resolving insufficient practice a...
收藏 引用
Proceedings of the 2022 European Symposium on software engineering
作者: Micheal Tuape Petrus Iiyambo Jussi Kasurinen Department of Software Engineering Lappeenranta-Lahti University of Technology Finland Dept of Computing Maths and Statistical Sciences University of Namibia Namibia
The quality of software products is among the most prevalent challenges threatening the software development primarily in small software companies (SSCs). These challenges are associated with insufficient practices af... 详细信息
来源: 评论
Improved Fireworks Optimization Algorithm for Multi-product Human-robot Collaborative Hybrid Disassembly Line Balancing  4
Improved Fireworks Optimization Algorithm for Multi-product ...
收藏 引用
4th IEEE International Conference on Human-Machine Systems, ICHMS 2024
作者: Guo, Feng Guo, Xiwang Wang, Jiacun Wang, Weitian Cao, Jinrui Bigaume, Imane Liaoning Petrochemical University Information And Control Engineering Fushun China Monmouth University Computer Science And Software Eng. Wes Long BranchNJ United States Montclair State University School Of Computing Montclair United States New Jersey City University Computer Science Department Jersey City United States
In the remanufacturing process, the efficient disassembly of end-of-life (EOL) products assumes paramount significance for recycling endeavors. This work introduces a novel disassembly model aiming at enhancing disass... 详细信息
来源: 评论
Schrödinger Mechanisms: Optimal Differential Privacy Mechanisms for Small Sensitivity
Schrödinger Mechanisms: Optimal Differential Privacy Mechan...
收藏 引用
IEEE International Symposium on Information Theory
作者: Wael Alghamdi Shahab Asoodeh Flavio P. Calmon Juan Felipe Gomez Oliver Kosut Lalitha Sankar School of Engineering and Applied Sciences Harvard University Department of Computing and Software McMaster University School of Electrical Computer and Energy Engineering Arizona State University
We consider the problem of designing optimal differential privacy mechanisms with a favorable privacy-utility tradeoff in the limit of a large number n of compositions (i.e., sequential queries). Here, utility is meas...
来源: 评论
Generative Adversarial Network-Based Network Intrusion Detection System for Supervisory Control and Data Acquisition System
Generative Adversarial Network-Based Network Intrusion Detec...
收藏 引用
2024 IEEE International Conference on Consumer Electronics-Asia, ICCE-Asia 2024
作者: Nguyen, Hong Nhung Lan-Phan, Thi Song, Chai-Jong School of Computing Gachon University Department of AI and Software Engineering Gyeonggi-do Seongnam-si1342 Korea Republic of Viet Nam - Korea Institute of Science and Technology Division of Information Technology Thach That Ha Noi Viet Nam Korea Electronics Technology Institute Information Media Research Center Seoul03924 Korea Republic of
In the context of burgeoning cyber threats targeting Supervisory Control and Data Acquisition (SCADA) systems, this paper presents a pioneering Intrusion Detection System (IDS) grounded in Generative Adversarial Netwo... 详细信息
来源: 评论
Classification and Segmentation of Mitotic Cells using Ant Colony Algorithm and TNM Classifier
Classification and Segmentation of Mitotic Cells using Ant C...
收藏 引用
2022 International Conference on Augmented Intelligence and Sustainable Systems, ICAISS 2022
作者: Vidhya, R.G. Sasikala, T.S. Ahamed, Ayoobkhan Mohamed Uvaze Khan, Subair Ali Liayakath Ali Singh, Kamlesh Saratha, M. HKBK College of Engineering Department of ECE Bangalore India Amrita College of Engineering and Technology Department of CSE Tamilnadu India Software Engineering New Uzbekistan University Tashkent Uzbekistan Westminster International University in Tashkent Computing Department Uzbekistan Graphic Era Hill University Department of CSE Dehradun India M.Kumarasamy College of Engineering Department of MCA Tamilnadu Karur India
Breast cancer develops from breast tissue and leads to abnormally growing cells in the chest. Doctors usually look for tumors on a mammogram, and some mammograms contain abnormal macrocalcifications and microcalcifica... 详细信息
来源: 评论
SPUFChain: Permissioned Blockchain Lightweight Authentication Scheme for Supply Chain Management Using PUF of IoT
收藏 引用
IEEE Access 2025年 13卷 88662-88682页
作者: Assaqty, Mohammad Iqbal Saryuddin Gao, Ying Alqarni, Abeer D. Khan, Siraj Chakraborty, Mohuya Nur Siddiqi, Hafied Ahmad, Sadique South China University of Technology School of Computer Science and Engineering Guangzhou510006 China Universitas Nahdlatul Ulama Indonesia Faculty of Engineering and Computer Science Jakarta10320 Indonesia Princess Nourah bint Abdulrahman University College of Computer and Information Sciences Department of Information Technology P.O. Box 84428 Riyadh11671 Saudi Arabia Research Institute for Future Media Computing College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China University of Engineering and Management Cybersecurity Centre of Excellence Kolkata700160 India Riyadh12435 Saudi Arabia
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in ... 详细信息
来源: 评论