咨询与建议

限定检索结果

文献类型

  • 8,009 篇 会议
  • 4,408 篇 期刊文献
  • 160 册 图书

馆藏范围

  • 12,577 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,926 篇 工学
    • 6,170 篇 计算机科学与技术...
    • 5,016 篇 软件工程
    • 1,600 篇 信息与通信工程
    • 1,056 篇 控制科学与工程
    • 768 篇 生物工程
    • 717 篇 电气工程
    • 566 篇 电子科学与技术(可...
    • 532 篇 机械工程
    • 516 篇 生物医学工程(可授...
    • 394 篇 光学工程
    • 318 篇 仪器科学与技术
    • 284 篇 动力工程及工程热...
    • 284 篇 安全科学与工程
    • 256 篇 化学工程与技术
    • 218 篇 交通运输工程
  • 3,584 篇 理学
    • 2,132 篇 数学
    • 855 篇 生物学
    • 720 篇 物理学
    • 579 篇 统计学(可授理学、...
    • 508 篇 系统科学
    • 282 篇 化学
  • 2,419 篇 管理学
    • 1,563 篇 管理科学与工程(可...
    • 948 篇 图书情报与档案管...
    • 696 篇 工商管理
  • 577 篇 医学
    • 497 篇 临床医学
    • 438 篇 基础医学(可授医学...
    • 266 篇 药学(可授医学、理...
    • 232 篇 公共卫生与预防医...
  • 373 篇 法学
    • 291 篇 社会学
  • 248 篇 经济学
    • 247 篇 应用经济学
  • 186 篇 教育学
  • 131 篇 农学
  • 52 篇 文学
  • 36 篇 军事学
  • 27 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 524 篇 computer science
  • 336 篇 software enginee...
  • 245 篇 deep learning
  • 225 篇 data mining
  • 222 篇 computational mo...
  • 215 篇 machine learning
  • 185 篇 feature extracti...
  • 177 篇 application soft...
  • 176 篇 laboratories
  • 166 篇 optimization
  • 156 篇 computer archite...
  • 155 篇 wireless sensor ...
  • 155 篇 accuracy
  • 153 篇 software
  • 146 篇 internet of thin...
  • 137 篇 educational inst...
  • 136 篇 semantics
  • 125 篇 predictive model...
  • 123 篇 monitoring
  • 120 篇 algorithm design...

机构

  • 493 篇 state key labora...
  • 386 篇 department of co...
  • 257 篇 department of co...
  • 226 篇 school of softwa...
  • 169 篇 college of compu...
  • 161 篇 school of softwa...
  • 108 篇 state key labora...
  • 99 篇 school of comput...
  • 77 篇 school of inform...
  • 68 篇 department of co...
  • 66 篇 department of co...
  • 63 篇 department of co...
  • 51 篇 state key labora...
  • 48 篇 national key lab...
  • 47 篇 university of ch...
  • 46 篇 school of softwa...
  • 46 篇 school of softwa...
  • 45 篇 tsinghua nationa...
  • 41 篇 national key lab...
  • 39 篇 school of comput...

作者

  • 43 篇 xiang-yang li
  • 40 篇 baowen xu
  • 39 篇 yunhao liu
  • 31 篇 shen furao
  • 29 篇 zhao jian
  • 27 篇 aichholzer oswin
  • 27 篇 qi lianyong
  • 25 篇 zhou zhi-hua
  • 25 篇 yang tianbao
  • 24 篇 vogtenhuber birg...
  • 24 篇 wang wei
  • 23 篇 rehman attique u...
  • 23 篇 xuandong li
  • 22 篇 wang jianmin
  • 22 篇 jiacun wang
  • 22 篇 gao yang
  • 22 篇 zhang yan
  • 22 篇 sun fuchun
  • 21 篇 jun zhang
  • 21 篇 guihai chen

语言

  • 12,005 篇 英文
  • 376 篇 其他
  • 209 篇 中文
  • 2 篇 德文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Software and Computer Technology"
12577 条 记 录,以下是101-110 订阅
排序:
Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 1311-1328页
作者: Arslan Akram Imran Khan Javed Rashid Mubbashar Saddique Muhammad Idrees Yazeed Yasin Ghadi Abdulmohsen Algarni Faculty of Computer Science and Information Technology Department of Computer ScienceSuperior UniversityLahore54000Pakistan Machine Learning Code(MLC)Lab Meharban HouseHouse Number 209Zafar ColonyOkara56300Pakistan Information Technology Services University of OkaraOkara56310Pakistan Department of Computer Science&Engineering University of Engineering&Technology LahoreNarowal CampusNarowal51601Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain11671Abu Dhabi Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information... 详细信息
来源: 评论
Bi-Directional LSTM-Based Search Engine for Source Code Retrieval  4
Bi-Directional LSTM-Based Search Engine for Source Code Retr...
收藏 引用
4th International Conference on Communication Technologies, ComTech 2023
作者: Bibi, Nazia Rana, Tauseef Maqbool, Ayesha National University of Sciences and Technology Department of Computer Software Engineering Islamabad Pakistan
The code retrieval process looks for the most relevant code fragments. For this purpose, many code-search methods support natural-language queries. But still, there are problems with figuring out the pros and cons of ... 详细信息
来源: 评论
EXTENDED REALITY IN POWER DISTRIBUTION GRID: APPLICATIONS AND FUTURE TRENDS  27
EXTENDED REALITY IN POWER DISTRIBUTION GRID: APPLICATIONS AN...
收藏 引用
27th International Conference on Electricity Distribution, CIRED 2023
作者: Nosrati, Komeil Alsaleh, Saleh Tepljakov, Aleksei Petlenkov, Eduard Onile, Abiodun Škiparev, Vjatšeslav Belikov, Juri Department of Computer System Tallinn University of Technology Estonia Department of Software Science Tallinn University of Technology Estonia
Modern automation schemes have substantially improved by using standard communication protocols, upgraded technologies and user-friendly tools in power distribution domain. Nevertheless, this fundamental functionality... 详细信息
来源: 评论
Identification of software Bugs by Analyzing Natural Language-Based Requirements Using Optimized Deep Learning Features
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4379-4397页
作者: Qazi Mazhar ul Haq Fahim Arif Khursheed Aurangzeb Noor ul Ain Javed Ali Khan Saddaf Rubab Muhammad Shahid Anwar Department of Computer Science and Engineering and International Bachelor’s Program in Informatics Yuan Ze UniversityZhongliTaoyuan320315Taiwan Department of Computer Science National University of PakistanRawalpindiPunjab46000Pakistan Department of Computer Software Engineering MCSNational University of Sciences and TechnologyIslamabad44000Pakistan Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Department of Computer Science School of PhysicsEngineering and Computer ScienceUniversity of HertfordshireHatfieldAL109ABUK Department of Computer Engineering College of Computing and InformaticsUniversity of SharjahSharjah27272United Arab Emirates Department of AI and Software Gachon UniversitySeongnam-SI13120South Korea
software project outcomes heavily depend on natural language requirements,often causing diverse interpretations and issues like ambiguities and incomplete or faulty *** are exploring machine learning to predict softwa... 详细信息
来源: 评论
Meta-Learning for Automated Algorithm Selection in Healthcare: Enhancing Clinical Outcomes through Data-Driven Recommendation
Meta-Learning for Automated Algorithm Selection in Healthcar...
收藏 引用
2024 International Conference on IT and Industrial Technologies, ICIT 2024
作者: Khan, Irfan Zhang, Xianchao Ali, Rahman Habib, Masood School of Software Dalian University of Technology Dalian China Department of Computer Science University of Peshawar Peshawar Pakistan School of Computer Science & Technology Dalian University of Technology Dalian China
The integration of machine learning (ML) algorithms in healthcare is transforming diagnostics, treatment planning, and patient management. However, the complexity and diversity of these algorithms, coupled with hetero... 详细信息
来源: 评论
A three-step SEM-Bayesian network approach for predicting the determinants of CloudIoT-based healthcare adoption
收藏 引用
International Journal of Information technology (Singapore) 2024年 1-21页
作者: Altawaiha, Iyad Atan, Rodziah Yaakob, Razali Bin Abdullah, Rusli Bin Hj Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia
Adopting the CloudIoT-based healthcare paradigm provides various prospects for medical IT and considerably enhances healthcare services. However, compared to the advanced development of CloudIoT-based healthcare syste... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
Science China(Information Sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
A Novel Blockchain-Based Deepfake Detection Method Using Federated and Deep Learning Models
收藏 引用
Cognitive Computation 2024年 第3期16卷 1073-1091页
作者: Heidari, Arash Navimipour, Nima Jafari Dag, Hasan Talebi, Samira Unal, Mehmet Department of Software Engineering Haliç University Istanbul34060 Turkey Department of Computer Engineering Kadir Has University Istanbul Turkey Future Technology Research Center National Yunlin University of Science and Technology Yunlin Douliou64002 Taiwan Department of Information Technology Kadir Has University Istanbul Turkey Department of Computer Science University of Texas at San Antonio San AntonioTX United States Department of Computer Engineering Nisantasi University Istanbul Turkey
In recent years, the proliferation of deep learning (DL) techniques has given rise to a significant challenge in the form of deepfake videos, posing a grave threat to the authenticity of media content. With the rapid ... 详细信息
来源: 评论
Assessing and prioritizing crucial drivers for CloudIoT-based healthcare adoption: an analytic hierarchy process approach
收藏 引用
International Journal of Information technology (Singapore) 2024年 1-18页
作者: Altawaiha, Iyad Atan, Rodziah Yaakob, Razali Bin Abdullah, Rusli Bin Hj Department of Software Engineering and Information Systems Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia Department of Computer Science Faculty of Computer Science and Information Technology Universiti Putra Malaysia (UPM) Serdang 43400 Malaysia
The CloudIoT paradigm has profoundly transformed the healthcare industry, providing outstanding innovation and practical applications. However, despite its many advantages, the adoption of this paradigm in healthcare ... 详细信息
来源: 评论
Optimized digital watermarking: Harnessing the synergies of Schur matrix factorization, DCT, and DWT for superior image ownership proofing
收藏 引用
Multimedia Tools and Applications 2024年 第18期84卷 1-36页
作者: Al-Aiash, Issa Alquran, Rabee AlJamal, Mahmoud Alsarhan, Ayoub Aljaidi, Mohammad Al-Fraihat, Dimah Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa13110 Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman11622 Jordan
The contemporary context of abundant digital dissemination inherently gives rise to the need for media protection and the clear identification of ownership rights. This paper responded to this nagging issue of unautho... 详细信息
来源: 评论