咨询与建议

限定检索结果

文献类型

  • 1,683 篇 会议
  • 250 篇 期刊文献
  • 38 册 图书

馆藏范围

  • 1,971 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,234 篇 工学
    • 1,022 篇 计算机科学与技术...
    • 870 篇 软件工程
    • 286 篇 信息与通信工程
    • 161 篇 控制科学与工程
    • 131 篇 生物工程
    • 104 篇 电气工程
    • 87 篇 电子科学与技术(可...
    • 87 篇 生物医学工程(可授...
    • 53 篇 光学工程
    • 52 篇 机械工程
    • 52 篇 安全科学与工程
    • 46 篇 动力工程及工程热...
    • 36 篇 建筑学
    • 36 篇 交通运输工程
    • 32 篇 土木工程
    • 32 篇 化学工程与技术
  • 529 篇 理学
    • 320 篇 数学
    • 143 篇 生物学
    • 94 篇 统计学(可授理学、...
    • 90 篇 物理学
    • 66 篇 系统科学
  • 376 篇 管理学
    • 215 篇 管理科学与工程(可...
    • 185 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 74 篇 医学
    • 72 篇 临床医学
    • 69 篇 基础医学(可授医学...
    • 47 篇 药学(可授医学、理...
  • 73 篇 法学
    • 53 篇 社会学
  • 43 篇 经济学
    • 43 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 5 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 61 篇 software
  • 59 篇 software enginee...
  • 56 篇 accuracy
  • 54 篇 machine learning
  • 45 篇 feature extracti...
  • 45 篇 training
  • 40 篇 computational mo...
  • 39 篇 deep learning
  • 39 篇 real-time system...
  • 34 篇 computer science
  • 33 篇 semantics
  • 30 篇 artificial intel...
  • 29 篇 data mining
  • 29 篇 predictive model...
  • 28 篇 internet of thin...
  • 28 篇 data models
  • 26 篇 analytical model...
  • 24 篇 computer archite...
  • 23 篇 support vector m...
  • 22 篇 scalability

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 9 篇 shafiur rahman
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 dong min

语言

  • 1,881 篇 英文
  • 76 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. Computer and Software Engineering"
1971 条 记 录,以下是121-130 订阅
排序:
Intrusion Detection System Based on Machine Learning Techniques: A Survey  2
Intrusion Detection System Based on Machine Learning Techniq...
收藏 引用
2nd International Conference on Advances in engineering Science and Technology, AEST 2022
作者: Sheet, Omar I. Ibrahim, Laheeb M. University of Mosul College of Computer Sciences & Math Software Engineering Dept. Iraq
The volume of network traffic data has become so big and complicated as a result of the development in Internet-based services that it is extremely difficult to process using typical data processing techniques. Due to... 详细信息
来源: 评论
An In-dept. Study on Handwritten Signature Authentication Using Unique Writer Traits  1
An In-Depth Study on Handwritten Signature Authentication Us...
收藏 引用
1st IEEE International Conference on Advances in Computing, Communication and Networking, ICAC2N 2024
作者: Vamsikrishna, M. Murari, Haritha Manikandan, M. Mishra, Nilamadhab Raghavendra Gupta, T. Patel, Rohit Aditya University Dept. of Computer Applications Kakinada India Spark Infotech Inc Sr Software Engineer PhoenixAZ United States VeL Tech. R Dr.S Dept. of Computer Science and Engineering Tamilnadu India VIT Bhopal University Dept. of Computer Science and Engineering Sehore India HITM Telenagana Hyderabad India Calorx Teachers' University Dept of CSE Gujrat India
Handwriting verification, a subset of signature verification, involves using handwritten text to verify or authorize someone's identification. Although simple handwriting can serve as a signature, it is often modi... 详细信息
来源: 评论
Intelligent Model for Optimizing Gantt Chart in the Planning Stage  11
Intelligent Model for Optimizing Gantt Chart in the Planning...
收藏 引用
11th International Conference on Information Technology, ICIT 2023
作者: Bdair, Noor Alzyadat, Wael Alzubi, Shadi Alzaytoonh University of Jordan Faculty of Science and IT Dept of Software Engineering Jordan Alzaytoonh University of Jordan Faculty of Science and IT Dept. of of Computer Science Jordan
Scheduling tasks under resource constraints is essential for project success, and this research focuses on scheduling tasks efficiently to minimize completion time. To tackle this problem, two optimization techniques ... 详细信息
来源: 评论
Robust Psoriasis Severity Classification by using Data Augmentation
收藏 引用
Transactions of the Korean Institute of Electrical Engineers 2022年 第12期71卷 1841-1847页
作者: Moon, Cho-I Baek, Yoo Sang Choi, Min Hyung Lee, Onseok Dept. of Software Convergence Graduate School Soonchunhyang University Korea Republic of Dept. of Dermatology Guro Hospital Korea University College of Medicine Korea Republic of Dept. of Computer Science and Engineering College of Engineering Design and Computing University of Colorado Denver United States
Psoriasis is a chronic recurrent disease formed by lesions such as erythema and scale. To evaluate the severity of psoriasis, the psoriasis area and severity index (PASI) score have been used in clinical trials and st... 详细信息
来源: 评论
Handcrafted and Deep features based Classification of Scoliosis  2
Handcrafted and Deep features based Classification of Scolio...
收藏 引用
2nd International Conference on Digital Futures and Transformative Technologies, ICoDT2 2022
作者: Fatima, Joddat Mohsan, Mashood M. Qaisar, Muhammad Umair Hamza, Muhammad Tahir, Muhammad Zeshan Zaman, Ghazzal Bahria University Dept. of Computer Science Islamabad Pakistan National University of Sciences & Technology Dept. of Computer & Software Engineering Rawalpindi Pakistan
The Spinal cord acts as the central transmission line connecting the Brain with all other body organs. Vertebrae are 33 uneven bones stacked over one another that holds the whole skeleton structure. Scoliosis is the t... 详细信息
来源: 评论
Decision Support System: Analysis and Design Methodology  2
Decision Support System: Analysis and Design Methodology
收藏 引用
2nd IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and computer engineering, MI-STA 2022
作者: Darbi, Huweida A. Saleh, Eiman M. University of Derna Dept. Computer Science Derna Libya Benghazi University Dept. Software Engineering Benghazi Libya
The success of any organization depends on the quality of the decisions made, and good decisions can be made by analyzing all the available data and knowledge of the organization. Decision Support Systems (DSSs) are u... 详细信息
来源: 评论
Reliability-Based Design of Time-Varying Electricity Tariff  31
Reliability-Based Design of Time-Varying Electricity Tariff
收藏 引用
31st International Conference on Electrical engineering, ICEE 2023
作者: Rastegar, Mohammad Sarajpoor, Nima School of Electrical and Computer Engineering Shiraz University Shiraz Iran University of Calgary Dept. of Electrical and Software Eng. Calgary Canada
Implementing price-based energy management programs to change the consumption pattern of residential consumers has become an indispensable solution to the operational challenges of smart distribution power systems. Ho... 详细信息
来源: 评论
Robust Phishing URL Classification Using FastText Character Embeddings and Hybrid Deep Learning  3
Robust Phishing URL Classification Using FastText Character ...
收藏 引用
3rd IEEE International Conference on Robotics, Automation, Artificial-Intelligence and Internet-of-Things, RAAICON 2024
作者: Al-Sakib, Abdullah Limon, Zishad Hossain Sakib, Anamul Pranto, Md Nuruzzaman Islam, Md Ariful Sultana, Shayma Ahmed, Md. Redwan Rahman, Shafiur Westcliff University Dept. of Information Technology CA92614 United States Westcliff University Dept. of Computer Science CA92614 United States International American University Dept. of Business Administration CA90010 United States International American University Dept. of Management Information System CA90010 United States East West University Dept. of Computer Science and Engineering Dhaka1212 Bangladesh Daffodil International University Dept. of Software Engineering Dhaka1216 Bangladesh
Phishing attacks are a major cybersecurity threat that resulted in over 1.2 million incidents in the first half of 2020. These attacks caused substantial financial losses and posed risks to individuals and organizatio... 详细信息
来源: 评论
CDP: Selective Influential Nodes Based on Cliques in the Diffusion Process in Social Networks  9
CDP: Selective Influential Nodes Based on Cliques in the Dif...
收藏 引用
9th International Conference on Web Research, ICWR 2023
作者: Yazdanifar, Fatemeh Beni, Hamid Ahmadi Salimi, Nikoo Bouyer, Asgarali Amirkabir University of Technology Dept. of Mathematics and Computer Science Tehran Iran Madani University Dept. Software Engineering Azarbijan Shahid Tabriz Iran University of Genoa Dept. of the Elec. Electronics Electronics and Telecommunication Eng. and Naval Architecture Genoa Italy Azarbaijan Shahid Madani University Dept. of Computer Engineering Tabriz Iran
Influence maximization techniques emphasize selecting a set of influential nodes in order to maximize influence. Because the algorithms presented in this field ignore the topology of cliques for diffusion, there are t... 详细信息
来源: 评论
Report on the 28th Foundation of software engineering Workshop (FOSE2021)
Report on the 28th Foundation of Software Engineering Worksh...
收藏 引用
作者: Nagura, Masataka Sawada, Atsushi Sekizawa, Toshifusa Dept. of Software Engineering Fuculty of Sciense and Technology Nanzan University Japan Dept. of Computer Science College of Engineering Nihon University Japan
来源: 评论