咨询与建议

限定检索结果

文献类型

  • 5,458 篇 会议
  • 1,036 篇 期刊文献
  • 98 册 图书

馆藏范围

  • 6,592 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,078 篇 工学
    • 2,726 篇 计算机科学与技术...
    • 2,296 篇 软件工程
    • 951 篇 信息与通信工程
    • 762 篇 控制科学与工程
    • 585 篇 电气工程
    • 552 篇 电子科学与技术(可...
    • 351 篇 生物工程
    • 274 篇 生物医学工程(可授...
    • 273 篇 机械工程
    • 249 篇 光学工程
    • 238 篇 动力工程及工程热...
    • 190 篇 仪器科学与技术
    • 165 篇 化学工程与技术
    • 144 篇 安全科学与工程
    • 137 篇 交通运输工程
    • 123 篇 建筑学
    • 119 篇 材料科学与工程(可...
  • 2,005 篇 理学
    • 1,149 篇 数学
    • 479 篇 物理学
    • 384 篇 生物学
    • 345 篇 统计学(可授理学、...
    • 317 篇 系统科学
    • 157 篇 化学
  • 987 篇 管理学
    • 634 篇 管理科学与工程(可...
    • 410 篇 图书情报与档案管...
    • 390 篇 工商管理
  • 219 篇 医学
    • 198 篇 临床医学
    • 184 篇 基础医学(可授医学...
  • 185 篇 法学
    • 148 篇 社会学
  • 138 篇 经济学
    • 137 篇 应用经济学
  • 111 篇 教育学
  • 64 篇 农学
  • 17 篇 文学
  • 17 篇 军事学
  • 6 篇 艺术学

主题

  • 144 篇 accuracy
  • 124 篇 computational mo...
  • 114 篇 machine learning
  • 111 篇 feature extracti...
  • 108 篇 software
  • 106 篇 training
  • 96 篇 software enginee...
  • 93 篇 optimization
  • 87 篇 predictive model...
  • 87 篇 artificial intel...
  • 83 篇 deep learning
  • 76 篇 real-time system...
  • 73 篇 data models
  • 68 篇 computer science
  • 68 篇 computer archite...
  • 62 篇 data mining
  • 61 篇 internet of thin...
  • 61 篇 monitoring
  • 61 篇 mathematical mod...
  • 58 篇 neural networks

机构

  • 56 篇 dept. of systems...
  • 32 篇 dept. of systems...
  • 23 篇 optical sciences...
  • 20 篇 dept. of electri...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 16 篇 dept. of electri...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 15 篇 dept. of compute...
  • 14 篇 dept. of electri...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of systems...
  • 12 篇 dept. of softwar...
  • 12 篇 networking and i...
  • 12 篇 ieee
  • 12 篇 bcmaterials basq...
  • 12 篇 dept. of compute...

作者

  • 35 篇 wainer gabriel
  • 21 篇 ali raja hashim
  • 20 篇 tan mengxi
  • 20 篇 moss david j.
  • 19 篇 xu xingyuan
  • 18 篇 gabriel wainer
  • 18 篇 usama arshad
  • 18 篇 ku wei-shinn
  • 18 篇 arshad usama
  • 16 篇 zain ul abideen
  • 15 篇 yangquan chen
  • 14 篇 baldwin timothy
  • 13 篇 shabtai asaf
  • 13 篇 ali zeeshan ijaz
  • 13 篇 xi zhang
  • 12 篇 reiner lisa
  • 12 篇 hyunseung choo
  • 12 篇 sakamoto makoto
  • 12 篇 min dong
  • 12 篇 nisar ali

语言

  • 5,982 篇 英文
  • 533 篇 其他
  • 59 篇 中文
  • 9 篇 朝鲜文
  • 8 篇 日文
  • 1 篇 德文
  • 1 篇 俄文
检索条件"机构=Dept. of Computer Systems and Software Engineering"
6592 条 记 录,以下是981-990 订阅
排序:
IEEE 802.15.6 Relaying Protocol for MBANs  1
IEEE 802.15.6 Relaying Protocol for MBANs
收藏 引用
1st Mohammad Ali Jinnah University International Conference on Computing, MAJICC 2021
作者: Waheed, Tabassum Aqeel-Ur-Rehman Shaikh, Faisal Karim Hamdard University Dept. of Computer Engineering Karachi Pakistan Sir Syed University of Engineering Technology Dept. of Software Engineering Karachi Pakistan Mehran University of Engieneering Technology Dept. of Telecommmunication Engineering Jamshoro Pakistan
During the recent COVID-19 pandemic, Medical Body area networks (MBANs) emerged as an essential tool for the early diagnosis and treatment of infected patients. MBANs played an instrumental role in the remote treatmen... 详细信息
来源: 评论
Automated Boundary Identification for Machine Learning Classifiers
Automated Boundary Identification for Machine Learning Class...
收藏 引用
Search-Based and Fuzz Testing (SBFT), IEEE/ACM International Workshop on
作者: Felix Dobslaw Robert Feldt Dept. of Quality Mngmt Communication and Inf. Systems Mid Sweden University Östersund Sweden Dept. of Computer Science and Engineering Chalmers University of Technology Gothenburg Sweden
AI and Machine Learning (ML) models are increasingly used as (critical) components in software systems, even safety-critical ones. This puts new demands on the degree to which we need to test them and requires new and... 详细信息
来源: 评论
Enhancing Cybersecurity Through Advanced Fraud and Anomaly Detection Techniques: A Systematic Review
Enhancing Cybersecurity Through Advanced Fraud and Anomaly D...
收藏 引用
Science, engineering and Business for Sustainable Development Goals (SEB-SDG), International Conference on
作者: Oluwambo Tolulope Olowe Ayodele A. Adebiyi Adebiyi O. Marion Olowe Mofiyinfoluwa Tobi Deborah Olaniyan Julius Olaniyan Aderemi Emmanuel Kayode Akindeji Dept of Computer Science Landmark University Omuaran Nigeria Dept. of Industrial & Systems Engineering University of Pretoria Pretoria South Africa Dept. of Power Electric Engineering Durban University of Technology Durban South Africa
Fraud and anomaly detection in cybersecurity have become critical areas of research, prompting a comprehensive review of recent developments and model effectiveness. This study investigates prevalent trends and challe... 详细信息
来源: 评论
Unveiling Disparities: NLP Analysis of software Industry and Vocational Education Gaps
Unveiling Disparities: NLP Analysis of Software Industry and...
收藏 引用
Natural Language-Based software engineering (NLBSE), IEEE/ACM International Workshop on
作者: Emil Bäckstrand Rasmus Djupedal Lena-Maria Öberg Francisco Gomes De Oliveira Neto Dept. of Quality Management Communication and Inf. Systems Mid Sweden University Östersund Sweden Dept. of Computer Science and Engineering Chalmers|University of Gothenburg Gothenburg Sweden
The rapid growth of software industry highlights the importance of the education system in producing competent professionals to meet industry demands. Previous research has identified a gap between industry needs and ... 详细信息
来源: 评论
Combining Simulation and Recurrent Neural Networks for Model-Based Condition Monitoring of Machines  24
Combining Simulation and Recurrent Neural Networks for Model...
收藏 引用
Proceedings of the Winter Simulation Conference
作者: Alexander Wuttke Markus Rabe Joachim Hunker Jan-Philipp Diepenbrock Dept. IT in Production and Logistics TU Dortmund University Dortmund GERMANY Fraunhofer Institute for Software and Systems Engineering Dortmund GERMANY IVA Schmetz GmbH Menden GERMANY
Maintenance is pivotal in industry, with condition-based maintenance emerging as a key strategy. This involves monitoring the machine condition through sensor data analysis. Model-based approaches compare observed dat...
来源: 评论
Multiband Microstrip Patch Antenna Operating at Five Distinct 5G mm-Wave Bands
Multiband Microstrip Patch Antenna Operating at Five Distinc...
收藏 引用
2021 International Conference of Technology, Science and Administration, ICTSA 2021
作者: Saeed, Osama Y. A. Saeed, Ahmed A. A. Gaid, Abdulguddoos S. A. Aoun, Amjad M. H. Sallam, Amer A. Taiz University Faculty of Engineering and IT Dept. of Communication and Computer Engineering Taiz Yemen Taiz University Faculty of Engineering and IT Dept. O F Computer Networks and Distributed Systems Taiz Yemen
A novel mm-Wave multiband microstrip patch antenna for 5G wireless communication is designed and presented in this paper. The proposed design is an H-shaped with inset feed and a rectangular slit in the upper side of ... 详细信息
来源: 评论
Does Sri Lanka Have a Good Maritime Strategy to Stop Cyber-Terrorist Attacks
Does Sri Lanka Have a Good Maritime Strategy to Stop Cyber-T...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Samaraweera S. A. R. P Siriwardana S. M. D. N W. D. V. Fernando D. N. Rajakarunaratne Dept. of Computer Systems Engineering Sri Lanka Institute of Information Technology Malabe Sri Lanka
Maritime cyber-terrorist attacks have become a major concern to the entire world in recent decades. Everyone should be more aware of marine strategies to prevent cyberterrorist attacks, both locally and globally. This...
来源: 评论
Ontological View-driven Intensional Semantic Integration for Information systems in a Decentralized Environment  14
Ontological View-driven Intensional Semantic Integration for...
收藏 引用
14th International Conference on Knowledge engineering and Ontology Development, KEOD 2022 as part of 14th International Joint Conference on Knowledge Discovery, Knowledge engineering and Knowledge Management, IC3K 2022
作者: Ali Adhnouss, Fateh Mohamed Ali El-Asfour, Husam M. McIsaac, Kenneth El-Feghia, Idris Aburukba, Raafat Wahaishi, Abdulmutalib Dept. of Electrical & Computer Engineering University of Western London Canada Faculty of Information Technology Misurata University Libya Department of Computer Science and Engineering American University of Sharjah Sharjah United Arab Emirates Software Engineering Rochester Institute of Technology New York United States
Ontologies are an essential component of semantic integration approaches for information systems . In a decentralized environment, each specification of the domain reflects an Ontological view. However, the semantics ... 详细信息
来源: 评论
Auto Disturbance Rejection Control Based on A Neural Network Predictive State Observer
Auto Disturbance Rejection Control Based on A Neural Network...
收藏 引用
International Conference on Intelligent Human-Machine systems and Cybernetics, IHMSC
作者: Shengzhi Du BJ van Wyk NFS Nahri Chunling Tu Dept. Electrical Engineering Tshwane University of Technology Pretoria South Africa Dept. Computer Systems Engineering Tshwane University of Technology Pretoria South Africa
This paper addresses the auto disturbance rejection control (ADRC) for systems with time delay. ADRC is an effective control for most linear or nonlinear systems with noises and disturbances, because of its advantage ...
来源: 评论
Collaborative User Mobility Prediction in Distributed Edge Computing Framework
Collaborative User Mobility Prediction in Distributed Edge C...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor systems (MASS)
作者: Sardar Jaffar Ali Syed M. Raza Hyunseung Choo Dept. of AI Systems Engineering Sungkyunkwan University Suwon South Korea James Watt School of Engineering University of Glasgow Glasgow United Kingdom Dept. of Electrical and Computer Engineering Sungkyunkwan University Suwon South Korea
User attachment forecasting with Deep Learning (DL) is an effective tool for proactive mobility management in dense Beyond 5G (B5G)/6G deployments with reduced cell sizes. However, collecting user data in a central cl... 详细信息
来源: 评论