咨询与建议

限定检索结果

文献类型

  • 4,138 篇 会议
  • 2,746 篇 期刊文献
  • 136 册 图书

馆藏范围

  • 7,020 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,285 篇 工学
    • 3,246 篇 计算机科学与技术...
    • 2,634 篇 软件工程
    • 915 篇 信息与通信工程
    • 691 篇 控制科学与工程
    • 455 篇 电气工程
    • 454 篇 生物工程
    • 373 篇 生物医学工程(可授...
    • 367 篇 电子科学与技术(可...
    • 331 篇 机械工程
    • 264 篇 光学工程
    • 199 篇 仪器科学与技术
    • 175 篇 动力工程及工程热...
    • 166 篇 网络空间安全
    • 147 篇 化学工程与技术
    • 144 篇 安全科学与工程
  • 2,046 篇 理学
    • 1,036 篇 数学
    • 574 篇 物理学
    • 523 篇 生物学
    • 337 篇 统计学(可授理学、...
    • 264 篇 系统科学
    • 168 篇 化学
  • 1,376 篇 管理学
    • 902 篇 管理科学与工程(可...
    • 541 篇 图书情报与档案管...
    • 458 篇 工商管理
  • 425 篇 医学
    • 358 篇 临床医学
    • 290 篇 基础医学(可授医学...
    • 181 篇 公共卫生与预防医...
    • 158 篇 药学(可授医学、理...
  • 213 篇 法学
    • 179 篇 社会学
  • 155 篇 经济学
    • 153 篇 应用经济学
  • 133 篇 教育学
  • 88 篇 农学
  • 30 篇 文学
  • 24 篇 艺术学
  • 16 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 196 篇 machine learning
  • 191 篇 deep learning
  • 172 篇 software enginee...
  • 158 篇 computer science
  • 145 篇 artificial intel...
  • 133 篇 feature extracti...
  • 130 篇 accuracy
  • 122 篇 computational mo...
  • 106 篇 internet of thin...
  • 106 篇 software
  • 99 篇 training
  • 90 篇 information tech...
  • 90 篇 security
  • 88 篇 optimization
  • 84 篇 information syst...
  • 84 篇 predictive model...
  • 79 篇 data mining
  • 74 篇 support vector m...
  • 73 篇 cloud computing
  • 72 篇 testing

机构

  • 36 篇 department of so...
  • 34 篇 college of compu...
  • 34 篇 department of co...
  • 27 篇 department of in...
  • 25 篇 faculty of infor...
  • 25 篇 department of so...
  • 22 篇 school of softwa...
  • 20 篇 faculty of engin...
  • 20 篇 faculty of softw...
  • 20 篇 school of inform...
  • 19 篇 department of co...
  • 19 篇 state key labora...
  • 19 篇 department of co...
  • 19 篇 college of compu...
  • 18 篇 faculty of infor...
  • 18 篇 computer enginee...
  • 18 篇 department of in...
  • 18 篇 department of co...
  • 17 篇 school of comput...
  • 17 篇 school of comput...

作者

  • 51 篇 tao dacheng
  • 24 篇 ismail leila
  • 23 篇 el-sayed m.el-ke...
  • 23 篇 abdelwahed motwa...
  • 21 篇 pedrycz witold
  • 18 篇 abdelaziz a.abde...
  • 16 篇 hayashi eiji
  • 16 篇 choo kim-kwang r...
  • 15 篇 muhammad waseem ...
  • 15 篇 bentahar jamal
  • 15 篇 runyao duan
  • 14 篇 noraziah a.
  • 14 篇 anwer mustafa hi...
  • 14 篇 jakimi abdeslam
  • 13 篇 lee sai peck
  • 13 篇 khan arif ali
  • 13 篇 ahmed bestoun s.
  • 13 篇 ishfaq yaseen
  • 13 篇 mesfer al duhayy...
  • 12 篇 niyato dusit

语言

  • 6,245 篇 英文
  • 720 篇 其他
  • 51 篇 中文
  • 10 篇 日文
  • 5 篇 德文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 2 篇 土耳其文
  • 1 篇 西班牙文
检索条件"机构=Faculty of Computer Information Systems and Software Engineering"
7020 条 记 录,以下是1051-1060 订阅
排序:
Deep learning and ensemble methods for anomaly detection in ICS security
收藏 引用
International Journal of information Technology (Singapore) 2025年 第3期17卷 1761-1775页
作者: Hossain, Md. Alamgir Hasan, Tahmid Karovic, jr, Vincent Abdeljaber, Hikmat A. M. Haque, Md. Alimul Ahmad, Sultan Zafar, Aasim Nazeer, Jabeen Mishra, B.K. Department of Computer Science and Engineering State University of Bangladesh South Purbachal Kanchan Dhaka 1461 Bangladesh Department of Computer Science and Engineering Prime University Dhaka Bangladesh Department of Information Systems Faculty of Management Comenius Bratislava Odbojárov 10 Bratislava 25 82005 Slovakia Department of Computer Science Faculty of Information Technology Applied Science Private University Amman 11931 Jordan MEU Research Unit Middle East University Amman 11831 Lebanon Department of Computer Science Veer Kunwar Singh University Bihar Ara India Department of Computer Science College of Computer Engineering and Sciences Prince Sattam Bin Abdulaziz University Alkharj 11942 Saudi Arabia University Center for Research and Development (UCRD) Department of Computer Science and Engineering Chandigarh University Gharuan Punjab Mohali 140413 India Department of Computer Science Aligarh Muslim University U.P Aligarh 202002 India P.G. Department of Physics Veer Kunwar Singh University Bihar Ara India
This research addresses the escalating threats to industrial control systems by introducing a novel approach that combines deep learning for feature selection with a robust ensemble-based classification technique to e... 详细信息
来源: 评论
Identification of Damaged Date Palm Tree in a Farm using IoT-based Thermal Image Analysis
Identification of Damaged Date Palm Tree in a Farm using IoT...
收藏 引用
2023 IEEE International Conference on computer, information, and Telecommunication systems, CITS 2023
作者: Nadeem, Adnan Ashraf, Muhammad Mehmood, Amir Siddiqui, Muhammad Shoaib Almoamari, Hani Abbasi, Qammer H. Islamic University of Madinah Faculty of Computer and Information Systems Madinah42351 Saudi Arabia Federal Urdu University of Arts Science and Technology Department of Physics Karachi75300 Pakistan Sir Syed University of Engineering and Technology Department of Computer Science and Information Technology Karachi75300 Pakistan James Watt School of Engineering University of Glasgow Glasgow United Kingdom
The Kingdom of Saudi Arabia is one of the world's leading fresh date producers. Identifying damaged date palm trees on the farm is important for saving water and stopping the spread of pest which has caused the da... 详细信息
来源: 评论
Harmonic Resonance Analysis of Buck-Boost DC-DC Converter  11
Harmonic Resonance Analysis of Buck-Boost DC-DC Converter
收藏 引用
11th International Scientific Conference on computer Science, COMSCI 2023
作者: Stanchev, Plamen Antonov Vacheva, Gergana Ilieva Hinov, Nikolay Lyuboslavov Faculty of Computer Systems and Technologies Department of Information Technologies in Industry 8 Kliment Ohridski blvd Sofia1000 Bulgaria Technical University of Sofia Faculty of Electronic Engineering and Technologies Departement of Power Electronics 8 Kliment Ohridski blvd Sofia1000 Bulgaria
In this paper, a harmonic analysis of the buck-boost converter is implemented. A mathematical model of the DC-DC converter is presented, and the differential equations are described in the state space. MATLAB software... 详细信息
来源: 评论
Evaluation of the effects of MERCK, MODERNA, PFIZER/BioNTech, and JANSSEN COVID-19 vaccines on vaccinated people: A metadata analysis
收藏 引用
Informatics in Medicine Unlocked 2024年 49卷
作者: Al-Rousan, Nadia Al-Najjar, Hazem SEEIT Computer Engineering Department German Jordanian University Faculty of Information Systems University of Petra
Purpose: This research investigates the impact of four specific vaccines on the health of people who have been vaccinated. The vaccines under scrutiny are MERCK, MODERNA, PFIZER BioNTech, and JANSSEN. Methods: The ana... 详细信息
来源: 评论
Design and Simulation of a Network Infrastructure for a Multi-Branch Organization Using Cisco Packet Tracer  25
Design and Simulation of a Network Infrastructure for a Mult...
收藏 引用
25th International Arab Conference on information Technology, ACIT 2024
作者: Aljamal, Osama S. Aljamal, Mahmoud Alsarhan, Ayoub Aljaidi, Mohammad Okour, Saif Al-Aiash, Issa Al-Qerem, Ahmad Daoud, Essam Al Elrashidi, Ali Al Hussein Technical University Department of Computer Science Amman Jordan Irbid National University Faculty of Science and Information Technology Department of Cybersecurity Irbid21110 Jordan The Hashemite University Department of Information Technology Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan Irbid National University Department of Software Engineering Irbid Jordan Zarqa University Department of Cybersecurity Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
Designing and simulating a network infrastructure for multi-branch organizations is essential for ensuring seamless connectivity and efficient operations. This paper addresses the challenges faced by organizations in ... 详细信息
来源: 评论
A Mutation-Guided Assessment of Acceleration Approaches for Continuous Integration: An Empirical Study of YourBase
A Mutation-Guided Assessment of Acceleration Approaches for ...
收藏 引用
International Mining software Repositories, MSR
作者: Zhili Zeng Tao Xiao Maxime Lamothe Hideaki Hata Shane McIntosh Software REBELs University of Waterloo Canada Division of Information Science Nara Institute of Science and Technology Japan Department of Computer Engineering and Software Engineering Polytechnique Montréal Canada Faculty of Engineering Shinshu University Japan
Continuous Integration (CI) is a popular software development practice that quickly verifies updates to codebases. To cope with the ever-increasing demand for faster software releases, CI acceleration approaches have ... 详细信息
来源: 评论
Influence of Structural Units on Vulnerability of systems with Distinct Protection Approaches
Influence of Structural Units on Vulnerability of Systems wi...
收藏 引用
Euromicro Symposium on Digital System Design
作者: Ján Mach Lukáš Kohútka Pavel Čičak Institute of Computer Engineering and Applied Informatics Slovak University of Technology Bratislava Slovakia Institute of Informatics Information Systems and Software Engineering Slovak University of Technology Bratislava Slovakia
Mission/safety-critical applications rely on the dependability of their semiconductor control systems. The lockstepping is state-of-the-art when it comes to their protection. This paper compares the dual/triple lockst... 详细信息
来源: 评论
PD-Refiner: An Underlying Surface Inheritance Refiner with Adaptive Edge-Aware Supervision for Point Cloud Denoising  24
PD-Refiner: An Underlying Surface Inheritance Refiner with A...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zhang, Chengwei Zhang, Xueyi Yue, Xianghu Lao, Mingrui Jiang, Tao Wang, Jiawei Zhang, Fubo Chen, Longyong National Key Laboratory of Microwave Imaging Aerospace Information Research Institute Chinese Academy of Sciences Beijing China Laboratory for Big Data and Decision National University of Defense Technology Hunan Changsha China Department of Electrical and Computer and Engineering National University of Singapore Singapore Singapore National Key Laboratory of Information Systems Engineering National University of Defense Technology Hunan Changsha China School of Software Engineering Tongji University Shanghai China
Point clouds from real-world scenarios inevitably contain complex noise, significantly impairing the accuracy of downstream tasks. To tackle this challenge, cascading encoder-decoder architecture has become a conventi... 详细信息
来源: 评论
Lockstep Vs Microarchitecture: A Comparison
Lockstep Vs Microarchitecture: A Comparison
收藏 引用
IEEE International SOC Conference
作者: Ján Mach Lukáš Kohútka Pavel Čičák Institute of Computer Engineering and Applied Informatics Slovak University of Technology Bratislava Slovakia Institute of Informatics Information Systems and Software Engineering Slovak University of Technology Bratislava Slovakia
Safety/mission-critical applications require high dependability of the control systems. Their state-of-the-art protection approach is a system-level lockstep. This paper compares the system-level dual and triple locks... 详细信息
来源: 评论
Success Factors of Requirement Elicitation in the Field of software engineering
Success Factors of Requirement Elicitation in the Field of S...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: Buddhima Attanayaka Dasuni Nawinna Kalpani Manathunga Pradeep K.W. Abeygunawardhana Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka Department of Computer Systems & Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka
Requirement elicitation (RE) is a cognitively challenging and time-consuming task in software development due to the numerous challenges associated with it including conflicting requirements, unspoken, or assumed requ... 详细信息
来源: 评论