咨询与建议

限定检索结果

文献类型

  • 1,801 篇 会议
  • 1,115 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 2,974 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,868 篇 工学
    • 1,477 篇 计算机科学与技术...
    • 1,251 篇 软件工程
    • 343 篇 信息与通信工程
    • 280 篇 控制科学与工程
    • 216 篇 生物工程
    • 159 篇 生物医学工程(可授...
    • 155 篇 电气工程
    • 143 篇 机械工程
    • 116 篇 光学工程
    • 116 篇 电子科学与技术(可...
    • 69 篇 化学工程与技术
    • 69 篇 安全科学与工程
    • 67 篇 交通运输工程
    • 66 篇 仪器科学与技术
    • 56 篇 动力工程及工程热...
  • 887 篇 理学
    • 489 篇 数学
    • 240 篇 生物学
    • 225 篇 物理学
    • 153 篇 统计学(可授理学、...
    • 127 篇 系统科学
    • 66 篇 化学
  • 596 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 174 篇 工商管理
  • 169 篇 医学
    • 137 篇 临床医学
    • 117 篇 基础医学(可授医学...
    • 73 篇 公共卫生与预防医...
    • 69 篇 药学(可授医学、理...
  • 93 篇 法学
    • 75 篇 社会学
  • 66 篇 经济学
    • 66 篇 应用经济学
  • 48 篇 教育学
  • 34 篇 农学
  • 18 篇 文学
  • 9 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 109 篇 software enginee...
  • 102 篇 computer science
  • 78 篇 machine learning
  • 72 篇 deep learning
  • 63 篇 artificial intel...
  • 59 篇 software
  • 54 篇 computational mo...
  • 54 篇 accuracy
  • 49 篇 feature extracti...
  • 47 篇 training
  • 45 篇 semantics
  • 43 篇 predictive model...
  • 42 篇 information tech...
  • 40 篇 optimization
  • 39 篇 data mining
  • 37 篇 internet of thin...
  • 35 篇 support vector m...
  • 35 篇 security
  • 34 篇 software testing
  • 31 篇 software systems

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 school of comput...
  • 23 篇 state key labora...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 15 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 herawan tutut
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 muhammad waseem ...
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 12 篇 ahmed bestoun s.
  • 12 篇 belikov juri
  • 12 篇 suhaimi ibrahim

语言

  • 2,856 篇 英文
  • 93 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Science and Software Engineering"
2974 条 记 录,以下是251-260 订阅
排序:
Fine-Tuning GPT-4o-Mini for Programming Questions Generation
Fine-Tuning GPT-4o-Mini for Programming Questions Generation
收藏 引用
International Conference on computer and Applications (ICCA)
作者: Alaa Hesham Abeer Hamdy Department of Software Engineering Faculty of Informatics and Computer Science The British University in Egypt Cairo Egypt
Creating programming questions that are both meaningful and educationally relevant is a critical task in computer science education. This paper introduces a fine-tuned GPT4o-mini model (C2Q). It is designed to generat... 详细信息
来源: 评论
A Pairwise Surrogate Model using GNN for Evolutionary Optimization
A Pairwise Surrogate Model using GNN for Evolutionary Optimi...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Gharavian, Vida Rahnamayan, Shahryar Bidgoli, Azam Asilian Makrehchi, Masoud Department of Electrical Computer and Software Engineering Ontario Tech University OshawaON Canada Department of Engineering Brock University St. CatharinesON Canada Faculty of Science Wilfrid Laurier University WaterlooON Canada Lab
Optimization problems widely arise in various science and engineering fields and can be computationally expensive in many real-world applications. Evaluation of the fitness function to assess a candidate solution is t...
来源: 评论
Using Machine Learning to Enhance Personalization in E-Learning
Using Machine Learning to Enhance Personalization in E-Learn...
收藏 引用
2025 International Conference on Pervasive Computational Technologies, ICPCT 2025
作者: Palimkar, Sneha S. Kunnathully, Kannan Thota, Srinivasarao Joshi, Meeta Imran Akkalkot, Afsha Al Said, Nidal Coep Technological University Computer Engineering and Technology Maharashtra Pune India Veltech School of Law India Capital One Software Engineering VA United States Marwadi University Faculty of Management Studies India Pune Technological University Computer Science Engineering College of Engineering Maharashtra Pune India Ajman University College of Mass Communication Ajman United Arab Emirates
Numerous diverse learning materials can be found on e-learning sites. Students in today's e-learning platforms invest a lot of time and energy in locating pertinent learning materials. The student's actual req... 详细信息
来源: 评论
Water Quality Monitoring System for Nile Tilapia Farming Using LoRa Technology
Water Quality Monitoring System for Nile Tilapia Farming Usi...
收藏 引用
International Conference on Information Technology (INCIT)
作者: Nawara Chansiri Ponglert Sangkaphet Buppawan Chaleamwong Chaivichit Kaewklom Supawee Makdee Department of Software Engineering Faculty of Computer Science Ubon Ratchathani Rajabhat University Ubon Thailand Department of Computer Science Faculty of Computer Science Ubon Ratchathani Rajabhat University Ubon Thailand
Fish farmers operating at Sirindhorn Dam in Ubon Ratchathani have faced significant challenges, including high mortality rates attributable to unstable weather conditions that compromise water quality. To tackle these... 详细信息
来源: 评论
Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 6061-6077页
作者: Muhammad Akram Muhammad Waseem Iqbal Syed Ashraf Ali Muhammad Usman Ashraf Khalid Alsubhi Hani Moaiteq Aljahdali Department of Computer Science Superior University Lahore54000Pakistan Department of Software Engineering Superior University Lahore54000Pakistan Department of Computer Science The Institute of Management Sciences(PAK-AIMS)Lahore54000Pakistan Department of Computer Science GC Women University SialkotPakistan Department of Computer Science King Abdulaziz UniversityJeddahSaudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia
In cipher algorithms,the encryption and decryption are based on the same *** are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwis... 详细信息
来源: 评论
EdgeAuth: An intelligent token-based collaborative authentication scheme
EdgeAuth: An intelligent token-based collaborative authentic...
收藏 引用
作者: Jiang, Xutong Dou, Ruihan He, Qiang Zhang, Xuyun Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Faculty of Mathematics University of Waterloo Waterloo Canada Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia Department of Computing Macquarie University Sydney Australia College of Big Data and Intelligent Engineering Southwest Forestry University China
Edge computing is regarded as an extension of cloud computing that brings computing and storage resources to the network edge. For some Industrial Internet of Things (IIoT) applications such as supply-chain supervisio... 详细信息
来源: 评论
Technology acceptance model (TAM) for mobile durian plantation apps(Pro Durian);The analysis for Malaysian farmers  5
Technology acceptance model (TAM) for mobile durian plantati...
收藏 引用
5th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2023
作者: Kamarudin, Noraziahtulhidayu Yusoff, Aiman Basari, Abd Samad Hasan Safar, Noor Zuraidin Bin Mohd Hussin, Mohd Hatta Universiti Tun Hussein Onn Multimedia and Signal Processing Focus Group Faculty of Computer Science and Information Department of Multimedia Malaysia Universiti Tun Hussein Onn Faculty of Computer Science and Information Department of Multimedia Malaysia Universiti Tun Hussein Onn Faculty of Computer Science and Information Technology Department of Software Engineering Malaysia Universiti Tun Hussein Onn Faculty of Computer Science and Information Department of Information Security and Web Technology Malaysia Pertubuhan Peladang Senggarang Johor Darul Takzim Malaysia
During the application development process, it is important for a developer to analyze user requirements. This is crucial to the success of interactive systems and is an essential component of the design of informatio... 详细信息
来源: 评论
An Intelligent Thyroid Diagnosis System Utilizing Multiple Ensemble and Explainable Algorithms with Medical Supported Attributes
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2840-2855页
作者: Sutradhar, Ananda Al Rafi, Mustahsin Ghosh, Pronab Shamrat, F M Javed Mehedi Moniruzzaman, Md. Ahmed, Kawsar Azad, A.K.M. Bui, Francis M. Chen, Li Moni, Mohammad Ali Daffodil International University Department of Computer Science and Engineering Dhaka1216 Bangladesh Lakehead University Department of Computer Science Thunder BayONP7B 5E1 Canada University of Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia Lakehead University Department of Software Engineering Thunder BayONP7B 5E1 Canada University of Saskatchewan Department of Electrical and Computer Engineering SaskatoonSK S7N 5A9 Canada Imam Mohammad Ibn Saud Islamic University Faculty of Science Department of Mathematics and Statistics Riyadh13318 Saudi Arabia Charles Stuart University AI and Cyber Futures Institute BathurstNSW2795 Australia
The widespread impact of thyroid disease and its diagnosis is a challenging task for healthcare experts. The conventional technique for predicting such a vital disease is complex and time-consuming. A data-driven appr... 详细信息
来源: 评论
A Fused Machine Learning Approach for Intrusion Detection System
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2607-2623页
作者: Muhammad Sajid Farooq Sagheer Abbas Atta-ur-Rahman Kiran Sultan Muhammad Adnan Khan Amir Mosavi School of Computer Science National College of Business Administration and EconomicsLahore54000Pakistan Department of Computer Science College of Computer Science and Information TechnologyImam Abdulrahman Bin Faisal UniversityP.O.Box 1982Dammam 31441Saudi Arabia Department of CIT The Applied CollegeKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Software Gachon UniversitySeongnam13120Korea John von Neumann Faculty of Informatics Obuda UniversityBudapest1034Hungary Institute of Information Engineering Automation and MathematicsSlovak University of Technology in BratislavaBratislava81107Slovakia Faculty of Civil Engineering TU-DresdenDresden01062Germany
The rapid growth in data generation and increased use of computer network devices has amplified the infrastructures of *** interconnectivity of networks has brought various complexities in maintaining network availabi... 详细信息
来源: 评论
An Overview of the Approaches for Generating Test Data in the Context of the Quality Assurance of Big Data Applications  17
An Overview of the Approaches for Generating Test Data in th...
收藏 引用
17th International Conference on Signal-Image Technology and Internet-Based Systems, SITIS 2023
作者: Staegemann, Daniel Pohl, Matthias Haertel, Christian Daase, Christian Abdallah, Mohammad Turowski, Klaus Otto-von-Guericke University Faculty of Computer Science Magdeburg Research and Competence Cluster Vlba Magdeburg Germany Al-Zaytoonah University of Jordan Department of Software Engineering Amman Jordan
With society's increasing data production and the corresponding demand for systems that are capable of utilizing them, the big data domain has gained significant importance. However, besides the systems' actua... 详细信息
来源: 评论