咨询与建议

限定检索结果

文献类型

  • 1,806 篇 会议
  • 1,133 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 2,997 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,889 篇 工学
    • 1,490 篇 计算机科学与技术...
    • 1,260 篇 软件工程
    • 348 篇 信息与通信工程
    • 289 篇 控制科学与工程
    • 217 篇 生物工程
    • 162 篇 电气工程
    • 159 篇 生物医学工程(可授...
    • 147 篇 机械工程
    • 119 篇 电子科学与技术(可...
    • 118 篇 光学工程
    • 71 篇 化学工程与技术
    • 69 篇 安全科学与工程
    • 68 篇 交通运输工程
    • 66 篇 仪器科学与技术
    • 58 篇 动力工程及工程热...
  • 897 篇 理学
    • 492 篇 数学
    • 241 篇 生物学
    • 230 篇 物理学
    • 153 篇 统计学(可授理学、...
    • 128 篇 系统科学
    • 66 篇 化学
  • 602 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 253 篇 图书情报与档案管...
    • 175 篇 工商管理
  • 170 篇 医学
    • 138 篇 临床医学
    • 118 篇 基础医学(可授医学...
    • 74 篇 公共卫生与预防医...
    • 69 篇 药学(可授医学、理...
  • 96 篇 法学
    • 77 篇 社会学
  • 65 篇 经济学
    • 65 篇 应用经济学
  • 50 篇 教育学
  • 34 篇 农学
  • 18 篇 文学
  • 9 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 78 篇 machine learning
  • 76 篇 deep learning
  • 63 篇 artificial intel...
  • 59 篇 software
  • 55 篇 computational mo...
  • 55 篇 accuracy
  • 50 篇 feature extracti...
  • 48 篇 training
  • 45 篇 semantics
  • 44 篇 predictive model...
  • 43 篇 information tech...
  • 41 篇 optimization
  • 39 篇 data mining
  • 37 篇 internet of thin...
  • 36 篇 support vector m...
  • 35 篇 security
  • 34 篇 software testing
  • 31 篇 software systems

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 school of comput...
  • 23 篇 state key labora...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 15 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 herawan tutut
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 muhammad waseem ...
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 12 篇 ahmed bestoun s.
  • 12 篇 belikov juri
  • 12 篇 suhaimi ibrahim

语言

  • 2,823 篇 英文
  • 149 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Science and Software Engineering"
2997 条 记 录,以下是571-580 订阅
排序:
Optimizing Gammatone Cepstral Coefficients for Gear Fault Detection
收藏 引用
IEEE Access 2025年 13卷 101711-101720页
作者: Zrar Kh Abdul Abdulbasit K. Al-Talabani Wisam Hazim Gwad Entisar Alkayal Halgurd S. Maghdid Safar Maghdid Asaad Computer Department College of Science Charmo University Sulaymaniyah Iraq Department of Software Engineering Faculty of Engineering Koya University Koya Iraq Department of Artificial Intelligence Engineering College of Engineering Alnoor University Ninavah Iraq Information Technology Department Faculty of Computing and Information Technology-Rabigh King Abdulaziz University Jeddah Saudi Arabia Department of Engineering Research Center Deanship of Research and Development Centers Koya University Erbil Governorate Iraq Department of Computer Engineering College of Engineering Knowledge University Erbil Iraq
Cepstral features, such as Gammatone Cepstral Coefficients (GTCC), have recently been applied in fault detection and diagnosis. However, GTCC was originally designed for speech feature extraction rather than fault det... 详细信息
来源: 评论
Towards a Deep Learning Pain-Level Detection Deployment at UAE for Patient-Centric-Pain Management and Diagnosis Support: Framework and Performance Evaluation  14
Towards a Deep Learning Pain-Level Detection Deployment at U...
收藏 引用
14th International Conference on Ambient Systems, Networks and Technologies Networks, ANT 2023 and The 6th International Conference on Emerging Data and Industry 4.0, EDI40 2023
作者: Ismail, Leila Waseem, Muhammad Danish Lab School of Computing and Information Systems Faculty of Engineering and Information Technology The University of Melbourne Australia Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University United Arab Emirates National Water and Energy Center United Arab Emirates University United Arab Emirates
The outbreak of the COVID-19 pandemic revealed the criticality of timely intervention in a situation exacerbated by a shortage in medical staff and equipment. Pain-level screening is the initial step toward identifyin... 详细信息
来源: 评论
A Novel Trust Assessment System for Online Social Networking Environment Using Learning Assisted Classification Model
A Novel Trust Assessment System for Online Social Networking...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Nithya, S. Deepa, D. Babu, Vunnava Dinesh Pallavi, G. Fawareh, Hamed Kayalvizhy, R.D. Saveetha Engineering College Department of Computer Science Engineering Chennai India St. Joseph's College of Engineering Department of Cse Chennai India Rv Institute of Technology Department of Cse Guntur India Laxminarayan Innovation Technological University Department of Civil Engineering Nagpur India Zarqa University Faculty of Information Technology Software Engineering Dept Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia R.M.K. Engineering College Department of Electronics and Communication Engineering Tamil Nadu Kavaraipettai India
Trust is essential in the constantly developing environment of online social networks. The Nexus Terroism Impact and Intro Trust facilitate the communication, decision-making, and maintenance of digital communities am... 详细信息
来源: 评论
Preliminary Exploration on Node-To-Node Fault Tolerance Coordination in Distributed System
Preliminary Exploration on Node-To-Node Fault Tolerance Coor...
收藏 引用
Computing (ICOCO), IEEE International Conference on
作者: Muntadher Saadoon Siti Hafizah Ab. Hamid Hazrina Sofian Hamza Altarturi Nur Nasuha Zati Hakim Azizul Haqi Khalid Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia Department of Computer System and Technology Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia Department of Artificial Intelligence Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia Department of Computer and Communication Faculty of Engineering Universiti Putra Malaysia Selangor Malaysia
Internet of Things, edge computing devices, the widespread use of artificial intelligence and machine learning applications, and the extensive adoption of cloud computing pose significant challenges to maintaining fau...
来源: 评论
Heuristic Search for Nonlinear Substitutions for Cryptographic Applications
Lecture Notes on Data Engineering and Communications Technol...
收藏 引用
Lecture Notes on Data engineering and Communications Technologies 2023年 180卷 288-298页
作者: Kuznetsov, Oleksandr Frontoni, Emanuele Kandiy, Sergey Smirnov, Oleksii Ulianovska, Yuliia Kobylianska, Olena Department of Political Sciences Communication and International Relations University of Macerata Via Crescimbeni 30/32 Macerata62100 Italy Department of Information and Communication Systems Security Faculty of Comupter Science V. N. Karazin Kharkiv National University 4 Svobody Sq Kharkiv61022 Ukraine Department of Information Engineering Marche Polytechnic University Via Brecce Bianche 12 Ancona60131 Italy Cybersecurity & Software Academic Department Central Ukrainian National Technical University 8 University Avenue Kropyvnytskyi25006 Ukraine Department of Computer Science and Software Engineering University of Customs and Finance Vernadskogo Street 2/4 Dnipro49000 Ukraine
Heuristic algorithms are used to solve complex computational problems quickly in various computer applications. Such algorithms use heuristic functions that rank the search alternatives instead of a full enumeration o... 详细信息
来源: 评论
The Correlation Between Architecture Smells, Package Stability and Reusability: A Case Study
The Correlation Between Architecture Smells, Package Stabili...
收藏 引用
sciences and Techniques of Automatic Control and computer engineering MI-STA, IEEE International Maghreb Meeting of the Conference on
作者: Mrwan BenIdris Ehab A. Omar Elfallah Marwa Aslam Cheema Mohammed Salah Addin Alsma Tareq Ziad Kadiki Abdelfattah Elbarsha Dep. of Computer Science Faculty of Information Technology University of Benghazi Dept. of Software Engineering Faculty of Information Technology Libyan International Medical University Health Informatics Department Faculty of Public Health University of Benghazi
the design decisions made in the architecture of a software system are essential to its maintainability, and thus its quality is of great importance. Architecture smells (ASs) can be used to identify any quality issue... 详细信息
来源: 评论
Construction of PCOS Prediction Model Based on BP Neural Network
Construction of PCOS Prediction Model Based on BP Neural Net...
收藏 引用
Mobile Computing and Sustainable Informatics (ICMCSI), International Conference on
作者: Xianqing Hu Amit Yadav Asif Khan Abhishek Pratap Sah Sami Azam School of Computer and Software Chengdu Neusoft University Chengdu China Faculty of Science and Technology Charles Darwin University NT Australia Department of Computer Application Integral University Lucknow India School of Management Science and Engineering University of Electronic Science and Technology of China Chengdu China
Polycystic ovary syndrome (PCOS), a common endocrine-metabolic disorder affecting about 10-13% of women during reproductive age worldwide, often leads to irregular menstruation, infertility, obesity, and long-term hea... 详细信息
来源: 评论
Message from Program Committee
ICCQ 2022 - Proceedings of the 2nd International Conference ...
收藏 引用
ICCQ 2022 - Proceedings of the 2nd International Conference on Code Quality 2022年 2022-January卷 9-9页
作者: Succi, Giancarlo Program Committee Faculty of Computer Science and Software Engineering Innopolis University Russi Italy
来源: 评论
Expert Phishing Detection System
Expert Phishing Detection System
收藏 引用
2024 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology, IAICT 2024
作者: Alsarhan, Ayoub Al-Aiash, Issa Al-Fraihat, Dimah Aljaidi, Mohammad Abu Laila, Dena Abd Al Hakem Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Cybersecurity Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman11622 Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa13110 Jordan Department of Cyber Security Faculty of Information Technology Zarqa Technical Intermediate College Zarqa Jordan
Phishing attacks are a threat that continuously emphasizes the need for effective detection methods. This paper presents a machine learning detection method that employs a random forest classifier, which is an adaptab... 详细信息
来源: 评论
Through the Sci-Fi Lens: Exploring Social Media's Influence on Body Image and Bullying Among Adolescents in Boarding Schools  21
Through the Sci-Fi Lens: Exploring Social Media's Influence ...
收藏 引用
21st International Learning and Technology Conference, L and T 2024
作者: Mustapha, Jawahir Che Ghazali, Muhammad Azmin Mohamed Abdullah, Munaisyah Sulaiman, Nor Intan Saniah Rahman, Hezlin Aryani Abd Universiti Kuala Lumpur Malaysian Institute of Information Technology Informatics & Analytics Section Kuala Lumpur Malaysia Universiti Kuala Lumpur Malaysian Institute of Information Technology Computer Engineering Tech. Section Kuala Lumpur Malaysia Universiti Kuala Lumpur Malaysian Institute of Information Technology Software Engineering Section Kuala Lumpur Malaysia Universiti Utara Malaysia College of Arts and Science School of Quantitative Sciences Kedah Malaysia Universiti Teknologi Mara Centre of Statistical and Decision Science Studies Faculty of Computer and Mathematical Sciences Selangor Malaysia
This research investigates the complex relationships between social media, body image, and bullying among adolescent boarding school students, with an emphasis on the Malaysian context. Utilizing science fiction as a ... 详细信息
来源: 评论