咨询与建议

限定检索结果

文献类型

  • 1,806 篇 会议
  • 1,133 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 2,997 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,889 篇 工学
    • 1,490 篇 计算机科学与技术...
    • 1,260 篇 软件工程
    • 348 篇 信息与通信工程
    • 289 篇 控制科学与工程
    • 217 篇 生物工程
    • 162 篇 电气工程
    • 159 篇 生物医学工程(可授...
    • 147 篇 机械工程
    • 119 篇 电子科学与技术(可...
    • 118 篇 光学工程
    • 71 篇 化学工程与技术
    • 69 篇 安全科学与工程
    • 68 篇 交通运输工程
    • 66 篇 仪器科学与技术
    • 58 篇 动力工程及工程热...
  • 897 篇 理学
    • 492 篇 数学
    • 241 篇 生物学
    • 230 篇 物理学
    • 153 篇 统计学(可授理学、...
    • 128 篇 系统科学
    • 66 篇 化学
  • 602 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 253 篇 图书情报与档案管...
    • 175 篇 工商管理
  • 170 篇 医学
    • 138 篇 临床医学
    • 118 篇 基础医学(可授医学...
    • 74 篇 公共卫生与预防医...
    • 69 篇 药学(可授医学、理...
  • 96 篇 法学
    • 77 篇 社会学
  • 65 篇 经济学
    • 65 篇 应用经济学
  • 50 篇 教育学
  • 34 篇 农学
  • 18 篇 文学
  • 9 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 78 篇 machine learning
  • 76 篇 deep learning
  • 63 篇 artificial intel...
  • 59 篇 software
  • 55 篇 computational mo...
  • 55 篇 accuracy
  • 50 篇 feature extracti...
  • 48 篇 training
  • 45 篇 semantics
  • 44 篇 predictive model...
  • 43 篇 information tech...
  • 41 篇 optimization
  • 39 篇 data mining
  • 37 篇 internet of thin...
  • 36 篇 support vector m...
  • 35 篇 security
  • 34 篇 software testing
  • 31 篇 software systems

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 school of comput...
  • 23 篇 state key labora...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 15 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 herawan tutut
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 muhammad waseem ...
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 12 篇 ahmed bestoun s.
  • 12 篇 belikov juri
  • 12 篇 suhaimi ibrahim

语言

  • 2,823 篇 英文
  • 149 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Science and Software Engineering"
2997 条 记 录,以下是711-720 订阅
排序:
A Blockchain-Based Distributed Collaborative Sensing and Spectrum Access Approach for Consumer Electronics
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Peng, Yuhuai Li, Yuan Guo, Yu Zhang, Dawei Khan, Fazlullah Alturki, Ryan Alshawi, Bandar Northeastern University College of Computer Science and Engineering Shenyang110819 China Zhiyuan Research Institute Xihu District Hangzhou China Zhengzhou University School of Computer and Artificial Intelligence Henan Zhengzhou450001 China University of Nottingham Ningbo China School of Computer Science Faculty of Science and Engineering Zhejiang Ningbo315104 China KKR and KSR Institute of Technology and Sciences Department of Computer Science and Engineering Andhra Pradesh Guntur India Division of Research and Development Lovely Professional University Phagwara India University Centre of Research and Development Chandigarh University Mohali India Umm Al-Qura University Department of Software Engineering College of Computing Makkah Saudi Arabia Umm Al-Qura University College of Computing Department of Computer and Network Engineering Makkah Saudi Arabia
Cognitive radio (CR) provides key technical support for the seamless communication of consumer electronic (CE) devices through distributed cooperative sensing and spectrum access. However, its openness and dynamic nat... 详细信息
来源: 评论
The Reliability of Information Sources: Student Perceptions and Educational Opportunities
The Reliability of Information Sources: Student Perceptions ...
收藏 引用
International IEEE Conference and Workshop: Óbuda on Electrical and Power engineering (CANDO-EPE)
作者: Anita Mihalovicsne Kollar Jozsef Katona Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary Institute of Electronics and Communication Systems Kandó Kálmán Faculty of Electrical Engineering Obuda University Budapest Hungary GAMF Faculty of Engineering and Computer Science John Von Neumann University Kecskemet Hungary Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Business University Budapest Hungary
The modern digital age demands the skills to be able to assess information. In the current world, access to information and knowledge is abundant from different sources. Indeed, high-quality data are much needed in ed... 详细信息
来源: 评论
Neural Networks and Deep Learning: Innovations and Applications in Soft Computing
Neural Networks and Deep Learning: Innovations and Applicati...
收藏 引用
International Conference on Contemporary Computing and Informatics (IC3I)
作者: Jahagirdar Imran Abdulkadar Chinnem Rama Mohan P. Vijaya Bharati Shamik Palit Gunda Srinivasa Rao Pankaj Mudholkar Computer Application Savitribai Phule Pune University Department of Computer Science and Engineering Narayana Engineering College Nellore Andhra Pradesh India Department of CSE Vignans Institute of Engineering for Women Visakhapatnam Andhra Pradesh India Department of Computing Science and Software Engineering University of Stirling RAK Campus UAE School of Management and Commerce Mallareddy University Kompally Faculty of Computer Applications Marwadi University Rajkot Gujarat India
The Paper explores different aspects of deep learning techniques and neural networks in the fields of healthcare, time-series forecasting, agriculture, and other relevant sectors through soft computing. The objective ... 详细信息
来源: 评论
Providing and evaluating a model for big data anonymization streams by using in-memory processing
收藏 引用
Knowledge and Information Systems 2025年
作者: Shamsinejad, Elham Banirostam, Hamid BaniRostam, Touraj Pedram, Mir Mohsen Rahmani, Amir Masoud Computer Engineering (Software) Specializing in Data Science Tehran Iran Master of Data Analytics University of Niagara Falls Niagara Falls ON Canada Electrical and Computer Engineering Department Faculty of Engineering Kharazmi University Tehran Iran Future Technology Research Center National Yunlin University of Science and Technology Yunlin Taiwan
Extracting valuable information from vast sources of social networks while protecting confidentiality and preventing data disclosure is a significant challenge in big data environments. Traditional anonymization metho... 详细信息
来源: 评论
Utilizing Gyroscope and Accelerometer for Self-Managed Crystal Methamphetamine Recovery and Private Monitoring
Utilizing Gyroscope and Accelerometer for Self-Managed Cryst...
收藏 引用
Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), International
作者: Ali Ahmed Omar Amr Ayman Atia Software Engineering Department October University for Modern Sciences and Arts (MSA) Cairo Egypt HCI-LAB Faculty of Computers and Artificial Intelligence Faculty of Computer Science Helwan University October University for Modern Sciences and Arts (MSA) Giza Egypt
Recovery from substance abuse is a continuous struggle as almost 60% of the addicts at any given instance in time during the recovery process experiences a relapse. The situation worsens during withdrawal, where the p... 详细信息
来源: 评论
Segmentation and Classification of Stomach Abnormalities Using Deep Learning
收藏 引用
computers, Materials & Continua 2021年 第10期69卷 607-625页
作者: Javeria Naz Muhammad Attique Khan Majed Alhaisoni Oh-Young Song Usman Tariq Seifedine Kadry Department of Computer Science HITEC University TaxilaTaxilaPakistanl 2College of Computer Science and EngineeringUniversity of Ha’ilHa’ilSaudi Arabial 3Department of SoftwareSejong UniversitySeoulKoreaGwangjin-guKoreal 4College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-KhrajSaudi Arabial 5Faculty of Applied Computing and TechnologyNoroff University CollegeKristiansandNorway
An automated system is proposed for the detection and classification of GI *** proposed method operates under two pipeline procedures:(a)segmentation of the bleeding infection region and(b)classification of GI abnorma... 详细信息
来源: 评论
Tensor-Based Factorial Hidden Markov Model for Cyber-Physical-Social Services
收藏 引用
IEEE Transactions on Services Computing 2025年 第3期18卷 1825-1837页
作者: Lu, Zhixing Yang, Laurence T. Azman, Azreen Zhang, Shunli Zhou, Fang Hainan University School of Computer Science and Technology Hainan China Universiti Putra Malaysia Faculty of Computer Science and Information Technology Serdang Malaysia Zhengzhou University School of Computer and Artificial Intelligence School of Software Engineering Zhengzhou China Huazhong University of Science and Technology School of Computer Science and Technology Huazhong China St. Francis Xavier University Department of Computer Science Canada
With the rapid development and widespread application of information, computer, and communication technologies, Cyber-Physical-Social Systems (CPSS) have gained increasing importance and attention. To enable intellige... 详细信息
来源: 评论
Dynamic knowledge graph completion through time-aware relational message passing
Dynamic knowledge graph completion through time-aware relati...
收藏 引用
International CSI computer Conference, CSICC
作者: Amirhossein Baqinejadqazvini Saedeh Tahery Saeed Farzi Department of Software Engineering Faculty of Computer Engineering K. N. Toosi University of Technology Tehran Iran Department of Artificial Intelligence Faculty of Computer Engineering K. N. Toosi University of Technology Tehran Iran School of Computer Science Institute for Research in Fundamental Sciences (IPM) Tehran Iran
As the structure of knowledge graphs may vary over time, static knowledge graph completion methods do not deal with time-varying knowledge graphs. However, examining the paths between entities and entities' contex... 详细信息
来源: 评论
Partially Hidden Policy Attribute-Based Multi-Keyword Searchable Encryption with Verification and Revocation
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Chen, Liqing Xu, Shiguo Jin, Chunhua Zhang, Hao Weng, Jian Huaiyin Institute of Technology Faculty of Computer and Software Engineering Jiangsu Huai'an223003 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Jinan University College of Information Science and Technology Guangdong Guangzhou510632 China
Data security is becoming increasingly critical as outsourced data services flourish. An effective solution for ensuring data confidentiality in the cloud is attribute-based searchable encryption (ABSE). However, most... 详细信息
来源: 评论
Identification of the Diabetic Retinopathy Using ResNet-18
Identification of the Diabetic Retinopathy Using ResNet-18
收藏 引用
Cyber Resilience (ICCR), International Conference on
作者: Fahad Ahmed Areej Fatima Muhammed Mamoon Shan Khan Department of Computer Science National College of Business Administration economics Lahore Pakistan Department of Computer Science Lahore Garrison University Lahore Pakistan Department of Software Engineering Islamia University Bhawalpur Bahawalpur Pakistan FOIT(Faculty of Information Technology) University of Central Punjab Lahore Pakistan
In the realm of healthcare, trauma, aging, and diseases like diabetes can cause a variety of abnormalities in human eyes. Diabetic retinopathy stands out as a prevalent global cause of blindness. Early identification ... 详细信息
来源: 评论