咨询与建议

限定检索结果

文献类型

  • 741 篇 会议
  • 334 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 1,093 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 662 篇 工学
    • 520 篇 计算机科学与技术...
    • 433 篇 软件工程
    • 118 篇 信息与通信工程
    • 99 篇 控制科学与工程
    • 67 篇 生物医学工程(可授...
    • 67 篇 生物工程
    • 55 篇 电气工程
    • 45 篇 电子科学与技术(可...
    • 40 篇 机械工程
    • 36 篇 光学工程
    • 27 篇 仪器科学与技术
    • 27 篇 安全科学与工程
    • 23 篇 动力工程及工程热...
    • 21 篇 化学工程与技术
    • 21 篇 网络空间安全
    • 18 篇 建筑学
    • 18 篇 土木工程
  • 300 篇 理学
    • 156 篇 数学
    • 83 篇 物理学
    • 83 篇 生物学
    • 49 篇 统计学(可授理学、...
    • 44 篇 系统科学
  • 215 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 87 篇 图书情报与档案管...
    • 73 篇 工商管理
  • 55 篇 医学
    • 50 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 28 篇 药学(可授医学、理...
  • 30 篇 法学
    • 23 篇 社会学
  • 19 篇 经济学
    • 19 篇 应用经济学
  • 14 篇 教育学
  • 12 篇 农学
  • 4 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 哲学

主题

  • 43 篇 software enginee...
  • 25 篇 deep learning
  • 25 篇 computers
  • 22 篇 machine learning
  • 21 篇 feature extracti...
  • 21 篇 artificial intel...
  • 20 篇 computer science
  • 20 篇 data mining
  • 20 篇 accuracy
  • 19 篇 computational mo...
  • 19 篇 software
  • 18 篇 software testing
  • 17 篇 optimization
  • 16 篇 testing
  • 16 篇 mathematical mod...
  • 14 篇 monitoring
  • 14 篇 servers
  • 14 篇 algorithm design...
  • 14 篇 heuristic algori...
  • 13 篇 software systems

机构

  • 14 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 12 篇 department of so...
  • 12 篇 faculty of compu...
  • 12 篇 faculty of compu...
  • 11 篇 faculty of softw...
  • 11 篇 department of so...
  • 11 篇 faculty of compu...
  • 11 篇 universiti malay...
  • 10 篇 state key labora...
  • 9 篇 faculty of compu...
  • 9 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 department of so...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 faculty of compu...
  • 8 篇 faculty of compu...

作者

  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 17 篇 jasni mohamad za...
  • 17 篇 herawan tutut
  • 14 篇 noraziah a.
  • 13 篇 ahmed bestoun s.
  • 13 篇 zain jasni moham...
  • 12 篇 a. noraziah
  • 12 篇 selamat ali
  • 12 篇 kamal z. zamli
  • 11 篇 ahmad noraziah
  • 11 篇 mazlina abdul ma...
  • 9 篇 sarun intakosum
  • 9 篇 abdul majid mazl...
  • 9 篇 romli awanis
  • 9 篇 sidek roslina mo...
  • 9 篇 siau-chuin liew
  • 9 篇 suhaimi ibrahim
  • 8 篇 tutut herawan
  • 8 篇 din fakhrud

语言

  • 1,058 篇 英文
  • 27 篇 其他
  • 6 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Systems and Software Engineering"
1093 条 记 录,以下是31-40 订阅
排序:
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
software engineering and computer systems  1
收藏 引用
丛书名: Communications in computer and Information Science
1000年
作者: Jasni Mohamad Zain Wan Maseri bt Wan Mohd Eyas El-Qawasmeh
This Three-Volume-Set constitutes the refereed proceedings of the SecondInternational Conference on software engineering and computer systems,ICSECS 2011, held in Kuantan, Malaysia, in June 2011.The 190 revised full p... 详细信息
来源: 评论
State-of-the-art AI-based Learning Approaches for Deepfake Generation and Detection, Analyzing Opportunities, Threading through Pros, Cons, and Future Prospects
arXiv
收藏 引用
arXiv 2025年
作者: Goyal, Harshika Wajid, Mohammad Saif Wajid, Mohd Anas Khanday, Akib Mohi Ud Din Neshat, Mehdi Gandomi, Amir Indian Institute of Technology Kharagpur India Department of Computer Science and Intelligent Systems Tecnológico de Monterrey Monterrey Mexico Institute for the Future of Education TEC de Monterrey Monterrey Mexico Department of Computer Science and Software Engineering United Arab Emirates University Al Ain Abu Dhabi United Arab Emirates Department of Computer Science Samarkand International University of Technology Samarkand Uzbekistan Faculty of Engineering and Information Technology University of Technology Sydney Ultimo SydneyNSW2007 Australia Obuda University Budapest1034 Hungary School of Computer and Mathematical Sciences University of Adelaide Adelaide5005 Australia
The rapid expansion and advancement of deepfake technology, which is specifically designed to create incredibly lifelike facial imagery and video content, has ignited a remarkable level of interest and curiosity acros... 详细信息
来源: 评论
Attack intention recognition: A review
收藏 引用
International Journal of Network Security 2017年 第2期19卷 244-250页
作者: Ahmed, Abdulghani Ali Zaman, Noorul Ahlami Kamarul Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Gambang Pahang26300 Malaysia
Sensitive information faces critical risks when it is transmitted through computer networks. Existing protection systems are still limited in their capacities to ensure network information has sufficient confidentiali... 详细信息
来源: 评论
Emergency Vehicle Navigation in Connected Autonomous systems Using Enhanced Traffic Management System
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Raja, Gunasekaran Anbalagan, Sudha Gurumoorthy, Sugeerthi Jegathesan, Darshini Girivel, Niveditha Subramanian Sundaram, Varsha Mani Shanmuga Khowaja, Sunder Ali Dev, Kapal Anna University NGNLab Department of Computer Technology MIT Campus Chennai600044 India Vellore Institute of Technology Chennai Centre for Smart Grid Technologies School of Computer Science and Engineering Chennai600127 India Citicorp Services Private Ltd Software Development Chennai600113 India Dublin City University School of Computing Faculty of Engineering and Computing Glasnevin Campus DublinD09 V209 Ireland Munster Technological University Department of Computer Science Bishopstown CorkT12 P928 Ireland University of Johannesburg Department of Institute of Intelligent Systems Johannesburg2006 South Africa Chitkara University Institute of Engineering and Technology Centre for Research Impact Outcome Chitkara University Punjab Rajpura140401 India
Autonomous Vehicle (AV) usage has become predominant in the rapidly evolving landscape of urban transportation. Integrating AVs and non-AVs in the existing traffic infrastructure has significantly increased the comple... 详细信息
来源: 评论
Segmenting and hiding data randomly based on index channel
收藏 引用
International Journal of computer Science Issues 2011年 第3 3-1期8卷 522-529页
作者: Khalaf, Emad T. Sulaiman, Norrozila Faculty of Computer Systems and Software Engineering University Malaysia Pahang Kuantan 26300 Malaysia
Information hiding is a technique of hiding secret using redundant cover data such as images, audios, movies, documents, etc. In this paper, a new technique of hiding secret data using LSB insertion is proposed, by us... 详细信息
来源: 评论
Diff-Reg v2: Diffusion-Based Matching Matrix Estimation for Image Matching and 3D Registration
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Qianliang Jiang, Haobo Ding, Yaqing Luo, Lei Xie, Jin Yang, Jian PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education China School of Computer Science and Engineering Nanjing University of Science and Technology China Nanyang Technological University Singapore Visual Recognition Group Faculty of Electrical Engineering Czech Technical University in Prague Prague Czech Republic State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Intelligence Science and Technology Nanjing University Suzhou China
Establishing reliable correspondences is crucial for all registration tasks, including 2D image registration, 3D point cloud registration, and 2D-3D image-to-point cloud registration. However, these tasks are often co... 详细信息
来源: 评论
Neurosymbolic Architectural Reasoning: Towards Formal Analysis through Neural software Architecture Inference
arXiv
收藏 引用
arXiv 2025年
作者: Herbold, Steffen Knieke, Christoph Rausch, Andreas Schindler, Christian Faculty of Computer Science and Mathematics Universität Passau Passau Germany Institute for Software and Systems Engineering Technische Universität Clausthal Clausthal-Zellerfeld Germany
Formal analysis to ensure adherence of software to defined architectural constraints is not yet broadly used within software development, due to the effort involved in defining formal architecture models. Within this ... 详细信息
来源: 评论
Multi-probes Fusion Framework for Matching Simultaneous Latent Impressions
Multi-probes Fusion Framework for Matching Simultaneous Late...
收藏 引用
7th International Conference for Internet Technology and Secured Transactions (ICITST)
作者: Yusof, Rozita Mohd Sulaiman, Norrozila Faculty of Computer Systems &amp'||' '||' Software Engineering Universiti Malaysia Pahang Malaysia
A multiple probes fusion framework is proposed in order to provide information at the match score level. This experiment tested 112 simultaneous latent fingerprints from IIITD SLF Database. The Gallery of Optical is u... 详细信息
来源: 评论
Gender Classification From Pashto Handwritten Text Images
收藏 引用
IEEE Access 2025年 13卷 81736-81754页
作者: Sultan, Khan Ahmad, Riaz Muhammad, Siraj Almutairi, Sulaiman Abohashrh, Mohammed Ullah, Khalil Namoun, Abdallah Hussain, Ibrar Shaheed Benazir Bhutto University Department of Computer Science Dir Upper Khyber Pakhtunkhwa Sheringal Pakistan Qassim University College of Applied Medical Sciences Department of Health Informatics Qassim 1452 Saudi Arabia King Khalid University College of Applied Medical Sciences Department of Basic Medical Sciences Abha 61421 Saudi Arabia University of Malakand Department of Software Engineering KP Dir Lower Pakistan Islamic University of Madinah AI Center Faculty of Computer and Information Systems Madinah 42351 Saudi Arabia Shaheed Benazir Bhutto University Quality Enhancement Cell Sheringal Khyber Pakhtunkhwa Dir Upper Pakistan
computer vision (CV) is a subfield of computer science that enables machines to perceive, interpret, and understand visual data. It combines image processing, analysis, and machine learning to extract meaningful insig... 详细信息
来源: 评论