咨询与建议

限定检索结果

文献类型

  • 2,662 篇 会议
  • 1,366 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,097 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,511 篇 工学
    • 1,974 篇 计算机科学与技术...
    • 1,650 篇 软件工程
    • 488 篇 信息与通信工程
    • 366 篇 控制科学与工程
    • 275 篇 生物工程
    • 225 篇 电气工程
    • 211 篇 生物医学工程(可授...
    • 195 篇 机械工程
    • 167 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 96 篇 仪器科学与技术
    • 95 篇 化学工程与技术
    • 95 篇 安全科学与工程
    • 87 篇 交通运输工程
    • 81 篇 动力工程及工程热...
  • 1,195 篇 理学
    • 646 篇 数学
    • 318 篇 物理学
    • 311 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 160 篇 系统科学
    • 93 篇 化学
  • 817 篇 管理学
    • 508 篇 管理科学与工程(可...
    • 332 篇 图书情报与档案管...
    • 248 篇 工商管理
  • 211 篇 医学
    • 177 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 127 篇 法学
    • 101 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 76 篇 教育学
  • 41 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 147 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 92 篇 deep learning
  • 87 篇 feature extracti...
  • 83 篇 computational mo...
  • 82 篇 software
  • 82 篇 accuracy
  • 78 篇 artificial intel...
  • 72 篇 training
  • 65 篇 optimization
  • 63 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 51 篇 security
  • 46 篇 support vector m...
  • 45 篇 software testing
  • 44 篇 internet of thin...
  • 44 篇 information tech...
  • 44 篇 testing

机构

  • 45 篇 college of compu...
  • 41 篇 faculty of compu...
  • 37 篇 department of so...
  • 37 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 school of comput...
  • 15 篇 huaiyin institut...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 18 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,874 篇 英文
  • 189 篇 其他
  • 30 篇 中文
  • 3 篇 土耳其文
  • 2 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Computer and Software Engineering"
4097 条 记 录,以下是1131-1140 订阅
排序:
Sparsity Aware of TF-IDF Matrix to Accelerate Oblivious Document Ranking and Retrieval
Sparsity Aware of TF-IDF Matrix to Accelerate Oblivious Docu...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Zeshi Zhang Guangping Xu Hongzhang Yang Yulei Wu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Ministry of Education Key Laboratory of Computer Vision and System China Faculty of Engineering University of Bristol Bristol U.K.
Due to cloud security concerns, there is an increasing interest in information retrieval systems that can support private queries over public documents. It is desirable for oblivious document ranking and retrieval in ... 详细信息
来源: 评论
Towards Survivable In-Memory Stores with Parity Coded NVRAM
Towards Survivable In-Memory Stores with Parity Coded NVRAM
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Zhixuan Wang Guangping Xu Hongzhang Yang Yulei Wu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Faculty of Engineering University of Bristol Bristol U.K.
Erasure codes have been widely applied to in-memory key-value storage systems for high reliability and low redundancy. In distributed in-memory key-value storage systems, update operations are relatively frequent, esp... 详细信息
来源: 评论
Investigating novel machine learning based intrusion detection models for NSL-KDD data sets
Investigating novel machine learning based intrusion detecti...
收藏 引用
IT and Industrial Technologies (ICIT), International Conference on
作者: Muhammad Huzaifa Shah Muhammad Abu Bakar Raja Hashim Ali Zain Ul Abideen Usama Arshad Ali Zeeshan Ijaz Nisar Ali Muhammad Imad Said Nabi Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany BCMaterials Basque Center for Materials Applications & Nanostructure Spain Faculty of Electronic Systems Engineering University of Regina Regina Canada
This study investigates the application of the Mutual Information (MI) feature selection technique to improve the accuracy of Machine Learning (ML) models on NSL-KDD datasets, building upon prior research. Six ML mode...
来源: 评论
A-REA: Relation-Aware Graph Convolutional Network Entity Alignment Via a Differential Adjacency Matrix
A-REA: Relation-Aware Graph Convolutional Network Entity Ali...
收藏 引用
Image Processing, Electronics and computers (IPEC), Asia-Pacific Conference on
作者: Yuemei Dang Chen Qiu Feng Gao Jinguang Gu Lihua Zhang Ghazaleh Arman School of Computer Science and Technology Wuhan University of Science and Technology Wuhan Hubei China Software College East China Jiaotong University Nanchang Jiangxi China Faculty of Information Technology and Computer Engineering Urmia University of Technology Urmia Iran
Entity Alignment is the task of seeking entities with the same semantics from distinct knowledge graphs (KGs). Researchers have recently proposed Graph Convolutional Network (GCN) based approaches to achieve this task...
来源: 评论
Opportunities and challenges of artificial intelligence and distributed systems to improve the quality of healthcare service
收藏 引用
Artificial Intelligence in Medicine 2024年 149卷 102779-102779页
作者: Aminizadeh, Sarina Heidari, Arash Dehghan, Mahshid Toumaj, Shiva Rezaei, Mahsa Jafari Navimipour, Nima Stroppa, Fabio Unal, Mehmet Medical Faculty Tabriz Branch Islamic Azad University Tabriz Iran Department of Software Engineering Haliç University Istanbul34060 Turkey Tabriz University of Medical Sciences Faculty of Medicine Tabriz Iran Urmia University of Medical Sciences Urmia Iran Tabriz University of Medical Sciences Faculty of Surgery Tabriz Iran Future Technology Research Center National Yunlin University of Science and Technology Douliou64002 Taiwan Department of Computer Engineering Faculty of Engineering and Natural Sciences Kadir Has University Istanbul Turkey Department of Mathematics School of Engineering and Natural Sciences Bahçeşehir University Istanbul Turkey
The healthcare sector, characterized by vast datasets and many diseases, is pivotal in shaping community health and overall quality of life. Traditional healthcare methods, often characterized by limitations in diseas... 详细信息
来源: 评论
An Abstractive Summarization Technique with Variable Length Keywords as per Document Diversity
收藏 引用
computers, Materials & Continua 2021年 第3期66卷 2409-2423页
作者: Muhammad Yahya Saeed Muhammad Awais Muhammad Younas Muhammad Arif Shah Atif Khan M.Irfan Uddin Marwan Mahmoud Department of Software Engineering Government College UniversityFaisalabadFaisalabad38000Pakistan Department of IT and Computer Science Pak-Austria Fachhochschule Institute of Applied Sciences and TechnologyHaripurPakistan Department of Computer Science Islamia College PeshawarPeshawarPakistan Institute of Computing Kohat University of Science and TechnologyKohatPakistan Faculty of Applied Studies King Abdulaziz UniversityJeddahSaudi Arabia
Text Summarization is an essential area in text mining,which has procedures for text *** natural language processing,text summarization maps the documents to a representative set of descriptive ***,the objective of te... 详细信息
来源: 评论
Arabic Sentiment Analysis of Food Delivery Services Reviews
Arabic Sentiment Analysis of Food Delivery Services Reviews
收藏 引用
International Symposium on Networks, computers and Communications (ISNCC)
作者: Dheya Mustafa Safaa M. Khabour Ahmed S. Shatnawi Eyad Taqieddin Dept. of Computer Engineering Faculty of Engineering The Hashemite University Zarqa Jordan Dept. of Information Systems Faculty of Information Technology and Computer Sciences Yarmouk University Irbid Jordan Dept. of Software Engineering Jordan University of Science & Technology Irbid Jordan Dept. of Cyber Security School of Computing and Informatics Al-Hussein Technical University Amman Jordan
Customer reviews on online platforms have grown to become an important source of insight into a company's performance. Food delivery services (FDS) companies aim to effectively use customers' feedback to ident...
来源: 评论
Optimizing Results in Aerial Images through Post-Processing Techniques on YOLOv7  23
Optimizing Results in Aerial Images through Post-Processing ...
收藏 引用
12th International Symposium on Information and Communication Technology, SOICT 2023
作者: Vo, Nguyen D. Nguyen, Thu M. Nguyen, Triet H.M. Nguyen, Khang Multimedia Communications Laboratory University of Information Technology Vietnam National University Ho Chi Minh City Ho Chi Minh city Viet Nam Faculty of Computer Science University of Information Technology Vietnam National University Ho Chi Minh City Ho Chi Minh city Viet Nam Faculty of Software Engineering University of Information Technology Vietnam National University Ho Chi Minh City Ho Chi Minh city Viet Nam
Object detection in aerial images has garnered significant attention from the research community in recent years. The challenges posed by small objects, diverse orientations, and complex backgrounds have spurred exten... 详细信息
来源: 评论
Improving WiFi Fingerprint Database With Irregular Distribution of Reference Points Using Interpolation Methods
Improving WiFi Fingerprint Database With Irregular Distribut...
收藏 引用
International Conference on Advanced Technologies for Communications, ATC
作者: Trung Vu-Thanh Jing He Ninh Duong-Bao Seon-Woo Lee Luong Nguyen Thi Khanh Nguyen-Huu College of Computer Science and Electronic Engineering Hunan University Changsha China Faculty of Mathematics and Informatics Dalat University Dalat Vietnam Division of Software Hallym University Chuncheon Korea Faculty of Information Technology Dalat University Dalat Vietnam Department of Electronics and Telecommunications Dalat University Dalat Vietnam
Using WiFi Fingerprinting for indoor positioning is becoming increasingly popular due to its cost-effectiveness. However, to ensure the system can operate with high accuracy and stability, this technique requires a bu... 详细信息
来源: 评论
SCALABLE LINK PREDICTION IN TWITTER USING SELF-CONFIGURED FRAMEWORK
arXiv
收藏 引用
arXiv 2022年
作者: Daud, Nur Nasuha Hamid, Siti Hafizah Ab Seri, Chempaka Saadoon, Muntadher Anuar, Nor Badrul Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur50603 Malaysia Department of Computer System and Technology Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur50603 Malaysia
Link prediction analysis becomes vital to acquire a deeper understanding of events underlying social networks interactions and connections especially in current evolving and large-scale social networks. Traditional li... 详细信息
来源: 评论