咨询与建议

限定检索结果

文献类型

  • 2,666 篇 会议
  • 1,370 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,105 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,501 篇 工学
    • 1,967 篇 计算机科学与技术...
    • 1,643 篇 软件工程
    • 485 篇 信息与通信工程
    • 364 篇 控制科学与工程
    • 275 篇 生物工程
    • 222 篇 电气工程
    • 212 篇 生物医学工程(可授...
    • 193 篇 机械工程
    • 167 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 97 篇 仪器科学与技术
    • 96 篇 安全科学与工程
    • 95 篇 化学工程与技术
    • 86 篇 交通运输工程
    • 80 篇 动力工程及工程热...
  • 1,191 篇 理学
    • 644 篇 数学
    • 316 篇 物理学
    • 311 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 159 篇 系统科学
    • 94 篇 化学
  • 815 篇 管理学
    • 505 篇 管理科学与工程(可...
    • 333 篇 图书情报与档案管...
    • 246 篇 工商管理
  • 210 篇 医学
    • 177 篇 临床医学
    • 151 篇 基础医学(可授医学...
    • 93 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 125 篇 法学
    • 100 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 77 篇 教育学
  • 40 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 148 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 92 篇 deep learning
  • 87 篇 feature extracti...
  • 83 篇 computational mo...
  • 83 篇 software
  • 82 篇 accuracy
  • 80 篇 artificial intel...
  • 74 篇 training
  • 65 篇 optimization
  • 64 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 52 篇 security
  • 46 篇 support vector m...
  • 45 篇 internet of thin...
  • 45 篇 software testing
  • 45 篇 data models
  • 44 篇 information tech...

机构

  • 44 篇 college of compu...
  • 42 篇 faculty of compu...
  • 38 篇 faculty of softw...
  • 37 篇 department of so...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 19 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,671 篇 英文
  • 400 篇 其他
  • 32 篇 中文
  • 2 篇 日文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Computer and Software Engineering"
4105 条 记 录,以下是1361-1370 订阅
排序:
Conventional/Phase Shift Dual Drive Mach-Zehnder Modulation Measured Type Based Radio over Fiber Systems
收藏 引用
Journal of Optical Communications 2024年 第s1期45卷 s123-s131页
作者: Amiri, I.S. Rashed, Ahmed Nabih Zaki Rahman, Ziaur Paul, Bikash Kumar Ahmed, Kawsar Computational Optics Research Group Advanced Institute of Materials Science Ton Duc Thang University Ho Chi Minh City Viet Nam Faculty of Applied Sciences Ton Duc Thang University Ho Chi Minh City Viet Nam Electronics and Electrical Communications Engineering Department Faculty of Electronic Engineering Menoufia University Menouf32951 Egypt School of Computer Science and Software Engineering RMIT University 414-418 Swanston Street MelbourneVIC3000 Australia Department of Information and Communication Technology Mawlana Bhashani Science and Technology University Santosh Tangail1902 Bangladesh Group of Bio-photomatiχ Mawlana Bhashani Science and Technology University Santosh Tangail1902 Bangladesh Department of Software Engineering Daffodil International University Sukrabad Dhanmondi Dhaka1207 Bangladesh
This work clarified the conventional/phase shift dual Mach-Zehnder modulation measured technique for upgrading radio over fiber (ROF) systems. Four levels of pulse amplitude modulation and non-return to zero code sche... 详细信息
来源: 评论
A Fuzzy Logic-Based Computational Framework for Precision Triage in Androgenetic Alopecia: A Simulated Biomarker-Driven Approach
收藏 引用
International Journal of Computational Intelligence Systems 2025年 第1期18卷 1-30页
作者: Al-Samarraay, Mohammed S. Magableh, Aws A. Mahmood, Rana I. Joudar, Shahad Sabbar Zahid, Idrees A. Al-Obaidi, Jameel R. Al-Saffar, Ali Z. Albahri, A. S. Albahri, O. S. Alamoodi, A. H. Abdullah, Mohd Faizal Nizam Lee Electrical and Electronic Engineering Department College of Engineering Gulf University Sanad Bahrain Faculty of Information Technology and Computer Sciences Department of Information Systems Yarmouk University Irbid Jordan Department of Software Engineering Prince Sultan University Riyadh Saudi Arabia Department of Biomedical Engineering College of Engineering Al-Nahrain University Jadriya Baghdad Iraq University of Technology Baghdad Iraq Department of Biology Faculty of Science and Mathematics Universiti Pendidikan Sultan Idris Tanjong Malim Malaysia Applied Science Research Center Applied Science Private University Amman Jordan Department of Molecular and Medical Biotechnology College of Biotechnology Al-Nahrain University Baghdad Iraq Technical Engineering College Imam Ja’afar Al-Sadiq Baghdad Iraq University of Information Technology and Communications (UOITC) Baghdad Iraq Computer Techniques Engineering Department Mazaya University College Nasiriyah Iraq Victorian Institute of Technology Melbourne Australia GUST Engineering and Applied Innovation Research Center (GEAR) Gulf University for Science and Technology Mishref Kuwait Department of Mathematics Faculty of Science and Mathematics Universiti Pendidikan Sultan Idris Tanjong Malim Malaysia
Androgenetic alopecia (AGA) is a common cause of hair loss affecting both men and women. Although its precise etiology remains uncertain, genetic and hormonal factors are recognized as major contributors. This study i...
来源: 评论
Prediction of reinforced concrete structures behavior using finite element method
收藏 引用
Procedia Structural Integrity 2022年 36卷 177-181页
作者: O. Kononchuк V. Iasnii N. Lutsyk Ternopil Ivan Puluj National Technical University Faculty of Engineering of Machines Structures and Technologies 56 Ruska St. Ternopil 46011 Ukraine Ternopil Ivan Puluj National Technical University Faculty Of Computer Information Systems And Software Engineering 56 Ruska St. Ternopil 46011 Ukraine
In this paper the results of finite element modelling of bended reinforced concrete elements before and after reinforcing by carbon-fibre plastics under static loading are presented. Numerical results were performed t... 详细信息
来源: 评论
Automatic Video Segmentation Based on Information Centroid and Optimized SaliencyCut
收藏 引用
Journal of computer Science & Technology 2020年 第3期35卷 564-575页
作者: Hui-Si Wu Meng-Shu Liu Lu-Lu Yin Ping Li Zhen-Kun Wen Hon-Cheng Wong College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518060China Department of Computing The Hong Kong Polytechnic UniversityHong Kong 999077China Faculty of Information Technology Macao University of Science and TechnologyMacao 999078China
We propose an automatic video segmentation method based on an optimized SaliencyCut equipped with information centroid(IC)detection according to level balance principle in physical *** the existing methods,the image i... 详细信息
来源: 评论
Facial Recognition Utilizing the CLM Model and Supervised Machine Learning: A Comparative Analysis
Facial Recognition Utilizing the CLM Model and Supervised Ma...
收藏 引用
Information Technology (ACIT)
作者: Musab Iqtait Jafar Ababneh Amer Abu-Jassar Mohammad Al-Refai Mohammad Dmour Mohammad Arabiat Ruaa Binsaddig Department of Artificial Intelligence Faculty of Information Technology Zarqa University Zarqa Jordan Cyber Security Department Faculty of Information Technology Zarqa University Zarqa Jordan College of of Computer Sciences and Information Amman Arab University University Amman Jordan Software Engineering Department Faculty of Information Technology Zarqa University Zarqa Jordan Department of Finance College of Business Administration University of Business and Technology Jeddah Saudi Arabia
Facial recognition is a common challenge in artificial intelligence. We extensively utilized this program in our daily life. Face recognition software was implemented on many phones to protect user identities and prom... 详细信息
来源: 评论
Optimized Flame Detection Using a YOLOv5 Neural Network
Optimized Flame Detection Using a YOLOv5 Neural Network
收藏 引用
Computing, Robotics and System Sciences (ICRSS), International Conference on
作者: Shahid Karim Muhammad Ibrar Anas Bilal Akeel Qadir Irfana Bibi School of Information Engineering Xi'an Eurasia University Xi'an China Software College Shenyang Normal University Shenyang China College of Information Science and Technology Hainan Normal University Haikou China Department of Computer Science Faculty of Computing and Information Technology University of Punjab Lahore Punjab Pakistan
With the rising prevalence of smart homes, there's an increasing demand for comprehensive automation solutions to mitigate fire risks, especially when homeowners are absent or in homes with elderly residents. This... 详细信息
来源: 评论
Characterization and Control of a Superconducting Homopolar Motor with Cryogenic GaN Inverter for Electric Aircrafts
Characterization and Control of a Superconducting Homopolar ...
收藏 引用
IEEE Energy Conversion Congress and Exposition, ECCE
作者: Felix Gliese Matthew G. S. Pearce Aaron Wadsworth Mohammad Siamaki James Storey Grant Lumsden Duleepa J. Thrimawithana Rod Badcock Joerg Roth-Stielow Martin Neuburger Faculty of Mobility and Technology Esslingen University Germany Dept. of Electrical Computer and Software Engineering The University of Auckland New Zealand OpenStar Technologies New Zealand Robinson Research Institute Victoria University of Wellington New Zealand Institute for Power Electronics and Electrical Drives University of Stuttgart Germany
In the quest for a zero-emissions future, the aviation sector is facing the challenge of reducing its carbon footprint. This paper presents a characterization of a superconducting homopolar motor designed to meet the ... 详细信息
来源: 评论
Groove Gap Waveguide Crossover for Butler Matrices and Beamforming in Millimeter-Wave Satellite Antenna Systems
Groove Gap Waveguide Crossover for Butler Matrices and Beamf...
收藏 引用
International Conference on Radioelektronika
作者: Mohammad Alibakhshikenari Peiman Parand Ali Zidour Bal S. Virdee Lida Kouhalvandi Patrick Longhi Takfarinas Saber Ernesto Limiti Electronics Engineering Department University of Rome “Tor Vergata” Rome Italy Department of Electrical Systems Engineering Faculty of Technology University of M'hamed Bougara Boumerdes Algeria Center for Communications Technology London Metropolitan University London UK Department of Electrical and Electronics Engineering Dogus University Istanbul Turkiye Lero Science Foundation Ireland Centre for Software School of Computer Science University of Galway Galway Ireland
This paper presents an innovative H-plane crossover based on groove gap-waveguide (GGW) technology for high-performance millimeter-wave (mm-wave) circuits. The design facilitates the development of key transmission co... 详细信息
来源: 评论
Correction to: A comprehensive performance evaluation of container migration strategies
收藏 引用
Computing 2025年 第4期107卷 1-2页
作者: Feitosa, Leonel Barbosa, Vandirleya Sabino, Arthur Lima, Luiz Nelson Fé, Iure Silva, Luis Guilherme Callou, Gustavo Carvalho, Juliana Leão, Erico Nguyen, Tuan Anh Rego, Paulo Silva, Francisco Airton Laboratory of Applied Research to Distributed Systems (PASID) Federal University of Piauí (UFPI) Picos Brazil Department of Computing Federal Rural University of Pernambuco (UFRPE) Recife Brazil Department of Software Engineering Faculty of Information Technology University of Industry and Trade (HUIT) Ho Chi Minh City Vietnam Department of Computer Science Federal University of Ceará (UFC) Fortaleza Brazil
来源: 评论
Expert Phishing Detection System
Expert Phishing Detection System
收藏 引用
IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)
作者: Ayoub Alsarhan Issa Al-Aiash Dimah Al-Fraihat Mohammad Aljaidi Dena Abd Al Hakem Abu Laila Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Cybersecurity Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa Jordan Department of Cyber Security Faculty of Information Technology Zarqa Technical Intermediate College Zarqa Jordan
Phishing attacks are a threat that continuously emphasizes the need for effective detection methods. This paper presents a machine learning detection method that employs a random forest classifier, which is an adaptab... 详细信息
来源: 评论