咨询与建议

限定检索结果

文献类型

  • 2,676 篇 会议
  • 1,394 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,532 篇 工学
    • 1,993 篇 计算机科学与技术...
    • 1,658 篇 软件工程
    • 500 篇 信息与通信工程
    • 378 篇 控制科学与工程
    • 275 篇 生物工程
    • 235 篇 电气工程
    • 213 篇 生物医学工程(可授...
    • 197 篇 机械工程
    • 170 篇 电子科学与技术(可...
    • 155 篇 光学工程
    • 100 篇 仪器科学与技术
    • 99 篇 安全科学与工程
    • 97 篇 化学工程与技术
    • 89 篇 交通运输工程
    • 85 篇 动力工程及工程热...
  • 1,206 篇 理学
    • 649 篇 数学
    • 321 篇 物理学
    • 312 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 159 篇 系统科学
    • 96 篇 化学
  • 831 篇 管理学
    • 518 篇 管理科学与工程(可...
    • 340 篇 图书情报与档案管...
    • 248 篇 工商管理
  • 216 篇 医学
    • 181 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 93 篇 药学(可授医学、理...
    • 87 篇 公共卫生与预防医...
  • 128 篇 法学
    • 103 篇 社会学
  • 81 篇 经济学
    • 81 篇 应用经济学
  • 78 篇 教育学
  • 40 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 148 篇 software enginee...
  • 103 篇 computer science
  • 100 篇 machine learning
  • 97 篇 deep learning
  • 89 篇 feature extracti...
  • 84 篇 computational mo...
  • 84 篇 accuracy
  • 83 篇 software
  • 81 篇 artificial intel...
  • 75 篇 training
  • 66 篇 optimization
  • 64 篇 data mining
  • 55 篇 predictive model...
  • 53 篇 semantics
  • 53 篇 security
  • 46 篇 support vector m...
  • 45 篇 internet of thin...
  • 45 篇 software testing
  • 45 篇 data models
  • 44 篇 information tech...

机构

  • 45 篇 college of compu...
  • 42 篇 faculty of compu...
  • 38 篇 faculty of softw...
  • 37 篇 department of so...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 19 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,574 篇 英文
  • 532 篇 其他
  • 33 篇 中文
  • 2 篇 日文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Computer and Software Engineering"
4139 条 记 录,以下是1401-1410 订阅
排序:
Groove Gap Waveguide Crossover for Butler Matrices and Beamforming in Millimeter-Wave Satellite Antenna Systems
Groove Gap Waveguide Crossover for Butler Matrices and Beamf...
收藏 引用
International Conference on Radioelektronika
作者: Mohammad Alibakhshikenari Peiman Parand Ali Zidour Bal S. Virdee Lida Kouhalvandi Patrick Longhi Takfarinas Saber Ernesto Limiti Electronics Engineering Department University of Rome “Tor Vergata” Rome Italy Department of Electrical Systems Engineering Faculty of Technology University of M'hamed Bougara Boumerdes Algeria Center for Communications Technology London Metropolitan University London UK Department of Electrical and Electronics Engineering Dogus University Istanbul Turkiye Lero Science Foundation Ireland Centre for Software School of Computer Science University of Galway Galway Ireland
This paper presents an innovative H-plane crossover based on groove gap-waveguide (GGW) technology for high-performance millimeter-wave (mm-wave) circuits. The design facilitates the development of key transmission co... 详细信息
来源: 评论
Expert Phishing Detection System
Expert Phishing Detection System
收藏 引用
IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology (IAICT)
作者: Ayoub Alsarhan Issa Al-Aiash Dimah Al-Fraihat Mohammad Aljaidi Dena Abd Al Hakem Abu Laila Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Cybersecurity Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa Jordan Department of Cyber Security Faculty of Information Technology Zarqa Technical Intermediate College Zarqa Jordan
Phishing attacks are a threat that continuously emphasizes the need for effective detection methods. This paper presents a machine learning detection method that employs a random forest classifier, which is an adaptab... 详细信息
来源: 评论
Fair Short Paths in Vertex-Colored Graphs
arXiv
收藏 引用
arXiv 2022年
作者: Bentert, Matthias Kellerhals, Leon Niedermeier, Rolf University of Bergen Department of Informatics Algorithms Norway Technische Universität Berlin Faculty IV Institute of Software Engineering and Theoretical Computer Science Algorithmics and Computational Complexity Germany
The computation of short paths in graphs with arc lengths is a pillar of graph algorithmics and network science. In a more diverse world, however, not every short path is equally valuable. For the setting where each v... 详细信息
来源: 评论
A new lightweight data security system for data security in the cloud computing
收藏 引用
Measurement: Sensors 2023年 29卷
作者: Mohammed, Shameer Nanthini, S. Bala Krishna, N. Srinivas, Inumarthi V. Rajagopal, Manikandan Ashok Kumar, M. University of Technology and Applied Sciences Sur Oman Department of AI & DS Saveetha School of Engineering Saveetha Institute of Medical and Technical Science Thandalam Chennai India Department of CSE Mohan Babu University &SreeVidyanikethan Engineering College Andhrapradesh Tirupati517102 India Mumbai400077 India School of Business and Management Christ University Bangalore560029 India Faculty of Computer Science Department of Computer Science and Software Engineering Skyline University Nigeria Kano Nigeria
In recent decades, data has proved indispensable to all facets of human existence. The development of several applications has resulted in the exponential expansion of data. This information can be encrypted and store... 详细信息
来源: 评论
Enhancing Sovereign Allocation of Resources in Cloud Milieus Using a Causal Dilated Geometric Algebra Approach for Dynamic Scalability
Enhancing Sovereign Allocation of Resources in Cloud Milieus...
收藏 引用
Machine Learning and Autonomous Systems (ICMLAS), International Conference on
作者: Chandrasekhar Rao Katru Sathish Srinivasan Mohan Kumar T G Sunita Yadwad G. Satish Ramya Maranan Lead Software Engineer Indian Land SC USA Oracle Cloud Infrastructure Division Machine Learning & AI Development San Francisco Bay Area California USA Department of Information Science and Engineering Nitte Meenakshi Institute of Technology Bengaluru Karnataka Computer science and Engineering Faculty of Engineering and Technology Parul institute of Engineering and Technology Parul University Post Limda Gujarat Department of Electrical and Electronics Engineering Sree Dattha Institute of Engineering and Science Sheriguda Telangana Department of Research and Innovation Saveetha School of Engineering SIMATS Chennai Tamil Nadu
Cloud environments utilize availability and usage of resources as crucial components in order to produce scalability, reliability and low cost. Such resource capabilities require autonomous systems that can handle the... 详细信息
来源: 评论
Dual-View Pyramid Pooling in Deep Neural Networks for Improved Medical Image Classification and Confidence Calibration
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Xiaoqing Nie, Qiushi Xiao, Zunjie Zhao, Jilu Wu, Xiao Guo, Pengxin Li, Runzhi Liu, Jin Wei, Yanjie Pan, Yi Center for High Performance Computing Shenzhen Key Laboratory of Intelligent Bioinformatics Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Shenzhen518055 China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China Department of Statistics and Actuarial Science The University of Hong Kong 999077 Hong Kong Cooperative Innovation Center of Internet Healthcare Zhengzhou University Zhengzhou450001 China Hunan Provincial Key Lab on Bioinformatics School of Computer Science and Engineering Central South University Changsha410083 China Xinjiang Engineering Research Center of Big Data and Intelligent Software School of software Xinjiang University Wulumuqi830046 China Faculty of Computer Science and Control Engineering Shenzhen University of Advanced Technology Shenzhen China
Spatial pooling (SP) and cross-channel pooling (CCP) operators have been applied to aggregate spatial features and pixel-wise features from feature maps in deep neural networks (DNNs), respectively. Their main goal is... 详细信息
来源: 评论
A Novel Trust Assessment System for Online Social Networking Environment Using Learning Assisted Classification Model
A Novel Trust Assessment System for Online Social Networking...
收藏 引用
Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), International Conference on
作者: S. Nithya D. Deepa Vunnava Dinesh Babu Pallavi G Hamed Fawareh R. D. Kayalvizhy Department of Computer Science Engineering Saveetha Engineering College Chennai Department of CSE St. Joseph's College of Engineering Chennai Department of CSE RV Institute of Technology Guntur Department of Civil Engineering Laxminarayan Innovation Technological University Nagpur India Software Engineering Dept Faculty of Information Technology Zarqa University Zarqa Jordan University of Business and Technology Jeddah Saudi Arabia Department of Electronics and Communication Engineering R.M.K. Engineering College Kavaraipettai Tamil Nadu
Trust is essential in the constantly developing environment of online social networks. The Nexus Terroism Impact and Intro Trust facilitate the communication, decision-making, and maintenance of digital communities am... 详细信息
来源: 评论
Variational Optimization of Informational Privacy  11th
Variational Optimization of Informational Privacy
收藏 引用
11th International Workshop on Biological Knowledge Discovery from Data, BIOKDD 2020, the 4th International Workshop on Cyber-Security and Functional Safety in Cyber-Physical Systems, IWCFS 2020, the 2nd International Workshop on Machine Learning and Knowledge Graphs, MLKgraphs2019, held at the 31st International Conference on Database and Expert Systems Applications, DEXA 2020
作者: Kumar, Mohit Brunner, David Moser, Bernhard A. Freudenthaler, Bernhard Faculty of Computer Science and Electrical Engineering University of Rostock Rostock Germany Software Competence Center Hagenberg Hagenberg Austria
The datasets containing sensitive information cant be publicly shared as a privacy-risk posed by several types of attacks exists. The data perturbation approach uses a random noise adding mechanism to preserve privacy... 详细信息
来源: 评论
How inter-rater variability relates to aleatoric and epistemic uncertainty: a case study with deep learning-based paraspinal muscle segmentation
arXiv
收藏 引用
arXiv 2023年
作者: Roshanzamir, Parinaz Rivaz, Hassan Ahn, Joshua Mirza, Hamza Naghdi, Neda Anstruther, Meagan Battié, Michele C. Fortin, Maryse Xiao, Yiming Department of Electrical and Computer Engineering Concordia University Montreal Canada Faculty of Health Sciences Western University London Canada Health Kinesiology and Applied Physiology Concordia University Montreal Canada School of Physical Therapy and Western’s Bone and Joint Institute Western University London Canada Department of Computer Science and Software Engineering Concordia University Montreal Canada
Recent developments in deep learning (DL) techniques have led to great performance improvement in medical image segmentation tasks, especially with the latest Transformer model and its variants. While labels from fusi... 详细信息
来源: 评论
Method for filtering encrypted traffic using a neural network between an Industrial Internet of things system and Digital Twin  21
Method for filtering encrypted traffic using a neural networ...
收藏 引用
Proceedings of the 5th International Conference on Future Networks and Distributed Systems
作者: Ivan Luksha Truong Duy Dinh Evgenii Karelin Ruslan Glushakov Ruslan Kirichek Dept. of software engineering and computer science Bonch-Bruevich Saint Petersburg State University of Telecommunications Russian Federation Posts and Telecommunications Institute of Technology Faculty of Information Vietnam Dept. of software engineering and computer science The Bonch-Bruevich Saint Petersburg State University of Telecommunications Russian Federation Saint-Petersburg State Pediatric Medical University Russian Federation The Bonch-Bruevich Saint Petersburg State University of Telecommunications Dept. of software engineering and computer science Russian Federation
Several traffic optimization approaches are available nowadays, including compression, packet deduplication, specialized hardware and software solutions, application optimization, and neural network utilization. Howev...
来源: 评论