咨询与建议

限定检索结果

文献类型

  • 2,652 篇 会议
  • 1,369 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,090 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,503 篇 工学
    • 1,971 篇 计算机科学与技术...
    • 1,645 篇 软件工程
    • 483 篇 信息与通信工程
    • 362 篇 控制科学与工程
    • 274 篇 生物工程
    • 223 篇 电气工程
    • 210 篇 生物医学工程(可授...
    • 193 篇 机械工程
    • 165 篇 电子科学与技术(可...
    • 150 篇 光学工程
    • 95 篇 仪器科学与技术
    • 95 篇 安全科学与工程
    • 93 篇 化学工程与技术
    • 86 篇 交通运输工程
    • 79 篇 动力工程及工程热...
  • 1,191 篇 理学
    • 644 篇 数学
    • 315 篇 物理学
    • 313 篇 生物学
    • 191 篇 统计学(可授理学、...
    • 160 篇 系统科学
    • 93 篇 化学
  • 815 篇 管理学
    • 510 篇 管理科学与工程(可...
    • 327 篇 图书情报与档案管...
    • 248 篇 工商管理
  • 213 篇 医学
    • 178 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 83 篇 公共卫生与预防医...
  • 127 篇 法学
    • 101 篇 社会学
  • 82 篇 经济学
    • 82 篇 应用经济学
  • 76 篇 教育学
  • 42 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 146 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 93 篇 deep learning
  • 87 篇 feature extracti...
  • 83 篇 computational mo...
  • 83 篇 software
  • 83 篇 accuracy
  • 81 篇 artificial intel...
  • 72 篇 training
  • 66 篇 optimization
  • 63 篇 data mining
  • 53 篇 predictive model...
  • 53 篇 semantics
  • 51 篇 security
  • 45 篇 support vector m...
  • 45 篇 software testing
  • 44 篇 internet of thin...
  • 44 篇 testing
  • 43 篇 information tech...

机构

  • 46 篇 college of compu...
  • 41 篇 faculty of compu...
  • 37 篇 department of so...
  • 37 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 huaiyin institut...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 18 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,942 篇 英文
  • 115 篇 其他
  • 30 篇 中文
  • 3 篇 土耳其文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer and Software Engineering"
4090 条 记 录,以下是251-260 订阅
排序:
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4615-4630页
作者: Erssa Arif Syed Khuram Shahzad Muhammad Waseem Iqbal Muhammad Arfan Jaffar Abdullah S.Alshahrani Ahmed Alghamdi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Faculty of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword... 详细信息
来源: 评论
Innovative fusion of VGG16, MobileNet, EfficientNet, AlexNet, and ResNet50 for MRI-based brain tumor identification
收藏 引用
Iran Journal of computer Science 2024年 第1期8卷 185-215页
作者: Kia, Marjan Sadeghi, Soroush Safarpour, Homayoun Kamsari, Mohammadreza Jafarzadeh Ghoushchi, Saeid Ranjbarzadeh, Ramin Department of Business Information System Business Analysis (ISBA) Park University Parkville United States School of Electrical and Computer Engineering University of Tehran Tehran Iran Department of Software Engineering University of Szeged Szeged Hungary Faculty of Electrical Engineering Malek-Ashtar University of Technology(MUT) Esfahan Iran Faculty of Industrial Engineering Urmia University of Technology Urmia Iran School of Computing Faculty of Engineering and Computing Dublin City University Dublin Ireland
This study presents a novel approach for brain MRI classification by integrating multiple state-of-the-art deep learning (DL) architectures, including VGG16, EfficientNet, MobileNet, AlexNet, and ResNet50, with an att... 详细信息
来源: 评论
An Overview for Trustworthy and Explainable Artificial Intelligence in Healthcare
An Overview for Trustworthy and Explainable Artificial Intel...
收藏 引用
International Scientific-Professional Conference on Information Technology (IT)
作者: Kübra Arslanoğlu Mehmet Karaköse Department of Software Engineering The Faculty of Engineering The University of Firat Elazig Department of Computer Engineering The Faculty of Engineering The University of Firat Elazig
Recently, the increased use of artificial intelligence in healthcare has significantly changed the developments in the field of medicine. Medical centres have adopted AI applications and used it in many applications t...
来源: 评论
Transformative Applications and Key Challenges of Generative AI  7
Transformative Applications and Key Challenges of Generative...
收藏 引用
7th IEEE International Conference and Workshop Obuda on Electrical and Power engineering, CANDO-EPE 2024
作者: Kovari, Attila Katona, Jozsef Eszterházy Károly Catholic University Institute of Digital Technology Faculty of Computer Science Eger Hungary University of Dunaújváros Department of Institute of Engineering Dunaujvaros Hungary John Von Neumann University GAMF Faculty of Engineering and Computer Science Kecskemét Hungary Institute of Computer Engineering University of Dunaujvaros Department of Software Development and Application Dunaujvaros Hungary Budapest Business University Faculty of Finance and Accountancy Department of Applied Quantitative Methods Budapest Hungary
The paper discusses the integration and use of generative artificial intelligence technologies in education. Generative AI, such as OpenAI, in particular the GPT model, has fundamentally changed the way humans interac... 详细信息
来源: 评论
A Three-Dimensional Real-Time Gait-Based Age Detection System Using Machine Learning
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 165-182页
作者: Muhammad Azhar Sehat Ullah Khalil Ullah Habib Shah Abdallah Namoun Khaliq Ur Rahman Department of Computer Science&IT University of MalakandChakdara18800Pakistan Department of Software Engineering University of MalakandChakdara18800Pakistan College of Computer Science King Khalid UniversityAbha62529Saudi Arabia Faculty of Computer and Information Systems Islamic University of MadinahMadinah42351Saudi Arabia Department of Statistics Abdul Wali Khan UniversityMardan23200Pakistan
Human biometric analysis has gotten much attention due to itswidespread use in different research areas, such as security, surveillance,health, human identification, and classification. Human gait is one of the keyhum... 详细信息
来源: 评论
The software Complex for the Selection and Analysis of Algorithms Predicting Key Quality Indicators of Polymer Film Materials of Industrial Production  5
The Software Complex for the Selection and Analysis of Algor...
收藏 引用
5th International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency, SUMMA 2023
作者: Chistyakova, Tamara B. Damrin, Anton Grishchenkov, Nikita D. CAD&C Department St. Petersburg Russia ITMO University Faculty of Software Engineering and Computer Systems St. Petersburg Russia
The following algorithms for constructing predictive models of key quality indicators of polymer film materials are considered and implemented: adaptive boosting of decision trees (AdaBoost), recurrent neural network ... 详细信息
来源: 评论
Crypto-Ransomware Detection Using Selective Hashing
Crypto-Ransomware Detection Using Selective Hashing
收藏 引用
2022 International Conference on Electrical and Computing Technologies and Applications, ICECTA 2022
作者: Almajali, Anas Qaffaf, Ahmad Alkayid, Natali Wadhawan, Yatin The Hashemite University Faculty of Engineering Department of Computer Engineering Zarqa Jordan Software Engineer SeattleWA United States
Ransomware is a malicious software that attempts to encrypt the user's files and demand a ransom in exchange for decrypting the files. This malware may have catastrophic impacts on the availability of data and con... 详细信息
来源: 评论
Preliminary Exploration on Node-To-Node Fault Tolerance Coordination in Distributed System
Preliminary Exploration on Node-To-Node Fault Tolerance Coor...
收藏 引用
2023 IEEE International Conference on Computing, ICOCO 2023
作者: Saadoon, Muntadher Hamid, Siti Hafizah Ab. Sofian, Hazrina Altarturi, Hamza Nasuha, Nur Azizul, Zati Hakim Khalid, Haqi Universiti Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur50603 Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Department of Artificial Intelligence Kuala Lumpur50603 Malaysia Universiti Putra Malaysia Faculty of Engineering Department of Computer and Communication Selangor 43400 Malaysia
Internet of Things, edge computing devices, the widespread use of artificial intelligence and machine learning applications, and the extensive adoption of cloud computing pose significant challenges to maintaining fau... 详细信息
来源: 评论
EMARec: a sequential recommendation with exponential moving average
收藏 引用
Neural Computing and Applications 2024年 第21期36卷 12917-12933页
作者: Chen, Rui Wang, Zonglin Tang, Cundong Zhang, Jianwei Li, Pu Kong, Xiangjie Huang, Min College of Software Engineering Zhengzhou University of Light Industry Zhengzhou450001 China Henan Joint International Research Laboratory of Computer Animation Implementation Technologies Zhengzhou450001 China School of Information Science and Technology Northwest University Xi’an710127 China Faculty of Information and Engineering Xuchang Vocational Technical College Xuchang461000 China College of Computer Science and Technology Zhejiang University of Technology Hangzhou310023 China
Capturing dynamic preference features from user historical behavioral data is widely applied to improve the accuracy of recommendations in sequential recommendation tasks. However, existing deep neural network-based s... 详细信息
来源: 评论
A Secured and Optimized Clustering Approch in Vehicular Ad-hoc Network  4
A Secured and Optimized Clustering Approch in Vehicular Ad-h...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Khan, Imran Khan, Fazlullah Ali, Asad Alshawi, Bandar Alturki, Ryan Wedyan, Mohammad Abdul Wali Khan University Computer Science Department KPK Mardan Pakistan School of Computer Science University of Nottingham Ningbo China Faculty of Science and Engineering Zhejiang315104 China University of Engineering and Technology Department of Computer Science KPK Peshawar Pakistan College of Computing Umm Al-Qura University Department of Computer and Network Engineering Makkah Saudi Arabia College of Computing Umm Al-Qura University Department of Software Engineering Makkah Saudi Arabia Faculty of Information Technology and Computer Sciences Department of Computer Sciences Irbid21163 Jordan
Vehicular ad hoc networks (VANETs) take vital role in intelligent transportation systems, but they face challenges due to dynamic network topology, impacting communication efficiency, especially with increasing active... 详细信息
来源: 评论