咨询与建议

限定检索结果

文献类型

  • 2,662 篇 会议
  • 1,376 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,519 篇 工学
    • 1,982 篇 计算机科学与技术...
    • 1,655 篇 软件工程
    • 490 篇 信息与通信工程
    • 370 篇 控制科学与工程
    • 275 篇 生物工程
    • 227 篇 电气工程
    • 211 篇 生物医学工程(可授...
    • 196 篇 机械工程
    • 168 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 95 篇 仪器科学与技术
    • 95 篇 化学工程与技术
    • 95 篇 安全科学与工程
    • 87 篇 交通运输工程
    • 81 篇 动力工程及工程热...
  • 1,197 篇 理学
    • 647 篇 数学
    • 319 篇 物理学
    • 311 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 161 篇 系统科学
    • 93 篇 化学
  • 821 篇 管理学
    • 510 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 249 篇 工商管理
  • 212 篇 医学
    • 178 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 128 篇 法学
    • 101 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 75 篇 教育学
  • 41 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 147 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 95 篇 deep learning
  • 88 篇 feature extracti...
  • 84 篇 computational mo...
  • 84 篇 accuracy
  • 83 篇 software
  • 80 篇 artificial intel...
  • 73 篇 training
  • 66 篇 optimization
  • 63 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 51 篇 security
  • 46 篇 support vector m...
  • 45 篇 software testing
  • 44 篇 internet of thin...
  • 44 篇 information tech...
  • 44 篇 testing

机构

  • 45 篇 college of compu...
  • 40 篇 faculty of compu...
  • 37 篇 department of so...
  • 37 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 huaiyin institut...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 18 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,887 篇 英文
  • 187 篇 其他
  • 30 篇 中文
  • 3 篇 土耳其文
  • 2 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Computer and Software Engineering"
4107 条 记 录,以下是531-540 订阅
排序:
An Efficient Detection Model for Brain Stroke Based on Transfer Learning
An Efficient Detection Model for Brain Stroke Based on Trans...
收藏 引用
Emerging Smart Technologies and Applications (eSmarTA), International Conference on
作者: Faroq H. M. Mohammed Abdulfattah Ba Alawi Ferhat Bozkurt M. Dilruba Geyikoğlu Electrical and Electronic Engineering Dept. Faculty of Engineering Ataturk University Erzurum Turkey Computer Engineering Dept. Faculty of Engineering Ataturk University Erzurum Turkey Software Engineering Dept. Faculty of Engineering & IT Taiz University Taiz Yemen
Brain stroke is one of the most common causes of death, ranking as the second leading cause worldwide. With the advancements of deep learning, the detection of brain strokes from CT images becomes possible. In this st... 详细信息
来源: 评论
An Approach for Early Detection of Schizophrenia
An Approach for Early Detection of Schizophrenia
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Sachin Paranagama Isiwara Uditha Pamodya Daundasekara Shehani Hettiarachchi Lokesha Weerasinghe Dharshana Kasthurirathna Department of Computer Science and Software Engineering Faculty Of Computing Sri Lanka Institue Of Information Technology Malabe Sri Lanka
Schizophrenia is a chronic mental disorder with distorted thinking, hallucinations, and social difficulties. Early diagnosis is vital, but current methods are limited. This research proposes a web-based application in... 详细信息
来源: 评论
HAMI: Hybrid Adaptive AutoML for IoT Intrusion Detection
HAMI: Hybrid Adaptive AutoML for IoT Intrusion Detection
收藏 引用
IEEE Communication Strategies in Digital Society Workshop (ComSDS)
作者: Mohamed Saber Natalia Gusarova Vladimir Bogatyrev Faculty of Software Engineering and Computer Systems ITMO University St. Petersburg Russia Faculty of Infocommunication Technologies ITMO University St. Petersburg Russia
the growth of IoT devices presents significant security challenges due to their diverse and dynamic environments. To address this, we developed HAMI, a novel intrusion detection system. Our method leverages the GIFS a... 详细信息
来源: 评论
Research on AI-Powered Employee Feedback Tools
Research on AI-Powered Employee Feedback Tools
收藏 引用
International Russian Smart Industry Conference (SmartIndustryCon)
作者: Konstantin Babushkin Nikolai Timofeev Ivan Filianin Faculty of Infocommunication Technologies ITMO University St. Petersburg Russia Faculty of Software Engineering and Computer Systems ITMO University St. Petersburg Russia
This paper explores methods for employee feedback (EF) collection and introduces a new framework to improve the process. Current feedback collection process often suffers from slow workflow, bias, and poor Artificial ... 详细信息
来源: 评论
Research on AI-Powered Employee Feedback Tools
Research on AI-Powered Employee Feedback Tools
收藏 引用
2025 International Russian Smart Industry Conference, SmartIndustryCon 2025
作者: Babushkin, Konstantin Timofeev, Nikolai Filianin, Ivan ITMO University Faculty of Infocommunication Technologies St. Petersburg Russia ITMO University Faculty of Software Engineering and Computer Systems St. Petersburg Russia
This paper explores methods for employee feedback (EF) collection and introduces a new framework to improve the process. Current feedback collection process often suffers from slow workflow, bias, and poor Artificial ... 详细信息
来源: 评论
Offline Handwriting Signature Verification: A Transfer Learning and Feature Selection Approach
arXiv
收藏 引用
arXiv 2024年
作者: Özyurt, Fatih Majidpour, Jafar Rashid, Tarik A. Koç, Canan Department of Software Engineering Faculty of Engineering Firat University Elazig23119 Turkey Department of Software and Informatics Engineering University of Raparin Kurdistan Region Rania Iraq Department of Computer Science Faculty of Science Soran University Kurdistan Region Soran Iraq Computer Science and Engineering Department University of Kurdistan Hewlêr Erbil Iraq
Handwritten signature verification poses a formidable challenge in biometrics and document authenticity. The objective is to ascertain the authenticity of a provided handwritten signature, distinguishing between genui... 详细信息
来源: 评论
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
收藏 引用
computer Modeling in engineering & Sciences 2024年 第3期138卷 3013-3032页
作者: Chunlin Xiong Zhengqiu Weng Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen518052China Sangfor Technologies Inc. Shenzhen518055China School of Data Science and Artificial Intelligence Wenzhou University of TechnologyWenzhou325035China College of Computer Science&Technology Zhejiang University of TechnologyHangzhou310023China Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Math&Computer Science Department Faculty of ScienceMenofia UniversityShebin El-KomEgypt Computing Science Department University of AberdeenAberdeenUK
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... 详细信息
来源: 评论
HAMI: Hybrid Adaptive AutoML for IoT Intrusion Detection
HAMI: Hybrid Adaptive AutoML for IoT Intrusion Detection
收藏 引用
2025 Communication Strategies in Digital Society Seminar, ComSDS 2025
作者: Saber, Mohamed Gusarova, Natalia Bogatyrev, Vladimir Faculty of Software Engineering and Computer Systems ITMO University St. Petersburg Russia Faculty of Infocommunication Technologies ITMO University St. Petersburg Russia
the growth of IoT devices presents significant security challenges due to their diverse and dynamic environments. To address this, we developed HAMI, a novel intrusion detection system. Our method leverages the GIFS a... 详细信息
来源: 评论
A Robust Methodology for Fruit Quality Prediction and Estimation Using Intelligent Learning Based Image Processing Logic
A Robust Methodology for Fruit Quality Prediction and Estima...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Malathi, K. Babu, Vunnava Dinesh Ramkumar, M. Ayyadurai, M. Vivek, K. Aljawawdeh, Hamzeh J. Saveetha University Department of Cse Chennai India Rv Institute of Technology Department of Cse Guntur India Rajalakshmi Engineering College Department of Computer Science and Engineering Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Department of software engineering Faculty of information technology Zarqa University Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
Fruit quality prediction plays a vital role in agricultural and food industries, ensuring that only high-quality produce reaches the consumer. Traditional methods of assessing fruit quality rely on manual inspection, ... 详细信息
来源: 评论
Internet of Things (IoT): survey of most important security risks
Internet of Things (IoT): survey of most important security ...
收藏 引用
Sciences and Techniques of Automatic Control and computer engineering MI-STA, IEEE International Maghreb Meeting of the Conference on
作者: Ahmed Alaskri Nuredin Ali Salem Ahmed Hala Shaari Software Engineering Dep. Collage of Computer Technology Tripoli Libya Computer Engineering Department Faculty of Engineering Tripoli Libya Web Technologies Department Faculty of Information Tripoli Libya
The Internet of things (IoT) is getting more and more intrusive into our lives until the day comes when everything becomes connected to the Internet. Due to the limited resources and heterogeneous Internet of Things (...
来源: 评论