咨询与建议

限定检索结果

文献类型

  • 2,662 篇 会议
  • 1,376 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,519 篇 工学
    • 1,982 篇 计算机科学与技术...
    • 1,655 篇 软件工程
    • 490 篇 信息与通信工程
    • 370 篇 控制科学与工程
    • 275 篇 生物工程
    • 227 篇 电气工程
    • 211 篇 生物医学工程(可授...
    • 196 篇 机械工程
    • 168 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 95 篇 仪器科学与技术
    • 95 篇 化学工程与技术
    • 95 篇 安全科学与工程
    • 87 篇 交通运输工程
    • 81 篇 动力工程及工程热...
  • 1,197 篇 理学
    • 647 篇 数学
    • 319 篇 物理学
    • 311 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 161 篇 系统科学
    • 93 篇 化学
  • 821 篇 管理学
    • 510 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 249 篇 工商管理
  • 212 篇 医学
    • 178 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 128 篇 法学
    • 101 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 75 篇 教育学
  • 41 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 147 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 95 篇 deep learning
  • 88 篇 feature extracti...
  • 84 篇 computational mo...
  • 84 篇 accuracy
  • 83 篇 software
  • 80 篇 artificial intel...
  • 73 篇 training
  • 66 篇 optimization
  • 63 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 51 篇 security
  • 46 篇 support vector m...
  • 45 篇 software testing
  • 44 篇 internet of thin...
  • 44 篇 information tech...
  • 44 篇 testing

机构

  • 45 篇 college of compu...
  • 40 篇 faculty of compu...
  • 37 篇 department of so...
  • 37 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 huaiyin institut...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 18 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,887 篇 英文
  • 187 篇 其他
  • 30 篇 中文
  • 3 篇 土耳其文
  • 2 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Computer and Software Engineering"
4107 条 记 录,以下是721-730 订阅
排序:
Modified Metaheuristics with Transfer Learning Based Insect Pest Classification for Agricultural Crops
收藏 引用
computer Systems Science & engineering 2023年 第9期46卷 3847-3864页
作者: Saud Yonbawi Sultan Alahmari T.Satyanarayana murthy Ravuri Daniel E.Laxmi Lydia Mohamad Khairi Ishak Hend Khalid Alkahtani Ayman Aljarbouh Samih M.Mostafa Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia King Abdul Aziz City for Science and Technology RiyadhKingdom of Saudi Arabia Chaitanya Bharathi Institute of Technology HyderabadTelanganaIndia Department of Computer Science and Engineering Prasad V.Potluri Siddhartha Institute of TechnologyVijayawadaIndia Department of Computer Science and Engineering GMR Institute of TechnologyAndhra PradeshRajamIndia School of Electrical and Electronic Engineering Engineering CampusUniversiti Sains Malaysia(USM)Nibong TebalPenangMalaysia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversitySaudi Arabia Department of Computer Science University of Central AsiaNarynKyrgyzstan Faculty of Computers and Information South Valley UniversityQenaEgypt
Crop insect detection becomes a tedious process for agronomists because a substantial part of the crops is damaged,and due to the pest attacks,the quality is *** are the major reason behind crop quality degradation an... 详细信息
来源: 评论
Tools for Refactoring to Microservices: A Preliminary Usability Report
arXiv
收藏 引用
arXiv 2023年
作者: Fritzsch, Jonas Correia, Filipe Bogner, Justus Wagner, Stefan Institute of Software Engineering University of Stuttgart Germany Faculty of Engineering University of Porto Portugal Department of Computer Science Vrije Universiteit Amsterdam Netherlands
While Microservices are a preferred choice for modern cloud-based applications, the migration and architectural refactoring of existing legacy systems is still a major challenge in industry. To address this, academia ... 详细信息
来源: 评论
Real-time Efficacy of Features Extraction using Machine Learning and Deep Learning for Frontal Alpha Asymmetry.  5
Real-time Efficacy of Features Extraction using Machine Lear...
收藏 引用
5th IEEE International Symposium in Robotics and Manufacturing Automation, ROMA 2022
作者: Hafeez, Yasir Ali, Syed Saad Azhar Amin, Hafeez Ullah Naqvi, Syed Faraz Adil, Syed Hasan Boon, Tang Tong University of Nottingham Malaysia School of Computer Science Faculty of Science and Engineering Semenyih43500 Malaysia Universiti Teknologi Petronas Centre for Intelligent Signal and Imaging Research Electrical and Electronics Engineering Department Perak Seri Iskandar32610 Malaysia University of Nottingham Malaysia Faculty of Science and Engineering School of Computer Science Semenyih43500 Malaysia Iqra University Software Engineering Department Karachi Pakistan
The frontal alpha asymmetry represents as the neuromarker for stress. Stress is the psycho-physiological state of brain in response to some event or a demand. The continuous monitoring of mental stress is necessary to... 详细信息
来源: 评论
Suggestion Mining from Opinionated Text of Big Social Media Data
收藏 引用
computers, Materials & Continua 2021年 第9期68卷 3323-3338页
作者: Youseef Alotaibi Muhammad Noman Malik Huma Hayat Khan Anab Batool Saif ul Islam Abdulmajeed Alsufyani Saleh Alghamdi Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversitySaudi Arabia Department of Computer Science Faculty of Engineering and Computer SciencesNational University of Modern LanguagesIslamabadPakistan Department of Software Engineering Faculty of Engineering and Computer SciencesNational University of Modern LanguagesIslamabadPakistan Department of Computer Sciences Institute of Space TechnologyIslamabadPakistan Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaifSaudi Arabia
:Social media data are rapidly increasing and constitute a source of user opinions and tips on a wide range of products and *** increasing availability of such big data on biased reviews and blogs creates challenges f... 详细信息
来源: 评论
UVM Based Verification Framework for Deep Learning Hardware Accelerator: Case Study
UVM Based Verification Framework for Deep Learning Hardware ...
收藏 引用
Electrical, computer and Energy Technologies (ICECET), International Conference on
作者: Randa Aboudeif Tasneem A. Awaad Mohamed AbdElsalam Yehea Ismail Electronics and Communications Engineering Department The American University in Cairo Siemens Digital Industries Software Cairo Egypt Department of Computer and Systems Engineering Faculty of Engineering Siemens Digital Industries Software Ain Shams University Cairo Egypt Siemens Digital Industries Software Cairo Egypt Electronics and Communications Engineering Department The American University in Cairo Cairo Egypt
Hardware Verification of Deep Learning Accelerators (DLAs) has become critically important for testing the reliability and trustworthiness of Learning Enabled Autonomous Systems (LEAS). In this paper, we introduce a s... 详细信息
来源: 评论
Expert Phishing Detection System
Expert Phishing Detection System
收藏 引用
2024 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology, IAICT 2024
作者: Alsarhan, Ayoub Al-Aiash, Issa Al-Fraihat, Dimah Aljaidi, Mohammad Abu Laila, Dena Abd Al Hakem Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Cybersecurity Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman11622 Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa13110 Jordan Department of Cyber Security Faculty of Information Technology Zarqa Technical Intermediate College Zarqa Jordan
Phishing attacks are a threat that continuously emphasizes the need for effective detection methods. This paper presents a machine learning detection method that employs a random forest classifier, which is an adaptab... 详细信息
来源: 评论
Digital Platform to Empower the Self-Employment in Sri Lanka  6
Digital Platform to Empower the Self-Employment in Sri Lanka
收藏 引用
6th International Conference on Information Technology Research, ICITR 2021
作者: Wickramasinghe, H.C.P. Thebuwana, T.D. Wijesinghe, G.K.H.S. Dissanayake, U.N. Kodagoda, Nuwan Suriyawansa, Kushnara Faculty of Computing Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Sri Lanka
Unemployment is a huge problem around the world because a lack of job opportunities. People are unable to find the job opportunities according to their preferences and qualifications. As a solution for this, many coun... 详细信息
来源: 评论
Intelligent Model for Predicting the Quality of Services Violation
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 3607-3619页
作者: Muhammad Adnan Khan Asma Kanwal Sagheer Abbas Faheem Khan T.Whangbo Pattern Recognition and Machine Learning Lab. Department of SoftwareGachon UniversitySeongnamGyeonggido13120Korea Riphah School of Computing&Innovation Faculty of ComputingRiphah International University Lahore CampusLahore54000Pakistan School of Computer Science National College of Business Administration and EconomicsLahore54000Pakistan Department of Computer Engineering Gachon UniversitySeongnam13557Korea
Cloud computing is providing IT services to its customer based on Service level agreements(SLAs).It is important for cloud service providers to provide reliable Quality of service(QoS)and to maintain SLAs *** service ... 详细信息
来源: 评论
Impact of Artificial Intelligence on software engineering Phases and Activities (2013–2024): A Quantitative Analysis Using Zero- Truncated Poisson Model
收藏 引用
IEEE Access 2025年 13卷 95535-95547页
作者: Usman Khan Durrani Mustafa Akpinar Hakan Bektas Mohammed Saleh Faculty of Computer and Information Sciences Higher Colleges of Technology Abu Dhabi United Arab Emirates Software Engineering Department Sakarya University Sakarya Türkiye Department of Econometrics Istanbul University Istanbul Türkiye
This paper presents the results of a quantitative analysis derived from data collected in our earlier systematic literature review, focusing on integrating Artificial Intelligence (AI) techniques across various phases... 详细信息
来源: 评论
Stakeholder Identification Overview and Challenges in Requirements engineering Prospective  2
Stakeholder Identification Overview and Challenges in Requir...
收藏 引用
2nd International Conference on Computing and Information Technology, ICCIT 2022
作者: Elneel, Duha Awad Fakharudin, Abdul Sahli Ahmed, Elsadig Musa Kahtan, Hasan Abdullateef, Mansoor Universiti Malaysia Pahang Faculty of Computing Kuantan26300 Malaysia Multimedia University Faculty of Business Melaka Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur50603 Malaysia Knowbis Solutions Consultancy Selangor Malaysia
Stakeholder identification (SI) illustrates a critical part of the requirements elicitation activity. It helps software analysts gather accurate system requirements to ensure high quality and avoid system failure. Sta... 详细信息
来源: 评论