咨询与建议

限定检索结果

文献类型

  • 2,666 篇 会议
  • 1,370 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,105 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,501 篇 工学
    • 1,967 篇 计算机科学与技术...
    • 1,643 篇 软件工程
    • 485 篇 信息与通信工程
    • 364 篇 控制科学与工程
    • 275 篇 生物工程
    • 222 篇 电气工程
    • 212 篇 生物医学工程(可授...
    • 193 篇 机械工程
    • 167 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 97 篇 仪器科学与技术
    • 96 篇 安全科学与工程
    • 95 篇 化学工程与技术
    • 86 篇 交通运输工程
    • 80 篇 动力工程及工程热...
  • 1,191 篇 理学
    • 644 篇 数学
    • 316 篇 物理学
    • 311 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 159 篇 系统科学
    • 94 篇 化学
  • 815 篇 管理学
    • 505 篇 管理科学与工程(可...
    • 333 篇 图书情报与档案管...
    • 246 篇 工商管理
  • 210 篇 医学
    • 177 篇 临床医学
    • 151 篇 基础医学(可授医学...
    • 93 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 125 篇 法学
    • 100 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 77 篇 教育学
  • 40 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 148 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 92 篇 deep learning
  • 87 篇 feature extracti...
  • 83 篇 computational mo...
  • 83 篇 software
  • 82 篇 accuracy
  • 80 篇 artificial intel...
  • 74 篇 training
  • 65 篇 optimization
  • 64 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 52 篇 security
  • 46 篇 support vector m...
  • 45 篇 internet of thin...
  • 45 篇 software testing
  • 45 篇 data models
  • 44 篇 information tech...

机构

  • 44 篇 college of compu...
  • 42 篇 faculty of compu...
  • 38 篇 faculty of softw...
  • 37 篇 department of so...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 19 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,671 篇 英文
  • 400 篇 其他
  • 32 篇 中文
  • 2 篇 日文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Computer and software Engineering"
4105 条 记 录,以下是691-700 订阅
排序:
Medical Image Analysis of Lung Tumor Diagnosis Based on Generalized Fuzzy C-Means Clustering Algorithm
Medical Image Analysis of Lung Tumor Diagnosis Based on Gene...
收藏 引用
International Conference on Emerging Electronic and Automation Technology 2022, ICEEAT 2022
作者: Zwaid, Jassim Mohammed Ahmed Murad, Masrah Azrifah Azmi Khalid, Fatimah Binti Manshor, Noridayu Al-Jumaily, Abdulmajeed Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Affiliated to University of Anbar Ramadi Iraq Department of Software Engineering and Information System Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Multimedia Department Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Department of Signal Theory and Communications Universidad Carlos III de Madrid Leganés Madrid28911 Spain
In recent years, the rapid development of medical imaging technology has brought medical image analysis into the era of big data. CT imaging technology is one of the most common imaging methods for disease screening. ... 详细信息
来源: 评论
Smart UML - Assignment Management Tool for UML Diagrams  4
Smart UML - Assignment Management Tool for UML Diagrams
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Weerasinghe, D.N.H. Thiwanka, K.A.T. Jayasith, H.B.C. Onella Natalie, P.A.D. Samantha Rajapaksha, U.U. Karunasena, Anuradha Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Information Technology Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
The great majority of manual processes have been automated in the current day. Nonetheless, there is no reliable approach for evaluating UML diagrams for plagiarism and correctness. Unified Modeling Language (UML) pro... 详细信息
来源: 评论
A drug recommendation system based on response prediction: Integrating gene expression and K-mer fragmentation of drug SMILES using LightGBM
收藏 引用
Intelligence-Based Medicine 2025年 11卷 100206-100206页
作者: Naveed, Sajid Husnain, Mujtaba Department of Computer Science Faculty of Computing The Islamia University of Bahawalpur 63100 Pakistan Department of Software Engineering Faculty of Computing The Islamia University of Bahawalpur 63100 Pakistan
Medical experts and physicians examine the gene expression abnormality in glioblastoma (GBM) cancer patients to identify the drug response. The main objective of this research is to build a machine learning (ML) based... 详细信息
来源: 评论
The Role of AI in Predictive UX Shaping the Future of Metaverse Interactions
The Role of AI in Predictive UX Shaping the Future of Metave...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Nedal Nwasra Khalil Omar Zahid Hussain Qaisar Software Engineering Department University of Petra Amman Jordan Faculty of Computing & Emerging Technologies Multan Pakistan Computer Science Department University of Petra Amman Jordan
The Metaverse is defined as a collectively shared, persistent, and contextualized virtual space that will drive next-generation digital interaction facilitated by enhanced extended reality (XR) and edge computing. One... 详细信息
来源: 评论
Automating Bad Smell Detection in Goal Refinement of Goal Models
Automating Bad Smell Detection in Goal Refinement of Goal Mo...
收藏 引用
作者: Hayashi, Shinpei Asano, Keisuke Saeki, Motoshi Department of Computer Science Tokyo Institute of Technology Tokyo152–8550 Japan Department of Software Engineering Faculty of Science and Technology Nanzan University Nagoya-shi466–8673 Japan
Goal refinement is a crucial step in goal-oriented requirements analysis to create a goal model of high quality. Poor goal refinement leads to missing requirements and eliciting incorrect requirements as well as less ... 详细信息
来源: 评论
Facial Recognition Utilizing the CLM Model and Supervised Machine Learning: A Comparative Analysis  25
Facial Recognition Utilizing the CLM Model and Supervised Ma...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Iqtait, Musab Ababneh, Jafar Abu-Jassar, Amer Al-Refai, Mohammad Dmour, Mohammad Arabiat, Mohammad Binsaddig, Ruaa Zarqa University Faculty of Information Technology Department of Artificial Intelligence Zarqa Jordan Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan Amman Arab University University College of of Computer Sciences and Information Amman Jordan Zarqa University Faculty of Information Technology Software Engineering Department Zarqa Jordan University of Business and Technology College of Business Administration Department of Finance Jeddah21432 Saudi Arabia
Facial recognition is a common challenge in artificial intelligence. We extensively utilized this program in our daily life. Face recognition software was implemented on many phones to protect user identities and prom... 详细信息
来源: 评论
QianXun: A Novel Enterprise File Search Framework  25
QianXun: A Novel Enterprise File Search Framework
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Si, Chun Qi, Peng Xue, Hongjia Sun, Yan Beijing University of Posts and Telecommunications Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing100876 China University of Nottingham Computer Science Faculty of Science and Engineering United Kingdom
With the deepening of the digital transformation, enterprises have accumulated plenty of electronic files. For users, how to quickly find their desired files from the massive resources is a big challenge, which is als... 详细信息
来源: 评论
Intrusion Detection in Smart IoT Devices for People with Disabilities  8
Intrusion Detection in Smart IoT Devices for People with Dis...
收藏 引用
8th IEEE International Smart Cities Conference, ISC2 2022
作者: Naveed, Muhammad Usman, Syed Muhammad Satti, Muhammad Islam Aleshaiker, Sama Anwar, Aamir Shaheed Zulfikar Ali Bhutto Institute of Science and Technology Department of Computer Science Islamabad Pakistan Ai Air University Faculty of Computing Department of Creative Technologies Islamabad Pakistan Riphah University Faculty of Computer Science and Software Engineering Islamabad Pakistan School of Computing & Engineering University of West London London United Kingdom
An intrusion Detection System (IDS) is a system that resides inside the network and monitors all incoming and outgoing traffic. It prevents unethical activities from happening over the network. With the use of IoT dev... 详细信息
来源: 评论
Eliciting Requirements from Stakeholders’ Responses Using Natural Language Processing
收藏 引用
computer Modeling in engineering & Sciences 2021年 第4期127卷 99-116页
作者: Mohammed Lafi Bilal Hawashin Shadi AlZu’bi Department of Software Engineering Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan Department of Computer Information Systems Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan Department of Computer Science Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan
Most software systems have different stakeholders with a variety of *** process of collecting requirements from a large number of stakeholders is vital but *** propose an efficient,automatic approach to collecting req... 详细信息
来源: 评论
Detection of Android Malware using Machine Learning
Detection of Android Malware using Machine Learning
收藏 引用
2021 International Mobile, Intelligent, and Ubiquitous Computing Conference, MIUCC 2021
作者: Fiky, Ahmed Hashem El Elshenawy, Ayman Madkour, Mohamed Ashraf Al-Azhar University Systems and Computer Engineering Faculty of Engineering Cairo Egypt Software Engineering and Information Technology Department Faculty of Engineering and Technology Egyptian Chinees University Cairo Egypt
Nowadays, smartphones became an integral part of human life due to the great necessity for their daily activities. Most smartphone users are downloading and installing mobile apps without worrying about security. Ther... 详细信息
来源: 评论