咨询与建议

限定检索结果

文献类型

  • 2,666 篇 会议
  • 1,370 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,105 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,501 篇 工学
    • 1,967 篇 计算机科学与技术...
    • 1,643 篇 软件工程
    • 485 篇 信息与通信工程
    • 364 篇 控制科学与工程
    • 275 篇 生物工程
    • 222 篇 电气工程
    • 212 篇 生物医学工程(可授...
    • 193 篇 机械工程
    • 167 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 97 篇 仪器科学与技术
    • 96 篇 安全科学与工程
    • 95 篇 化学工程与技术
    • 86 篇 交通运输工程
    • 80 篇 动力工程及工程热...
  • 1,191 篇 理学
    • 644 篇 数学
    • 316 篇 物理学
    • 311 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 159 篇 系统科学
    • 94 篇 化学
  • 815 篇 管理学
    • 505 篇 管理科学与工程(可...
    • 333 篇 图书情报与档案管...
    • 246 篇 工商管理
  • 210 篇 医学
    • 177 篇 临床医学
    • 151 篇 基础医学(可授医学...
    • 93 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 125 篇 法学
    • 100 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 77 篇 教育学
  • 40 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 148 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 92 篇 deep learning
  • 87 篇 feature extracti...
  • 83 篇 computational mo...
  • 83 篇 software
  • 82 篇 accuracy
  • 80 篇 artificial intel...
  • 74 篇 training
  • 65 篇 optimization
  • 64 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 52 篇 security
  • 46 篇 support vector m...
  • 45 篇 internet of thin...
  • 45 篇 software testing
  • 45 篇 data models
  • 44 篇 information tech...

机构

  • 44 篇 college of compu...
  • 42 篇 faculty of compu...
  • 38 篇 faculty of softw...
  • 37 篇 department of so...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 19 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,671 篇 英文
  • 400 篇 其他
  • 32 篇 中文
  • 2 篇 日文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Computer and software Engineering"
4105 条 记 录,以下是751-760 订阅
排序:
Practical Secure Heterogeneous Communication for Internet of Things
SSRN
收藏 引用
SSRN 2022年
作者: Jin, Chunhua Zhu, Huihui Qin, Wenyu Chen, Zhiwei Jin, Ying Shan, Jinsong Faculty of Computer & Software Engineering Huaiyin Institute of Technology Huai’an233003 China
Internet of things (IoT) is a promising network that combines various information sensing devices with the Internet to realize the interconnection of pervasive things. Security is a pivotal issue to ensure widespread ... 详细信息
来源: 评论
An software Defined Networking (SDN) Enhanced Edge Computing Framework for Internet of Healthcare Things (IoHT)
An Software Defined Networking (SDN) Enhanced Edge Computing...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Dang Van Anh Abdellah Chehri Nguyen Minh Quy Chu Thi Minh Hue Dinh C. Nguyen Vu Khanh Quy Faculty of Information Technology Hung Yen University of Technology and Education Vietnam Department of Mathematics and Computer Science Royal Military College of Canada Kingston Canada Faculty of Software Engineering FPT University Hanoi Vietnam Department of Electrical and Computer Engineering The University of Alabama in Huntsville Alabama USA
The rapid proliferation of intelligent Internet of Health Things (IoHT) applications within the context of the COVID-19 pandemic has exerted significant strain on the backhaul network infrastructure. This paper aims t... 详细信息
来源: 评论
Image Classification Analysis to Identify the Tourism Potential Sukabumi on Instagram Using A Deep Learning Approach
Image Classification Analysis to Identify the Tourism Potent...
收藏 引用
International Conference on Informatics and Computing (ICIC)
作者: Falentino Sembiring Rieska Rahayu Ayuningsih Muhamad Muslih Muhammad Andy Maulana Gina Wahdayani Futri Mohd Zainuri Saringat Rachma Siva Ainunnisa Anggun Fergina Information Systems Nusa Putra University Sukabumi Indonesia Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn Malaysia
This research focuses on image classification, grouping images based on shared characteristics. The study aims to identify the highest-potential category within various fields, from high to low potential. By understan... 详细信息
来源: 评论
Cyberbullying Detection and Recognition with Type Determination Based on Machine Learning
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 5307-5319页
作者: Khalid M.O.Nahar Mohammad Alauthman Saud Yonbawi Ammar Almomani Computer Science Department Yarmouk UniversityIrbidJordan Department of Information Security Faculty of Information TechnologyUniversity of PetraAmmanJordan Software Engineering Department University of JeddahJeddahKSA Research and Innovation Department Skyline University CollegeP.O.Box 1797SharjahUAE IT Department-Al-Huson University College Al-Balqa Applied UniversityP.O.Box 50IrbidJordan
Social media networks are becoming essential to our daily activities,and many issues are due to this great involvement in our *** is a social media network issue,a global crisis affecting the victims and society as a ... 详细信息
来源: 评论
Experimental Evaluation of Cross-Platform Recognition of Identical and Unknown Users over Social Networking Environment
Experimental Evaluation of Cross-Platform Recognition of Ide...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Nagababu, Kancharla Ananthi, S. Sunheriya, Neeraj Venkata Siva Prasad, Ch. Jayanthi, J. Fawareh, Hamed Aditya University Department of Computer Applications Surampalem India St. Joseph's College of Engineering Department of Cse Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Jeppiaar Engineering College Department of Ece Rajiv Gandhi salai Chennai119 India Sona College of Technology Department of Cse Salem India Zarqa University Faculty of Information Technology Software Engineering Dept Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
The capacity to individually identify and categorize people across sites and apps is vital for trustworthiness, fraud prevention, and personalized experiences in online social networking. In this study, strategies for... 详细信息
来源: 评论
Tor Network Detection by Using Machine Learning and Artificial Neural Network
Tor Network Detection by Using Machine Learning and Artifici...
收藏 引用
2021 International Symposium on Networks, computers and Communications, ISNCC 2021
作者: Soykan, Murat Boluk, Pinar Sarisaray Bahcesehir University Graduate Education Institute Computer Engineering Istanbul Turkey Bahcesehir University Faculty Of Engineering And Natural Sciences Software Engineering Istanbul Turkey
The Internet is a virtual world where everyone can express themselves as much as they wish and perform the operations they want. In this virtual world, some users want to experience the internet without giving their i... 详细信息
来源: 评论
Research and development of two-factor authentication methods using neural networks  4
Research and development of two-factor authentication method...
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Darbek, Temirkhan Mukasheva, Assel Bissembayev, Alibek Gnatyuk, Sergiy Mukammejanova, Dinargul The Department of Information Systems and Cybersecurity Almaty university of power engineering and telecommunications Almaty Kazakhstan The School of Information Technology and Engineering Kazakh-British Technical University Almaty Kazakhstan The School of Information Technology and Engineering Kazakh British Technical University Almaty Kazakhstan The Faculty of Cybersecurity Computer and Software Engineering at National Aviation University National Aviation University Kyiv Ukraine The Department of Artificial Intelligence and Big Data Kazakh National University named after Al-Farabi Almaty Kazakhstan
This article is devoted to the research and development of innovative two-factor authentication (2FA) methods using neural networks. 2FA plays a key role in ensuring the security of data and accounts in the modern dig... 详细信息
来源: 评论
Soft Computing Based Metaheuristic Algorithms for Resource Management in Edge Computing Environment
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 5233-5250页
作者: Nawaf Alhebaishi Abdulrhman M.Alshareef Tawfiq Hasanin Raed Alsini Gyanendra Prasad Joshi Seongsoo Cho Doo Ill Chul Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science and Engineering Sejong UniversitySeoulKorea School of Software Soongsil UniversitySeoul06978Korea Artificial Intelligence Education Hankuk University of Foreign StudiesDongdaemun-guSeoul02450Korea
In recent times,internet of things(IoT)applications on the cloud might not be the effective solution for every IoT scenario,particularly for time sensitive applications.A significant alternative to use is edge computi... 详细信息
来源: 评论
Reinforcement-Learning Based Method for Accelerating Functional Coverage Closure of Traffic Light Controller Dynamic Digital Design  32
Reinforcement-Learning Based Method for Accelerating Functio...
收藏 引用
32nd International Conference on computer Theory and Applications, ICCTA 2022
作者: Halim, Youstina M. Ismail, Khaled A. Abd El Ghany, Mohamed A. Ibrahim, Sameh A. Halim, Youssef M. Ain Shams University Faculty of Engineering Mixel Egypt. Electronics and Communications Engineering Dept. Cairo Egypt Germany Electronics Department German University in Cairo Egypt Integrated Electronic Systems Lab Tu Darmstadt Germany Ain Shams University Faculty of Engineering Electronics and Communications Engineering Department Cairo Egypt Ain Shams University Faculty of Engineering Computer Engineering and Software Systems Dept. Cairo Egypt
Functional verification of digital designs is an increasingly complex and time-consuming endeavor. One of the major challenges in functional verification is achieving functional coverage closure in a timely manner. Ve... 详细信息
来源: 评论
The Correlation Between Architecture Smells, Package Stability and Reusability: A Case Study
The Correlation Between Architecture Smells, Package Stabili...
收藏 引用
Sciences and Techniques of Automatic Control and computer engineering MI-STA, IEEE International Maghreb Meeting of the Conference on
作者: Mrwan BenIdris Ehab A. Omar Elfallah Marwa Aslam Cheema Mohammed Salah Addin Alsma Tareq Ziad Kadiki Abdelfattah Elbarsha Dep. of Computer Science Faculty of Information Technology University of Benghazi Dept. of Software Engineering Faculty of Information Technology Libyan International Medical University Health Informatics Department Faculty of Public Health University of Benghazi
the design decisions made in the architecture of a software system are essential to its maintainability, and thus its quality is of great importance. Architecture smells (ASs) can be used to identify any quality issue... 详细信息
来源: 评论