咨询与建议

限定检索结果

文献类型

  • 1,962 篇 会议
  • 1,235 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,047 篇 工学
    • 1,617 篇 计算机科学与技术...
    • 1,360 篇 软件工程
    • 385 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 226 篇 生物工程
    • 178 篇 电气工程
    • 169 篇 生物医学工程(可授...
    • 155 篇 机械工程
    • 131 篇 电子科学与技术(可...
    • 124 篇 光学工程
    • 83 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 952 篇 理学
    • 528 篇 数学
    • 250 篇 生物学
    • 237 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 133 篇 系统科学
    • 71 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 185 篇 工商管理
  • 183 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 109 篇 法学
    • 85 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 53 篇 教育学
  • 35 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 software enginee...
  • 102 篇 computer science
  • 93 篇 deep learning
  • 90 篇 machine learning
  • 72 篇 accuracy
  • 67 篇 software
  • 66 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 55 篇 training
  • 51 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 46 篇 security
  • 44 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 39 篇 real-time system...
  • 36 篇 convolutional ne...

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 33 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 17 篇 muhammad adnan k...
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 2,880 篇 英文
  • 348 篇 其他
  • 25 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3255 条 记 录,以下是1081-1090 订阅
排序:
Machine learning for Autopsy reports Forensic using Text Classification Techniques  2
Machine learning for Autopsy reports Forensic using Text Cla...
收藏 引用
2nd International Conference on Computing and Information Technology, ICCIT 2022
作者: Shahid, Muhammad Rehman Munir, Asim Ifraheem, Layeba Aldabbas, Hamza Wadood, Abdul Alwada'n, Tariq University of Faisalabad Departmental of Computational Sciences Faislabad Pakistan International Islamic University Department of Computer Science and Software Engineering Islamabad Pakistan Al-Balqa Applied University Prince Abdullah Bin Ghazi Faculty of Information and Communication Technology Al-Salt Jordan School of Computing Engineering Digital Technologies Teesside University Middlesbrough United Kingdom
A forensic autopsy is a surgical process in which experts collect a deceased body's internal and external information. These death certificates are the source of timely warnings of an increase in disease activity.... 详细信息
来源: 评论
Sparsity Aware of TF-IDF Matrix to Accelerate Oblivious Document Ranking and Retrieval
Sparsity Aware of TF-IDF Matrix to Accelerate Oblivious Docu...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Zeshi Zhang Guangping Xu Hongzhang Yang Yulei Wu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Ministry of Education Key Laboratory of Computer Vision and System China Faculty of Engineering University of Bristol Bristol U.K.
Due to cloud security concerns, there is an increasing interest in information retrieval systems that can support private queries over public documents. It is desirable for oblivious document ranking and retrieval in ... 详细信息
来源: 评论
Heterogeneous Multi-commodity Network Flows over Time  1
收藏 引用
17th International computer science Symposium in Russia, CSR 2022
作者: Li, Yifen Bei, Xiaohui Qiao, Youming Tao, Dacheng Chen, Zhiya School of Traffic and Transportation Engineering Central South University Changsha China School of Physical and Mathematical Sciences Nanyang Technological University Singapore Singapore Centre for Quantum Software and Information University of Technology Sydney Ultimo Australia UBTECH Sydney AI Centre School of Computer Science Faculty of Engineering The University of Sydney DarlingtonNSW2008 Australia
In the 1950’s, Ford and Fulkerson introduced dynamic flows by incorporating the notion of time into the network flow model (Oper. Res., 1958). In this paper, motivated by real-world applications including route plann... 详细信息
来源: 评论
EEG Feature Extraction with Fast Fourier Transform for Investigating different Brain regions in Cognitive and Reasoning Activity  5
EEG Feature Extraction with Fast Fourier Transform for Inves...
收藏 引用
5th IEEE International Symposium in Robotics and Manufacturing Automation, ROMA 2022
作者: Amin, Hafeez Ullah Hafeez, Yasir Reza, Mohammed Faruque Adil, Syed Hasan Hasan, Rumaisa Abu Ali, Syed Saad Azhar University of Nottingham Malaysia School of Computer Science Faculty of Science and Engineering Semenyih43500 Malaysia Universiti Sains Malaysia Dept. of Neurosciences Kota Bharu Kubang Kerian Malaysia Iqra University Software Engineering Department Karachi Pakistan Universiti Teknologi Petronas Centre for Intelligent Signal and Imaging Research Electrical and Electronics Engineering Department Perak Seri Iskandar32610 Malaysia King Fahd University of Petroleum and Minerals Aerospace Engineering Department Dhahran31261 Saudi Arabia
In this study, cortical brain activity during a pattern matching task (PMT) was measured by employing electroencephalography (EEG). The EEG data were recorded from 128 scalp locations during a pattern-matching task an... 详细信息
来源: 评论
A Fuzzy Logic-Based Computational Framework for Precision Triage in Androgenetic Alopecia: A Simulated Biomarker-Driven Approach
收藏 引用
International Journal of Computational Intelligence Systems 2025年 第1期18卷 1-30页
作者: Al-Samarraay, Mohammed S. Magableh, Aws A. Mahmood, Rana I. Joudar, Shahad Sabbar Zahid, Idrees A. Al-Obaidi, Jameel R. Al-Saffar, Ali Z. Albahri, A. S. Albahri, O. S. Alamoodi, A. H. Abdullah, Mohd Faizal Nizam Lee Electrical and Electronic Engineering Department College of Engineering Gulf University Sanad Bahrain Faculty of Information Technology and Computer Sciences Department of Information Systems Yarmouk University Irbid Jordan Department of Software Engineering Prince Sultan University Riyadh Saudi Arabia Department of Biomedical Engineering College of Engineering Al-Nahrain University Jadriya Baghdad Iraq University of Technology Baghdad Iraq Department of Biology Faculty of Science and Mathematics Universiti Pendidikan Sultan Idris Tanjong Malim Malaysia Applied Science Research Center Applied Science Private University Amman Jordan Department of Molecular and Medical Biotechnology College of Biotechnology Al-Nahrain University Baghdad Iraq Technical Engineering College Imam Ja’afar Al-Sadiq Baghdad Iraq University of Information Technology and Communications (UOITC) Baghdad Iraq Computer Techniques Engineering Department Mazaya University College Nasiriyah Iraq Victorian Institute of Technology Melbourne Australia GUST Engineering and Applied Innovation Research Center (GEAR) Gulf University for Science and Technology Mishref Kuwait Department of Mathematics Faculty of Science and Mathematics Universiti Pendidikan Sultan Idris Tanjong Malim Malaysia
Androgenetic alopecia (AGA) is a common cause of hair loss affecting both men and women. Although its precise etiology remains uncertain, genetic and hormonal factors are recognized as major contributors. This study i...
来源: 评论
Towards Survivable In-Memory Stores with Parity Coded NVRAM
Towards Survivable In-Memory Stores with Parity Coded NVRAM
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Zhixuan Wang Guangping Xu Hongzhang Yang Yulei Wu School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Faculty of Engineering University of Bristol Bristol U.K.
Erasure codes have been widely applied to in-memory key-value storage systems for high reliability and low redundancy. In distributed in-memory key-value storage systems, update operations are relatively frequent, esp... 详细信息
来源: 评论
Multi-View Ensemble Learning for Robust Graph Convolutional Networks
SSRN
收藏 引用
SSRN 2022年
作者: Wu, Tao Luo, Junhui Xiao, Min Xian, Xingping Wang, Chao Yuan, Lin Qiao, Shaojie Song, Xiuli School of Cybersecurity and Information Law Chongqing University of Posts and Telecommunications Chongqing China School of Computer and Information Science Chongqing Normal University Chongqing China School of Software Engineering Chengdu University of Information Technology Chengdu China
Graph neural networks (GNNs) have received extensive attention owing to the remarkable expressive power of graphs in various research areas. However, recent studies have shown that they are vulnerable to adversarial a... 详细信息
来源: 评论
Single Loop Control of a Common DC-Bus-Configured Traction Motor Emulator Using State Feedback Linearization Method
Single Loop Control of a Common DC-Bus-Configured Traction M...
收藏 引用
2021 IEEE Southern Power Electronics Conference, SPEC 2021
作者: Kadam, Arvind H. Williamson, Sheldon S. Group Faculty of Engineering and Applied Science Department of Electrical Computer and Software Engineeirng 2000 Simcoe Street North OshawaONL1G 0C5 Canada
Nowadays, the LCL (inductor-capacitor-inductor) filter is an integral part of every power electronic converter system operating on current control. Though higher order, the LCL filter due to its high harmonic suppress... 详细信息
来源: 评论
Comparison of Epilepsy Induced by Ischemic Hypoxic Brain Injury and Hypoglycemic Brain Injury using Multilevel Fusion of Data Features
arXiv
收藏 引用
arXiv 2024年
作者: Kadem, Sameer Sami, Noor Elaraby, Ahmed Alyousif, Shahad Jalil, Mohammed Altaee, M. Almusawi, Muntather Ghany, Ismaeel A. Kareem, Ali Kamil Kamalrudin, Massila Ftaiet, Adnan Allwi Dijlah University College Baghdad Iraq Department of Computer Engineering Techniques Mazaya University College Th Qar Iraq Department of Computer Science Faculty of Computer Science and Information South Valley University Qena Egypt Department Of Cybersecurity College of Engineering and Information Technology Buraydah Private Colleges Buraydah Saudi Arabia Department of Electrical and Electronic Engineering College of Engineering Gulf University Sanad26489 Bahrain Research centre Northampton University Faculty of Engineering Department of Electrical and Electronics Engineering University Drive Northampton NN1 5PH United Kingdom Department of Computer Science Alturath University College Baghdad Iraq Department of Medical Engineering Techniques Alfarahidi University Baghdad Iraq College of Technical Engineering The Islamic University Najaf Iraq Computer Technology Engineering College of Engineering Technology Al-Kitab University Iraq Department of Biomedical Engineering Al-Mustaqbal University College Hillah51001 Iraq Faculty of Information & Communication Technology Universiti Teknikal Malaysia Melaka Durian Tunggal Melaka75450 Malaysia Medical Instruments Engineering Techniques National University of Science and Technology Thi Qar Iraq
The study aims to investigate the similarities and differences in the brain damage caused by Hypoxia-Ischemia (HI), Hypoglycemia, and Epilepsy. Hypoglycemia poses a significant challenge in improving glycemic regulati... 详细信息
来源: 评论
Design and FPGA Implementation of the Henon Chaotic Map for Image Encryption
Design and FPGA Implementation of the Henon Chaotic Map for ...
收藏 引用
International Conference on Information and Communication Systems (ICICS)
作者: Eyad Taqieddin Dheya Mustafa Ahmed Shatnawi Osama Al-Khaleel Christos Papachristou Network Eng. and Security Department Jordan University of Science and Tech. Irbid Jordan Dept. Of Computer Engineering Faculty of Engineering The Hashemite University Zarqa Jordan Software Engineering Department Jordan University of Science and Tech. Irbid Jordan Computer Engineering Department Jordan University of Science and Tech. Irbid Jordan ECSE Department Case Western Reserve University Cleveland Ohio USA
Due to the ever increasing usage of multimedia content sharing and the inherent nature of the insecure links used for transmission, it is quite necessary to provide a fast and secure encryption algorithm. Current symm...
来源: 评论