咨询与建议

限定检索结果

文献类型

  • 1,971 篇 会议
  • 1,256 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,077 篇 工学
    • 1,644 篇 计算机科学与技术...
    • 1,376 篇 软件工程
    • 401 篇 信息与通信工程
    • 327 篇 控制科学与工程
    • 226 篇 生物工程
    • 191 篇 电气工程
    • 169 篇 生物医学工程(可授...
    • 156 篇 机械工程
    • 132 篇 电子科学与技术(可...
    • 126 篇 光学工程
    • 87 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 82 篇 网络空间安全
    • 78 篇 仪器科学与技术
    • 75 篇 化学工程与技术
  • 965 篇 理学
    • 532 篇 数学
    • 251 篇 生物学
    • 241 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 133 篇 系统科学
    • 73 篇 化学
  • 675 篇 管理学
    • 413 篇 管理科学与工程(可...
    • 286 篇 图书情报与档案管...
    • 188 篇 工商管理
  • 186 篇 医学
    • 152 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 87 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 113 篇 法学
    • 88 篇 社会学
  • 77 篇 经济学
    • 76 篇 应用经济学
  • 54 篇 教育学
  • 35 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 software enginee...
  • 102 篇 computer science
  • 97 篇 deep learning
  • 93 篇 machine learning
  • 73 篇 accuracy
  • 68 篇 artificial intel...
  • 67 篇 software
  • 61 篇 computational mo...
  • 60 篇 feature extracti...
  • 56 篇 training
  • 51 篇 internet of thin...
  • 49 篇 information tech...
  • 49 篇 predictive model...
  • 47 篇 security
  • 46 篇 semantics
  • 44 篇 data mining
  • 43 篇 optimization
  • 41 篇 support vector m...
  • 39 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 33 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 17 篇 muhammad adnan k...
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 12 篇 ahmed bestoun s.
  • 12 篇 ghassan samara

语言

  • 2,767 篇 英文
  • 492 篇 其他
  • 25 篇 中文
  • 2 篇 日文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3285 条 记 录,以下是1091-1100 订阅
排序:
Improving WiFi Fingerprint Database With Irregular Distribution of Reference Points Using Interpolation Methods
Improving WiFi Fingerprint Database With Irregular Distribut...
收藏 引用
International Conference on Advanced Technologies for Communications, ATC
作者: Trung Vu-Thanh Jing He Ninh Duong-Bao Seon-Woo Lee Luong Nguyen Thi Khanh Nguyen-Huu College of Computer Science and Electronic Engineering Hunan University Changsha China Faculty of Mathematics and Informatics Dalat University Dalat Vietnam Division of Software Hallym University Chuncheon Korea Faculty of Information Technology Dalat University Dalat Vietnam Department of Electronics and Telecommunications Dalat University Dalat Vietnam
Using WiFi Fingerprinting for indoor positioning is becoming increasingly popular due to its cost-effectiveness. However, to ensure the system can operate with high accuracy and stability, this technique requires a bu... 详细信息
来源: 评论
An Empirical Study on Low Code Programming using Traditional vs Large Language Model Support
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Yongkun Chen, Jiachi Bi, Tingting Grundy, John Wang, Yanlin Yu, Jianxing Chen, Ting Tang, Yutian Zheng, Zibin School of Software Engineering Sun Yat-sen University China The The University of Western Australia Australia The Faculty of Information Technology Monash University Australia The School of Artificial Intelligence Sun Yat-sen University China The School of Computer Science and Engineering University of Electronic Science and Technology of China China University of Glasgow United Kingdom
Low-code programming (LCP) refers to programming using models at higher levels of abstraction, resulting in less manual and more efficient programming, and reduced learning effort for amateur developers. Many LCP tool... 详细信息
来源: 评论
Design of a Lower Limb Exoskeleton Rehabilitation Robot System Based on Forward Dynamics Simulation
Design of a Lower Limb Exoskeleton Rehabilitation Robot Syst...
收藏 引用
Cognitive Computing and Complex Data (ICCD), International Conference on the
作者: Yudong Fang Yuefei Wang Liucun Zhu Zhen Liu Lei Shi Muxin Du Jianchu Lin School of Mechanical and Marine Engineering Beibu Gulf University Qinzhou China Sentinel Institute of Science and Technology Beibu Gulf University Qinzhou China Nagasaki Institute of Applied Science Nagasaki Japan Guangzhou Shiyuan Electronic Technology Company Limited Guangzhou China Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huai'an China
Lower limb exoskeleton rehabilitation robots can effectively improve the rehabilitation of stroke patients and can substantially reduce the workload of rehabilitation therapists and improve work efficiency. In this pa... 详细信息
来源: 评论
Optimizing Results in Aerial Images through Post-Processing Techniques on YOLOv7  23
Optimizing Results in Aerial Images through Post-Processing ...
收藏 引用
12th International Symposium on Information and Communication Technology, SOICT 2023
作者: Vo, Nguyen D. Nguyen, Thu M. Nguyen, Triet H.M. Nguyen, Khang Multimedia Communications Laboratory University of Information Technology Vietnam National University Ho Chi Minh City Ho Chi Minh city Viet Nam Faculty of Computer Science University of Information Technology Vietnam National University Ho Chi Minh City Ho Chi Minh city Viet Nam Faculty of Software Engineering University of Information Technology Vietnam National University Ho Chi Minh City Ho Chi Minh city Viet Nam
Object detection in aerial images has garnered significant attention from the research community in recent years. The challenges posed by small objects, diverse orientations, and complex backgrounds have spurred exten... 详细信息
来源: 评论
Sentiment-Based Neural Network Approach for Predicting the Severity of Bug Reports  5
Sentiment-Based Neural Network Approach for Predicting the S...
收藏 引用
5th International Conference on Intelligent Computing in Data sciences, ICDS 2021
作者: Baarah, Aladdin Aloqaily, Ahmad Zyod, Hala Mustafa, Nasser The Hashemite University Faculty of Prince Al-Hussein Bin Abdallah II for IT Department of Software Engineering P.O. Box 330127 Zarqa Jordan The Hashemite University Department of Software Engineering Zarqa Jordan Wenzhou-Kean University Department of Computer Science Wenzhou China
During the software maintenance process, bugs encountered by software users need to be solved according to their severity level to improve the quality of the software. Therefore, bug reports with high severity should ... 详细信息
来源: 评论
Role of activity-based learning and ChatGPT on students' performance in education
收藏 引用
computers and Education: Artificial Intelligence 2024年 6卷
作者: Al Shloul, Tamara Mazhar, Tehseen Abbas, Qamar Iqbal, Muhammad Ghadi, Yazeed Yasin Shahzad, Tariq Mallek, Fatma Hamam, Habib General Education Department Liwa College Abu Dhabi15222 United Arab Emirates Department of Computer Science Virtual University of Pakistan Lahore51000 Pakistan Department of Computer Science Faculty of Computing and Information Technology International Islamic University Islamabad 44000 Pakistan Pakistan Department of Computer Science and Software Engineering Al Ain University Abu Dhabi12555 United Arab Emirates Department of Computer Sciences COMSATS University Islamabad Sahiwal Campus Sahiwal57000 Pakistan Faculty of Engineering University de Moncton MonctonNBE1A3E9 Canada Hodmas University College Taleh Area Mogadishu Somalia Bridges for Academic Excellence Tunis Tunisia School of Electrical Engineering University of Johannesburg Johannesburg2006 South Africa
Purpose: This study investigates the impact of activity-based learning and the utilization of ChatGPT on students' academic performance within the educational framework. Objectives: The study aims to assess the ef... 详细信息
来源: 评论
Typical curve with G1 constraints for curve completion
收藏 引用
Visual Computing for Industry,Biomedicine,and Art 2021年 第1期4卷 283-294页
作者: Chuan He Gang Zhao Aizeng Wang Fei Hou Zhanchuan Cai Shaolin Li School of Mechanical Engineering and Automation Beihang UniversityBeijing 100191China State Key Laboratory of Lunar and Planetary Sciences Macao University of Science and TechnologyMacao 999078China State Key Laboratory of Virtual Reality Technology and Systems Beihang UniversityBeijing 100191China State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China State Key Laboratory of Computer Science Institute of SoftwareUniversity of Chinese Academy of SciencesBeijing 100049China Faculty of Information Technology Macao University of Science and TechnologyMacao 999078China
This paper presents a novel algorithm for planar G1 interpolation using typical curves with monotonic *** G1 interpolation problem is converted into a system of nonlinear equations and sufficient conditions are provid... 详细信息
来源: 评论
Correction: Agile meets quantum: a novel genetic algorithm model for predicting the success of quantum software development project
收藏 引用
Automated software engineering 2024年 第1期32卷 1-11页
作者: Khan, Arif Ali Akbar, Muhammad Azeem Lahtinen, Valtteri Paavola, Marko Niazi, Mahmood Alatawi, Mohammed Naif Alotaibi, Shoayee Dlaim M3S Empirical Software Engineering Research Unit University of Oulu Oulu Finland Software Engineering Department Lappeenranta-Lahti University of Technology Lappeenranta Finland Quanscient Oy Tampere Finland VTT Technical Research Ctr of Finland Ltd Oulu Finland Department of Information and Computer Science King Fahd University of Petroleum and Minerals Dhahran Saudi Arabia Interdisciplinary Research Centre for Intelligent Secure Systems King Fahd University of Petroleum and Minerals Dhahran Saudi Arabia Information Technology Department Faculty of Computers and Information Technology University of Tabuk Tabuk Saudi Arabia Department of Artificial Intelligence and Data Science College of Computer Science and Engineering University of Hail Hail Saudi Arabia
来源: 评论
Studies on the Quality Assessment of PRNG for Q-Trits Quantum Cryptography Protocols
Studies on the Quality Assessment of PRNG for Q-Trits Quantu...
收藏 引用
International Scientific-Practical Conference Problems of Infocommunications science and Technology
作者: Sergiy Gnatyuk Tetiana Okhrimenko Andrii Fesenko Sergiy Dorozhynskyi Faculty of Cybersecurity Computer and Software Engineering National Aviation University Kyiv Ukraine Faculty of Information Technology Taras Shevchenko National University of Kyiv Kyiv Ukraine
cybersecurity contains three basic features such as confidentiality, integrity and availability. Data confidentiality ensuring by encryption has faced quantum computing threat, but this problem can be solved by using ... 详细信息
来源: 评论
Training Differentially Private Models with Secure Multiparty Computation
arXiv
收藏 引用
arXiv 2022年
作者: Pentyala, Sikha Railsback, Davis Maia, Ricardo J.M. Melanson, David Dowsley, Rafael Nascimento, Anderson De Cock, Martine School of Engineering and Technology University of Washington Tacoma United States Department of Computer Science University of Brasilia Brazil Department of Software Systems and Cybersecurity Monash University Australia Department of Applied Mathematics Computer Science and Statistics Ghent University Belgium Mila - Quebec Ai Institute Canada
We address the problem of learning a machine learning model from training data that originates at multiple data owners, while providing formal privacy guarantees regarding the protection of each owner's data. Exis... 详细信息
来源: 评论