咨询与建议

限定检索结果

文献类型

  • 1,959 篇 会议
  • 1,240 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,056 篇 工学
    • 1,629 篇 计算机科学与技术...
    • 1,368 篇 软件工程
    • 391 篇 信息与通信工程
    • 322 篇 控制科学与工程
    • 226 篇 生物工程
    • 183 篇 电气工程
    • 168 篇 生物医学工程(可授...
    • 158 篇 机械工程
    • 133 篇 电子科学与技术(可...
    • 123 篇 光学工程
    • 82 篇 安全科学与工程
    • 79 篇 交通运输工程
    • 75 篇 化学工程与技术
    • 74 篇 仪器科学与技术
    • 73 篇 网络空间安全
  • 957 篇 理学
    • 531 篇 数学
    • 250 篇 生物学
    • 240 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 135 篇 系统科学
    • 70 篇 化学
  • 661 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 188 篇 工商管理
  • 184 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 84 篇 公共卫生与预防医...
    • 74 篇 药学(可授医学、理...
  • 109 篇 法学
    • 86 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 51 篇 教育学
  • 36 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 95 篇 deep learning
  • 90 篇 machine learning
  • 73 篇 accuracy
  • 66 篇 software
  • 65 篇 artificial intel...
  • 61 篇 computational mo...
  • 60 篇 feature extracti...
  • 54 篇 training
  • 50 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 38 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 3,060 篇 英文
  • 172 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3257 条 记 录,以下是141-150 订阅
排序:
Efficient Detection of Knee Osteoporosis Using the Swin Transformer on X-Ray Images
Efficient Detection of Knee Osteoporosis Using the Swin Tran...
收藏 引用
2024 International Conference on computer and Applications, ICCA 2024
作者: Sultana, Rahat Zaman, Muhammad Ivković, Nikola Cengiz, Korhan Rafaqat, Iqra Akhunzada, Adnan The University of Lahore Faculty of Computer Science Sargodha Pakistan Comsats University Islamabad Department of Computer Science Islamabad Pakistan University of Zagreb Faculty of Organization and Informatics Varaždin Croatia Biruni University Department of E&e Engineering Istanbul Turkey University of Doha for Science and Technology Department of Data and Cybersecurity Doha24449 Qatar
Knee Osteoporosis (KOP) is a skeletal disease that is caused by low bone mineral density and the degradation of bone tissue. It increases the risk of bone fractures in the knee region and is commonly seen in older peo... 详细信息
来源: 评论
An Overview of Tools and Techniques in Network Forensics  25
An Overview of Tools and Techniques in Network Forensics
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Asassfeh, Mahmoud Al-Mousa, Mohammad Rasmi Al-Dweikat, Hasan Al-Mashagbeh, Malak Hamad Afaneh, Suha Samara, Ghassan Zaid, Ali Abu Khouj, Mohammed Al Daoud, Essam Zarqa University Department of Cybersecurity Zarqa Jordan Applied Science Private University Cybersecurity and Cloud Computing Department Amman Jordan Zarqa University Department of Computer Science Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia Zarqa University Faculty of Information Technology Zarqa Jordan
Network forensics pertains to a subfield of digital forensics that deals with network security. It is utilized in conjunction with computer network traffic monitoring and analysis, which acts as an intrusion detection... 详细信息
来源: 评论
Enhancing Communication Accessibility:UrSL-CNN Approach to Urdu Sign Language Translation for Hearing-Impaired Individuals
收藏 引用
computer Modeling in engineering & sciences 2024年 第10期141卷 689-711页
作者: Khushal Das Fazeel Abid Jawad Rasheed Kamlish Tunc Asuroglu Shtwai Alsubai Safeeullah Soomro Department of Computer Engineering Modeling Electronics and Systems EngineeringUniversity of CalabriaRende Cosenza87036Italy Department of Information Systems University of Management and TechnologyLahore54770Pakistan Department of Computer Engineering Istanbul Sabahattin Zaim UniversityIstanbul34303Turkey Department of Software Engineering Istanbul Nisantasi UniversityIstanbul34398Turkey Department of Computer Science COMSATS University IslamabadLahore CampusLahore54700Pakistan Faculty of Medicine and Health Technology Tampere UniversityTampere33720Finland Department of Computer Science College of Computer Engineering and Sciences in Al-KharjPrince Sattam Bin Abdulaziz UniversityP.O.Box 151Al-Kharj11942Saudi Arabia Second Department of Computer Science College of Engineering and ComputingGeorge Mason UniversityFairfaxVA 4418USA
Deaf people or people facing hearing issues can communicate using sign language(SL),a visual *** works based on rich source language have been proposed;however,the work using poor resource language is still *** other ... 详细信息
来源: 评论
An Explainable Predictive Model for Diabetes Detection Using Shapley Additive Explanations Approach
An Explainable Predictive Model for Diabetes Detection Using...
收藏 引用
International Conference on Advanced engineering, Technology and Applications, ICAETA 2024
作者: Khan, Andleeb Yadav, Saundarya Nand, Parma Khanday, Akib Mohi Ud Din Bhushan, Bharat Jamil, Akhtar Hameedkhan, Alaa Ali Department of Computer Science and Engineering Sharda University Greater Noida India Department of Computer Science and Software Engineering United Arab Emirates University Al Ain United Arab Emirates Department of Computer Science National University of Computer and Emerging Sciences Islamabad44000 Pakistan Department of Computer Engineering Faculty of Engineeringand Natural Sciences Istinye University Istanbul34396 Turkey
The chronic and incurable disease of diabetes that is not only marked with increasing prevalence but is also linked to other life-threatening diseases like cardiovascular diseases, tissue injuries and retinopathy. Wit... 详细信息
来源: 评论
Image-based Criticality-Aware Fire Detection
Image-based Criticality-Aware Fire Detection
收藏 引用
2024 International Conference on Frontiers of Information Technology, FIT 2024
作者: Arshad, Alina Shamsi, Jawwad Ahmed Khan, Muhammad Burhan Bawany, Narmeen Zakaria Department of Software Engineering National University of Computer and Emerging Sciences Karachi Pakistan Department of Computer Science National University of Computer and Emerging Sciences Karachi Pakistan Department of Electrical Engineering National University of Computer and Emerging Sciences Karachi Pakistan Faculty of Science Jinnah University for Women Karachi Pakistan
Context-aware fire detection is a significant task in the era of new urban monitoring. Severe damage might result from fire events. To minimize the occurrence of these events, timely detection of fire accidents is nec... 详细信息
来源: 评论
LDE-UNet: A Novel Model for Rapid COVID-19 Diagnosis via CT Image Segmentation
LDE-UNet: A Novel Model for Rapid COVID-19 Diagnosis via CT ...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Wang, QiSong Wu, JiaRou Wang, YingZhuo Qu, HuiLi Nie, Shanling Yang, Hai East China University of Science and Technology Department of Computer Science and Engineering Shanghai China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China The University of Sydney Faculty of Engineering Australia
The COVID-19 pandemic has had a profound impact on human society. It has highlighted the need for faster diagnostic methods. Research has shown that combining semantic segmentation with traditional medical approaches ... 详细信息
来源: 评论
Road Traffic Accident Pattern Analysis with Data Mining  12
Road Traffic Accident Pattern Analysis with Data Mining
收藏 引用
12th International Conference on Awareness science and Technology, iCAST 2023
作者: Zhe Chai, Albe Bing Lau, Bee Theng Tsun Tee, Mark Kit McCarthy, Chris Faculty of Engineering Computing & Science Swinburne University of Technology Sarawak Campus Kuching Malaysia Department of Computer Science & Software Engineering Swinburne University of Technology Melbourne Australia
The discovery of Road Traffic Accident (RTA) patterns is vital to formulate mitigation strategies based on the characteristics of RTA. Various studies have applied association rule mining for RTA pattern discovery. Ho... 详细信息
来源: 评论
Generating synthetic data on agricultural crops with DCGAN  11
Generating synthetic data on agricultural crops with DCGAN
收藏 引用
11th International Conference on Advanced Informatics: Concept, Theory and Application, ICAICTA 2024
作者: Pasaribu, Fieter Brain Dewi, Luh Joni Erawati Aryanto, Kadek Yota Ernanda Seputra, Ketut Agus Varnakovida, Pariwate Kertiasih, Ni Ketut Computer Science Universitas Pendidikan Ganesha Singaraja Indonesia Software Engineering Universitas Pendidikan Ganesha Singaraja Indonesia King Mongkut's University of Technology Faculty of Science Thonburi Thailand
Convolutional Neural Network (CNN) is one of the deep learning architectures that is very effective for handling images. CNN is able to automatically extract important features from images, making it very suitable for... 详细信息
来源: 评论
Project Assessment in Offshore software Maintenance Outsourcing Using Deep Extreme Learning Machines
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1871-1886页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala NerusMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyahKuwait Department of Computer Science Sharif College of Engineering&TechnologyLahore54000Pakistan
software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the *** can benefit from offshore software maintenance outsourcing(OSMO)in different ways,includi... 详细信息
来源: 评论
A Process Oriented Integration Model for Smart Health Services
收藏 引用
Intelligent Automation & Soft Computing 2023年 第2期35卷 1369-1386页
作者: Farzana Kausar Gondal Syed Khuram Shahzad Muhammad Arfan Jaffar Muhammad Waseem Iqbal Department of Computer Science Superior UniversityLahore54600Pakistan Department of Informatics and Systems University of Management and TechnologyLahore54000Pakistan Faculty of Computer Science&IT Superior UniversityLahore54600Pakistan Department of Software Engineering Superior UniversityLahore54600Pakistan
Cities are facing challenges of high rise in population number and con-sequently need to be equipped with latest smart services to provide luxuries of life to its *** integrated solutions are also a need to deal with ... 详细信息
来源: 评论