咨询与建议

限定检索结果

文献类型

  • 1,959 篇 会议
  • 1,240 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,056 篇 工学
    • 1,629 篇 计算机科学与技术...
    • 1,368 篇 软件工程
    • 391 篇 信息与通信工程
    • 322 篇 控制科学与工程
    • 226 篇 生物工程
    • 183 篇 电气工程
    • 168 篇 生物医学工程(可授...
    • 158 篇 机械工程
    • 133 篇 电子科学与技术(可...
    • 123 篇 光学工程
    • 82 篇 安全科学与工程
    • 79 篇 交通运输工程
    • 75 篇 化学工程与技术
    • 74 篇 仪器科学与技术
    • 73 篇 网络空间安全
  • 957 篇 理学
    • 531 篇 数学
    • 250 篇 生物学
    • 240 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 135 篇 系统科学
    • 70 篇 化学
  • 661 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 188 篇 工商管理
  • 184 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 84 篇 公共卫生与预防医...
    • 74 篇 药学(可授医学、理...
  • 109 篇 法学
    • 86 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 51 篇 教育学
  • 36 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 95 篇 deep learning
  • 90 篇 machine learning
  • 73 篇 accuracy
  • 66 篇 software
  • 65 篇 artificial intel...
  • 61 篇 computational mo...
  • 60 篇 feature extracti...
  • 54 篇 training
  • 50 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 38 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 3,060 篇 英文
  • 172 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3257 条 记 录,以下是151-160 订阅
排序:
Occluded Person Re-Identification using Region-based Convolutional Neural Networks  23
Occluded Person Re-Identification using Region-based Convolu...
收藏 引用
3rd International Conference on Human Machine Interaction, ICHMI 2023
作者: Islam, Atiqul Tsun, Mark Tee Kit Bee Theng, Lau Chua, Caslon Faculty of Engineering Computing & Science Swinburne University of Technology Sarawak Campus Kuching Malaysia Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia
The ability to continuously follow a target person in a dynamically changing environment remains a major challenge that indoor companion robots confront. Ongoing human following is complicated by close similarity matc... 详细信息
来源: 评论
Hybrid Deep Learning Model of LSTM and BiLSTM for Transjakarta Passenger Prediction  3
Hybrid Deep Learning Model of LSTM and BiLSTM for Transjakar...
收藏 引用
3rd International Conference on Creative Communication and Innovative Technology, ICCIT 2024
作者: Siswanto, Joko Hendry Rahardja, Untung Sembiring, Irwan Lisangan, Erick Alfons Hakim, Muhammad Iman Nur Wibowo, Feri Polytechnic of Road Transportation Safety Road Transportation System Engineering Tegal Indonesia Satya Wacana Christian University Faculty of Information Technology Indonesia University of Raharja Faculty of Science and Technology Tangerang Indonesia Satya Wacana Christian University Faculty of Computer Science Indonesia The University of Western Australia Computer Science and Software Engineering Perth Australia Polytechnic of Road Transportation Safety Automotive Engineering Technology Tegal Indonesia Muhammadiyah University Purwokerto Faculty of Engineering and Science Banyumas Indonesia
A crucial role in the BRT transportation system's planning, development, and operation is the prediction of passenger numbers. Using time-series data, it is necessary to develop careful prediction models, appropri... 详细信息
来源: 评论
Dynamic Defense Method for Industrial Control Networks based on Shadow Honeynet  9
Dynamic Defense Method for Industrial Control Networks based...
收藏 引用
9th International Conference on computer and Communications, ICCC 2023
作者: Yang, Wei Li, XiaoLong Xu, Chao Yao, Yu Yu, Hai Jiao, XuanQi Shen, YiJia Wang, JiaXuan Liu, GeHao Software College Northeastern University Shenyang China Northeastern University College of Computer Science and Engineering Shenyang China State Grid Liaoning Information and Communication Company Department of Cybersecurity Monitoring Shenyang China
With the deep integration of Internet technology and industrial development, traditional closed industrial Internet faces an increasing array of dynamic attack vectors. To address these evolving threats, dynamic defen... 详细信息
来源: 评论
Main Confidentiality Challenges in Network Security: A Literature Review  25
Main Confidentiality Challenges in Network Security: A Liter...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Asassfeh, Mahmoud Al-Mousa, Mohammad Rasmi Amer, Waleed Almomani, Adai Mohammad Al-Shaikh, Ala'a Afaneh, Suha Alrefai, Mohammed Nayef Elrashidi, Ali Samara, Ghassan Zarqa University Department of Cybersecurity Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan Zarqa University Department of Software Enginereeing Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
Nowadays, a big challenge is how to protect information from unwanted accesses. It constitutes a big challenge when we have different ways to access data. That is, a lot of information today travels through networks a... 详细信息
来源: 评论
Induced Matching Below Guarantees: Average Paves the Way for Fixed-Parameter Tractability  40
Induced Matching Below Guarantees: Average Paves the Way for...
收藏 引用
40th International Symposium on Theoretical Aspects of computer science, STACS 2023
作者: Koana, Tomohiro Faculty IV Institute of Software Engineering and Theoretical Computer Science Algorithmics and Computational Complexity Technische Universität Berlin Germany
In this work, we study the Induced Matching problem: Given an undirected graph G and an integer , is there an induced matching M of size at least ? An edge subset M is an induced matching in G if M is a matching such ... 详细信息
来源: 评论
Optimization of Interactive Videos Empowered the Experience of Learning Management System
收藏 引用
computer Systems science & engineering 2023年 第7期46卷 1021-1038页
作者: Muhammad Akram Muhammad Waseem Iqbal M.Usman Ashraf Erssa Arif Khalid Alsubhi Hani Moaiteq Aljahdali Department of Computer Science Superior University Lahore54000Pakistan Department of Software Engineering Superior University Lahore54000Pakistan Department of Computer Science GC Women University SialkotPakistan Department of Computer Science King Abdulaziz UniversityJeddahSaudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia
The Learning management system(LMS)is now being used for uploading educational content in both distance and blended *** platform has two types of users:the educators who upload the content,and the students who have to... 详细信息
来源: 评论
Comparison of Standard Ant Colony Optimization, Dijkstra and A∗ Algorithms for Path Planning of Robot in an Indoor Environment  9
Comparison of Standard Ant Colony Optimization, Dijkstra and...
收藏 引用
9th International Conference on Mechanical engineering and Robotics Research, ICMERR 2025
作者: Sharan, Sudeep Ngoc Minh, Anh Tong Dominguez-Jimenez, Juan Jose Nauth, Peter Frankfurt University of Applied Sciences Faculty of Computer Science and Engineering Frankfurt am Main Germany UCASE Software Engineering Group School of Engineering University of Cádiz Cadiz Spain
The research topic of Path planning is extremely challenging area of concentration within the field of mobile robots. However, path planning algorithms for mobile robot tasks are contingent upon the environment and it... 详细信息
来源: 评论
From Data to Diagnosis: Investigating Approaches in Mental Illness Detection  2
From Data to Diagnosis: Investigating Approaches in Mental I...
收藏 引用
2nd International Conference of Intelligent Methods, Systems and Applications, IMSA 2024
作者: Montasser, Reem Kadry Mazen, Sherif A. Helal, Iman M. A. October University for Modern Sciences and Arts Faculty of Computer Science Software Engineering Department Giza Egypt Cairo University Faculty of Computers and Artificial Intelligence Information Systems Department Giza Egypt
Mental illness is a considerable global public health problem, impacting both individual well-being and society's health. The growing popularity of social media and the increase of other data sources led to more r... 详细信息
来源: 评论
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4615-4630页
作者: Erssa Arif Syed Khuram Shahzad Muhammad Waseem Iqbal Muhammad Arfan Jaffar Abdullah S.Alshahrani Ahmed Alghamdi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Faculty of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword... 详细信息
来源: 评论
Deep Semantic and Attentive Network for Unsupervised Video Summarization
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2022年 第2期18卷 1-21页
作者: Zhong, Sheng-Hua Lin, Jingxu Lu, Jianglin Fares, Ahmed Ren, Tongwei College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical Engineering Computer Systems Engineering Program Faculty of Engineering at Shoubra Benha University Cairo Egypt State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China
With the rapid growth of video data, video summarization is a promising approach to shorten a lengthy video into a compact version. Although supervised summarization approaches have achieved state-of-the-art performan... 详细信息
来源: 评论