咨询与建议

限定检索结果

文献类型

  • 1,959 篇 会议
  • 1,240 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,056 篇 工学
    • 1,629 篇 计算机科学与技术...
    • 1,368 篇 软件工程
    • 391 篇 信息与通信工程
    • 322 篇 控制科学与工程
    • 226 篇 生物工程
    • 183 篇 电气工程
    • 168 篇 生物医学工程(可授...
    • 158 篇 机械工程
    • 133 篇 电子科学与技术(可...
    • 123 篇 光学工程
    • 82 篇 安全科学与工程
    • 79 篇 交通运输工程
    • 75 篇 化学工程与技术
    • 74 篇 仪器科学与技术
    • 73 篇 网络空间安全
  • 957 篇 理学
    • 531 篇 数学
    • 250 篇 生物学
    • 240 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 135 篇 系统科学
    • 70 篇 化学
  • 661 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 188 篇 工商管理
  • 184 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 84 篇 公共卫生与预防医...
    • 74 篇 药学(可授医学、理...
  • 109 篇 法学
    • 86 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 51 篇 教育学
  • 36 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 95 篇 deep learning
  • 90 篇 machine learning
  • 73 篇 accuracy
  • 66 篇 software
  • 65 篇 artificial intel...
  • 61 篇 computational mo...
  • 60 篇 feature extracti...
  • 54 篇 training
  • 50 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 38 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 3,060 篇 英文
  • 172 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3257 条 记 录,以下是161-170 订阅
排序:
Staging of Different Tumor by Utilizing Laser Guidance (@405 nm) in CT Scan Images Along with Statistical Analysis
收藏 引用
Lasers in engineering 2025年 第4-6期59卷 309-325页
作者: Amjad, M. Ullah, H. Siddique, M.A. Majid, M.A. Aleem, A. Akhtar, M. Gilanie, G. Abdullah-Al-Wadud, M. Farhan, M. Akram, A. Batool, Z. Nazir, A. Biophotonics Imaging Techniques Laboratory Institute of Physics The Islamia University of Bahawalpur 63100 Pakistan Department of Computer Science Faculty of Computing The Islamia University of Bahawalpur Bahawalpur Pakistan Dept. of Software Engineering College of Computer and Information Sciences King Saud University Riyadh11543 Saudi Arabia School of Earth Sciences and Engineering Hohai University Nanjing China
Early detection of lung cancer, liver cancer (HCC), and pancreatitis is crucial for effective treatment. This study assessed the use of laser guidance CT scans for diagnosis and staging. 26 patients of CT scan which w... 详细信息
来源: 评论
Influence of Key Nodes in Industrial Control Malicious Code Modeling  3
Influence of Key Nodes in Industrial Control Malicious Code ...
收藏 引用
3rd International Conference on Electronic Information engineering and computer science, EIECS 2023
作者: Yang, Wei Yan, Hongwei Xu, Chao Yao, Yu Zhou, Jinlei Wang, Baile Wang, Danni Northeastem University Software College Shenyang China Northeastem University School of Computer Science and Engineering Shenyang China State Grid Liaoning Information and Communication Company Department of Cybersecurity Monitoring Shenyang China
Key nodes in complex networks play an important role in the structure of the entire network. Different nodes in the network often have different degrees, and the node with the highest degree in the network is usually ... 详细信息
来源: 评论
A Proposal for a New E-Waste Image Dataset Based on the UNU-KEYS Classification  23
A Proposal for a New E-Waste Image Dataset Based on the UNU-...
收藏 引用
23rd International Symposium on Electrical Apparatus and Technologies, SIELA 2024
作者: Iliev, Dimitar I. Marinov, Marin B. Ortmeier, Frank Technical University of Sofia Faculty of German Engineering and Industrial Management Sofia Bulgaria Technical University of Sofia Faculty of Electronic Engineering and Technologies Department of Electronics Sofia Bulgaria Otto-von-Guericke-University Magdeburg Faculty of Computer Science Software Engineering Magdeburg Germany
This paper introduces the largest and most diverse e-waste dataset to date, consisting of 19,613 pictures, 28,941 annotations, and 77 classes, where each class represents one visually distinctive type of electronic de... 详细信息
来源: 评论
Digital Evidence and Forensic Tools in Cyber Law: A Comprehensive Analysis  25
Digital Evidence and Forensic Tools in Cyber Law: A Comprehe...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Al-Sherideh, Ala'A Saeb Al-Zou'bi, Samah Suleiman Alshraiedeh, Fuad Elsoud, Esraa Abu Afaneh, Suha Al-Mousa, Mohammad Rasmi Alazaidah, Raed Khouj, Mohammed Samara, Ghassan Zarqa University Department of Cybersecurity Zarqa Jordan Zarqa University Department of Software Engineering Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan Zarqa University Department of Data Science and Ai Zarqa Jordan University of Business and Technology Department of Electrical Engineering Jeddah21432 Saudi Arabia
The exponential rise in hacking, phishing, information theft, and electronic crime has become an actual concern with the increased use of digital devices and technology. By 2023 the number of IoT devices expectation w... 详细信息
来源: 评论
Discovering Authorization Business Rules toward Detecting Web Applications Logic Flaws  23
Discovering Authorization Business Rules toward Detecting We...
收藏 引用
23rd International Arab Conference on Information Technology, ACIT 2022
作者: Alkofahi, Hamza Umphress, David Alawneh, Heba Jordan University of Science and Technology Department of Software Engineering Irbid Jordan Auburn University Department of Computer Science and Software Engineering Auburn United States Al Hussein Technical University Department of Cybersecurity Amman Jordan
Aggressive integration of validation checks into web framework software has altered the attack surface of web applications by reducing the opportunity for traditional injection flaws. The hacking community's react... 详细信息
来源: 评论
Can end-user feedback in social media be trusted for software evolution: Exploring and analyzing fake reviews
Can end-user feedback in social media be trusted for softwar...
收藏 引用
作者: Khan, Javed Ali Ullah, Tahir Khan, Arif Ali Yasin, Affan Akbar, Muhammad Azeem Aurangzeb, Khursheed Department of Computer Science Faculty of Physics Engineering and Computer Science University of Hertfordshire Hatfield United Kingdom School of Computer & Technology Beijing Institute of Technology Beijing China M3S Empirical Software Engineering Research Unit University of Oulu Oulu Finland School of Software Northwestern Polytechnical University Shaanxi Xian China Software Engineering Department Lappeenranta-Lahti University of Technology Lappeenranta Finland Department of Computer Engineering College of Computer and Information Sciences King Saud University Riyadh Saudi Arabia
End-user feedback in social media platforms, particularly in the app stores, is increasing exponentially with each passing day. software researchers and vendors started to mine end-user feedback by proposing text anal... 详细信息
来源: 评论
Research and development of an information system for speech recognition based on neural network algorithms metrics  4
Research and development of an information system for speech...
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Kanashev, Maksat Mukasheva, Assel Yedilkhan, Didar Rakhmetulaeva, Sabina Gnatyuk, Sergiy Nazym, Mirambayeva Almaty University of Power Engineering and Telecommunications Almaty Kazakhstan The School of Information Technology and Engineering Kazakh-British Technical University Almaty Kazakhstan The Department of Computer Engineering Astana IT University Astana Kazakhstan The Department of Information Systems International University of Information Technologies Almaty Kazakhstan The Faculty of Cybersecurity Computer and Software Engineering National Aviation University National Aviation University Kyiv Ukraine
This article examines the parameters of speech recognition in audio recordings containing a variety of phrases uttered by different people with different accents and intonations. The aim of the study is to evaluate th... 详细信息
来源: 评论
A modified grey wolf optimizer with multi-solution crossover integration algorithm for feature selection
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2025年 第1期16卷 329-345页
作者: Ihsan, Muhammad Din, Fakhrud Zamli, Kamal Z. Ghadi, Yazeed Yasin Alahmadi, Tahani Jaser Innab, Nisreen Faculty of IT Department of Computer Science and IT University of Malakand Khyber Pakhtunkhwa Chakdara18800 Pakistan Faculty of Computing College of Computing and Applied Sciences Universiti Malaysia Pahang Pahang Pekan26600 Malaysia Department of computer science and software engineering Al Ain University Abu Dhabi12555 United Arab Emirates Department of Information SystemsCollege of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh84428 Saudi Arabia Department of Computer Science and Information SystemsCollege of Applied Sciences Al-Maarefa University Diriyah Riyadh13713 Saudi Arabia
Feature selection helps eradicate redundant features which is essential to mitigate the curse of dimensionality when a machine-learning model deals with high-dimensional datasets. Grey Wolf Optimizer (GWO) is a swarm-... 详细信息
来源: 评论
PraK Tool V3: Enhancing Video Item Search Using Localized Text and Texture Queries  31st
PraK Tool V3: Enhancing Video Item Search Using Localized Te...
收藏 引用
31st International Conference on Multimedia Modeling, MMM 2025
作者: Stroh, Michael Kloda, Vojtěch Verner, Benjamin Vopálková, Zuzana Buchmüller, Raphael Jäckl, Bastian Hajko, Jakub Lokoč, Jakub Visual Computing Department of Computer Science Faculty of Natural Sciences Konstanz University Konstanz Germany SIRET Research Group Department of Software Engineering Faculty of Mathematics and Physics Charles University Prague Czech Republic Data Analysis and Visualization Department of Computer Science Faculty of Natural Sciences Konstanz University Konstanz Germany
We present a third version of the PraK system designed around an effective text-image and image-image search model. The system integrates sub-image search options for localized context search for CLIP and image color/... 详细信息
来源: 评论
Comparison of IDS in IoT, Mobile and Cloud based Systems  12
Comparison of IDS in IoT, Mobile and Cloud based Systems
收藏 引用
12th International Symposium on Digital Forensics and Security, ISDFS 2024
作者: Gok, Gorkem Boyaci, Aytug Ulas, Mustafa Firat University Faculty of Technology Department of Software Engineering Elaziǧ Turkey Air Force Academy National Defence University Department of Computer Engineering İstanbul Turkey Firat University Faculty of Engineering Department of Artificial Intelligence and Data Science Engineering Elaziǧ Turkey
This study is meant to research the evolution of intrusion detection and network monitoring within computer, cloud-based systems, IIoT, and mobile environments. The source has outlined the novel technologies in IDS, f... 详细信息
来源: 评论