咨询与建议

限定检索结果

文献类型

  • 1,959 篇 会议
  • 1,240 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,257 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,056 篇 工学
    • 1,629 篇 计算机科学与技术...
    • 1,368 篇 软件工程
    • 391 篇 信息与通信工程
    • 322 篇 控制科学与工程
    • 226 篇 生物工程
    • 183 篇 电气工程
    • 168 篇 生物医学工程(可授...
    • 158 篇 机械工程
    • 133 篇 电子科学与技术(可...
    • 123 篇 光学工程
    • 82 篇 安全科学与工程
    • 79 篇 交通运输工程
    • 75 篇 化学工程与技术
    • 74 篇 仪器科学与技术
    • 73 篇 网络空间安全
  • 957 篇 理学
    • 531 篇 数学
    • 250 篇 生物学
    • 240 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 135 篇 系统科学
    • 70 篇 化学
  • 661 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 188 篇 工商管理
  • 184 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 84 篇 公共卫生与预防医...
    • 74 篇 药学(可授医学、理...
  • 109 篇 法学
    • 86 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 51 篇 教育学
  • 36 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 95 篇 deep learning
  • 90 篇 machine learning
  • 73 篇 accuracy
  • 66 篇 software
  • 65 篇 artificial intel...
  • 61 篇 computational mo...
  • 60 篇 feature extracti...
  • 54 篇 training
  • 50 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 38 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 3,060 篇 英文
  • 172 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3257 条 记 录,以下是191-200 订阅
排序:
A Three-Dimensional Real-Time Gait-Based Age Detection System Using Machine Learning
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 165-182页
作者: Muhammad Azhar Sehat Ullah Khalil Ullah Habib Shah Abdallah Namoun Khaliq Ur Rahman Department of Computer Science&IT University of MalakandChakdara18800Pakistan Department of Software Engineering University of MalakandChakdara18800Pakistan College of Computer Science King Khalid UniversityAbha62529Saudi Arabia Faculty of Computer and Information Systems Islamic University of MadinahMadinah42351Saudi Arabia Department of Statistics Abdul Wali Khan UniversityMardan23200Pakistan
Human biometric analysis has gotten much attention due to itswidespread use in different research areas, such as security, surveillance,health, human identification, and classification. Human gait is one of the keyhum... 详细信息
来源: 评论
On Understanding Sports-HAR: Hierarchical, Mobile, Multi-Sensor based Classification of Table-Tennis Strokes  1
On Understanding Sports-HAR: Hierarchical, Mobile, Multi-Sen...
收藏 引用
1st International Conference of Intelligent Methods, Systems and Applications, IMSA 2023
作者: Ezzeldin, Mustafa Ghoneim, Amr S. Abdelhamid, Laila Atia, Ayman Helwan University Faculty of Computers AI Software Engineering Cairo Egypt Helwan University Faculty of Computers and AI Computer Science Cairo Egypt Helwan University Faculty of Computers and AI Information Systems Cairo Egypt Helwan Univeristy HCI-LAB Faculty of Computers and AI Computer Science Cairo Egypt Faculty of Computer Science Giza Egypt
Table Tennis is a renowned competitive and recreational sport. An Olympic sport since 1988, table tennis in-cludes several movements, shots (i.e., strokes), and positions. Consequently, many factors can affect the str... 详细信息
来源: 评论
A Secured and Optimized Clustering Approch in Vehicular Ad-hoc Network  4
A Secured and Optimized Clustering Approch in Vehicular Ad-h...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Khan, Imran Khan, Fazlullah Ali, Asad Alshawi, Bandar Alturki, Ryan Wedyan, Mohammad Abdul Wali Khan University Computer Science Department KPK Mardan Pakistan School of Computer Science University of Nottingham Ningbo China Faculty of Science and Engineering Zhejiang315104 China University of Engineering and Technology Department of Computer Science KPK Peshawar Pakistan College of Computing Umm Al-Qura University Department of Computer and Network Engineering Makkah Saudi Arabia College of Computing Umm Al-Qura University Department of Software Engineering Makkah Saudi Arabia Faculty of Information Technology and Computer Sciences Department of Computer Sciences Irbid21163 Jordan
Vehicular ad hoc networks (VANETs) take vital role in intelligent transportation systems, but they face challenges due to dynamic network topology, impacting communication efficiency, especially with increasing active... 详细信息
来源: 评论
EMARec: a sequential recommendation with exponential moving average
收藏 引用
Neural Computing and Applications 2024年 第21期36卷 12917-12933页
作者: Chen, Rui Wang, Zonglin Tang, Cundong Zhang, Jianwei Li, Pu Kong, Xiangjie Huang, Min College of Software Engineering Zhengzhou University of Light Industry Zhengzhou450001 China Henan Joint International Research Laboratory of Computer Animation Implementation Technologies Zhengzhou450001 China School of Information Science and Technology Northwest University Xi’an710127 China Faculty of Information and Engineering Xuchang Vocational Technical College Xuchang461000 China College of Computer Science and Technology Zhejiang University of Technology Hangzhou310023 China
Capturing dynamic preference features from user historical behavioral data is widely applied to improve the accuracy of recommendations in sequential recommendation tasks. However, existing deep neural network-based s... 详细信息
来源: 评论
Enhancing Video Anomaly Detection Using Spatio-Temporal Autoencoders and Convolutional LSTM Networks
收藏 引用
SN computer science 2024年 第1期5卷 190页
作者: Almahadin, Ghayth Subburaj, Maheswari Hiari, Mohammad Sathasivam Singaram, Saranya Kolla, Bhanu Prakash Dadheech, Pankaj Vibhute, Amol D. Sengan, Sudhakar Department of Networks and Cybersecurity Faculty of Information Technology Al Ahliyya Amman University Country Amman Jordan School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu Chennai 600127 India Department of Networks and Cybersecurity Information Technology Al Ahliyya Amman University Amman Jordan Department Computing Technology School of Computing SRM Institute of Science and Technology Kattankulathur Campus Tamil Nadu Chennai 603203 India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Guntur 522302 India Department of Computer Science and Engineering Swami Keshvanand Institute of Technology Management and Gramothan (SKIT) Rajasthan Jaipur 302017 India Symbiosis Institute of Computer Studies and Research (SICSR) Symbiosis International (Deemed University) MH Pune 411016 India Department of Computer Science and Engineering PSN College of Engineering and Technology Tamil Nadu Tirunelveli 627152 India
Identifying suspicious activities or behaviors is essential in the domain of Anomaly Detection (AD). In crowded scenes, the presence of inter-object occlusions often complicates the detection of such behaviors. Theref... 详细信息
来源: 评论
Surface Defects Detection of Cylindrical High-Precision Industrial Parts Based on Deep Learning Algorithms: A Review
收藏 引用
Operations Research Forum 2024年 第3期5卷 58页
作者: Wei, Li Solihin, Mahmud Iwan Saruchi, Sarah ‘Atifah Astuti, Winda Hong, Lim Wei Kit, Ang Chun School of Computer Science and Technology (School of Software) Guangxi University of Science and Technology Guangxi 545006 China Faculty of Engineering Technology and Built Environment UCSI University Kuala Lumpur 56000 Malaysia Faculty of Manufacturing and Mechatronics Engineering Technology Universiti Malaysia Pahang Al-Sultan Abdullah Pahang Pekan 26600 Malaysia Computer Engineering Department Automotive and Robotics Engineering Program BINUS ASO School of Engineering Bina Nusantara University Jakarta Indonesia
High-precision cylindrical parts are critical components across various industries including aerospace, automotive, and manufacturing. Since these parts play a pivotal role in the performance and safety of the systems... 详细信息
来源: 评论
PraK Tool: An Interactive Search Tool Based on Video Data Services  30th
PraK Tool: An Interactive Search Tool Based on Video Data S...
收藏 引用
30th International Conference on MultiMedia Modeling, MMM 2024
作者: Lokoč, Jakub Vopálková, Zuzana Stroh, Michael Buchmueller, Raphael Schlegel, Udo SIRET Research Group Department of Software Engineering Faculty of Mathematics and Physics Charles University Prague Czech Republic Visual Computing Department of Computer Science Faculty of Natural Sciences Konstanz University Konstanz Germany Data Analysis and Visualization Department of Computer Science Faculty of Natural Sciences Konstanz University Konstanz Germany
This paper presents a tool relying on data service architecture, where technical details of all VBS datasets are completely hidden behind an abstract stateless data layer. The data services allow independent developme... 详细信息
来源: 评论
An Automated Real-Time Face Mask Detection System Using Transfer Learning with Faster-RCNN in the Era of the COVID-19 Pandemic
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 4151-4166页
作者: Maha Farouk S.Sabir Irfan Mehmood Wafaa Adnan Alsaggaf Enas Fawai Khairullah Samar Alhuraiji Ahmed S.Alghamdi Ahmed A.Abd El-Latif Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversitySaudi Arabia Centre for Visual Computing Faculty of Engineering and InformaticsUniversity of BradfordBradfordU.K Department of Information Technology Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahP.O.Box 23713Saudi Arabia Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahSaudi Arabia Department of Mathematics and Computer Science Faculty of ScienceMenoufia University32511Egypt
Today,due to the pandemic of COVID-19 the entire world is facing a serious health *** to the World Health Organization(WHO),people in public places should wear a face mask to control the rapid transmission of *** gove... 详细信息
来源: 评论
ResMHA-Net:Enhancing Glioma Segmentation and Survival Prediction Using a Novel Deep Learning Framework
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 885-909页
作者: Novsheena Rasool Javaid Iqbal Bhat Najib Ben Aoun Abdullah Alharthi Niyaz Ahmad Wani Vikram Chopra Muhammad Shahid Anwar Department of Computer Science School of Engineering and TechnologyIslamic University of Science and TechnologyAwantipora192122India Faculty of Computing and Technology Al-Baha UniversityAlaqiq65779-7738Saudi Arabia Research Groups in Intelligent Machines National School of Engineers of SfaxUniversity of SfaxSfax3038Tunisia Department of Electrical Engineering College of EngineeringKing Khalid UniversityAbha61421Saudi Arabia Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyPatiala147004Punjab Department of Electrical and Instrumentation Engineering Thapar Institute of Engineering and TechnologyPatiala147004Punjab Department of AI and Software Gachon UniversitySeongnam-si13120Republic of Korea
Gliomas are aggressive brain tumors known for their heterogeneity,unclear borders,and diverse locations on Magnetic Resonance Imaging(MRI)*** factors present significant challenges for MRI-based segmentation,a crucial... 详细信息
来源: 评论
Research and development of two-factor authentication methods using neural networks  4
Research and development of two-factor authentication method...
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Darbek, Temirkhan Mukasheva, Assel Bissembayev, Alibek Gnatyuk, Sergiy Mukammejanova, Dinargul The Department of Information Systems and Cybersecurity Almaty university of power engineering and telecommunications Almaty Kazakhstan The School of Information Technology and Engineering Kazakh-British Technical University Almaty Kazakhstan The School of Information Technology and Engineering Kazakh British Technical University Almaty Kazakhstan The Faculty of Cybersecurity Computer and Software Engineering at National Aviation University National Aviation University Kyiv Ukraine The Department of Artificial Intelligence and Big Data Kazakh National University named after Al-Farabi Almaty Kazakhstan
This article is devoted to the research and development of innovative two-factor authentication (2FA) methods using neural networks. 2FA plays a key role in ensuring the security of data and accounts in the modern dig... 详细信息
来源: 评论