咨询与建议

限定检索结果

文献类型

  • 1,959 篇 会议
  • 1,230 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,247 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,048 篇 工学
    • 1,620 篇 计算机科学与技术...
    • 1,363 篇 软件工程
    • 386 篇 信息与通信工程
    • 318 篇 控制科学与工程
    • 226 篇 生物工程
    • 180 篇 电气工程
    • 168 篇 生物医学工程(可授...
    • 157 篇 机械工程
    • 130 篇 电子科学与技术(可...
    • 123 篇 光学工程
    • 82 篇 安全科学与工程
    • 79 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 955 篇 理学
    • 530 篇 数学
    • 250 篇 生物学
    • 238 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 134 篇 系统科学
    • 70 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 187 篇 工商管理
  • 184 篇 医学
    • 151 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 74 篇 药学(可授医学、理...
  • 110 篇 法学
    • 86 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 52 篇 教育学
  • 36 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 92 篇 deep learning
  • 90 篇 machine learning
  • 72 篇 accuracy
  • 66 篇 software
  • 64 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 53 篇 training
  • 50 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 38 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 3,049 篇 英文
  • 172 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3247 条 记 录,以下是301-310 订阅
排序:
Access Management in IoT: Implementing a Secure Access Control System
Access Management in IoT: Implementing a Secure Access Contr...
收藏 引用
International Conference on Communications (COMM)
作者: Răzvan-Sebastian Neculai Ioana-Corina Bogdan Marian Alexandru Dan-Nicolae Robu Department of Cybersecurity Faculty of Electrical Engineering and Computer Science Transilvania University of Brasov & Eviden Braşov Romania Department of Electronics and Computers Faculty of Electrical Engineering and Computer Science Transilvania University of Brasov Braşov Romania
This paper aims to implement and use the Spring Security framework to secure and authenticate the connection between a web application and the ESP32 device. In the context of a web application, by analyzing the integr... 详细信息
来源: 评论
Early Fault Detection in Rolling Element Bearings Using Signal Processing Techniques  21
Early Fault Detection in Rolling Element Bearings Using Sign...
收藏 引用
21st IEEE International Conference on Smart Communities: Improving Quality of Life using AI, Robotics and IoT, HONET 2024
作者: Saeed, Ali Akram, M. Usman Khan, Muazzam A. Afsar, M. Belal Quaid-i-Azam University ICESCO Big Data Analytics and Edge Computing Department of Computer Science Islamabad Pakistan National University of Sciences and Technology Department of Computer and Software Engineering Islamabad Pakistan Otto-von-Guericke University Faculty of Electrical Engineering and Information Technology Maddeburg Germany
Many studies show that bearings are the most vulnerable components in low-voltage motors. While advanced bearing diagnostic systems exist, their cost can be a barrier for non-critical machinery due to the potential wa... 详细信息
来源: 评论
Use of digital platforms for enhancing academic performance. Systematic Review  7
Use of digital platforms for enhancing academic performance....
收藏 引用
7th IEEE International Conference and Workshop Obuda on Electrical and Power engineering, CANDO-EPE 2024
作者: Costescu, Cristina Anamaria Şogor, Mǎlina Pǎlimariu, Sabina Katona, Jozsef Tufar, Ioana Avram, Carla Maria Babe-Bolyai University Special Education Department Cluj-Napoca Romania Institute of Computer Engineering University of Dunaujvaros Department of Software Development and Application Dunaujvaros Hungary John Von Neumann University GAMF Faculty of Engineering and Computer Science Kecskemet Hungary Budapest Business University Faculty of Finance and Accountancy Department of Applied Quantitative Methods Budapest Hungary
The purpose of this study was to determine the effect of technology-based interventions on academic performance. To achieve this purpose a systematic review was conducted. Within the scope of this study EBSCO, Springe... 详细信息
来源: 评论
A novel graph convolutional networks model for an intelligent network traffic analysis and classification
收藏 引用
International Journal of Information Technology (Singapore) 2024年 1-13页
作者: Olabanjo, Olusola Wusu, Ashiribo Aigbokhan, Edwin Olabanjo, Olufemi Afisi, Oseni Akinnuwesi, Boluwaji Department of Mathematics Morgan State University Baltimore MD United States Department of Computer Science Lagos State University Ojo Lagos Nigeria Department of Mathematics Lagos State University Ojo Lagos Nigeria Department of Computer Technology Yaba College of Technology Yaba Lagos Nigeria Department of Cybersecurity University of Derby Derby United Kingdom Department of Philosophy Lagos State University Ojo Lagos Nigeria Department of Computer Science Faculty of Science and Engineering University of Eswatini Kwaluseni Swaziland
Network security in the midst of evolving and complex cyber-attacks is a growing concern. As the complexity of network architectures grows, so does the need for advanced methods in network traffic analysis and classif... 详细信息
来源: 评论
Arabic Sentiment Analysis of Mobile Banking Services Reviews  10
Arabic Sentiment Analysis of Mobile Banking Services Reviews
收藏 引用
10th International Conference on Social Networks Analysis, Management and Security, SNAMS 2023
作者: Khabour, Safaa M. Mustafa, Dheya Althebyan, Qutaibah Yarmouk University Faculty of Information Technology and Computer Sciences Dept. of Information Systems Irbid21163 Jordan The Hashemite University Faculty of Engineering Dept. of Computer Engineering Zarqa13133 Jordan Al Ain University Dept. of Cybersecurity Al Ain United Arab Emirates Jordan University of Science and Technology Irbid Jordan
Online customer reviews have developed into a significant source of information about a business's performance. Due to shifting consumer expectations and growing internet penetration, the Middle East, especially J... 详细信息
来源: 评论
Mobile Medical Assistant System for Laboratory Report Analysis and Medical Drug Identification  4
Mobile Medical Assistant System for Laboratory Report Analys...
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Warnakulasuriya, Deshani Dewangi, Tharushi Sewwandi, Navodya Rathnayake, Minoli Kodagoda, Nuwan Suriyawansha, Kushanra Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
It is quite common for medical drugs and prescriptions to be misidentified by hospitals and after drugs are being dispensed to the patients. Misidentification of medical drugs is more common among elderly and visually... 详细信息
来源: 评论
Enhancing Content-Based Histopathology Image Retrieval Using QR Code Representation
Enhancing Content-Based Histopathology Image Retrieval Using...
收藏 引用
2023 IEEE Symposium Series on Computational Intelligence, SSCI 2023
作者: Rouzegar, Hamidreza Rahnamayan, Shahryar Bidgoli, Azam Asilian Makrehchi, Masoud Ontario Tech University Department of Electrical Computer and Software Engineering OshawaON Canada Brock University Engineering Department St. CatharinesON Canada Laurier University Faculty of Science Wilfrid WaterlooON Canada
The growing field of Content-Based Medical Image Retrieval (CBMIR) plays an integral role in the diagnosis and treatment plan of numerous diseases, including cancer. However, the effective representation of gigapixel ... 详细信息
来源: 评论
Image Reconstruction Improvement of Variable Coded Aperture using Deep Learning Method for Gamma and Lensless Imaging Applications
Image Reconstruction Improvement of Variable Coded Aperture ...
收藏 引用
2023 Conference on Lasers and Electro-Optics Europe and European Quantum Electronics Conference, CLEO/Europe-EQEC 2023
作者: Schwarz, Ariel Shemer, Amir Danan, Eliezer Cohen, Noa E. Danan, Yossef Department of Electrical and Electronics Engineering Azrieli College of Engineering Jerusalem9103501 Israel Faculty of Engineering Bar-Ilan University Ramat-Gan5290002 Israel School of Software Engineering and Computer Science Azrieli College of Engineering Jerusalem9103501 Israel
In gamma ray imaging for nuclear medicine, coded aperture is used to improve sensitivity. one of the main reconstructing methods is inverse filtering (deconvolution), where the recorded image is cross-correlated with ... 详细信息
来源: 评论
Compact NSGA-II for Multi-objective Feature Selection
Compact NSGA-II for Multi-objective Feature Selection
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Miyandoab, Sevil Zanjani Rahnamayan, Shahryar Bidgoli, Azam Asilian Ontario Tech University Department of Electrical Computer and Software Engineering OshawaON Canada Brock University Department of Engineering St. CatharinesON Canada Wilfrid Laurier University Faculty of Science WaterlooON Canada
Feature selection is an expensive challenging task in machine learning and data mining aimed at removing irrelevant and redundant features. This contributes to an improvement in classification accuracy, as well as the...
来源: 评论
Expert Phishing Detection System
Expert Phishing Detection System
收藏 引用
2024 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology, IAICT 2024
作者: Alsarhan, Ayoub Al-Aiash, Issa Al-Fraihat, Dimah Aljaidi, Mohammad Abu Laila, Dena Abd Al Hakem Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Cybersecurity Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman11622 Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa13110 Jordan Department of Cyber Security Faculty of Information Technology Zarqa Technical Intermediate College Zarqa Jordan
Phishing attacks are a threat that continuously emphasizes the need for effective detection methods. This paper presents a machine learning detection method that employs a random forest classifier, which is an adaptab... 详细信息
来源: 评论