咨询与建议

限定检索结果

文献类型

  • 1,959 篇 会议
  • 1,230 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,247 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,048 篇 工学
    • 1,620 篇 计算机科学与技术...
    • 1,363 篇 软件工程
    • 386 篇 信息与通信工程
    • 318 篇 控制科学与工程
    • 226 篇 生物工程
    • 180 篇 电气工程
    • 168 篇 生物医学工程(可授...
    • 157 篇 机械工程
    • 130 篇 电子科学与技术(可...
    • 123 篇 光学工程
    • 82 篇 安全科学与工程
    • 79 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 955 篇 理学
    • 530 篇 数学
    • 250 篇 生物学
    • 238 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 134 篇 系统科学
    • 70 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 187 篇 工商管理
  • 184 篇 医学
    • 151 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 74 篇 药学(可授医学、理...
  • 110 篇 法学
    • 86 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 52 篇 教育学
  • 36 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 92 篇 deep learning
  • 90 篇 machine learning
  • 72 篇 accuracy
  • 66 篇 software
  • 64 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 53 篇 training
  • 50 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 38 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 3,049 篇 英文
  • 172 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3247 条 记 录,以下是451-460 订阅
排序:
A Review of Digital Watermarking Techniques, Characteristics and Attacks in Text Documents  2nd
A Review of Digital Watermarking Techniques, Characteristics...
收藏 引用
2nd International Conference on Innovative Technology, engineering and sciences, iCITES 2020
作者: Usop, Nur Alya Afikah Hisham, Syifak Izhar Faculty of Computer Science and Software Engineering Universiti Malaysia Pahang Gambang Malaysia
Security plays an important role in many sectors and industries. Nowadays, scams and illegal movements are spreading around the world. Copyright protection for PDF documentation is one of the focus in digital watermar... 详细信息
来源: 评论
Emergency Vehicle Navigation in Connected Autonomous Systems Using Enhanced Traffic Management System
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20670-20677页
作者: Raja, Gunasekaran Anbalagan, Sudha Gurumoorthy, Sugeerthi Jegathesan, Darshini Girivel, Niveditha Subramanian Sundaram, Varsha Mani Shanmuga Khowaja, Sunder Ali Dev, Kapal Anna University NGNLab Department of Computer Technology MIT Campus Chennai600044 India Vellore Institute of Technology Chennai Centre for Smart Grid Technologies School of Computer Science and Engineering Chennai600127 India Citicorp Services Private Ltd Software Development Chennai600113 India Dublin City University School of Computing Faculty of Engineering and Computing Glasnevin Campus DublinD09 V209 Ireland Munster Technological University Department of Computer Science Bishopstown CorkT12 P928 Ireland University of Johannesburg Department of Institute of Intelligent Systems Johannesburg2006 South Africa Chitkara University Institute of Engineering and Technology Centre for Research Impact Outcome Chitkara University Punjab Rajpura140401 India
Autonomous Vehicle (AV) usage has become predominant in the rapidly evolving landscape of urban transportation. Integrating AVs and non-AVs in the existing traffic infrastructure has significantly increased the comple... 详细信息
来源: 评论
A Mutation-Guided Assessment of Acceleration Approaches for Continuous Integration: An Empirical Study of YourBase
A Mutation-Guided Assessment of Acceleration Approaches for ...
收藏 引用
International Mining software Repositories, MSR
作者: Zhili Zeng Tao Xiao Maxime Lamothe Hideaki Hata Shane McIntosh Software REBELs University of Waterloo Canada Division of Information Science Nara Institute of Science and Technology Japan Department of Computer Engineering and Software Engineering Polytechnique Montréal Canada Faculty of Engineering Shinshu University Japan
Continuous Integration (CI) is a popular software development practice that quickly verifies updates to codebases. To cope with the ever-increasing demand for faster software releases, CI acceleration approaches have ... 详细信息
来源: 评论
Application of Neural Networks for Network Traffic Monitoring and Analysis  8
Application of Neural Networks for Network Traffic Monitorin...
收藏 引用
8th International Symposium on Multidisciplinary Studies and Innovative Technologies, ISMSIT 2024
作者: Kushnerov, Oleksandr Murr, Pierre Herasymov, Serhii Milevskyi, Stanislav Melnyk, Marharyta Golovashych, Sergii Sumy State University Department of Economic Cybernetics Sumy Ukraine International University of Science and Technology in Kuwait Computer Engineering Department Kuwait Kuwait 'Kharkiv polytechnic institute' Cybersecurity department National Technical University Kharkiv Ukraine Set University Department of Cyber Security and information protection Kyiv Ukraine National Technical University 'Kharkiv polytechnic institute' Department of Software Engineering and Management Intelligent Technologies Kharkiv Ukraine
Monitoring and analyzing network traffic are critically important tasks in the context of increasing cyber threats. Traditional data processing methods often struggle to handle the large volumes and complexity of mode... 详细信息
来源: 评论
Intelligent Model for Optimizing Gantt Chart in the Planning Stage
Intelligent Model for Optimizing Gantt Chart in the Planning...
收藏 引用
International Conference on Information Technology (ICIT)
作者: Noor Bdair Wael Alzyadat Shadi AlZubi Dept of Software engineering Faculty of Science and IT Alzaytoonh University of Jordan Dept. of of Computer Science Faculty of Science and IT Alzaytoonh University of Jordan
Scheduling tasks under resource constraints is essential for project success, and this research focuses on scheduling tasks efficiently to minimize completion time. To tackle this problem, two optimization techniques ...
来源: 评论
Boundary-Guided Learning for Gene Expression Prediction in Spatial Transcriptomics
Boundary-Guided Learning for Gene Expression Prediction in S...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Qu, Mingcheng Wu, Yuncong Di, Donglin Su, Anyang Su, Tonghua Song, Yang Fan, Lei Harbin Institute of Technology Faculty of Computing Harbin China Harbin Institute of Technology School of Astronautics Harbin China Space AI Li Auto Beijing China Jilin University College of Software Changchun China Computer Science and Engineering Unsw Sydney Australia
Spatial transcriptomics (ST) has emerged as an advanced technology that provides spatial context to gene expression. Recently, deep learning-based methods have shown the capability to predict gene expression from WSI ... 详细信息
来源: 评论
An Approach for Early Detection of Schizophrenia
An Approach for Early Detection of Schizophrenia
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Sachin Paranagama Isiwara Uditha Pamodya Daundasekara Shehani Hettiarachchi Lokesha Weerasinghe Dharshana Kasthurirathna Department of Computer Science and Software Engineering Faculty Of Computing Sri Lanka Institue Of Information Technology Malabe Sri Lanka
Schizophrenia is a chronic mental disorder with distorted thinking, hallucinations, and social difficulties. Early diagnosis is vital, but current methods are limited. This research proposes a web-based application in... 详细信息
来源: 评论
A Reliable and Stable V2V Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering  12
A Reliable and Stable V2V Routing Scheme for Warning Message...
收藏 引用
12th International Conference on Communication and Network Security, ICCNS 2022
作者: Khan, Mansoor Abbas, Ghulam Abbas, Ziaul Haq Alasmary, Hisham Tu, Shanshan Waqas, Muhammad Faculty of Computer Science and Engineering Gik Institute of Engineering and Technology Topi23640 Pakistan Faculty of Electrical Engineering Gik Institute of Engineering and Technology Topi23640 Pakistan Department of Computer Science College of Computer Science King Khalid University Information Security and Cybersecurity Unit King Khalid University Abha Saudi Arabia Faculty of Information Technology Beijing University of Technology Beijing100124 China Computer Engineering Department College of Information Technology University of Bahrain 32038 Bahrain School of Engineering Edith Cowan University PerthWA6027 Australia
Road traffic injuries cause considerable life and economic losses to individuals, their families, and nations as a whole. To avoid road accidents, Vehicular Ad-hoc Networks (VANETs) play a vital role by enhancing tran... 详细信息
来源: 评论
Eliciting Requirements from Stakeholders’ Responses Using Natural Language Processing
收藏 引用
computer Modeling in engineering & sciences 2021年 第4期127卷 99-116页
作者: Mohammed Lafi Bilal Hawashin Shadi AlZu’bi Department of Software Engineering Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan Department of Computer Information Systems Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan Department of Computer Science Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan
Most software systems have different stakeholders with a variety of *** process of collecting requirements from a large number of stakeholders is vital but *** propose an efficient,automatic approach to collecting req... 详细信息
来源: 评论
Performance Comparison of Interpolation Methods for Enriching WiFi Fingerprint Database  24
Performance Comparison of Interpolation Methods for Enrichin...
收藏 引用
9th International Conference on Cloud Computing and Internet of Things, CCIOT 2024
作者: Vu-Thanh, Trung He, Jing Duong-Bao, Ninh Thi, Luong Nguyen Lee, Seon-Woo Nguyen-Huu, Khanh College of Computer Science and Electronic Engineering Hunan University Changsha China Faculty of Mathematics and Informatics Dalat University Dalat Viet Nam Faculty of Information Technology Dalat University Dalat Viet Nam Division of Software Hallym University Chuncheon Korea Republic of Department of Electronics and Telecommunications Dalat University Dalat Viet Nam
Recently, WiFi Fingerprinting-based indoor positioning systems have gained significant attention due to the low cost of infrastructure deployment. In the data collection process, a higher density of reference points m... 详细信息
来源: 评论