咨询与建议

限定检索结果

文献类型

  • 1,959 篇 会议
  • 1,230 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,247 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,048 篇 工学
    • 1,620 篇 计算机科学与技术...
    • 1,363 篇 软件工程
    • 386 篇 信息与通信工程
    • 318 篇 控制科学与工程
    • 226 篇 生物工程
    • 180 篇 电气工程
    • 168 篇 生物医学工程(可授...
    • 157 篇 机械工程
    • 130 篇 电子科学与技术(可...
    • 123 篇 光学工程
    • 82 篇 安全科学与工程
    • 79 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 955 篇 理学
    • 530 篇 数学
    • 250 篇 生物学
    • 238 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 134 篇 系统科学
    • 70 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 187 篇 工商管理
  • 184 篇 医学
    • 151 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 74 篇 药学(可授医学、理...
  • 110 篇 法学
    • 86 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 52 篇 教育学
  • 36 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 92 篇 deep learning
  • 90 篇 machine learning
  • 72 篇 accuracy
  • 66 篇 software
  • 64 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 53 篇 training
  • 50 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 38 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 3,049 篇 英文
  • 172 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3247 条 记 录,以下是491-500 订阅
排序:
R-TAP: A Cloud-Based Multi-Region Road Traffic Accident Severity Prediction Model
R-TAP: A Cloud-Based Multi-Region Road Traffic Accident Seve...
收藏 引用
IEEE Industrial Electronics and Applications Conference (IEACon)
作者: Albe Bing Zhe Chai Bee Theng Lau Mark Kit Tsun Tee Chris McCarthy Faculty of Engineering Computing & Science Swinburne University of Technology Sarawak Campus Kuching Malaysia Department of Computer Science & Software Engineering Swinburne University of Technology Melbourne Australia
The tremendous impact of road traffic accidents (RTAs) remains a global concern, especially in low- and middle-income countries (LMICs). While most LMICs have limited budget to afford advanced traffic monitoring syste... 详细信息
来源: 评论
Composite metamorphic relations for integration testing  22
Composite metamorphic relations for integration testing
收藏 引用
8th International Conference on computer Technology Applications, ICCTA 2022
作者: Iakusheva, Sofia Khritankov, Anton Phystech School of Applied Mathematics and Informatics Moscow Institute of Physics and Technology Russia Faculty of Computer Science Dept. of Software Engineering Hse University Russia
Metamorphic testing is a testing method for problems without test oracles. Integration testing allows for detecting errors in complex systems that may not be found during the testing of their components. In this paper... 详细信息
来源: 评论
Automating Bad Smell Detection in Goal Refinement of Goal Models
Automating Bad Smell Detection in Goal Refinement of Goal Mo...
收藏 引用
作者: Hayashi, Shinpei Asano, Keisuke Saeki, Motoshi Department of Computer Science Tokyo Institute of Technology Tokyo152–8550 Japan Department of Software Engineering Faculty of Science and Technology Nanzan University Nagoya-shi466–8673 Japan
Goal refinement is a crucial step in goal-oriented requirements analysis to create a goal model of high quality. Poor goal refinement leads to missing requirements and eliciting incorrect requirements as well as less ... 详细信息
来源: 评论
QianXun: A Novel Enterprise File Search Framework  25
QianXun: A Novel Enterprise File Search Framework
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Si, Chun Qi, Peng Xue, Hongjia Sun, Yan Beijing University of Posts and Telecommunications Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing100876 China University of Nottingham Computer Science Faculty of Science and Engineering United Kingdom
With the deepening of the digital transformation, enterprises have accumulated plenty of electronic files. For users, how to quickly find their desired files from the massive resources is a big challenge, which is als... 详细信息
来源: 评论
Chest Radiographs Based Pneumothorax Detection Using Federated Learning
收藏 引用
computer Systems science & engineering 2023年 第11期47卷 1775-1791页
作者: Ahmad Almadhor Arfat Ahmad Khan Chitapong Wechtaisong Iqra Yousaf Natalia Kryvinska Usman Tariq Haithem Ben Chikha Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka72388Saudi Arabia Department of Computer Science College of ComputingKhon Kaen UniversityKhon Kaen40002Thailand School of Telecommunication Engineering Suranaree University of TechnologyNakhon Ratchasima30000Thailand Department of Computer Science and Software Engineering International Islamic UniversityIslamabadPakistan Information Systems Department Faculty of ManagementComenius University in BratislavaOdbojárovBratislava440Slovakia Prince Sattam bin Abdulaziz University AlKharjSaudi Arabia
Pneumothorax is a thoracic condition that occurs when a person’s lungs collapse,causing air to enter the pleural cavity,the area close to the lungs and chest *** most persistent disease,as well as one that necessitat... 详细信息
来源: 评论
CAPAST: Content Affinity Preserved Arbitrary Style Transfer
CAPAST: Content Affinity Preserved Arbitrary Style Transfer
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xinyuan Zheng Xiaojie Li Canghong Shi Jia He Zhan Ao Huang Xian Zhang Imran Mumtaz School of Computer Science Chengdu University of Information Technology China School of Computer and Software Engineering Xihua University China Faculty of Engineering and Mathematical Sciences The University of Western Australia Australia Department of Computer Science University of Agriculture Faisalabad Pakistan
Balancing the consistency of style and the integrity of content is the main challenge in arbitrary style transfer domain. Currently, local style details can be effectively captured by attention mechanism but easily pr... 详细信息
来源: 评论
AI-Based Assistant for Determining the Required Performance Level for a Safety Function  48
AI-Based Assistant for Determining the Required Performance ...
收藏 引用
48th Annual Conference of the IEEE Industrial Electronics Society, IECON 2022
作者: Iyenghar, Padma Hu, Yuxia Kieviet, Michael Pulvermueller, Elke Wuebbelmann, Juergen Innotec GmbH Erlenweg 12 Melle49324 Germany Osnabrueck University of Applied Sciences Faculty of Engineering and Computer Science Germany University of Osnabrueck Software Engineering Research Group Germany
Standards such as ISO 13849 and ISO 12100 enable users to model safety related control elements with safety functions, according to a specified architecture and required performance level. In this direction, a novel A... 详细信息
来源: 评论
A High-Resolution Approach for Dynamic Traffic Police Gestures Recognition Based on Spatial Context and Temporal Features Fusion  8
A High-Resolution Approach for Dynamic Traffic Police Gestur...
收藏 引用
8th International Conference on Image, Vision and Computing, ICIVC 2023
作者: He, Jian Jiang, Shengsheng Wei, Xin Zhang, Cheng Dong, Ruihai Beijing Engineering Research Center for IOT Software and Systems Beijing University of Technology Beijing China Beijing University of Technology Faculty of Information Technology Beijing China School of Computer Science University College Dublin Dublin Ireland
According to the requirement of recognizing traffic police gestures for driver assistance systems and intelligent vehicles, a universal model for dynamic traffic police gesture recognition is firstly introduced, of wh... 详细信息
来源: 评论
Blockchain and PUF-based secure key establishment protocol for cross-domain digital twins in industrial Internet of Things architecture
收藏 引用
Journal of Advanced Research 2024年 62卷 155-163页
作者: Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Kharel, Rupak Das, Ashok Kumar Shetty, Sachin Rodrigues, Joel J.P.C. School of Psychology and Computer Science University of Central Lancashire Preston United Kingdom Graduate School of Intelligent Data Science National Yunlin University of Science and Technology Yunlin 64002 Taiwan Department of Software Engineering The University of Lahore Lahore 54590 Pakistan Department of Computer Science University of Sahiwal Punjab Sahiwal 57000 Pakistan Center for Security Theory and Algorithmic Research International Institute of Information Technology Hyderabad 500 032 India Department of Modeling Simulation and Visualization Engineering Virginia Modeling Analysis and Simulation Center and Center for Cybersecurity Education and Research Old Dominion University Suffolk 23435 VA United States COPELABS Lusófona University Campo Grande 376 Lisbon 1749-024 Portugal
Introduction: The Industrial Internet of Things (IIoT) is a technology that connects devices to collect data and conduct in-depth analysis to provide value-added services to industries. The integration of the physical... 详细信息
来源: 评论
Exploring the Dark Side: A Systematic Review of Generative AI’s Role in Network Attacks and Breaches
Exploring the Dark Side: A Systematic Review of Generative A...
收藏 引用
Conference of Recent Trends and Applications of Soft Computing in engineering, RTASCE 2024
作者: Kurtović, Hamza Šabanović, Esma Almisreb, Ali Abd Saleh, Mohammed A. Ismail, Nurlaila Faculty of Computer Science and Engineering International University of Sarajevo Sarajevo Bosnia and Herzegovina Department of Cybersecurity International Information Technology University Almaty Kazakhstan College of Engineering Universiti Teknologi MARA Selangor Shah Alam Malaysia
Generative artificial intelligence has a paradoxical nature, which on the one hand brings innovative breakthroughs, and on the other hand brings with it a series of growing challenges. Processing of natural language, ... 详细信息
来源: 评论