咨询与建议

限定检索结果

文献类型

  • 1,959 篇 会议
  • 1,230 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,247 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,048 篇 工学
    • 1,620 篇 计算机科学与技术...
    • 1,363 篇 软件工程
    • 386 篇 信息与通信工程
    • 318 篇 控制科学与工程
    • 226 篇 生物工程
    • 180 篇 电气工程
    • 168 篇 生物医学工程(可授...
    • 157 篇 机械工程
    • 130 篇 电子科学与技术(可...
    • 123 篇 光学工程
    • 82 篇 安全科学与工程
    • 79 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 955 篇 理学
    • 530 篇 数学
    • 250 篇 生物学
    • 238 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 134 篇 系统科学
    • 70 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 187 篇 工商管理
  • 184 篇 医学
    • 151 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 74 篇 药学(可授医学、理...
  • 110 篇 法学
    • 86 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 52 篇 教育学
  • 36 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 92 篇 deep learning
  • 90 篇 machine learning
  • 72 篇 accuracy
  • 66 篇 software
  • 64 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 53 篇 training
  • 50 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 45 篇 security
  • 43 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 38 篇 real-time system...
  • 37 篇 convolutional ne...

机构

  • 46 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 3,049 篇 英文
  • 172 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3247 条 记 录,以下是511-520 订阅
排序:
Medical Image Analysis of Lung Tumor Diagnosis Based on Generalized Fuzzy C-Means Clustering Algorithm
Medical Image Analysis of Lung Tumor Diagnosis Based on Gene...
收藏 引用
International Conference on Emerging Electronic and Automation Technology 2022, ICEEAT 2022
作者: Zwaid, Jassim Mohammed Ahmed Murad, Masrah Azrifah Azmi Khalid, Fatimah Binti Manshor, Noridayu Al-Jumaily, Abdulmajeed Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Affiliated to University of Anbar Ramadi Iraq Department of Software Engineering and Information System Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Multimedia Department Faculty of Computer Science and Information Technology University Putra Malaysia UPM Serdang 43400 Malaysia Department of Signal Theory and Communications Universidad Carlos III de Madrid Leganés Madrid28911 Spain
In recent years, the rapid development of medical imaging technology has brought medical image analysis into the era of big data. CT imaging technology is one of the most common imaging methods for disease screening. ... 详细信息
来源: 评论
Detection of Toxic Content on Social Networking Platforms Using Fine Tuned ULMFiT Model
收藏 引用
Intelligent Automation & Soft Computing 2023年 第1期35卷 15-30页
作者: Hafsa Naveed Abid Sohail Jasni Mohamad Zain Noman Saleem Rao Faizan Ali Shahid Anwar Department of Software Engineering Faculty of ScienceUniversity of LahorePakistan Department of Computer Science COMSATS University IslamabadLahore CampusPakistan Institute for Big Data Analyics and Artifcial Intelligence(IBDAAI) Kompleks Al-KhawarizmiUniversii Tekoogi MARA40450Shah AlamSelangorMalaysia TechnoGenics SMC PVT LTD LahorePakistan Department of Computer and Infomation Science Universiti Teknologi PETRONASBandar Ser IskandarTronohPerakMalaysia Depatment of Information Engineering Technology National Skils University IslamabadSector H-8/1Faiz AhmedFaiz RoadIslamabadPakistan
Question and answer websites such as Quora,Stack Overflow,Yahoo Answers and Answer Bag are used by *** users post questions on these websites to get the answers from domain specific *** websites are multilingual meani... 详细信息
来源: 评论
Improving WiFi Fingerprint Database With Irregular Distribution of Reference Points Using Interpolation Methods
Improving WiFi Fingerprint Database With Irregular Distribut...
收藏 引用
2024 International Conference on Advanced Technologies for Communications, ATC 2024
作者: Vu-Thanh, Trung He, Jing Duong-Bao, Ninh Lee, Seon-Woo Thi, Luong Nguyen Nguyen-Huu, Khanh College of Computer Science and Electronic Engineering Hunan University Changsha China Dalat University Faculty of Mathematics and Informatics Dalat Viet Nam Hallym University Division of Software Chuncheon Korea Republic of Dalat University Faculty of Information Technology Dalat Viet Nam Dalat University Department of Electronics and Telecommunications Dalat Viet Nam
Using WiFi Fingerprinting for indoor positioning is becoming increasingly popular due to its cost-effectiveness. However, to ensure the system can operate with high accuracy and stability, this technique requires a bu... 详细信息
来源: 评论
What You Print is Not What You Get Anymore: Man-in-The-Middle Attacks on Intellectual Property and Integrity of 3d Printers
SSRN
收藏 引用
SSRN 2023年
作者: Alkofahi, Hamza Alawneh, Heba Skjellum, Anthony Software Engineering Department Jordan University of Science and Technology Irbid Jordan Cybersecurity Department Jordan University of Science and Technology Irbid Jordan Computer Science and Engineering Department The University of Tennessee at Chattanooga ChattanoogaTN United States
Additive Manufacturing (AM) was originally invented to reduce the cost of the prototyping process. Overtime, the technology evolved to be faster, more accurate, and affordable. These factors, in addition to the potent... 详细信息
来源: 评论
An Enhanced Authentication Protocol Suitable for Constrained RFID Systems
收藏 引用
IEEE Access 2024年 12卷 61610-61628页
作者: Hosseinzadeh, Mehdi Servati, Mohammad Reza Rahmani, Amir Masoud Safkhani, Masoumeh Lansky, Jan Janoscova, Renata Ahmed, Omed Hassan Tanveer, Jawad Lee, Sang-Woong Duy Tan University Institute of Research and Development Da Nang550000 Viet Nam Duy Tan University School of Medicine and Pharmacy Da Nang550000 Viet Nam Shahid Rajaee Teacher Training University Department of Computer Engineering Tehran16788-15811 Iran National Yunlin University of Science and Technology Future Technology Research Center Douliou Yunlin64002 Taiwan School of Computer Science Tehran19395-5746 Iran University of Finance and Administration Faculty of Economic Studies Department of Computer Science and Mathematics Prague101 00 Czech Republic University of Human Development Department of Information Technology Sulaymaniyah0778-6 Iraq Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of Gachon University Pattern Recognition and Machine Learning Laboratory Department of Ai Software Seongnam-si13557 Korea Republic of
RFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privac... 详细信息
来源: 评论
An Architecture for Integrating QKD into Terrestrial Networks
An Architecture for Integrating QKD into Terrestrial Network...
收藏 引用
Quantum Communications, Networking, and Computing (QCNC), International Conference on
作者: Noel Farrugia Christian Galea Aaron Abela Ryan Debono Trevor Spiteri André Xuereb Johann A. Briffa Merqury Cybersecurity Limited Malta Dept. of Communications & Computer Engineering Faculty of ICT University of Malta Msida MSD Malta Dept. of Physics Faculty of Science University of Malta Msida MSD Malta
Quantum Key Distribution (QKD) is widely accepted as being necessary to counteract threats posed by quantum computers to cybersecurity. However, a QKD setup is fundamentally a single-link solution. Applying this effec... 详细信息
来源: 评论
Path2Vec: A Deep Representation Learning Method for Trajectory Feature Extraction and HYSPLIT Uncertainty Quantification
收藏 引用
Applied Mathematics and Nonlinear sciences 2024年 第1期9卷
作者: Ren, Ke Jin, Chengyao Song, Yuxuan Xu, Yang Zhang, Huijie Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huaian223003 China School of Information Science and Technology Northeast Normal University Changchun130117 China
Accurate quantification of the uncertainty in HYSPLIT model simulations is crucial for analyzing atmospheric pollution propagation paths and assessing environmental risks. This study introduces Path2Vec, a method base... 详细信息
来源: 评论
Local Weighted Neighborhood Rough Sets for Weakly Labeled Data
Local Weighted Neighborhood Rough Sets for Weakly Labeled Da...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Yanting Guo Meng Hu Qiang Liu Eric C.C. Tsang Xizhao Wang College of Computer Science and Software Engineering Shenzhen University Shenzhen China Faculty of Innovation Engineering Macau University of Science and Technology Macau
Local rough set models are efficient rough data analysis methods for weakly labeled data in the rough set field. However, the existing local models do not distinguish the importance of different attributes to decision...
来源: 评论
A Robust Methodology for Fruit Quality Prediction and Estimation Using Intelligent Learning Based Image Processing Logic
A Robust Methodology for Fruit Quality Prediction and Estima...
收藏 引用
2024 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems, ICSES 2024
作者: Malathi, K. Babu, Vunnava Dinesh Ramkumar, M. Ayyadurai, M. Vivek, K. Aljawawdeh, Hamzeh J. Saveetha University Department of Cse Chennai India Rv Institute of Technology Department of Cse Guntur India Rajalakshmi Engineering College Department of Computer Science and Engineering Chennai India Yeshwantrao Chavan College of Engineering Department of Mechanical Engineering Nagpur India Department of software engineering Faculty of information technology Zarqa University Zarqa Jordan University of Business and Technology Jeddah21448 Saudi Arabia
Fruit quality prediction plays a vital role in agricultural and food industries, ensuring that only high-quality produce reaches the consumer. Traditional methods of assessing fruit quality rely on manual inspection, ... 详细信息
来源: 评论
QoS Prediction Model of Cloud Services Based on Deep Learning
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第3期9卷 564-566页
作者: WenJun Huang PeiYun Zhang YuTong Chen MengChu Zhou Yusuf Al-Turki Abdullah Abusorrah Nanjing University of Information Science&Technology School of Computer and SoftwareNanjingChina IEEE New Jersey Institute of Technology Helen and John C.Hartmann Department of Electrical and Computer EngineeringNewarkUSA Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer EngineeringFaculty of Engineeringand K.A.CARE Energy Research and Innovation CenterKing Abdulaziz UniversityJeddah 21589Saudi Arabia
Dear editor,This letter presents a deep learning-based prediction model for the quality-of-service(QoS)of cloud ***,to improve the QoS prediction accuracy of cloud services,a new QoS prediction model is proposed,which... 详细信息
来源: 评论