咨询与建议

限定检索结果

文献类型

  • 1,962 篇 会议
  • 1,228 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,046 篇 工学
    • 1,616 篇 计算机科学与技术...
    • 1,360 篇 软件工程
    • 385 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 226 篇 生物工程
    • 178 篇 电气工程
    • 169 篇 生物医学工程(可授...
    • 155 篇 机械工程
    • 131 篇 电子科学与技术(可...
    • 124 篇 光学工程
    • 83 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 952 篇 理学
    • 528 篇 数学
    • 250 篇 生物学
    • 237 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 133 篇 系统科学
    • 71 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 185 篇 工商管理
  • 183 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 109 篇 法学
    • 85 篇 社会学
  • 75 篇 经济学
    • 75 篇 应用经济学
  • 53 篇 教育学
  • 35 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 software enginee...
  • 102 篇 computer science
  • 92 篇 deep learning
  • 90 篇 machine learning
  • 71 篇 accuracy
  • 67 篇 software
  • 65 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 55 篇 training
  • 51 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 46 篇 security
  • 44 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 39 篇 real-time system...
  • 36 篇 convolutional ne...

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 33 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 department of co...
  • 21 篇 school of comput...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 department of in...
  • 16 篇 faculty of compu...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 15 篇 ow siew hock
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 2,873 篇 英文
  • 348 篇 其他
  • 25 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3248 条 记 录,以下是591-600 订阅
排序:
Dependency Update Strategies and Package Characteristics
arXiv
收藏 引用
arXiv 2023年
作者: Jafari, Abbas Javan Costa, Diego Elias Shihab, Emad Abdalkareem, Rabe Lab The Department of Computer Science and Software Engineering Concordia University Montreal Canada Montreal Canada Department of Computer Science The Faculty of Science Omar Al-Mukhtar University Libya
Managing project dependencies is a key maintenance issue in software development. Developers need to choose an update strategy that allows them to receive important updates and fixes while protecting them from breakin... 详细信息
来源: 评论
Fitweet: Arduino-Based Smartwatch for Early Anticipatory Anxiety Notification System  9th
Fitweet: Arduino-Based Smartwatch for Early Anticipatory Anx...
收藏 引用
9th International Conference on Computational science and Technology, ICCST 2022
作者: Abdulmanab, Muhammad Rahiman Nor’Azman, Nur Faidz Hazirah Meon, Hasni Razak, Chempaka Seri Abdul Ab Hamid, Siti Hafizah Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia Department of Communication Faculty of Communication Visual Art and Computing Universiti Selangor Bestari Jaya Malaysia School of Pre-University Studies Taylor’s College Lakeside Campus Subang Jaya Malaysia
As anxiety becomes increasingly prevalent among youths especially university students, early prevention via anxiety disorder profiling is crucial. Nevertheless, most screening tools to date are not automated, labour-i... 详细信息
来源: 评论
Supporting the Episodic Application of Clinical Guidelines over Significant Time Periods
Supporting the Episodic Application of Clinical Guidelines o...
收藏 引用
34th Medical Informatics Europe Conference, MIE 2024
作者: Ben Shahar, Bruria Shahar, Yuval Jaffe, Shai Cohen, Odeya Shalom, Erez Selivanova, Maya Rimon, Ephraim Goldstein, Ayelet Department of Software and Information Systems Engineering Ben-Gurion University Israel Department of Nursing Faculty of Health Sciences Ben-Gurion University Israel Nursing Informatics lab Faculty of Health Sciences Ben-Gurion University Israel Herzfeld Geriatric Rehabilitation Medical Center Clalit Health Services Israel Department of Computer Science Hadassah Academic College Jerusalem Israel
Medical errors contribute significantly to morbidity and mortality, emphasizing the critical role of Clinical Guidelines (GLs) in patient care. Automating GL application can enhance GL adherence, improve patient outco... 详细信息
来源: 评论
Using Formal Knowledge to Support Episodic Evidence-Based Nursing Care
Using Formal Knowledge to Support Episodic Evidence-Based Nu...
收藏 引用
34th Medical Informatics Europe Conference, MIE 2024
作者: Jaffe, Shai Ben Shahar, Bruria Shahar, Yuval Goldstein, Ayelet Shalom, Erez Selivanova, Maya Rimon, Ephraim Cohen, Odeya Department of Nursing Faculty of Health Sciences Ben-Gurion University of the Negev Israel Nursing Informatics lab Faculty of Health Sciences Ben-Gurion University of the Negev Israel Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Israel Computer Science Department Hadassah Academic College Israel Herzfeld Geriatric Rehabilitation Medical Center Israel
Applying evidence-based medicine prevents medical errors highlighting the need for applying Clinical Guidelines (CGs) to improve patient care by nurses. However, nurses often face challenges in utilizing CGs due to pa... 详细信息
来源: 评论
Comparative Study for Identifying and Categorizing DDoS Attacks
Comparative Study for Identifying and Categorizing DDoS Atta...
收藏 引用
Learning and Technology Conference (L&T)
作者: Asaad B. Saad Eman Hossny Fatma A. Omara Software Engineering Department Faculty of Computers and Artificial Intelligence Cairo University Cairo Egypt Computer Science Department Faculty of Computers and Artificial Intelligence Cairo University Cairo Egypt
Distributed Denial of Service, known as DDoS attacks, significantly compromise network security and availability. Certain DDoS detection methods utilize machine learning techniques, whereas others are based on statist...
来源: 评论
Improved Ingredients-based Recipe Recommendation software using Machine Learning
Improved Ingredients-based Recipe Recommendation Software us...
收藏 引用
IEEE International Conference on Intelligent Computing and Information Systems (ICICIS)
作者: Mariam Ashraf Khadija Tarek Naglaa Fathy Mariam Mahmoud Rana Emad Khadija Khaled Noran Amr Software Engineering Department Faculty of Computer and Information Science Ain Shams University Cairo Egypt Information Systems Department Faculty of Computer and Information Science Ain Shams University Cairo Egypt
In this paper we propose an improved recipe recommendation system that employs image recognition of food ingredients. The system is currently a mobile application that performs image recognition on uploaded or camera-...
来源: 评论
Imitation learning from purified demonstrations  24
Imitation learning from purified demonstrations
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Yunke Wang Minjing Dong Yukun Zhao Bo Du Chang Xu School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence and Wuhan Institute of Data Intelligence Wuhan University China Department of Computer Science City University of Hong Kong China School of Computer Science Faculty of Engineering The University of Sydney Australia
Imitation learning has emerged as a promising approach for addressing sequential decision-making problems, with the assumption that expert demonstrations are optimal. However, in real-world scenarios, most demonstrati...
来源: 评论
Suggestion Mining from Opinionated Text of Big Social Media Data
收藏 引用
computers, Materials & Continua 2021年 第9期68卷 3323-3338页
作者: Youseef Alotaibi Muhammad Noman Malik Huma Hayat Khan Anab Batool Saif ul Islam Abdulmajeed Alsufyani Saleh Alghamdi Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversitySaudi Arabia Department of Computer Science Faculty of Engineering and Computer SciencesNational University of Modern LanguagesIslamabadPakistan Department of Software Engineering Faculty of Engineering and Computer SciencesNational University of Modern LanguagesIslamabadPakistan Department of Computer Sciences Institute of Space TechnologyIslamabadPakistan Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaifSaudi Arabia
:Social media data are rapidly increasing and constitute a source of user opinions and tips on a wide range of products and *** increasing availability of such big data on biased reviews and blogs creates challenges f... 详细信息
来源: 评论
Enhancing Urban Road Safety: A 5G NR Model for Vulnerable Road Users Awareness
收藏 引用
IEEE Access 2025年 13卷 99170-99182页
作者: Yáñez, Alexis Salas, Felipe Azurdia-Meza, César Sandoval, Jorge Céspedes, Sandra Concordia University Gina Cody School of Engineering and Computer Science Department of Computer Science & Software Engineering Montreal H3G 1M8 QC Canada University of Chile Faculty of Physical and Mathematical Sciences Department of Electrical Engineering Santiago 8370451 Chile Bain & Company Inc. Boston MA United States
The widespread adoption of cellular networks has played an important role in the integration of road safety applications, capitalizing on the ubiquitous use of this technology by road users and its extensive market pe... 详细信息
来源: 评论
A Deep Learning Framework for Object Detection and Tracking: CNN-Based Parcel Tracking on Conveyor Belts
A Deep Learning Framework for Object Detection and Tracking:...
收藏 引用
Sustainable Technologies for Industry 4.0 (STI), International Conference on
作者: Md Jobair Hossain Faruk Md Kamrul Siam Alex Theilmann Kristiyan Georgiev Jerry Q. Cheng Hossain Shahriar Department of Computer Science New York Institute of Technology USA Nova School of Business and Economics Portugal R&D Computer Vision and Software Engineering Manager Materials Handling Systems Inc. USA Center for Cybersecurity University of West Florida USA
Object Detection and Tracking (ODT) represents a critical area within computer vision, with broad applications across various industries, particularly in the automation of logistics operations. However, significant ch... 详细信息
来源: 评论