咨询与建议

限定检索结果

文献类型

  • 1,962 篇 会议
  • 1,235 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,255 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,047 篇 工学
    • 1,617 篇 计算机科学与技术...
    • 1,360 篇 软件工程
    • 385 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 226 篇 生物工程
    • 178 篇 电气工程
    • 169 篇 生物医学工程(可授...
    • 155 篇 机械工程
    • 131 篇 电子科学与技术(可...
    • 124 篇 光学工程
    • 83 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 952 篇 理学
    • 528 篇 数学
    • 250 篇 生物学
    • 237 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 133 篇 系统科学
    • 71 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 185 篇 工商管理
  • 183 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 109 篇 法学
    • 85 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 53 篇 教育学
  • 35 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 software enginee...
  • 102 篇 computer science
  • 93 篇 deep learning
  • 90 篇 machine learning
  • 72 篇 accuracy
  • 67 篇 software
  • 66 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 55 篇 training
  • 51 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 46 篇 security
  • 44 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 39 篇 real-time system...
  • 36 篇 convolutional ne...

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 33 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 17 篇 muhammad adnan k...
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 ow siew hock
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 2,880 篇 英文
  • 348 篇 其他
  • 25 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3255 条 记 录,以下是641-650 订阅
排序:
Discovering Authorization Business Rules toward Detecting Web Applications Logic Flaws
Discovering Authorization Business Rules toward Detecting We...
收藏 引用
Information Technology (ACIT)
作者: Hamza Alkofahi David Umphress Heba Alawneh Department of Software Engineering Jordan University of Science and Technology Irbid Jordan Department of Computer Science and Software Engineering Auburn University Auburn USA Department of Cybersecurity Al Hussein Technical University Amman Jordan
Aggressive integration of validation checks into web framework software has altered the attack surface of web applications by reducing the opportunity for traditional injection flaws. The hacking community's react... 详细信息
来源: 评论
Smart Advertising Based on Customer Preferences and Manage the Supermarket  4
Smart Advertising Based on Customer Preferences and Manage t...
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Eishan Dinuka, W.H.A. Wickramasinghe, A.Y.S.W. Weerasinghe, W.S.H. Karunaratne, K.P.G. Liyanapathirana, Chethana Rupasinghe, Lakmal Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Information Technology Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
As a developing country, Sri Lanka needs to go along with cutting-edge technologies. In the beginning phase of this digital advertising, multiple advertisements were displayed on the users' feeds, including advert... 详细信息
来源: 评论
Group Anomaly Detection: Past Notions, Present Insights, and Future Prospects
收藏 引用
SN computer science 2021年 第3期2卷 1-27页
作者: Feroze, Aqeel Daud, Ali Amjad, Tehmina Hayat, Malik Khizar Department of Computer Science and Software Engineering International Islamic University Islamabad Pakistan Department of Computer Science and Artificial Intelligence College of Computer Science and Engineering Jeddah University Jeddah Saudi Arabia Department of Information Technology Faculty of Information Technology and Engineering The University of Haripur Haripur Pakistan
Anomaly detection has evolved as a successful research subject in the areas such as bibliometrics, informatics and computer networks including security-based and social networks. Almost all existing anomaly detection ... 详细信息
来源: 评论
Architecting Digital Twins for Intelligent Transportation Systems
arXiv
收藏 引用
arXiv 2025年
作者: Bhatt, Hiya Sahil Vaidhyanathan, Karthik Biju, Rahul Gangadharan, Deepak Trestian, Ramona Shah, Purav Software Engineering Research Centre IIIT Hyderabad India Computer Systems Group IIIT Hyderabad India Faculty of Science and Technology Middlesex University London United Kingdom
Modern transportation systems face growing challenges in managing traffic flow, ensuring safety, and maintaining operational efficiency amid dynamic traffic patterns. Addressing these challenges requires intelligent s... 详细信息
来源: 评论
Influence of Key Nodes in Industrial Control Malicious Code Modeling
Influence of Key Nodes in Industrial Control Malicious Code ...
收藏 引用
Electronic Information engineering and computer science (EIECS), 2021 International Conference on
作者: Wei Yang Hongwei Yan Chao Xu Yu Yao Jinlei Zhou Baile Wang Danni Wang Software College Northeastem University Shenyang China School of Computer Science And Engineering Northeastem University Shenyang China Department of Cybersecurity Monitoring State Grid Liaoning Information and Communication Company Shenyang China
Key nodes in complex networks play an important role in the structure of the entire network. Different nodes in the network often have different degrees, and the node with the highest degree in the network is usually ...
来源: 评论
A Lightweight CNN-Based Pothole Detection Model for Embedded Systems Using Knowledge Distillation  21
A Lightweight CNN-Based Pothole Detection Model for Embedded...
收藏 引用
21st International Conference on New Trends in Intelligent software Methodologies, Tools and Techniques, SoMeT 2022
作者: Musa, Aminu Hassan, Mohammed Hamada, Mohamed Kakudi, Habeebah Adamu Amin, Md. Faizul Ibne Watanobe, Yutaka Department of Computer Science Federal University Dutse Nigeria Faculty of Computer Sci. & Info. Technology Bayero University Kano Nigeria Software Engineering Lab University of Aizu Japan Graduate School of Computer Science University of Aizu Japan Division of Information System University of Aizu Japan
Recent breakthroughs in computer vision have led to the invention of several intelligent systems in different sectors. In transportation, this advancement led to the possibility of proposing autonomous vehicles. This ... 详细信息
来源: 评论
Machine Learning Approaches for Efficient Traffic Flow in Smart Cities  3
Machine Learning Approaches for Efficient Traffic Flow in Sm...
收藏 引用
3rd Odisha International Conference on Electrical Power engineering, Communication and Computing Technology, ODICON 2024
作者: Kulkarni, Aniket Anitha, P. Valluri, John Yesudas Sunena Rose, M.V. Hemavathi, U. Hussein, Omar M. Software Qa Manager Drata Inc San DiegoCA United States Kalasalingam Academy of Research and Education Department of Computer Applications Tamil Nadu Srivilliputhur India Faculty of Management Studies Bengaluru India Department of Computer Science and Engineering Bengaluru India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Cse Avadi Chennai India Al-Farahidi University Medical Technical College Medical Instrumentation Engineering Baghdad Iraq
These days, a lot of towns struggle with traffic jams during peak hours, which increment contamination, commotion, and feelings of anxiety for the general population. Because neural networks (NN) and machine learning ... 详细信息
来源: 评论
Classification and Evaluation Framework of Automated testing tools for agile software: Technical Review
Classification and Evaluation Framework of Automated testing...
收藏 引用
Emerging Smart Technologies and Applications (eSmarTA), International Conference on
作者: Mogeeb A.A. Moseh Nashwan Ameen Al-Khulaidi Abdu H. Gumaei Ayman Alsabry Ali A. A. Musleh Software Engineering Dept Faculty of Engineering & Information Technology Taiz University Taiz Yemen Industrial Dept. Engineering Dep Faculty of Engineering & Information Technology Taiz Univerity Taiz Yemen Computer Science Dept. College of Computer Engineering and Sciences Prince Sattam bin Abdulaziz University Al-Kharj Saudi Arabia Department of Computer Science International University of Technology Twintech Sana’a Yemen Faculty of Computer Science & Information Technology International University of Technology Twintech Sana’a Yemen
Test automation is crucial for agile software projects to enable frequent delivery of working software with cost and time and minimal bugs. However, selecting the right automated testing tool is considered challenging... 详细信息
来源: 评论
Essential proteins identification based on weak consensus model and neighborhood aggregation centrality
Essential proteins identification based on weak consensus mo...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Hu, Zhipeng Li, Gaoshi Wu, Jingli Luo, Xinlong Liu, Jiafei Peng, Wei Zhu, Xiaoshu Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guilin541004 China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining & Security Guilin541004 China Guangxi Normal University College of Computer Science and Engineering Guilin541004 China Kunming University of Science and Technology Faculty of Information Engineering and Automation Kunming650500 China Guilin University of Electronic Science and Technology School of Computer and Information Security & School of Software Engineering Guilin China
Essential proteins play an essential role in cell survival and replication. Currently, more and more computational methods are developed to identify essential proteins, which overcome the time-consuming, costly and in... 详细信息
来源: 评论
Development of a Model for Discriminating Electroencephalograms of Patients with Mild Cognitive Impairment and Healthy Individuals Using a Support Vector Machine  13
Development of a Model for Discriminating Electroencephalogr...
收藏 引用
Joint 13th International Conference on Soft Computing and Intelligent Systems and 25th International Symposium on Advanced Intelligent Systems, SCIS and ISIS 2024
作者: Tanabe, Akifumi Nakatani, Kyosuke Harachi, Kento Yamamoto, Yusuke Muramatsu, Ayumi Nagahara, Hajime Takemura, Noriko Shimojo, Shinji Furihata, Daisuke Mizuno-Matsumoto, Yuko Kamae-Shigenobu, Kazue Shinosaki, Kazuhiro Graduate School of Information Science University of Hyogo Kobe Japan School of Life Science and Technology Tokyo Institute of Technology Yokohama Japan Aino University Department of Medical Engineering Ibaraki Japan Institute for Datability Science Osaka University Suita Japan Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology Iizuka Japan Aomori University Faculty of Software and Information Technology Aomori Japan Osaka University Cyber Media Center Suita Japan Asakayama General Hospital Sakai Japan
We performed machine learning using spectrum analysis and power spectra of electroencephalograms (EEGs) of patients with mild cognitive impairment (MCI). Spectrum analysis was performed on the EEGs of MCI patients and... 详细信息
来源: 评论