咨询与建议

限定检索结果

文献类型

  • 1,962 篇 会议
  • 1,228 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,046 篇 工学
    • 1,616 篇 计算机科学与技术...
    • 1,360 篇 软件工程
    • 385 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 226 篇 生物工程
    • 178 篇 电气工程
    • 169 篇 生物医学工程(可授...
    • 155 篇 机械工程
    • 131 篇 电子科学与技术(可...
    • 124 篇 光学工程
    • 83 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 952 篇 理学
    • 528 篇 数学
    • 250 篇 生物学
    • 237 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 133 篇 系统科学
    • 71 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 185 篇 工商管理
  • 183 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 109 篇 法学
    • 85 篇 社会学
  • 75 篇 经济学
    • 75 篇 应用经济学
  • 53 篇 教育学
  • 35 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 software enginee...
  • 102 篇 computer science
  • 92 篇 deep learning
  • 90 篇 machine learning
  • 71 篇 accuracy
  • 67 篇 software
  • 65 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 55 篇 training
  • 51 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 46 篇 security
  • 44 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 39 篇 real-time system...
  • 36 篇 convolutional ne...

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 33 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 department of co...
  • 21 篇 school of comput...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 department of in...
  • 16 篇 faculty of compu...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 15 篇 ow siew hock
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 2,873 篇 英文
  • 348 篇 其他
  • 25 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3248 条 记 录,以下是691-700 订阅
排序:
Smart Photo Editor for Differently-abled People using Assistive Technology  6
Smart Photo Editor for Differently-abled People using Assist...
收藏 引用
6th International Conference on Information Technology Research, ICITR 2021
作者: Buddhika, A.S. Wijesekera, P.K. Kavindu, D. G. Hasintha Dinusha, Dilshan S Arachchillage, Udara Srimath S. Samaratunge Kuruppu, Thilmi Anuththara Faculty of Computing Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Malabe Sri Lanka
Differently-abled people are significant minority groups, have many limitations to live everyday life, are starved of services, and are mostly ignored by society due to many types of disabilities. This problem may lea... 详细信息
来源: 评论
Stakeholder Identification Overview and Challenges in Requirements engineering Prospective  2
Stakeholder Identification Overview and Challenges in Requir...
收藏 引用
2nd International Conference on Computing and Information Technology, ICCIT 2022
作者: Elneel, Duha Awad Fakharudin, Abdul Sahli Ahmed, Elsadig Musa Kahtan, Hasan Abdullateef, Mansoor Universiti Malaysia Pahang Faculty of Computing Kuantan26300 Malaysia Multimedia University Faculty of Business Melaka Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur50603 Malaysia Knowbis Solutions Consultancy Selangor Malaysia
Stakeholder identification (SI) illustrates a critical part of the requirements elicitation activity. It helps software analysts gather accurate system requirements to ensure high quality and avoid system failure. Sta... 详细信息
来源: 评论
Analytical Modeling and Empirical Validation of Performability of Service- and Cloud-Based Dynamic Routing Architecture Patterns
Analytical Modeling and Empirical Validation of Performabili...
收藏 引用
Asia-Pacific Conference on software engineering
作者: Amirali Amiri Uwe Zdun André van Hoorn Faculty of Computer Science Research Group Software Architecture University of Vienna Vienna Austria Department of Informatics Software Engineering and Construction Methods University of Hamburg Hamburg Germany
Many dynamic routing architectural patterns are available, including distributed routing, e.g., using the sidecar pattern, or centralized routing, e.g., using event stores or service buses. Different Quality-of-Servic...
来源: 评论
Research and development of an information system for speech recognition based on neural network algorithms metrics
Research and development of an information system for speech...
收藏 引用
Smart Information Systems and Technologies (SIST), IEEE International Conference on
作者: Maksat Kanashev Assel Mukasheva Didar Yedilkhan Sabina Rakhmetulaeva Sergiy Gnatyuk Mirambayeva Nazym Almaty University of Power Engineering and Telecommunications Almaty Kazakhstan School of Information Technology and Engineering Kazakh-British Technical University Almaty Kazakhstan Department of Computer Engineering Astana IT University Astana Kazakhstan Department of Information Systems International University of Information Technologies Almaty Kazakhstan Faculty of Cybersecurity Computer and Software Engineering National Aviation University National Aviation University Kyiv Ukraine
This article examines the parameters of speech recognition in audio recordings containing a variety of phrases uttered by different people with different accents and intonations. The aim of the study is to evaluate th... 详细信息
来源: 评论
Ontological Model for Cohesive Smart Health Services Management
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3679-3695页
作者: Muhammad Raza Naqvi Muhammad Waseem Iqbal Syed Khuram Shahzad M.Usman Ashraf Khalid Alsubhi Hani Moaiteq Aljahdali Le Laboratoire Génie de Production de l’École Nationale d’Ingénieurs de Tarbes(LGP-INP-ENIT) Universitéde ToulouseCEDEXTarbes65016France Department of Software Engineering Superior UniversityLahore53700Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Computer Science University of Management and TechnologySialkot51310Pakistan Department of Computer Science King Abdul-Aziz UniversityJeddah21577Saudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21577Saudi Arabia
Health care has become an essential social-economic concern for all stakeholders(e.g.,patients,doctors,hospitals etc.),health needs,private care and the elderly class of *** massive increase in the usage of health car... 详细信息
来源: 评论
Intent Classification of Nepali Factoid Questions
Intent Classification of Nepali Factoid Questions
收藏 引用
Cognitive Computing and Complex Data (ICCD), International Conference on the
作者: Sushil Timilsina Ashim Khadka Jianchu Lin Faculty of Science and Technology Gandaki College of Engineering and Science Pokhara Nepal Faculty of Science and Technology Nepal College of Information Technology Lalitpur Nepal Faculty of Computer and Software Engineer Huaiyin Institute of Technology Jiangsu China
Question Classification plays a vital role in identifying the accurate answer to any question, and is considered as a core component of Question Answering Systems. In Nepali Natural Language Processing, the area of Qu...
来源: 评论
Modif-SegUnet: Innovatively Advancing Liver Cancer Diagnosis and Treatment through Efficient and Meaningful Segmentation of 3D Medical Images
Modif-SegUnet: Innovatively Advancing Liver Cancer Diagnosis...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Chenhang Wang Yujian Jin Jiayi Liang YuHan Yang Shanling Nie Yang Hai Department of Computer Science and Engineering East China University of Science and Technology Shanghai China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Faculty of Engineering The University of Sydney Sydney Australia
Hepatocellular Carcinoma (HCC) holds a record of high incidence and severe global harm. In tasks of liver cancer segmentation based on 3D medical images, the majority of methods have endeavored to enhance the 3D U-net...
来源: 评论
A systematic literature review to implement large language model in higher education: issues and solutions
收藏 引用
Discover Education 2025年 第1期4卷 1-25页
作者: Guizani, Sghaier Mazhar, Tehseen Shahzad, Tariq Ahmad, Wasim Bibi, Afsha Hamam, Habib College of Engineering Alfaisal University Riyadh 11533 Saudi Arabia School of Computer Science National College of Business Administration and Economics Lahore 54000 Pakistan Department of Computer Science and Information Technology School Education Department Government of Punjab Layyah 31200 Pakistan Department of Computer Engineering COMSATS University Islamabad Sahiwal Campus Sahiwal 57000 Pakistan Department of Computing School of Arts and Creative Technology University of Greater Manchester Manchester BL15AB United Kingdom Department of Computer and Software Technology University of Swat Swat 19200 Pakistan Faculty of Engineering Uni de Moncton Moncton E1A3E9 NB Canada School of Electrical Engineering University of Johannesburg Johannesburg 2006 South Africa International Institute of Technology and Management (IITG) Av. Grandes Ecoles Libreville BP 1989 Gabon Bridges for Academic Excellence - Spectrum Tunis Tunisia
Artificial intelligence-driven Chatbots, especially large language models (LLMs) like GPT-4, represent significant progress in digital education. These models excel in mimicking human-like text and transforming learni... 详细信息
来源: 评论
Deep learning based DeepFake video detection
Deep learning based DeepFake video detection
收藏 引用
2023 International Conference on Smart Computing and Application, ICSCA 2023
作者: Guefrachi, Sarra Ben Jabra, Marwa Alsharabi, Naif A. Ben Othman, Mohamed Tahar Alharabi, Yasser O. Alkholidi, Abdulsalam Hammam, Habib Université de Moncton Faculty of Engineering MonctonNBE1A3E9 Canada Spectrum of Knowledge Production & Skills Development Sfax3027 Tunisia Computer Engineering University of Ha'il Computer Science Amran University Yemen Ha'il55476 Saudi Arabia College of Computer Qassim University Department of Computer Science Buraydah51452 Saudi Arabia College of Computer Sc. & Engneering Ha'il University Computer Science and Information Ha'il Saudi Arabia Canadian Institute of Technology College Department of Software Engineering Tirana Albania International Institute of Technology and Management Commune d'Akanda BP Libreville1989 Gabon School of Electrical Engineering University of Johannes-burg Dept of Electrical and Electronic Eng. Science Tirana Albania
Recent advances in DeepFake face-swapping technology have made it simple to create fake videos that appear remarkably real. Since it has been employed in numerous instances for deceit, extortion, and the falsification... 详细信息
来源: 评论
Lessons Learned from Persona Usage in Requirements engineering Practice
Lessons Learned from Persona Usage in Requirements Engineeri...
收藏 引用
IEEE International Conference on Requirements engineering
作者: Devi Karolita John C. Grundy Tanjila Kanij Jennifer McIntosh Humphrey O. Obie Department Informatics Engineering Faculty of Engineering Palangka Raya University Palangka Raya Indonesia Department of Software Systems and Cybersecurity Faculty of IT Monash University Melbourne Australia School of Science Computing and Engineering Technologies Swinburne University of Technology Melbourne Australia Melbourne School of Population and Global Health University of Melbourne Melbourne Australia Telstra Health Melbourne Australia
Personas, as a tool for characterising end-users, are widely utilised in requirements engineering (RE), primarily to enhance the understanding of end-users and their needs. However, the efficacy of persona usage in RE... 详细信息
来源: 评论