咨询与建议

限定检索结果

文献类型

  • 1,962 篇 会议
  • 1,228 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,046 篇 工学
    • 1,616 篇 计算机科学与技术...
    • 1,360 篇 软件工程
    • 385 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 226 篇 生物工程
    • 178 篇 电气工程
    • 169 篇 生物医学工程(可授...
    • 155 篇 机械工程
    • 131 篇 电子科学与技术(可...
    • 124 篇 光学工程
    • 83 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 952 篇 理学
    • 528 篇 数学
    • 250 篇 生物学
    • 237 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 133 篇 系统科学
    • 71 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 185 篇 工商管理
  • 183 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 109 篇 法学
    • 85 篇 社会学
  • 75 篇 经济学
    • 75 篇 应用经济学
  • 53 篇 教育学
  • 35 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 software enginee...
  • 102 篇 computer science
  • 92 篇 deep learning
  • 90 篇 machine learning
  • 71 篇 accuracy
  • 67 篇 software
  • 65 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 55 篇 training
  • 51 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 46 篇 security
  • 44 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 39 篇 real-time system...
  • 36 篇 convolutional ne...

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 33 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 department of co...
  • 21 篇 school of comput...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 department of in...
  • 16 篇 faculty of compu...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 15 篇 ow siew hock
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 2,873 篇 英文
  • 348 篇 其他
  • 25 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3248 条 记 录,以下是781-790 订阅
排序:
An Ensemble Machine Learning Technique for Stroke Prognosis
收藏 引用
computer Systems science & engineering 2023年 第10期47卷 413-429页
作者: Mesfer Al Duhayyim Sidra Abbas Abdullah Al Hejaili Natalia Kryvinska Ahmad Almadhor Uzma Ghulam Mohammad Department of Computer Science College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz University Al-Kharj16273Saudi Arabia Department of Computer Science COMSATS UniversityIslamabad53000Pakistan Computer Science Department Faculty of Computers&Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Information Systems Department Faculty of ManagementComenius University in BratislavaOdbojárovBratislava440Slovakia Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka72388Saudi Arabia Department of Computer Science and Software Engineering International Islamic UniversityIslamabad44000Pakistan
Stroke is a life-threatening disease usually due to blockage of blood or insufficient blood flow to the *** has a tremendous impact on every aspect of life since it is the leading global factor of disability and *** c... 详细信息
来源: 评论
Privacy-aware Data Fusion and Prediction for Smart City Services in Edge Computing Environment  15
Privacy-aware Data Fusion and Prediction for Smart City Serv...
收藏 引用
2022 IEEE Congress on Cybermatics: 15th IEEE International Conferences on Internet of Things, iThings 2022, 18th IEEE International Conferences on Green Computing and Communications, GreenCom 2022, 2022 IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2022 and 8th IEEE International Conference on Smart Data, SmartData 2022
作者: Qi, Lianyong Chi, Xiaoxiao Zhou, Xiaokang Liu, Qi Dai, Fei Xu, Xiaolong Zhang, Xuyun School of Computer Science Qufu Normal University China Faculty of Data Science Shiga University Japan Riken Center for Advanced Intelligence Project Japan School of Computer and Software Nanjing University of Information Science and Technology China School of Big Data and Intelligence Engineering Southwest Forestry University China Department of Computing Macquarie University Australia
With fast development of Cyber Physical System, the variety and volume of data generated from different edge servers are fairly considerable. Mining and exploiting the data would definitely bring huge advantages. Howe... 详细信息
来源: 评论
Image Inpainting and Classification Agent Training Based on Reinforcement Learning and Generative Models with Attention Mechanism
Image Inpainting and Classification Agent Training Based on ...
收藏 引用
2021 International Conference on Microelectronics, ICM 2021
作者: Ukwuoma, Chiagoziem C. Belal Bin Heyat, Md Masadeh, Mahmoud Akhtar, Faijan Zhiguang, Qin Bondzie-Selby, Emmanuel Alshorman, Omar Alkahtani, Fahad University of Electronic Science and Technology of China School of Information and Software Engineering Sichuan Chengdu China Shenzhen University IoT Research Center College of Computer Science and Software Engineering Guangdong Shenzhen China Yarmouk University Hijjawi Faculty for Engineering Computer Engineering Deprtment Irbid21163 Jordan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu China Najran University Faculty of Engineering AlShrouk Trading Company Najran Saudi Arabia Najran University Faculty of Engineering Electrical Engineering Department Najran Saudi Arabia
What distinguishes the field of artificial intelligence (AI) from others is to develop fully independent agents that learn optimal behavior, change, and evolve solely through the communication of trial and error with ... 详细信息
来源: 评论
Exploring the role of project status information in effective code smell detection
收藏 引用
Cluster Computing 2025年 第1期28卷 1-18页
作者: Alkharabsheh, Khalid Alawadi, Sadi Crespo, Yania Taboada, José A. Software Engineering Department Prince Abdullah bin Ghazi Faculty of Information and Communication Technology Al-Balqa Applied University Al-Salt19117 Jordan School of Computer Science Blekinge Tekniska Högskola Blekinge Tekniska Högskola Blekinge Karlskrona37179 Sweden Departamento de Informática Escuela de Ingeniería Informática Universidad de Valladolid Paseo de Belén 15 Valladolid47011 Spain Department of Electronics and Computing Universidad de Santiago de Compostela Santiago15782 Spain
Repairing code smells detected in the code or design of the system is one of the activities contributing to increasing the software quality. In this study, we investigate the impact of non-numerical information of sof... 详细信息
来源: 评论
cybersecurity Threats in the Era of AI: Detection of Phishing Domains Through Classification Rules  2
Cybersecurity Threats in the Era of AI: Detection of Phishin...
收藏 引用
2nd International engineering Conference on Electrical, Energy, and Artificial Intelligence, EICEEAI 2023
作者: Aljaidi, Mohammad Alsarhan, Ayoub Al-Fraihat, Dimah Al-Arjan, Ahmed Igried, Bashar El-Salhi, Subhieh M. Khalid, Muhammad Al-Na'amneh, Qais Zarqa University Faculty of Information Technology Department of Computer Science Zarqa13110 Jordan The Hashemite University Department of Information Technology Jordan Isra University Faculty of Information Technology Department of Software Engineering Amman11622 Jordan The Hashemite University Faculty of Prince AL-Hussein Bin Abdullah Ii of Information Technology Department of Information Technology Jordan The Hashemite University Department of Computer Science and Applications Zarqa Jordan The Hashemite University P. O Box 330127 Zarqa13133 Jordan University of Hull Department of Computer Sciences and Technology Kingston upon Hull United Kingdom Applied Science Private University Dep. of Cyber Security Amman Jordan
Phishing is a cyber threat where attackers create deceptive websites or emails to exploit individuals for fraudulent purposes such as providing sensitive information like usernames, passwords, or financial details. He... 详细信息
来源: 评论
Integrating Design Thinking into software Process Improvement  4
Integrating Design Thinking into Software Process Improvemen...
收藏 引用
4th International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2024
作者: Khalid, Anum Hashmi, Amber Sarwar Kiani, Azaz Ahmed Muzammal, Syeda Mariam Jhanjhi, N.Z. Bibi, Ruqia Kumar, Sandeep Foundation University Department of Software Engineering Islamabad Pakistan Rawalpindi Women University Department of Software Engineering Rawalpindi Pakistan National University of Modern Languages Rawalpindi Pakistan School of Computer Science Taylor's University Faculty of Innovation and Technology Subang Jaya Malaysia University Institute of Information Technology Pir Mehr Ali Shah Arid Agriculture University Rawalpindi Pakistan Lovely Professional University Division of Research and Development Phagwara144411 India KKR and KSR institute of technology and sciences Andhra Pradesh Guntur India
The need for software improvement is growing widely due to the demand for technology development. The issues that arise by expanding the software processes in the workplace are expense, lack of understanding, time con... 详细信息
来源: 评论
SYNFER: TOWARDS BOOSTING FACIAL EXPRESSION RECOGNITION WITH SYNTHETIC DATA
arXiv
收藏 引用
arXiv 2024年
作者: He, Xilin Luo, Cheng Xian, Xiaole Li, Bing Song, Siyang Khan, Muhammad Haris Xie, Weicheng Shen, Linlin Ge, Zongyuan Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China AIM Lab Faculty of IT Monash University Australia KAUST Saudi Arabia University of Exter United Kingdom MBZUAI United Arab Emirates
Facial expression datasets remain limited in scale due to privacy concerns, the subjectivity of annotations, and the labor-intensive nature of data collection. This limitation poses a significant challenge for develop...
来源: 评论
A parallel proposal with message passing for the implementation of a Pipeline in the development of the video game SIMON  35
A parallel proposal with message passing for the implementat...
收藏 引用
35th European Modeling and Simulation Symposium, EMSS 2023
作者: Rossainz-López, Mario Cabrera-Hernández, Liosbel Sánchez-Rinza, Bárbara Capel-Tuñon, Manuel Faculty of Computer Science Autonomous University of Puebla Av. San Claudio and 14 Sur Street San Manuel PueblaC.P. 72570 Mexico Software Engineering Department College of Informatics and Telecommunications ETSIIT University of Granada Daniel Saucedo Aranda s/n Granada18071 Spain
The design and development of the inter-process communication pattern called Pipeline is presented as a proposal of Parallel Object Composition to solve simple way problems that can be solved with this same parallel c... 详细信息
来源: 评论
A Chatbot Assistant for Reducing Risk in Machinery Design
A Chatbot Assistant for Reducing Risk in Machinery Design
收藏 引用
IEEE International Conference on Industrial Informatics (INDIN)
作者: Padma Iyenghar Michael Kieviet Elke Pulvermueller Juergen Wuebbelmann innotec GmbH Erlenweg 12 Melle Germany Faculty of Engineering and Computer Science Osnabrueck University of Applied Sciences Germany Software Engineering Research Group University of Osnabrueck Germany
In this paper, a novel chatbot for risk reduction as an aid during machinery design is presented. The general workflow of the chatbot involves the identification of the hazard described by the user using a neural netw...
来源: 评论
A Machine-Learning-based Surrogate Modeling Methodology for Submodel Integration in the Holistic Railway Digital Twin Platform  33
A Machine-Learning-based Surrogate Modeling Methodology for ...
收藏 引用
33rd CIRP Design Conference
作者: Zhou, Shiyang Meierhofer, Alexander Kugu, Ozan Xia, Yuxi Grafinger, Manfred TU Wien Institute of Engineering Design and Product Development Lehargasse 6/307 Vienna1060 Austria Virtual Vehicle Research GmbH Co-Simulation and Software Group Inffeldgasse 21a Graz8010 Austria University of Vienna Faculty of Computer Science Kolingasse 14-16 Vienna1090 Austria
A holistic railway infrastructure digital twin (DT) platform is sophisticated and consists of a series of submodels (e.g., turnouts, tracks, vehicles, etc.) that are built through various methodologies and software. H... 详细信息
来源: 评论