咨询与建议

限定检索结果

文献类型

  • 1,962 篇 会议
  • 1,228 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,046 篇 工学
    • 1,616 篇 计算机科学与技术...
    • 1,360 篇 软件工程
    • 385 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 226 篇 生物工程
    • 178 篇 电气工程
    • 169 篇 生物医学工程(可授...
    • 155 篇 机械工程
    • 131 篇 电子科学与技术(可...
    • 124 篇 光学工程
    • 83 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 952 篇 理学
    • 528 篇 数学
    • 250 篇 生物学
    • 237 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 133 篇 系统科学
    • 71 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 185 篇 工商管理
  • 183 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 109 篇 法学
    • 85 篇 社会学
  • 75 篇 经济学
    • 75 篇 应用经济学
  • 53 篇 教育学
  • 35 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 software enginee...
  • 102 篇 computer science
  • 92 篇 deep learning
  • 90 篇 machine learning
  • 71 篇 accuracy
  • 67 篇 software
  • 65 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 55 篇 training
  • 51 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 46 篇 security
  • 44 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 39 篇 real-time system...
  • 36 篇 convolutional ne...

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 33 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 department of co...
  • 21 篇 school of comput...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 department of in...
  • 16 篇 faculty of compu...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 15 篇 ow siew hock
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 2,873 篇 英文
  • 348 篇 其他
  • 25 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3248 条 记 录,以下是791-800 订阅
排序:
Arabic Sentiment Analysis of Mobile Banking Services Reviews
Arabic Sentiment Analysis of Mobile Banking Services Reviews
收藏 引用
International Conference on Social Networks Analysis, Management and Security (SNAMS)
作者: Safaa M. Khabour Dheya Mustafa Qutaibah AlThebyan Dept. of Information Systems Faculty of Information Technology and Computer Sciences Yarmouk University Irbid Jordan Dept. of Computer Engineering Faculty of Engineering The Hashemite University Zarqa Jordan Dept. of Cybersecurity Al Ain University Al Ain UAE Jordan University of Science and Technology Irbid Jordan
Online customer reviews have developed into a significant source of information about a business's performance. Due to shifting consumer expectations and growing internet penetration, the Middle East, especially J...
来源: 评论
Robust In-Vehicle Diagnostic-Based Intrusion Detection System
Robust In-Vehicle Diagnostic-Based Intrusion Detection Syste...
收藏 引用
International Symposium on Networks, computers and Communications (ISNCC)
作者: Ahmed Shafee Tasneem A. Awaad Ahmed Moro Department of Engineering and Computer Science Adams State University Alamosa CO USA Department of Computer and Systems Engineering Faculty of Engineering Ain Shams University Cairo Egypt Siemens EDA Cairo Egypt Integrated Electrical Systems Segment Siemens Digital Industries Software Cairo Egypt
cybersecurity has become a significant concern for automotive manufacturers as modern cars increasingly incorporate electronic components. Electronic Control Units (ECUs) have evolved to become the central control uni... 详细信息
来源: 评论
A Conceptual Model to Identify Illegal Activities on the Bitcoin System  3rd
A Conceptual Model to Identify Illegal Activities on the Bit...
收藏 引用
3rd International Conference on Advances in Cyber Security, ACeS 2021
作者: Al-Hashedi, Khaled Gubran Magalingam, Pritheega Maarop, Nurazean Samy, Ganthan Narayana Manaf, Azizah Abdul Advanced Informatics Department Razak Faculty of Technology and Informatics Universiti Teknologi Malaysia Kuala Lumpur Malaysia Department of Cybersecurity College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia
Soon after its inception in 2009, Bitcoin was used as a tool by malicious attackers who exploit its pseudo-anonymity to establish untraceable frauds. Recently, several Bitcoin users and institutions have confirmed tha... 详细信息
来源: 评论
Dual-Sensor Fusion for Real-Time Monitoring of Crystal Methamphetamine Withdrawal Symptoms Using Machine Learning and Gramian Angular Fields
Dual-Sensor Fusion for Real-Time Monitoring of Crystal Metha...
收藏 引用
International Conference on New Trends in Computing sciences (ICTCS)
作者: Omar Amr Ali Ahmed Ayman Atia Software Engineering Department October University for Modern Sciences and Arts (MSA) Cairo Egypt HCI-LAB Faculty of Computers and Artificial Intelligence Helwan University Faculty of Computer Science October University for Modern Sciences and Arts (MSA) Giza Egypt
Managing withdrawal from crystal metham-phetamine is challenging due to limitations in existing wearable technology, such as single sensor setups and accuracy issues. This research proposes a dual-sensor system that c... 详细信息
来源: 评论
IOT based prediction of rainfall forecast in coastal regions using deep reinforcement model
收藏 引用
Measurement: Sensors 2023年 29卷
作者: Nithyashri, J. Poluru, Ravi Kumar Balakrishnan, S. Ashok Kumar, M. Prabu, P. Nandhini, S. Department of Computing Technologies School of Computing SRM Institute of Science and Technology Chengalpet District Kattankulathur603203 India Department of Information Technology Institute of Aeronautical Engineering Hyderabad India Department of Computer Science and Business Systems Sri Krishna College of Engineering and Technology Coimbatore India Faculty of Computer Science Department of Computer Science and Software Engineering Skyline University Nigeria Kano Nigeria Bengaluru560029 India Department of Computer Science and Engineering Karpagam Academy of Higher Education Tamilnadu Coimbatore India
This research proposes an IoT based technique for predicting rainfall forecast in coastal regions using a deep reinforcement learning model. The proposed technique utilizes Long Short-Term Memory (LSTM) networks to ca... 详细信息
来源: 评论
A Proposed Approach for Risk Planning and Management
A Proposed Approach for Risk Planning and Management
收藏 引用
Information Technology (ACIT)
作者: Mohammed N. Al Refai Yazan Al-Smadi Adai Al-Momani Zeyad M. Jamhawi Ahmed Ali Otoom Issa Atoum Ahid Yaseen Jafar Ababneh Mohammad Kanan Software Engineering Dep. Zarqa University Zarqa Jordan Department of Computer Science Zarqa University Zarqa Jordan Department of Computer Science Applied Science Private University Amman Jordan Department of Cyber Security Applied Science Private University Amman Jordan Software Engineering Department Faculty of Information Technology Philadelphia University Jordan Department of Cyber Security Zarqa University Zarqa Jordan Dep. of Industry Engineering University of Business and Technelogy Jeddah Saudi Arabia
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management.... 详细信息
来源: 评论
Artificial Intelligence-based Service Chains Scheduling for Medical Emergency in Healthcare  7
Artificial Intelligence-based Service Chains Scheduling for ...
收藏 引用
7th International Conference on Contemporary Computing and Informatics, IC3I 2024
作者: Soni, Mukesh Rusho, Maher Ali Byeon, Haewon Alghamdi, Azzah Hannan, Shaikh Abdul Dave, Parth Rameshchandra Dr. D. Y. Patil School of Science & Technology Tathawade Dr. D. Y. Patil Vidyapeeth Marashtra Pune India University of Colorado Department of Lockheed Martin Engineering Management BoulderCO80309 United States Inje University Department of Ai and Software & Medical Big Data Research Centre Gimhae50834 Korea Republic of Imam Abdalrhman Bin Faisal University College of Computer Science and Information Technology Computer Information Systems Department Khobar Saudi Arabia AlBaha University Faculty of Computing and Information AlBaha Saudi Arabia L. D. College of Engineering Department of Computer Engineering Gujarat Ahmedabad India
This study analyses the weekly scheduling challenge of health and medical information network service function chains to meet medical emergency categorization and grading needs. Emergency services are divided into fou... 详细信息
来源: 评论
Fingerprint Matching for Noisy and Distorted Patterns Using a Siamese Network With ResNet50 and Multihead Attention
收藏 引用
IEEE Access 2025年 13卷 88047-88064页
作者: Sawhney, Tinny Sharma, Ashu Abrol, Pawanesh Kumar Lehana, Parveen Chaahat Yadav, Vaishali Scherer, Rafal Kulakov, Oleksii Ali Alzubi, Ahmad University of Jammu DSP Laboratory Department of Electronics Jammu180006 India University of Jammu Department of Computer Science and IT Jammu180006 India Chitkara University Institute of Engineering and Technology Chitkara University Department of Computer Science and Engineering Punjab Rajpura140401 India Manipal University Jaipur Department of Computer Science & Communication Engineering Jaipur303007 India Czestochowa University of Technology Department of Artificial Intelligence Częstochowa42-200 Poland Faculty of Informatics and Software Engineering National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute" Kyiv03056 Ukraine King Saud University Community College Department of Computer Science Riyadh11451 Saudi Arabia
Dermatoglyphics, the study of unique ridge patterns on fingertips, plays a crucial role in fingerprint-based identification. However, skin conditions such as psoriasis, eczema, and verruca vulgaris can distort these p... 详细信息
来源: 评论
Experimentation on NN Models for Hazard Identification in Machinery Functional Safety
Experimentation on NN Models for Hazard Identification in Ma...
收藏 引用
IEEE International Conference on Industrial Informatics (INDIN)
作者: Padma Iyenghar Michael Kieviet Elke Pulvermueller Juergen Wuebbelmann innotec GmbH Erlenweg 12 Melle Germany Faculty of Engineering and Computer Science Osnabrueck University of Applied Sciences Germany Software Engineering Research Group University of Osnabrueck Germany
The use of Artificial Intelligence (AI) in machinery functional safety can enhance efficiency and accuracy by automating tasks previously carried out by humans. This paper presents an experimental evaluation of Neural...
来源: 评论
Systematizing the Meta-Analytical Process in software engineering  21
Systematizing the Meta-Analytical Process in Software Engine...
收藏 引用
Proceedings of the 2021 European Symposium on software engineering
作者: Letizia Jaccheri Zamira Kholmatova Giancarlo Succi Department of Computer Science Faculty of Information Technology and Electrical Engineering Norwegian University of Science and Technology Norway Faculty of Computer Science Lab for Industrializing the Production of Software Innopolis University Russia
The generalization of knowledge is a necessary part of every scientific field. Meta-analysis is already advocated as a tool for generalization in different areas such as medicine, psychology, business, and this proces... 详细信息
来源: 评论