咨询与建议

限定检索结果

文献类型

  • 1,962 篇 会议
  • 1,228 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 3,248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,046 篇 工学
    • 1,616 篇 计算机科学与技术...
    • 1,360 篇 软件工程
    • 385 篇 信息与通信工程
    • 316 篇 控制科学与工程
    • 226 篇 生物工程
    • 178 篇 电气工程
    • 169 篇 生物医学工程(可授...
    • 155 篇 机械工程
    • 131 篇 电子科学与技术(可...
    • 124 篇 光学工程
    • 83 篇 安全科学与工程
    • 78 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 75 篇 化学工程与技术
    • 73 篇 网络空间安全
  • 952 篇 理学
    • 528 篇 数学
    • 250 篇 生物学
    • 237 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 133 篇 系统科学
    • 71 篇 化学
  • 658 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 185 篇 工商管理
  • 183 篇 医学
    • 151 篇 临床医学
    • 129 篇 基础医学(可授医学...
    • 85 篇 公共卫生与预防医...
    • 75 篇 药学(可授医学、理...
  • 109 篇 法学
    • 85 篇 社会学
  • 75 篇 经济学
    • 75 篇 应用经济学
  • 53 篇 教育学
  • 35 篇 农学
  • 18 篇 文学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 software enginee...
  • 102 篇 computer science
  • 92 篇 deep learning
  • 90 篇 machine learning
  • 71 篇 accuracy
  • 67 篇 software
  • 65 篇 artificial intel...
  • 60 篇 computational mo...
  • 59 篇 feature extracti...
  • 55 篇 training
  • 51 篇 internet of thin...
  • 49 篇 information tech...
  • 48 篇 predictive model...
  • 46 篇 semantics
  • 46 篇 security
  • 44 篇 data mining
  • 42 篇 optimization
  • 41 篇 support vector m...
  • 39 篇 real-time system...
  • 36 篇 convolutional ne...

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 33 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 department of co...
  • 21 篇 school of comput...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 department of in...
  • 16 篇 faculty of compu...
  • 15 篇 school of comput...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 21 篇 raja hashim ali
  • 20 篇 ali raja hashim
  • 18 篇 herawan tutut
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 15 篇 ow siew hock
  • 14 篇 zain ul abideen
  • 14 篇 susilo willy
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 samara ghassan
  • 12 篇 ahmed bestoun s.

语言

  • 2,873 篇 英文
  • 348 篇 其他
  • 25 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Cybersecurity Software Engineering and Computer Science"
3248 条 记 录,以下是831-840 订阅
排序:
Custom Hidden Markov Models for Effective Part-of-Speech Tagging
Custom Hidden Markov Models for Effective Part-of-Speech Tag...
收藏 引用
International Conference on Emerging Technologies, ICET
作者: Hassan Bin Khalid Abu Bakar Siddique Raja Hashim Ali Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany
Hidden Markov Models have proved to be a very significant tool for various time-series related problems, especially where context is important. One such problem is Part-of-speech tagging. The work uses a customized HM...
来源: 评论
Impact of COVID-19 on Predicting 2020 US Presidential Elections on Social Media  16th
Impact of COVID-19 on Predicting 2020 US Presidential Electi...
收藏 引用
16th International Conference on Information Technology and Applications, ICITA 2022
作者: Khan, Asif Zhang, Huaping Boudjellal, Nada Hayat, Bashir Dai, Lin Ahmad, Arshad Al-Hamed, Ahmed School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China The Faculty of New Information and Communication Technologies University Abdelhamid Mehri Constantine 2 Constantine25000 Algeria Institute of Management Sciences Peshawar Peshawar Pakistan Institute of Software Systems Engineering Johannes Kepler University Linz4040 Austria Department of IT and Computer Science Pak-Austria Fachhochschule: Institute of Applied Sciences and Technology Mang Khanpur Road Haripur22620 Pakistan
By the beginning of 2020, the world woke up to a global pandemic that changed people’s everyday lives and restrained their physical contact. During those times Social Media Platforms (SMPs) were almost the only mean ... 详细信息
来源: 评论
Diving into Brain Complexity: Exploring Functional and Effective Connectivity Networks
Diving into Brain Complexity: Exploring Functional and Effec...
收藏 引用
International Conference on Emerging Technologies, ICET
作者: Abu Bakar Siddique Hassan Bin Khalid Raja Hashim Ali Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany
The human brain's intricate functions are under-pinned by a vast network of synapses that enable chemical impulses between neurons. Neuroscientists employ two key approaches, functional and effective connectivity,...
来源: 评论
Boost Decentralized Federated Learning in Vehicular Networks by Diversifying Data Sources
Boost Decentralized Federated Learning in Vehicular Networks...
收藏 引用
International Conference on Network Protocols
作者: Dongyuan Su Yipeng Zhou Laizhong Cui College of Computer Science and Software Engineering Shenzhen University Shenzhen China Faculty of Science and Engineering School of Computing Macquarie University Sydney Australia
Recently, federated learning (FL) has received intensive research because of its ability in preserving data privacy for scattered clients to collaboratively train machine learning models. Commonly, a parameter server ... 详细信息
来源: 评论
Boost Decentralized Federated Learning in Vehicular Networks by Diversifying Data Sources
arXiv
收藏 引用
arXiv 2022年
作者: Su, Dongyuan Zhou, Yipeng Cui, Laizhong College of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Computing Faculty of Science and Engineering Macquarie University Sydney Australia
Recently, federated learning (FL) has received intensive research because of its ability in preserving data privacy for scattered clients to collaboratively train machine learning models. Commonly, a parameter server ... 详细信息
来源: 评论
Comparative Analysis of Classifier Performance on Reduced Feature Sets
Comparative Analysis of Classifier Performance on Reduced Fe...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Raed Alazaidah Wael Hadi Suhaila Abu Owaida Alaa Bani-bakr Mo'ath Alluwaici Muhyeeddin Alqaraleh Department of Data Science Faculty of Information Technology Zarqa University Zarqa Jordan Department of Information Security Faculty of Information Technology University of Petra Amman Jordan Department of Computer Science Faculty of Information Technology Al-al-Bayt University Mafraq Jordan Department of Cyber Security Faculty of Information Technology Zarqa University Zarqa Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa Jordan Software Engineering Department Faculty of Information Technology Zarqa University Zarqa Jordan
In this study, we examine the impact of feature reduction on the performance of various classifiers within the Weka environment. Utilizing the Pima Indians Diabetes Database, we compare the Accuracy, Precision, Recall... 详细信息
来源: 评论
Improved Time-Saving Face Detection in Video
Improved Time-Saving Face Detection in Video
收藏 引用
International engineering Conference (IEC)
作者: Jihad Anwar Qadir Shayan Ihsan Jalal Samer Kais Jameel Abdulbasit Al-Talabani Department of Computer Science College of Basic Education University of Raparin Rania Kurdistan Region Iraq Department of Software Engineering Faculty of Engineering Koya University Koya Kurdistan Region Iraq
Human face detection from video sequences is a difficult problem in computer vision. Face detection is the process of determining the location of a face or faces in each frame of a video. Face detection in real-time v...
来源: 评论
Effect of Using Continuous Integration (CI) and Continuous Delivery (CD) Deployment in DevOps to reduce the Gap between Developer and Operation
Effect of Using Continuous Integration (CI) and Continuous D...
收藏 引用
Information Technology (ACIT)
作者: Abrar Mohammad Mowad Hamed Fawareh Mohammad A. Hassan Software Engineering Dept Faculty of Information Technology Zarqa University Computer Science Dept Faculty of Information Technology Zarqa University
This paper focuses on how to use continuous integration (CI) and continuous Delivery (CD) methodology in DevOps to reduce the developer-operator gap. It also, shows how CI can be a CD bridge. The paper review DevOps a... 详细信息
来源: 评论
Security-based Safety Hazard Analysis using STAMP, STPA & HAZOP: A DAM Case Study
Security-based Safety Hazard Analysis using STAMP, STPA & HA...
收藏 引用
Frontiers of Information Technology (FIT)
作者: Muhammad Farooq Irum Inayat Maya Daneva Department of Software Engineering National University of Computer Emerging Sciences Islamabad Pakistan Department of Creative Technology Air University Islamabad Pakistan LERO University College Cork Cork Ireland Faulty of Electrical Engineering Mathematics and Computer Science (EEMCS) Services Cybersecurity & Safety (SCS) University of Twente Enschede The Netherlands
Security and safety emerged as an interconnected concept for Cyber-Physical Systems (CPS). In recent years, CPS witnessed an enormous cyber-attack that endorsed the significance of security over safety of the CPS. Man...
来源: 评论
Revolutionizing Campus Exploration with GikiLenS: A Deep Learning-Powered Object Detection App
Revolutionizing Campus Exploration with GikiLenS: A Deep Lea...
收藏 引用
International Conference on Emerging Technologies, ICET
作者: Iqra Mueed Usama Arshad Raja Hashim Ali Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany
For newcomers and tourists, navigating university campuses can be difficult, resulting in aggravation and lost time. We respond by introducing “GikiLenS”, an object identification application driven by deep learning...
来源: 评论