咨询与建议

限定检索结果

文献类型

  • 2,662 篇 会议
  • 1,376 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,519 篇 工学
    • 1,982 篇 计算机科学与技术...
    • 1,655 篇 软件工程
    • 490 篇 信息与通信工程
    • 370 篇 控制科学与工程
    • 275 篇 生物工程
    • 227 篇 电气工程
    • 211 篇 生物医学工程(可授...
    • 196 篇 机械工程
    • 168 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 95 篇 仪器科学与技术
    • 95 篇 化学工程与技术
    • 95 篇 安全科学与工程
    • 87 篇 交通运输工程
    • 81 篇 动力工程及工程热...
  • 1,197 篇 理学
    • 647 篇 数学
    • 319 篇 物理学
    • 311 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 161 篇 系统科学
    • 93 篇 化学
  • 821 篇 管理学
    • 510 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 249 篇 工商管理
  • 212 篇 医学
    • 178 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 128 篇 法学
    • 101 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 75 篇 教育学
  • 41 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 147 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 95 篇 deep learning
  • 88 篇 feature extracti...
  • 84 篇 computational mo...
  • 84 篇 accuracy
  • 83 篇 software
  • 80 篇 artificial intel...
  • 73 篇 training
  • 66 篇 optimization
  • 63 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 51 篇 security
  • 46 篇 support vector m...
  • 45 篇 software testing
  • 44 篇 internet of thin...
  • 44 篇 information tech...
  • 44 篇 testing

机构

  • 45 篇 college of compu...
  • 40 篇 faculty of compu...
  • 37 篇 department of so...
  • 37 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 huaiyin institut...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 18 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,887 篇 英文
  • 187 篇 其他
  • 30 篇 中文
  • 3 篇 土耳其文
  • 2 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Software Engineering and Computer Engineering"
4107 条 记 录,以下是271-280 订阅
排序:
BERT-AraPeotry: BERT-based Arabic Poems Classification Model
BERT-AraPeotry: BERT-based Arabic Poems Classification Model
收藏 引用
Emerging Smart Technologies and Applications (eSmarTA), International Conference on
作者: Abdulfattah E. Ba Alawi Ferhat Bozkurt Mete Yağanoğlu Computer Engineering Department Faculty of Engineering Ataturk University Erzurum Turkey Software Engineering Department Faculty of Engineering & IT Taiz University Taiz Yemen
Based on the time of writing, Arabic poems are divided into eras or periods. Each era has its poetic properties that characterize its poems. The classification of poems and literary texts into eras using conventional ... 详细信息
来源: 评论
Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies
收藏 引用
computers, Materials & Continua 2024年 第7期80卷 263-280页
作者: Waseem Akram Khalid Mahmood Hafiz Burhan ul Haq Muhammad Asif Shehzad Ashraf Chaudhry Taeshik Shon Graduate School of Engineering Science and Technology National Yunlin University of Science and TechnologyYunlin64002TaiwanChina Future Technology Research Center National Yunlin University of Science and TechnologyYunlin64002TaiwanChina Department of Computer Science Lahore Garrison UniversityLahore54920Pakistan Department of Computer Science and Information Technology College of EngineeringAbu Dhabi UniversityAbu Dhabi69911United Arab Emirates Department of Software Engineering Faculty of Engineering and ArchitectureNisantasi UniversityIstanbul34398Turkey Department of Cybersecurity Ajou UniversitySuwon16499Republic of Korea
Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol(HTTP)requests andmaintains the states of clients’information over the *** cookies are expl... 详细信息
来源: 评论
SPUFChain: Permissioned Blockchain Lightweight Authentication Scheme for Supply Chain Management Using PUF of IoT
收藏 引用
IEEE Access 2025年 13卷 88662-88682页
作者: Assaqty, Mohammad Iqbal Saryuddin Gao, Ying Alqarni, Abeer D. Khan, Siraj Chakraborty, Mohuya Nur Siddiqi, Hafied Ahmad, Sadique South China University of Technology School of Computer Science and Engineering Guangzhou510006 China Universitas Nahdlatul Ulama Indonesia Faculty of Engineering and Computer Science Jakarta10320 Indonesia Princess Nourah bint Abdulrahman University College of Computer and Information Sciences Department of Information Technology P.O. Box 84428 Riyadh11671 Saudi Arabia Research Institute for Future Media Computing College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China University of Engineering and Management Cybersecurity Centre of Excellence Kolkata700160 India Riyadh12435 Saudi Arabia
The complexity of the entire process of supply chain management (SCM) is quite cumbersome and traditional way of handling it is devoid of proper authentication and security and very often suffers from human errors in ... 详细信息
来源: 评论
Research and development of an information system for speech recognition based on neural network algorithms metrics  4
Research and development of an information system for speech...
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Kanashev, Maksat Mukasheva, Assel Yedilkhan, Didar Rakhmetulaeva, Sabina Gnatyuk, Sergiy Nazym, Mirambayeva Almaty University of Power Engineering and Telecommunications Almaty Kazakhstan The School of Information Technology and Engineering Kazakh-British Technical University Almaty Kazakhstan The Department of Computer Engineering Astana IT University Astana Kazakhstan The Department of Information Systems International University of Information Technologies Almaty Kazakhstan The Faculty of Cybersecurity Computer and Software Engineering National Aviation University National Aviation University Kyiv Ukraine
This article examines the parameters of speech recognition in audio recordings containing a variety of phrases uttered by different people with different accents and intonations. The aim of the study is to evaluate th... 详细信息
来源: 评论
Towards a Conceptual Model for Assessing User Satisfaction in Metaverse-Based Learning  11
Towards a Conceptual Model for Assessing User Satisfaction i...
收藏 引用
11th International Conference on Information Technology, ICIT 2023
作者: Alhalaybeh, Awf Althunibat, Ahmad Al-Mahadeen, Bassam M. Habashneh, Khaldoun Khalil Daradkeh, Ali Mohammad Software Engineering Al-Zaytoonah University of Jordan Madaba Jordan Software Engineering Al-Zaytoonah University of Jordan Amman Jordan Mu'Tah University Department of Computer Science Alkarak Jordan Faculty of Arts Amman Jordan Amman Jordan
this paper proposes a conceptual model for assessing user satisfaction in metaverse-based learning, a novel field that utilizes virtual reality technology to create an immersive and interactive learning experience. De... 详细信息
来源: 评论
Key protected deputy signature scheme against the deputy signing key exposure
收藏 引用
International Journal of Circuits, Systems and Signal Processing 2021年 15卷 800-808页
作者: Chen, Jianhong Yu, Kun Wang, Wenhao Faculty of Computer and Software Engineering Huaiyin Institute of Technology Jiangsu Huaian223003 China
Key exposure is very harmful to a cryptographic system. To decrease the loss from the deputy signing key vulnerability in identity-based proxy signature systems, we propose the method of key protected deputy signature... 详细信息
来源: 评论
A Security Enhanced Chaotic-Map-Based Authentication Protocol for Internet of Drones
收藏 引用
IEEE Internet of Things Journal 2024年 第12期11卷 22301-22309页
作者: Mahmood, Khalid Ghaffar, Zahid Farooq, Muhammad Yahya, Khalid Das, Ashok Kumar Chaudhry, Shehzad Ashraf National Yunlin University Of Science And Technology Graduate School Of Intelligent Data Science Douliu64002 Taiwan National Yunlin University Of Science And Technology Graduate School Of Engineering Science And Technology Douliu64002 Taiwan Abu Dhabi University Department Of Mathematics And Statistics College Of Arts And Sciences Abu Dhabi United Arab Emirates Istanbul Gelisim University Department Of Electrical And Electronics Engineering Istanbul34310 Turkey Sabratah University Department Of Electrical Engineering Faculty Of Engineering Regdalen Libya Center For Security Theory And Algorithmic Research Hyderabad500 032 India Abu Dhabi University Department Of Computer Science And Information Technology College Of Engineering Abu Dhabi United Arab Emirates Nisantasi University Faculty Of Engineering And Architecture Department Of Software Engineering Istanbul34398 Turkey
The Internet of Drones (IoD) extends the capabilities of unmanned aerial vehicles, enabling them to participate in a connected network. In IoD infrastructure, drones communicate not only among themselves but also with... 详细信息
来源: 评论
Smartphone-Based Artificial Intelligence System for Real-Time Exercise Rep Counting
SSRN
收藏 引用
SSRN 2024年
作者: Sinclair, Adam Kautai, Kayla Shahamiri, Seyed Reza Department of Electrical Computer and Software Engineering Faculty of Engineering The University of Auckland Auckland New Zealand
Automated exercise repetition counting has applications across the physical fitness realm, from personal health to rehabilitation. Motivated by the ubiquity of mobile phones and the benefits of tracking physical activ... 详细信息
来源: 评论
Exploring Compositional Neural Networks for Real-Time Systems
Exploring Compositional Neural Networks for Real-Time System...
收藏 引用
ACM and IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE)
作者: Sobhan Chatterjee Nathan Allen Nitish Patel Partha Roop Department of Electrical Computer and Software Engineering Faculty of Engineering University of Auckland Auckland New Zealand
Real-time CPSs using Artificial Neural Networks (ANNs) are traditionally developed as monolithic black-boxes. This results in designs that are often difficult to formally verify against safety specifications and imple... 详细信息
来源: 评论
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection  24
EEiF: Efficient Isolated Forest with e Branches for Anomaly ...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Zhang, Yifan Xiang, Haolong Zhang, Xuyun Xu, Xiaolong Fan, Wei Zhang, Qin Qi, Lianyong School of Software Nanjing University of Information Science and Technology China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China School of Computing Macquarie University Australia University of Oxford Uffield Department of Women's & Reproductive Health United Kingdom College of Computer Science and Software Engineering Shenzhen University China Faculty of Science and Engineering China
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m... 详细信息
来源: 评论