咨询与建议

限定检索结果

文献类型

  • 2,666 篇 会议
  • 1,361 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,096 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,500 篇 工学
    • 1,966 篇 计算机科学与技术...
    • 1,643 篇 软件工程
    • 485 篇 信息与通信工程
    • 364 篇 控制科学与工程
    • 275 篇 生物工程
    • 222 篇 电气工程
    • 212 篇 生物医学工程(可授...
    • 193 篇 机械工程
    • 167 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 97 篇 仪器科学与技术
    • 96 篇 安全科学与工程
    • 95 篇 化学工程与技术
    • 86 篇 交通运输工程
    • 80 篇 动力工程及工程热...
  • 1,191 篇 理学
    • 644 篇 数学
    • 316 篇 物理学
    • 311 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 159 篇 系统科学
    • 94 篇 化学
  • 815 篇 管理学
    • 505 篇 管理科学与工程(可...
    • 333 篇 图书情报与档案管...
    • 246 篇 工商管理
  • 210 篇 医学
    • 177 篇 临床医学
    • 151 篇 基础医学(可授医学...
    • 93 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 125 篇 法学
    • 100 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 77 篇 教育学
  • 40 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 148 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 91 篇 deep learning
  • 87 篇 feature extracti...
  • 83 篇 computational mo...
  • 83 篇 software
  • 81 篇 accuracy
  • 79 篇 artificial intel...
  • 74 篇 training
  • 65 篇 optimization
  • 64 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 52 篇 security
  • 46 篇 support vector m...
  • 45 篇 internet of thin...
  • 45 篇 software testing
  • 45 篇 data models
  • 44 篇 information tech...

机构

  • 44 篇 college of compu...
  • 41 篇 faculty of compu...
  • 38 篇 faculty of softw...
  • 37 篇 department of so...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 department of in...
  • 16 篇 universiti malay...
  • 16 篇 faculty of scien...
  • 16 篇 faculty of compu...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 20 篇 ali raja hashim
  • 20 篇 noraziah ahmad
  • 19 篇 jasni mohamad za...
  • 18 篇 raja hashim ali
  • 18 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 16 篇 siew hock ow
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo

语言

  • 3,662 篇 英文
  • 400 篇 其他
  • 32 篇 中文
  • 2 篇 日文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Software Engineering and Computer Engineering"
4096 条 记 录,以下是591-600 订阅
排序:
Accurate Real-World Co-ordinate Finding and the Object Classification for the Robot Manipulator
Accurate Real-World Co-ordinate Finding and the Object Class...
收藏 引用
Embedded Systems and Artificial Intelligence (ESAI), International Conference on
作者: Sudeep Sharan Hung Do Thanh Peter Nauth Juan José Domínguez-Jiménez Faculty of Computer Science and Engineering Frankfurt University of Applied Sciences Frankfurt am Main Germany UCASE Software Engineering Group School of Engineering University of Cádiz Cádiz Spain
This paper presents an object detection and classification of the objects using Deep Learning (DL). The integration of object detection algorithms and depth camera developed is capable of providing robots, such as sel... 详细信息
来源: 评论
Design and FPGA Implementation of the Henon Chaotic Map for Image Encryption  14
Design and FPGA Implementation of the Henon Chaotic Map for ...
收藏 引用
14th International Conference on Information and Communication Systems, ICICS 2023
作者: Taqieddin, Eyad Mustafa, Dheya Shatnawi, Ahmed Al-Khaleel, Osama Papachristou, Christos Jordan University of Science and Tech. Network Eng. and Security Department Irbid22110 Jordan The Hashemite University Faculty of Engineering Dept. of Computer Engineering Zarqa13133 Jordan Jordan University of Science and Tech. Software Engineering Department Irbid22110 Jordan Jordan University of Science and Tech. Computer Engineering Department Irbid22110 Jordan Case Western Reserve University Ecse Department ClevelandOH44106 United States
Due to the ever increasing usage of multimedia content sharing and the inherent nature of the insecure links used for transmission, it is quite necessary to provide a fast and secure encryption algorithm. Current symm... 详细信息
来源: 评论
Research on AI-Powered Employee Feedback Tools
Research on AI-Powered Employee Feedback Tools
收藏 引用
2025 International Russian Smart Industry Conference, SmartIndustryCon 2025
作者: Babushkin, Konstantin Timofeev, Nikolai Filianin, Ivan ITMO University Faculty of Infocommunication Technologies St. Petersburg Russia ITMO University Faculty of Software Engineering and Computer Systems St. Petersburg Russia
This paper explores methods for employee feedback (EF) collection and introduces a new framework to improve the process. Current feedback collection process often suffers from slow workflow, bias, and poor Artificial ... 详细信息
来源: 评论
HAMI: Hybrid Adaptive AutoML for IoT Intrusion Detection
HAMI: Hybrid Adaptive AutoML for IoT Intrusion Detection
收藏 引用
IEEE Communication Strategies in Digital Society Workshop (ComSDS)
作者: Mohamed Saber Natalia Gusarova Vladimir Bogatyrev Faculty of Software Engineering and Computer Systems ITMO University St. Petersburg Russia Faculty of Infocommunication Technologies ITMO University St. Petersburg Russia
the growth of IoT devices presents significant security challenges due to their diverse and dynamic environments. To address this, we developed HAMI, a novel intrusion detection system. Our method leverages the GIFS a... 详细信息
来源: 评论
Communication, Power, and Sla-Aware Virtual Machine Placement in Oversubscribed Cloud Data Center: A Monetary Approach
SSRN
收藏 引用
SSRN 2023年
作者: Kiani, Mohsen Khayyambashi, Mohammad Reza Department of Computer Science Khansar Campus University of Isfahan Isfahan Iran Department of Software Engineering Faculty of Computer Engineering University of Isfahan Isfahan Iran
In the present study, we propose an algorithm for mapping virtual machines (VMs) to physical machines (PMs) in cloud data centers. The proposed method models a dynamic system where VMs enter and terminate. The goal of... 详细信息
来源: 评论
Evaluating Datagram Congestion Control Protocol (DCCP) for Real-Time Applications: A Comparative Study with TCP in Multi-Node Networks  10
Evaluating Datagram Congestion Control Protocol (DCCP) for R...
收藏 引用
10th International Conference on engineering and Emerging Technologies, ICEET 2024
作者: Hassan, Aqib Memon, Vengas Shaikh, Farhan Bashir Alahmari, Saad Iqbal, Mansoor Azam, Farooq School of Computing and Mathematical Sciences University of Greenwich London United Kingdom Universiti Tunku Faculty of Information and Communication Tech. Abdul Rahman Perak Malaysia Northern Border University Department of Computer Science Arar Saudi Arabia University of Wah Department of Computer Science Wah Cantt Pakistan Nust Dept. of Computer Software Engineering Islamabad Pakistan
The rise in demand for real-time applications, such as live streaming, online gaming, and Internet telephony, has highlighted the necessity for transport protocols that offer low latency and network stability. Traditi... 详细信息
来源: 评论
Research on AI-Powered Employee Feedback Tools
Research on AI-Powered Employee Feedback Tools
收藏 引用
International Russian Smart Industry Conference (SmartIndustryCon)
作者: Konstantin Babushkin Nikolai Timofeev Ivan Filianin Faculty of Infocommunication Technologies ITMO University St. Petersburg Russia Faculty of Software Engineering and Computer Systems ITMO University St. Petersburg Russia
This paper explores methods for employee feedback (EF) collection and introduces a new framework to improve the process. Current feedback collection process often suffers from slow workflow, bias, and poor Artificial ... 详细信息
来源: 评论
Prediction of Dental Fluorosis Infection based on Particle Optimized Scored KNN Approach  1
Prediction of Dental Fluorosis Infection based on Particle O...
收藏 引用
1st International Conference of Intelligent Methods, Systems and Applications, IMSA 2023
作者: Montasser, Reem Kadry Ismael, Osama El-Kholy, Moataz October University for Modern Sciences and Arts Faculty of Computer Science Software Engineering Department Giza Egypt Cairo University Faculty of Computers and Artificial Intelligence Information Systems Department Giza Egypt October University for Modern Sciences and Arts Faculty of Dentistry Oral Pathology Department Giza Egypt
Due to its simplicity of usage across a variety of applications, the K-Nearest Neighbor algorithm is usually utilized as a classification approach. The K-Nearest Neighbor algorithm's accuracy is greatly impacted b... 详细信息
来源: 评论
HAMI: Hybrid Adaptive AutoML for IoT Intrusion Detection
HAMI: Hybrid Adaptive AutoML for IoT Intrusion Detection
收藏 引用
2025 Communication Strategies in Digital Society Seminar, ComSDS 2025
作者: Saber, Mohamed Gusarova, Natalia Bogatyrev, Vladimir Faculty of Software Engineering and Computer Systems ITMO University St. Petersburg Russia Faculty of Infocommunication Technologies ITMO University St. Petersburg Russia
the growth of IoT devices presents significant security challenges due to their diverse and dynamic environments. To address this, we developed HAMI, a novel intrusion detection system. Our method leverages the GIFS a... 详细信息
来源: 评论
LUMOS-DM: Landscape-Based Multimodal Scene Retrieval Enhanced by Diffusion Model  30th
LUMOS-DM: Landscape-Based Multimodal Scene Retrieval Enhance...
收藏 引用
30th International Conference on MultiMedia Modeling, MMM 2024
作者: Huynh, Viet-Tham Nguyen, Trong-Thuan Nguyen, Quang-Thuc Tran, Mai-Khiem Nguyen, Tam V. Tran, Minh-Triet Software Engineering Laboratory and Faculty of Information Technology University of Science VNU-HCM Ho Chi Minh City Viet Nam Vietnam National University Ho Chi Minh City Viet Nam Department of Computer Science University of Dayton Dayton United States
Information retrieval is vital in our daily lives, with applications ranging from job searches to academic research. In today’s data-driven world, efficient and accurate retrieval systems are crucial. Our research fo... 详细信息
来源: 评论