咨询与建议

限定检索结果

文献类型

  • 528 篇 会议
  • 286 篇 期刊文献
  • 18 册 图书

馆藏范围

  • 832 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 515 篇 工学
    • 395 篇 计算机科学与技术...
    • 331 篇 软件工程
    • 92 篇 信息与通信工程
    • 86 篇 控制科学与工程
    • 53 篇 生物工程
    • 50 篇 生物医学工程(可授...
    • 41 篇 电气工程
    • 38 篇 电子科学与技术(可...
    • 33 篇 机械工程
    • 27 篇 光学工程
    • 24 篇 安全科学与工程
    • 23 篇 仪器科学与技术
    • 19 篇 化学工程与技术
    • 18 篇 动力工程及工程热...
    • 18 篇 土木工程
    • 17 篇 建筑学
    • 15 篇 交通运输工程
  • 235 篇 理学
    • 127 篇 数学
    • 66 篇 物理学
    • 66 篇 生物学
    • 48 篇 统计学(可授理学、...
    • 37 篇 系统科学
    • 17 篇 化学
  • 171 篇 管理学
    • 117 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 52 篇 工商管理
  • 48 篇 医学
    • 42 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 22 篇 药学(可授医学、理...
  • 25 篇 法学
    • 20 篇 社会学
  • 13 篇 经济学
  • 11 篇 农学
  • 9 篇 教育学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学

主题

  • 25 篇 deep learning
  • 24 篇 software enginee...
  • 23 篇 machine learning
  • 18 篇 artificial intel...
  • 18 篇 accuracy
  • 17 篇 computational mo...
  • 16 篇 software testing
  • 12 篇 computer science
  • 12 篇 data mining
  • 12 篇 feature extracti...
  • 11 篇 computer communi...
  • 11 篇 computers
  • 11 篇 mathematical mod...
  • 10 篇 optimization
  • 10 篇 monitoring
  • 10 篇 software
  • 9 篇 internet of thin...
  • 9 篇 surveys
  • 9 篇 reliability
  • 9 篇 servers

机构

  • 12 篇 faculty of compu...
  • 12 篇 faculty of softw...
  • 11 篇 faculty of compu...
  • 10 篇 department of so...
  • 10 篇 state key labora...
  • 9 篇 faculty of compu...
  • 8 篇 faculty of compu...
  • 8 篇 gik institute of...
  • 8 篇 department of so...
  • 8 篇 university of eu...
  • 8 篇 faculty of elect...
  • 8 篇 faculty of compu...
  • 8 篇 department of co...
  • 8 篇 dept. of technol...
  • 8 篇 itmo university ...
  • 8 篇 university of re...
  • 7 篇 faculty of infoc...
  • 6 篇 saint-petersburg...
  • 6 篇 department of ap...
  • 6 篇 gamf faculty of ...

作者

  • 19 篇 zamli kamal z.
  • 12 篇 ahmed bestoun s.
  • 12 篇 noraziah ahmad
  • 10 篇 ahmad noraziah
  • 9 篇 herawan tutut
  • 8 篇 bei zeng
  • 8 篇 ali zeeshan ijaz
  • 8 篇 nisar ali
  • 8 篇 ali raja hashim
  • 8 篇 jasni mohamad za...
  • 8 篇 zhengfeng ji
  • 8 篇 ali nisar
  • 8 篇 raja hashim ali
  • 7 篇 zain ul abideen
  • 7 篇 din fakhrud
  • 7 篇 usama arshad
  • 7 篇 omatu s.
  • 7 篇 arshad usama
  • 7 篇 sidek roslina mo...
  • 7 篇 mohamad m.s.

语言

  • 799 篇 英文
  • 26 篇 其他
  • 5 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Software Engineering and Computer Systems Itmo University"
832 条 记 录,以下是381-390 订阅
排序:
On the utility of power spectral techniques with feature selection techniques for effective mental task classification in non-invasive BCI
arXiv
收藏 引用
arXiv 2021年
作者: Gupta, Akshansh Agrawal, Ramesh Kumar Kirar, Jyoti Singh Andreu-Perez, Javier Ding, Wei-Ping Lin, Chin-Teng Prasad, Mukesh School of Computer and Systems Sciences Jawaharlal Nehru University New Delhi India School of Computer Science and Electronic Engineering University of Essex United Kingdom Faculty of Medicine Imperial College London United Kingdom School of Computer and Technology Nantong University Nantong China Centre for Artifical Intelligence School of Software Feit University of Technology Sydney Australia
In this paper classification of mental task-root Brain-computer Interfaces (BCI) is being investigated, as those are a dominant area of investigations in BCI and are of utmost interest as these systems can be augmente... 详细信息
来源: 评论
Ransomware: A framework for security challenges in internet of things  2
Ransomware: A framework for security challenges in internet ...
收藏 引用
2nd International Conference on computer and Information Sciences, ICCIS 2020
作者: Saeed, Soobia Jhanjhi, N.Z. Naqvi, Mehmood Humayun, Mamoona Ahmed, Shakeel Universiti Teknologi Malaysia Dept. of Software Engineering Malaysia Taylor's University Selangor Malaysia Faculty of Engineering Technology Mohawk College Canada Jouf University Dept. of Information Systems Al-Jouf Saudi Arabia King Faisal University Dept. of Computer Science Al-Hofuf Saudi Arabia
With the increasing volume of smartphones, computers, and sensors in the Internet of Things (IoT) model, enhancing security and preventing ransom attacks have become a major concern. Traditional security mechanisms ar... 详细信息
来源: 评论
Risk Assessment for Power Circuit Breaker by Using Failure Modes, Effects and Criticality Analysis
Risk Assessment for Power Circuit Breaker by Using Failure M...
收藏 引用
2020 International Conference on Power, Energy and Innovations, ICPEI 2020
作者: Promseela, Lineman Suwanasri, Cattareeya Saribut, Surapol Suwanasri, Thanapong Phadungthin, Rattanakorn King Mongkut's University of Technology North Bangkok Electrical and Computer Engineering Faculty of Engineering Bangkok Thailand King Mongkut's University of Technology North Bangkok Electrical and Software Systems Engineering The Sirindhorn International Thai-German School of Engineering Bangkok Thailand King Mongkut's University of Technology North Bangkok Electronics Engineering Technology College of Industrial Technology Bangkok Thailand
This paper explains risk assessment for circuit breaker utilization by using failure modes, effects, and criticality analysis (FMECA). The circuit breaker components are divided into three main parts such as live part... 详细信息
来源: 评论
Weather Data Analysis Using Hadoop: Applications and Challenges
Weather Data Analysis Using Hadoop: Applications and Challen...
收藏 引用
International Conference on Green engineering Technology and Applied Computing 2019, IConGETech2 019 and International Conference on Applied Computing 2019, ICAC 2019
作者: Adam Ibrahim Fakherldin, Mohammed Adam, Khalid Akma Abu Bakar, Noor Abdul Majid, Mazlina Faculty of Computer System and Software Engineering Universiti Malaysia Pahang Malaysia Faculty of Electric and Electronic Engineering Universiti Malaysia Pahang Malaysia Faculty of Computer Science and Information Systems Jazan University Malaysia
Weather data is very crucial in every aspect of human daily life. It plays an important role in many sectors such as agriculture, tourism, government planning, industry and so on. Weather has a variety of parameters l... 详细信息
来源: 评论
T
arXiv
收藏 引用
arXiv 2020年
作者: Aloufi, Khalid S. Alsewari, Abdulrahman A. Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang Kuantan Mala sia26300 Department of Computer Engineering College of Computer Science and Engineering Taibah University Medina Saudi Arabia
This research presents a methodology for trusting the provenance of data on the web. The implication is that data does not change after publication and the source of the data is stable. There are different data that s... 详细信息
来源: 评论
Case study of designing and evaluating an independent open learner model tool
收藏 引用
Higher Education Pedagogies 2023年 第1期8卷
作者: Check-Yee Law John Grundy Karola V. Baggo Andrew Cain Rajesh Vasa a Faculty of Information Science and Technology Multimedia University Melaka Malaysia b Department of Software Systems & Cybersecurity Monash University Clayton Australia c Department of Computer Sci and Software Engineering Swinburne University of Technology Hawthorn Australia d Faculty of Sci Eng & Built Env Deakin University Burwood Australia
ABSTRACTOpen Learner Model (OLM) visualisations capture and display a learner’s learning state such as knowledge levels, learning progress, and misconceptions. Exposing learners to their own models offers learners a ... 详细信息
来源: 评论
From sensing to energy savings: A comprehensive survey on integrating emerging technologies for energy efficiency in WBANs
收藏 引用
Digital Communications and Networks 2024年
作者: Shumaila Javaid Hamza Fahim Sherali Zeadally Bin He Department of Control Science and Engineering College of Electronics and Information Engineering Tongji University Shanghai 201804 China National Key Laboratory of Autonomous Intelligent Unmanned Systems Tongji University Shanghai 201210 China Frontiers Science Center for Intelligent Autonomous Systems Shanghai 201210 China Department of Computer Science Faculty of Computer Sciences Ilma University Karachi 75190 Pakistan College of Communication and Information University of Kentucky Lexington KY USA Academy of Computer Science & Software Engineering University of Johannesburg Johannesburg South Africa
Energy is essential for human existence, and its high consumption is a growing concern in today's technology-driven society. Global initiatives aim to reduce energy consumption and pollution by developing and depl... 详细信息
来源: 评论
AN IMPROVED GENERIC ER SCHEMA FOR CONCEPTUAL MODELLING OF INFORMATION systems
arXiv
收藏 引用
arXiv 2020年
作者: Pieris, D. Wijegunasekera, M.C. Dias, N.G.J. Department of HRM Faculty of Commerce and Management Studies Department of Software Engineering Faculty of Computing and Technology Department of Computer Systems Engineering Faculty of Computing and Technology University of Kelaniya Sri Lanka
The Entity Relationship (ER) model is widely used for creating ER schemas for modelling application domains in the field of Information systems development. However, when an ER schema is transformed to a Relational Da... 详细信息
来源: 评论
Mobile-based Intelligent Skin Diseases Diagnosis System  1
Mobile-based Intelligent Skin Diseases Diagnosis System
收藏 引用
1st International Conference of Intelligent Computing and engineering, ICOICE 2019
作者: Sallam, Amer Ba Alawi, Abdulfattah E. Al-Saced Faculty of Engineering IT Taiz University Computer Networks and Distributed Systems Dept Taiz Yemen Al-Saecd Faculty of Engineering IT Taiz University Software Engineering Dept Taiz Yemen
Skin diseases are the most common diseases in humans. The inherent variability in the appearance of skin diseases makes it hard even for medical experts to detect disease type from dermoscopic images. Recent advances ... 详细信息
来源: 评论
A Review on Type of Attacks on Fingerprint Image and Watermarking Techniques
A Review on Type of Attacks on Fingerprint Image and Waterma...
收藏 引用
International Conference on Green engineering Technology and Applied Computing 2019, IConGETech2 019 and International Conference on Applied Computing 2019, ICAC 2019
作者: Lebcir, Mohamed Awang, Suryanti Faculty of Computer Systems and Software Engineering University Malaysia Pahang UMP Lebuhraya Tun Razak Kuantan Pahang 26300 Malaysia
Fingerprint image watermarking techniques have several advantages over traditional security systems that based on token or knowledge. However, they are also vulnerable to attacks that can decrease their security. In t... 详细信息
来源: 评论