咨询与建议

限定检索结果

文献类型

  • 1,446 篇 会议
  • 958 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,518 篇 工学
    • 1,166 篇 计算机科学与技术...
    • 945 篇 软件工程
    • 300 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 152 篇 电气工程
    • 152 篇 生物工程
    • 131 篇 机械工程
    • 111 篇 电子科学与技术(可...
    • 108 篇 生物医学工程(可授...
    • 100 篇 光学工程
    • 61 篇 交通运输工程
    • 60 篇 化学工程与技术
    • 58 篇 仪器科学与技术
    • 57 篇 动力工程及工程热...
    • 56 篇 安全科学与工程
  • 726 篇 理学
    • 380 篇 数学
    • 223 篇 物理学
    • 177 篇 生物学
    • 114 篇 统计学(可授理学、...
    • 98 篇 系统科学
    • 57 篇 化学
  • 516 篇 管理学
    • 322 篇 管理科学与工程(可...
    • 205 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 136 篇 医学
    • 112 篇 临床医学
    • 94 篇 基础医学(可授医学...
    • 57 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 71 篇 法学
    • 59 篇 社会学
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 51 篇 教育学
  • 29 篇 农学
  • 15 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学

主题

  • 72 篇 machine learning
  • 67 篇 deep learning
  • 58 篇 computer science
  • 58 篇 software enginee...
  • 53 篇 feature extracti...
  • 53 篇 accuracy
  • 48 篇 artificial intel...
  • 47 篇 computational mo...
  • 47 篇 training
  • 43 篇 data mining
  • 42 篇 software
  • 40 篇 optimization
  • 39 篇 predictive model...
  • 38 篇 information tech...
  • 31 篇 internet of thin...
  • 28 篇 support vector m...
  • 27 篇 security
  • 26 篇 educational inst...
  • 26 篇 semantics
  • 26 篇 cloud computing

机构

  • 42 篇 faculty of compu...
  • 37 篇 department of so...
  • 33 篇 college of compu...
  • 27 篇 department of so...
  • 21 篇 department of co...
  • 20 篇 school of comput...
  • 20 篇 state key labora...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 18 篇 faculty of softw...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...
  • 14 篇 faculty of infor...

作者

  • 29 篇 quanyin zhu
  • 22 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 herawan tutut
  • 20 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 muhammad waseem ...
  • 14 篇 zain ul abideen
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 muhammad adnan k...
  • 13 篇 siew hock ow
  • 13 篇 ow siew hock
  • 12 篇 tutut herawan
  • 12 篇 belikov juri
  • 12 篇 levron yoash
  • 11 篇 khan arif ali
  • 11 篇 li qi
  • 11 篇 pal umapada

语言

  • 2,061 篇 英文
  • 348 篇 其他
  • 26 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software Engineering and Computer Technology"
2434 条 记 录,以下是121-130 订阅
Preliminary Exploration on Node-To-Node Fault Tolerance Coordination in Distributed System
Preliminary Exploration on Node-To-Node Fault Tolerance Coor...
收藏 引用
2023 IEEE International Conference on Computing, ICOCO 2023
作者: Saadoon, Muntadher Hamid, Siti Hafizah Ab. Sofian, Hazrina Altarturi, Hamza Nasuha, Nur Azizul, Zati Hakim Khalid, Haqi Universiti Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur50603 Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Department of Artificial Intelligence Kuala Lumpur50603 Malaysia Universiti Putra Malaysia Faculty of Engineering Department of Computer and Communication Selangor 43400 Malaysia
Internet of Things, edge computing devices, the widespread use of artificial intelligence and machine learning applications, and the extensive adoption of cloud computing pose significant challenges to maintaining fau... 详细信息
来源: 评论
An software Defined Networking (SDN) Enhanced Edge Computing Framework for Internet of Healthcare Things (IoHT)
An Software Defined Networking (SDN) Enhanced Edge Computing...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Anh, Dang Van Chehri, Abdellah Quy, Nguyen Minh Hue, Chu Thi Minh Nguyen, Dinh C. Quy, Vu Khanh Hung Yen University of Technology and Education Faculty of Information Technology Hungyen Viet Nam Royal Military College of Canada Department of Mathematics and Computer Science Kingston Canada Fpt University Faculty of Software Engineering Hanoi Viet Nam The University of Alabama Department of Electrical and Computer Engineering HuntsvilleAL United States
The rapid proliferation of intelligent Internet of Health Things (IoHT) applications within the context of the COVID-19 pandemic has exerted significant strain on the backhaul network infrastructure. This paper aims t... 详细信息
来源: 评论
A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1607-1621页
作者: Federica Uccello Marek Pawlicki Salvatore D'Antonio RafałKozik MichałChoras Centro Direzionale Department of EngineeringUniversity of Naples‘Parthenope’Isola C4Napoli80133Italy Department of Computer and Information Science Software and SystemsLinköping UniversityLinköping58183Sweden ITTI Sp.z o.o. Pozna´n61-612Poland Faculty of Telecommunications Computer Science and Electrical EngineeringBydgoszcz University of Science and TechnologyBydgoszcz85-796Poland
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based... 详细信息
来源: 评论
Custom Hidden Markov Models for Effective Part-of-Speech Tagging  18
Custom Hidden Markov Models for Effective Part-of-Speech Tag...
收藏 引用
18th IEEE International Conference on Emerging Technologies, ICET 2023
作者: Khalid, Hassan Bin Siddique, Abu Bakar Ali, Raja Hashim Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany
Hidden Markov Models have proved to be a very significant tool for various time-series related problems, especially where context is important. One such problem is Part-of-speech tagging. The work uses a customized HM... 详细信息
来源: 评论
A Novel Approach Detection for False Data Injection, and Man in the Middle Attacks in IoT and IIoT
A Novel Approach Detection for False Data Injection, and Man...
收藏 引用
2023 IEEE PES Generation, Transmission and Distribution International Conference and Exposition, GTD 2023
作者: Gonen, Serkan Bariskan, Mehmet Ali Kaplan, Derya Yiltas Yilmaz, Ercan Nurcan Cetin, Aydin Istanbul Gelişim University Department of Computer and Software Engineering Istanbul Turkey Istanbul University-Cerrahpasa Department of Computer Engineering Istanbul Turkey Gazi University Faculty of Technology Ankara Turkey
Human beings have gone through stages that have made significant contributions to their lives with technological developments. One of the most important of these close to the present day is the introduction of IoTs, a... 详细信息
来源: 评论
Diving into Brain Complexity: Exploring Functional and Effective Connectivity Networks  18
Diving into Brain Complexity: Exploring Functional and Effec...
收藏 引用
18th IEEE International Conference on Emerging Technologies, ICET 2023
作者: Siddique, Abu Bakar Khalid, Hassan Bin Ali, Raja Hashim University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan
The human brain's intricate functions are under-pinned by a vast network of synapses that enable chemical impulses between neurons. Neuroscientists employ two key approaches, functional and effective connectivity,... 详细信息
来源: 评论
Revolutionizing Campus Exploration with GikiLenS: A Deep Learning-Powered Object Detection App  18
Revolutionizing Campus Exploration with GikiLenS: A Deep Lea...
收藏 引用
18th IEEE International Conference on Emerging Technologies, ICET 2023
作者: Mueed, Iqra Arshad, Usama Ali, Raja Hashim Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany
For newcomers and tourists, navigating university campuses can be difficult, resulting in aggravation and lost time. We respond by introducing 'GikiLenS', an object identification application driven by deep le... 详细信息
来源: 评论
A Method for Depth Camera Calibration Based on Motion Capture System
A Method for Depth Camera Calibration Based on Motion Captur...
收藏 引用
2023 International Conference on Cognitive Computing and Complex Data, ICCD 2023
作者: Lin, Jianchu Zhao, Ming Yin, Guojun Zhou, Haiping Hudoyberdi, Toshboev Jiang, Bo Huaiyin Institue of Technology Faculty of Computer and Software Engineering Huai'an China Huaiyin Institue of Technology Faculty of Art and Design Huai'an China Jiangsu Eazytec Co. Ltd Yixin China
With the rapid development of 3D computer vision technology, depth cameras have been widely used. Depth camera calibration is mainly constrained by two aspects: (1) alignment of depth data, and (2) distortion in RGB i... 详细信息
来源: 评论
DNBP-CCA:A Novel Approach to Enhancing Heterogeneous Data Traffic and Reliable Data Transmission for Body Area Network
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2851-2878页
作者: Abdulwadood Alawadhi Mohd.Hasbullah Omar Abdullah Almogahed Noradila Nordin Salman A.Alqahtani Atif M.Alamri InterNetWorks Research Laboratory School of ComputingUniversiti Utara MalaysiaSintok06010Malaysia Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn MalaysiaParit RajaJohor86400Malaysia School of Games&Creative Technology University for the Creative ArtsFarnhamGU97DSUK Computer Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia
The increased adoption of Internet of Medical Things (IoMT) technologies has resulted in the widespread use ofBody Area Networks (BANs) in medical and non-medical domains. However, the performance of IEEE 802.15.4-bas... 详细信息
来源: 评论
Computational Optimization of RIS-Enhanced Backscatter and Direct Communication for 6G IoT:A DDPG-Based Approach with Physical Layer Security
收藏 引用
computer Modeling in engineering & Sciences 2025年 第3期142卷 2191-2210页
作者: Syed Zain Ul Abideen Mian Muhammad Kamal Eaman Alharbi Ashfaq Ahmad Malik Wadee Alhalabi Muhammad Shahid Anwar Liaqat Ali College of Computer Science and Technology Qingdao UniversityQingdao266071China School of Electronic Science and Engineering Southeast UniversityNanjing210018China Computer Science Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah80200Saudi Arabia Department of Quality Assurance Al-Kawthar UniversityKarachi75300Pakistan Department of Computer Science Immersive Virtual Reality Research GroupKing Abdulaziz UniversityJeddah80200Saudi Arabia Department of AI and Software Gachon UniversitySeongnam-si13120Republic of Korea Department of Electrical Engineering University of Science and TechnologyBannu28100Pakistan
The rapid evolution of wireless technologies and the advent of 6G networks present new challenges and opportunities for Internet ofThings(IoT)applications,particularly in terms of ultra-reliable,secure,and energyeffic... 详细信息
来源: 评论