咨询与建议

限定检索结果

文献类型

  • 1,439 篇 会议
  • 961 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,430 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,507 篇 工学
    • 1,158 篇 计算机科学与技术...
    • 953 篇 软件工程
    • 298 篇 信息与通信工程
    • 223 篇 控制科学与工程
    • 155 篇 电气工程
    • 153 篇 生物工程
    • 134 篇 机械工程
    • 113 篇 电子科学与技术(可...
    • 108 篇 生物医学工程(可授...
    • 98 篇 光学工程
    • 61 篇 交通运输工程
    • 59 篇 化学工程与技术
    • 57 篇 仪器科学与技术
    • 57 篇 动力工程及工程热...
    • 56 篇 安全科学与工程
  • 724 篇 理学
    • 379 篇 数学
    • 226 篇 物理学
    • 175 篇 生物学
    • 115 篇 统计学(可授理学、...
    • 99 篇 系统科学
    • 56 篇 化学
  • 512 篇 管理学
    • 319 篇 管理科学与工程(可...
    • 204 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 134 篇 医学
    • 111 篇 临床医学
    • 94 篇 基础医学(可授医学...
    • 56 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 75 篇 法学
    • 61 篇 社会学
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 48 篇 教育学
  • 30 篇 农学
  • 15 篇 文学
  • 9 篇 军事学
  • 6 篇 艺术学

主题

  • 73 篇 machine learning
  • 71 篇 deep learning
  • 58 篇 computer science
  • 58 篇 software enginee...
  • 54 篇 accuracy
  • 53 篇 feature extracti...
  • 47 篇 computational mo...
  • 46 篇 artificial intel...
  • 46 篇 training
  • 43 篇 software
  • 42 篇 data mining
  • 40 篇 optimization
  • 38 篇 information tech...
  • 38 篇 predictive model...
  • 30 篇 internet of thin...
  • 29 篇 support vector m...
  • 26 篇 educational inst...
  • 26 篇 semantics
  • 26 篇 convolutional ne...
  • 25 篇 security

机构

  • 40 篇 faculty of compu...
  • 37 篇 department of so...
  • 32 篇 college of compu...
  • 27 篇 department of so...
  • 21 篇 department of co...
  • 20 篇 school of comput...
  • 20 篇 state key labora...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of softw...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 huaiyin institut...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...

作者

  • 29 篇 quanyin zhu
  • 22 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 herawan tutut
  • 20 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 muhammad waseem ...
  • 14 篇 zain ul abideen
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 muhammad adnan k...
  • 13 篇 siew hock ow
  • 13 篇 ow siew hock
  • 12 篇 tutut herawan
  • 12 篇 belikov juri
  • 12 篇 levron yoash
  • 11 篇 khan arif ali
  • 11 篇 li qi
  • 11 篇 pal umapada

语言

  • 2,282 篇 英文
  • 125 篇 其他
  • 23 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software Engineering and Computer Technology"
2430 条 记 录,以下是181-190 订阅
排序:
A Novel Multiobjective Fireworks Algorithm and Its Applications to Imbalanced Distance Minimization Problems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第8期9卷 1476-1489页
作者: Shoufei Han Kun Zhu MengChu Zhou Xiaojing Liu Haoyue Liu Yusuf Al-Turki Abdullah Abusorrah College of Computer Science and Technology Nanjing University of Aeronautics and Astronauticsand also with the Collaborative Innovation Center of Novel Software Technology and IndustrializationNanjing 211106China Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewark NJ 07102 USA Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer EngineeringFaculty of Engineeringand also with the K.A.CARE Energy Research and Innovation CenterKing Abdulaziz UniversityJeddah 21589Saudi Arabia
Recently,multimodal multiobjective optimization problems(MMOPs)have received increasing *** goal is to find a Pareto front and as many equivalent Pareto optimal solutions as *** some evolutionary algorithms for them h... 详细信息
来源: 评论
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4615-4630页
作者: Erssa Arif Syed Khuram Shahzad Muhammad Waseem Iqbal Muhammad Arfan Jaffar Abdullah S.Alshahrani Ahmed Alghamdi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Faculty of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword... 详细信息
来源: 评论
Anomaly-Based Intrusion DetectionModel Using Deep Learning for IoT Networks
收藏 引用
computer Modeling in engineering & Sciences 2024年 第10期141卷 823-845页
作者: Muaadh A.Alsoufi Maheyzah Md Siraj Fuad A.Ghaleb Muna Al-Razgan Mahfoudh Saeed Al-Asaly Taha Alfakih Faisal Saeed Faculty of Computing Universiti Teknologi Malaysia(UTM)Johor Bahru81310Malaysia DAAI Research Group College of Computing and Digital TechnologyBirmingham City UniversityBirminghamB47XGUK Department of Software Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11345Saudi Arabia
The rapid growth of Internet of Things(IoT)devices has brought numerous benefits to the interconnected ***,the ubiquitous nature of IoT networks exposes them to various security threats,including anomaly intrusion ***... 详细信息
来源: 评论
Privacy Enhanced Mobile User Authentication Method Using Motion Sensors
收藏 引用
computer Modeling in engineering & Sciences 2024年 第3期138卷 3013-3032页
作者: Chunlin Xiong Zhengqiu Weng Jia Liu Liang Gu Fayez Alqahtani Amr Gafar Pradip Kumar Sharma Shenzhen Institutes of Advanced Technology Chinese Academy of SciencesShenzhen518052China Sangfor Technologies Inc. Shenzhen518055China School of Data Science and Artificial Intelligence Wenzhou University of TechnologyWenzhou325035China College of Computer Science&Technology Zhejiang University of TechnologyHangzhou310023China Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Math&Computer Science Department Faculty of ScienceMenofia UniversityShebin El-KomEgypt Computing Science Department University of AberdeenAberdeenUK
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti... 详细信息
来源: 评论
A New Cybersecurity Approach Enhanced by xAI-Derived Rules to Improve Network Intrusion Detection and SIEM
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 1607-1621页
作者: Federica Uccello Marek Pawlicki Salvatore D'Antonio RafałKozik MichałChoras Centro Direzionale Department of EngineeringUniversity of Naples‘Parthenope’Isola C4Napoli80133Italy Department of Computer and Information Science Software and SystemsLinköping UniversityLinköping58183Sweden ITTI Sp.z o.o. Pozna´n61-612Poland Faculty of Telecommunications Computer Science and Electrical EngineeringBydgoszcz University of Science and TechnologyBydgoszcz85-796Poland
The growing sophistication of cyberthreats,among others the Distributed Denial of Service attacks,has exposed limitations in traditional rule-based Security Information and Event Management *** machine learning–based... 详细信息
来源: 评论
A Secured and Optimized Clustering Approch in Vehicular Ad-hoc Network  4
A Secured and Optimized Clustering Approch in Vehicular Ad-h...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Khan, Imran Khan, Fazlullah Ali, Asad Alshawi, Bandar Alturki, Ryan Wedyan, Mohammad Abdul Wali Khan University Computer Science Department KPK Mardan Pakistan School of Computer Science University of Nottingham Ningbo China Faculty of Science and Engineering Zhejiang315104 China University of Engineering and Technology Department of Computer Science KPK Peshawar Pakistan College of Computing Umm Al-Qura University Department of Computer and Network Engineering Makkah Saudi Arabia College of Computing Umm Al-Qura University Department of Software Engineering Makkah Saudi Arabia Faculty of Information Technology and Computer Sciences Department of Computer Sciences Irbid21163 Jordan
Vehicular ad hoc networks (VANETs) take vital role in intelligent transportation systems, but they face challenges due to dynamic network topology, impacting communication efficiency, especially with increasing active... 详细信息
来源: 评论
A Review of Algorithms's Complexities on Different Valued Sorted and Unsorted Data
A Review of Algorithms's Complexities on Different Valued So...
收藏 引用
2023 International Conference on IT and Industrial Technologies, ICIT 2023
作者: Shabbir, Attia Majeed, Asad Iftikhar, Mahnoor Ali, Raja Hashim Arshad, Usama Shabbir, Muhammad Zeeshan Zeeshan Ijaz, Ali Ali, Nisar Aftab, Ali Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany Department of Electrical Engineering Lahore Pakistan University of Regina Faculty of Electronic Systems Engineering Regina Canada
Sorting and searching are critical processes for effecttive data analysis. In this paper, we evaluate the performance of various sorting and searching algorithms and compare their time and space complexities on both s... 详细信息
来源: 评论
Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore software Maintenance
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 3827-3845页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Nadeem Iqbal Nazri Kama Azri Azmi Ahmad Salman Khan Yasir Mahmood Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyaKuwait
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ... 详细信息
来源: 评论
A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System
收藏 引用
computers, Materials & Continua 2022年 第3期70卷 6141-6158页
作者: Bander Alzahrani Ahmed Barnawi Azeem Irshad Areej Alhothali Reem Alotaibi Muhammad Shafiq Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science and Software Engineering International Islamic University IslamabadPakistan Department of Information and Communication Engineering Yeungnam UniversityGyeongsan38541Korea
Unmanned aerial vehicles(UAVs)have recently attractedwidespread attention in civil and commercial *** example,UAVs(or drone)technology is increasingly used in crowd monitoring solutions due to its wider air footprint ... 详细信息
来源: 评论
Leaching Fraction (LF) of Irrigation Water for Saline Soils Using Machine Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第5期36卷 1915-1930页
作者: Rab Nawaz Bashir Imran Sarwar Bajwa Muhammad Waseem Iqbal Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel ABahaddad Khalid Ali Almarhabi Department of Computer Science COMSATS University IslamabadVehari CampusPakistan Department of Computer Science and IT Islamia University BahawalpurPakistan Department of Software Engineering Superior University Lahore54000Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Soil salinity is a serious land degradation issue in *** is a major threat to agriculture *** irrigation water is applied to leach down the salts from the root zone of the plants in the form of a Leaching fraction(LF)... 详细信息
来源: 评论