咨询与建议

限定检索结果

文献类型

  • 1,446 篇 会议
  • 958 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,518 篇 工学
    • 1,166 篇 计算机科学与技术...
    • 945 篇 软件工程
    • 300 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 152 篇 电气工程
    • 152 篇 生物工程
    • 131 篇 机械工程
    • 111 篇 电子科学与技术(可...
    • 108 篇 生物医学工程(可授...
    • 100 篇 光学工程
    • 61 篇 交通运输工程
    • 60 篇 化学工程与技术
    • 58 篇 仪器科学与技术
    • 57 篇 动力工程及工程热...
    • 56 篇 安全科学与工程
  • 726 篇 理学
    • 380 篇 数学
    • 223 篇 物理学
    • 177 篇 生物学
    • 114 篇 统计学(可授理学、...
    • 98 篇 系统科学
    • 57 篇 化学
  • 516 篇 管理学
    • 322 篇 管理科学与工程(可...
    • 205 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 136 篇 医学
    • 112 篇 临床医学
    • 94 篇 基础医学(可授医学...
    • 57 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 71 篇 法学
    • 59 篇 社会学
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 51 篇 教育学
  • 29 篇 农学
  • 15 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学

主题

  • 72 篇 machine learning
  • 67 篇 deep learning
  • 58 篇 computer science
  • 58 篇 software enginee...
  • 53 篇 feature extracti...
  • 53 篇 accuracy
  • 48 篇 artificial intel...
  • 47 篇 computational mo...
  • 47 篇 training
  • 43 篇 data mining
  • 42 篇 software
  • 40 篇 optimization
  • 39 篇 predictive model...
  • 38 篇 information tech...
  • 31 篇 internet of thin...
  • 28 篇 support vector m...
  • 27 篇 security
  • 26 篇 educational inst...
  • 26 篇 semantics
  • 26 篇 cloud computing

机构

  • 42 篇 faculty of compu...
  • 37 篇 department of so...
  • 33 篇 college of compu...
  • 27 篇 department of so...
  • 21 篇 department of co...
  • 20 篇 school of comput...
  • 20 篇 state key labora...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 18 篇 faculty of softw...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...
  • 14 篇 faculty of infor...

作者

  • 29 篇 quanyin zhu
  • 22 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 herawan tutut
  • 20 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 muhammad waseem ...
  • 14 篇 zain ul abideen
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 muhammad adnan k...
  • 13 篇 siew hock ow
  • 13 篇 ow siew hock
  • 12 篇 tutut herawan
  • 12 篇 belikov juri
  • 12 篇 levron yoash
  • 11 篇 khan arif ali
  • 11 篇 li qi
  • 11 篇 pal umapada

语言

  • 2,061 篇 英文
  • 348 篇 其他
  • 26 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software Engineering and Computer Technology"
2434 条 记 录,以下是431-440 订阅
排序:
A comprehensive study of the Design and Security of the IoT layer Attacks  6
A comprehensive study of the Design and Security of the IoT ...
收藏 引用
6th IEEE International Conference on Communication and Electronics Systems, ICCES 2021
作者: Rajan, M.Sundar Arunkumar, J.R. Ramasamy, Anusuya Sisay, Berhanu Arbaminch Institute of Technology Arbaminch University Faculty of Electrical and Computer Engineering Ethiopia Arbaminch Institute of Technology Arbaminch University Faculty of Computing and Software Engineering Ethiopia
IoT is the network of thousands of individuals, resources and expertise interconnecting and sharing. IoT implementations are strongly validated by increased usability, reliability and automation. Authentication and re... 详细信息
来源: 评论
A Systemic Big Data Framework for the Charging Pile Business  22
A Systemic Big Data Framework for the Charging Pile Business
收藏 引用
Proceedings of the 7th International Conference on Information Systems engineering
作者: Licheng Xu Shuai Xie Department of Software Engineering Universiti Malaya Malaysia Faculty of Computer Science and Information Technology Universiti Malaya Malaysia
There are some problems in the electric vehicle (EV) charging pile industry, such as the unreasonable location of charging station construction, low utilization rate of charging piles, and imprecise marketing strategi... 详细信息
来源: 评论
Integrating Design Thinking into software Process Improvement  4
Integrating Design Thinking into Software Process Improvemen...
收藏 引用
4th International Conference on Emerging Trends in Networks and computer Communications, ETNCC 2024
作者: Khalid, Anum Hashmi, Amber Sarwar Kiani, Azaz Ahmed Muzammal, Syeda Mariam Jhanjhi, N.Z. Bibi, Ruqia Kumar, Sandeep Foundation University Department of Software Engineering Islamabad Pakistan Rawalpindi Women University Department of Software Engineering Rawalpindi Pakistan National University of Modern Languages Rawalpindi Pakistan School of Computer Science Taylor's University Faculty of Innovation and Technology Subang Jaya Malaysia University Institute of Information Technology Pir Mehr Ali Shah Arid Agriculture University Rawalpindi Pakistan Lovely Professional University Division of Research and Development Phagwara144411 India KKR and KSR institute of technology and sciences Andhra Pradesh Guntur India
The need for software improvement is growing widely due to the demand for technology development. The issues that arise by expanding the software processes in the workplace are expense, lack of understanding, time con... 详细信息
来源: 评论
Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 6061-6077页
作者: Muhammad Akram Muhammad Waseem Iqbal Syed Ashraf Ali Muhammad Usman Ashraf Khalid Alsubhi Hani Moaiteq Aljahdali Department of Computer Science Superior University Lahore54000Pakistan Department of Software Engineering Superior University Lahore54000Pakistan Department of Computer Science The Institute of Management Sciences(PAK-AIMS)Lahore54000Pakistan Department of Computer Science GC Women University SialkotPakistan Department of Computer Science King Abdulaziz UniversityJeddahSaudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia
In cipher algorithms,the encryption and decryption are based on the same *** are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwis... 详细信息
来源: 评论
Detection of Android Malware using Machine Learning
Detection of Android Malware using Machine Learning
收藏 引用
2021 International Mobile, Intelligent, and Ubiquitous Computing Conference, MIUCC 2021
作者: Fiky, Ahmed Hashem El Elshenawy, Ayman Madkour, Mohamed Ashraf Al-Azhar University Systems and Computer Engineering Faculty of Engineering Cairo Egypt Software Engineering and Information Technology Department Faculty of Engineering and Technology Egyptian Chinees University Cairo Egypt
Nowadays, smartphones became an integral part of human life due to the great necessity for their daily activities. Most smartphone users are downloading and installing mobile apps without worrying about security. Ther... 详细信息
来源: 评论
Towards a Deep Learning Pain-Level Detection Deployment at UAE for Patient-Centric-Pain Management and Diagnosis Support: Framework and Performance Evaluation  14
Towards a Deep Learning Pain-Level Detection Deployment at U...
收藏 引用
14th International Conference on Ambient Systems, Networks and Technologies Networks, ANT 2023 and The 6th International Conference on Emerging Data and Industry 4.0, EDI40 2023
作者: Ismail, Leila Waseem, Muhammad Danish Lab School of Computing and Information Systems Faculty of Engineering and Information Technology The University of Melbourne Australia Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University United Arab Emirates National Water and Energy Center United Arab Emirates University United Arab Emirates
The outbreak of the COVID-19 pandemic revealed the criticality of timely intervention in a situation exacerbated by a shortage in medical staff and equipment. Pain-level screening is the initial step toward identifyin... 详细信息
来源: 评论
DM-Net for Colorectal Polyp Detection Using Dual Feature and Multi-Layer Aggregation
DM-Net for Colorectal Polyp Detection Using Dual Feature and...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Jingjing Wan Ling Wang Wenjie Zhu Bolun Chen Department of Gastroenterology The Second People's Hospital of Huai'an Huaian China Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huaian China
Early detection of colorectal polyps is crucial for preventing colorectal cancer. Although endoscopy is the current standard diagnostic method, it still faces challenges in terms of accuracy, efficiency, and patient c... 详细信息
来源: 评论
Time-series satellite remote sensing reveals gradually increasing war damage in the Gaza Strip
收藏 引用
National Science Review 2024年 第9期11卷 181-191页
作者: Shimaa Holail Tamer Saleh Xiongwu Xiao Jing Xiao Gui-Song Xia Zhenfeng Shao Mi Wang Jianya Gong Deren Li State Key Laboratoryof Information Engineering in Surveying Mapping and Remote SensingWuhan University Geomatics Engineering Department Faculty of Engineering at Shoubra Benha University School of Computer Science Wuhan University Collaborative Innovation Center of Geospatial Technology National Engineering Research Center for Multi-media Software Institute of Artificial IntelligenceWuhan University
War-related urban destruction is a significant global concern, impacting national security, social stability,people's survival and economic development. The effects of urban geomorphology and complex geological co... 详细信息
来源: 评论
Ontological Model for Cohesive Smart Health Services Management
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3679-3695页
作者: Muhammad Raza Naqvi Muhammad Waseem Iqbal Syed Khuram Shahzad M.Usman Ashraf Khalid Alsubhi Hani Moaiteq Aljahdali Le Laboratoire Génie de Production de l’École Nationale d’Ingénieurs de Tarbes(LGP-INP-ENIT) Universitéde ToulouseCEDEXTarbes65016France Department of Software Engineering Superior UniversityLahore53700Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Computer Science University of Management and TechnologySialkot51310Pakistan Department of Computer Science King Abdul-Aziz UniversityJeddah21577Saudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21577Saudi Arabia
Health care has become an essential social-economic concern for all stakeholders(e.g.,patients,doctors,hospitals etc.),health needs,private care and the elderly class of *** massive increase in the usage of health car... 详细信息
来源: 评论
MODEL CHECKING FOR MULTI-AGENT SYSTEMS MODELED BY EPISTEMIC PROCESS CALCULUS
arXiv
收藏 引用
arXiv 2025年
作者: Yu, Qixian Cao, Zining Hui, Zong Zhou, Yuan College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing211106 China Ministry Key Laboratory for Safety-Critical Software Development and Verification Nanjing211106 China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing210023 China Faculty of Computer and Software Engineering Huaiyin Institute Of Technology Huaian223001 China
This paper presents a comprehensive framework for modeling and verifying multi-agent systems. The paper introduce an Epistemic Process Calculus for multi-agent systems, which formalizes the syntax and semantics to cap... 详细信息
来源: 评论