咨询与建议

限定检索结果

文献类型

  • 1,446 篇 会议
  • 958 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,518 篇 工学
    • 1,166 篇 计算机科学与技术...
    • 945 篇 软件工程
    • 300 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 152 篇 电气工程
    • 152 篇 生物工程
    • 131 篇 机械工程
    • 111 篇 电子科学与技术(可...
    • 108 篇 生物医学工程(可授...
    • 100 篇 光学工程
    • 61 篇 交通运输工程
    • 60 篇 化学工程与技术
    • 58 篇 仪器科学与技术
    • 57 篇 动力工程及工程热...
    • 56 篇 安全科学与工程
  • 726 篇 理学
    • 380 篇 数学
    • 223 篇 物理学
    • 177 篇 生物学
    • 114 篇 统计学(可授理学、...
    • 98 篇 系统科学
    • 57 篇 化学
  • 516 篇 管理学
    • 322 篇 管理科学与工程(可...
    • 205 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 136 篇 医学
    • 112 篇 临床医学
    • 94 篇 基础医学(可授医学...
    • 57 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 71 篇 法学
    • 59 篇 社会学
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 51 篇 教育学
  • 29 篇 农学
  • 15 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学

主题

  • 72 篇 machine learning
  • 67 篇 deep learning
  • 58 篇 computer science
  • 58 篇 software enginee...
  • 53 篇 feature extracti...
  • 53 篇 accuracy
  • 48 篇 artificial intel...
  • 47 篇 computational mo...
  • 47 篇 training
  • 43 篇 data mining
  • 42 篇 software
  • 40 篇 optimization
  • 39 篇 predictive model...
  • 38 篇 information tech...
  • 31 篇 internet of thin...
  • 28 篇 support vector m...
  • 27 篇 security
  • 26 篇 educational inst...
  • 26 篇 semantics
  • 26 篇 cloud computing

机构

  • 42 篇 faculty of compu...
  • 37 篇 department of so...
  • 33 篇 college of compu...
  • 27 篇 department of so...
  • 21 篇 department of co...
  • 20 篇 school of comput...
  • 20 篇 state key labora...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 18 篇 faculty of softw...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...
  • 14 篇 faculty of infor...

作者

  • 29 篇 quanyin zhu
  • 22 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 herawan tutut
  • 20 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 muhammad waseem ...
  • 14 篇 zain ul abideen
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 muhammad adnan k...
  • 13 篇 siew hock ow
  • 13 篇 ow siew hock
  • 12 篇 tutut herawan
  • 12 篇 belikov juri
  • 12 篇 levron yoash
  • 11 篇 khan arif ali
  • 11 篇 li qi
  • 11 篇 pal umapada

语言

  • 2,061 篇 英文
  • 348 篇 其他
  • 26 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software Engineering and Computer Technology"
2434 条 记 录,以下是441-450 订阅
An Enhanced Authentication Protocol Suitable for Constrained RFID Systems
收藏 引用
IEEE Access 2024年 12卷 61610-61628页
作者: Hosseinzadeh, Mehdi Servati, Mohammad Reza Rahmani, Amir Masoud Safkhani, Masoumeh Lansky, Jan Janoscova, Renata Ahmed, Omed Hassan Tanveer, Jawad Lee, Sang-Woong Duy Tan University Institute of Research and Development Da Nang550000 Viet Nam Duy Tan University School of Medicine and Pharmacy Da Nang550000 Viet Nam Shahid Rajaee Teacher Training University Department of Computer Engineering Tehran16788-15811 Iran National Yunlin University of Science and Technology Future Technology Research Center Douliou Yunlin64002 Taiwan School of Computer Science Tehran19395-5746 Iran University of Finance and Administration Faculty of Economic Studies Department of Computer Science and Mathematics Prague101 00 Czech Republic University of Human Development Department of Information Technology Sulaymaniyah0778-6 Iraq Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of Gachon University Pattern Recognition and Machine Learning Laboratory Department of Ai Software Seongnam-si13557 Korea Republic of
RFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privac... 详细信息
来源: 评论
Cyberbullying Classification Using a Natural Language Processing and Machine Learning Techniques
Cyberbullying Classification Using a Natural Language Proces...
收藏 引用
2024 International Conference on Advances in Computing Research on Science engineering and technology, ACROSET 2024
作者: Mankar, Nikhilesh Pramod Mahure, Tushar Joshi, Anushka A. Pande, Sagar Dhanraj Khamparia, Aditya Nathe, Ankita Shrikrushna Turjman, Fadi Al Pune India Independent Researcher Amravati India Babasaheb Bhimrao Ambedkar University Department of Computer Science Amethi India Kavikulguru Institute of Technology and Science Department of Information Technology Nagpur India Ai and Robotics Institute Near East University Artificial Intelligence Software Information Systems Engineering Departments Nicosia Cyprus University of Kyrenia Research Center for Ai and IoT Faculty of Engineering Kyrenia Turkey
The usage of online entertainment has increased dramatically after some time with the enhancement of the Internet and has turned into the most compelling systems administration stage in this century. Notwithstanding, ... 详细信息
来源: 评论
Research and development of two-factor authentication methods using neural networks  4
Research and development of two-factor authentication method...
收藏 引用
4th IEEE International Conference on Smart Information Systems and Technologies, SIST 2024
作者: Darbek, Temirkhan Mukasheva, Assel Bissembayev, Alibek Gnatyuk, Sergiy Mukammejanova, Dinargul The Department of Information Systems and Cybersecurity Almaty university of power engineering and telecommunications Almaty Kazakhstan The School of Information Technology and Engineering Kazakh-British Technical University Almaty Kazakhstan The School of Information Technology and Engineering Kazakh British Technical University Almaty Kazakhstan The Faculty of Cybersecurity Computer and Software Engineering at National Aviation University National Aviation University Kyiv Ukraine The Department of Artificial Intelligence and Big Data Kazakh National University named after Al-Farabi Almaty Kazakhstan
This article is devoted to the research and development of innovative two-factor authentication (2FA) methods using neural networks. 2FA plays a key role in ensuring the security of data and accounts in the modern dig... 详细信息
来源: 评论
Application of domain-specific modeling in kinetography and bipedal humanoid robot control
收藏 引用
PeerJ computer Science 2025年 11卷 e2864-e2864页
作者: Djukić, Verislav Oros, Dragana Penčić, Marko Lu, Zhenli Faculty of Computer Engineering Union University Serbia Belgrade Serbia Djukic Software GmbH Nürnberg Germany Faculty of Technical Sciences University of Novi Sad Novi Sad Serbia School of Electrical Engineering and Automation Suzhou University of Technology Changshu China
The article presents a new approach in the development of software for bipedal humanoid robot controllers, based on the construction and application of graphic domain-specific languages (DSLs). The notations used to d... 详细信息
来源: 评论
CAPAST: Content Affinity Preserved Arbitrary Style Transfer
CAPAST: Content Affinity Preserved Arbitrary Style Transfer
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xinyuan Zheng Xiaojie Li Canghong Shi Jia He Zhan Ao Huang Xian Zhang Imran Mumtaz School of Computer Science Chengdu University of Information Technology China School of Computer and Software Engineering Xihua University China Faculty of Engineering and Mathematical Sciences The University of Western Australia Australia Department of Computer Science University of Agriculture Faisalabad Pakistan
Balancing the consistency of style and the integrity of content is the main challenge in arbitrary style transfer domain. Currently, local style details can be effectively captured by attention mechanism but easily pr... 详细信息
来源: 评论
Improving the Performance of Firewalls through Network Traffics Logs' Classification of Firat Dataset Using Decision Tree Algorithm
Improving the Performance of Firewalls through Network Traff...
收藏 引用
International Conference on Web Research (ICWR)
作者: Maryam Talaeepoor Behzad Soleimani Neysiani Mohammad Davarpanah Jezi Department of Computer Engineering Faculty of Computer Engineering Naghshe Jahan Institute of Higher Education Isfahan Iran Department of Software Engineering Oil Design and Construction Company (ODCC) Isfahan Iran Department of Electrical and Computer Engineering Isfahan University of Technology Isfahan Iran
As long as a computer system is connected to the Internet, it is susceptible to attack as a victim. In computer networks, it becomes important to manage the network based on parameters such as network size and network... 详细信息
来源: 评论
Web Application to predict Skin Disease: An Approach Using Deep Learning Algorithm
Web Application to predict Skin Disease: An Approach Using D...
收藏 引用
Human-computer Interaction, Optimization and Robotic Applications (HORA), International Congress on
作者: Eelanila Thayalan Ayingaran Arumugavel Sharujan Ganeshan Makenthiran Dalaxshan Harinda Fernando Kaushalya Rajapakse Department of Information Technology Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
The Disease Prediction System revolutionizes healthcare with advanced machine learning techniques for early detection of skin diseases, notably focusing on skin cancer. Through image processing and Transfer Learning, ... 详细信息
来源: 评论
Optimal Scheduling of Graph States via Path Decompositions
arXiv
收藏 引用
arXiv 2024年
作者: Elman, Samuel J. Gavriel, Jason Mann, Ryan L. Centre for Quantum Software and Information School of Computer Science Faculty of Engineering & Information Technology University of Technology SydneyNSW2007 Australia Centre for Quantum Computation and Communication Technology Australia
We study the optimal scheduling of graph states in measurement-based quantum computation, establishing an equivalence between measurement schedules and path decompositions of graphs. We define the spatial cost of a me... 详细信息
来源: 评论
Chest Radiographs Based Pneumothorax Detection Using Federated Learning
收藏 引用
computer Systems Science & engineering 2023年 第11期47卷 1775-1791页
作者: Ahmad Almadhor Arfat Ahmad Khan Chitapong Wechtaisong Iqra Yousaf Natalia Kryvinska Usman Tariq Haithem Ben Chikha Department of Computer Engineering and Networks College of Computer and Information SciencesJouf UniversitySakaka72388Saudi Arabia Department of Computer Science College of ComputingKhon Kaen UniversityKhon Kaen40002Thailand School of Telecommunication Engineering Suranaree University of TechnologyNakhon Ratchasima30000Thailand Department of Computer Science and Software Engineering International Islamic UniversityIslamabadPakistan Information Systems Department Faculty of ManagementComenius University in BratislavaOdbojárovBratislava440Slovakia Prince Sattam bin Abdulaziz University AlKharjSaudi Arabia
Pneumothorax is a thoracic condition that occurs when a person’s lungs collapse,causing air to enter the pleural cavity,the area close to the lungs and chest *** most persistent disease,as well as one that necessitat... 详细信息
来源: 评论
Cloud-Assisted Secure and Cost-Effective Authenticated Solution for Remote Wearable Health Monitoring System
收藏 引用
IEEE Transactions on Network Science and engineering 2023年 第5期10卷 2710-2718页
作者: Mahmood, Khalid Obaidat, Mohammad S. Ghaffar, Zahid Alzahrani, Bander A. Shamshad, Salman Saleem, Muhammad Asad Hussain, Shafiq Lahore Campus Lahore55150 Pakistan University of Padua Department of Mathematics Padua35131 Italy University of Jordan KASIT Amman11942 Jordan University of Science and Technology Beijing100083 China Barani Institute of Sciences Department of Computer Science Sahiwal57000 Pakistan King Abdulaziz University Faculty of Computing and Information Technology Jeddah Saudi Arabia The University of Lahore Department of Software Engineering Lahore54590 Pakistan COMSATS University Islamabad Department of Computer Science Sahiwal Campus Sahiwal57000 Pakistan University of Sahiwal Department of Computer Science Sahiwal57000 Pakistan
Security and privacy are the leading solicitude in cloud computing since users have restricted privilege on the data maintained by distinct service providers at remote locations. The situation becomes more strenuous w... 详细信息
来源: 评论