咨询与建议

限定检索结果

文献类型

  • 1,446 篇 会议
  • 958 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,518 篇 工学
    • 1,166 篇 计算机科学与技术...
    • 945 篇 软件工程
    • 300 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 152 篇 电气工程
    • 152 篇 生物工程
    • 131 篇 机械工程
    • 111 篇 电子科学与技术(可...
    • 108 篇 生物医学工程(可授...
    • 100 篇 光学工程
    • 61 篇 交通运输工程
    • 60 篇 化学工程与技术
    • 58 篇 仪器科学与技术
    • 57 篇 动力工程及工程热...
    • 56 篇 安全科学与工程
  • 726 篇 理学
    • 380 篇 数学
    • 223 篇 物理学
    • 177 篇 生物学
    • 114 篇 统计学(可授理学、...
    • 98 篇 系统科学
    • 57 篇 化学
  • 516 篇 管理学
    • 322 篇 管理科学与工程(可...
    • 205 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 136 篇 医学
    • 112 篇 临床医学
    • 94 篇 基础医学(可授医学...
    • 57 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 71 篇 法学
    • 59 篇 社会学
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 51 篇 教育学
  • 29 篇 农学
  • 15 篇 文学
  • 9 篇 军事学
  • 7 篇 艺术学

主题

  • 72 篇 machine learning
  • 67 篇 deep learning
  • 58 篇 computer science
  • 58 篇 software enginee...
  • 53 篇 feature extracti...
  • 53 篇 accuracy
  • 48 篇 artificial intel...
  • 47 篇 computational mo...
  • 47 篇 training
  • 43 篇 data mining
  • 42 篇 software
  • 40 篇 optimization
  • 39 篇 predictive model...
  • 38 篇 information tech...
  • 31 篇 internet of thin...
  • 28 篇 support vector m...
  • 27 篇 security
  • 26 篇 educational inst...
  • 26 篇 semantics
  • 26 篇 cloud computing

机构

  • 42 篇 faculty of compu...
  • 37 篇 department of so...
  • 33 篇 college of compu...
  • 27 篇 department of so...
  • 21 篇 department of co...
  • 20 篇 school of comput...
  • 20 篇 state key labora...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 18 篇 faculty of softw...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...
  • 14 篇 faculty of infor...

作者

  • 29 篇 quanyin zhu
  • 22 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 herawan tutut
  • 20 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 muhammad waseem ...
  • 14 篇 zain ul abideen
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 muhammad adnan k...
  • 13 篇 siew hock ow
  • 13 篇 ow siew hock
  • 12 篇 tutut herawan
  • 12 篇 belikov juri
  • 12 篇 levron yoash
  • 11 篇 khan arif ali
  • 11 篇 li qi
  • 11 篇 pal umapada

语言

  • 2,061 篇 英文
  • 348 篇 其他
  • 26 篇 中文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software Engineering and Computer Technology"
2434 条 记 录,以下是501-510 订阅
Soft Computing Based Metaheuristic Algorithms for Resource Management in Edge Computing Environment
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 5233-5250页
作者: Nawaf Alhebaishi Abdulrhman M.Alshareef Tawfiq Hasanin Raed Alsini Gyanendra Prasad Joshi Seongsoo Cho Doo Ill Chul Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science and Engineering Sejong UniversitySeoulKorea School of Software Soongsil UniversitySeoul06978Korea Artificial Intelligence Education Hankuk University of Foreign StudiesDongdaemun-guSeoul02450Korea
In recent times,internet of things(IoT)applications on the cloud might not be the effective solution for every IoT scenario,particularly for time sensitive applications.A significant alternative to use is edge computi... 详细信息
来源: 评论
Preliminary Exploration on Node-To-Node Fault Tolerance Coordination in Distributed System
Preliminary Exploration on Node-To-Node Fault Tolerance Coor...
收藏 引用
Computing (ICOCO), IEEE International Conference on
作者: Muntadher Saadoon Siti Hafizah Ab. Hamid Hazrina Sofian Hamza Altarturi Nur Nasuha Zati Hakim Azizul Haqi Khalid Department of Software Engineering Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia Department of Computer System and Technology Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia Department of Artificial Intelligence Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia Department of Computer and Communication Faculty of Engineering Universiti Putra Malaysia Selangor Malaysia
Internet of Things, edge computing devices, the widespread use of artificial intelligence and machine learning applications, and the extensive adoption of cloud computing pose significant challenges to maintaining fau...
来源: 评论
Faceswap Finder: A Fusion-Based Deepfake Detection Technique
Faceswap Finder: A Fusion-Based Deepfake Detection Technique
收藏 引用
International Conference on Advancements in Computational Sciences (ICACS)
作者: Nimra Basit Fatima Khalid Qurat Ul Ain Maria Andleeb Department of Software Engineering University of Engineering and Technology Taxila Pakistan Faculty of Computer Sciences and Engineeing GIKI Topi Pakistan Department of Computing Shifa Tameer-e-Millat University PRC Islamabad Pakistan
The significant improvement in deepfake generation algorithms has made possible the manipulation of visual data. The advancement of GAN technology and tools has made it relatively simple to use source and target photo... 详细信息
来源: 评论
Synthetic Minority Over-sampling Technique for Student Performance Prediction: A Comparative Analysis of Ensemble and Linear Models
Synthetic Minority Over-sampling Technique for Student Perfo...
收藏 引用
International Conference on computer and Information technology (ICCIT)
作者: Khaled Mahmud Sujon Rohayanti Hassan Nusrat Jahan Department of Software Engineering Faculty of Computing Universiti Teknologi Malaysia (UTM) Johor Malaysia Faculty of Computing Universiti Teknologi Malaysia (UTM) Johor Malaysia Department of Computer Science and Engineering Chittagong University of Engineering & Technology(CUET) Chittagong Bangladesh
This study explores the impact of the Synthetic Minority Oversampling Technique (SMOTE) on predictive accuracy in student performance prediction using both linear (Logistic Regression, LR) and ensemble (Random Forest,... 详细信息
来源: 评论
Joint Channel and Multi-User Detection Empowered with Machine Learning
收藏 引用
computers, Materials & Continua 2022年 第1期70卷 109-121页
作者: Mohammad Sh.Daoud Areej Fatima Waseem Ahmad Khan Muhammad Adnan Khan Sagheer Abbas Baha Ihnaini Munir Ahmad Muhammad Sheraz Javeid Shabib Aftab College of Engineering Al Ain UniversityAbu Dhabi112612UAE Department of Computer Science Lahore Garrison UniversityLahore54792Pakistan School of Computer Science National College of Business Administration and EconomicsLahore54000Pakistan Riphah School of Computing and Innovation Faculty of ComputingRiphah International UniversityLahore54000Pakistan Pattern Recognition and Machine Learning Lab Department of Software EngineeringGachon UniversitySeongnam13557South Korea Department of Computer Science College of Science and TechnologyWenzhou Kean University325060USA Department of Computer Science Hameeda Rasheed Institute of Science and TechnologyMultan66000Pakistan
The numbers of multimedia applications and their users increase with each passing *** multi-carrier systems have been developed along with varying techniques of space-time coding to address the demand of the future ge... 详细信息
来源: 评论
Intrusion Detection in Smart IoT Devices for People with Disabilities  8
Intrusion Detection in Smart IoT Devices for People with Dis...
收藏 引用
8th IEEE International Smart Cities Conference, ISC2 2022
作者: Naveed, Muhammad Usman, Syed Muhammad Satti, Muhammad Islam Aleshaiker, Sama Anwar, Aamir Shaheed Zulfikar Ali Bhutto Institute of Science and Technology Department of Computer Science Islamabad Pakistan Ai Air University Faculty of Computing Department of Creative Technologies Islamabad Pakistan Riphah University Faculty of Computer Science and Software Engineering Islamabad Pakistan School of Computing & Engineering University of West London London United Kingdom
An intrusion Detection System (IDS) is a system that resides inside the network and monitors all incoming and outgoing traffic. It prevents unethical activities from happening over the network. With the use of IoT dev... 详细信息
来源: 评论
Stakeholder Identification Overview and Challenges in Requirements engineering Prospective  2
Stakeholder Identification Overview and Challenges in Requir...
收藏 引用
2nd International Conference on Computing and Information technology, ICCIT 2022
作者: Elneel, Duha Awad Fakharudin, Abdul Sahli Ahmed, Elsadig Musa Kahtan, Hasan Abdullateef, Mansoor Universiti Malaysia Pahang Faculty of Computing Kuantan26300 Malaysia Multimedia University Faculty of Business Melaka Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur50603 Malaysia Knowbis Solutions Consultancy Selangor Malaysia
Stakeholder identification (SI) illustrates a critical part of the requirements elicitation activity. It helps software analysts gather accurate system requirements to ensure high quality and avoid system failure. Sta... 详细信息
来源: 评论
Customers' sentiment on food delivery services: An Arabic text mining approach
收藏 引用
International Journal of Information Management Data Insights 2024年 第2期4卷
作者: Mustafa, Dheya Khabour, Safaa M. Shatnawi, Ahmed S. Department of Computer Engineering Faculty of Engineering The Hashemite University Zarqa 13133 Jordan Department of Information Systems Faculty of Information Technology and Computer Sciences Yarmouk University Irbid 21163 Jordan Department of Software Engineering Jordan University of Science & Technology Irbid 21110 Jordan
The Covid-19 pandemic has accelerated the shift in organizations' strategies toward innovative online services. Customer reviews on platforms for online ordering and delivery are a vital source of information abou... 详细信息
来源: 评论
Smart Photo Editor for Differently-abled People using Assistive technology  6
Smart Photo Editor for Differently-abled People using Assist...
收藏 引用
6th International Conference on Information technology Research, ICITR 2021
作者: Buddhika, A.S. Wijesekera, P.K. Kavindu, D. G. Hasintha Dinusha, Dilshan S Arachchillage, Udara Srimath S. Samaratunge Kuruppu, Thilmi Anuththara Faculty of Computing Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Malabe Sri Lanka
Differently-abled people are significant minority groups, have many limitations to live everyday life, are starved of services, and are mostly ignored by society due to many types of disabilities. This problem may lea... 详细信息
来源: 评论
Approximated Coded Computing: Towards Fast, Private and Secure Distributed Machine Learning
收藏 引用
IEEE Transactions on Emerging Topics in Computing 2025年
作者: Qiu, Houming Zhu, Kun Luong, Nguyen Cong Niyato, Dusit Jiangxi University of Finance and Economics School of Software and IoT Engineering Jiangxi 330032 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210016 China Phenikaa University Faculty of Computer Science Hanoi12116 Viet Nam Nanyang Technological University School of Computer Science and Engineering 639798 Singapore
In a large-scale distributed machine learning system, coded computing has attracted wide-spread attention since it can effectively alleviate the impact of stragglers. However, several emerging problems greatly limit t... 详细信息
来源: 评论