咨询与建议

限定检索结果

文献类型

  • 1,440 篇 会议
  • 953 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,423 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,492 篇 工学
    • 1,145 篇 计算机科学与技术...
    • 944 篇 软件工程
    • 294 篇 信息与通信工程
    • 218 篇 控制科学与工程
    • 153 篇 生物工程
    • 150 篇 电气工程
    • 131 篇 机械工程
    • 112 篇 电子科学与技术(可...
    • 108 篇 生物医学工程(可授...
    • 97 篇 光学工程
    • 60 篇 交通运输工程
    • 59 篇 仪器科学与技术
    • 59 篇 化学工程与技术
    • 57 篇 动力工程及工程热...
    • 56 篇 安全科学与工程
  • 721 篇 理学
    • 379 篇 数学
    • 223 篇 物理学
    • 175 篇 生物学
    • 116 篇 统计学(可授理学、...
    • 98 篇 系统科学
    • 57 篇 化学
  • 506 篇 管理学
    • 315 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 131 篇 医学
    • 109 篇 临床医学
    • 92 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 72 篇 法学
    • 60 篇 社会学
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 50 篇 教育学
  • 29 篇 农学
  • 15 篇 文学
  • 9 篇 军事学
  • 6 篇 艺术学

主题

  • 73 篇 machine learning
  • 67 篇 deep learning
  • 59 篇 software enginee...
  • 58 篇 computer science
  • 53 篇 feature extracti...
  • 52 篇 accuracy
  • 46 篇 computational mo...
  • 46 篇 artificial intel...
  • 46 篇 training
  • 43 篇 data mining
  • 42 篇 software
  • 39 篇 optimization
  • 38 篇 information tech...
  • 38 篇 predictive model...
  • 30 篇 internet of thin...
  • 29 篇 support vector m...
  • 27 篇 cloud computing
  • 26 篇 educational inst...
  • 26 篇 semantics
  • 26 篇 security

机构

  • 41 篇 faculty of compu...
  • 37 篇 department of so...
  • 32 篇 college of compu...
  • 27 篇 department of so...
  • 22 篇 department of co...
  • 20 篇 school of comput...
  • 20 篇 state key labora...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 18 篇 faculty of softw...
  • 17 篇 department of in...
  • 16 篇 faculty of scien...
  • 16 篇 faculty of compu...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 14 篇 faculty of compu...

作者

  • 29 篇 quanyin zhu
  • 22 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 herawan tutut
  • 20 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 muhammad waseem ...
  • 14 篇 zain ul abideen
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 muhammad adnan k...
  • 13 篇 siew hock ow
  • 12 篇 tutut herawan
  • 12 篇 belikov juri
  • 12 篇 levron yoash
  • 12 篇 ow siew hock
  • 11 篇 khan arif ali
  • 11 篇 hamam habib
  • 11 篇 li qi

语言

  • 2,135 篇 英文
  • 263 篇 其他
  • 26 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software Engineering and Computer Technology"
2423 条 记 录,以下是691-700 订阅
排序:
Efficient COVID-19 detection using data mining algorithms: a comparison of basic and hybrid approaches
收藏 引用
Soft Computing 2025年 第3期29卷 1437-1451页
作者: Saidi, Mohammad Gheibi, Mohammad Ghazikhani, Adel Lotfata, Aynaz Chahkandi, Benyamin Familsamavati, Sajad Behzadian, Kourosh Department of Computer Science Imam Reza International University Mashhad Iran MS of Software Engineering Information and Communication Technology Unit Mashhad Municipality Fire and Safety Services Organization Mashhad Iran Big Data Lab Imam Reza International University Mashhad Iran Institute for Nanomaterials Advanced Technologies and Innovation Technical University of Liberec Liberec46117 Czech Republic Tallinn10615 Estonia Department of Pathology Microbiology and Immunology School of Veterinary Medicine University of California Davis95616 United States Department of Urban and Regional Planning San Jose State University San Jose95192 United States Faculty of Civil and Environmental Engineering Gdansk University of Technology Narutowicza Street 11/12 80-233 Gdansk Poland Tecnologico de Monterrey Escuela de Ingeniería y Ciencias Monterrey Mexico School of Computing and Engineering University of West London London United Kingdom
Accurate and efficient diagnosis of COVID-19 remains a significant challenge due to the limitations of current detection methods, such as blood tests and chest scans, which can be time-consuming and error-prone. This ... 详细信息
来源: 评论
Aspect-Based Sentiment Analysis on Amharic Text for Evaluating Ethio-Telecom Services
Aspect-Based Sentiment Analysis on Amharic Text for Evaluati...
收藏 引用
Emerging Trends in Information technology and engineering (ic-ETITE), Conference on
作者: Tarikwa Tesfa Befikadu Belete Samuel Abera Sudhir Kumar Mohapatra Tapan Kumar Das Department of Software Engineering Addis Ababa Science and Technology University Addis Ababa Ethiopia Ethio Telecom Services Addis Ababa Ethiopia Faculty of Emerging Technologies Sri Sri University Cuttack India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India
People are increasingly expressing their views and opinions about a company's goods or service on social media these days. For all types of businesses and organizations, sentiment analysis in text can be used to f...
来源: 评论
Utilizing machine learning algorithms for task allocation in distributed agile software development
收藏 引用
Heliyon 2024年 第21期10卷 e39926页
作者: Al-Fraihat, Dimah Sharrab, Yousef Al-Ghuwairi, Abdel-Rahman Alzabut, Hamza Beshara, Malik Algarni, Abdulmohsen Department of Software Engineering Faculty of Information Technology Isra University Amman 11622 Jordan Department of Data Science and Artificial Intelligence Faculty of Information Technology Isra University Amman 11622 Jordan Department of Software Engineering Faculty of Prince Al-Hussien bin Abdullah for IT The Hashemite University Zarqa 13133 Jordan Department of Computer Science King Khalid University Abha 61421 Saudi Arabia
Distributed agile software development (DASD) has become a prominent software development approach. Proper task allocation is crucial in DASD to avoid undesirable outcomes including project rejection by clients, unfav... 详细信息
来源: 评论
A Secure Authentication Framework for Consumer Mobile Crowdsourcing Networks
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Aldosary, Abdallah Tanveer, Muhammad Ahmad, Musheer Maghrabi, Louai A. Ahmed, Emad A. Hussain, Amir El-Latif, Ahmed A. Abd Department of Computer Engineering Prince Sattam bin Abdulaziz University Riyadh Wadi Addwasir11991 Saudi Arabia University of Management and Technology Department of Computer Science Lahore54770 Pakistan Jamia Millia Islamia Department of Computer Engineering New Delhi110025 India University of Business and Technology College of Engineering Department of Software Engineering Jeddah Saudi Arabia South Valley University Faculty of Computers and Information Department of Computer Science Qena Egypt Edinburgh Napier University United Kingdom Prince Sultan University EIAS Data Science Lab College of Computer and Information Sciences Center of Excellence in Quantum and Intelligent Computing Riyadh11586 Saudi Arabia Menoufia University Faculty of Science Department of Mathematics and Computer Science Shebin El-Koom32511 Egypt
The Mobile crowdsourcing network (MCN) leverages collaborative intelligence to solve complex tasks through group cooperation. It comprises three main components: the end-user, the service provider, and the mobile user... 详细信息
来源: 评论
Multi-batch Nuclear-norm Adversarial Network for Unsupervised Domain Adaptation
Multi-batch Nuclear-norm Adversarial Network for Unsupervise...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Pei Wang Yun Yang Zhenyu Yu School of Information Science and Engineering Yunnan University Kunming China National Pilot School of Software Yunnan University Kunming China Yunnan Key Laboratory of Software Engineering Yunnan University Kunming China Guangzhou University Guangzhou China CISiP Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia
Adversarial learning has achieved great success for unsupervised domain adaptation (UDA). Existing adversarial UDA methods leverage the predicted discriminative information with Nuclear-norm Wasserstein discrepancy fo... 详细信息
来源: 评论
The Future of Crime Prevention: Police Case Analysis Using Machine Learning
The Future of Crime Prevention: Police Case Analysis Using M...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: Dharsan. R Krishanthini M Traveena C Anubama L Mahaadikara M.D.J.T. Hansika Sanjeevi Shahikala Chandrasiri Department of Computer Science and Software Engineering (CSSE) Sri Lanka Institute of Information Technology (SLIIT) Malabe Sri Lanka Faculty of Computing Sri Lanka Institute of Information Technology (SLIIT) Malabe Sri Lanka
Law enforcement agencies and police departments face challenges in analyzing and preventing accidents and crimes. This research presents a comprehensive machine learning system, “The Future of Crime Prevention: Polic...
来源: 评论
Prediction of Polycystic Ovary Syndrome Using Genetic Algorithm-driven Feature Selection
Prediction of Polycystic Ovary Syndrome Using Genetic Algori...
收藏 引用
IT and Industrial Technologies (ICIT), International Conference on
作者: Fatima Faridoon Raja Hashim Ali Zain Ul Abideen Nazia Shahzadi Ali Zeeshan Ijaz Usama Arshad Nisar Ali Muhammad Imad Said Nabi Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany BCMaterials Basque Center for Materials Applications & Nanostructure Spain Faculty of Electronic Systems Engineering University of Regina Regina Canada
PolyCystic Ovary Syndrome (PCOS) is a hormonal disorder frequently found in women of reproductive age having a significant impact on the cause of infertility. It is an endocrine condition characterized by abnormalitie...
来源: 评论
Neurocomputational Modelling of EEG Connectivity: Links Between Depression, Inflammation, and Gut-Microbiome  17th
Neurocomputational Modelling of EEG Connectivity: Links Betw...
收藏 引用
17th International Conference on Brain Informatics, BI 2024
作者: Doborjeh, Zohreh lavin, Daniel Hunter, Kirsty Heym, Nadja Heasman, Bryony Doborjeh, Maryam Kasabov, Nikola Gibson, Glen Sumich, Alexander School of Engineering Computer and Mathematical Sciences Knowledge Engineering and Discovery Research Institute Auckland University of Technology Auckland New Zealand School of Population Health Faculty of Medical and Health Sciences The University of Auckland Auckland New Zealand Department of Sport Science School of Science and Technology Nottingham Trent University Nottingham United Kingdom NTU Psychology School of Social Sciences Nottingham Trent University Nottingham United Kingdom School of Software Engineering Dalian University Dalian China Institute for Information and Communication Technologies Bulgarian Academy of Sciences Sofia Bulgaria Department of Food and Nutritional Sciences The University of Reading Whiteknights Reading United Kingdom Department of Psychology and Neuroscience Auckland University of Technology Auckland New Zealand
The immune and enteric systems have been implicated in psychopathology, including depressive disorders. However, the precise neurocognitive mechanisms remain unclear. The present study uses Brain-Inspired Spiking Neur... 详细信息
来源: 评论
A Framework for Tele-rehabilitation Gaming System  6
A Framework for Tele-rehabilitation Gaming System
收藏 引用
6th International Conference on Applied Computational Intelligence in Information Systems, ACIIS 2023
作者: Elaklouk, Ahmed M. S. Zuarni Ramli, Ratna Edris, Ibrahim Padilla-Valdez, Nena Jumaily, Adel Al Universiti Teknologi Brunei School of Computing and Informatics Bandar Seri Begawan Brunei Universiti Teknologi Mara Negeri College of Computing Informatics and Mathematics Seremban Malaysia Universiti Teknologi Brunei Centre for Communication Bandar Seri Begawan Brunei Faculty of Engineering University of Technology Brunei Brunei Department of Computer Science and Software Engineering School of Computing University of Western Australia Australia Ensta Bretagne University France
Brain damage resulting from stroke and traumatic brain injury is the primary cause of complicated disability and one of the major causes of mortality in most countries, burdening healthcare systems owing to the growth... 详细信息
来源: 评论
Investigating novel machine learning based intrusion detection models for NSL-KDD data sets
Investigating novel machine learning based intrusion detecti...
收藏 引用
IT and Industrial Technologies (ICIT), International Conference on
作者: Muhammad Huzaifa Shah Muhammad Abu Bakar Raja Hashim Ali Zain Ul Abideen Usama Arshad Ali Zeeshan Ijaz Nisar Ali Muhammad Imad Said Nabi Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany BCMaterials Basque Center for Materials Applications & Nanostructure Spain Faculty of Electronic Systems Engineering University of Regina Regina Canada
This study investigates the application of the Mutual Information (MI) feature selection technique to improve the accuracy of Machine Learning (ML) models on NSL-KDD datasets, building upon prior research. Six ML mode...
来源: 评论