咨询与建议

限定检索结果

文献类型

  • 1,440 篇 会议
  • 960 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,430 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,493 篇 工学
    • 1,146 篇 计算机科学与技术...
    • 944 篇 软件工程
    • 294 篇 信息与通信工程
    • 218 篇 控制科学与工程
    • 153 篇 生物工程
    • 150 篇 电气工程
    • 131 篇 机械工程
    • 112 篇 电子科学与技术(可...
    • 108 篇 生物医学工程(可授...
    • 97 篇 光学工程
    • 60 篇 交通运输工程
    • 59 篇 仪器科学与技术
    • 59 篇 化学工程与技术
    • 57 篇 动力工程及工程热...
    • 56 篇 安全科学与工程
  • 721 篇 理学
    • 379 篇 数学
    • 223 篇 物理学
    • 175 篇 生物学
    • 116 篇 统计学(可授理学、...
    • 98 篇 系统科学
    • 57 篇 化学
  • 506 篇 管理学
    • 315 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 131 篇 医学
    • 109 篇 临床医学
    • 92 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 72 篇 法学
    • 60 篇 社会学
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 50 篇 教育学
  • 29 篇 农学
  • 15 篇 文学
  • 9 篇 军事学
  • 6 篇 艺术学

主题

  • 73 篇 machine learning
  • 68 篇 deep learning
  • 59 篇 software enginee...
  • 58 篇 computer science
  • 53 篇 feature extracti...
  • 52 篇 accuracy
  • 47 篇 artificial intel...
  • 46 篇 computational mo...
  • 46 篇 training
  • 43 篇 data mining
  • 42 篇 software
  • 39 篇 optimization
  • 38 篇 information tech...
  • 38 篇 predictive model...
  • 30 篇 internet of thin...
  • 29 篇 support vector m...
  • 27 篇 cloud computing
  • 26 篇 educational inst...
  • 26 篇 semantics
  • 26 篇 security

机构

  • 42 篇 faculty of compu...
  • 37 篇 department of so...
  • 32 篇 college of compu...
  • 27 篇 department of so...
  • 21 篇 department of co...
  • 20 篇 school of comput...
  • 20 篇 state key labora...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 18 篇 faculty of softw...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...
  • 14 篇 faculty of compu...

作者

  • 29 篇 quanyin zhu
  • 22 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 herawan tutut
  • 20 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 muhammad waseem ...
  • 14 篇 zain ul abideen
  • 14 篇 muhammad adnan k...
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 siew hock ow
  • 13 篇 ow siew hock
  • 12 篇 tutut herawan
  • 12 篇 belikov juri
  • 12 篇 levron yoash
  • 11 篇 khan arif ali
  • 11 篇 hamam habib
  • 11 篇 li qi

语言

  • 2,142 篇 英文
  • 263 篇 其他
  • 26 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software Engineering and Computer Technology"
2430 条 记 录,以下是701-710 订阅
排序:
The Future of Crime Prevention: Police Case Analysis Using Machine Learning
The Future of Crime Prevention: Police Case Analysis Using M...
收藏 引用
Advancements in Computing (ICAC), International Conference on
作者: Dharsan. R Krishanthini M Traveena C Anubama L Mahaadikara M.D.J.T. Hansika Sanjeevi Shahikala Chandrasiri Department of Computer Science and Software Engineering (CSSE) Sri Lanka Institute of Information Technology (SLIIT) Malabe Sri Lanka Faculty of Computing Sri Lanka Institute of Information Technology (SLIIT) Malabe Sri Lanka
Law enforcement agencies and police departments face challenges in analyzing and preventing accidents and crimes. This research presents a comprehensive machine learning system, “The Future of Crime Prevention: Polic...
来源: 评论
A Framework for Tele-rehabilitation Gaming System  6
A Framework for Tele-rehabilitation Gaming System
收藏 引用
6th International Conference on Applied Computational Intelligence in Information Systems, ACIIS 2023
作者: Elaklouk, Ahmed M. S. Zuarni Ramli, Ratna Edris, Ibrahim Padilla-Valdez, Nena Jumaily, Adel Al Universiti Teknologi Brunei School of Computing and Informatics Bandar Seri Begawan Brunei Universiti Teknologi Mara Negeri College of Computing Informatics and Mathematics Seremban Malaysia Universiti Teknologi Brunei Centre for Communication Bandar Seri Begawan Brunei Faculty of Engineering University of Technology Brunei Brunei Department of Computer Science and Software Engineering School of Computing University of Western Australia Australia Ensta Bretagne University France
Brain damage resulting from stroke and traumatic brain injury is the primary cause of complicated disability and one of the major causes of mortality in most countries, burdening healthcare systems owing to the growth... 详细信息
来源: 评论
Robust and Reliable Liveness Detection Models for Facial Recognition Systems
Robust and Reliable Liveness Detection Models for Facial Rec...
收藏 引用
Frontiers of Information technology (FIT)
作者: Haris Anjum Usama Arshad Raja Hashim Ali Zain Ul Abideen Muhammad Huzaifa Shah Talha Ali Khan Ali Zeeshan Ijaz Abu Bakar Siddique Muhammad Imad Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany BCMaterials Basque Center for Materials Applications & Nanostructure Spain
Facial Liveness Detection is instrumental in combating fraudulent practices and identity theft by differentiating genuine faces from forgeries. Given that facial recognition is now an integral part of many sectors lik...
来源: 评论
Prediction of Polycystic Ovary Syndrome Using Genetic Algorithm-driven Feature Selection
Prediction of Polycystic Ovary Syndrome Using Genetic Algori...
收藏 引用
IT and Industrial Technologies (ICIT), International Conference on
作者: Fatima Faridoon Raja Hashim Ali Zain Ul Abideen Nazia Shahzadi Ali Zeeshan Ijaz Usama Arshad Nisar Ali Muhammad Imad Said Nabi Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany BCMaterials Basque Center for Materials Applications & Nanostructure Spain Faculty of Electronic Systems Engineering University of Regina Regina Canada
PolyCystic Ovary Syndrome (PCOS) is a hormonal disorder frequently found in women of reproductive age having a significant impact on the cause of infertility. It is an endocrine condition characterized by abnormalitie...
来源: 评论
Exploiting Partial Observability and Optimized Simple State Representations in Deep Q-Learning
Exploiting Partial Observability and Optimized Simple State ...
收藏 引用
Frontiers of Information technology (FIT)
作者: Danyaal Mahmood Usama Arshad Raja Hashim Ali Zain Ul Abideen Muhammad Huzaifa Shah Talha Ali Khan Ali Zeeshan Ijaz Nisar Ali Abu Bakar Siddique Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany BCMaterials Basque Center for Materials Applications & Nanostructure Spain Faculty of Electronic Systems Engineering University of Regina Regina Canada
The advent of deep Q-learning has opened up new possibilities in training autonomous agents to perform intelligently in intricate settings. This research work examines the potential of deep Q-learning in the paradigma...
来源: 评论
Investigating novel machine learning based intrusion detection models for NSL-KDD data sets
Investigating novel machine learning based intrusion detecti...
收藏 引用
IT and Industrial Technologies (ICIT), International Conference on
作者: Muhammad Huzaifa Shah Muhammad Abu Bakar Raja Hashim Ali Zain Ul Abideen Usama Arshad Ali Zeeshan Ijaz Nisar Ali Muhammad Imad Said Nabi Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany BCMaterials Basque Center for Materials Applications & Nanostructure Spain Faculty of Electronic Systems Engineering University of Regina Regina Canada
This study investigates the application of the Mutual Information (MI) feature selection technique to improve the accuracy of Machine Learning (ML) models on NSL-KDD datasets, building upon prior research. Six ML mode...
来源: 评论
Intelligent Emergency Communications Using Efficient Clustering Based Routing Strategy in Unmanned Aerial Vehicle Networks
Intelligent Emergency Communications Using Efficient Cluster...
收藏 引用
Frontier Technologies and Solutions (ICFTS), International Conference on
作者: K. Nagamani V. Sujatha M Praveena Abla Suliman Hussein R Adakane Suresh D Department of MBA QIS College of Engineering and Technology Ongole AP Department of Master of Computer Applications S.A. Engineering College Chennai Tamilnadu India Department of CSE QIS College of Engineering and Technology Ongole Andhrapradesh Dept of Software Engineering Faculty of Information Technology Zarqa University Jordan University of Business and Technology Jeddah SA Department of ME Yeshwantrao Chavan College of Engineering (YCCE) Nagpur India Department of Electronics and Communication Engineering St. Joseph's Institute of Technology OMR Chennai
The IECECR model is designed to use a network of Unmanned Aerial Vehicles (UAVs) to provide emergency communications in disaster areas where existing infrastructure is not accessible. UAVs are deployed in clusters wit... 详细信息
来源: 评论
Fingerprint Matching for Noisy and Distorted Patterns Using a Siamese Network With ResNet50 and Multihead Attention
收藏 引用
IEEE Access 2025年 13卷 88047-88064页
作者: Sawhney, Tinny Sharma, Ashu Abrol, Pawanesh Kumar Lehana, Parveen Chaahat Yadav, Vaishali Scherer, Rafal Kulakov, Oleksii Ali Alzubi, Ahmad University of Jammu DSP Laboratory Department of Electronics Jammu180006 India University of Jammu Department of Computer Science and IT Jammu180006 India Chitkara University Institute of Engineering and Technology Chitkara University Department of Computer Science and Engineering Punjab Rajpura140401 India Manipal University Jaipur Department of Computer Science & Communication Engineering Jaipur303007 India Czestochowa University of Technology Department of Artificial Intelligence Częstochowa42-200 Poland Faculty of Informatics and Software Engineering National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute" Kyiv03056 Ukraine King Saud University Community College Department of Computer Science Riyadh11451 Saudi Arabia
Dermatoglyphics, the study of unique ridge patterns on fingertips, plays a crucial role in fingerprint-based identification. However, skin conditions such as psoriasis, eczema, and verruca vulgaris can distort these p... 详细信息
来源: 评论
A Fault Forecasting Approach Using Two-Dimensional Optimization
A Fault Forecasting Approach Using Two-Dimensional Optimizat...
收藏 引用
IEEE World Forum on Internet of Things (WF-IoT)
作者: Mohsen Tajgardan Reza Khoshkangini Abbas Orand Mahdi Rabbani Faculty of Electrical and Computer Engineering Qom University of Technology Qom Iran Department of Computer Science and Media Technology Internet of Things and People (IOTAP) Malmö University Malmo Sweden Arriver Software AB Qualcomm Company Linköping Sweden Canadian Institute for Cybersecurity University of New Brunswick NB Canada
Data preparation is crucial in every machine learning approach, particularly when applied to detecting claims in the automotive industry. The challenge of managing highdimensional feature spaces and imbalanced data be... 详细信息
来源: 评论
Cluster Availability Model with Information Update Following Node Recovery
Cluster Availability Model with Information Update Following...
收藏 引用
Wave Electronics and its Application in Information and Telecommunication Systems (WECONF)
作者: V. A. Bogatyrev S. V. Bogatyrev V. V. Sivov Department Information Systems Security Saint-Petersburg State University of Aerospace Instrumentation Saint Petersburg Russia Faculty of Software Engineering and Computer Technology ITMO University Saint-Petersburg Russia
A model for evaluating the availability of a fault-tolerant cluster with a constraint on the maximum query service time is proposed. Node recovery in the cluster involves replacing the entire computational node with t...
来源: 评论