咨询与建议

限定检索结果

文献类型

  • 1,486 篇 会议
  • 983 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 2,492 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,587 篇 工学
    • 1,265 篇 计算机科学与技术...
    • 1,039 篇 软件工程
    • 297 篇 信息与通信工程
    • 187 篇 控制科学与工程
    • 154 篇 生物工程
    • 121 篇 电气工程
    • 113 篇 光学工程
    • 109 篇 机械工程
    • 102 篇 电子科学与技术(可...
    • 95 篇 生物医学工程(可授...
    • 58 篇 网络空间安全
    • 55 篇 交通运输工程
    • 54 篇 仪器科学与技术
    • 53 篇 安全科学与工程
    • 51 篇 化学工程与技术
  • 766 篇 理学
    • 394 篇 数学
    • 267 篇 物理学
    • 166 篇 生物学
    • 124 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 61 篇 化学
  • 522 篇 管理学
    • 332 篇 管理科学与工程(可...
    • 216 篇 图书情报与档案管...
    • 165 篇 工商管理
  • 126 篇 医学
    • 107 篇 临床医学
    • 85 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
  • 87 篇 法学
    • 73 篇 社会学
  • 63 篇 教育学
    • 59 篇 教育学
  • 57 篇 经济学
    • 56 篇 应用经济学
  • 31 篇 农学
  • 18 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 95 篇 software enginee...
  • 71 篇 machine learning
  • 70 篇 deep learning
  • 67 篇 information tech...
  • 56 篇 accuracy
  • 51 篇 artificial intel...
  • 47 篇 computational mo...
  • 47 篇 software
  • 42 篇 feature extracti...
  • 41 篇 computer science
  • 41 篇 training
  • 35 篇 semantics
  • 31 篇 cloud computing
  • 31 篇 web services
  • 29 篇 optimization
  • 29 篇 data mining
  • 29 篇 predictive model...
  • 29 篇 software testing
  • 29 篇 testing
  • 28 篇 internet of thin...

机构

  • 39 篇 faculty of infor...
  • 37 篇 department of so...
  • 28 篇 faculty of infor...
  • 27 篇 department of so...
  • 26 篇 faculty of elect...
  • 25 篇 centre for quant...
  • 24 篇 school of softwa...
  • 23 篇 faculty of infor...
  • 22 篇 national key lab...
  • 22 篇 institute of inf...
  • 21 篇 department of co...
  • 19 篇 centre for quant...
  • 19 篇 department of in...
  • 19 篇 vietnam national...
  • 18 篇 school of comput...
  • 17 篇 faculty of infor...
  • 17 篇 school of inform...
  • 17 篇 centre for quant...
  • 17 篇 faculty of compu...
  • 16 篇 college of compu...

作者

  • 35 篇 bieliková mária
  • 34 篇 tran minh-triet
  • 28 篇 tao dacheng
  • 25 篇 yu mei
  • 25 篇 jiang gangyi
  • 21 篇 herawan tutut
  • 19 篇 yoshitaka shibat...
  • 18 篇 noriki uchida
  • 17 篇 hsieh min-hsiu
  • 16 篇 yu nengkun
  • 14 篇 muhammad waseem ...
  • 14 篇 mei yu
  • 14 篇 gangyi jiang
  • 14 篇 vranic valentino
  • 14 篇 shao feng
  • 13 篇 lee sai peck
  • 13 篇 peng zongju
  • 13 篇 yin baocai
  • 13 篇 valentino vranić
  • 13 篇 siew hock ow

语言

  • 2,399 篇 英文
  • 70 篇 其他
  • 25 篇 中文
  • 1 篇 日文
检索条件"机构=Faculty of Software Engineering and Information Technology"
2492 条 记 录,以下是111-120 订阅
排序:
Novel Approach for Enhancing Mental Well-Being Through Machine Learning Techniques  5
Novel Approach for Enhancing Mental Well-Being Through Machi...
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Roshani, O.V.D.E. Ayuwardhana, H.M.K.J.J. Rodrigo, P.H.M.S. Hewageegana, R.U. Fernando, Harinda De Silva, Dilshan I. Sri Lanka Institute of Information Technology Faculty of Computing Department of Computer Science and Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Computing Department of Computer Systems Engineering Malabe Sri Lanka
Frequently, individuals undergo specific episodes of mental health challenges throughout their lifetime. But the COVID pandemic has triggered a surge in mental health disorders arising from isolation, monotonous routi... 详细信息
来源: 评论
Internet of Things (IoT): survey of most important security risks  3
Internet of Things (IoT): survey of most important security ...
收藏 引用
3rd IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer engineering, MI-STA 2023
作者: Alaskri, Ahmed Salem Ahmed, Nuredin Ali Shaari, Hala Collage of Computer Technology Software Engineering Dep. Tripoli Libya Faculty of Engineering Computer Engineering Department Tripoli Libya Faculty of Information Web Technologies Department Tripoli Libya
The Internet of things (IoT) is getting more and more intrusive into our lives until the day comes when everything becomes connected to the Internet. Due to the limited resources and heterogeneous Internet of Things (... 详细信息
来源: 评论
Intent Classification of Nepali Factoid Questions
Intent Classification of Nepali Factoid Questions
收藏 引用
2023 International Conference on Cognitive Computing and Complex Data, ICCD 2023
作者: Timilsina, Sushil Khadka, Ashim Lin, Jianchu Faculty of Science and Technology Gandaki College of Engineering and Science Pokhara Nepal Faculty of Science and Technology Nepal College of Information Technology Lalitpur Nepal Faculty of Computer and Software Engineer Huaiyin Institute of Technology Jiangsu China
Question Classification plays a vital role in identifying the accurate answer to any question, and is considered as a core component of Question Answering Systems. In Nepali Natural Language Processing, the area of Qu... 详细信息
来源: 评论
A Code Transformation Approach to Enhance Code Cardinality Understanding  23
A Code Transformation Approach to Enhance Code Cardinality U...
收藏 引用
23rd International Arab Conference on information technology, ACIT 2022
作者: Jebreen, Isam Faculty of Information Technology Zarqa University Software Engineering Department Zarqa Jordan
Small and Medium-sized Enterprises (SMEs) have been recognized as universal and they have a vital effect on developing countries economies. However, to develop or maintain software systems for such SMEs, special struc... 详细信息
来源: 评论
A New Chaotic Based Cryptographically Secure Pseudo Random Number Generator  21
A New Chaotic Based Cryptographically Secure Pseudo Random N...
收藏 引用
21st International Computer Conference on Wavelet Active Media technology and information Processing, ICCWAMTIP 2024
作者: Senouci, Sarra Madoune, Sid Ali Senouci, Mohammed Raouf Senouci, Abdelkader Zhangchuan, Tang School of Mechanical and Electrical Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Northumbria University Faculty of Engineering and Environment Newcastle United Kingdom
This paper introduces a novel chaotic-based pseudo-random number generator (PRNG) architecture utilizing the Lorenz system. We examine an enhanced model, employing techniques such as Euler integration, bifurcation ana... 详细信息
来源: 评论
Provision for Energy: A Resource Allocation Problem in Federated Learning for Edge Systems
EAI Endorsed Transactions on Energy Web
收藏 引用
EAI Endorsed Transactions on Energy Web 2024年 11卷
作者: Liu, Mingyue Rajamanickam, Leelavathi Parthasarathy, Rajamohan SEGi University Centre for Software Engineering Faculty of Engineering Built Environment Information Technology Malaysia SEGi University Centre for Software Engineering Centre for Network Security and IoT Faculty of Engineering Built Environment Information Technology Malaysia
The article explores an energy-efficient method for allocating transmission and computation resources for federated learning (FL) on wireless communication networks. The model being considered involves each user train... 详细信息
来源: 评论
Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore software Maintenance
收藏 引用
Computers, Materials & Continua 2022年 第11期73卷 3827-3845页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Nadeem Iqbal Nazri Kama Azri Azmi Ahmad Salman Khan Yasir Mahmood Assad Alzayed Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi Malaysia54100Kuala LumpurMalaysia Computer Science and Information Systems Department College of Business Studies Public Authority for Applied Education and Training(PAAET)AdailiyaKuwait
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ... 详细信息
来源: 评论
A Survey of Graph-based Clustering Techniques  1
A Survey of Graph-based Clustering Techniques
收藏 引用
1st IEEE International Conference on Advances in Data-Driven Analytics and Intelligent Systems, ADACIS 2023
作者: El Mouden, Zakariyaa Ait El Alami, Alae Lahmer, Mohammed Jakimi, Abdeslam Moulay Ismail University Information and Communication Systems Engineering High School of Technology Meknes Morocco Moulay Ismail University Software Engineering Information Systems Engineering Faculty of Sciences and Techniques Meknes Morocco
Graph clustering is a powerful technique used to identify and group similar nodes within a complex network structure. This procedure involves segmenting the graph into distinct groups, with the nodes in each group hav... 详细信息
来源: 评论
A Secure Key Agreement Scheme for Unmanned Aerial Vehicles-Based Crowd Monitoring System
收藏 引用
Computers, Materials & Continua 2022年 第3期70卷 6141-6158页
作者: Bander Alzahrani Ahmed Barnawi Azeem Irshad Areej Alhothali Reem Alotaibi Muhammad Shafiq Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia Department of Computer Science and Software Engineering International Islamic University IslamabadPakistan Department of Information and Communication Engineering Yeungnam UniversityGyeongsan38541Korea
Unmanned aerial vehicles(UAVs)have recently attractedwidespread attention in civil and commercial *** example,UAVs(or drone)technology is increasingly used in crowd monitoring solutions due to its wider air footprint ... 详细信息
来源: 评论
CRAFTER: A Persona Generation Tool for Requirements engineering  19
CRAFTER: A Persona Generation Tool for Requirements Engineer...
收藏 引用
19th International Conference on Evaluation of Novel Approaches to software engineering, ENASE 2024
作者: Karolita, Devi Grundy, John Kanij, Tanjila Obie, Humphrey McIntosh, Jennifer Department of Software Systems and Cybersecurity Faculty of Information Technology Monash University Melbourne Australia Department Informatics Engineering Faculty of Engineering Palangka Raya University Palangka Raya Indonesia Faculty of Medicine Dentistry and Health Sciences The University of Melbourne Melbourne Australia
Personas, a user characterisation, have been widely used in requirements engineering (RE) to enhance the understanding of end-users and their needs. However, the persona generation process is time-consuming and demand... 详细信息
来源: 评论