咨询与建议

限定检索结果

文献类型

  • 1,486 篇 会议
  • 973 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 2,482 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,581 篇 工学
    • 1,261 篇 计算机科学与技术...
    • 1,037 篇 软件工程
    • 297 篇 信息与通信工程
    • 186 篇 控制科学与工程
    • 154 篇 生物工程
    • 119 篇 电气工程
    • 113 篇 光学工程
    • 108 篇 机械工程
    • 102 篇 电子科学与技术(可...
    • 95 篇 生物医学工程(可授...
    • 58 篇 网络空间安全
    • 55 篇 交通运输工程
    • 54 篇 仪器科学与技术
    • 53 篇 安全科学与工程
    • 51 篇 化学工程与技术
  • 763 篇 理学
    • 393 篇 数学
    • 266 篇 物理学
    • 165 篇 生物学
    • 124 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 61 篇 化学
  • 519 篇 管理学
    • 330 篇 管理科学与工程(可...
    • 216 篇 图书情报与档案管...
    • 163 篇 工商管理
  • 124 篇 医学
    • 106 篇 临床医学
    • 83 篇 基础医学(可授医学...
    • 54 篇 公共卫生与预防医...
  • 85 篇 法学
    • 72 篇 社会学
  • 61 篇 教育学
    • 58 篇 教育学
  • 56 篇 经济学
    • 55 篇 应用经济学
  • 31 篇 农学
  • 18 篇 文学
  • 7 篇 军事学
  • 3 篇 艺术学

主题

  • 95 篇 software enginee...
  • 70 篇 machine learning
  • 69 篇 deep learning
  • 67 篇 information tech...
  • 56 篇 accuracy
  • 50 篇 artificial intel...
  • 47 篇 computational mo...
  • 47 篇 software
  • 42 篇 feature extracti...
  • 42 篇 training
  • 41 篇 computer science
  • 35 篇 semantics
  • 31 篇 cloud computing
  • 31 篇 web services
  • 29 篇 optimization
  • 29 篇 data mining
  • 29 篇 predictive model...
  • 29 篇 software testing
  • 29 篇 testing
  • 29 篇 data models

机构

  • 39 篇 faculty of infor...
  • 37 篇 department of so...
  • 28 篇 faculty of infor...
  • 27 篇 department of so...
  • 26 篇 faculty of elect...
  • 24 篇 school of softwa...
  • 24 篇 centre for quant...
  • 23 篇 faculty of infor...
  • 22 篇 national key lab...
  • 22 篇 institute of inf...
  • 21 篇 department of co...
  • 19 篇 centre for quant...
  • 19 篇 department of in...
  • 19 篇 vietnam national...
  • 18 篇 school of comput...
  • 17 篇 faculty of infor...
  • 17 篇 school of inform...
  • 17 篇 centre for quant...
  • 17 篇 faculty of compu...
  • 16 篇 department of so...

作者

  • 35 篇 bieliková mária
  • 34 篇 tran minh-triet
  • 28 篇 tao dacheng
  • 25 篇 yu mei
  • 25 篇 jiang gangyi
  • 21 篇 herawan tutut
  • 19 篇 yoshitaka shibat...
  • 18 篇 noriki uchida
  • 17 篇 hsieh min-hsiu
  • 16 篇 yu nengkun
  • 14 篇 muhammad waseem ...
  • 14 篇 mei yu
  • 14 篇 gangyi jiang
  • 14 篇 vranic valentino
  • 14 篇 shao feng
  • 13 篇 lee sai peck
  • 13 篇 peng zongju
  • 13 篇 yin baocai
  • 13 篇 valentino vranić
  • 13 篇 siew hock ow

语言

  • 2,391 篇 英文
  • 68 篇 其他
  • 25 篇 中文
  • 1 篇 日文
检索条件"机构=Faculty of Software Engineering and Information Technology"
2482 条 记 录,以下是121-130 订阅
排序:
Effect of Using Continuous Integration (CI) and Continuous Delivery (CD) Deployment in DevOps to reduce the Gap between Developer and Operation  23
Effect of Using Continuous Integration (CI) and Continuous D...
收藏 引用
23rd International Arab Conference on information technology, ACIT 2022
作者: Mowad, Abrar Mohammad Fawareh, Hamed Hassan, Mohammad A. Zarqa University Faculty of Information Technology Software Engineering Dept Jordan Zarqa University Faculty of Information Technology Computer Science Dept Jordan
This paper focuses on how to use continuous integration (CI) and continuous Delivery (CD) methodology in DevOps to reduce the developer-operator gap. It also, shows how CI can be a CD bridge. The paper review DevOps a... 详细信息
来源: 评论
Enhancing SEO Compliance of JavaScript Web Frameworks through Automated Testing inside CI/CD Pipelines  11
Enhancing SEO Compliance of JavaScript Web Frameworks throug...
收藏 引用
11th Workshop on software Quality Analysis, Monitoring, Improvement, and Applications, SQAMIA 2024
作者: Ágh, Ján Makarova, Irina Dakić, Pavle Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology in Bratislava Ilkovičova 2 Bratislava842 16 Slovakia Faculty of Informatics and Computing Singidunum University Danijelova 32 Belgrade Serbia
This article aims to incorporate search engine optimization validation into the development process of JavaScript-based web applications, thus connecting two sides of optimizations, namely the selection of appropriate... 详细信息
来源: 评论
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论
Comparative Analysis of Machine Learning Algorithms for Arabic Sentiment Analysis on Imbalanced Social Media Data
Comparative Analysis of Machine Learning Algorithms for Arab...
收藏 引用
2024 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems, ICETSIS 2024
作者: Almuhaya, Basheer Saha, Bishal Kaur, Manbir Bazel, Mahmood A. Mohammed, Rehab School of Cse Lovely Professional University Punjab Phagwara144411 India Taiz University Faculty of Engineering and Information Technology Taiz Yemen Taiz University Software Engineering Dept Taiz Yemen
Sentiment analysis is crucial in understanding public opinions and attitudes on social media platforms. However, dealing with imbalanced datasets, especially in the context of Arabic sentiment analysis, poses signific... 详细信息
来源: 评论
Facial Recognition Utilizing the CLM Model and Supervised Machine Learning: A Comparative Analysis  25
Facial Recognition Utilizing the CLM Model and Supervised Ma...
收藏 引用
25th International Arab Conference on information technology, ACIT 2024
作者: Iqtait, Musab Ababneh, Jafar Abu-Jassar, Amer Al-Refai, Mohammad Dmour, Mohammad Arabiat, Mohammad Binsaddig, Ruaa Zarqa University Faculty of Information Technology Department of Artificial Intelligence Zarqa Jordan Zarqa University Faculty of Information Technology Cyber Security Department Zarqa Jordan Amman Arab University University College of of Computer Sciences and Information Amman Jordan Zarqa University Faculty of Information Technology Software Engineering Department Zarqa Jordan University of Business and Technology College of Business Administration Department of Finance Jeddah21432 Saudi Arabia
Facial recognition is a common challenge in artificial intelligence. We extensively utilized this program in our daily life. Face recognition software was implemented on many phones to protect user identities and prom... 详细信息
来源: 评论
A new hybrid teaching learning based Optimization -Extreme learning Machine model based Intrusion-Detection system
收藏 引用
Materials Today: Proceedings 2023年 80卷 2701-2705页
作者: Qahatan Alsudani, Mustafa Abbdal Reflish, Salah H. Moorthy, Kohbalan Mundher Adnan, Myasar Computer Techniques Engineering Department Faculty of Information Technology Imam Ja'afar Al-sadiq University Najaf Iraq Faculty of Computer Systems & Software Engineering Universiti Malaysia Pahang Kuantan Malaysia Islamic University Najaf Iraq Faculty of Engineering School of Computing Universiti Teknologi Malaysia Johor Bahru81310 Malaysia
Currently, effective Intrusion-detection systems (IDS) still represent one of the important security tools. However, hybrid models based on the IDS achieve better results compared with intrusion detection based on a s... 详细信息
来源: 评论
Towards a Comprehensive Classification of Dentist-Centered Needs in the Metaverse  10th
Towards a Comprehensive Classification of Dentist-Centered N...
收藏 引用
10th International Conference on information Management, ICIM 2024
作者: Odeh, Yousra Odeh, Rana Software Engineering Department Faculty of Science and Information Technology Al-Zaytoonah University of Jordan Amman11733 Jordan Department of Pediatric Dentistry and Orthodontics Faculty of Dentistry University of Jordan Amman11942 Jordan
The integration of the metaverse into dentistry heralds a new era of innovation, revolutionizing the way dental professionals approach education, research, patient care, and collaboration. While the application of met... 详细信息
来源: 评论
Global video object segmentation with spatial constraint module
收藏 引用
Computational Visual Media 2023年 第2期9卷 385-400页
作者: Yadang Chen Duolin Wang Zhiguo Chen Zhi-Xin Yang Enhua Wu Engineering Research Center of Digital Forensics Ministry of EducationSchool of Computer and SoftwareNanjing University of Information Science and TechnologyNanjing 210044China State Key Laboratory of Internet of Things for Smart City Department of Electromechanical EngineeringUniversity of MacaoMacao 999078China State Key Laboratory of Computer Science Institute of SoftwareUniversity of Chinese Academy of SciencesBeijing 100190China Faculty of Science and Technology University of MacaoMacao 999078China
We present a lightweight and efficient semisupervised video object segmentation network based on the space-time memory *** some extent,our method solves the two difficulties encountered in traditional video object se... 详细信息
来源: 评论
AKQ: A Hybrid Quantum-Classical Image Encryption System
AKQ: A Hybrid Quantum-Classical Image Encryption System
收藏 引用
2023 RIVF International Conference on Computing and Communication Technologies, RIVF 2023
作者: Nguyen, Tran Khanh Thi Thanh Truc, Nguyen Hai, Vu Tuan University of Information Technology VNU-HCM Ho Faculty of Computer Science Chi Minh city Viet Nam University of Information Technology VNU-HCM Ho Faculty of Software Engineering Chi Minh city Viet Nam
Image encryption is an essential field between computer vision and security which aims to protect the image before future attacks. Nowadays, it is threatened by quantum computers, which can break some classical crypto... 详细信息
来源: 评论
Establishing Pattern Sequences Using Artificial Neural Networks with an Application to Organizational Patterns  10
Establishing Pattern Sequences Using Artificial Neural Netwo...
收藏 引用
10th Workshop on software Quality Analysis, Monitoring, Improvement, and Applications, SQAMIA 2023
作者: Matovič, Viktor Vranić, Valentino Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology in Bratislava Ilkovičova 2 Bratislava84216 4 Slovakia
Explicit relationships included in textual description of patterns are insufficient to establish pattern sequences. This article brings a new method of establishing pattern sequences using artificial neural networks. ... 详细信息
来源: 评论