咨询与建议

限定检索结果

文献类型

  • 2,662 篇 会议
  • 1,376 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,519 篇 工学
    • 1,982 篇 计算机科学与技术...
    • 1,655 篇 软件工程
    • 490 篇 信息与通信工程
    • 370 篇 控制科学与工程
    • 275 篇 生物工程
    • 227 篇 电气工程
    • 211 篇 生物医学工程(可授...
    • 196 篇 机械工程
    • 168 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 95 篇 仪器科学与技术
    • 95 篇 化学工程与技术
    • 95 篇 安全科学与工程
    • 87 篇 交通运输工程
    • 81 篇 动力工程及工程热...
  • 1,197 篇 理学
    • 647 篇 数学
    • 319 篇 物理学
    • 311 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 161 篇 系统科学
    • 93 篇 化学
  • 821 篇 管理学
    • 510 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 249 篇 工商管理
  • 212 篇 医学
    • 178 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 128 篇 法学
    • 101 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 75 篇 教育学
  • 41 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 147 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 95 篇 deep learning
  • 88 篇 feature extracti...
  • 84 篇 computational mo...
  • 84 篇 accuracy
  • 83 篇 software
  • 80 篇 artificial intel...
  • 73 篇 training
  • 66 篇 optimization
  • 63 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 51 篇 security
  • 46 篇 support vector m...
  • 45 篇 software testing
  • 44 篇 internet of thin...
  • 44 篇 information tech...
  • 44 篇 testing

机构

  • 45 篇 college of compu...
  • 40 篇 faculty of compu...
  • 37 篇 department of so...
  • 37 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 huaiyin institut...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 18 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,887 篇 英文
  • 187 篇 其他
  • 30 篇 中文
  • 3 篇 土耳其文
  • 2 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Software and Computer Engineering"
4107 条 记 录,以下是221-230 订阅
排序:
Intelligent-Based Extraction of Business Capabilities from Company Descriptions  7
Intelligent-Based Extraction of Business Capabilities from C...
收藏 引用
7th International Conference on Information Technology, Information Systems and Electrical engineering, ICITISEE 2023
作者: Fahmi, Faisal Hamid, Siti Hafizah Ab Yuadi, Imam Airlangga University Faculty of Political and Social Science Department of Library and Information Science Indonesia Universiti Malaya Faculty of Computer Science & Information Technology Department of Software Engineering Malaysia
In the era of Big Data, Information can be generated, extracted, and utilized in diverse ways. In business, information about business capabilities can be a crucial aspect in understanding the strengths and competenci... 详细信息
来源: 评论
Occluded Person Re-Identification using Region-based Convolutional Neural Networks  23
Occluded Person Re-Identification using Region-based Convolu...
收藏 引用
3rd International Conference on Human Machine Interaction, ICHMI 2023
作者: Islam, Atiqul Tsun, Mark Tee Kit Bee Theng, Lau Chua, Caslon Faculty of Engineering Computing & Science Swinburne University of Technology Sarawak Campus Kuching Malaysia Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia
The ability to continuously follow a target person in a dynamically changing environment remains a major challenge that indoor companion robots confront. Ongoing human following is complicated by close similarity matc... 详细信息
来源: 评论
A Process Oriented Integration Model for Smart Health Services
收藏 引用
Intelligent Automation & Soft Computing 2023年 第2期35卷 1369-1386页
作者: Farzana Kausar Gondal Syed Khuram Shahzad Muhammad Arfan Jaffar Muhammad Waseem Iqbal Department of Computer Science Superior UniversityLahore54600Pakistan Department of Informatics and Systems University of Management and TechnologyLahore54000Pakistan Faculty of Computer Science&IT Superior UniversityLahore54600Pakistan Department of Software Engineering Superior UniversityLahore54600Pakistan
Cities are facing challenges of high rise in population number and con-sequently need to be equipped with latest smart services to provide luxuries of life to its *** integrated solutions are also a need to deal with ... 详细信息
来源: 评论
Application of Nonlinear Gaussian Process Regression Models for CO2 Emissions Prediction  15
Application of Nonlinear Gaussian Process Regression Models ...
收藏 引用
15th International Conference on Innovations in Information Technology, IIT 2023
作者: Ahmed, Ahmed Abdelhadi Badri, Yousif Shamseldin, Asaad Department of Computer Science and Software Engineering Al Ain United Arab Emirates University of Auckland Faculty of Engineering Department of Mechanical and Mechatronics Engineering Auckland New Zealand University of Auckland Faculty of Engineering Department of Civil and Environmental Engineering Auckland New Zealand
The growing concern over climate change led to a massive corpus of literature addressing the impact of various factors in terms of carbon dioxide (CO2) emissions levels. However, the majority of existing literature em... 详细信息
来源: 评论
Assessing Secure OpenID-Based EAAA Protocol to Prevent MITM and Phishing Attacks in Web Apps
收藏 引用
computers, Materials & Continua 2023年 第6期75卷 4713-4733页
作者: Muhammad Bilal Sandile C.Showngwe Abid Bashir Yazeed Y.Ghadi College of Computer Science and Technology Zhejiang UniversityHangzhou310027China Department of Mathematical Statistics and Actuarial Science Faculty of Natural and Agricultural SciencesUniversity of the Free StateBloemfontein9301South Africa Department of Computer Science National Textile UniversityFaisalabad38000Pakistan Department of Computer Science/Software Engineering Al Ain UniversityAbu DhabiUAE
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task *** this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from on... 详细信息
来源: 评论
Transmission Line Age Determination with Statistical Health Index and Failure Probability Curve Fitting Technique  10
Transmission Line Age Determination with Statistical Health ...
收藏 引用
10th International Conference on Condition Monitoring and Diagnosis, CMD 2024
作者: Suwanasri, Cattareeya Yongyee, Ittiphong Suwanasri, Thanapong King Mongkut's University of Technology North Bangkok Faculty of Engineering Department of Electrical and Computer Engineering Bangkok Thailand Rajamangala University of Technology Suvarnabhumi Faculty of Engineering and Architecture Department of Mechatronics Engineering Nonthaburi Thailand King Mongkut's University of Technology North Bangkok Electrical and Software Systems Engineering Bangkok Thailand
The deterioration of transmission lines has a profound effect on the reliability and safety of the power grid. Accurate estimation of their age is critical for effective maintenance and investment planning. This paper... 详细信息
来源: 评论
Key protected deputy signature scheme against the deputy signing key exposure
收藏 引用
International Journal of Circuits, Systems and Signal Processing 2021年 15卷 800-808页
作者: Chen, Jianhong Yu, Kun Wang, Wenhao Faculty of Computer and Software Engineering Huaiyin Institute of Technology Jiangsu Huaian223003 China
Key exposure is very harmful to a cryptographic system. To decrease the loss from the deputy signing key vulnerability in identity-based proxy signature systems, we propose the method of key protected deputy signature... 详细信息
来源: 评论
The Correlation Between Architecture Smells, Package Stability and Reusability: A Case Study  4
The Correlation Between Architecture Smells, Package Stabili...
收藏 引用
4th IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and computer engineering, MI-STA 2024
作者: Benidris, Mrwan Elfallah, Ehab A. Omar Cheema, Marwa Aslam Alsma, Mohammed Salah Addin Kadiki, Tareq Ziad Elbarsha, Abdelfattah University of Benghazi Faculty of Information Technology Dep. of Computer Science Libya Libyan International Medical University Faculty of Information Technology Dept. of Software Engineering Libya University of Benghazi Faculty of Public Health Health Informatics Department Libya
the design decisions made in the architecture of a software system are essential to its maintainability, and thus its quality is of great importance. Architecture smells (ASs) can be used to identify any quality issue... 详细信息
来源: 评论
K-Banhatti Invariants Empowered Topological Investigation of Bridge Networks
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 5423-5440页
作者: Khalid Hamid Muhammad Waseem Iqbal Erssa Arif Yasir Mahmood Ahmad Salman Khan Nazri Kama Azri Azmi Atif Ikram Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of Lahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi MalaysiaKuala Lumpur54100Malaysia Faculty of Informatics and Applied Mathematics University Malaysia TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of Lahore54000Pakistan
Any number that can be uniquely determined by a graph is called graph *** the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation *** the fast and advanced env... 详细信息
来源: 评论
The Reliability of Information Sources: Student Perceptions and Educational Opportunities  7
The Reliability of Information Sources: Student Perceptions ...
收藏 引用
7th IEEE International Conference and Workshop Obuda on Electrical and Power engineering, CANDO-EPE 2024
作者: Kollar, Anita Mihalovicsne Katona, Jozsef Obuda University Institute of Electronics and Communication Systems Kandó Kálmán Faculty of Electrical Engineering Budapest Hungary John Von Neumann University GAMF Faculty of Engineering and Computer Science Kecskemet Hungary Budapest Business University Faculty of Finance and Accountancy Department of Applied Quantitative Methods Budapest Hungary Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary
The modern digital age demands the skills to be able to assess information. In the current world, access to information and knowledge is abundant from different sources. Indeed, high-quality data are much needed in ed... 详细信息
来源: 评论