咨询与建议

限定检索结果

文献类型

  • 2,662 篇 会议
  • 1,376 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,519 篇 工学
    • 1,982 篇 计算机科学与技术...
    • 1,655 篇 软件工程
    • 490 篇 信息与通信工程
    • 370 篇 控制科学与工程
    • 275 篇 生物工程
    • 227 篇 电气工程
    • 211 篇 生物医学工程(可授...
    • 196 篇 机械工程
    • 168 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 95 篇 仪器科学与技术
    • 95 篇 化学工程与技术
    • 95 篇 安全科学与工程
    • 87 篇 交通运输工程
    • 81 篇 动力工程及工程热...
  • 1,197 篇 理学
    • 647 篇 数学
    • 319 篇 物理学
    • 311 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 161 篇 系统科学
    • 93 篇 化学
  • 821 篇 管理学
    • 510 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 249 篇 工商管理
  • 212 篇 医学
    • 178 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 128 篇 法学
    • 101 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 75 篇 教育学
  • 41 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 147 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 95 篇 deep learning
  • 88 篇 feature extracti...
  • 84 篇 computational mo...
  • 84 篇 accuracy
  • 83 篇 software
  • 80 篇 artificial intel...
  • 73 篇 training
  • 66 篇 optimization
  • 63 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 51 篇 security
  • 46 篇 support vector m...
  • 45 篇 software testing
  • 44 篇 internet of thin...
  • 44 篇 information tech...
  • 44 篇 testing

机构

  • 45 篇 college of compu...
  • 40 篇 faculty of compu...
  • 37 篇 department of so...
  • 37 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 huaiyin institut...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 18 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,887 篇 英文
  • 187 篇 其他
  • 30 篇 中文
  • 3 篇 土耳其文
  • 2 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Software and Computer Engineering"
4107 条 记 录,以下是291-300 订阅
排序:
Machine Learning Methods of Symptom Extraction from Medical Notes
Machine Learning Methods of Symptom Extraction from Medical ...
收藏 引用
International Russian Smart Industry Conference (SmartIndustryCon)
作者: Olesia Galai Dmitrii Kurdiumov Alena Rusak Faculty of Software Engineering and Computer Systems ITMO University Saint-Petersburg Russia
Medical notes contain valuable information about patient conditions, treatments, and progress. Extracting symptoms from these unstructured notes is crucial for clinical research, population health analysis, and decisi...
来源: 评论
Smartphone-Based Artificial Intelligence System for Real-Time Exercise Rep Counting
SSRN
收藏 引用
SSRN 2024年
作者: Sinclair, Adam Kautai, Kayla Shahamiri, Seyed Reza Department of Electrical Computer and Software Engineering Faculty of Engineering The University of Auckland Auckland New Zealand
Automated exercise repetition counting has applications across the physical fitness realm, from personal health to rehabilitation. Motivated by the ubiquity of mobile phones and the benefits of tracking physical activ... 详细信息
来源: 评论
Exploring Compositional Neural Networks for Real-Time Systems
Exploring Compositional Neural Networks for Real-Time System...
收藏 引用
ACM and IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE)
作者: Sobhan Chatterjee Nathan Allen Nitish Patel Partha Roop Department of Electrical Computer and Software Engineering Faculty of Engineering University of Auckland Auckland New Zealand
Real-time CPSs using Artificial Neural Networks (ANNs) are traditionally developed as monolithic black-boxes. This results in designs that are often difficult to formally verify against safety specifications and imple... 详细信息
来源: 评论
UML and NFR-framework based method for the analysis of the requirements of an information system
收藏 引用
International Journal of Information Technology (Singapore) 2023年 第1期15卷 411-422页
作者: Arif, Mohd. Mohammad, Chaudhary Wali Sadiq, Mohd. Computer Science and Technology Research Group Department of Applied Sciences and Humanities Faculty of Engineering and Technology Jamia Millia Islamia A Central University New Delhi 110025 India Software Engineering Lab Computer Engineering Section UPFET Jamia Millia Islamia A Central University New Delhi 110025 India
software requirements are the expectation of stakeholders which are identified and modeled by various requirements elicitation and modeling techniques like traditional methods, goal oriented methods, and unified model... 详细信息
来源: 评论
Anomaly-Based Intrusion DetectionModel Using Deep Learning for IoT Networks
收藏 引用
computer Modeling in engineering & Sciences 2024年 第10期141卷 823-845页
作者: Muaadh A.Alsoufi Maheyzah Md Siraj Fuad A.Ghaleb Muna Al-Razgan Mahfoudh Saeed Al-Asaly Taha Alfakih Faisal Saeed Faculty of Computing Universiti Teknologi Malaysia(UTM)Johor Bahru81310Malaysia DAAI Research Group College of Computing and Digital TechnologyBirmingham City UniversityBirminghamB47XGUK Department of Software Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11345Saudi Arabia
The rapid growth of Internet of Things(IoT)devices has brought numerous benefits to the interconnected ***,the ubiquitous nature of IoT networks exposes them to various security threats,including anomaly intrusion ***... 详细信息
来源: 评论
Phishing Website Detection with and Without Proper Feature Selection Techniques: Machine Learning Approach
Phishing Website Detection with and Without Proper Feature S...
收藏 引用
作者: Adane, Kibreab Beyene, Berhanu Faculty of Computing and Software Engineering Arba Minch University Arba Minch Ethiopia Computer Science Department Ethiopian Civil Service University Addis Ababa Ethiopia
Indeed, successful phishing website attempts could result in catastrophic data loss, login credential compromise, ransomware infection, and financial loss. It also significantly hampers the competitiveness and product... 详细信息
来源: 评论
Analyzing emotions in online classes: Unveiling insights through topic modeling, statistical analysis, and random walk techniques
收藏 引用
International Journal of Cognitive Computing in engineering 2024年 第1期5卷 221-236页
作者: Abdellaoui, Benyoussef Remaida, Ahmed Sabri, Zineb Abdellaoui, Mohammed El Hafidy, Abderrahim El Bouzekri El Idrissi, Younes Moumen, Aniss National School of Applied Sciences Engineering Sciences Laboratory Ibn Tofaïl University Kenitra Morocco Faculty of Sciences Laboratory of Computer Science Ibn Tofaïl University Kenitra Morocco LPHE-modeling and Simulation Faculty of Sciences Mohammed V University Rabat Morocco Software Project Management Research Team ENSIAS Mohammed V University Rabat Morocco
High dropout rates globally perpetuate educational disparities with various underlying causes. Despite numerous strategies to address this issue, more attention should be given to understanding and addressing student ... 详细信息
来源: 评论
Leveraging Smart Video-Based Learning to Enhance Student Engagement and Collaboration  6
Leveraging Smart Video-Based Learning to Enhance Student Eng...
收藏 引用
6th International Conference on Advancements in Computing, ICAC 2024
作者: Serasinghe, Chanukya Perera, Nashali Samarasinghe, Devindu Muthusinghe, Madusha Wijesundara, Malitha Sri Lanka Institute of Information Technology Dept. of Computer Science and Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Humanities and Sciences Malabe Sri Lanka
The COVID-19 pandemic has expedited the shift in education to online learning, which has exposed shortcomings in virtual learning environments' personalization and engagement. This research addresses these issues ... 详细信息
来源: 评论
Early Fault Detection in Rolling Element Bearings Using Signal Processing Techniques  21
Early Fault Detection in Rolling Element Bearings Using Sign...
收藏 引用
21st IEEE International Conference on Smart Communities: Improving Quality of Life using AI, Robotics and IoT, HONET 2024
作者: Saeed, Ali Akram, M. Usman Khan, Muazzam A. Afsar, M. Belal Quaid-i-Azam University ICESCO Big Data Analytics and Edge Computing Department of Computer Science Islamabad Pakistan National University of Sciences and Technology Department of Computer and Software Engineering Islamabad Pakistan Otto-von-Guericke University Faculty of Electrical Engineering and Information Technology Maddeburg Germany
Many studies show that bearings are the most vulnerable components in low-voltage motors. While advanced bearing diagnostic systems exist, their cost can be a barrier for non-critical machinery due to the potential wa... 详细信息
来源: 评论
Scheduling Tool for Deterministic Communication in Distributed Real-Time Systems  10
Scheduling Tool for Deterministic Communication in Distribut...
收藏 引用
10th Workshop on software Quality Analysis, Monitoring, Improvement, and Applications, SQAMIA 2023
作者: Mach, Jan Tašková, Valéria Kohútka, Lukáš Institute of Computer Engineering and Applied Informatics Faculty of Informatics and Information Technologies Slovak University of Technology Bratislava Slovakia Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak University of Technology Bratislava Slovakia
A network with critical data streams, where the timing of incoming and outgoing data is a necessity, is called a deterministic network. These networks are mostly used in association with real-time systems that use per... 详细信息
来源: 评论