咨询与建议

限定检索结果

文献类型

  • 2,662 篇 会议
  • 1,376 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,519 篇 工学
    • 1,982 篇 计算机科学与技术...
    • 1,655 篇 软件工程
    • 490 篇 信息与通信工程
    • 370 篇 控制科学与工程
    • 275 篇 生物工程
    • 227 篇 电气工程
    • 211 篇 生物医学工程(可授...
    • 196 篇 机械工程
    • 168 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 95 篇 仪器科学与技术
    • 95 篇 化学工程与技术
    • 95 篇 安全科学与工程
    • 87 篇 交通运输工程
    • 81 篇 动力工程及工程热...
  • 1,197 篇 理学
    • 647 篇 数学
    • 319 篇 物理学
    • 311 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 161 篇 系统科学
    • 93 篇 化学
  • 821 篇 管理学
    • 510 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 249 篇 工商管理
  • 212 篇 医学
    • 178 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 128 篇 法学
    • 101 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 75 篇 教育学
  • 41 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 147 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 95 篇 deep learning
  • 88 篇 feature extracti...
  • 84 篇 computational mo...
  • 84 篇 accuracy
  • 83 篇 software
  • 80 篇 artificial intel...
  • 73 篇 training
  • 66 篇 optimization
  • 63 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 51 篇 security
  • 46 篇 support vector m...
  • 45 篇 software testing
  • 44 篇 internet of thin...
  • 44 篇 information tech...
  • 44 篇 testing

机构

  • 45 篇 college of compu...
  • 40 篇 faculty of compu...
  • 37 篇 department of so...
  • 37 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 huaiyin institut...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 18 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,887 篇 英文
  • 187 篇 其他
  • 30 篇 中文
  • 3 篇 土耳其文
  • 2 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Software and Computer Engineering"
4107 条 记 录,以下是311-320 订阅
排序:
ChatGPT, Copilot, Gemini, SciSpace and Wolfram versus higher education assessments: an updated multi-institutional study of the academic integrity impacts of Generative Artificial Intelligence (GenAI) on assessment, teaching and learning in engineering
收藏 引用
Australasian Journal of engineering Education 2024年 第2期29卷 126-153页
作者: Nikolic, Sasha Sandison, Carolyn Haque, Rezwanul Daniel, Scott Grundy, Sarah Belkina, Marina Lyden, Sarah Hassan, Ghulam M. Neal, Peter Faculty of Engineering and Information Sciences University of Wollongong Wollongong Australia School of Science Technology and Engineering University of the Sunshine Coast Sippy Downs Australia School of Professional Practice & Leadership University of Technology Sydney Sydney Australia School of Chemical Engineering University of New South Wales Sydney Australia College Western Sydney University Sydney Australia School of Engineering University of Tasmania Hobart Australia School of Computer Science & Software Engineering University of Western Australia Perth Australia
More than a year has passed since reports of ChatGPT-3.5’s capability to pass exams sent shockwaves through education circles. These initial concerns led to a multi-institutional and multi-disciplinary study to asses... 详细信息
来源: 评论
An influence maximization algorithm based on community detection using topological features  11
An influence maximization algorithm based on community detec...
收藏 引用
11th International Conference on computer engineering and Knowledge, ICCKE 2021
作者: Aghaee, Zahra Fatemi, Afsaneh Faculty of Computer Engineering Department of Software Engineering Isfahan Iran
Due to the growning use of social networks and the use of viral marketing in these networks, finding influential people to maximize information diffusion is considered. This problem is Influence Maximization Problem o... 详细信息
来源: 评论
A comprehensive survey on 6G-security: physical connection and service layers
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-30页
作者: Saeed, Mamoon M. Saeed, Rashid A. Hasan, Mohammad Kamrul Ali, Elmustafa Sayed Mazha, Tehseen Shahzad, Tariq Khan, Sunawar Hamam, Habib Sana00967 Yemen Department of Computer Engineering College of Computers and Information Technology Taif University P.O. Box 11099 Taif21944 Saudi Arabia Department of Electronics Engineering College of Electronics Engineering Sudan University of Science and Technology Omdurman Sudan Bangi43600 Malaysia Department of Electrical and Electronic Engineering Faculty of Engineering Red Sea University Port Sudan33312 Sudan School of Computer Science National College of Business Administration and Economics Lahore54000 Pakistan Faculty of Engineering Uni de Moncton MonctonNBE1A3E9 Canada Department of Computer Engineering COMSATS University Islamabad Sahiwal Campus Sahiwal57000 Pakistan Department of Computer Science and Software Engineering International Islamic University Islamabad44000 Pakistan School of Electrical Engineering University of Johannesburg Johannesburg2006 South Africa BP 1989 Av. Grandes Ecoles Libreville Gabon Bridges for Academic Excellence-Spectrum Tunis Tunisia Department of Computer Science School Education Department Government of Punjab Layyah31200 Pakistan Chitkara University Institute of Engineering and Technology Chitkara University Punjab Rajpura140401 India
After adopting 5G technology, businesses and academia have started working on sixth-generation wireless networking (6G) technologies. Mobile communications options are expected to expand in areas where previous genera... 详细信息
来源: 评论
Towards Eco-Sustainability and Green Analytics Model to Measure the Performance of Big Data Systems  9
Towards Eco-Sustainability and Green Analytics Model to Meas...
收藏 引用
9th International Conference on Information Management, ICIM 2023
作者: Jusoh, Yusmadi Yah Abdullah, Rusli Nor, Rozi Nor Haizan Yahaya, Jamaiah Hj. Muhammad, Shireen Arunachalam, Aishwharya Raani Universiti Putra Malaysia Faculty of Computer Science and Information Technology Dept. of Software Engineering and Information Systems Serdang Malaysia Universiti Kebangsaan Malaysia Faculty of Information Science and Technology Bangi Malaysia Faculty of Communication Selangor Malaysia
Many BDS is doomed to failure because of the missing knowledge on measuring the performance of BDS. The failure to identify the performance measurement and correct will make the problems worsen. This will complicate t... 详细信息
来源: 评论
Thalassemia Diagnosis Through Medical Imaging: A New Artificial Intelligence-Based Framework
Thalassemia Diagnosis Through Medical Imaging: A New Artific...
收藏 引用
2022 International Conference on Smart Systems and Power Management, IC2SPM 2022
作者: Zaylaa, Amira J. Makki, Mohammad Kassem, Rola Beirut Arab University Beirut Faculty of Engineering Department of Electrical and Computer Engineering Beirut Lebanon Creoshift Company Software Devalopement Lebanon
Thalassemia is the most common single-gene disorder throughout the world and represents a major public health problem resulting in abnormal ratios of hemoglobin subunits. It is widely spread throughout the Mediterrane... 详细信息
来源: 评论
EdgeAuth: An intelligent token-based collaborative authentication scheme
EdgeAuth: An intelligent token-based collaborative authentic...
收藏 引用
作者: Jiang, Xutong Dou, Ruihan He, Qiang Zhang, Xuyun Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Faculty of Mathematics University of Waterloo Waterloo Canada Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia Department of Computing Macquarie University Sydney Australia College of Big Data and Intelligent Engineering Southwest Forestry University China
Edge computing is regarded as an extension of cloud computing that brings computing and storage resources to the network edge. For some Industrial Internet of Things (IIoT) applications such as supply-chain supervisio... 详细信息
来源: 评论
Research on Topological Deformation of 3D Human Image Based on Laplace Optimization  4
Research on Topological Deformation of 3D Human Image Based ...
收藏 引用
4th International Conference on High Performance Big Data and Intelligent Systems, HDIS 2022
作者: Zhou, Dongdong Chen, Xiaobing Zhang, Chuangchuang Guo, Shuxin Ashim, Khadka Lin, Jianchu Huaiyin Insititute of Technology Faculty of Computer and Software Engineering Huai'an China Gandaki College of Engineering and Science Pokhara University Pokhara Nepal
Image deformation technology is an important technology in computer graphics image processing, which can satisfy people's requirements for visual and sensory effects, and its research results have been widely used... 详细信息
来源: 评论
Decentralized Federated Graph Learning with Lightweight Zero Trust Architecture for Next-Generation Networking Security
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 1908-1922页
作者: Zhou, Xiaokang Liang, Wei Wang, Kevin I-Kai Yada, Katsutoshi Yang, Laurence T. Ma, Jianhua Jin, Qun Kansai University Faculty of Business Data Science Osaka565-0823 Japan RIKEN Center for Advanced Intelligence Project RIKEN Tokyo103-0027 Japan Hunan University of Technology and Business School of Computer Science Changsha410205 China Xiangjiang Laboratory Changsha410205 China The University of Auckland Department of Electrical Computer and Software Engineering Auckland1010 New Zealand St. Francis Xavier University Department of Computer Science AntigonishNSB2G 2W5 Canada Hosei University Faculty of Computer and Information Sciences Chiyoda-ku102-8160 Japan Waseda University Faculty of Human Sciences Tokorozawa359-1192 Japan
The rapid development and usage of digital technologies in modern intelligent systems and applications bring critical challenges on data security and privacy. It is essential to allow cross-organizational data sharing... 详细信息
来源: 评论
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection  24
EEiF: Efficient Isolated Forest with e Branches for Anomaly ...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Zhang, Yifan Xiang, Haolong Zhang, Xuyun Xu, Xiaolong Fan, Wei Zhang, Qin Qi, Lianyong School of Software Nanjing University of Information Science and Technology China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China School of Computing Macquarie University Australia University of Oxford Uffield Department of Women's & Reproductive Health United Kingdom College of Computer Science and Software Engineering Shenzhen University China Faculty of Science and Engineering China
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m... 详细信息
来源: 评论
A Sparsifier Model for Efficient Information Retrieval
A Sparsifier Model for Efficient Information Retrieval
收藏 引用
International Conference on Application of Information and Communication Technologies (AICT)
作者: Viacheslav Dobrynin Mark Sherman Roman Abramovich Alexey Platonov Faculty of Software Engineering and Computer Systems ITMO University Saint Petersburg Russian Federation
The constant development of dense neural models leads to improved search quality. It is crucial to adapt these models to meet performance requirements. Solutions like SPLADE or SparseEmbed address this by solving the ... 详细信息
来源: 评论