咨询与建议

限定检索结果

文献类型

  • 2,676 篇 会议
  • 1,394 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,532 篇 工学
    • 1,993 篇 计算机科学与技术...
    • 1,658 篇 软件工程
    • 500 篇 信息与通信工程
    • 378 篇 控制科学与工程
    • 275 篇 生物工程
    • 235 篇 电气工程
    • 213 篇 生物医学工程(可授...
    • 197 篇 机械工程
    • 170 篇 电子科学与技术(可...
    • 155 篇 光学工程
    • 100 篇 仪器科学与技术
    • 99 篇 安全科学与工程
    • 97 篇 化学工程与技术
    • 89 篇 交通运输工程
    • 85 篇 动力工程及工程热...
  • 1,206 篇 理学
    • 649 篇 数学
    • 321 篇 物理学
    • 312 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 159 篇 系统科学
    • 96 篇 化学
  • 831 篇 管理学
    • 518 篇 管理科学与工程(可...
    • 340 篇 图书情报与档案管...
    • 248 篇 工商管理
  • 216 篇 医学
    • 181 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 93 篇 药学(可授医学、理...
    • 87 篇 公共卫生与预防医...
  • 128 篇 法学
    • 103 篇 社会学
  • 81 篇 经济学
    • 81 篇 应用经济学
  • 78 篇 教育学
  • 40 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 148 篇 software enginee...
  • 103 篇 computer science
  • 100 篇 machine learning
  • 97 篇 deep learning
  • 89 篇 feature extracti...
  • 84 篇 computational mo...
  • 84 篇 accuracy
  • 83 篇 software
  • 81 篇 artificial intel...
  • 75 篇 training
  • 66 篇 optimization
  • 64 篇 data mining
  • 55 篇 predictive model...
  • 53 篇 semantics
  • 53 篇 security
  • 46 篇 support vector m...
  • 45 篇 internet of thin...
  • 45 篇 software testing
  • 45 篇 data models
  • 44 篇 information tech...

机构

  • 45 篇 college of compu...
  • 42 篇 faculty of compu...
  • 38 篇 faculty of softw...
  • 37 篇 department of so...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 19 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,574 篇 英文
  • 532 篇 其他
  • 33 篇 中文
  • 2 篇 日文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software and Computer Engineering"
4139 条 记 录,以下是721-730 订阅
排序:
Intrusion Detection in Smart IoT Devices for People with Disabilities  8
Intrusion Detection in Smart IoT Devices for People with Dis...
收藏 引用
8th IEEE International Smart Cities Conference, ISC2 2022
作者: Naveed, Muhammad Usman, Syed Muhammad Satti, Muhammad Islam Aleshaiker, Sama Anwar, Aamir Shaheed Zulfikar Ali Bhutto Institute of Science and Technology Department of Computer Science Islamabad Pakistan Ai Air University Faculty of Computing Department of Creative Technologies Islamabad Pakistan Riphah University Faculty of Computer Science and Software Engineering Islamabad Pakistan School of Computing & Engineering University of West London London United Kingdom
An intrusion Detection System (IDS) is a system that resides inside the network and monitors all incoming and outgoing traffic. It prevents unethical activities from happening over the network. With the use of IoT dev... 详细信息
来源: 评论
Eliciting Requirements from Stakeholders’ Responses Using Natural Language Processing
收藏 引用
computer Modeling in engineering & Sciences 2021年 第4期127卷 99-116页
作者: Mohammed Lafi Bilal Hawashin Shadi AlZu’bi Department of Software Engineering Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan Department of Computer Information Systems Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan Department of Computer Science Faculty of Science and Information TechnologyAl-Zaytoonah University of JordanAmman11733Jordan
Most software systems have different stakeholders with a variety of *** process of collecting requirements from a large number of stakeholders is vital but *** propose an efficient,automatic approach to collecting req... 详细信息
来源: 评论
Detection of Android Malware using Machine Learning
Detection of Android Malware using Machine Learning
收藏 引用
2021 International Mobile, Intelligent, and Ubiquitous Computing Conference, MIUCC 2021
作者: Fiky, Ahmed Hashem El Elshenawy, Ayman Madkour, Mohamed Ashraf Al-Azhar University Systems and Computer Engineering Faculty of Engineering Cairo Egypt Software Engineering and Information Technology Department Faculty of Engineering and Technology Egyptian Chinees University Cairo Egypt
Nowadays, smartphones became an integral part of human life due to the great necessity for their daily activities. Most smartphone users are downloading and installing mobile apps without worrying about security. Ther... 详细信息
来源: 评论
Identifying COVID-19 through X-ray and CT scan images using Machine Learning  18
Identifying COVID-19 through X-ray and CT scan images using ...
收藏 引用
18th IEEE International Conference on Emerging Technologies, ICET 2023
作者: Shehzadi, Maham Arshad, Usama Abideen, Zainul Ali, Raja Hashim Khan, Ammad Aslam Ijaz, Ali Zeeshan BCMaterials Basque Center for Materials Applications & Nanostructure Basque Country Leioa Spain Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany Virtual University of Pakistan Dept. of Biological Sciences Rawalpindi Pakistan National University of Computer & Emerging Sciences Dept. of Computer Science Islamabad Pakistan
In the current global scenario, marked by the COVID-19 pandemic, it has become imperative for healthcare systems around the globe to swiftly and accurately diagnose the disease. This is where cutting-edge approaches s... 详细信息
来源: 评论
VR REAL RUN: An immersive Oculus Quest 2-Based Virtual Reality Exergaming  4
VR REAL RUN: An immersive Oculus Quest 2-Based Virtual Reali...
收藏 引用
4th International Conference on Cybernetics and Intelligent System, ICORIS 2022
作者: Mambu, Joe Y. Rismayani Sihotang, Jay Idoan Rantung, Vivi Peggy Computer Science Faculty Universitas Klabat Airmadidi Indonesia Dipa Makassar University Dept. of Software Engineering Makassar Indonesia Faculty of Information Technology Universitas Advent Indonesia Bandung Indonesia Faculty of Information System Universitas Negeri Manado Tondano Indonesia
There are many different types of exergaming, but one of the most engaging one is the one with virtual reality. This type of gaming allows you to immerse yourself in a completely different world, and it can be a lot o... 详细信息
来源: 评论
Yemeni Paper Currency Recognition System Using Deep Learning Approach  1st
Yemeni Paper Currency Recognition System Using Deep Learning...
收藏 引用
1st International Conference of Advanced Computing and Informatics, ICACIN 2020
作者: Ba Alawi, Abdulfattah E. Saeed, Ahmed Y. A. Al-Zekri, Burhan T. Radman, Borhan M. N. Saif, Alaa A. Alshami, Maged Alshadadi, Ahmed Mohammad, Muneef A. Mohammed, Ala’a M. Saeed, Osama Y. A. Saeed, Adeeb M. Department of Software Engineering Al-Saeed Faculty of Engineering & IT Taiz University Taiz Yemen Department of Communication and Computer Engineering Al-Saeed Faculty of Engineering & IT Taiz University Taiz Yemen
The recognition of paper currency with various designs is a difficult task for automated banking machines and people with low visions. Due to the wide use of automated system such as ATM, for getting cash, safe and pr... 详细信息
来源: 评论
An Implementation of DNS Operator and Network Guideline for Migrating Virtual Machine to KubeVirt
An Implementation of DNS Operator and Network Guideline for ...
收藏 引用
International computer Science and engineering Conference (ICSEC)
作者: Supakorn Trakulmaiphol Krerk Piromsopa Department of Computer Engineering Faculty of Engineering Software Engineering Program Chulalongkorn University Bangkok Thailand
We created a customize DNS operator to address the shortcoming of CoreDNS in Kubernetes. While Kubernetes is gaining popularity in orchestrating containers, many organizations with Virtual Machine (VM) based legacy ap... 详细信息
来源: 评论
Multi-Unit Floor Plan Recognition and Reconstruction Using Improved Semantic Segmentation of Raster-Wise Floor Plans
arXiv
收藏 引用
arXiv 2024年
作者: Kratochvila, Lukas de Jong, Gijs Arkesteijn, Monique Bilík, Šimon Zemčík, Tomáš Horak, Karel Rellermeyer, Jan S. Department of Control and Instrumentation Faculty of Electrical Engineering and Communication Brno University of Technology Brno Czech Republic Department of Software Technology Faculty of Electrical Engineering Mathematics and Computer Science TU Delft Delft Netherlands Department of Management in the Built Environment Faculty of Architecture and the Built Environment TU Delft Delft Netherlands Computer Vision and Pattern Recognition Laboratory Department of Computational Engineering Lappeenranta-Lahti University of Technology LUT Lappeenranta Finland Dependable and Scalable Software Systems Institute of Systems Engineering Faculty of Electrical Engineering and Computer Science Leibniz University Hannover Hannover Germany
Digital twins have a major potential to form a significant part of urban management in emergency planning, as they allow more efficient designing of the escape routes, better orientation in exceptional situations, and... 详细信息
来源: 评论
Success Factors of Enterprise Resource Planning: A State-of-the-Art Mini Review
Success Factors of Enterprise Resource Planning: A State-of-...
收藏 引用
Artificial Intelligence, Metaverse and Cybersecurity (ICAMAC), International Conference on
作者: Ahmed BaniMustafa Olla Bulkrock Faculty of Computer Information Science Higher Colleges of Technology Abu Dhabi UAE Software Engineering Department Princess Sumaya University for Technology Amman Jordan
Enterprise Resource Planning Systems (ERP) are vital for today’s businesses. However, the successful implementation of ERP systems faces several challenges, which can determine its success or failure. This paper prov... 详细信息
来源: 评论
An Efficient Intrusion Detection System using Advanced Machine Learning Techniques in SDN for Healthcare System
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 PP卷 PP页
作者: Asif, Muhammad Waseem Aqdus, Aqsa Amin, Rashid Chaudhry, Shehzad Ashraf Alsubaei, Faisal S. Iqbal, Sajid Department of Computer Science and IT The University of Lahore Lahore54000 Pakistan Department of Computer Science University of Chakwal Chakwal48800 Pakistan Department of Computer Science and Information Technology College of Engineering Abu Dhabi University Abu Dhabi United Arab Emirates Department of Software Engineering Faculty of Engineering and Architecture Nisantasi University Istanbul Turkey The Department of Cybersecurity College of Computer Science and Engineering University of Jeddah Jeddah Saudi Arabia
The quick advancement of healthcare systems necessitates robust and efficient network security keys to defend sensitive patient records and guarantee uninterrupted service delivery. The current IDS has many challenges... 详细信息
来源: 评论