咨询与建议

限定检索结果

文献类型

  • 2,676 篇 会议
  • 1,394 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,532 篇 工学
    • 1,993 篇 计算机科学与技术...
    • 1,658 篇 软件工程
    • 500 篇 信息与通信工程
    • 378 篇 控制科学与工程
    • 275 篇 生物工程
    • 235 篇 电气工程
    • 213 篇 生物医学工程(可授...
    • 197 篇 机械工程
    • 170 篇 电子科学与技术(可...
    • 155 篇 光学工程
    • 100 篇 仪器科学与技术
    • 99 篇 安全科学与工程
    • 97 篇 化学工程与技术
    • 89 篇 交通运输工程
    • 85 篇 动力工程及工程热...
  • 1,206 篇 理学
    • 649 篇 数学
    • 321 篇 物理学
    • 312 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 159 篇 系统科学
    • 96 篇 化学
  • 831 篇 管理学
    • 518 篇 管理科学与工程(可...
    • 340 篇 图书情报与档案管...
    • 248 篇 工商管理
  • 216 篇 医学
    • 181 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 93 篇 药学(可授医学、理...
    • 87 篇 公共卫生与预防医...
  • 128 篇 法学
    • 103 篇 社会学
  • 81 篇 经济学
    • 81 篇 应用经济学
  • 78 篇 教育学
  • 40 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 148 篇 software enginee...
  • 103 篇 computer science
  • 100 篇 machine learning
  • 97 篇 deep learning
  • 89 篇 feature extracti...
  • 84 篇 computational mo...
  • 84 篇 accuracy
  • 83 篇 software
  • 81 篇 artificial intel...
  • 75 篇 training
  • 66 篇 optimization
  • 64 篇 data mining
  • 55 篇 predictive model...
  • 53 篇 semantics
  • 53 篇 security
  • 46 篇 support vector m...
  • 45 篇 internet of thin...
  • 45 篇 software testing
  • 45 篇 data models
  • 44 篇 information tech...

机构

  • 45 篇 college of compu...
  • 42 篇 faculty of compu...
  • 38 篇 faculty of softw...
  • 37 篇 department of so...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 19 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,574 篇 英文
  • 532 篇 其他
  • 33 篇 中文
  • 2 篇 日文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software and Computer Engineering"
4139 条 记 录,以下是751-760 订阅
排序:
Suggestion Mining from Opinionated Text of Big Social Media Data
收藏 引用
computers, Materials & Continua 2021年 第9期68卷 3323-3338页
作者: Youseef Alotaibi Muhammad Noman Malik Huma Hayat Khan Anab Batool Saif ul Islam Abdulmajeed Alsufyani Saleh Alghamdi Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversitySaudi Arabia Department of Computer Science Faculty of Engineering and Computer SciencesNational University of Modern LanguagesIslamabadPakistan Department of Software Engineering Faculty of Engineering and Computer SciencesNational University of Modern LanguagesIslamabadPakistan Department of Computer Sciences Institute of Space TechnologyIslamabadPakistan Department of Computer Science College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaifSaudi Arabia
:Social media data are rapidly increasing and constitute a source of user opinions and tips on a wide range of products and *** increasing availability of such big data on biased reviews and blogs creates challenges f... 详细信息
来源: 评论
Expert Phishing Detection System
Expert Phishing Detection System
收藏 引用
2024 IEEE International Conference on Industry 4.0, Artificial Intelligence, and Communications Technology, IAICT 2024
作者: Alsarhan, Ayoub Al-Aiash, Issa Al-Fraihat, Dimah Aljaidi, Mohammad Abu Laila, Dena Abd Al Hakem Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Cybersecurity Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman11622 Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa13110 Jordan Department of Cyber Security Faculty of Information Technology Zarqa Technical Intermediate College Zarqa Jordan
Phishing attacks are a threat that continuously emphasizes the need for effective detection methods. This paper presents a machine learning detection method that employs a random forest classifier, which is an adaptab... 详细信息
来源: 评论
UVM Based Verification Framework for Deep Learning Hardware Accelerator: Case Study
UVM Based Verification Framework for Deep Learning Hardware ...
收藏 引用
Electrical, computer and Energy Technologies (ICECET), International Conference on
作者: Randa Aboudeif Tasneem A. Awaad Mohamed AbdElsalam Yehea Ismail Electronics and Communications Engineering Department The American University in Cairo Siemens Digital Industries Software Cairo Egypt Department of Computer and Systems Engineering Faculty of Engineering Siemens Digital Industries Software Ain Shams University Cairo Egypt Siemens Digital Industries Software Cairo Egypt Electronics and Communications Engineering Department The American University in Cairo Cairo Egypt
Hardware Verification of Deep Learning Accelerators (DLAs) has become critically important for testing the reliability and trustworthiness of Learning Enabled Autonomous Systems (LEAS). In this paper, we introduce a s... 详细信息
来源: 评论
Digital Platform to Empower the Self-Employment in Sri Lanka  6
Digital Platform to Empower the Self-Employment in Sri Lanka
收藏 引用
6th International Conference on Information Technology Research, ICITR 2021
作者: Wickramasinghe, H.C.P. Thebuwana, T.D. Wijesinghe, G.K.H.S. Dissanayake, U.N. Kodagoda, Nuwan Suriyawansa, Kushnara Faculty of Computing Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Sri Lanka
Unemployment is a huge problem around the world because a lack of job opportunities. People are unable to find the job opportunities according to their preferences and qualifications. As a solution for this, many coun... 详细信息
来源: 评论
Intelligent Model for Predicting the Quality of Services Violation
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 3607-3619页
作者: Muhammad Adnan Khan Asma Kanwal Sagheer Abbas Faheem Khan T.Whangbo Pattern Recognition and Machine Learning Lab. Department of SoftwareGachon UniversitySeongnamGyeonggido13120Korea Riphah School of Computing&Innovation Faculty of ComputingRiphah International University Lahore CampusLahore54000Pakistan School of Computer Science National College of Business Administration and EconomicsLahore54000Pakistan Department of Computer Engineering Gachon UniversitySeongnam13557Korea
Cloud computing is providing IT services to its customer based on Service level agreements(SLAs).It is important for cloud service providers to provide reliable Quality of service(QoS)and to maintain SLAs *** service ... 详细信息
来源: 评论
Stakeholder Identification Overview and Challenges in Requirements engineering Prospective  2
Stakeholder Identification Overview and Challenges in Requir...
收藏 引用
2nd International Conference on Computing and Information Technology, ICCIT 2022
作者: Elneel, Duha Awad Fakharudin, Abdul Sahli Ahmed, Elsadig Musa Kahtan, Hasan Abdullateef, Mansoor Universiti Malaysia Pahang Faculty of Computing Kuantan26300 Malaysia Multimedia University Faculty of Business Melaka Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur50603 Malaysia Knowbis Solutions Consultancy Selangor Malaysia
Stakeholder identification (SI) illustrates a critical part of the requirements elicitation activity. It helps software analysts gather accurate system requirements to ensure high quality and avoid system failure. Sta... 详细信息
来源: 评论
Design and FPGA Implementation of the Henon Chaotic Map for Image Encryption  14
Design and FPGA Implementation of the Henon Chaotic Map for ...
收藏 引用
14th International Conference on Information and Communication Systems, ICICS 2023
作者: Taqieddin, Eyad Mustafa, Dheya Shatnawi, Ahmed Al-Khaleel, Osama Papachristou, Christos Jordan University of Science and Tech. Network Eng. and Security Department Irbid22110 Jordan The Hashemite University Faculty of Engineering Dept. of Computer Engineering Zarqa13133 Jordan Jordan University of Science and Tech. Software Engineering Department Irbid22110 Jordan Jordan University of Science and Tech. Computer Engineering Department Irbid22110 Jordan Case Western Reserve University Ecse Department ClevelandOH44106 United States
Due to the ever increasing usage of multimedia content sharing and the inherent nature of the insecure links used for transmission, it is quite necessary to provide a fast and secure encryption algorithm. Current symm... 详细信息
来源: 评论
On the Impact of Noisy Labels on Supervised Classification Models  23rd
On the Impact of Noisy Labels on Supervised Classificatio...
收藏 引用
23rd International Conference on Computational Science, ICCS 2023
作者: Dubel, Rafal Wijata, Agata M. Nalepa, Jakub Faculty of Automatic Control Electronics and Computer Science Department of Algorithmics and Software Silesian University of Technology Akademicka 16 Gliwice44-100 Poland Faculty of Biomedical Engineering Silesian University of Technology Roosevelta 40 Zabrze41-800 Poland KP Labs Konarskiego 18C Gliwice44-100 Poland
The amount of data generated daily grows tremendously in virtually all domains of science and industry, and its efficient storage, processing and analysis pose significant practical challenges nowadays. To automate th... 详细信息
来源: 评论
Accident detection and road monitoring in real time using deep learning and lane detection algorithms  21
Accident detection and road monitoring in real time using de...
收藏 引用
4th International Conference on Machine Learning and Machine Intelligence, MLMI 2021
作者: Ayman Mounir, Shehab Eldeen Hussein, Walid H. Karam, Omar Software Engineering Faculty of Informatics and Computer Science The British University in Egypt Egypt Computer Science Faculty of Informatics and Computer Science The British University in Egypt Egypt Information Systems Faculty of Informatics and Computer Science The British University in Egypt Egypt
Automating the monitoring of the roads would mean safer roads for both car drivers and pedestrians. The objectives of the system were to build a real time surveillance system for intelligent roads of the future. The s... 详细信息
来源: 评论
Electromagnetic Sensor Behavior Prediction Using LSTM Neural Network for Enhanced Accuracy and Reliable Performance
Electromagnetic Sensor Behavior Prediction Using LSTM Neural...
收藏 引用
Electrical Machines and Drives (ICEMD), International Conference on
作者: Ahmad Sasani Mehrdad Ghafari Mostafa Eftekharizadeh Faculty of Electrical and Computer Engineering Semnan University Semnan Iran Chief Technical Officer Javaneh Inc. Tehran Iran Software Engineering Javaneh Inc. Tehran Iran
Accurate sensors are essential in industries for system monitoring and control. High-precision sensor data can enhance predictions and prevent costly errors, especially in noisy environments that require detailed anal... 详细信息
来源: 评论