咨询与建议

限定检索结果

文献类型

  • 2,676 篇 会议
  • 1,394 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,532 篇 工学
    • 1,993 篇 计算机科学与技术...
    • 1,658 篇 软件工程
    • 500 篇 信息与通信工程
    • 378 篇 控制科学与工程
    • 275 篇 生物工程
    • 235 篇 电气工程
    • 213 篇 生物医学工程(可授...
    • 197 篇 机械工程
    • 170 篇 电子科学与技术(可...
    • 155 篇 光学工程
    • 100 篇 仪器科学与技术
    • 99 篇 安全科学与工程
    • 97 篇 化学工程与技术
    • 89 篇 交通运输工程
    • 85 篇 动力工程及工程热...
  • 1,206 篇 理学
    • 649 篇 数学
    • 321 篇 物理学
    • 312 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 159 篇 系统科学
    • 96 篇 化学
  • 831 篇 管理学
    • 518 篇 管理科学与工程(可...
    • 340 篇 图书情报与档案管...
    • 248 篇 工商管理
  • 216 篇 医学
    • 181 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 93 篇 药学(可授医学、理...
    • 87 篇 公共卫生与预防医...
  • 128 篇 法学
    • 103 篇 社会学
  • 81 篇 经济学
    • 81 篇 应用经济学
  • 78 篇 教育学
  • 40 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 148 篇 software enginee...
  • 103 篇 computer science
  • 100 篇 machine learning
  • 97 篇 deep learning
  • 89 篇 feature extracti...
  • 84 篇 computational mo...
  • 84 篇 accuracy
  • 83 篇 software
  • 81 篇 artificial intel...
  • 75 篇 training
  • 66 篇 optimization
  • 64 篇 data mining
  • 55 篇 predictive model...
  • 53 篇 semantics
  • 53 篇 security
  • 46 篇 support vector m...
  • 45 篇 internet of thin...
  • 45 篇 software testing
  • 45 篇 data models
  • 44 篇 information tech...

机构

  • 45 篇 college of compu...
  • 42 篇 faculty of compu...
  • 38 篇 faculty of softw...
  • 37 篇 department of so...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 19 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,574 篇 英文
  • 532 篇 其他
  • 33 篇 中文
  • 2 篇 日文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software and Computer Engineering"
4139 条 记 录,以下是861-870 订阅
排序:
A NovelMethod for Determining Tourism Carrying Capacity in a Decision-Making Context Using q−Rung Orthopair Fuzzy Hypersoft Environment
收藏 引用
computer Modeling in engineering & Sciences 2024年 第2期138卷 1951-1979页
作者: Salma Khan Muhammad Gulistan NasreenKausar Seifedine Kadry Jungeun Kim Department of Mathematics and Statistics Hazara UniversityMansehra21120Pakistan Department of Mathematics Faculty of Arts and SciencesYildiz Technical UniversityEsenlerIstanbul34210Turkey Department of Applied Data Science Noroff University CollegeKristiansand4612Norway Artificial Intelligence Research Center(AIRC) Ajman UniversityAjman346United Arab Emirates Department of Electrical and Computer Engineering Lebanese American UniversityP.O.Box 13-5053ByblosLebanon Department of Software and CMPSI Konju National UniversityCheonan31080Korea
Tourism is a popular activity that allows individuals to escape their daily routines and explore new destinations for various reasons,including leisure,pleasure,or business.A recent study has proposed a unique mathema... 详细信息
来源: 评论
Robust In-Vehicle Diagnostic-Based Intrusion Detection System
Robust In-Vehicle Diagnostic-Based Intrusion Detection Syste...
收藏 引用
International Symposium on Networks, computers and Communications (ISNCC)
作者: Ahmed Shafee Tasneem A. Awaad Ahmed Moro Department of Engineering and Computer Science Adams State University Alamosa CO USA Department of Computer and Systems Engineering Faculty of Engineering Ain Shams University Cairo Egypt Siemens EDA Cairo Egypt Integrated Electrical Systems Segment Siemens Digital Industries Software Cairo Egypt
Cybersecurity has become a significant concern for automotive manufacturers as modern cars increasingly incorporate electronic components. Electronic Control Units (ECUs) have evolved to become the central control uni... 详细信息
来源: 评论
Dependency Update Strategies and Package Characteristics
arXiv
收藏 引用
arXiv 2023年
作者: Jafari, Abbas Javan Costa, Diego Elias Shihab, Emad Abdalkareem, Rabe Lab The Department of Computer Science and Software Engineering Concordia University Montreal Canada Montreal Canada Department of Computer Science The Faculty of Science Omar Al-Mukhtar University Libya
Managing project dependencies is a key maintenance issue in software development. Developers need to choose an update strategy that allows them to receive important updates and fixes while protecting them from breakin... 详细信息
来源: 评论
Comparison of IDS in IoT, Mobile and Cloud based Systems
Comparison of IDS in IoT, Mobile and Cloud based Systems
收藏 引用
International Symposium on Digital Forensic and Security (ISDFS)
作者: Görkem Gök Aytuğ Boyacı Mustafa Ulaş Department of Software Engineering Faculty of Technology Fırat University Elazığ Türkiye Department of Computer Engineering Air Force Academy National Defence University İstanbul Türkiye Department of Artificial Intelligence and Data Science Engineering Faculty Of Engineering Fırat University Elazığ Türkiye
This study is meant to research the evolution of intrusion detection and network monitoring within computer, cloud-based systems, IIoT, and mobile environments. The source has outlined the novel technologies in IDS, f... 详细信息
来源: 评论
Learning Shape-Preserving Autoencoder for the Reconstruction of Functional Data from Noisy Observations  23rd
Learning Shape-Preserving Autoencoder for the Reconstructi...
收藏 引用
23rd International Conference on Computational Science, ICCS 2023
作者: Krzyżak, Adam Rafajlowicz, Wojciech Rafajlowicz, Ewaryst Department of Computer Science and Software Engineering Concordia University 1455 De Maisonneuve Blvd. West MontrealQCH3G 1M8 Canada Szczecin Poland Faculty of Information and Communication Technology Wroclaw University of Science and Technology Wroclaw Poland
We propose a new autoencoder preserving input functions’ general shape (monotonicity, convexity) after their reconstruction without imposing a priori constraints. These properties are inherent to the coefficients of ... 详细信息
来源: 评论
Deep Learning based Brain Tumor Classification for MR Images using ResNet50
Deep Learning based Brain Tumor Classification for MR Images...
收藏 引用
International Symposium on Digital Forensic and Security (ISDFS)
作者: Ömer Miraç Kökçam Aytuğ Boyaci Muhammed Emre Çolak Department of Software Engineering Faculty of Technology Fırat University Elazığ Türkiye Department of Computer Engineering Air Force Academy National Defence University İstanbul Türkiye Department of Artificial Intelligence and Data Science Engineering Faculty of Engineering Fırat University Elazığ Türkiye
Brain tumors are abnormal cell growths that occur in various parts of the brain, and the accurate classification of these tumors plays a critical role in determining treatment methods. Classification and diagnosis of ... 详细信息
来源: 评论
Medical Expert System to Diagnose the Most Common Psychiatric Diseases  21
Medical Expert System to Diagnose the Most Common Psychiatri...
收藏 引用
7th International Conference on engineering and MIS, ICEMIS 2021
作者: Alsagheer, Eman A. Rajab, Hamzah A. Elnajar, Khadiga M.Y. Department of Computer Science Faculty of Information Technology University of Benghazi Benghazi Libya Department of Software Engineering Faculty of Information Technology University of Benghazi Benghazi Libya
Expert Systems are programs that employ artificial intelligence and mimic the performance of human experts in a certain field by gathering and capturing expert information. In this paper, we present a rule-based exper... 详细信息
来源: 评论
Group Anomaly Detection: Past Notions, Present Insights, and Future Prospects
收藏 引用
SN computer Science 2021年 第3期2卷 219页
作者: Feroze, Aqeel Daud, Ali Amjad, Tehmina Hayat, Malik Khizar Department of Computer Science and Software Engineering International Islamic University Islamabad Pakistan Department of Computer Science and Artificial Intelligence College of Computer Science and Engineering Jeddah University Jeddah Saudi Arabia Department of Information Technology Faculty of Information Technology and Engineering The University of Haripur Haripur Pakistan
Anomaly detection has evolved as a successful research subject in the areas such as bibliometrics, informatics and computer networks including security-based and social networks. Almost all existing anomaly detection ... 详细信息
来源: 评论
Studies on the Quality Assessment of PRNG for Q-Trits Quantum Cryptography Protocols  8
Studies on the Quality Assessment of PRNG for Q-Trits Quantu...
收藏 引用
8th IEEE International Conference on Problems of Infocommunications, Science and Technology, PIC S and T 2021
作者: Gnatyuk, Sergiy Okhrimenko, Tetiana Fesenko, Andrii Dorozhynskyi, Sergiy Computer And Software Engineering National Aviation University Faculty of Cybersecurity Kyiv Ukraine Taras Shevchenko National University of Kyiv Faculty of Information Technology Kyiv Ukraine
Cybersecurity contains three basic features such as confidentiality, integrity and availability. Data confidentiality ensuring by encryption has faced quantum computing threat, but this problem can be solved by using ... 详细信息
来源: 评论
QoE-oriented Soft Caching with Content Recommendation for Edge Computing Networks
QoE-oriented Soft Caching with Content Recommendation for Ed...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Wang, Chenyang Chen, Yan Sun, Chuan Jia, Bosen Wang, Xiaofei Taleb, Tarik Leung, Victor C. M. Shenzhen University College of Computer Science & Software Engineering Shenzhen China Shenzhen518132 China Ruhr University Bochum Faculty of Electrical Engineering and Information Technology Bochum Germany Nanyang Technological University College of Computing and Data Science Singapore China Unicom Digital Technology Co. Ltd Beijing China Tianjin University College of Intelligence and Computing Tianjin China University of British Columbia Vancouver Canada
Mobile Edge Caching (MEC) can potentially alleviate Internet transmission congestion by delivering content at the network edge. However, current MEC solutions suffer from low resource utilization efficiency and often ... 详细信息
来源: 评论