咨询与建议

限定检索结果

文献类型

  • 3,688 篇 会议
  • 2,837 篇 期刊文献
  • 167 册 图书

馆藏范围

  • 6,692 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,118 篇 工学
    • 2,968 篇 计算机科学与技术...
    • 2,421 篇 软件工程
    • 889 篇 信息与通信工程
    • 707 篇 控制科学与工程
    • 505 篇 电气工程
    • 480 篇 生物工程
    • 387 篇 电子科学与技术(可...
    • 360 篇 生物医学工程(可授...
    • 322 篇 机械工程
    • 268 篇 光学工程
    • 189 篇 动力工程及工程热...
    • 175 篇 安全科学与工程
    • 174 篇 仪器科学与技术
    • 158 篇 化学工程与技术
    • 148 篇 交通运输工程
  • 2,165 篇 理学
    • 1,098 篇 数学
    • 578 篇 生物学
    • 540 篇 物理学
    • 379 篇 统计学(可授理学、...
    • 313 篇 系统科学
    • 201 篇 化学
  • 1,208 篇 管理学
    • 832 篇 管理科学与工程(可...
    • 422 篇 图书情报与档案管...
    • 413 篇 工商管理
  • 439 篇 医学
    • 385 篇 临床医学
    • 327 篇 基础医学(可授医学...
    • 181 篇 公共卫生与预防医...
    • 170 篇 药学(可授医学、理...
  • 224 篇 法学
    • 178 篇 社会学
  • 149 篇 经济学
    • 148 篇 应用经济学
  • 119 篇 教育学
  • 70 篇 农学
  • 26 篇 文学
  • 24 篇 军事学
  • 12 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 214 篇 computer science
  • 187 篇 deep learning
  • 186 篇 machine learning
  • 150 篇 artificial intel...
  • 130 篇 software enginee...
  • 129 篇 accuracy
  • 115 篇 computational mo...
  • 114 篇 feature extracti...
  • 107 篇 internet of thin...
  • 96 篇 data mining
  • 94 篇 training
  • 87 篇 information syst...
  • 85 篇 wireless sensor ...
  • 82 篇 optimization
  • 75 篇 laboratories
  • 75 篇 predictive model...
  • 71 篇 support vector m...
  • 70 篇 cloud computing
  • 67 篇 computer archite...
  • 67 篇 convolutional ne...

机构

  • 44 篇 department of la...
  • 36 篇 sri lanka instit...
  • 35 篇 college of compu...
  • 34 篇 department of co...
  • 31 篇 graduate school ...
  • 27 篇 department of co...
  • 27 篇 concordia instit...
  • 26 篇 school of comput...
  • 25 篇 sri lanka instit...
  • 24 篇 computer science...
  • 24 篇 department of co...
  • 23 篇 institute of inf...
  • 22 篇 department of in...
  • 22 篇 state key labora...
  • 21 篇 department of el...
  • 21 篇 state key labora...
  • 19 篇 department of co...
  • 19 篇 ieee
  • 19 篇 concordia instit...
  • 19 篇 department of co...

作者

  • 63 篇 leonard barolli
  • 49 篇 arjan durresi
  • 41 篇 fatos xhafa
  • 36 篇 bentahar jamal
  • 29 篇 niyato dusit
  • 22 篇 el-sayed m.el-ke...
  • 22 篇 fan guisheng
  • 21 篇 akio koyama
  • 21 篇 ismail leila
  • 21 篇 mohammad s. obai...
  • 20 篇 pedrycz witold
  • 20 篇 keshta ismail
  • 19 篇 tao yang
  • 18 篇 abdelaziz a.abde...
  • 18 篇 choo kim-kwang r...
  • 17 篇 soni mukesh
  • 17 篇 hayashi eiji
  • 16 篇 mengchu zhou
  • 16 篇 gjergji mino
  • 16 篇 yu huiqun

语言

  • 6,360 篇 英文
  • 276 篇 其他
  • 61 篇 中文
  • 7 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Software Engineering Department of Computer Science and Information Systems"
6692 条 记 录,以下是211-220 订阅
排序:
Improved Video Steganography with Dual Cover Medium,DNA and Complex Frames
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3881-3898页
作者: Asma Sajjad Humaira Ashraf NZ Jhanjhi Mamoona Humayun Mehedi Masud Mohammed A.AlZain Department of Computer Science and Software Engineering International Islamic UniversityIslamabadPakistan School of Computer Science SCSTaylor’s UniversitySubang Jaya47500SelangorMalaysia FITTaylor’s UniversitySubangJaya47500SelangorMalaysia Department of Information Systems College of Computer and Information SciencesJouf UniversityKSA Department of Computer Science College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityP.O.Box 11099Taif21944Saudi Arabia
The most valuable resource on the planet is no longer oil,but *** transmission of this data securely over the internet is another challenge that comes with its ever-increasing *** order to transmit sensitive informati... 详细信息
来源: 评论
Optimizing Secure Multi-User ISAC systems With STAR-RIS: A Deep Reinforcement Learning Approach for 6G Networks
收藏 引用
IEEE Access 2025年 13卷 31472-31484页
作者: Kamal, Mian Muhammad Zain Ul Abideen, Syed Al-Khasawneh, M.A. Alabrah, Amerah Sohail Ahmed Larik, Raja Irfan Marwat, Muhammad Southeast University School of Electronic Science and Engineering Jiangning Jiangsu Nanjing211189 China Qingdao University College of Computer Science and Technology Qingdao266071 China Al-Ahliyya Amman University Hourani Center for Applied Scientific Research Amman19111 Jordan Skyline University College School of Computing University City Sharjah Sharjah United Arab Emirates King Saud University College of Computer and Information Science Department of Information Systems Riyadh11543 Saudi Arabia Ilma University Department of Computer Science Sindh Karachi75190 Pakistan University of Science and Technology Bannu Department of Software Engineering Bannu28100 Pakistan
The rapid evolution of wireless communication technologies and the increasing demand for multi-functional systems have led to the emergence of integrated sensing and communication (ISAC) as a key enabler for future 6G... 详细信息
来源: 评论
Knowledge-Driven Possibilistic Clustering with Automatic Cluster Elimination
收藏 引用
computers, Materials & Continua 2024年 第9期80卷 4917-4945页
作者: Xianghui Hu Yiming Tang Witold Pedrycz Jiuchuan Jiang Yichuan Jiang The School of Computer Science and Engineering Southeast UniversityNanjing211189China The School of Computer and Information Hefei University of TechnologyHefei230601China The Department of Electrical and Computer Engineering University of AlbertaEdmontonAB T6R 2V4Canada The Systems Research Institute Polish Academy of SciencesWarsaw00-901Poland The School of Information Engineering Nanjing University of Finance and EconomicsNanjing210023China
Traditional Fuzzy C-Means(FCM)and Possibilistic C-Means(PCM)clustering algorithms are data-driven,and their objective function minimization process is based on the available numeric ***,knowledge hints have been intro... 详细信息
来源: 评论
An Approach for Real Time computer User Action Monitoring  5
An Approach for Real Time Computer User Action Monitoring
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Alahakoon, Dulshan Samarakoon, Tharindu Wickramanayake, Indika Sakalasooriya, Kushani Kasthurirathna, Dharshana Karunasena, Anuradha Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka
computers play a significant part in the modern world. The rapid increase in computer use, especially after the COVID-19 pandemic, raised concerns about the potential negative impact on user health. Sitting posture, e... 详细信息
来源: 评论
Facial Skincare Product Suggestion with Product Popularity and Post Recommendation Care  4
Facial Skincare Product Suggestion with Product Popularity a...
收藏 引用
4th International Informatics and software engineering Conference, IISEC 2023
作者: Samarakoon, H.M.W.T.C.B. Ovitigala, A.U. Wijesinghe, G.A.T.T. Weerasinghe, K.M.L.P. Karunathilake, G.K.B.V. Weerathunga, Ishara Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka
Skin health significantly affects a person's overall wellbeing, which includes both physical and emotional aspects. The objective of this study is to develop an integrated system for recommending skincare products... 详细信息
来源: 评论
Comparative Analysis of Word Embedding and Machine Learning Techniques for Classification of software Developer Communications on Gitter  18
Comparative Analysis of Word Embedding and Machine Learning ...
收藏 引用
18th Conference on computer science and Intelligence systems, FedCSIS 2023
作者: Akshar, Tumu Kumar, Lov Yogita Murthy, Lalita Bhanu Department of Computer Science & Information Systems BITS Pilani Hyderabad Campus India National Institute of Technology Department of Computer Engineering Kurukshetra India
In recent times, software developers widely use instant messaging and collaboration platforms, as these plat-forms aid them in exploring new technologies, raising different development-related issues, and seeking solu... 详细信息
来源: 评论
Optimizing Clustering Approaches in Cloud Environments
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2023年 第19期17卷 70-94页
作者: Al-Ghuwairi, Abdel-Rahman Al-Fraihat, Dimah Sharrab, Yousef Kreishan, Yazeed Alsarhan, Ayoub Idhaim, Hasan Qahmash, Ayman Department of Software Engineering Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman Jordan Department of Data Science and Artificial Intelligence Faculty of Information Technology Isra University Amman Jordan Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Information Systems Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa Jordan Department of Information Systems Computer Science College King Khalid University Abha Saudi Arabia
This study focuses on the challenge of developing abstract models to differentiate various cloud resources. It explores the advancements in cloud products that offer specialized services to meet specific external need... 详细信息
来源: 评论
Security model to identify block withholding attack in blockchain
Security model to identify block withholding attack in block...
收藏 引用
International Conference on Artificial Intelligence, Blockchain, Computing and Security, ICABCS 2023
作者: Keshta, Ismail Reegu, Faheem Ahmad Ahmad, Adeel Saxena, Archana Chandan, Radha Raman Mahalakshmi, V. Computer Science and Information Systems Department College of Applied Sciences AlMaarefa University Riyadh Saudi Arabia College of Computer Science and Information Technology Jazan University Jazan Saudi Arabia Department of Computer Applications Invertis University UP Bareilly India Department of Computer Science and Engineering Shambhunath Institute of Engineering and Technology College Jhalwa Prayagraj India Department of Computer Science College of Computer Science and Information Technology Jazan University Jazan Saudi Arabia
Block interception attack, also known as block withholding attack, is an attack method in the blockchain. The attacker penetrates the target mining pool for passive mining to destroy the target mining pool. This paper... 详细信息
来源: 评论
Accurate Stress Detection for Developers: Leveraging Low-Cost IoT Devices (ESP32 and MAX30102) to Analyze Heart Rate Variability via an External Mouse  5
Accurate Stress Detection for Developers: Leveraging Low-Cos...
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Jayathilake, Amantha Ranasinghe, Janudi Perera, Dulshan Bartholomeusz, Shehan Rathnayake, Samadhi Ganegoda, Devanshi Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Colombo Sri Lanka Sri Lanka Institute of Information Technology Department of Information Technology Colombo Sri Lanka
In today's fast-paced work environment, stress levels have become a critical concern. This research introduces an innovative approach to address this issue by utilizing readily available, cost-effective components... 详细信息
来源: 评论
Development of a Prediction System for Criminality and Suicidal in Sri Lanka  5
Development of a Prediction System for Criminality and Suici...
收藏 引用
5th International Conference on Advancements in Computing, ICAC 2023
作者: Ranasinghe, D.P.D. Fernando, R.D.T.S. Girambe, D.G. Arambegama, D.M.H.K.D. Chathurika, Bhagyanie Jayasinghe, Dulani Sri Lanka Institute of Information Technology Department of Computer Science and Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Department of Information Technology Malabe Sri Lanka
This research confronts the growing challenges of rising suicide rates and crime in Sri Lanka through a dual approach, harnessing advanced machine learning and time series analysis. The innovative methodology, merging... 详细信息
来源: 评论