咨询与建议

限定检索结果

文献类型

  • 1,492 篇 会议
  • 736 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 2,275 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,359 篇 工学
    • 1,064 篇 计算机科学与技术...
    • 889 篇 软件工程
    • 243 篇 信息与通信工程
    • 224 篇 控制科学与工程
    • 133 篇 生物工程
    • 99 篇 电气工程
    • 94 篇 机械工程
    • 92 篇 生物医学工程(可授...
    • 73 篇 电子科学与技术(可...
    • 61 篇 安全科学与工程
    • 55 篇 光学工程
    • 48 篇 仪器科学与技术
    • 48 篇 动力工程及工程热...
    • 45 篇 土木工程
    • 44 篇 建筑学
    • 44 篇 网络空间安全
  • 603 篇 理学
    • 314 篇 数学
    • 156 篇 生物学
    • 118 篇 系统科学
    • 116 篇 物理学
    • 96 篇 统计学(可授理学、...
    • 43 篇 化学
  • 395 篇 管理学
    • 278 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 140 篇 工商管理
  • 107 篇 医学
    • 98 篇 临床医学
    • 82 篇 基础医学(可授医学...
  • 63 篇 法学
    • 45 篇 社会学
  • 47 篇 教育学
    • 44 篇 教育学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 20 篇 农学
  • 8 篇 文学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 143 篇 software enginee...
  • 138 篇 computer science
  • 63 篇 deep learning
  • 60 篇 machine learning
  • 58 篇 laboratories
  • 55 篇 artificial intel...
  • 54 篇 computational mo...
  • 52 篇 software systems
  • 51 篇 application soft...
  • 48 篇 accuracy
  • 46 篇 cloud computing
  • 44 篇 training
  • 41 篇 computer archite...
  • 41 篇 software
  • 38 篇 grid computing
  • 37 篇 quality of servi...
  • 36 篇 resource managem...
  • 34 篇 support vector m...
  • 34 篇 systems engineer...
  • 34 篇 data mining

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 state key labora...
  • 16 篇 software enginee...
  • 12 篇 department of so...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 10 篇 sri lanka instit...
  • 10 篇 max planck insti...
  • 10 篇 department of in...
  • 9 篇 computing and so...
  • 9 篇 cloud computing ...
  • 9 篇 school of intell...
  • 8 篇 department of co...

作者

  • 48 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 gautam biswas
  • 14 篇 biswas gautam
  • 14 篇 zamli kamal z.
  • 13 篇 materwala huned
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 choo kim-kwang r...
  • 11 篇 veera boonjing
  • 11 篇 leung victor c.m...
  • 11 篇 juergen rilling
  • 10 篇 cheng betty h. c...

语言

  • 2,199 篇 英文
  • 69 篇 其他
  • 7 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Language and Computer Science Systems and Software Engineering Department"
2275 条 记 录,以下是331-340 订阅
排序:
Artificial Intelligence-based Service Chains Scheduling for Medical Emergency in Healthcare  7
Artificial Intelligence-based Service Chains Scheduling for ...
收藏 引用
7th International Conference on Contemporary Computing and Informatics, IC3I 2024
作者: Soni, Mukesh Rusho, Maher Ali Byeon, Haewon Alghamdi, Azzah Hannan, Shaikh Abdul Dave, Parth Rameshchandra Dr. D. Y. Patil School of Science & Technology Tathawade Dr. D. Y. Patil Vidyapeeth Marashtra Pune India University of Colorado Department of Lockheed Martin Engineering Management BoulderCO80309 United States Inje University Department of Ai and Software & Medical Big Data Research Centre Gimhae50834 Korea Republic of Imam Abdalrhman Bin Faisal University College of Computer Science and Information Technology Computer Information Systems Department Khobar Saudi Arabia AlBaha University Faculty of Computing and Information AlBaha Saudi Arabia L. D. College of Engineering Department of Computer Engineering Gujarat Ahmedabad India
This study analyses the weekly scheduling challenge of health and medical information network service function chains to meet medical emergency categorization and grading needs. Emergency services are divided into fou... 详细信息
来源: 评论
Simulation-Based Damage Detection for Composite Structures with Machine Learning Techniques  1
收藏 引用
40th IMAC, A Conference and Exposition on Structural Dynamics, 2022
作者: Lang, Alexandre Tavares, André Di Lorenzo, Emilio Cornelis, Bram Peeters, Bart Desmet, Wim Gryllias, Konstantinos Siemens Industry Software NV Leuven Belgium Department of Computer Science KU Leuven Leuven Belgium Department of Mechanical Engineering KU Leuven Leuven Belgium Dynamics of Mechanical and Mechatronic Systems Flanders Make Lommel Belgium
With the use of composite materials rising steadily in major industries such as the automotive and aerospace, a strong effort is put into structural health monitoring (SHM) and damage detection methods for these compo... 详细信息
来源: 评论
Phase Re-service in Reinforcement Learning Traffic Signal Control
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Zhiyao Gunter, George Quinones-Grueiro, Marcos Zhang, Yuhang Barbour, William Biswas, Gautam Work, Daniel Department of Civil and Environmental Engineering Vanderbilt University United States Department of Computer Science Vanderbilt University United States Institute for Software Integrated Systems Vanderbilt University United States
This article proposes a novel approach to traffic signal control that combines phase re-service with reinforcement learning (RL). The RL agent directly determines the duration of the next phase in a pre-defined sequen... 详细信息
来源: 评论
Development of a Model for Discriminating Electroencephalograms of Patients with Mild Cognitive Impairment and Healthy Individuals Using a Support Vector Machine  13
Development of a Model for Discriminating Electroencephalogr...
收藏 引用
Joint 13th International Conference on Soft Computing and Intelligent systems and 25th International Symposium on Advanced Intelligent systems, SCIS and ISIS 2024
作者: Tanabe, Akifumi Nakatani, Kyosuke Harachi, Kento Yamamoto, Yusuke Muramatsu, Ayumi Nagahara, Hajime Takemura, Noriko Shimojo, Shinji Furihata, Daisuke Mizuno-Matsumoto, Yuko Kamae-Shigenobu, Kazue Shinosaki, Kazuhiro Graduate School of Information Science University of Hyogo Kobe Japan School of Life Science and Technology Tokyo Institute of Technology Yokohama Japan Aino University Department of Medical Engineering Ibaraki Japan Institute for Datability Science Osaka University Suita Japan Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology Iizuka Japan Aomori University Faculty of Software and Information Technology Aomori Japan Osaka University Cyber Media Center Suita Japan Asakayama General Hospital Sakai Japan
We performed machine learning using spectrum analysis and power spectra of electroencephalograms (EEGs) of patients with mild cognitive impairment (MCI). Spectrum analysis was performed on the EEGs of MCI patients and... 详细信息
来源: 评论
Enhancing Energy Sector Resilience: Integrating Security by Design Principles
arXiv
收藏 引用
arXiv 2024年
作者: Shirtz, Dov Koberman, Inna Elyashar, Aviad Puzis, Rami Elovici, Yuval Cyber@BGU Cyber Labs Ben-Gurion University Israel Department of Software and Information Systems Engineering Ben-Gurion University Israel Department of Computer Science Shamoon College of Engineering Beer-Sheva Israel
Security by design (SbD) is a concept for developing and maintaining systems that are, to the greatest extent possible, free from security vulnerabilities and impervious to security attacks. In addition to technical a... 详细信息
来源: 评论
AI-Powered Conceptual Model for Scrum Framework
AI-Powered Conceptual Model for Scrum Framework
收藏 引用
Computing and Information Technology (ICCIT-1441), 2020 International Conference on
作者: Rana Mdallal Dania Alsawalmeh Dania Jarad Ammar Odeh Department of Software Engineering/Enterprise Systems Engineering (ESE) Princess Sumaya University for Technology (PSUT) Department of Computer Science/Cybersecurity Princess Sumaya University for Technology (PSUT)
Scrum is an incremental, interactive agile framework widely used to develop practical problems; the Scrum team focuses on achieving a common goal each cycle, "Sprint Goal" instead of the traditional sequenti...
来源: 评论
Product Recommendation System using Deep Learning based Recurrent Neural Network
Product Recommendation System using Deep Learning based Recu...
收藏 引用
International Conference on computer Communication and Informatics (ICCCI)
作者: S. Shanthi K. Nirmaladevi N. Mathiarasi As. Krithika Tharani A. Monisha R. Kuppuchamy N. Krishnamoorthy Department of Computer Science & Engineering Kongu Engineering College Perundurai India Department of Computer Applications PSNA College of Engineering and Technology Dindigul Tamilnadu India Department of Software Systems and Engineering Vellore Campus Vellore Institute of Technology India
Today’s marketing strategies place a high priority on comprehending customer sentiments. It will not only give businesses a better understanding of how their clients view their goods and/or services, but it will also... 详细信息
来源: 评论
A Novel Method for Pneumothorax Diagnosis and Segmentation Using Deep Convolution Neural Network
A Novel Method for Pneumothorax Diagnosis and Segmentation U...
收藏 引用
International Conference on computer Communication and Informatics (ICCCI)
作者: S. Shanthi K. Nirmaladevi N. Mathiarasi As. Krithika Tharani A. Monisha R. Kuppuchamy N. Krishnamoorthy Department of Computer Science & Engineering Kongu Engineering College Perundurai India Department of Computer Applications PSNA College of Engineering and Technology Dindigul Tamilnadu India Department of Software Systems and Engineering Vellore Institute of Technology Vellore Campus India
A pneumothorax is the accumulation of air in the pleural space between the chest and lungs. Air that is in the lungs during breathing can leak out of the lungs and become trapped between the chest and lungs in the tho... 详细信息
来源: 评论
Instructors' Perspectives on Capstone Courses in Computing Fields: A Mixed-Methods Study  2024
Instructors' Perspectives on Capstone Courses in Computing F...
收藏 引用
29th Working Group Reports on Innovation and Technology in computer science Education, ITiCSE WGR 2024
作者: Hooshangi, Sara Shakil, Asma Dasgupta, Subhasish Davis, Karen C.C. Farghally, Mohammed Fitzpatrick, KellyAnn Gutica, Mirela Hardt, Ryan Riddle, Steve Seyam, Mohammed Department of Computer Science Virginia Tech BlacksburgVA United States School of Computer Science University of Auckland Auckland New Zealand Info Systems and Tech Mgmt Dept George Washington University WashingtonDC United States Computer Science and Software Engineering Dept. Miami University OxfordOH United States School of Computing Instruction Georgia Institute of Technology AtlantaGA United States School of Computing & Academic Studies British Columbia Institute of Technology BurnabyBC Canada Computer & Information Science University of St. Thomas Saint PaulVA United States School of Computing Newcastle University Newcastle upon Tyne United Kingdom
Team-based capstone courses are integral to many undergraduate and postgraduate degree programs in the computing field. They are designed to help students gain hands-on experience and practice professional skills such... 详细信息
来源: 评论
Enhancing e-KYC Security and Privacy: Harnessing Quantum Computing and Blockchain in Web 3.0
收藏 引用
Distributed Ledger Technologies: Research and Practice 2024年 第4期3卷 1-23页
作者: G. M. Faruk Ahmed Imran Hasan Md Soumike Hassan Rahul Khan Abu Jor Al Gefari Zain Buksh Joseph Liu A B M Shawkat Ali Cybersecurity Cell Rupali Bank Limited Dhaka Bangladesh Department of Computer Science and Engineering Islamic University Kushtia Bangladesh Department of Statistics Jahangirnagar University Dhaka Bangladesh Department of Pharmacy Bangladesh University Dhaka Bangladesh Rajshahi Science and Technology University Natore Bangladesh Department of Computer Science and Mathematics The University of Fiji Lautoka Fiji Department of Software Systems and Cybersecurity Monash University Melbourne Australia
By implementing a successful and effective Electronic-Know Your Customer (e-KYC) infrastructure, conventional defects and expenses may be greatly reduced. Strong authentication procedures are used by existing e-KYC so... 详细信息
来源: 评论