咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 729 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 2,267 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,356 篇 工学
    • 1,062 篇 计算机科学与技术...
    • 889 篇 软件工程
    • 243 篇 信息与通信工程
    • 223 篇 控制科学与工程
    • 133 篇 生物工程
    • 99 篇 电气工程
    • 94 篇 机械工程
    • 92 篇 生物医学工程(可授...
    • 72 篇 电子科学与技术(可...
    • 61 篇 安全科学与工程
    • 55 篇 光学工程
    • 48 篇 仪器科学与技术
    • 48 篇 动力工程及工程热...
    • 45 篇 土木工程
    • 44 篇 建筑学
    • 44 篇 网络空间安全
  • 602 篇 理学
    • 314 篇 数学
    • 155 篇 生物学
    • 118 篇 系统科学
    • 116 篇 物理学
    • 96 篇 统计学(可授理学、...
    • 43 篇 化学
  • 395 篇 管理学
    • 278 篇 管理科学与工程(可...
    • 145 篇 图书情报与档案管...
    • 140 篇 工商管理
  • 106 篇 医学
    • 97 篇 临床医学
    • 81 篇 基础医学(可授医学...
  • 62 篇 法学
    • 44 篇 社会学
  • 46 篇 经济学
    • 46 篇 应用经济学
  • 46 篇 教育学
    • 44 篇 教育学
  • 20 篇 农学
  • 8 篇 文学
  • 4 篇 军事学
  • 3 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 143 篇 software enginee...
  • 138 篇 computer science
  • 62 篇 deep learning
  • 60 篇 machine learning
  • 58 篇 laboratories
  • 52 篇 software systems
  • 52 篇 computational mo...
  • 52 篇 artificial intel...
  • 51 篇 application soft...
  • 47 篇 accuracy
  • 46 篇 cloud computing
  • 44 篇 training
  • 41 篇 computer archite...
  • 41 篇 software
  • 38 篇 grid computing
  • 37 篇 quality of servi...
  • 36 篇 resource managem...
  • 34 篇 support vector m...
  • 34 篇 systems engineer...
  • 34 篇 data mining

机构

  • 31 篇 beijing key labo...
  • 26 篇 grid computing a...
  • 22 篇 department of co...
  • 22 篇 school of electr...
  • 22 篇 seventh research...
  • 21 篇 software enginee...
  • 20 篇 college of compu...
  • 18 篇 state key labora...
  • 16 篇 software enginee...
  • 12 篇 department of so...
  • 12 篇 school of inform...
  • 11 篇 institute for so...
  • 11 篇 department of so...
  • 10 篇 sri lanka instit...
  • 10 篇 max planck insti...
  • 10 篇 department of in...
  • 9 篇 computing and so...
  • 9 篇 cloud computing ...
  • 9 篇 school of intell...
  • 8 篇 department of co...

作者

  • 48 篇 rajkumar buyya
  • 35 篇 junping du
  • 33 篇 yingmin jia
  • 25 篇 buyya rajkumar
  • 24 篇 ismail leila
  • 23 篇 fashan yu
  • 19 篇 xenofon koutsouk...
  • 16 篇 gautam biswas
  • 14 篇 biswas gautam
  • 14 篇 zamli kamal z.
  • 13 篇 materwala huned
  • 11 篇 philippe charlan...
  • 11 篇 ahmed bestoun s.
  • 11 篇 zander carol
  • 11 篇 p.k. mckinley
  • 11 篇 choo kim-kwang r...
  • 11 篇 veera boonjing
  • 11 篇 leung victor c.m...
  • 11 篇 juergen rilling
  • 10 篇 cheng betty h. c...

语言

  • 2,191 篇 英文
  • 69 篇 其他
  • 7 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Language and Computer Science Systems and Software Engineering Department"
2267 条 记 录,以下是61-70 订阅
排序:
Weber Law Based Approach for Multi-Class Image Forgery Detection
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 145-166页
作者: Arslan Akram Javed Rashid Arfan Jaffar Fahima Hajjej Waseem Iqbal Nadeem Sarwar Department of Computer Science Superior UniversityLahore54000Pakistan Information Technology Services University of OkaraOkara56300Pakistan Departmet of Computer Science MLC LabOkara56300Pakistan Department of CS&SE International Islamic UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science Bahria UniversityLahore CampusLahore54600Pakistan
Today’s forensic science introduces a new research area for digital image analysis formultimedia ***,Image authentication issues have been raised due to the wide use of image manipulation software to obtain an illegi... 详细信息
来源: 评论
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4615-4630页
作者: Erssa Arif Syed Khuram Shahzad Muhammad Waseem Iqbal Muhammad Arfan Jaffar Abdullah S.Alshahrani Ahmed Alghamdi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Faculty of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword... 详细信息
来源: 评论
A Parallel Hybrid Testing Technique for Tri-Programming Model-Based software systems
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 4501-4530页
作者: Huda Basloom Mohamed Dahab Abdullah Saad AL-Ghamdi Fathy Eassa Ahmed Mohammed Alghamdi Seif Haridi Department of Computer Science Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia KTH Royal Institute of Technology StockholmSweden
Recently,researchers have shown increasing interest in combining more than one programming model into systems running on high performance computing systems(HPCs)to achieve exascale by applying parallelism at multiple ... 详细信息
来源: 评论
A Three-Dimensional Real-Time Gait-Based Age Detection System Using Machine Learning
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 165-182页
作者: Muhammad Azhar Sehat Ullah Khalil Ullah Habib Shah Abdallah Namoun Khaliq Ur Rahman Department of Computer Science&IT University of MalakandChakdara18800Pakistan Department of Software Engineering University of MalakandChakdara18800Pakistan College of Computer Science King Khalid UniversityAbha62529Saudi Arabia Faculty of Computer and Information Systems Islamic University of MadinahMadinah42351Saudi Arabia Department of Statistics Abdul Wali Khan UniversityMardan23200Pakistan
Human biometric analysis has gotten much attention due to itswidespread use in different research areas, such as security, surveillance,health, human identification, and classification. Human gait is one of the keyhum... 详细信息
来源: 评论
ATFS: A deep learning framework for angle transformation and face swapping of face de-identification
收藏 引用
Multimedia Tools and Applications 2024年 第12期83卷 36797-36822页
作者: Tsai, Chwei-Shyong Wu, Hsien-Chu Chen, Wei-Ting Ying, Josh Jia-Ching Department of Management Information Systems National Chung Hsing University Taichung402 Taiwan Language Center National Chin-Yi University of Technology Taichung411 Taiwan Department of Computer Science and Information Engineering National Taichung University of Science and Technology Taichung404 Taiwan
This paper proposes an effective framework for improving angle transformation and face replacement. This ATFS framework aims to solve the image distortion caused by angled face swapping in face de-identification. In t... 详细信息
来源: 评论
Convergence Track Based Adaptive Differential Evolution Algorithm(CTbADE)
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 1229-1250页
作者: Qamar Abbas Khalid Mahmood Malik Abdul Khader Jilani Saudagar Muhammad Badruddin Khan Mozaherul Hoque Abul Hasanat Abdullah AlTameem Mohammed AlKhathami Department of Computer Science and Software Engineering International Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Engineering Oakland UniversityRochesterMIUSA Information Systems Department College of Computer and Information SciencesImam Mohammad Ibn Saud Islamic University(IMSIU)RiyadhSaudi Arabia
One of the challenging problems with evolutionary computing algorithms is to maintain the balance between exploration and exploitation capability in order to search global optima.A novel convergence track based adapti... 详细信息
来源: 评论
Injections Attacks Efficient and Secure Techniques Based on Bidirectional Long Short Time Memory Model
收藏 引用
computers, Materials & Continua 2023年 第9期76卷 3605-3622页
作者: Abdulgbar A.R.Farea Gehad Abdullah Amran Ebraheem Farea Amerah Alabrah Ahmed A.Abdulraheem Muhammad Mursil Mohammed A.A.Al-qaness School of Big Data&Software Engineering Chongqing UniversityChongqing401331China Department of Management Science Engineering Dalian University of TechnologyDalian116024China Software College Northeastern UniversityShenyang110169China Department of Information Systems College of Computer and Information ScienceKing Saud UniversityRiyadh11543Saudi Arabia Department of Management Science and Engineering South China University of TechnologyGuangzhou510641China Department of Computer Engineering and Mathematics University of Rovira i VirgiliTarragonaSpain College of Physics and Electronic Information Engineering Zhejiang Normal UniversityJinhua321004China
E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely *** web developers may have varying lev... 详细信息
来源: 评论
CPDZ: A Credibility-Aware and Privacy-Preserving Data Collection Scheme with Zero-Trust in Next-Generation Crowdsensing Networks
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2183-2199页
作者: Tang, Jianheng Fan, Kejia Yang, Shihao Liu, Anfeng Xiong, Neal N. Song, Houbing Herbert Leung, Victor C. M. Central South University School of Computer Science and Engineering Changsha410083 China Peking University School of Computer Science Beijing100871 China Sul Ross State University Department of Computer Mathematical and Physical Sciences AlpineTX79830 United States Department of Information Systems BaltimoreMD21250 United States Shenzhen MSU-BIT University Artificial Intelligence Research Institute Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Next-Generation Crowdsensing Networks (NGCNs) have become increasingly critical for smart cities, where data privacy and quality are pivotal concerns. Traditional trust mechanisms in crowdsensing mainly rely on static... 详细信息
来源: 评论
Integrity Estimation of Twitter Based Event Recognition Using Scrutiny of Analyzed Data  2
Integrity Estimation of Twitter Based Event Recognition Usin...
收藏 引用
2nd International Conference on Emerging Trends in Information Technology and engineering, ic-ETITE 2024
作者: Siva Rama Lingham, N. Parameswari, M. Karthick, P. Priya, T. Subha Rathi Rajesh, G. Jagannathan, J. Vel Tech Rangarajan Dr.Sagunthala R&d Institute of Science and Technology Department of Computer Science and Engineering Chennai India Knowledge Institute of Technology Department of Computer Science and Engineering Salem India Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College Department of Computer Science and Engineering Chennai India School of Engineering and Technology Jeppiaar University Chennai India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Department of Software and Systems Engineering Vellore Katpadi632014 India
Twitter has been observed to be one of the essential data resources for dependable event accreditation. In any case, Twitter-based event affirmation structures can't guarantee assessment concerning their attestati... 详细信息
来源: 评论
AI-Driven Virtual Mock Interview Development  13
AI-Driven Virtual Mock Interview Development
收藏 引用
Joint 13th International Conference on Soft Computing and Intelligent systems and 25th International Symposium on Advanced Intelligent systems, SCIS and ISIS 2024
作者: Mishra, Prabhat Kumar Arulappan, Arun Kumar Ra, In-Ho Thanga Mariappan, L. Gina Rose, G. Lee, Young-Seok School of Computer Science Engineering and Information Systems Vit University Vellore India School of Computer and Software Kunsan National University Gunsan Korea Republic of Anna University Department of Computer Technology Chennai India
The integration of Artificial Intelligence (AI) into educational technologies marks a significant shift in learning methodologies and operational dynamics within educational institutions. At the forefront is an AI-dri... 详细信息
来源: 评论