咨询与建议

限定检索结果

文献类型

  • 1,120 篇 会议
  • 963 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 2,106 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,315 篇 工学
    • 998 篇 计算机科学与技术...
    • 844 篇 软件工程
    • 236 篇 信息与通信工程
    • 195 篇 控制科学与工程
    • 142 篇 生物工程
    • 107 篇 生物医学工程(可授...
    • 103 篇 机械工程
    • 103 篇 电气工程
    • 99 篇 电子科学与技术(可...
    • 81 篇 光学工程
    • 56 篇 仪器科学与技术
    • 50 篇 化学工程与技术
    • 49 篇 动力工程及工程热...
    • 49 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 626 篇 理学
    • 293 篇 数学
    • 190 篇 物理学
    • 165 篇 生物学
    • 100 篇 统计学(可授理学、...
    • 74 篇 系统科学
    • 50 篇 化学
  • 467 篇 管理学
    • 312 篇 管理科学与工程(可...
    • 170 篇 图书情报与档案管...
    • 147 篇 工商管理
  • 146 篇 医学
    • 120 篇 临床医学
    • 87 篇 基础医学(可授医学...
    • 60 篇 公共卫生与预防医...
    • 43 篇 药学(可授医学、理...
  • 77 篇 法学
    • 68 篇 社会学
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 40 篇 教育学
  • 38 篇 农学
  • 18 篇 文学
  • 9 篇 军事学
  • 1 篇 艺术学

主题

  • 86 篇 deep learning
  • 66 篇 computer science
  • 63 篇 machine learning
  • 61 篇 software enginee...
  • 39 篇 accuracy
  • 35 篇 internet of thin...
  • 35 篇 information tech...
  • 34 篇 computational mo...
  • 34 篇 software
  • 34 篇 artificial intel...
  • 32 篇 feature extracti...
  • 30 篇 neural networks
  • 30 篇 training
  • 29 篇 optimization
  • 27 篇 support vector m...
  • 26 篇 security
  • 24 篇 semantics
  • 24 篇 testing
  • 23 篇 cloud computing
  • 21 篇 authentication

机构

  • 37 篇 department of so...
  • 25 篇 department of so...
  • 21 篇 department of co...
  • 19 篇 college of compu...
  • 18 篇 department of co...
  • 18 篇 department of co...
  • 16 篇 department of in...
  • 15 篇 national enginee...
  • 15 篇 department of co...
  • 12 篇 department of so...
  • 12 篇 department of so...
  • 12 篇 state key labora...
  • 11 篇 department of in...
  • 10 篇 university of ch...
  • 10 篇 school of comput...
  • 10 篇 faculty of commu...
  • 9 篇 department of co...
  • 9 篇 school of softwa...
  • 9 篇 department of co...
  • 9 篇 department of so...

作者

  • 13 篇 muhammad waseem ...
  • 13 篇 lee sai peck
  • 13 篇 abdelwahed motwa...
  • 13 篇 muhammad adnan k...
  • 12 篇 shamshirband sha...
  • 12 篇 yunhao liu
  • 12 篇 shahaboddin sham...
  • 12 篇 mesfer al duhayy...
  • 12 篇 herawan tutut
  • 12 篇 ow siew hock
  • 11 篇 moni mohammad al...
  • 11 篇 tao dacheng
  • 11 篇 siew hock ow
  • 10 篇 pinandito aryo
  • 10 篇 susilo willy
  • 10 篇 ahmad rodina
  • 10 篇 ahmed kawsar
  • 10 篇 zhengfeng ji
  • 10 篇 iman attarzadeh
  • 9 篇 chen yen-lin

语言

  • 1,987 篇 英文
  • 105 篇 其他
  • 14 篇 中文
  • 2 篇 日文
检索条件"机构=Software Engineering Department Faculty of Computer Science and Information System"
2106 条 记 录,以下是211-220 订阅
排序:
Marine Predators Algorithm with Deep Learning-Based Leukemia Cancer Classification on Medical Images
收藏 引用
computer Modeling in engineering & sciences 2024年 第10期141卷 893-916页
作者: Sonali Das Saroja Kumar Rout Sujit Kumar Panda Pradyumna Kumar Mohapatra Abdulaziz S.Almazyad Muhammed Basheer Jasser Guojiang Xiong Ali Wagdy Mohamed Department of Computer Science&Engineering Gandhi Institute for TechnologyBPUTBhubaneswar752054India Department of Information Technology Vardhaman College of Engineering(Autonomous)Hyderabad501218TelanganaIndia Department of Electronic&Communication Engineering Vedang Institute of TechnologyBhubaneswar752010India Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Department of Computing and Information Systems School of Engineering and TechnologySunway UniversityJalan UniversitiBandar SunwaySelangor Darul Ehsan47500Malaysia Research Centre for Human-Machine Collaboration(HUMAC) School of Engineering and TechnologySunway UniversityJalan UniversitiBandar SunwaySelangor Darul Ehsan47500Malaysia Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmman11931Jordan
In blood or bone marrow,leukemia is a form of cancer.A person with leukemia has an expansion of white blood cells(WBCs).It primarily affects children and rarely affects *** depends on the type of leukemia and the exte... 详细信息
来源: 评论
A Three-Step Procedural Paradigm for Domain-Specific Social Media Slang Analytics  2
A Three-Step Procedural Paradigm for Domain-Specific Social ...
收藏 引用
2nd IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies, TQCEBT 2024
作者: Sundaram, Aishwarya Subramaniam, Hema Ab Hamid, Siti Hafizah Nor, Azmawaty Mohamad Universiti Malaya Institute for Advanced Studies Kuala Lumpur Malaysia Universiti Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur Malaysia Universiti Malaya Faculty of Education Department of Educational Psychology and Counselling Kuala Lumpur Malaysia
Social media is a crucial aspect of modern society, shaping global communication and information exchange. Social media slang encompasses informal language expressions, abbreviations, and unconventional words on these... 详细信息
来源: 评论
Differential Evolution with Arithmetic Optimization Algorithm Enabled Multi-Hop Routing Protocol
收藏 引用
computer systems science & engineering 2023年 第5期45卷 1759-1773页
作者: Manar Ahmed Hamza Haya Mesfer Alshahrani Sami Dhahbi Mohamed K Nour Mesfer Al Duhayyim ElSayed M.Tag El Din Ishfaq Yaseen Abdelwahed Motwakel Department of Computer and Self Development Preparatory Year DeanshipPrince Sattam bin Abdulaziz UniversityAlKharjSaudi Arabia Department of Information Systems College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Science College of Science&Art at MahayilKing Khalid UniversityAbha62529Saudi Arabia Department of Computer Science College of Computing and Information SystemUmm Al-Qura UniversitySaudi Arabia Department of Computer Science College of Sciences and Humanities-AflajPrince Sattam bin Abdulaziz UniversitySaudi Arabia Department of Electrical Engineering Faculty of Engineering and TechnologyFuture University in EgyptNew Cairo11845Egypt
Wireless Sensor Networks(WSN)has evolved into a key technology for ubiquitous living and the domain of interest has remained active in research owing to its extensive range of *** spite of this,it is challenging to de... 详细信息
来源: 评论
A Proposed Approach for Risk Planning and Management  25
A Proposed Approach for Risk Planning and Management
收藏 引用
25th International Arab Conference on information Technology, ACIT 2024
作者: Al Refai, Mohammed N. Al-Smadi, Yazan Al-Momani, Adai Jamhawi, Zeyad M. Otoom, Ahmed Ali Atoum, Issa Yaseen, Ahid Ababneh, Jafar Kanan, Mohammad Zarqa University Software Engineering Dep. Zarqa Jordan Zarqa University Department of Computer Science Zarqa Jordan Applied Science Private University Department of Computer Science Amman Jordan Applied Science Private University Department of Cyber Security Amman Jordan Philadelphia University Faculty of Information Technology Software Engineering Department Jordan Zarqa University Department of Cyber Security Zarqa Jordan University of Business and Technelogy Dep. of Industry Engineering Jeddah21432 Saudi Arabia
Project Risk management is the process of identifying, evaluating, avoiding, or reducing risks. Where there is no software project without risks existence are natural in the context of project planning and management.... 详细信息
来源: 评论
Linear Random Early Detection for Congestion Control at the Router Buffer
收藏 引用
Informatica (Slovenia) 2022年 第5期46卷 105-114页
作者: Abu-Shareha, Ahmad Adel Al-Kasasbeh, Basil Shambour, Qusai Y. Abualhaj, Mosleh M. Alsharaiah, Mohmmad Abdalla Al-Khatib, Sumaya N. Department of Computer Science Faculty of Information Technology Al-Ahliyya Amman University Amman Jordan Riyadh Saudi Arabia Department of Software Engineering Faculty of Information Technology Al-Ahliyya Amman University Amman Jordan Department of Networks and Information Security Faculty of Information Technology Al-Ahliyya Amman University Amman Jordan Department of Data Science and Artificial Intelligence Faculty of Information Technology Al-Ahliyya Amman University Amman Jordan
Active Queue Management (AQM) methods control the router's buffer to maintain high network performance and control congestion at the router buffer. Random Early Detection (RED) method is the most well-known and th... 详细信息
来源: 评论
An Intelligent Thyroid Diagnosis system Utilizing Multiple Ensemble and Explainable Algorithms with Medical Supported Attributes
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2840-2855页
作者: Sutradhar, Ananda Al Rafi, Mustahsin Ghosh, Pronab Shamrat, F M Javed Mehedi Moniruzzaman, Md. Ahmed, Kawsar Azad, A.K.M. Bui, Francis M. Chen, Li Moni, Mohammad Ali Daffodil International University Department of Computer Science and Engineering Dhaka1216 Bangladesh Lakehead University Department of Computer Science Thunder BayONP7B 5E1 Canada University of Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia Lakehead University Department of Software Engineering Thunder BayONP7B 5E1 Canada University of Saskatchewan Department of Electrical and Computer Engineering SaskatoonSK S7N 5A9 Canada Imam Mohammad Ibn Saud Islamic University Faculty of Science Department of Mathematics and Statistics Riyadh13318 Saudi Arabia Charles Stuart University AI and Cyber Futures Institute BathurstNSW2795 Australia
The widespread impact of thyroid disease and its diagnosis is a challenging task for healthcare experts. The conventional technique for predicting such a vital disease is complex and time-consuming. A data-driven appr... 详细信息
来源: 评论
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection  24
EEiF: Efficient Isolated Forest with e Branches for Anomaly ...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Zhang, Yifan Xiang, Haolong Zhang, Xuyun Xu, Xiaolong Fan, Wei Zhang, Qin Qi, Lianyong School of Software Nanjing University of Information Science and Technology China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China School of Computing Macquarie University Australia University of Oxford Uffield Department of Women's & Reproductive Health United Kingdom College of Computer Science and Software Engineering Shenzhen University China Faculty of Science and Engineering China
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m... 详细信息
来源: 评论
Early Fault Detection in Rolling Element Bearings Using Signal Processing Techniques  21
Early Fault Detection in Rolling Element Bearings Using Sign...
收藏 引用
21st IEEE International Conference on Smart Communities: Improving Quality of Life using AI, Robotics and IoT, HONET 2024
作者: Saeed, Ali Akram, M. Usman Khan, Muazzam A. Afsar, M. Belal Quaid-i-Azam University ICESCO Big Data Analytics and Edge Computing Department of Computer Science Islamabad Pakistan National University of Sciences and Technology Department of Computer and Software Engineering Islamabad Pakistan Otto-von-Guericke University Faculty of Electrical Engineering and Information Technology Maddeburg Germany
Many studies show that bearings are the most vulnerable components in low-voltage motors. While advanced bearing diagnostic systems exist, their cost can be a barrier for non-critical machinery due to the potential wa... 详细信息
来源: 评论
Brain Tumor Segmentation in Multimodal MRI Using U-Net Layered Structure
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5267-5281页
作者: Muhammad Javaid Iqbal Muhammad Waseem Iqbal Muhammad Anwar Muhammad Murad Khan Abd Jabar Nazimi Mohammad Nazir Ahmad Department of Information Technology The Superior UniversityLahorePakistan Department of Software Engineering The Superior UniversityLahorePakistan Department of Information Sciences Division of Science and TechnologyUniversity of EducationLahorePakistan Department of Computer Science Government College UniversityFaisalabadPakistan Deptment of Oral and Maxillofacial Surgery Faculty of DentistryUniversiti Kebangsaan MalaysiaKuala LumpurMalaysia Institute of IR4.0 Universiti Kebangsaan MalaysiaBangiSelangorMalaysia
The brain tumour is the mass where some tissues become old or damaged,but they do not die or not leave their *** brain tumour masses occur due to malignant *** tissues must die so that new tissues are allowed to be bo... 详细信息
来源: 评论
Mobile Medical Assistant system for Laboratory Report Analysis and Medical Drug Identification  4
Mobile Medical Assistant System for Laboratory Report Analys...
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Warnakulasuriya, Deshani Dewangi, Tharushi Sewwandi, Navodya Rathnayake, Minoli Kodagoda, Nuwan Suriyawansha, Kushanra Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
It is quite common for medical drugs and prescriptions to be misidentified by hospitals and after drugs are being dispensed to the patients. Misidentification of medical drugs is more common among elderly and visually... 详细信息
来源: 评论