咨询与建议

限定检索结果

文献类型

  • 5,677 篇 会议
  • 3,599 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,388 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,085 篇 工学
    • 4,762 篇 计算机科学与技术...
    • 3,949 篇 软件工程
    • 1,322 篇 信息与通信工程
    • 717 篇 控制科学与工程
    • 689 篇 生物工程
    • 530 篇 电气工程
    • 416 篇 机械工程
    • 397 篇 电子科学与技术(可...
    • 381 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 233 篇 动力工程及工程热...
    • 209 篇 化学工程与技术
    • 204 篇 安全科学与工程
    • 201 篇 仪器科学与技术
    • 197 篇 网络空间安全
    • 170 篇 建筑学
  • 2,786 篇 理学
    • 1,564 篇 数学
    • 758 篇 生物学
    • 612 篇 物理学
    • 468 篇 统计学(可授理学、...
    • 307 篇 系统科学
    • 222 篇 化学
  • 1,887 篇 管理学
    • 1,160 篇 管理科学与工程(可...
    • 797 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 392 篇 医学
    • 333 篇 临床医学
    • 301 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
  • 320 篇 法学
    • 242 篇 社会学
  • 199 篇 经济学
    • 197 篇 应用经济学
  • 172 篇 教育学
  • 90 篇 农学
  • 38 篇 军事学
  • 37 篇 文学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 241 篇 software enginee...
  • 200 篇 deep learning
  • 198 篇 feature extracti...
  • 187 篇 computational mo...
  • 186 篇 machine learning
  • 163 篇 data mining
  • 150 篇 semantics
  • 146 篇 training
  • 138 篇 cloud computing
  • 132 篇 software
  • 131 篇 accuracy
  • 128 篇 internet of thin...
  • 122 篇 authentication
  • 121 篇 optimization
  • 117 篇 predictive model...
  • 106 篇 artificial intel...
  • 105 篇 security
  • 102 篇 servers
  • 101 篇 educational inst...

机构

  • 301 篇 college of compu...
  • 272 篇 school of inform...
  • 268 篇 school of comput...
  • 145 篇 school of comput...
  • 115 篇 state key labora...
  • 89 篇 school of inform...
  • 88 篇 school of softwa...
  • 57 篇 school of comput...
  • 55 篇 shandong provinc...
  • 46 篇 school of softwa...
  • 43 篇 college of compu...
  • 43 篇 shandong provinc...
  • 42 篇 sri lanka instit...
  • 41 篇 college of infor...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of so...
  • 36 篇 university of el...
  • 36 篇 state key labora...

作者

  • 52 篇 shen linlin
  • 38 篇 xu xiaolong
  • 35 篇 sun xingming
  • 34 篇 qi lianyong
  • 34 篇 ismail leila
  • 31 篇 tao dacheng
  • 31 篇 mu yi
  • 29 篇 mohammad s. obai...
  • 28 篇 huang min
  • 27 篇 susilo willy
  • 26 篇 qi liu
  • 24 篇 shen jian
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 22 篇 liu yang
  • 22 篇 zhang zhao
  • 22 篇 fan guisheng
  • 20 篇 lu dianjie
  • 20 篇 wang wei
  • 19 篇 zhi-hui wang

语言

  • 8,329 篇 英文
  • 931 篇 其他
  • 152 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9388 条 记 录,以下是581-590 订阅
排序:
A Mathematical Model for the Selection of software Requirements Elicitation Techniques  6th
A Mathematical Model for the Selection of Software Requireme...
收藏 引用
6th International Conference on information Systems and Management science, ISMS 2023
作者: Saxena, Virat Raj Yadav, Rajeev Parveen, Azra Sadiq, Mohd. Department of Computer Science and Engineering Mangalayatan University Uttar Pradesh Aligarh202001 India Indraprastha Research Laboratory Indraprastha Institute of Information Sciences Private Limited New Delhi110025 India Software Engineering Laboratory Computer Engineering Section UPFET Jamia Millia Islamia A Central University New Delhi110025 India
Various techniques have been developed for the identification of different types of requirements like interview, questionnaire, group elicitation techniques, attributed goal-oriented requirements analysis, fuzzy based... 详细信息
来源: 评论
CAT: A simple heterogeneous ensemble learning framework for network intrusion detection
收藏 引用
Peer-to-Peer Networking and Applications 2025年 第4期18卷 1-20页
作者: Zhang, Zheng Das, Amit Huang, Guan Baskiyar, Sanjeev Department of Computer Science and Information Systems Murray State University Murray USA Department of Computer Science and Information Systems University of North Alabama Florence USA Computer Science & Software Engineering Auburn University Auburn USA
Given the abundance of cyber-attacks in wireless communications, machine learning can be essential in identifying intrusions. Ensemble learning has been proven to be a well-known technique for boosting performance and...
来源: 评论
Aspect Level Songs Rating Based Upon Reviews in English
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2589-2605页
作者: Muhammad Aasim Qureshi Muhammad Asif Saira Anwar Umar Shaukat Atta-ur-Rahman Muhammad Adnan Khan Amir Mosavi Department of Computer Science Bahria University Lahore54000Pakistan Lahore Institute of Science and Technology Lahore 54792Pakistan Department of Multidisciplinary Engineering Texas A&M UniversityCollege Station77843USA Department of Computer Science College of Computer Science and Information Technology(CCSIT)Imam Abdulrahman Bin Faisal University(IAU)P.O.Box 1982Dammam 31441Saudi Arabia Department of Software Gachon UniversitySeongnam13120Korea John von Neumann Faculty of Informatics Obuda UniversityBudapest1034Hungary Institute of Information Engineering Automation and MathematicsSlovak University of Technology in BratislavaBratislava81107Slovakia Faculty of Civil Engineering TU-DresdenDresden01062Germany
With the advancements in internet facilities,people are more inclined towards the use of online *** service providers shelve their items for *** users post their feedbacks,reviews,ratings,*** the use of the *** enormo... 详细信息
来源: 评论
Monarch Butterfly Optimization Algorithm for Human-Robot Collaboration Multi-Objective Disassembly Line Balancing Problem
Monarch Butterfly Optimization Algorithm for Human-Robot Col...
收藏 引用
2024 International Conference on Cyber-Physical Social Intelligence, ICCSI 2024
作者: Wang, Haokun Guo, Feng Guo, Xiwang Wang, Jiacun Qin, Shujin Tang, Ying Liaoning Petrochemical University Artificial Intelligence and Software Fushun China Liaoning Petrochemical University Information and Control Engineering Fushun China Monmouth University Computer Science and Software Eng. NJ United States Shangqiu Normal University Logistics Management Shangqiu China Rowan University Electrical & Computer Engineering GlassboroNJ United States
Efficient end-of-life products disassembly is crucial in the remanufacturing process. However, hazardous and repetitive disassembly tasks raise labor costs and decrease safety and efficiency. This work proposes an inn... 详细信息
来源: 评论
Optimizing Weighted Ensemble ML IDS Using Parallelization and Batch Learning in Healthcare Networks
Optimizing Weighted Ensemble ML IDS Using Parallelization an...
收藏 引用
2024 IEEE International Conference on E-Health Networking, Application and Services, HealthCom 2024
作者: Ward, Blake Gonzalez, Daniel Alt, Jake Fang, Dongfeng Xu, Shengjie The Department of Computer Science and Software Engineering College of Engineering California Polytechnic State University San Luis ObispoCA93407 United States The Department of Cyber Intelligence and Information Operations College of Applied Science and Technology University of Arizona TucsonAZ85721 United States
The increasing adoption of IoT devices in healthcare necessitates the development of lightweight and fast intrusion detection systems (IDS). This paper proposes a weighted ensemble ML IDS with parallelized batch learn... 详细信息
来源: 评论
A Mathematical Model for the Selection of software Requirements Elicitation Techniques  14
A Mathematical Model for the Selection of Software Requireme...
收藏 引用
14th International Conference on Cloud Computing, Data science and engineering, Confluence 2024
作者: Saxena, Virat Raj Yadav, Rajeev Parveen, Azra Sadiq, Mohd. Mangalayatan University Department of Computer Science and Engineering Uttar Pradesh Aligarh202001 India Indraprastha Institute of Information Sciences Private Limited Indraprastha Research Laboratory New Delhi110025 India Upfet Jamia Millia Islamia A Central University Software Engineering Laboratory Computer Engineering Section New Delhi110025 India
Various techniques have been developed for the identification of different types of requirements like interview, questionnaire, group elicitation techniques, attributed goal-oriented requirements analysis, fuzzy based... 详细信息
来源: 评论
Improved Dingo Optimization Algorithm for Human-robot Collaborative U-shaped Disassembly Line Balancing Problem
Improved Dingo Optimization Algorithm for Human-robot Collab...
收藏 引用
2024 International Conference on Cyber-Physical Social Intelligence, ICCSI 2024
作者: Li, Jialong Guo, XiWang Wang, Jiacun Qin, ShuJin Qi, Liang Kang, Qi Liaoning Petrochemical University Information and Control Engineering Fushun China Monmouth University Wes Long Branch Computer Science and Software Eng. NJ United States Shangqiu Normal University Economics and Management Shangqiu China Shandong University of Science and Technology Computer Science and Technology Qingdao China New Jersey Institute of Technology Electrical and Computer Engineering Newark United States
There is increasing attention on remanufacturing, with the primary focus in the industry on recovering reusable products to generate profit. In the process of optimizing remanufacturing, addressing the balance issue i... 详细信息
来源: 评论
Cloud Security Service for Identifying Unauthorized User Behaviour
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 2581-2600页
作者: D.Stalin David Mamoona Anam Chandraprabha Kaliappan S.Arun Mozhi Selvi Dilip Kumar Sharma Pankaj Dadheech Sudhakar Sengan Department of Computer Science and Engineering IFET College of EngineeringVillupuram605108Tamil NaduIndia Department of Computer Sciences and Software Engineering Faculty of Basic and Applied SciencesInternational Islamic UniversityIslamabadPakistan Department of Information Technology Bannari Amman Institute of TechnologySathyamangalam638401Tamil NaduIndia Department of Computer Science Engineering DMI St.John the Baptist UniversityMangochiLilongweMalawi Department of Mathematics Jaypee University of Engineering and TechnologyGuna473226Madhya PradeshIndia Department of Computer Science and Engineering Swami Keshvanand Institute of TechnologyManagement and Gramothan(SKIT)Jaipur302017RajasthanIndia Department of Computer Science and Engineering PSN College of Engineering and TechnologyTirunelveli627152Tamil NaduIndia
Recently,an innovative trend like cloud computing has progressed quickly in *** a background of distributed networks,the extensive sprawl of internet resources on the Web and the increasing number of service providers... 详细信息
来源: 评论
Mathematical Model and AI Integration for COVID-19: Improving Forecasting and Policy-Making
收藏 引用
SN computer science 2024年 第2期5卷 1-19页
作者: Panda, Dev Sourav Dixit, Rahul Dixit, Anuja Dwaracherla, Harshitha Shukla, Anupam Bosch Digital Department Bosch Global Software Technologies Private Limited Karnataka Bangalore India Department of Artificial Intelligence Sardar Vallabhbhai National Institute of Technology Gujarat Surat India Department of Computer Science and Engineering Motilal Nehru National Institute of Technology Allahabad Uttar Pradesh Prayagraj India Department of Computer Science and Engineering Indian Institute of Information Technology Maharashtra Pune India Department of Computer Science and Engineering Sardar Vallabhbhai National Institute of Technology Gujarat Surat India
In this work, a new susceptible–exposed–infectious–recovered (SEIR) compartmental model is proposed which has additional media influence for precise quantization of the coronavirus disease 2019 (COVID-19). In the p... 详细信息
来源: 评论
Real Estate Management via a Decentralized Blockchain Platform
收藏 引用
computers, Materials & Continua 2021年 第2期66卷 1813-1822页
作者: Iftikhar Ahmad Mohammed AAlqarni Abdulwahab Ali Almazroi Laiba Alam Department of Computer Science and Information Technology University of Engineering and TechnologyPeshawarPakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Information Technology College of Computing and Information Technology at KhulaisUniversity of JeddahJeddahSaudi Arabia
Blockchain technology is one of the key technological breakthroughs of the last *** has the ability to revolutionize numerous aspects of society,including financial systems,healthcare,e-government and many *** such ar... 详细信息
来源: 评论