咨询与建议

限定检索结果

文献类型

  • 12,906 篇 会议
  • 6,017 篇 期刊文献
  • 265 册 图书

馆藏范围

  • 19,188 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11,703 篇 工学
    • 9,208 篇 计算机科学与技术...
    • 7,651 篇 软件工程
    • 2,410 篇 信息与通信工程
    • 1,577 篇 控制科学与工程
    • 1,282 篇 生物工程
    • 1,020 篇 电气工程
    • 882 篇 生物医学工程(可授...
    • 767 篇 机械工程
    • 750 篇 电子科学与技术(可...
    • 654 篇 光学工程
    • 519 篇 安全科学与工程
    • 430 篇 化学工程与技术
    • 417 篇 动力工程及工程热...
    • 411 篇 仪器科学与技术
    • 397 篇 网络空间安全
    • 392 篇 交通运输工程
  • 5,449 篇 理学
    • 3,052 篇 数学
    • 1,435 篇 生物学
    • 1,194 篇 物理学
    • 896 篇 统计学(可授理学、...
    • 700 篇 系统科学
    • 452 篇 化学
  • 3,609 篇 管理学
    • 2,202 篇 管理科学与工程(可...
    • 1,536 篇 图书情报与档案管...
    • 1,067 篇 工商管理
  • 883 篇 医学
    • 745 篇 临床医学
    • 674 篇 基础医学(可授医学...
    • 396 篇 公共卫生与预防医...
    • 395 篇 药学(可授医学、理...
  • 574 篇 法学
    • 447 篇 社会学
  • 372 篇 经济学
  • 350 篇 教育学
  • 217 篇 农学
  • 100 篇 文学
  • 54 篇 军事学
  • 31 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,093 篇 computer science
  • 1,027 篇 software enginee...
  • 408 篇 deep learning
  • 336 篇 computational mo...
  • 325 篇 accuracy
  • 321 篇 application soft...
  • 296 篇 machine learning
  • 275 篇 data mining
  • 259 篇 computer archite...
  • 249 篇 training
  • 242 篇 support vector m...
  • 242 篇 software
  • 230 篇 feature extracti...
  • 228 篇 internet of thin...
  • 206 篇 software systems
  • 189 篇 optimization
  • 183 篇 programming
  • 181 篇 artificial intel...
  • 174 篇 wireless sensor ...
  • 165 篇 educational inst...

机构

  • 346 篇 college of compu...
  • 190 篇 department of co...
  • 131 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 126 篇 university of sp...
  • 124 篇 università di to...
  • 122 篇 infn sezione di ...
  • 122 篇 academy of scien...
  • 121 篇 indian institute...
  • 115 篇 department of co...
  • 113 篇 charles universi...
  • 112 篇 department of ph...
  • 111 篇 state key labora...
  • 109 篇 department of co...
  • 105 篇 zhejiang univers...
  • 104 篇 imperial college...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 94 篇 a. babaev
  • 94 篇 d. eliseev
  • 93 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 18,138 篇 英文
  • 912 篇 其他
  • 146 篇 中文
  • 9 篇 德文
  • 4 篇 日文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Application Department of Computer Science"
19188 条 记 录,以下是131-140 订阅
排序:
Rule-based database intrusion detection using coactive artificial neuro-fuzzy inference system and genetic algorithm
收藏 引用
International Journal of Business Intelligence and Data Mining 2022年 第1期21卷 85-101页
作者: Brahma, Anitarani Panigrahi, Suvasini Samal, Neelamani Gountia, Debasis Department of Computer Science and Engineering VSSUT Sambalpur Odisha Burla India Department of Computer Science and Engineering CET Odisha Bhubaneshwar India Department of Computer Science and Application CET Odisha Bhubaneshwar India
Recently, a fuzzy system having learning and adaptation capabilities is gaining lots of interest in research communities. In the current approach, two of the most successful soft computing approaches – neural network... 详细信息
来源: 评论
Cardiac CT Image Segmentation for Deep Learning-Based Coronary Calcium Detection Using K-Means Clustering and Grabcut Algorithm
收藏 引用
computer Systems science & engineering 2023年 第8期46卷 2543-2554页
作者: Sungjin Lee Ahyoung Lee Min Hong Department of Software Convergence Soonchunhyang UniversityAsan31538Korea Department of Computer Science Kennesaw State UniversityMarietta30144GAUSA Department of Computer Software Engineering Soonchunhyang UniversityAsan31538Korea
Specific medical data has limitations in that there are not many numbers and it is not *** solve these limitations,it is necessary to study how to efficiently process these limited amounts of *** this paper,deep learn... 详细信息
来源: 评论
3-Multi ranked encryption with enhanced security in cloud computing
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 313-326页
作者: YeEun Kim Junggab Son Reza M.Parizi Gautam Srivastava Heekuck Oh Major in Bio Artificial Intelligence Dept.of Computer Science and EngineeringHanyang UniversityAnsanRepublic of Korea Department of Computer Science Kennesaw State UniversityMariettaUSA Department of Software Engineering Kennesaw State UniversityMariettaUSA Department of Mathematics and Computer Science Brandon UniversityBrandonCanada Research Center for Interneural Computing China Medical UniversityTaichungTaiwanChina Dept.of Computer Science and Engineering Hanyang UniversityAnsanRepublic of Korea
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple... 详细信息
来源: 评论
A decision model for decentralized autonomous organization platform selection: Three industry case studies
收藏 引用
Blockchain(Research and applications) 2023年 第2期4卷 82-100页
作者: E.Baninemeh S.Farshidi S.Jansen Department of Information and Computer Science Utrecht UniversityUtrechtthe Netherlands Department of Software Engineering Lappeenranta University of TechnologyLappeenrantaFinland
Context:Decentralized autonomous organizations are a new form of smart contract-based *** autonomous organization platforms,which support the creation of such organizations,are becoming increasingly popular,such as Ar... 详细信息
来源: 评论
Bias analysis of AI models for undergraduate student admissions
收藏 引用
Neural Computing and applications 2025年 第12期37卷 7785-7795页
作者: Van Busum, Kelly Fang, Shiaofen Department of Computer Science and Software Engineering Butler University IndianapolisIN United States Computing and Engineering Indiana University Luddy School of Informatics Indiana University Indianapolis IndianapolisIN United States
Bias detection and mitigation is an active area of research in machine learning. This work extends previous research done by the authors Van Busum and Fang (Proceedings of the 38th ACM/SIGAPP Symposium on Applied Comp... 详细信息
来源: 评论
Visual News Ticker Surveillance Approach from Arabic Broadcast Streams
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6177-6193页
作者: Moeen Tayyab Ayyaz Hussain Usama Mir M.Aqeel Iqbal Muhammad Haneef Department of Computer Science and Software Engineering International Islamic UniversityIslamabad44000Pakistan Department of Computer Science Quaid-i-Azam UniversityIslamabad44000Pakistan Department of Computer Science Senior Member IEEEUniversity of WindsorN9B 3P4Canada Department of Software Engineering Foundation University IslamabadIslamabad44000Pakistan Department of Electrical Engineering Foundation University IslamabadIslamabad44000Pakistan
The news ticker is a common feature of many different news networks that display headlines and other *** ticker recognition applications are highly valuable in e-business and news surveillance for media regulatory ***... 详细信息
来源: 评论
Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2917-2939页
作者: Islam Zada Mohammed Naif Alatawi Syed Muhammad Saqlain Abdullah Alshahrani Adel Alshamran Kanwal Imran Hessa Alfraihi Department of Software Engineering International Islamic UniversityIslamabad25000Pakistan Information Technology Department Faculty of Computers and Information TechnologyUniversity of TabukTabuk71491Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science University of PeshawarPeshawar25121Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain... 详细信息
来源: 评论
Designing dataless neural networks for kidney exchange variants
收藏 引用
Neural Computing and applications 2024年 第35期36卷 22265-22275页
作者: Jena, Sangram K. Subramani, K. Velasquez, Alvaro Department of Computer Science and Software Engineering Miami University OxfordOH United States LDCSEE West Virginia University MorgantownWV United States Department of Computer Science University of Colorado Boulder BoulderCO United States
Kidney transplantation is vital for treating end-stage renal disease, impacting roughly one in a thousand Europeans. The search for a suitable deceased donor often leads to prolonged and uncertain wait times, making l... 详细信息
来源: 评论
The Open Source Threat Intelligence Relational Dataset and Its Optimal Implementation
The Open Source Threat Intelligence Relational Dataset and I...
收藏 引用
2024 Asia Pacific Conference on Innovation in Technology, APCIT 2024
作者: Yang, Yaru Li, Junyu Zhang, Ronghua Sah, Abhishek Pratap Yadav, Amit Khan, Asif Chengdu Neusoft University Department of Computer and Software Chengdu China University of Electronic Science and Technology of China School of Management Science and Engineering Chengdu China Charles Darwin University College of Engineering IT and Environment NT Australia Integral University Department of Computer Application Lucknow India
Threat intelligence provides a platform for cybersecurity engineers for attack traceability, which provides substantial knowledge database logs to defend against future security threats. Threat intelligence relationsh... 详细信息
来源: 评论
Beyond Agile: NLP-Driven Quality Attributes Retrieval Using ChatGPT in software Development Strategies
Beyond Agile: NLP-Driven Quality Attributes Retrieval Using ...
收藏 引用
2024 International Conference on engineering and Computing, ICECT 2024
作者: Aamana Ain, Qurat Ul Nisa, Sardar Un NUML Department of Software Engineering Rawalpindi Pakistan NUML Department of Computer Science Islamabad Pakistan
This study explores Agile software Development (ASD) methodologies' effectiveness in achieving quality software products. It investigates the underexplored application of ChatGPT as a Quality Attribute Extractor i... 详细信息
来源: 评论