咨询与建议

限定检索结果

文献类型

  • 11,282 篇 会议
  • 5,179 篇 期刊文献
  • 229 册 图书

馆藏范围

  • 16,690 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10,241 篇 工学
    • 8,155 篇 计算机科学与技术...
    • 6,808 篇 软件工程
    • 1,996 篇 信息与通信工程
    • 1,319 篇 控制科学与工程
    • 1,098 篇 生物工程
    • 822 篇 电气工程
    • 729 篇 生物医学工程(可授...
    • 679 篇 机械工程
    • 600 篇 电子科学与技术(可...
    • 555 篇 光学工程
    • 415 篇 安全科学与工程
    • 347 篇 仪器科学与技术
    • 338 篇 化学工程与技术
    • 326 篇 动力工程及工程热...
    • 326 篇 建筑学
  • 4,527 篇 理学
    • 2,655 篇 数学
    • 1,233 篇 生物学
    • 827 篇 物理学
    • 749 篇 统计学(可授理学、...
    • 631 篇 系统科学
    • 345 篇 化学
  • 3,153 篇 管理学
    • 1,913 篇 管理科学与工程(可...
    • 1,355 篇 图书情报与档案管...
    • 948 篇 工商管理
  • 711 篇 医学
    • 622 篇 临床医学
    • 552 篇 基础医学(可授医学...
    • 327 篇 药学(可授医学、理...
  • 484 篇 法学
    • 373 篇 社会学
  • 329 篇 教育学
    • 319 篇 教育学
  • 320 篇 经济学
    • 318 篇 应用经济学
  • 172 篇 农学
  • 71 篇 文学
  • 48 篇 军事学
  • 28 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,071 篇 computer science
  • 1,019 篇 software enginee...
  • 312 篇 deep learning
  • 303 篇 application soft...
  • 296 篇 computational mo...
  • 271 篇 data mining
  • 243 篇 computer archite...
  • 242 篇 machine learning
  • 229 篇 software
  • 202 篇 software systems
  • 200 篇 accuracy
  • 195 篇 feature extracti...
  • 195 篇 training
  • 188 篇 support vector m...
  • 187 篇 internet of thin...
  • 181 篇 programming
  • 171 篇 educational inst...
  • 168 篇 laboratories
  • 168 篇 optimization
  • 167 篇 semantics

机构

  • 355 篇 college of compu...
  • 197 篇 department of co...
  • 154 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 106 篇 school of softwa...
  • 105 篇 department of co...
  • 90 篇 department of co...
  • 85 篇 department of co...
  • 80 篇 school of inform...
  • 73 篇 department of co...
  • 72 篇 department of co...
  • 70 篇 department of co...
  • 66 篇 school of comput...
  • 52 篇 department of co...
  • 49 篇 department of co...
  • 48 篇 school of softwa...
  • 48 篇 department of co...
  • 46 篇 department of co...
  • 46 篇 software enginee...

作者

  • 66 篇 rajkumar buyya
  • 48 篇 xiao qin
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 31 篇 mian ajmal
  • 31 篇 zhao jian
  • 30 篇 shen furao
  • 24 篇 muhammad waseem ...
  • 24 篇 kotagiri ramamoh...
  • 23 篇 parizi reza m.
  • 23 篇 christopher leck...
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 21 篇 niyato dusit
  • 21 篇 dozier gerry
  • 21 篇 rehman attique u...
  • 21 篇 liu yang
  • 21 篇 lin qiuzhen

语言

  • 15,871 篇 英文
  • 708 篇 其他
  • 121 篇 中文
  • 8 篇 德文
  • 3 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Software Engineering and Computer Science Department"
16690 条 记 录,以下是591-600 订阅
排序:
TSMS-InceptionNeXt:A Framework for Image-Based Combustion State Recognition in Counterflow Burners via Feature Extraction Optimization
收藏 引用
computers, Materials & Continua 2025年 第6期83卷 4329-4352页
作者: Huiling Yu Xibei Jia Yongfeng Niu Yizhuo Zhang Software Engineering Department of Computer ScienceChangzhou UniversityChangzhou213146China Electrical Engineering Department of Computer ScienceChangzhou UniversityChangzhou213146China
The counterflow burner is a combustion device used for research on *** utilizing deep convolutional models to identify the combustion state of a counter flow burner through visible flame images,it facilitates the opti... 详细信息
来源: 评论
A Cost-Efficient Anonymous Authenticated and Key Agreement Scheme for V2I-Based Vehicular Ad-Hoc Networks
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12621-12630页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Shamshad, Salman Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
The rise of smart cities is directly connected to the increasing use of vehicles. The growing vehicle utilization has driven the emergence of Vehicular Ad-hoc Networks (VANETs), facilitating instant information exchan... 详细信息
来源: 评论
Graph-Based Feature Learning for Cross-Project software Defect Prediction
收藏 引用
computers, Materials & Continua 2023年 第10期77卷 161-180页
作者: Ahmed Abdu Zhengjun Zhai Hakim A.Abdo Redhwan Algabri Sungon Lee School of Software Northwestern Polytechnical UniversityXi’anChina School of Computer Science Northwestern Polytechnical UniversityXi’anChina Department of Computer Science Hodeidah UniversityPO Box 3114Al-HudaydahYemen Research Institute of Engineering and Technology Hanyang UniversityAnsanKorea Department of Robotics Hanyang UniversityAnsanKorea
Cross-project software defect prediction(CPDP)aims to enhance defect prediction in target projects with limited or no historical data by leveraging information from related source *** existing CPDP approaches rely on ... 详细信息
来源: 评论
Object Tracking-Based “Follow-Me” Unmanned Aerial Vehicle (UAV) System
收藏 引用
computer Systems science & engineering 2022年 第6期41卷 875-890页
作者: Olubukola D.Adekola Onyedikachi Kenny Udekwu Oluwatobi Tolulope Saliu Damilola Williams Dada Stephen O.Maitanmi Victor Odumuyiwa Olujimi Alao Monday Eze Funmilayo Abibat Kasali Ayokunle Omotunde Department of Software Engineering Babcock UniversityIlisan-RemoOgun StateNigeria Department of Computer Science Babcock UniversityIlisan-RemoOgun StateNigeria Department of Computer Science University of LagosAkokaLagos StateNigeria Department of Computer Science and Mathematics Mountain Top UniversityOgun StateNigeria
The applications of information technology (IT) tools and techniqueshave, over the years, simplified complex problem solving procedures. But thepower of automation is inhibited by the technicality in manning advanced ... 详细信息
来源: 评论
Self-Care Assessment for Daily Living Using Machine Learning Mechanism
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 1747-1764页
作者: Mouazma Batool Yazeed Yasin Ghadi Suliman A.Alsuhibany Tamara al Shloul Ahmad Jalal Jeongmin Park Department of Computer Science Air UniversityIslamabad44000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain15551UAE Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Humanities and Social Science Al Ain UniversityAl Ain15551UAE Department of Computer Engineering Korea Polytechnic University237 Sangidaehak-ro Siheung-siGyeonggi-do15073Korea
Nowadays,activities of daily living(ADL)recognition system has been considered an important field of computer *** and optical sensors are widely used to assess the daily living activities in healthy people and people ... 详细信息
来源: 评论
Improving multi-class opinion classification in social networks by combining Fuzzy SVM and CNN  28th
Improving multi-class opinion classification in social netwo...
收藏 引用
28th International Conference on Knowledge Based and Intelligent information and engineering Systems, KES 2024
作者: Ghezaiel Hammouda, Nadia Toujani, Radhia College of Computer Science and Software Engineering University of Hail Hail Saudi Arabia ESTMOD Department Higher Institute of management University of Tunis Tunisia
Machine learning techniques, particularly fuzzy Support Vector Machines (fuzzy SVM), have demonstrated effectiveness in sentiment classification within social networks. However, the evolving complexity of social netwo... 详细信息
来源: 评论
Analysis of Techniques for Detection and Removal of Zero-Day Attacks (ZDA)  2nd
Analysis of Techniques for Detection and Removal of Zero-Day...
收藏 引用
2nd International Conference on Ubiquitous Security, UbiSec 2022
作者: Hamid, Khalid Iqbal, Muhammad Waseem Aqeel, Muhammad Liu, Xiangyong Arif, Muhammad Department of Software Engineering The Superior University Lahore54000 Pakistan Department of Computer Science The Superior University Lahore54000 Pakistan School of Computer Science and Cyber Engineering Guangzhou University Guangzhou510006 China
Zero-day attacks (ZDAs) are previously unknown flaws and errors in operating systems, networks, and general-purpose software. ZDAs are the cause to open security breach holes for external users or hackers for illegal ... 详细信息
来源: 评论
Classification of Unbalanced Data Based on Bayesian Optimal Neural Network Model
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第3期9卷 1427-1440页
作者: Ye, Li-Zhu Alkawaz, Mohammed Hazim Johar, Md Gapar Md School of Information Technology and Engineering Guangzhou College of Commerce Guangzhou511363 China School of Graduate Studies Management and Science University 40100 Shah Alam Selangor Malaysia Department of Computer Science College of Education for Pure Science University of Mosul Mosul41002 Iraq Software Engineering and Digital Innovation Center Management and Science University Shah Alam40100 Malaysia
Aiming at the unbalanced problem of big data classification, this paper proposes a classification method of unbalanced data on the ground of Bayesian optimal neural network model. The method firstly uses Optimized Gra... 详细信息
来源: 评论
Anomaly-based network intrusion detection using Transfer learning  2
Anomaly-based network intrusion detection using Transfer lea...
收藏 引用
2nd International Conference on Multidisciplinary engineering and Applied science, ICMEAS 2023
作者: Ola-Obaado, Similoluwa Suleiman, Muhammad Aliyu Nile University of Nigeria Computer Science Department Abuja Nigeria Nile University of Nigeria Software Engineering Department Abuja Nigeria
The rapid development of computer networks and network applications, along with the present global increase in hacking and computer network attacks, has increased the demand for stronger intrusion detection and preven... 详细信息
来源: 评论
K-Banhatti Sombor Invariants of Certain computer Networks
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 15-31页
作者: Khalid Hamid Muhammad Waseem Iqbal Abaid Ur Rehman Virk Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Mathematics University of SialkotSialkot51013Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Any number that can be uniquely determined by a graph is called a graph *** the last twenty years’countless mathematical graph invariants have been characterized and utilized for correlation ***,no reliable examinati... 详细信息
来源: 评论