咨询与建议

限定检索结果

文献类型

  • 2,234 篇 会议
  • 1,253 篇 期刊文献
  • 56 册 图书

馆藏范围

  • 3,543 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,181 篇 工学
    • 1,740 篇 计算机科学与技术...
    • 1,416 篇 软件工程
    • 466 篇 信息与通信工程
    • 312 篇 控制科学与工程
    • 234 篇 生物工程
    • 183 篇 电气工程
    • 153 篇 机械工程
    • 150 篇 生物医学工程(可授...
    • 132 篇 电子科学与技术(可...
    • 95 篇 安全科学与工程
    • 85 篇 光学工程
    • 85 篇 仪器科学与技术
    • 78 篇 化学工程与技术
    • 76 篇 网络空间安全
    • 73 篇 建筑学
    • 65 篇 土木工程
  • 936 篇 理学
    • 460 篇 数学
    • 263 篇 生物学
    • 190 篇 物理学
    • 143 篇 统计学(可授理学、...
    • 121 篇 系统科学
    • 88 篇 化学
  • 705 篇 管理学
    • 463 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 261 篇 工商管理
  • 159 篇 医学
    • 143 篇 临床医学
    • 127 篇 基础医学(可授医学...
    • 67 篇 公共卫生与预防医...
  • 136 篇 法学
    • 107 篇 社会学
  • 95 篇 经济学
    • 94 篇 应用经济学
  • 63 篇 教育学
  • 44 篇 农学
  • 9 篇 军事学
  • 8 篇 文学
  • 7 篇 艺术学

主题

  • 156 篇 software enginee...
  • 114 篇 information syst...
  • 88 篇 machine learning
  • 84 篇 software
  • 72 篇 deep learning
  • 66 篇 software systems
  • 65 篇 accuracy
  • 61 篇 systems engineer...
  • 61 篇 training
  • 58 篇 semantics
  • 58 篇 security
  • 57 篇 data mining
  • 55 篇 computer science
  • 55 篇 computational mo...
  • 55 篇 artificial intel...
  • 54 篇 computer archite...
  • 52 篇 feature extracti...
  • 46 篇 internet of thin...
  • 44 篇 application soft...
  • 44 篇 cloud computing

机构

  • 56 篇 department of so...
  • 27 篇 department of so...
  • 25 篇 china industrial...
  • 24 篇 state key labora...
  • 24 篇 department of in...
  • 21 篇 school of softwa...
  • 18 篇 school of inform...
  • 18 篇 state key labora...
  • 17 篇 college of compu...
  • 16 篇 school of comput...
  • 15 篇 department of so...
  • 15 篇 institute of inf...
  • 14 篇 college of compu...
  • 13 篇 school of comput...
  • 13 篇 school of electr...
  • 12 篇 school of inform...
  • 11 篇 information syst...
  • 11 篇 department of so...
  • 11 篇 sri lanka instit...
  • 11 篇 department of so...

作者

  • 66 篇 shabtai asaf
  • 60 篇 elovici yuval
  • 28 篇 puzis rami
  • 26 篇 ismail leila
  • 19 篇 rokach lior
  • 17 篇 ruisheng zhang
  • 17 篇 jakimi abdeslam
  • 16 篇 fire michael
  • 15 篇 buyya rajkumar
  • 15 篇 abdeslam jakimi
  • 15 篇 jajodia sushil
  • 14 篇 mirsky yisroel
  • 13 篇 shapira bracha
  • 13 篇 r.s. sandhu
  • 13 篇 materwala huned
  • 13 篇 shahar yuval
  • 12 篇 h. gomaa
  • 12 篇 choo kim-kwang r...
  • 12 篇 guri mordechai
  • 12 篇 lin lin

语言

  • 3,408 篇 英文
  • 109 篇 其他
  • 19 篇 中文
  • 5 篇 日文
  • 3 篇 德文
  • 2 篇 土耳其文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering and Information Systems Engineering Team"
3543 条 记 录,以下是31-40 订阅
排序:
Attention Management: Extending in Progress  24
Attention Management: Extending in Progress
收藏 引用
24th IEEE International Symposium on Computational Intelligence and Informatics, CINTI 2024
作者: Brodniansky, Juraj Lang, Ján Institute of Informatics Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak Technical University in Bratislava Bratislava Slovakia
Attention management in software development proves to be a highly relevant issue. It offers various ways of managing the user’s attention using visual perception of the work environment. Awareness of the workplace p... 详细信息
来源: 评论
Triple Diseases Prediction System using Deep Learning Techniques  2
Triple Diseases Prediction System using Deep Learning Techni...
收藏 引用
2nd International Conference on Emerging Trends in information Technology and engineering, ic-ETITE 2024
作者: Vijayan, R. Mareeswari, V. Jaswanth, A.B. Department of Information Technology Tamilnadu Vellore India Department of Software and Systems Tamilnadu Vellore India Software Engineering Tamilnadu Vellore India
With the existing deep learning models in predicting multiple diseases primarily focus on analyzing individual diseases in isolation, lacking a unified system for multi-disease prediction. This project presents an app... 详细信息
来源: 评论
Challenge-Response Emotion Authentication Algorithm Using Modified Horizontal Deep Learning
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 3659-3675页
作者: Mohamed Ezz Ayman Mohamed Mostafa Ayman Elshenawy College of Computer and Information Sciences Jouf UniversitySakaka72314Saudi Arabia Systems and Computers Engineering DEPT Faculty of EngineeringAl-Azhar UniversityCairo11651Egypt Software Engineering&Information Technology Faculty of Engineering&TechnologyEgyptian Chinese UniversityEgypt
Face authentication is an important biometric authentication method commonly used in security *** is vulnerable to different types of attacks that use authorized users’facial images and videos captured from social me... 详细信息
来源: 评论
Dialog generation for Arabic chatbot
收藏 引用
International Journal of information Technology (Singapore) 2024年 第2期16卷 881-890页
作者: Youness, Farida Madkour, Mohamed Ashraf Elshenawy, Ayman Computers and Systems Department Al-Azhar University Cairo Egypt Software Engineering and Information Technology Department Faculty of Engineering and Technology Egyptian Chinees University Cairo Egypt
Dialogue generation systems (DGS) is an important topic in the field of Natural Language Processing (NLP). It enables a wide range of real-world applications to interact with humans in various languages naturally and ... 详细信息
来源: 评论
Discussion Paper: The Threat of Real Time Deepfakes  2
Discussion Paper: The Threat of Real Time Deepfakes
收藏 引用
2nd Workshop on the security implications of Deepfakes and Cheapfakes, WDC 2023, held in conjunction with ACM AsiaCCS 2023
作者: Frankovits, Guy Mirsky, Yisroel Department of Software and Information Systems Engineering Ben-Gurion University Beersheba Israel
Generative deep learning models are able to create realistic audio and video. This technology has been used to impersonate the faces and voices of individuals. These "deepfakes"are being used to spread misin... 详细信息
来源: 评论
Deploying Hybrid Ensemble Machine Learning Techniques for Effective Cross-Site Scripting(XSS)Attack Detection
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 707-748页
作者: Noor Ullah Bacha Songfeng Lu Attiq Ur Rehman Muhammad Idrees Yazeed Yasin Ghadi Tahani Jaser Alahmadi School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430073China Department of Computer Science and Engineering University of Engineering and TechnologyLahore54000Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain12555Abu Dhabi Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ... 详细信息
来源: 评论
Ensemble Approach Combining Deep Residual Networks and BiGRU with Attention Mechanism for Classification of Heart Arrhythmias
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 341-359页
作者: Batyrkhan Omarov Meirzhan Baikuvekov Daniyar Sultan Nurzhan Mukazhanov Madina Suleimenova Maigul Zhekambayeva Department of Information Systems Al-Farabi Kazakh National UniversityAlmaty050040Kazakhstan Department of Mathematical and Computer Modeling International Information Technology UniversityAlmaty050040Kazakhstan Department of Software Engineering Satbayev UniversityAlmaty050013Kazakhstan
This research introduces an innovative ensemble approach,combining Deep Residual Networks(ResNets)and Bidirectional Gated Recurrent Units(BiGRU),augmented with an Attention Mechanism,for the classification of heart **... 详细信息
来源: 评论
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 93-115页
作者: Shafi Ullah Sibghat Ullah Bazai Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed Department of Computer Engineering Balochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Department of Information Technology Balochistan University of Information TechnologyEngineeringand Management SciencesQuetta87300Pakistan Department of Information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Software Engineering College of ComputingRiphah International UniversityFaisalabad44000Pakistan Department of Electrical Engineering Balochistan University of Information Technology Engineeringand Management SciencesQuetta87300Pakistan Department of Mathematics College of Science Al-ZulfiMajmaah UniversityAl-Majmaah11952Saudi Arabia
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... 详细信息
来源: 评论
Design of a ML-based trust prediction model using intelligent TrustBoxes in challenged networks
收藏 引用
International Journal of systems, Control and Communications 2024年 第3期15卷 209-234页
作者: Barai, Smritikona Kundu, Anindita Bhaumik, Parama Department of Computer Science and Engineering Heritage Institute of Technology Kolkata India Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Tamil Nadu India Department of Information Technology Jadavpur University Kolkata India
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t... 详细信息
来源: 评论
Unified Approach Integrating Machine Learning Algorithms for Detection of e-Mail Phishing Attacks  1
Unified Approach Integrating Machine Learning Algorithms for...
收藏 引用
1st International Conference on Computing, Sciences and Communications, ICCSC 2024
作者: Mathur, Abeer Dubey, Abhinav Sudhakar Mahara, Pranav Singh Gandhi, Usha Devi School of Computer Science & Engineering Vellore Institute of Technology Department of Software Systems Vellore India School of Computer Science Engineering & Information Systems Vellore Institute of Technology Department of Information Technology Vellore India
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov... 详细信息
来源: 评论