咨询与建议

限定检索结果

文献类型

  • 2,288 篇 会议
  • 1,869 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 4,177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,520 篇 工学
    • 1,537 篇 计算机科学与技术...
    • 1,251 篇 软件工程
    • 475 篇 信息与通信工程
    • 434 篇 控制科学与工程
    • 359 篇 电气工程
    • 297 篇 电子科学与技术(可...
    • 276 篇 光学工程
    • 271 篇 生物工程
    • 239 篇 生物医学工程(可授...
    • 171 篇 机械工程
    • 153 篇 化学工程与技术
    • 129 篇 仪器科学与技术
    • 128 篇 动力工程及工程热...
    • 110 篇 材料科学与工程(可...
    • 96 篇 安全科学与工程
    • 87 篇 交通运输工程
  • 1,534 篇 理学
    • 671 篇 数学
    • 579 篇 物理学
    • 323 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 187 篇 系统科学
    • 178 篇 化学
  • 578 篇 管理学
    • 362 篇 管理科学与工程(可...
    • 225 篇 图书情报与档案管...
    • 180 篇 工商管理
  • 262 篇 医学
    • 223 篇 临床医学
    • 176 篇 基础医学(可授医学...
    • 101 篇 药学(可授医学、理...
    • 86 篇 公共卫生与预防医...
  • 99 篇 法学
    • 75 篇 社会学
  • 62 篇 经济学
  • 61 篇 教育学
  • 46 篇 农学
  • 20 篇 军事学
  • 16 篇 文学
  • 8 篇 艺术学

主题

  • 136 篇 software enginee...
  • 97 篇 computer science
  • 71 篇 machine learning
  • 66 篇 deep learning
  • 63 篇 neural networks
  • 60 篇 feature extracti...
  • 59 篇 application soft...
  • 59 篇 control systems
  • 55 篇 optimization
  • 52 篇 computational mo...
  • 52 篇 accuracy
  • 49 篇 artificial intel...
  • 48 篇 computer archite...
  • 46 篇 predictive model...
  • 45 篇 software testing
  • 45 篇 humans
  • 44 篇 costs
  • 42 篇 testing
  • 40 篇 software systems
  • 40 篇 pattern recognit...

机构

  • 86 篇 university of ch...
  • 67 篇 iccub universita...
  • 65 篇 department of ph...
  • 65 篇 universiteit maa...
  • 64 篇 hangzhou institu...
  • 64 篇 excellence clust...
  • 62 篇 infn sezione di ...
  • 62 篇 horia hulubei na...
  • 61 篇 van swinderen in...
  • 61 篇 school of physic...
  • 60 篇 physics and micr...
  • 60 篇 ds4ds la salle u...
  • 59 篇 massachusetts in...
  • 59 篇 infn sezione di ...
  • 58 篇 h.h. wills physi...
  • 57 篇 university of ma...
  • 57 篇 cavendish labora...
  • 57 篇 infn sezione di ...
  • 56 篇 warsaw
  • 56 篇 university of ci...

作者

  • 64 篇 beiter a.
  • 64 篇 barter w.
  • 64 篇 brundu d.
  • 64 篇 bellee v.
  • 57 篇 ao d.
  • 56 篇 bobulska d.
  • 56 篇 afsharnia h.
  • 55 篇 aliouche z.
  • 55 篇 blake t.
  • 55 篇 andersson m.
  • 55 篇 borsato m.
  • 55 篇 betancourt c.
  • 55 篇 belin s.
  • 55 篇 carus l.
  • 55 篇 barbetti m.
  • 55 篇 beck a.
  • 55 篇 cali s.
  • 54 篇 casse g.
  • 54 篇 amato s.
  • 54 篇 baryshnikov f.

语言

  • 3,952 篇 英文
  • 174 篇 其他
  • 47 篇 中文
  • 2 篇 日文
检索条件"机构=Center of Excellence in Software Engineering Department of Computer Engineering"
4177 条 记 录,以下是31-40 订阅
排序:
Embedded and Real-Time Anomalous Command Classification in Unmanned Ground Vehicle Operations  32
Embedded and Real-Time Anomalous Command Classification in U...
收藏 引用
32nd IFIP/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2024
作者: Elia, Rafaella Theocharides, Theocharis Kios Research and Innovation Center of Excellence University of Cyprus Department of Electrical and Computer Engineering Nicosia Cyprus
Unmanned Ground Vehicles (UGVs) are increasingly used in safety-critical applications, typically controlled under challenging conditions that may cause stress and fatigue on the operator. This can potentially compromi... 详细信息
来源: 评论
Inpainting Technique for Removing Vehicle Logos Using Haar-Like and Fast Marching Methods  8
Inpainting Technique for Removing Vehicle Logos Using Haar-L...
收藏 引用
8th International Artificial Intelligence and Data Processing Symposium, IDAP 2024
作者: Durmus, Meryem Ergen, Burhan Durmus, Omer Atasoy, Ferhat Samsun University Center for Distance Education Samsun Turkey Firat University College of Engineering Department of Computer Engineering Elazig Turkey Samsun University College of Engineering Department of Software Engineering Samsun Turkey Karabuk University College of Engineering Department of Computer Engineering Karabuk Turkey
Inpainting is the process of removing an unwanted object or region in an image without degrading the image quality. Inpainting offers a solution to problems such as repairing damaged images or removing unwanted parts ... 详细信息
来源: 评论
A survey of artificial intelligence models for wireless capsule endoscopy videos for superior automatic diagnosis: problems and solutions
收藏 引用
Multimedia Tools and Applications 2025年 1-35页
作者: El-Gammal, Eman M. El-Shafai, Walid Taha, Taha E. El-Fishawy, Adel S. Abd El-Samie, Fathi E. Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf32952 Egypt Center of Advanced Software and Biomedical Clinical Engineering Consultations Faculty of Engineering Cairo University Giza Egypt Computer Science Department Prince Sultan University Riyadh11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University 84428 Riyadh11671 Saudi Arabia
Wireless Capsule Endoscopy (WCE) emerged as an innovative and patient-centric approach for non-invasive and painless examination of the gastrointestinal (GI) tract. It serves as a pivotal tool in helping medical pract... 详细信息
来源: 评论
Link-Privacy Preserving Graph Embedding Data Publication with Adversarial Learning
收藏 引用
Tsinghua Science and Technology 2022年 第2期27卷 244-256页
作者: Kainan Zhang Zhi Tian Zhipeng Cai Daehee Seo the Department of Computer Science Georgia State UniversityAtlantaGA 30303USA the Department of Electrical and Computer Engineering George Mason UniversityFairfaxVA 22030USA the National Center of Excellence in Software Sangmyung UniversitySeoul 03016Republic of Korea
The inefficient utilization of ubiquitous graph data with combinatorial structures necessitates graph embedding methods,aiming at learning a continuous vector space for the graph,which is amenable to be adopted in tra... 详细信息
来源: 评论
RGB Image-Based Hand Pose Estimation: A Survey on Deep Learning Perspective  20
RGB Image-Based Hand Pose Estimation: A Survey on Deep Learn...
收藏 引用
20th CSI International Symposium on Artificial Intelligence and Signal Processing, AISP 2024
作者: Farjadi, Seyed Amirhossein Akbarzadeh-T, M.-R. Ghiasi-Shirazi, Kamaledin Ferdowsi University of Mashhad Center of Excellence on Soft Computing and Intelligent Information Processing Department of Computer Engineering Mashhad Iran Ferdowsi University of Mashhad Department of Computer Engineering Mashhad Iran
The pervasive integration of modern artificial intelligence into daily life necessitates robust human-computer interaction, underscored by advancements in computer technology. As the primary human tool, hand position,... 详细信息
来源: 评论
Finding the transcription factor binding locations using novel algorithm segmentation to filtration (S2F)
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第9期15卷 3347-3358页
作者: Theepalakshmi, P. Srinivasulu Reddy, U. Department of Computer Science and Engineering Gandhi Institute of Technology and Management Karnataka Bengaluru India Machine Learning and Data Analytics Lab Center of Excellence in Artificial Intelligence Department of Computer Applications National Institute of Technology Tamilnadu Tiruchirappalli India
The primary aim of identifying the binding motifs in gene regulation is to understand the transcriptional regulation molecular mechanism systematically. In this study, the (, d) motif search issue was considered ... 详细信息
来源: 评论
Accurate threat hunting in industrial internet of things edge devices
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1123-1130页
作者: Abbas Yazdinejad Behrouz Zolfaghari Ali Dehghantanha Hadis Karimipour Gautam Srivastava Reza M.Parizi Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Electrical and Software Engineering University of CalgaryAlbertaCanada Department of Mathematics and Computer Science Brandon UniversityBrandonCanada College of Computing and Software Engineering Kennesaw State UniversityGAUSA Research Center for Interneural Computing China Medical UniversityTaichungTaiwanChina Department of Computer Science and Mathematics Lebanese American UniversityBeirut1102Lebanon
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e... 详细信息
来源: 评论
3-Multi ranked encryption with enhanced security in cloud computing
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 313-326页
作者: YeEun Kim Junggab Son Reza M.Parizi Gautam Srivastava Heekuck Oh Major in Bio Artificial Intelligence Dept.of Computer Science and EngineeringHanyang UniversityAnsanRepublic of Korea Department of Computer Science Kennesaw State UniversityMariettaUSA Department of Software Engineering Kennesaw State UniversityMariettaUSA Department of Mathematics and Computer Science Brandon UniversityBrandonCanada Research Center for Interneural Computing China Medical UniversityTaichungTaiwanChina Dept.of Computer Science and Engineering Hanyang UniversityAnsanRepublic of Korea
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple... 详细信息
来源: 评论
Passivity Preserving Safety-Critical Control of Switched Systems  63
Passivity Preserving Safety-Critical Control of Switched Sys...
收藏 引用
63rd IEEE Conference on Decision and Control, CDC 2024
作者: Meng, Qingkai Kasis, Andreas Polycarpou, Marios M. University of Cyprus Kios Research and Innovation Center of Excellence Department of Electrical and Computer Engineering Nicosia1678 Cyprus
System safety refers to the property of the state trajectories to remain within some predefined set at all times. Integrating safety and stability offers significant advantages, such as resilience to disturbances and ... 详细信息
来源: 评论
A Secure and Efficient Biometric Template Protection Scheme for Palmprint Recognition System
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第5期4卷 1051-1063页
作者: Sardar, Alamgir Umer, Saiyed Rout, Ranjeet Kumar Khan, Muhammad Khurram Aliah University Department of Computer Science and Engineering Kolkata700156 India National Institute of Technology Department of Computer Science and Engineering Srinagar190006 India King Saud University Center of Excellence in Information Assurance Riyadh11451 Saudi Arabia
The accuracy and security of a biometric system are the two sides of a coin. A biometric system must be simple, flexible, efficient, and secure enough from unauthorized access. Concerning these requirements, this arti... 详细信息
来源: 评论