咨询与建议

限定检索结果

文献类型

  • 4,563 篇 会议
  • 3,048 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,678 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,892 篇 工学
    • 3,766 篇 计算机科学与技术...
    • 3,056 篇 软件工程
    • 1,090 篇 信息与通信工程
    • 662 篇 控制科学与工程
    • 586 篇 生物工程
    • 532 篇 电气工程
    • 360 篇 生物医学工程(可授...
    • 359 篇 电子科学与技术(可...
    • 326 篇 机械工程
    • 266 篇 光学工程
    • 203 篇 动力工程及工程热...
    • 180 篇 化学工程与技术
    • 176 篇 网络空间安全
    • 172 篇 安全科学与工程
    • 167 篇 交通运输工程
    • 156 篇 仪器科学与技术
  • 2,276 篇 理学
    • 1,329 篇 数学
    • 638 篇 生物学
    • 437 篇 物理学
    • 414 篇 统计学(可授理学、...
    • 231 篇 系统科学
    • 192 篇 化学
  • 1,478 篇 管理学
    • 870 篇 管理科学与工程(可...
    • 651 篇 图书情报与档案管...
    • 350 篇 工商管理
  • 363 篇 医学
    • 305 篇 临床医学
    • 274 篇 基础医学(可授医学...
    • 161 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 209 篇 法学
    • 163 篇 社会学
  • 130 篇 经济学
  • 98 篇 教育学
  • 86 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 221 篇 training
  • 214 篇 deep learning
  • 213 篇 feature extracti...
  • 180 篇 computational mo...
  • 167 篇 semantics
  • 162 篇 machine learning
  • 154 篇 educational inst...
  • 152 篇 accuracy
  • 142 篇 computer science
  • 126 篇 optimization
  • 124 篇 predictive model...
  • 122 篇 software enginee...
  • 122 篇 data models
  • 106 篇 data mining
  • 106 篇 cloud computing
  • 101 篇 internet of thin...
  • 92 篇 security
  • 88 篇 neural networks
  • 86 篇 artificial intel...
  • 84 篇 clustering algor...

机构

  • 1,262 篇 college of compu...
  • 157 篇 college of compu...
  • 133 篇 shenzhen univers...
  • 119 篇 college of compu...
  • 108 篇 college of compu...
  • 102 篇 college of compu...
  • 98 篇 software college...
  • 98 篇 college of compu...
  • 92 篇 state key labora...
  • 80 篇 school of softwa...
  • 74 篇 national enginee...
  • 71 篇 school of comput...
  • 63 篇 college of compu...
  • 59 篇 college of compu...
  • 58 篇 college of softw...
  • 58 篇 the college of c...
  • 57 篇 state key labora...
  • 56 篇 college of compu...
  • 55 篇 school of inform...
  • 48 篇 school of softwa...

作者

  • 65 篇 shen linlin
  • 47 篇 jingsha he
  • 41 篇 leung victor c.m...
  • 37 篇 wang xingwei
  • 36 篇 laizhong cui
  • 35 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 32 篇 zhen ji
  • 32 篇 he jingsha
  • 31 篇 victor c. m. leu...
  • 30 篇 zhou jie
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 27 篇 leung victor c. ...
  • 26 篇 gao can
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 yan li
  • 25 篇 li yan

语言

  • 7,003 篇 英文
  • 547 篇 其他
  • 134 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=College of Computer Science&Software Engineering"
7678 条 记 录,以下是4961-4970 订阅
排序:
A Registration Method for Augmented Reality System Based on Visual SLAM
A Registration Method for Augmented Reality System Based on ...
收藏 引用
International Conference on Electronic engineering and Informatics (EEI)
作者: Zuoming Zhang Man Shu Zixuan Wang Hanwen Wang Xin Wang College of Software Engineering Jilin University Changchun China College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineer of Ministry of Education Jilin University Changchun China
In augmented reality, smart devices need to sense their own position in real physical space and complex scene structure to achieve good virtual reality interaction and three-dimensional registration. This paper propos... 详细信息
来源: 评论
Digital Image Recovery Based on Lifting Wavelet Transform
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1962卷
作者: Taha Basheer Taha Dujan B. Taha Ruzelita Ngadiran Phaklen Ehkhan IT Department Faculty of Sciences TISHK International University Erbil Iraq. Software Engineering Department College of Computer Science and Mathematics Mosul University Iraq Centre of Excellence Advanced Computing (AdvComp) Faculty of Electronic Engineering Technology University Malaysia Perlis Perlis Malaysia
Recently, with the wide distribution of digital media, the need for authenticating digital images was increased. Therefore, many image tamper detection and recovery algorithms were introduced in literature to detect m...
来源: 评论
CNNLoc: Deep-Learning Based Indoor Localization with WiFi Fingerprinting
CNNLoc: Deep-Learning Based Indoor Localization with WiFi Fi...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Xudong Song Xiaochen Fan Xiangjian He Chaocan Xiang Qianwen Ye Xiang Huang Gengfa Fang Liming Luke Chen Jing Qin Zumin Wang College of Information Engineering Dalian University Dalian China School of Electrical and Data Engineering University of Technology Sydney Sydney Australia School of Software and Microelectronics Northwestern Polytechnical University China College of Computer Science Chongqing University Chongqing China School of Computer Science and Informatics De Montfort University United Kingdom
With the ubiquitous deployment of wireless systems and pervasive availability of smart devices, indoor localization is empowering numerous location-based services. With the established radio maps, WiFi fingerprinting ... 详细信息
来源: 评论
Opti-SW: An improved gene sequence alignment algorithm
收藏 引用
Ingenierie des Systemes d'Information 2018年 第6期23卷 73-85页
作者: Li, Leixiao Gao, Jing Liu, Yanfeng College of Computer and Information Engineering Inner Mongolia Agricultural University Hohhot010018 China College of Data Science and Application Inner Mongolia University of Technology Hohhot010080 China Inner Mongolia Autonomous Region Engineering and Technology Research Center of Big Data Based Software Service Hohhot010080 China
This paper aims to improve the speed and complexity of Smith-Waterman (SW) algorithm. For this purpose, the SW algorithm was improved by reducing the complexity and task load of the computation of the scoring matrix w... 详细信息
来源: 评论
Android Malware Family Classification and Characterization Using CFG and DFG
Android Malware Family Classification and Characterization U...
收藏 引用
Theoretical Aspects of software engineering (TASE)
作者: Zhiwu XU Kerong Ren Fu Song College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China School of Information Science and Technology ShanghaiTech University Shanghai China
Android malware has become a serious threat for our daily life, and thus there is a pressing need to effectively mitigate or defend against them. Recently, many approaches and tools to analyze Android malware have bee... 详细信息
来源: 评论
Data Mining Techniques Used in Predicting Student Retention in Higher Education: A Survey
Data Mining Techniques Used in Predicting Student Retention ...
收藏 引用
International Conference on Electrical and Computing Technologies and Applications (ICECTA)
作者: Zaid Shuqfa Saad Harous College of Infrmation Technology United Arab Emirates University Al Ain City UAE Department of Computer Science and Software Engineering CIT UAEU Al Ain City UAE
Predicting student retention is a crucial task for all stakeholders in higher education. This paper surveyed the Educational Data Mining (EDM) literature to explore the most recent methods used in building predictive ...
来源: 评论
Multi-indicator bacterial foraging algorithm with kriging model for many-objective optimization  9th
Multi-indicator bacterial foraging algorithm with kriging mo...
收藏 引用
9th International Conference on Swarm Intelligence, ICSI 2018
作者: Wang, Rui Chen, Shengminjie Ma, Lianbo Cheng, Shi Shi, Yuhui College of Software Northeastern University Shenyang China Faculty of Science Kunming University of Science and Technology Kunming China School of Computer Science Shaanxi Normal University Xi’an China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
In order to efficiently reduce computational expense as well as manage the diversity and convergence in many-objective optimization, this paper proposes a novel multi-indicator bacterial foraging algorithm with Krigin... 详细信息
来源: 评论
An Expected Patch Log Likelihood Denoising Method Based on Internal and External Image Similarity
An Expected Patch Log Likelihood Denoising Method Based on I...
收藏 引用
2018 International Symposium in Sensing and Instrumentation in IoT Era, ISSI 2018
作者: He, Wen Zhao, Dan Zheng, Yuhui Xie, Jiacen Institute of System Engineering Chinese Academy of Military Sciences Beijing China College of Computer and Software Nanjing University of Information Science and Technology Nanjing China
Natural images always exhibit a certain nonlocal self-similarity property, which implies that the patch matrix formed by similar image patches is low-rank. In this paper, the self-similarity of images is combined with... 详细信息
来源: 评论
Integrating the pressure-state-response model with the extension catastrophe progression for flood risk and resilience assessment
Environmental and Sustainability Indicators
收藏 引用
Environmental and Sustainability Indicators 2025年 27卷
作者: Shahab S. Band Sultan Noman Qasem Sajad Eslami Zulkefli Mansor Brij B. Gupta Hao-Ting Pai Meghdad Biyari Amir Mosavi Farzaneh Sajedi Hosseini Department of Information Management International Graduate School of Artificial Intelligence National Yunlin University of Science and Technology Douliu Taiwan Computer Science Department College of Computer and Information Sciences Imam Mohammad Ibn Saud Islamic University (IMSIU) Riyadh 11432 Saudi Arabia School of Business Stevens Institute of Technology Hoboken 07030 NJ USA Research Center for Software Technology and Management Faculty of Information Science and Technology Universiti Kebangsaan Malaysia 43600 Bandar Baru Bangi Selangor Darul Ehsan Malaysia Department of Computer Science and Information Engineering Asia University Taichung 413 Taiwan School of Cybersecurity Korea University Seoul South Korea Symbiosis Centre for Information Technology Symbiosis International University Pune India Department of Big Data Business Analytics National Pingtung University Pingtung Taiwan Department of Information Management National Yunlin University of Science and Technology Yunlin Taiwan John von Neumann Faculty of Informatics Obuda University 1034 Budapest Hungary Ludovika University of Public Service Budapest Hungary Abylkas Saginov Karaganda Technical University Karaganda Kazakhstan Reclamation of Arid and Mountainous Regions Department Faculty of Natural Resources University of Tehran Karaj Iran
Despite the devastating effects of floods, the concept of resilience is still not fully considered in the assessment and management of flood risk. To study how resilience can lower the risk of floods and further enhan... 详细信息
来源: 评论
Relation graph network for 3D object detection in point clouds
arXiv
收藏 引用
arXiv 2019年
作者: Feng, Mingtao Gilani, Syed Zulqarnain Wang, Yaonan Zhang, Liang Mian, Ajmal College of Electrical and Information Engineering Hunan University Changsha410082 China School of Software Xidian University Xian710071 China Department of Computer Science and Software Engineering University of Western Australia Perth CrawleyWA6009 Australia School of Science Edith Cowan University Joondalup6027 Australia
—Convolutional Neural Networks (CNNs) have emerged as a powerful strategy for most object detection tasks on 2D images. However, their power has not been fully realised for detecting 3D objects in point clouds direct... 详细信息
来源: 评论