咨询与建议

限定检索结果

文献类型

  • 5,337 篇 会议
  • 3,284 篇 期刊文献
  • 73 册 图书

馆藏范围

  • 8,694 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,482 篇 工学
    • 4,202 篇 计算机科学与技术...
    • 3,451 篇 软件工程
    • 1,208 篇 信息与通信工程
    • 695 篇 控制科学与工程
    • 653 篇 生物工程
    • 566 篇 电气工程
    • 424 篇 生物医学工程(可授...
    • 393 篇 电子科学与技术(可...
    • 365 篇 机械工程
    • 297 篇 光学工程
    • 223 篇 动力工程及工程热...
    • 207 篇 化学工程与技术
    • 199 篇 安全科学与工程
    • 194 篇 网络空间安全
    • 188 篇 仪器科学与技术
    • 179 篇 交通运输工程
  • 2,594 篇 理学
    • 1,519 篇 数学
    • 709 篇 生物学
    • 500 篇 物理学
    • 465 篇 统计学(可授理学、...
    • 278 篇 系统科学
    • 212 篇 化学
  • 1,685 篇 管理学
    • 1,005 篇 管理科学与工程(可...
    • 735 篇 图书情报与档案管...
    • 413 篇 工商管理
  • 433 篇 医学
    • 369 篇 临床医学
    • 327 篇 基础医学(可授医学...
    • 192 篇 药学(可授医学、理...
    • 185 篇 公共卫生与预防医...
  • 237 篇 法学
    • 187 篇 社会学
  • 145 篇 经济学
  • 127 篇 教育学
  • 95 篇 农学
  • 28 篇 文学
  • 22 篇 军事学
  • 20 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 225 篇 deep learning
  • 225 篇 feature extracti...
  • 221 篇 training
  • 209 篇 computational mo...
  • 193 篇 educational inst...
  • 183 篇 semantics
  • 178 篇 machine learning
  • 153 篇 software enginee...
  • 153 篇 accuracy
  • 142 篇 computer science
  • 139 篇 predictive model...
  • 137 篇 optimization
  • 125 篇 data mining
  • 117 篇 data models
  • 110 篇 internet of thin...
  • 106 篇 security
  • 102 篇 wireless sensor ...
  • 101 篇 cloud computing
  • 94 篇 neural networks
  • 94 篇 clustering algor...

机构

  • 1,220 篇 college of compu...
  • 156 篇 college of compu...
  • 115 篇 college of compu...
  • 115 篇 shenzhen univers...
  • 103 篇 state key labora...
  • 102 篇 college of compu...
  • 102 篇 college of compu...
  • 98 篇 software college...
  • 89 篇 college of compu...
  • 72 篇 school of comput...
  • 72 篇 school of softwa...
  • 68 篇 state key labora...
  • 59 篇 national enginee...
  • 58 篇 college of softw...
  • 58 篇 the college of c...
  • 58 篇 college of compu...
  • 54 篇 college of compu...
  • 53 篇 school of inform...
  • 48 篇 college of compu...
  • 47 篇 school of comput...

作者

  • 55 篇 shen linlin
  • 45 篇 jingsha he
  • 37 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 34 篇 zhong ming
  • 33 篇 zhen ji
  • 33 篇 wang xingwei
  • 33 篇 lin qiuzhen
  • 32 篇 victor c. m. leu...
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 24 篇 yan li
  • 24 篇 leung victor c. ...
  • 23 篇 gao can
  • 23 篇 li yan
  • 21 篇 pan haoyuan

语言

  • 8,217 篇 英文
  • 330 篇 其他
  • 154 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=College of Computer and Software Engineering"
8694 条 记 录,以下是61-70 订阅
排序:
Topological Evaluation of Certain computer Networks by Contraharmonic-Quadratic Indices
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 3795-3810页
作者: Ahmed M.Alghamdi Khalid Hamid Muhammad Waseem Iqbal M.Usman Ashraf Abdullah Alshahrani Adel Alshamrani Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Cybersecurity College of Computer Science and Engineering at University of JeddahJeddah21493Saudi Arabia
In various fields,different networks are used,most of the time not of a single kind;but rather a mix of at least two *** kinds of networks are called bridge networks which are utilized in interconnection networks of P... 详细信息
来源: 评论
Segmentation of Head and Neck Tumors Using Dual PET/CT Imaging:Comparative Analysis of 2D,2.5D,and 3D Approaches Using UNet Transformer
收藏 引用
computer Modeling in engineering & Sciences 2024年 第12期141卷 2351-2373页
作者: Mohammed A.Mahdi Shahanawaj Ahamad Sawsan A.Saad Alaa Dafhalla Alawi Alqushaibi Rizwan Qureshi Information and Computer Science Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Software Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Computer Engineering Department College of Computer Science and EngineeringUniversity of Ha’ilHa’il55476Saudi Arabia Department of Computer and Information Sciences Universiti Teknologi PetronasSeri Iskandar32610Malaysia Center for Research in Computer Vision(CRCV) University of Central FloridaOrlandoFL 32816USA
The segmentation of head and neck(H&N)tumors in dual Positron Emission Tomography/Computed Tomogra-phy(PET/CT)imaging is a critical task in medical imaging,providing essential information for diagnosis,treatment p... 详细信息
来源: 评论
MILG:Realistic lip-sync video generation with audio-modulated image inpainting
收藏 引用
Visual Informatics 2024年 第3期8卷 71-81页
作者: Han Bao Xuhong Zhang Qinying Wang Kangming Liang Zonghui Wang Shouling Ji Wenzhi Chen School of Software Technology Zhejiang UniversityHangzhouChina College of Computer Science Zhejiang UniversityHangzhouChina College of Engineering Zhejiang UniversityHangzhouChina
Existing lip synchronization(lip-sync)methods generate accurately synchronized mouths and faces in a generated ***,they still confront the problem of artifacts in regions of non-interest(RONI),e.g.,background and othe... 详细信息
来源: 评论
A Length-Adaptive Non-Dominated Sorting Genetic Algorithm for Bi-Objective High-Dimensional Feature Selection
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第9期10卷 1834-1844页
作者: Yanlu Gong Junhai Zhou Quanwang Wu MengChu Zhou Junhao Wen College of Computer Science Chongqing UniversityChongqing 400044China IEEE Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewarkNJ 07102 USA College of Big Data and Software Engineering Chongqing UniversityChongqing 400044China
As a crucial data preprocessing method in data mining,feature selection(FS)can be regarded as a bi-objective optimization problem that aims to maximize classification accuracy and minimize the number of selected *** c... 详细信息
来源: 评论
Taming diffusion model for exemplar-based image translation
收藏 引用
Computational Visual Media 2024年 第6期10卷 1031-1043页
作者: Ma, Hao Yang, Jingyuan Huang, Hui Shenzhen University Visual Computing Research Center College of Computer Science and Software Engineering Shenzhen China (GRID:grid.263488.3) (ISNI:0000 0001 0472 9649)
Exemplar-based image translation involves converting semantic masks into photorealistic images that adopt the style of a given ***,most existing GAN-based translation methods fail to produce photorealistic *** this st... 详细信息
来源: 评论
A systematic mapping to investigate the application of machine learning techniques in requirement engineering activities
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第6期9卷 1412-1434页
作者: Shoaib Hassan Qianmu Li Khursheed Aurangzeb Affan Yasin Javed Ali Khan Muhammad Shahid Anwar School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjingJiangsuChina Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadhSaudi Arabia School of Software Northwestern Polytechnical UniversityXianShaanxiChina Department of Computer Science School of PhysicsEngineering&Computer ScienceUniversity of HertfordshireHatfieldUK Department of AI and Software Gachon University Seongnam-siSeongnamSouth Korea
Over the past few years,the application and usage of Machine Learning(ML)techniques have increased exponentially due to continuously increasing the size of data and computing *** the popularity of ML techniques,only a... 详细信息
来源: 评论
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1901-1918页
作者: Ahmad O.Aseeri Sajjad Hussain Chauhdary Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science Texas Tech UniversityLubbockUSA
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ... 详细信息
来源: 评论
CEMOP: Enhancing MOBA match outcome predictions by understanding teammates and opponents effects  3
CEMOP: Enhancing MOBA match outcome predictions by understan...
收藏 引用
3rd International Symposium on computer Applications and Information Systems, ISCAIS 2024
作者: Zhao, Jiangfeng College of Computer Science and Software Engineering Shenzhen University Shenzhen518057 China
Multiplayer Online Battle Arena (MOBA) games currently dominate the esports landscape, offering a concrete and vivid embodiment for team comparisons, where accurately predicting the winning team is both important and ... 详细信息
来源: 评论
Rainfall Process Similarity Algorithm Research Based on Deep Learning by Using Precipitation Images  7
Rainfall Process Similarity Algorithm Research Based on Deep...
收藏 引用
7th International Conference on computer Information Science and Application Technology, CISAT 2024
作者: Yu, Yufeng Wu, Panqi Cai, Difei Liu, Weifu Wang, Xuhang Hohai University College of Computer Science and Software Engineering Nanjing210098 China
Rainfall is the main cause of flood disasters, and analyzing its features plays a crucial role in preventing flood disasters. How to extract rainfall process features and conduct rainfall similarity analysis is a chal... 详细信息
来源: 评论
Certrust:An SDN-Based Framework for the Trust of Certificates against Crossfire Attacks in IoT Scenarios
收藏 引用
computer Modeling in engineering & Sciences 2023年 第3期134卷 2137-2162页
作者: Lei Yan Maode Ma Dandan Li Xiaohong Huang Yan Ma Kun Xie School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijingChina College of Engineering QatarUniversityDohaQatar
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate *** methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on *** these existing mech... 详细信息
来源: 评论