咨询与建议

限定检索结果

文献类型

  • 5,695 篇 会议
  • 3,387 篇 期刊文献
  • 146 册 图书

馆藏范围

  • 9,228 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,261 篇 工学
    • 3,310 篇 计算机科学与技术...
    • 2,635 篇 软件工程
    • 1,096 篇 信息与通信工程
    • 1,026 篇 控制科学与工程
    • 752 篇 电气工程
    • 709 篇 电子科学与技术(可...
    • 518 篇 生物工程
    • 503 篇 生物医学工程(可授...
    • 438 篇 机械工程
    • 364 篇 光学工程
    • 334 篇 仪器科学与技术
    • 315 篇 动力工程及工程热...
    • 264 篇 化学工程与技术
    • 246 篇 材料科学与工程(可...
    • 186 篇 交通运输工程
    • 178 篇 安全科学与工程
  • 2,874 篇 理学
    • 1,411 篇 数学
    • 902 篇 物理学
    • 652 篇 生物学
    • 465 篇 统计学(可授理学、...
    • 410 篇 系统科学
    • 278 篇 化学
  • 1,380 篇 管理学
    • 931 篇 管理科学与工程(可...
    • 494 篇 图书情报与档案管...
    • 469 篇 工商管理
  • 532 篇 医学
    • 454 篇 临床医学
    • 358 篇 基础医学(可授医学...
    • 220 篇 药学(可授医学、理...
    • 188 篇 公共卫生与预防医...
  • 222 篇 法学
    • 186 篇 社会学
  • 161 篇 经济学
  • 121 篇 教育学
  • 105 篇 农学
  • 23 篇 文学
  • 22 篇 艺术学
  • 14 篇 军事学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 185 篇 deep learning
  • 166 篇 machine learning
  • 161 篇 computational mo...
  • 159 篇 computer science
  • 156 篇 systems engineer...
  • 140 篇 feature extracti...
  • 129 篇 artificial intel...
  • 114 篇 optimization
  • 114 篇 accuracy
  • 100 篇 control systems
  • 98 篇 neural networks
  • 97 篇 internet of thin...
  • 90 篇 monitoring
  • 89 篇 computer archite...
  • 82 篇 data mining
  • 79 篇 visualization
  • 77 篇 support vector m...
  • 77 篇 predictive model...
  • 76 篇 costs
  • 76 篇 mathematical mod...

机构

  • 52 篇 computer and sys...
  • 39 篇 faculty of compu...
  • 35 篇 department of co...
  • 27 篇 department of in...
  • 27 篇 ieee
  • 25 篇 department of el...
  • 25 篇 institute for sy...
  • 25 篇 faculty of engin...
  • 22 篇 department of co...
  • 21 篇 graduate school ...
  • 20 篇 inesc tec - inst...
  • 19 篇 department of co...
  • 19 篇 computer enginee...
  • 19 篇 department of co...
  • 19 篇 faculty of engin...
  • 17 篇 faculty of compu...
  • 17 篇 faculty of compu...
  • 16 篇 department of sy...
  • 15 篇 department of co...
  • 15 篇 department of in...

作者

  • 56 篇 pedrycz witold
  • 28 篇 tao dacheng
  • 27 篇 el-sayed m.el-ke...
  • 23 篇 abdelwahed motwa...
  • 18 篇 frank knoefel
  • 17 篇 abdelaziz a.abde...
  • 17 篇 nor kamariah noo...
  • 17 篇 chee kyun ng
  • 16 篇 hayashi eiji
  • 16 篇 hamid d. taghira...
  • 15 篇 witold pedrycz
  • 15 篇 gallegos luis en...
  • 15 篇 anwer mustafa hi...
  • 14 篇 noraziah a.
  • 14 篇 tomio watanabe
  • 13 篇 borhanuddin mohd...
  • 13 篇 k. inoue
  • 13 篇 mengchu zhou
  • 13 篇 watanabe tomio
  • 13 篇 siguenza-guzman ...

语言

  • 8,318 篇 英文
  • 806 篇 其他
  • 75 篇 中文
  • 32 篇 日文
  • 7 篇 德文
  • 3 篇 法文
  • 2 篇 俄文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
  • 1 篇 土耳其文
检索条件"机构=Computer and Systems Engineering Faculty of Engineering"
9228 条 记 录,以下是141-150 订阅
排序:
Comparative Analysis of Camera Calibration Algorithms for Football Applications  4
Comparative Analysis of Camera Calibration Algorithms for Fo...
收藏 引用
4th International Workshop on Information Technologies: Theoretical and Applied Problems, ITTAP 2024
作者: Sorokivskyi, Oleksandr Hotovych, Volodymyr Nazarevych, Oleg Shymchuk, Grygorii Department of Computer Science Faculty of Computer Information Systems and Software Engineering Ternopil Ivan Puluj National Technical University Ternopil Ukraine
In solving the problem of automated analysis of football match video recordings, special video cameras are currently used. This work presents a comparative characterization of known algorithms and methods for video ca... 详细信息
来源: 评论
Parameter Tuning in Automatic Detection Algorithm for Detecting Artificial Brain Shift  24
Parameter Tuning in Automatic Detection Algorithm for Detect...
收藏 引用
6th International Conference on Intelligent Medicine and Image Processing, IMIP 2024
作者: Watanabe, Kaoru Noborio, Hiroshi Koeda, Masanao Department of Computer Science Osaka Electro-Communication University Japan Faculty of Computer Science and Systems Engineering Okayama Prefectural University Japan
In neurosurgery to remove brain tumors, DICOM data, a medical imaging standard, is generated preoperatively using CT and MRI. This data is used for surgical planning. However, brain deformation problems, known as brai... 详细信息
来源: 评论
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5035-5048页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis... 详细信息
来源: 评论
Deep Forest-Based Fall Detection in Internet of Medical Things Environment
收藏 引用
computer systems Science & engineering 2023年 第6期45卷 2377-2389页
作者: Mohamed Esmail Karar Omar Reyad Hazem Ibrahim Shehata College of Computing and Information Technology Shaqra UniversityP.O.Box 33Shaqra11961Saudi Arabia Department of Industrial Electronics and Control Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Computer Science Department Faculty of Computers and Artificial IntelligenceSohag UniversitySohag82524Egypt Department of Computer and Systems Engineering Faculty of EngineeringZagazig UniversityZagazig44519Egypt
This article introduces a new medical internet of things(IoT)framework for intelligent fall detection system of senior people based on our proposed deep forest *** cascade multi-layer structure of deep forest classifi... 详细信息
来源: 评论
Assessing Quality of Service Performance in SDN Controllers: POX vs. OpenDaylight  6
Assessing Quality of Service Performance in SDN Controllers:...
收藏 引用
6th International Conference on Advancements in Computing, ICAC 2024
作者: Lokuliyana, Shashika Wijesiri, Pipuni Jayakody, Anuradha Abeygunawardhana, Pradeep K.W. Sri Lanka Institute of Information Technology Faculty of Computing Department of Computer Systems Engineering Malabe Sri Lanka
This research offers a comparative analysis of Qual-ity of Service (QoS) within Software Defined Networks (SDN) by assessing the POX and OpenDaylight controllers across various network topologies. The results show tha... 详细信息
来源: 评论
Enhancing Agricultural Efficiency with IoT-Enabled Precision Irrigation Management Using LoRaWAN Technology  16
Enhancing Agricultural Efficiency with IoT-Enabled Precision...
收藏 引用
16th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2024
作者: Jayasinghe, J.A.S.K. Thennakoon, T.M.H.L. Ruchira, U.G.C. Wimalasena, N.G.C.L. Jayakody, J.A.D.C.A. Pandithage, Dinithi Sri Lanka Institute of Information Technology Faculty of Computing Department of Computer Systems Engineering Malabe Sri Lanka
The Internet of Things-empowered precision irrigation management system with LoRaWAN technology is presented given the growing food requirements across the world and pressing calls for judicious use of water in agricu... 详细信息
来源: 评论
Polymorphic Security Enhancements for Corporate Environments Utilizing Behavior Analytics
Polymorphic Security Enhancements for Corporate Environments...
收藏 引用
2024 International Conference on computer and Applications, ICCA 2024
作者: Wijesinghe, W.M.A.J. Abeysinghe, Y.P.P. Rukshana, M.A.F. Adhikari, A.M.P.S. Abeywardhana, Kavinga Yapa Siriwardhana, Deemantha Sri Lanka Institute of Information Technology Faculty of Computing Department of Computer Systems Engineering Malabe Sri Lanka
Employers should recognize that employees are the most vulnerable aspect of business environments since these cyber hazards are growing because of user neglect, lack of fundamental security discipline, and a fast-chan... 详细信息
来源: 评论
Abnormal event detection in surveillance videos through LSTM auto-encoding and local minima assistance
收藏 引用
Discover Internet of Things 2025年 第1期5卷 1-25页
作者: Sengonul, Erkan Samet, Refik Abu Al-Haija, Qasem Alqahtani, Ali Alsemmeari, Rayan A. Alghamdi, Bandar Alturki, Badraddin Alsulami, Abdulaziz A. Department of Computer Engineering Ankara University Ankara06100 Turkey Department of Cybersecurity Faculty of Computer & Information Technology Jordan University of Science and Technology PO Box 3030 Irbid22110 Jordan Department of Networks & Communications Engineering College of Computer Science & Information Systems Najran University Najran61441 Saudi Arabia Department of Information Technology Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia Department of Information Systems Faculty of Computing and Information Technology King Abdulaziz University Jeddah21589 Saudi Arabia
Abnormal event detection in video surveillance is critical for security, traffic management, and industrial monitoring applications. This paper introduces an innovative methodology for anomaly detection in video data,... 详细信息
来源: 评论
SubmergeStyleGAN: Synthetic Underwater Data Generation with Style Transfer for Domain Adaptation
SubmergeStyleGAN: Synthetic Underwater Data Generation with ...
收藏 引用
2023 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2023
作者: Fathy, Mohamed E. Mohamed, Samer A. Awad, Mohammed I. Munim, Hossam E. Abd El Ain Shams University Mechatronics Engineering Department Faculty of Engineering Egypt Ain Shams University Computer and Systems Engineering Department Faculty of Engineering Egypt University of Bath Department of Electronic and Electrical Engineering Faculty of Engineering and Design United Kingdom
Underwater computer vision applications are challenged by limited access to annotated underwater datasets. Additionally, convolutional neural networks (CNNs) trained on in-air datasets do not perform well underwater d... 详细信息
来源: 评论
Robust steganographic approach using generative adversarial network and compressive autoencoder
收藏 引用
Multimedia Tools and Applications 2024年 1-38页
作者: Qasaimeh, Malik Qtaish, Alaa Abu Aljawarneh, Shadi Department of Computer Information Systems Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan Department of Software Engineering co-joint with the Department of Cyber Security Faculty of Computer and Information Technology Jordan University of Science and Technology Irbid Jordan
Nowadays, social media applications and websites have become a crucial part of people’s lives;for sharing their moments, contacting their families and friends, or even for their jobs. However, the fact that these val... 详细信息
来源: 评论