咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是381-390 订阅
排序:
3-Multi ranked encryption with enhanced security in cloud computing
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 313-326页
作者: YeEun Kim Junggab Son Reza M.Parizi Gautam Srivastava Heekuck Oh Major in Bio Artificial Intelligence Dept.of Computer Science and EngineeringHanyang UniversityAnsanRepublic of Korea Department of Computer Science Kennesaw State UniversityMariettaUSA Department of Software Engineering Kennesaw State UniversityMariettaUSA Department of Mathematics and Computer Science Brandon UniversityBrandonCanada Research Center for Interneural Computing China Medical UniversityTaichungTaiwanChina Dept.of Computer Science and Engineering Hanyang UniversityAnsanRepublic of Korea
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple... 详细信息
来源: 评论
Multi-View Dynamic Kernelized Evidential Clustering
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第12期11卷 2435-2450页
作者: Jinyi Xu Zuowei Zhang Ze Lin Yixiang Chen Weiping Ding the Software Engineering Institute East China Normal UniversityShanghai 200062 Shanghai Key Laboratory of Trustworthy Computing East China Normal UniversityShanghai 200062China IEEE the School of Automation Northwestern Polytechnical UniversityXi’an 710072China the School of Artificial Intelligence and Computer Science Nantong UniversityNantong 226019 the Faculty of Data Science City University of MacaoMacao 999078China
It is challenging to cluster multi-view data in which the clusters have overlapping *** multi-view clustering methods often misclassify the indistinguishable objects in overlapping areas by forcing them into single cl... 详细信息
来源: 评论
ResMHA-Net:Enhancing Glioma Segmentation and Survival Prediction Using a Novel Deep Learning Framework
收藏 引用
Computers, Materials & Continua 2024年 第10期81卷 885-909页
作者: Novsheena Rasool Javaid Iqbal Bhat Najib Ben Aoun Abdullah Alharthi Niyaz Ahmad Wani Vikram Chopra Muhammad Shahid Anwar Department of Computer Science School of Engineering and TechnologyIslamic University of Science and TechnologyAwantipora192122India Faculty of Computing and Technology Al-Baha UniversityAlaqiq65779-7738Saudi Arabia Research Groups in Intelligent Machines National School of Engineers of SfaxUniversity of SfaxSfax3038Tunisia Department of Electrical Engineering College of EngineeringKing Khalid UniversityAbha61421Saudi Arabia Department of Computer Science and Engineering Thapar Institute of Engineering and TechnologyPatiala147004Punjab Department of Electrical and Instrumentation Engineering Thapar Institute of Engineering and TechnologyPatiala147004Punjab Department of AI and Software Gachon UniversitySeongnam-si13120Republic of Korea
Gliomas are aggressive brain tumors known for their heterogeneity,unclear borders,and diverse locations on Magnetic Resonance Imaging(MRI)*** factors present significant challenges for MRI-based segmentation,a crucial... 详细信息
来源: 评论
How AI-enabled SDN technologies improve the security and functionality of industrial IoT network:Architectures,enabling technologies,and opportunities
收藏 引用
Digital Communications and Networks 2023年 第6期9卷 1351-1362页
作者: Jinfang Jiang Chuan Lin Guangjie Han Adnan MAbu-Mahfouz Syed Bilal Hussain Shah Miguel Martínez-García Department of Internet of Things Engineering Hohai UniversityChangzhou213022China Software College Northeastern UniversityShenyang110819China Council for Scientific and Industrial Research(CSIR) Pretoria0184South Africa School of Computing and Mathematics Manchester Metropolitan UniversityManchesterM156BHUK Department of Aeronautical and Automotive Engineering Loughborough UniversityLoughboroughLE113TTUK Department of Electrical and Electronic Engineering Science University of JohannesburgJohannesburgSouth Africa
The ongoing expansion of the Industrial Internet of Things(IIoT)is enabling the possibility of effective Industry 4.0,where massive sensing devices in heterogeneous environments are connected through dedicated communi... 详细信息
来源: 评论
Efficient Prediction of Protein-Ligand Binding Using ESM-2 and Mol2vec with Random Forest Model
Efficient Prediction of Protein-Ligand Binding Using ESM-2 a...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Shrestha Gurung, Bichar Dip Rayamajhi, Manish Baidya, Anushuya Growney, Owen Dongmo Mafo, Helena Naomie Choi, Yun-Seok Gnimpieba, Etienne Z. University of South Dakota Dept. of Biomedical Engineering VermillionSD United States Black Hills State University School of Natural Sciences SpearfishSD United States Kennesaw State University College of Computing and Software Engineering MariettaGA United States
In this study, we present a predictive model for protein-ligand binding interactions, leveraging ESM-2 and Mol2vec embeddings combined with a Random Forest classifier. Our approach was evaluated across three testing s... 详细信息
来源: 评论
An Explainable Counterfeit and Genuine Ethiopian Banknote Classification Using Deep Learning
SSRN
收藏 引用
SSRN 2024年
作者: Woldehana, Yared Dereje Yimer, Mohammed Abebe School of Computing and Informatics Dilla University Dilla Ethiopia Faculty of Computing and Software Engineering Arba Minch University Arba Minch Ethiopia
Counterfeiting is a serious crime with serious impact around the world and in Ethiopia in particular. The national bank of Ethiopia has implemented various countermeasures to combat counterfeiting. The most successful... 详细信息
来源: 评论
Metaverse with Mobile Twin Edge computing: Empowering Optimal Efficiency and Accuracy
Metaverse with Mobile Twin Edge Computing: Empowering Optima...
收藏 引用
2024 International Conference on engineering and computing, ICECT 2024
作者: Bibi, Asma Noor, Umara Rashid, Zahid International Islamic University Faculty of Computing and Information Technology Department of Software Engineering Islamabad Pakistan Kohsar University Department of Computer Science Murree Pakistan Technology Management Economics and Policy Program College of Engineering Seoul National University Seoul08826 Korea Republic of
The concept of Digital Twin has been widely used by researchers to represent physical entities in computer-generated reality in the metaverse. In this research, a novel concept of 'Mobile Twin' is coined. Mobi... 详细信息
来源: 评论
Observation points classifier ensemble for high-dimensional imbalanced classification
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第2期8卷 500-517页
作者: Yulin He Xu Li Philippe Fournier‐Viger Joshua Zhexue Huang Mianjie Li Salman Salloum College of Computer Science&Software Engineering Shenzhen UniversityShenzhenChina Guangdong Laboratory of Artificial Intelligence and Digital Economy(SZ) Shenzhen UniversityShenzhenChina Faculty of Information Technology Macao University of Science and TechnologyMacaoChina School of Computing National University of SingaporeSingaporeSingapore
In this paper,an Observation Points Classifier Ensemble(OPCE)algorithm is proposed to deal with High-Dimensional Imbalanced Classification(HDIC)problems based on data processed using the Multi-Dimensional Scaling(MDS)... 详细信息
来源: 评论
Loan Repayment Predictive Model Using Ensemble Algorithm
Loan Repayment Predictive Model Using Ensemble Algorithm
收藏 引用
SmartBlock4Africa, IEEE
作者: O. Godwin Akinbayo G. Akintola Kolawole B. Adewole David Department of Software Engineering School of Computing Federal University of Technology Akure Ondo State Nigeria
The accurate prediction of loan repayment ability is paramount in any financial industry to minimize risks and enhance decision making. This project centers on the development of a loan repayment predictive model usin... 详细信息
来源: 评论
Success Factors of Requirement Elicitation in the Field of software engineering  4
Success Factors of Requirement Elicitation in the Field of S...
收藏 引用
4th International Conference on Advancements in computing, ICAC 2022
作者: Attanayaka, Buddhima Nawinna, Dasuni Manathunga, Kalpani Abeygunawardhana, Pradeep K.W. Department of Computer Systems Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka Department of Computer Systems & Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Sri Lanka
Requirement elicitation (RE) is a cognitively challenging and time-consuming task in software development due to the numerous challenges associated with it including conflicting requirements, unspoken, or assumed requ... 详细信息
来源: 评论