咨询与建议

限定检索结果

文献类型

  • 3,950 篇 会议
  • 2,067 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,777 篇 工学
    • 3,037 篇 计算机科学与技术...
    • 2,464 篇 软件工程
    • 753 篇 信息与通信工程
    • 533 篇 控制科学与工程
    • 417 篇 生物工程
    • 339 篇 电气工程
    • 262 篇 生物医学工程(可授...
    • 230 篇 机械工程
    • 223 篇 电子科学与技术(可...
    • 188 篇 光学工程
    • 141 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 131 篇 化学工程与技术
    • 128 篇 动力工程及工程热...
    • 124 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,689 篇 理学
    • 960 篇 数学
    • 450 篇 生物学
    • 365 篇 物理学
    • 301 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 147 篇 化学
  • 1,142 篇 管理学
    • 711 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 185 篇 基础医学(可授医学...
  • 160 篇 法学
    • 119 篇 社会学
  • 135 篇 教育学
    • 130 篇 教育学
  • 126 篇 经济学
    • 125 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 文学
  • 15 篇 艺术学
  • 1 篇 哲学

主题

  • 231 篇 software enginee...
  • 170 篇 computational mo...
  • 144 篇 feature extracti...
  • 140 篇 training
  • 135 篇 semantics
  • 125 篇 deep learning
  • 112 篇 machine learning
  • 112 篇 software
  • 110 篇 computer science
  • 107 篇 accuracy
  • 100 篇 data models
  • 96 篇 cloud computing
  • 88 篇 computer archite...
  • 85 篇 predictive model...
  • 81 篇 security
  • 80 篇 quality of servi...
  • 80 篇 data mining
  • 74 篇 optimization
  • 72 篇 visualization
  • 71 篇 internet of thin...

机构

  • 232 篇 college of compu...
  • 105 篇 national enginee...
  • 73 篇 department of co...
  • 70 篇 state key labora...
  • 66 篇 shanghai key lab...
  • 58 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 college of intel...
  • 52 篇 department of co...
  • 51 篇 software enginee...
  • 50 篇 school of big da...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 40 篇 tianjin key labo...
  • 36 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 34 篇 state key labora...
  • 34 篇 school of softwa...

作者

  • 54 篇 rajkumar buyya
  • 47 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 27 篇 buyya rajkumar
  • 26 篇 ismail leila
  • 24 篇 yuanping xu
  • 24 篇 zuohua ding
  • 24 篇 xu yuanping
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 20 篇 zhu huibiao
  • 20 篇 tao dacheng
  • 20 篇 xiaofei wang
  • 19 篇 qi liu
  • 19 篇 victor c. m. leu...
  • 19 篇 leung victor c.m...

语言

  • 5,704 篇 英文
  • 346 篇 其他
  • 51 篇 中文
  • 3 篇 德文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computing and Software Engineering"
6095 条 记 录,以下是671-680 订阅
排序:
Deep Learning for Violence Detection in Surveillance: The Role of Transfer Learning and Pre-Trained Models
Deep Learning for Violence Detection in Surveillance: The Ro...
收藏 引用
Information Technology (ACIT)
作者: Anum Ilyas Surayya Obaid Narmeen Zakaria Bawany Department of Computer Science and Software Engineering Center for Computing Research Jinah University for Women Karachi Pakistan
In recent years, the use of CCTV footage for proactive crime prevention has surged, particularly in public places like airports, train stations, and malls. However, the efficacy of these surveillance systems becomes q...
来源: 评论
Formal Verification Based Synthesis for Behavior Trees  9th
Formal Verification Based Synthesis for Behavior Trees
收藏 引用
9th International Symposium on Dependable software engineering: Theories, Tools and Applications, SETTA 2023
作者: Hong, Weijiang Chen, Zhenbang Li, Minglong Li, Yuhan Huang, Peishan Wang, Ji College of Computer National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology Changsha China Institute for Quantum Information & State Key Laboratory of High Performance Computing National University of Defense Technology Changsha China
Behavior trees (BTs) have been extensively applied in the area of both computer games and robotics, as the control architectures. However, the construction of BTs is labor-expensive, time-consuming, and even impossibl... 详细信息
来源: 评论
Investigation on Analog and Digital Modulations Recognition Using Machine Learning Algorithms
收藏 引用
World Journal of engineering and Technology 2024年 第4期12卷 867-884页
作者: Jean Ndoumbe Ivan Basile Kabeina Gaelle Patricia Talotsing Soubiel-Noël Nkomo Biloo Laboratory of Computer Engineering Data Science and Artificial Intelligence National Higher Polytechnic School of Douala Douala Cameroon Mobile Computing and Networking Research Laboratory Department of Computer and Software Engineering Polytechnique Montreal Montreal Canada
In the field of radiocommunication, modulation type identification is one of the most important characteristics in signal processing. This study aims to implement a modulation recognition system on two approaches to m... 详细信息
来源: 评论
Buffer with Feature Tokens: Combating Confusion in Medical Image Continual Learning
Buffer with Feature Tokens: Combating Confusion in Medical I...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Zheming Fan Weiting Chen Jiahao Fan Ruizhi Yu Shanghai Key Laboratory of Trustworthy Computing MOE Research Center of Software/Hardware Co-Design Engineering East China Normal University
Due to its complexity and privacy concerns, medical data is often difficult to collect fully at once. New data emerges with the discovery of new diseases and advances in medical technology, but privacy concerns limit ... 详细信息
来源: 评论
Exploring Deep Learning and Grad-CAM for Speech-Based Detection of Mild Traumatic Brain Injury
Exploring Deep Learning and Grad-CAM for Speech-Based Detect...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Rojas, Fredy Madanian, Samaneh Templeton, John Michael Poellabauer, Christian Schneider, Sandra L. Department of Computer Science and Software Engineering Auckland New Zealand University of South Florida Department of Computer Science and Engineering TampaFL United States Florida International University School of Computing and Information Sciences MiamiFL United States Saint Mary's College Department of Communicative Sciences & Disorders Notre DameIN United States
Mild traumatic brain injury (mTBI) is challenging to diagnose due to its subtle and transient symptoms, making noninvasive diagnostic tools crucial for early detection. This study explores the use of a custom ResNet d... 详细信息
来源: 评论
Identification of Molecular Biomarkers and Key Pathways among Idiopathic pulmonary fibrosis (IPF), Chronic Obstructive Pulmonary Disease (COPD) and Lung cancer  26
Identification of Molecular Biomarkers and Key Pathways amon...
收藏 引用
26th International Conference on Computer and Information Technology, ICCIT 2023
作者: Yasmin, Mst. Farjana Faruk Hosen, Md. Basar, Md. Abul Alam Shadhin, Khairul Trisha, Arifa Ferdoushi Shahin Uddin, Muhammad Mawlana Bhashani Science and Technology University Department of Information and Communication Technology Tangail1902 Bangladesh Department of Computing and Information System Dhaka Ashulia Bangladesh Department of Computer Science and Engineering Kanchon Purbachal American City1460 Bangladesh Department of Software Engineering Dhaka Ashulia Bangladesh
Lung cancer (LC), idiopathic pulmonary fibrosis (IPF) and chronic obstructive pulmonary disease (COPD) are the most fatal disorders in the globe, generating frequent human issues. Having IPF and COPD are the risk fact... 详细信息
来源: 评论
Towards the Utilization of Parallel Programming to Speed Up RAM Forensics  10
Towards the Utilization of Parallel Programming to Speed Up ...
收藏 引用
10th International Conference on software Defined Systems, SDS 2023
作者: Al-Sharif, Ziad A. Alhamouri, Rahaf Jararweh, Yaser Lewis University Dept. of Engineering Computing and Mathematical Sciences Romeoville United States Jordan University of Sci. and Tech. Dept. of Software Engineering Irbid Jordan Jordan University of Sci. and Tech. Dept. of Computer Science Irbid Jordan
Memory forensics uses volatile digital artifacts as evidence about criminal activities. Analyzing captured memory dumps for volatile data requires time and effort. This paper studies the utilization of parallel progra... 详细信息
来源: 评论
A Novel Model-Driven Approach for Visual Impaired People Assistance OPTIC ALLY  3
A Novel Model-Driven Approach for Visual Impaired People Ass...
收藏 引用
3rd International Conference on Latest Trends in Electrical engineering and computing Technologies, INTELLECT 2022
作者: Rana, Laiba Rehman, Attique Ur Javaid, Sabeen Ali, Tahir Muhammad University of Sialkot Faculty of Computing and It Department of Software. Engineering Sialkot Pakistan Gulf University for Science and Technology Department of Computer Sciences Mubarak Al-Abdullah Kuwait
People having visual impairment can't perform routine tasks on their own such that they are obliged to perform even the simplest task with assistance. Since their issue can't be resolved with visual glasses or... 详细信息
来源: 评论
Weapon Detection Identification and Classification for DCNN and YOLO-V5 Techniques  5
Weapon Detection Identification and Classification for DCNN ...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Ashok Kumar, J. Dhivya, G. Selvaraj, P. Karthikeyan, V. Ganesh Ramesh, S.P. Lakshmi, S. Jeya Saravanakumar, R. Karpagam Academy of Higher Education Department of Computer Applications Tamil Nadu Coimbatore India School of Computer Science and Engineering Department of Computer Science and Engineering Galgotias University Uttar Pradesh Greater Noida India School of Computing SASTRA Deemed to Be University Thanjavur Tamil Nadu Thirumalaisamudram India Iconix Software Solution Tamil Nadu Tirunelveli India
Over 850,000 people die every year as a direct result of gun violence, yet civilians hold more than 85% of the world's weapons. Detecting weapons via manual surveillance has not been successful. It is critical to ... 详细信息
来源: 评论
Facial Expression Recognition Based on TripletLoss and Attention Mechanism
Facial Expression Recognition Based on TripletLoss and Atten...
收藏 引用
International Conference on Automation and computing (ICAC)
作者: Rongqiang Gou Qiuyan Gai Zhijie Xu Yuanping Xu Chaolong Zhang Jin Jin Jia He Yajing Shi School of Software Engineering Chengdu University of Information Technology Chengdu China School of Computing and Engineering University of Huddersfield Huddersfield UK
The paper proposes a facial expression recognition method called Triplet-Loss Attention Network (TAN), which aims to address the problem of large intra-class and inter-class distances in facial expression recognition....
来源: 评论