咨询与建议

限定检索结果

文献类型

  • 1,763 篇 会议
  • 1,081 篇 期刊文献
  • 45 册 图书

馆藏范围

  • 2,889 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,800 篇 工学
    • 1,454 篇 计算机科学与技术...
    • 1,201 篇 软件工程
    • 358 篇 信息与通信工程
    • 269 篇 控制科学与工程
    • 216 篇 生物工程
    • 165 篇 电气工程
    • 148 篇 生物医学工程(可授...
    • 106 篇 机械工程
    • 95 篇 电子科学与技术(可...
    • 87 篇 光学工程
    • 82 篇 安全科学与工程
    • 72 篇 网络空间安全
    • 64 篇 仪器科学与技术
    • 64 篇 动力工程及工程热...
    • 64 篇 交通运输工程
  • 813 篇 理学
    • 464 篇 数学
    • 235 篇 生物学
    • 165 篇 物理学
    • 140 篇 统计学(可授理学、...
    • 100 篇 系统科学
    • 68 篇 化学
  • 568 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 222 篇 图书情报与档案管...
    • 186 篇 工商管理
  • 158 篇 医学
    • 141 篇 临床医学
    • 130 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
    • 69 篇 公共卫生与预防医...
  • 81 篇 法学
  • 77 篇 教育学
    • 73 篇 教育学
  • 72 篇 经济学
    • 71 篇 应用经济学
  • 25 篇 农学
  • 12 篇 军事学
  • 9 篇 艺术学
  • 8 篇 文学

主题

  • 125 篇 software enginee...
  • 83 篇 computer science
  • 74 篇 machine learning
  • 67 篇 computational mo...
  • 64 篇 deep learning
  • 62 篇 accuracy
  • 61 篇 software
  • 61 篇 training
  • 56 篇 cloud computing
  • 55 篇 internet of thin...
  • 51 篇 quality of servi...
  • 50 篇 resource managem...
  • 50 篇 feature extracti...
  • 48 篇 grid computing
  • 44 篇 computer archite...
  • 44 篇 security
  • 43 篇 application soft...
  • 40 篇 artificial intel...
  • 39 篇 data models
  • 38 篇 optimization

机构

  • 126 篇 college of compu...
  • 73 篇 department of co...
  • 52 篇 department of co...
  • 38 篇 state key labora...
  • 32 篇 national enginee...
  • 27 篇 college of intel...
  • 26 篇 grid computing a...
  • 24 篇 shenzhen univers...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 20 篇 department of co...
  • 19 篇 department of in...
  • 19 篇 school of softwa...
  • 18 篇 department of co...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 16 篇 department of co...
  • 16 篇 school of softwa...
  • 16 篇 institute of com...
  • 15 篇 department of co...

作者

  • 50 篇 rajkumar buyya
  • 26 篇 ismail leila
  • 23 篇 buyya rajkumar
  • 19 篇 shen linlin
  • 17 篇 leung victor c.m...
  • 17 篇 muhammad adnan k...
  • 16 篇 jiannong cao
  • 15 篇 wang xiaofei
  • 14 篇 tan kay chen
  • 14 篇 xiaofei wang
  • 13 篇 parizi reza m.
  • 13 篇 materwala huned
  • 13 篇 cao jiannong
  • 12 篇 victor c. m. leu...
  • 12 篇 lin qiuzhen
  • 12 篇 zander carol
  • 12 篇 srivastava gauta...
  • 11 篇 niyato dusit
  • 11 篇 muhammad waseem ...
  • 11 篇 leila ismail

语言

  • 2,710 篇 英文
  • 166 篇 其他
  • 13 篇 中文
  • 2 篇 德文
检索条件"机构=Computing and Software Engineering Department"
2889 条 记 录,以下是161-170 订阅
排序:
Computer-Aided Potato Disease Detection by Using Deep Learning Techniques
Computer-Aided Potato Disease Detection by Using Deep Learni...
收藏 引用
International Conference on Green Energy, computing, and Intelligent Technology, GEn-CITy 2023
作者: Razaq, Fareeha Bilal, Muhammad Ramzan, Muhammad Naveed, Muhammad Razzaq, Samreen Department of Computer Science University of Sargodha Sargodha Pakistan Department of Computing and Information Systems School of Engineering and Technology Sunway University Petaling Jaya Malaysia Department of Software Engineering University of Sargodha Sargodha Pakistan School of Electronics and Computer Science University of Southampton Malaysia Iskandar Puteri Malaysia
Potato is the most widely grown and consumed food throughout the world. There are a number of potato crop diseases that affect production, and these diseases differ in symptoms, circumstances, and controls. Early dete... 详细信息
来源: 评论
Adjusting Logit in Gaussian Form for Long-Tailed Visual Recognition
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第10期5卷 5026-5039页
作者: Li, Mengke Cheung, Yiu-Ming Lu, Yang Hu, Zhikai Lan, Weichao Huang, Hui Shenzhen518132 China Hong Kong Baptist University Department of Computer Science 999077 Hong Kong Xiamen University Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen361005 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China
It is not uncommon that real-world data are distributed with a long tail. For such data, the learning of deep neural networks becomes challenging because it is hard to classify tail classes correctly. In the literatur... 详细信息
来源: 评论
A Hybrid Search Method for Accelerating Convolutional Neural Architecture Search  23
A Hybrid Search Method for Accelerating Convolutional Neural...
收藏 引用
15th International Conference on Machine Learning and computing, ICMLC 2023
作者: Xun, Zhou Songbai, Liu Ka-Chun, Wong Qiuzhen, Lin Kaychen, Tan The Department of Computer Science City University of Hong Kong Hong Kong College of Computer Science and Software Engineering Shenzhen University KA-CHun Wong China College of Computer Science and Software Engineering Shenzhen University China The Department of Computing The Hong Kong Polytechnic University Hong Kong
The performance evaluation of candidate architectures is a key step in evolution-based neural architecture search (ENAS). Generally, high-fidelity evaluation is desired for finding the optimal architecture but suffers... 详细信息
来源: 评论
An IT/OT Converged Cyber Range Framework Supporting Ensemble of Large Multimodal Models-Human Teaming and RAG Capability for Bigdata Information Retrieval - 6G Perspective
An IT/OT Converged Cyber Range Framework Supporting Ensemble...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Rahman, M. Abdur Islam, M. Saiful Islam, M. Repon Hossain, M. Shamim Al-Hazzaa, Selwa University of Prince Mugrin Cyber Security and Forensic Computing Department Medina Saudi Arabia UoL Worldwide University of London London United Kingdom Khulna University of Engineering & Technology Department of Computer Science and Engineering Khulna Bangladesh King Saud University Department of Software Engineering Riyadh Saudi Arabia Riyadh Saudi Arabia
In IT/OT converged enterprise networks, the management of multimodal big data has surpassed human capabilities, presenting critical challenges in business decision-making. This paper introduces an innovative IT/OT Con... 详细信息
来源: 评论
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 93-115页
作者: Shafi Ullah Sibghat Ullah Bazai Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed Department of Computer Engineering Balochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Department of Information Technology Balochistan University of Information TechnologyEngineeringand Management SciencesQuetta87300Pakistan Department of Information Systems College of Computer Sciences and Information TechnologyKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Management Information Systems College of Business AdministrationKing Faisal UniversityHofuf in Al-Ahsa31982Saudi Arabia Department of Software Engineering College of ComputingRiphah International UniversityFaisalabad44000Pakistan Department of Electrical Engineering Balochistan University of Information Technology Engineeringand Management SciencesQuetta87300Pakistan Department of Mathematics College of Science Al-ZulfiMajmaah UniversityAl-Majmaah11952Saudi Arabia
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... 详细信息
来源: 评论
Secure software Development in Google Colab
Secure Software Development in Google Colab
收藏 引用
2023 IEEE World AI IoT Congress, AIIoT 2023
作者: Potluri, Tarun Shi, Yong Shahriar, Hossain Lo, Dan Parizi, Reza Chi, Hongmei Qian, Kai Kennesaw State University College of Computing and Software Engineering United States Florida A&M University Department of Computer and Information Sciences TallahasseeFL United States
software is said to be secure if it has been developed and designed with security as its top priority. This entails implementing secure coding practices, performing vulnerability testing and repair, as well as continu... 详细信息
来源: 评论
Revolutionizing Image Recognition: Next-Generation CNN Architectures for Handwritten Digits and Objects  8
Revolutionizing Image Recognition: Next-Generation CNN Archi...
收藏 引用
8th IEEE Symposium on Wireless Technology and Applications, ISWTA 2024
作者: Absur, Md Nurul Nasif, Kazi Fahim Ahmad Saha, Sourya Nova, Sifat Nawrin Department of Computer Science City University of New York New York United States College of Computing and Software Engineering Kennesaw State University GA United States Department of Computer Science Chalmers University of Technology Gothenburg Sweden
This study addresses the pressing need for computer systems to interpret digital media images with a level of sophistication comparable to human visual perception. By leveraging Convolutional Neural Networks (CNNs), w... 详细信息
来源: 评论
Enhancing Communication Accessibility:UrSL-CNN Approach to Urdu Sign Language Translation for Hearing-Impaired Individuals
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第10期141卷 689-711页
作者: Khushal Das Fazeel Abid Jawad Rasheed Kamlish Tunc Asuroglu Shtwai Alsubai Safeeullah Soomro Department of Computer Engineering Modeling Electronics and Systems EngineeringUniversity of CalabriaRende Cosenza87036Italy Department of Information Systems University of Management and TechnologyLahore54770Pakistan Department of Computer Engineering Istanbul Sabahattin Zaim UniversityIstanbul34303Turkey Department of Software Engineering Istanbul Nisantasi UniversityIstanbul34398Turkey Department of Computer Science COMSATS University IslamabadLahore CampusLahore54700Pakistan Faculty of Medicine and Health Technology Tampere UniversityTampere33720Finland Department of Computer Science College of Computer Engineering and Sciences in Al-KharjPrince Sattam Bin Abdulaziz UniversityP.O.Box 151Al-Kharj11942Saudi Arabia Second Department of Computer Science College of Engineering and ComputingGeorge Mason UniversityFairfaxVA 4418USA
Deaf people or people facing hearing issues can communicate using sign language(SL),a visual *** works based on rich source language have been proposed;however,the work using poor resource language is still *** other ... 详细信息
来源: 评论
Quantum Machine Learning for Security Data Analysis
Quantum Machine Learning for Security Data Analysis
收藏 引用
2023 IEEE World AI IoT Congress, AIIoT 2023
作者: Bandi, Dhanunjai Shi, Yong Shahriar, Hossain Lo, Dan Suo, Kun Chi, Hongmei Qian, Kai Kennesaw State University College of Computing and Software Engineering United States Florida A&M University Department of Computer and Information Sciences TallahasseeFL United States
In this paper, we apply Quantum Machine Learning to analyze security datasets. We compare cross-models, Quantum Machine Learning (QML) against Classical Machine Learning (CML), performance with increasing data size, a... 详细信息
来源: 评论
Residential Electricity Power Forecasting using GRU-based CNN and SAE Ensembler
Residential Electricity Power Forecasting using GRU-based CN...
收藏 引用
2023 IEEE International Conference on Emerging Trends in engineering, Sciences and Technology, ICES and T 2023
作者: Raza, Ali Ali, Usman Ali, Zain Saeed, Muhammad Hamza Khan, Raja Jalees Ul Hussen Ayub, Nasir COMSATS University Islamabad Department of Computer Science WahCantt Campus Pakistan Riphah International University Computing Department Faisalabad Pakistan HITEC University Department of Electrical Engineering Taxila Pakistan National Textile University Department of Computer Science Faisalabad Pakistan Superior University Gold Campus Department of Software Engineering Lahore Pakistan Capital University of Science and Technology Department of Software Engineering Islamabad Pakistan
Smart grids play an important role to resolves issues related to electricity. Electrical load forecasting can be performed through smart grids to acquire knowledge about the electrical load that will be needed in the ... 详细信息
来源: 评论