咨询与建议

限定检索结果

文献类型

  • 1,835 篇 会议
  • 1,569 篇 期刊文献
  • 51 册 图书

馆藏范围

  • 3,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,215 篇 工学
    • 1,701 篇 计算机科学与技术...
    • 1,379 篇 软件工程
    • 478 篇 信息与通信工程
    • 329 篇 控制科学与工程
    • 277 篇 电气工程
    • 267 篇 生物工程
    • 216 篇 生物医学工程(可授...
    • 160 篇 机械工程
    • 160 篇 电子科学与技术(可...
    • 141 篇 光学工程
    • 116 篇 动力工程及工程热...
    • 100 篇 安全科学与工程
    • 93 篇 网络空间安全
    • 86 篇 交通运输工程
    • 81 篇 化学工程与技术
  • 1,046 篇 理学
    • 577 篇 数学
    • 306 篇 生物学
    • 223 篇 物理学
    • 181 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 90 篇 化学
  • 690 篇 管理学
    • 455 篇 管理科学与工程(可...
    • 241 篇 图书情报与档案管...
    • 210 篇 工商管理
  • 249 篇 医学
    • 213 篇 临床医学
    • 181 篇 基础医学(可授医学...
    • 116 篇 公共卫生与预防医...
    • 98 篇 药学(可授医学、理...
  • 96 篇 法学
    • 73 篇 社会学
  • 76 篇 经济学
    • 75 篇 应用经济学
  • 50 篇 教育学
  • 43 篇 农学
  • 9 篇 文学
  • 7 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学

主题

  • 122 篇 deep learning
  • 114 篇 machine learning
  • 90 篇 accuracy
  • 84 篇 feature extracti...
  • 83 篇 training
  • 76 篇 computational mo...
  • 72 篇 internet of thin...
  • 70 篇 software enginee...
  • 67 篇 computer science
  • 64 篇 educational inst...
  • 57 篇 optimization
  • 57 篇 artificial intel...
  • 52 篇 predictive model...
  • 52 篇 security
  • 48 篇 cloud computing
  • 47 篇 convolutional ne...
  • 45 篇 blockchain
  • 43 篇 data models
  • 42 篇 data mining
  • 42 篇 semantics

机构

  • 358 篇 college of compu...
  • 69 篇 shenzhen univers...
  • 44 篇 state key labora...
  • 41 篇 college of compu...
  • 36 篇 department of co...
  • 34 篇 college of compu...
  • 32 篇 the college of c...
  • 30 篇 department of co...
  • 30 篇 department of co...
  • 28 篇 national enginee...
  • 23 篇 software college...
  • 23 篇 department of co...
  • 23 篇 college of compu...
  • 22 篇 school of inform...
  • 22 篇 college of intel...
  • 22 篇 department of so...
  • 18 篇 department of co...
  • 18 篇 college of compu...
  • 17 篇 school of softwa...
  • 17 篇 college of compu...

作者

  • 51 篇 leung victor c.m...
  • 29 篇 ismail leila
  • 26 篇 shen linlin
  • 24 篇 leung victor c. ...
  • 21 篇 lin qiuzhen
  • 20 篇 li jianqiang
  • 19 篇 pan haoyuan
  • 18 篇 materwala huned
  • 17 篇 niyato dusit
  • 17 篇 muhammad waseem ...
  • 17 篇 yazeed yasin gha...
  • 16 篇 victor c. m. leu...
  • 15 篇 chan tse-tin
  • 15 篇 wang xiaofei
  • 15 篇 jiacun wang
  • 15 篇 guo ping
  • 14 篇 carmi paz
  • 14 篇 tan kay chen
  • 14 篇 r. saravanakumar
  • 13 篇 huang ziyun

语言

  • 2,815 篇 英文
  • 618 篇 其他
  • 34 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of College of Computer Science& Software Engineering"
3455 条 记 录,以下是811-820 订阅
排序:
CEER:Cooperative Energy-Efficient Routing Mechanism for Underwater Wireless Sensor Networks Using Clusters
收藏 引用
computer Systems science & engineering 2023年 第6期45卷 2587-2602页
作者: Sayyed Mudassar Shah Tariq Hussain Babar Shah Farman Ali Khalid Zaman Kyung-Sup Kwak Institute of Computer Science&Information Technology the University of Agriculture Peshawar25000Pakistan High Performance Computing and Networking Institute National Research Council(ICAR-CNR)Naples80131Italy College of Technological Innovation Zayed UniversityDubai19282UAE Department of Software Sejong UniversitySeoul05006Korea Department of Information and Communication Engineering Inha UniversityIncheon22212Korea
Underwater acoustic sensor networks(UWASNs)aim to find varied offshore ocean monitoring and exploration *** most of these applications,the network is composed of several sensor nodes deployed at different depths in th... 详细信息
来源: 评论
Intelligent Blood Flow Velocity Calculation using Deep Belief Network with Harmony Search Algorithm  2
Intelligent Blood Flow Velocity Calculation using Deep Belie...
收藏 引用
2nd International Conference on Electronics and Renewable Systems, ICEARS 2023
作者: Mahendran, Radha Ala Walid, Md. Abul Vijaya Pratap, G. Pradeep, Aneesh Soumya, M. Udhayaraja, P. Institute of Science and Technology and Advanced Studies. Pv Department of Bioinformatics Vels Tamilnadu Chennai India Khulna9203 Bangladesh Sga Gov. Degree College Andhra Pradesh India New Uzbekistan University Software Engineering Tashkent Uzbekistan Sr University Department of Computer Science & Artificial Intelligence Telangana Warangal India Excel College for Commerce and Science Department of Microbiology Tamilnadu Namakkal India
Generally, the procedure of blood flow velocity computation contains gathered data on the movement of red blood cells or other indicators of blood flow and utilizes that data to compute the velocity of blood flows wit... 详细信息
来源: 评论
TCSloT: Text Guided 3D Context and Slope Aware Triple Network for Dental Implant Position Prediction
TCSloT: Text Guided 3D Context and Slope Aware Triple Networ...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Yang, Xinquan Xie, Jinheng Li, Xuechen Li, Xuguang Shen, Linlin Deng, Yongqiang Shenzhen University College of Computer Science and Software Engineering Shenzhen China National University of Singapore Show Lab Singapore Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China Shenzhen University General Hospital Department of Stomatology Shenzhen China
In implant prosthesis treatment, the surgical guide of implant is used to ensure accurate implantation. However, such design heavily relies on the manual location of the implant position. When deep neural network has ... 详细信息
来源: 评论
2D Animation - Q Version of the AIDS Prevention Short Video  10
2D Animation - Q Version of the AIDS Prevention Short Video
收藏 引用
10th International Conference on Orange Technology, ICOT 2022
作者: Wei, Chun-Cheng Hsieh, Hui-Ming Hung, Long-Chen Chen, Ru-Yi Huang, Jiang-Fang Lu, Xin-Chun Zhong, Yu-Shan School of Software and Big Data Changzhou College of Information Technology Changzhou China Taiwan Shoufu University Department of Computer Science and Multimedia Design Tainan Taiwan Lunghwa University of Science and Technology Department of Electronic Engineering Taiwan
AIDS is a sexually transmitted disease. The medical term is called Acquired Immune Deficiency Syndrome. Medical methods such as cocktail therapy and anticancer drugs can kill AIDS. Although there are currently cured c... 详细信息
来源: 评论
IoHT System Authentication Through the Blockchain Technology: A Review
IoHT System Authentication Through the Blockchain Technology...
收藏 引用
International Conference on Control, Decision and Information Technologies (CoDIT)
作者: Muwafaq Jawad Ali A. Yassin Hamid Ali Abed Al-Asadi Zaid Ameen Abduljabbar Vincent Omollo Nyangaresi Department of Computer Science College of Education for Pure Sciences University of Basrah Basrah Iraq Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and Technology Bando Kenya Department of Applied Electronics Saveetha School of Engineering SIMATS Chennai Tamilnadu India
The growing adoption of the Internet of Things (IoT) terminology in recent years in several domains, including healthcare, has yielded multiple benefits. One of the roles is to support professionals in delivering outs... 详细信息
来源: 评论
Paddy Plant Disease Detection using Hybrid Deep Learning Algorithms
Paddy Plant Disease Detection using Hybrid Deep Learning Alg...
收藏 引用
International conference of Electronics, Communication and Aerospace Technology (ICECA)
作者: R Suguna S Deepa T Kanimozhi M Chandru G Arun Harshini M Department of Computer Science and Engineering Bannari Amman Institute of Technology Sathyamangalam Erode Tamilnadu India Department of Computer Technology - PG Kongu Engineering College Perundurai Erode Tamilnadu Department of Artificial Intelligence and Data Science Sri Eshwar College of Engineering Coimbatore Department of Computer Science VET-Institute of Arts and Science (Co-Education) College Erode Department of Computer Science and Engineering School of Computing Vel Tech Rangarajan Dr Sagunthala R&D Institute of Science and Technology Chennai M.Sc (Software Systems) Kongu Engineering College Perundurai Erode Tamilnadu
Agriculture is the backbone of India’s economy, supporting a large portion of the population and establishing the country as a key global player in food production. India ranks as the second-largest producer of both ... 详细信息
来源: 评论
Group Anomaly Detection: Past Notions, Present Insights, and Future Prospects
收藏 引用
SN computer science 2021年 第3期2卷 219页
作者: Feroze, Aqeel Daud, Ali Amjad, Tehmina Hayat, Malik Khizar Department of Computer Science and Software Engineering International Islamic University Islamabad Pakistan Department of Computer Science and Artificial Intelligence College of Computer Science and Engineering Jeddah University Jeddah Saudi Arabia Department of Information Technology Faculty of Information Technology and Engineering The University of Haripur Haripur Pakistan
Anomaly detection has evolved as a successful research subject in the areas such as bibliometrics, informatics and computer networks including security-based and social networks. Almost all existing anomaly detection ... 详细信息
来源: 评论
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Zhang, Tianning Cai, Miao Zhang, Diming Huang, Hao Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Computer and Information Hohai University Nanjing China College of Computer Engineering Jiangsu University of Science and Technology Nanjing China
Signal Return Oriented Programming (SROP) is a dangerous code reuse attack method. Recently, defense techniques have been proposed to defeat SROP attacks. In this paper, we leverage the signal nesting mechanism provid... 详细信息
来源: 评论
Revolutionizing Image Recognition: Next-Generation CNN Architectures for Handwritten Digits and Objects
Revolutionizing Image Recognition: Next-Generation CNN Archi...
收藏 引用
IEEE Symposium on Wireless Technology and Applications (ISWTA)
作者: Md Nurul Absur Kazi Fahim Ahmad Nasif Sourya Saha Sifat Nawrin Nova Department of Computer Science City University of New York New York USA College of Computing and Software Engineering Kennesaw State University Georgia USA Department of Computer Science Chalmers University of Technology Gothenburg Sweden
This study addresses the pressing need for computer systems to interpret digital media images with a level of sophistication comparable to human visual perception. By leveraging Convolutional Neural Networks (CNNs), w... 详细信息
来源: 评论
Expediting In-Network Federated Learning by Voting-Based Consensus Model Compression
arXiv
收藏 引用
arXiv 2024年
作者: Su, Xiaoxin Zhou, Yipeng Cui, Laizhong Guo, Song College of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Computing Faculty of Science and Engineering Macquarie University Sydney Australia Shenzhen University Shenzhen China Department of Computer Science and Engineering The Hong Kong University of Science and Technology HKSAR Hong Kong
Recently, federated learning (FL) has gained momentum because of its capability in preserving data privacy. To conduct model training by FL, multiple clients exchange model updates with a parameter server via Internet... 详细信息
来源: 评论