咨询与建议

限定检索结果

文献类型

  • 14,800 篇 会议
  • 6,199 篇 期刊文献
  • 260 册 图书

馆藏范围

  • 21,259 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,817 篇 工学
    • 10,033 篇 计算机科学与技术...
    • 8,353 篇 软件工程
    • 2,590 篇 信息与通信工程
    • 1,712 篇 控制科学与工程
    • 1,394 篇 生物工程
    • 1,202 篇 电气工程
    • 971 篇 生物医学工程(可授...
    • 880 篇 电子科学与技术(可...
    • 832 篇 机械工程
    • 702 篇 光学工程
    • 524 篇 安全科学与工程
    • 488 篇 仪器科学与技术
    • 463 篇 动力工程及工程热...
    • 437 篇 化学工程与技术
    • 407 篇 建筑学
  • 5,753 篇 理学
    • 3,328 篇 数学
    • 1,560 篇 生物学
    • 1,074 篇 物理学
    • 948 篇 统计学(可授理学、...
    • 800 篇 系统科学
    • 459 篇 化学
  • 3,890 篇 管理学
    • 2,414 篇 管理科学与工程(可...
    • 1,639 篇 图书情报与档案管...
    • 1,204 篇 工商管理
  • 936 篇 医学
    • 825 篇 临床医学
    • 737 篇 基础医学(可授医学...
    • 458 篇 药学(可授医学、理...
  • 614 篇 法学
    • 475 篇 社会学
  • 399 篇 经济学
    • 397 篇 应用经济学
  • 399 篇 教育学
    • 383 篇 教育学
  • 209 篇 农学
  • 102 篇 文学
  • 63 篇 军事学
  • 35 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 1,243 篇 software enginee...
  • 1,086 篇 computer science
  • 407 篇 application soft...
  • 373 篇 deep learning
  • 354 篇 computational mo...
  • 335 篇 computer archite...
  • 326 篇 software
  • 304 篇 machine learning
  • 287 篇 accuracy
  • 272 篇 software systems
  • 268 篇 data mining
  • 245 篇 internet of thin...
  • 245 篇 training
  • 239 篇 feature extracti...
  • 222 篇 programming
  • 217 篇 support vector m...
  • 185 篇 testing
  • 184 篇 artificial intel...
  • 183 篇 optimization
  • 170 篇 semantics

机构

  • 342 篇 college of compu...
  • 196 篇 department of co...
  • 122 篇 state key labora...
  • 119 篇 department of co...
  • 115 篇 department of co...
  • 113 篇 school of softwa...
  • 105 篇 department of co...
  • 89 篇 department of co...
  • 74 篇 school of inform...
  • 73 篇 department of co...
  • 68 篇 department of co...
  • 60 篇 school of comput...
  • 59 篇 department of co...
  • 52 篇 department of co...
  • 51 篇 department of co...
  • 49 篇 software enginee...
  • 48 篇 department of co...
  • 46 篇 department of so...
  • 46 篇 department of co...
  • 43 篇 school of comput...

作者

  • 67 篇 rajkumar buyya
  • 47 篇 baowen xu
  • 43 篇 man ka lok
  • 37 篇 stuckey peter j.
  • 33 篇 jiacun wang
  • 29 篇 shen furao
  • 26 篇 xiao qin
  • 25 篇 muhammad waseem ...
  • 25 篇 rehman attique u...
  • 25 篇 sylvain martel
  • 25 篇 mian ajmal
  • 24 篇 kotagiri ramamoh...
  • 23 篇 wang lei
  • 23 篇 parizi reza m.
  • 22 篇 shihab emad
  • 22 篇 bailey james
  • 22 篇 christopher leck...
  • 22 篇 zhao jian
  • 21 篇 qusay h. mahmoud
  • 21 篇 niyato dusit

语言

  • 20,541 篇 英文
  • 566 篇 其他
  • 158 篇 中文
  • 7 篇 德文
  • 6 篇 土耳其文
  • 4 篇 日文
  • 2 篇 俄文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Engineering and Software Engineering"
21259 条 记 录,以下是271-280 订阅
排序:
Characterization of Memory Access in Deep Learning and Its Implications in Memory Management
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 607-629页
作者: Jeongha Lee Hyokyung Bahn Institute of Artificial Intelligence and Software Ewha UniversitySeoul03760Korea Department of Computer Science and Engineering Ewha UniversitySeoul03760Korea
Due to the recent trend of software intelligence in the Fourth Industrial Revolution,deep learning has become a mainstream workload for modern computer *** the data size of deep learning increasingly grows,managing th... 详细信息
来源: 评论
Utilizing Evidential Reasoning (ER) Approach for software Components Selection
收藏 引用
SN computer Science 2025年 第3期6卷 1-13页
作者: Ahmad, Nabot Al-Qerem, Ahmad Omar, Firas Jebreen, Issam Department of Software Engineering Al Zaytoonah University of Jordan Amman Jordan Computer Science Department Zarqa University Zarqa Jordan Business Intelligence Department Al Zaytoonah University of Jordan Amman Jordan Software Engineering Department Middle East University Amman Lebanon
software component selection is one of the most challenging problems for software developers to meet customer needs. Despite various methods researchers propose to aid in component selection, a gap exists in addressin... 详细信息
来源: 评论
3-Multi ranked encryption with enhanced security in cloud computing
收藏 引用
Digital Communications and Networks 2023年 第2期9卷 313-326页
作者: YeEun Kim Junggab Son Reza M.Parizi Gautam Srivastava Heekuck Oh Major in Bio Artificial Intelligence Dept.of Computer Science and EngineeringHanyang UniversityAnsanRepublic of Korea Department of Computer Science Kennesaw State UniversityMariettaUSA Department of Software Engineering Kennesaw State UniversityMariettaUSA Department of Mathematics and Computer Science Brandon UniversityBrandonCanada Research Center for Interneural Computing China Medical UniversityTaichungTaiwanChina Dept.of Computer Science and Engineering Hanyang UniversityAnsanRepublic of Korea
Searchable Encryption(SE)enables data owners to search remotely stored ciphertexts selectively.A practical model that is closest to real life should be able to handle search queries with multiple keywords and multiple... 详细信息
来源: 评论
AI-Based Early Detection of Coronary Artery Disease Using Atherosclerosis Inflammatory and MicroRNA Biomarkers in Angina Patients  6
AI-Based Early Detection of Coronary Artery Disease Using At...
收藏 引用
6th International Conference on Robotics and Automation in Industry, ICRAI 2024
作者: Sajid, Muhammad Hassan, Ali Khan, Dilshad Ahmed Abbas Gilani, Sayed Tanveer Khan, Shoab Ahmed Bakhshi, Asim Dilawar CEME National University of Sciences and Technology Department of Computer and Software Engineering Islamabad Pakistan Rawalpindi Pakistan MCS National University of Sciences and Technology Department of Software Engineering Islamabad Pakistan
Coronary artery disease (CAD) is one of the most common causes of sudden cardiac arrest and is responsible for a high percentage of global mortality. Early diagnosis of CAD in patients with chest pain is challenging. ... 详细信息
来源: 评论
High Performance Automatic ROI Extraction from Hand Images with Convolutional Neural Networks  8
High Performance Automatic ROI Extraction from Hand Images w...
收藏 引用
8th International Artificial Intelligence and Data Processing Symposium, IDAP 2024
作者: Kosmaz Sunnetci, Betul Bingol, Ozkan Gedikli, Eyup Ekinci, Murat Gumushane University Department of Mathematical Engineering Gümüşhane Turkey Gumushane University Department of Software Engineering Gümüşhane Turkey Karadeniz Technical University Department of Software Engineering Trabzon Turkey Karadeniz Technical University Department of Computer Engineering Trabzon Turkey
Automatic ROI extraction from hand images is a critical step in palmprint recognition. Traditional methods involve steps such as identifying the region of the hand, finding the valleys between the fingers and marking ... 详细信息
来源: 评论
Tracking daily paths in home contexts with RSSI fingerprinting based on UWB through deep learning models
收藏 引用
Multimedia Tools and Applications 2024年 1-25页
作者: Polo-Rodríguez, A. Valera, J.C. Peral, J. Gil, D. Medina-Quero, J. Department of Computer Engineering Automation and Robotics University of Granada Granada18071 Spain Alicante03690 Spain Department of Software and Computing Systems University of Alicante Alicante03690 Spain
The field of human activity recognition has evolved significantly, driven largely by advancements in Internet of Things (IoT) device technology, particularly in personal devices. This study investigates the use of ult... 详细信息
来源: 评论
Accurate threat hunting in industrial internet of things edge devices
收藏 引用
Digital Communications and Networks 2023年 第5期9卷 1123-1130页
作者: Abbas Yazdinejad Behrouz Zolfaghari Ali Dehghantanha Hadis Karimipour Gautam Srivastava Reza M.Parizi Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Electrical and Software Engineering University of CalgaryAlbertaCanada Department of Mathematics and Computer Science Brandon UniversityBrandonCanada College of Computing and Software Engineering Kennesaw State UniversityGAUSA Research Center for Interneural Computing China Medical UniversityTaichungTaiwanChina Department of Computer Science and Mathematics Lebanese American UniversityBeirut1102Lebanon
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e... 详细信息
来源: 评论
Detection of Man-in-the-Middle Attack Through Artificial Intelligence Algorithm  12th
Detection of Man-in-the-Middle Attack Through Artificial Int...
收藏 引用
12th International Symposium on Intelligent Manufacturing and Service Systems, IMSS 2023
作者: Taştan, Ahmet Nail Gönen, Serkan Barışkan, Mehmet Ali Kubat, Cemallettin Kaplan, Derya Yıltaş Pashaei, Elham Computer Engineering Department Istanbul Gelisim University İstanbul Turkey Software Engineering Department Istanbul Gelisim University İstanbul Turkey Aeronautical Engineering Department Istanbul Gelisim University İstanbul Turkey Computer Engineering Department Istanbul University-Cerrahpaşa İstanbul Turkey
The amalgamation of information technologies and progressive wireless communication systems has profoundly impacted various facets of everyday life, encompassing communication mediums, occupational procedures, and liv... 详细信息
来源: 评论
Student’s Health Exercise Recognition Tool for E-Learning Education
收藏 引用
Intelligent Automation & Soft Computing 2023年 第1期35卷 149-161页
作者: Tamara al Shloul Madiha Javeed Munkhjargal Gochoo Suliman AAlsuhibany Yazeed Yasin Ghadi Ahmad Jalal Jeongmin Park Department of Humanities and Social Science Al Ain UniversityAl Ain15551UAE Department of Computer Science Air UniversityIslamabad44000Pakistan Department of Computer Science and Software Engineering United Arab Emirates UniversityAl Ain15551UAE Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Computer Science and Software Engineering Al Ain UniversityAl Ain15551UAE Department of Computer Engineering Korea Polytechnic UniversitySiheung-siGyeonggi-do237Korea
Due to the recently increased requirements of e-learning systems,multiple educational institutes such as kindergarten have transformed their learning towards virtual *** student health exercise is a difficult task but... 详细信息
来源: 评论
Defect Detection Model Using Time Series Data Augmentation and Transformation
收藏 引用
computers, Materials & Continua 2024年 第2期78卷 1713-1730页
作者: Gyu-Il Kim Hyun Yoo Han-Jin Cho Kyungyong Chung Department of Computer Science Kyonggi UniversitySuwon-si16227Korea Contents Convergence Software Research Institue Kyonggi UniversitySuwon-si16227Korea Department of Energy IT Engineering Far East UniversityEumsung-gun27601Korea Division of AI Computer Science and Engineering Kyonggi UniversitySuwon-si16227Korea
Time-series data provide important information in many fields,and their processing and analysis have been the focus of much ***,detecting anomalies is very difficult due to data imbalance,temporal dependence,and ***,m... 详细信息
来源: 评论