咨询与建议

限定检索结果

文献类型

  • 2,538 篇 会议
  • 1,726 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 4,287 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,577 篇 工学
    • 1,470 篇 计算机科学与技术...
    • 1,176 篇 软件工程
    • 521 篇 信息与通信工程
    • 486 篇 控制科学与工程
    • 448 篇 电气工程
    • 384 篇 电子科学与技术(可...
    • 269 篇 生物工程
    • 232 篇 机械工程
    • 205 篇 生物医学工程(可授...
    • 199 篇 光学工程
    • 183 篇 动力工程及工程热...
    • 175 篇 仪器科学与技术
    • 128 篇 化学工程与技术
    • 108 篇 交通运输工程
    • 103 篇 材料科学与工程(可...
    • 86 篇 土木工程
  • 1,434 篇 理学
    • 656 篇 数学
    • 471 篇 物理学
    • 307 篇 生物学
    • 198 篇 统计学(可授理学、...
    • 159 篇 系统科学
    • 126 篇 化学
  • 652 篇 管理学
    • 460 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 197 篇 工商管理
  • 216 篇 医学
    • 182 篇 临床医学
    • 143 篇 基础医学(可授医学...
    • 94 篇 药学(可授医学、理...
  • 100 篇 法学
    • 82 篇 社会学
  • 89 篇 经济学
    • 89 篇 应用经济学
  • 53 篇 农学
  • 28 篇 教育学
  • 18 篇 文学
  • 15 篇 军事学
  • 8 篇 艺术学
  • 1 篇 哲学

主题

  • 88 篇 deep learning
  • 82 篇 computer science
  • 79 篇 accuracy
  • 64 篇 computational mo...
  • 63 篇 feature extracti...
  • 62 篇 machine learning
  • 61 篇 training
  • 60 篇 optimization
  • 54 篇 systems engineer...
  • 51 篇 control systems
  • 49 篇 laboratories
  • 46 篇 artificial intel...
  • 45 篇 computer archite...
  • 44 篇 hardware
  • 41 篇 educational inst...
  • 41 篇 data mining
  • 40 篇 neural networks
  • 40 篇 testing
  • 39 篇 switches
  • 39 篇 security

机构

  • 72 篇 department of co...
  • 46 篇 national enginee...
  • 37 篇 key laboratory o...
  • 29 篇 college of compu...
  • 25 篇 department of co...
  • 25 篇 vlsi and system ...
  • 23 篇 department of co...
  • 22 篇 department of el...
  • 21 篇 department of co...
  • 21 篇 university of ch...
  • 18 篇 state key labora...
  • 18 篇 department of el...
  • 17 篇 national enginee...
  • 17 篇 research center ...
  • 17 篇 school of comput...
  • 16 篇 ieee
  • 16 篇 department of co...
  • 15 篇 state key labora...
  • 14 篇 school of system...
  • 14 篇 department of co...

作者

  • 27 篇 zhou mengchu
  • 26 篇 hai jin
  • 20 篇 mengchu zhou
  • 20 篇 liuchen chang
  • 17 篇 dutta paramartha
  • 17 篇 jin hai
  • 16 篇 ligang hou
  • 15 篇 robbi rahim
  • 15 篇 arce gonzalo r.
  • 15 篇 wang jinhui
  • 15 篇 hou ligang
  • 15 篇 meiqin mao
  • 14 篇 han zhu
  • 14 篇 paramartha dutta
  • 13 篇 na gong
  • 13 篇 mohamed k.nour
  • 13 篇 jwo-shiun sun
  • 13 篇 shen linlin
  • 12 篇 abdelwahed motwa...
  • 12 篇 hayashi eiji

语言

  • 4,000 篇 英文
  • 181 篇 其他
  • 98 篇 中文
  • 12 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Department of Computer System Engineering and Technology"
4287 条 记 录,以下是101-110 订阅
排序:
Stock Monitoring and Localization systems for FIFO Method Using RFID Based Pressure Sensing Tag and AI
IEEJ Transactions on Electronics, Information and Systems
收藏 引用
IEEJ Transactions on Electronics, Information and systems 2024年 第9期144卷 894-900页
作者: Hadi, Danang Kumara Song, Zequn Rahmadya, Budi Sun, Ran Takeda, Shigeki Graduate School of Science and Engineering Ibaraki University 4-12-1 Nakanarusawa Ibaraki Hitachi316-8511 Japan Department of Agroindustrial Technology Universitas Muhammadiyah Jember Jember68124 Indonesia Computer System Department Faculty of Information Technology Andalas University Padang25175 Indonesia
This research introduces real-time monitoring and localizing product stock using the First-In-First-Out (FIFO) method with radio frequency identification (RFID) pressure sensing tags. The proposed FIFO system has RFID... 详细信息
来源: 评论
GHVC-Net: Hypervolume Contribution Approximation Based on Graph Neural Network
GHVC-Net: Hypervolume Contribution Approximation Based on Gr...
收藏 引用
2024 IEEE International Conference on systems, Man, and Cybernetics, SMC 2024
作者: Wu, Guotong Nan, Yang Shang, Ke Ishibuchi, Hisao Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen518055 China
This paper proposes a framework called GHVC-Net that uses the graph neural network (GNN) model to approximate each solution's hypervolume contribution (HVC). GHVC-Net is permutation invariant and can handle soluti... 详细信息
来源: 评论
Transfer Learning Based Vascular Stenosis Detection
Transfer Learning Based Vascular Stenosis Detection
收藏 引用
2022 International Conference on Emerging Trends in Smart Technologies, ICETST 2022
作者: Noreen, Aqsa Jawaid, Moazzam Narejo, Sanam Memon, Madeha Kumar, Kunal Mehran University of Engineering & Technology Department of Computer System Engineering Jamshoro Pakistan
One of the leading causes of mortality and morbidity in the global population is coronary artery disease. Clinical data analysis and healthcare professionals have a crucial problem in predicting and diagnosing the dis... 详细信息
来源: 评论
Marine Predators Algorithm with Deep Learning-Based Leukemia Cancer Classification on Medical Images
收藏 引用
computer Modeling in engineering & Sciences 2024年 第10期141卷 893-916页
作者: Sonali Das Saroja Kumar Rout Sujit Kumar Panda Pradyumna Kumar Mohapatra Abdulaziz S.Almazyad Muhammed Basheer Jasser Guojiang Xiong Ali Wagdy Mohamed Department of Computer Science&Engineering Gandhi Institute for TechnologyBPUTBhubaneswar752054India Department of Information Technology Vardhaman College of Engineering(Autonomous)Hyderabad501218TelanganaIndia Department of Electronic&Communication Engineering Vedang Institute of TechnologyBhubaneswar752010India Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Department of Computing and Information Systems School of Engineering and TechnologySunway UniversityJalan UniversitiBandar SunwaySelangor Darul Ehsan47500Malaysia Research Centre for Human-Machine Collaboration(HUMAC) School of Engineering and TechnologySunway UniversityJalan UniversitiBandar SunwaySelangor Darul Ehsan47500Malaysia Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmman11931Jordan
In blood or bone marrow,leukemia is a form of cancer.A person with leukemia has an expansion of white blood cells(WBCs).It primarily affects children and rarely affects *** depends on the type of leukemia and the exte... 详细信息
来源: 评论
Optimized Evaluation of Mobile Base Station by Modern Topological Invariants
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 363-378页
作者: Khalid Hamid Muhammad Waseem Iqbal Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Due to a tremendous increase in mobile traffic,mobile operators have started to restructure their networks to offload their *** directions will lead to fundamental changes in the design of future Fifthgeneration(5G)ce... 详细信息
来源: 评论
Artificial Bee Colony with Cuckoo Search for Solving Service Composition
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 3385-3402页
作者: Fadl Dahan Abdulelah Alwabel Department of Information System College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Sciences Faculty of Computing and Information Technology AlturbahTaiz UniversityTaiz9674Yemen Department of Computer Sciences College of Computer Engineering and SciencesPrince Sattam bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia
In recent years,cloud computing has provided a Software As A Service(SaaS)platform where the software can be reused and applied to fulfill compli-cated user demands according to specific Quality of Services(QoS)*** user... 详细信息
来源: 评论
Securing the IoT Cyber Environment: Enhancing Intrusion Anomaly Detection With Vision Transformers
收藏 引用
IEEE Access 2024年 12卷 82443-82468页
作者: Sana, Laraib Nazir, Muhammad Mohsin Yang, Jing Hussain, Lal Chen, Yen-Lin Ku, Chin Soon Alatiyyah, Mohammed Alateyah, Sulaiman Abdullah Por, Lip Yee Lahore College for Women University Department of Computer Science Punjab Lahore54000 Pakistan Universiti Malaya Department of Computer System and Technology Kuala Lumpur50603 Malaysia The University of Azad Jammu and Kashmir Department of Computer Science and IT Neelum Campus Azad Kashmir13230 Pakistan King Abdullah Campus The University of Azad Jammu and Kashmir Department of Computer Science and IT Azad Kashmir Muzaffarabad13100 Pakistan National Taipei University of Technology Department of Computer Science and Information Engineering Taipei106344 Taiwan Universiti Tunku Abdul Rahman Department of Computer Science Kampar31900 Malaysia Prince Sattam Bin Abdulaziz University College of Sciences and Humanities-Aflaj Department of Computer Science Al-Kharj16278 Saudi Arabia Qassim University College of Computer Department of Computer Engineering Buraydah52571 Saudi Arabia
The ever-expanding Internet of Things (IoT) landscape presents a double-edged sword. While it fosters interconnectedness, the vast amount of data generated by IoT devices creates a larger attack surface for cybercrimi... 详细信息
来源: 评论
Dataset of Large Gathering Images for Person Identification and Tracking
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 6065-6080页
作者: Adnan Nadeem Amir Mehmood Kashif Rizwan Muhammad Ashraf Nauman Qadeer Ali Alzahrani Qammer H.Abbasi Fazal Noor Majed Alhaisoni Nadeem Mahmood Faculty of Computer and Information System Islamic University of MadinahMadinah42351Saudi Arabia Department of Computer Science and Information Technology Sir Syed University of Engineering and TechnologyKarachi75300Pakistan Department of Computer Science Federal Urdu University of ArtsScience&TechnologyIslamabad45570Pakistan Department of Physics Federal Urdu University of ArtsScience&TechnologyKarachi75300Pakistan James Watt School of Engineering University of GlasgowGlasgowG128QQUK Computer Sciences Department College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Science University of KarachiKarachi75270Pakistan
This paper presents a large gathering dataset of images extracted from publicly filmed videos by 24 cameras installed on the premises of Masjid Al-Nabvi,Madinah,Saudi *** dataset consists of raw and processed images r... 详细信息
来源: 评论
Message Verification Protocol Based on Bilinear Pairings and Elliptic Curves for Enhanced Security in Vehicular Ad Hoc Networks
收藏 引用
computers, Materials & Continua 2024年 第10期81卷 1029-1057页
作者: Vincent Omollo Nyangaresi Arkan A.Ghaib Hend Muslim Jasim Zaid Ameen Abduljabbar Junchao Ma Mustafa A.Al Sibahee Abdulla J.Y.Aldarwish Ali Hasan Ali Husam A.Neamah Department of Computer Science and Software Engineering Jaramogi Oginga Odinga University of Science and TechnologyBondo40601Kenya Department of Applied Electronics Saveetha School of EngineeringSIMATSChennaiTamilnadu602105India Information Technology Department Management Technical CollegeSouthern Technical UniversityBasrah61004Iraq Department of Computer Science College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq College of Big Data and Internet Shenzhen Technology UniversityShenzhen518118China Huazhong University of Science and Technology Shenzhen InstituteShenzhen518000China National Engineering Laboratory for Big Data System Computing Technology Shenzhen UniversityShenzhen518060China Computer Technology Engineering Department Iraq University CollegeBasrah61004Iraq Department of Mathematics College of Education for Pure SciencesUniversity of BasrahBasrah61004Iraq Institute of Mathematics University of DebrecenDebrecenH-4002Hungary Department of Electrical Engineering and Mechatronics Faculty of EngineeringUniversity of DebrecenDebrecen4028Hungary
Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation ***,the exchange of beacons and messages over public c... 详细信息
来源: 评论
A Composite Decomposition Method for Large-Scale Global Optimization
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6304-6319页
作者: Tian, Maojiang Chen, Minyang Du, Wei Tang, Yang Jin, Yaochu Yen, Gary G. Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen518055 China East China University of Science and Technology Key Laboratory of Smart Manufacturing in Energy Chemical Process Ministry of Education Shanghai200237 China East China University of Science and Technology Engineering Research Center of Process System Engineering Ministry of Education Shanghai200237 China Westlake University School of Engineering Hangzhou310030 China Oklahoma State University School of Electrical and Computer Engineering StillwaterOK74048 United States
Cooperative coevolution (CC) algorithms, based on the divide-and-conquer strategy, have emerged as the predominant approach to solving large-scale global optimization (LSGO) problems. The efficiency and accuracy of th... 详细信息
来源: 评论