咨询与建议

限定检索结果

文献类型

  • 885 篇 期刊文献
  • 839 篇 会议
  • 11 册 图书

馆藏范围

  • 1,735 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,171 篇 工学
    • 859 篇 计算机科学与技术...
    • 697 篇 软件工程
    • 201 篇 信息与通信工程
    • 145 篇 控制科学与工程
    • 138 篇 生物工程
    • 127 篇 电气工程
    • 109 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 96 篇 电子科学与技术(可...
    • 73 篇 机械工程
    • 70 篇 化学工程与技术
    • 51 篇 材料科学与工程(可...
    • 51 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 41 篇 仪器科学与技术
    • 37 篇 建筑学
    • 37 篇 交通运输工程
  • 627 篇 理学
    • 322 篇 数学
    • 188 篇 物理学
    • 158 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 68 篇 化学
    • 56 篇 系统科学
  • 310 篇 管理学
    • 197 篇 管理科学与工程(可...
    • 123 篇 图书情报与档案管...
    • 102 篇 工商管理
  • 119 篇 医学
    • 102 篇 临床医学
    • 82 篇 基础医学(可授医学...
    • 50 篇 公共卫生与预防医...
    • 42 篇 药学(可授医学、理...
  • 52 篇 法学
  • 30 篇 经济学
  • 25 篇 教育学
  • 19 篇 农学
  • 10 篇 军事学
  • 5 篇 艺术学
  • 3 篇 文学

主题

  • 77 篇 computer science
  • 67 篇 software enginee...
  • 44 篇 deep learning
  • 35 篇 semantics
  • 29 篇 machine learning
  • 27 篇 feature extracti...
  • 24 篇 internet of thin...
  • 24 篇 accuracy
  • 23 篇 computational mo...
  • 21 篇 quality of servi...
  • 20 篇 application soft...
  • 20 篇 software testing
  • 20 篇 training
  • 19 篇 software systems
  • 19 篇 optimization
  • 18 篇 programming
  • 18 篇 image segmentati...
  • 18 篇 clustering algor...
  • 18 篇 software
  • 17 篇 computer archite...

机构

  • 33 篇 renewable and su...
  • 27 篇 college of compu...
  • 26 篇 school of comput...
  • 25 篇 department of co...
  • 19 篇 national enginee...
  • 18 篇 center for soft ...
  • 18 篇 department of co...
  • 17 篇 department of ph...
  • 17 篇 national enginee...
  • 14 篇 school of comput...
  • 13 篇 renewable and su...
  • 13 篇 university of ch...
  • 13 篇 state key labora...
  • 12 篇 department of co...
  • 12 篇 collaborative in...
  • 12 篇 shanghai key lab...
  • 11 篇 school of softwa...
  • 11 篇 department of co...
  • 10 篇 school of softwa...
  • 10 篇 department of co...

作者

  • 35 篇 smalyukh ivan i.
  • 23 篇 ismail leila
  • 17 篇 du bo
  • 16 篇 ivan i. smalyukh
  • 12 篇 das ashok kumar
  • 12 篇 zhao hai
  • 12 篇 mahmood khalid
  • 12 篇 li zuchao
  • 12 篇 shen linlin
  • 12 篇 materwala huned
  • 11 篇 xu xiaolong
  • 10 篇 heidari arash
  • 10 篇 ashish ghosh
  • 10 篇 susmita ghosh
  • 10 篇 leung victor c.m...
  • 10 篇 shamshad salman
  • 9 篇 wang yasha
  • 9 篇 leila ismail
  • 9 篇 yao yao
  • 8 篇 seifedine kadry

语言

  • 1,620 篇 英文
  • 97 篇 其他
  • 17 篇 中文
  • 1 篇 日文
检索条件"机构=Department of Software Engineering and Computer Science Soft Center"
1735 条 记 录,以下是171-180 订阅
排序:
Multi-Path Attention Inverse Discrimination Network for Offline Signature Verification
收藏 引用
Intelligent Automation & soft Computing 2023年 第6期36卷 3057-3071页
作者: Xiaorui Zhang Yingying Wang Wei Sun Qi Cui Xindong Wei School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Wuxi Research Institute Nanjing University of Information Science&TechnologyWuxi214100China Engineering Research Center of Digital Forensics Ministry of EducationJiangsu Engineering Center of Network MonitoringNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjing210044China School of Automation Nanjing University of Information Science&TechnologyNanjing 210044China Department of Electrical and Computer Engineering University of WindsorWindsorN9B 3P4Canada School of Teacher Education Nanjing University of Information Science&TechnologyNanjing210044China
Signature verification,which is a method to distinguish the authenticity of signature images,is a biometric verification technique that can effectively reduce the risk of forged signatures in financial,legal,and other... 详细信息
来源: 评论
Digital Twin, Metaverse and Smart Cities in a Race to the Future
Digital Twin, Metaverse and Smart Cities in a Race to the Fu...
收藏 引用
Information Technology (ACIT)
作者: Hijab e Zainab Narmeen Zakaria Bawanay Department of Computer Science and Software Engineering Center for Computing Research Jinnah University for Women Karachi Pakistan
In the dynamic landscape of urban development, the synergy of the Metaverse, Digital Twins, and Smart Cities emerges as a potent catalyst for transformation. The Metaverse, a vibrant virtual space, collaborates with c...
来源: 评论
A Survey on Anomaly Detection with Few-Shot Learning  8th
A Survey on Anomaly Detection with Few-Shot Learning
收藏 引用
8th International Conference on Cognitive Computing, ICCC 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Chen, Junyang Wang, Changbo Hong, Yifan Mi, Rui Zhang, Liang-Jie Wu, Yirui Wang, Huan Zhou, Yue College of Computer Science and Software Engineering Shenzhen University Shenzhen China Center of Health Administration and Development Studies Hubei University of Medicine Shiyan China College of Informatics Huazhong Agricultural University Wuhan China Hohai University Nanjing China Department of Obstetrics and Gynecology Tianyou Hospital Affiliated to Wuhan University of Science and Technology Wuhan China
The primary objective of anomaly detection is to identify abnormal or unusual patterns within a dataset, where the number of normal samples typically exceeds that of abnormal samples. Due to the scarcity of labeled ab... 详细信息
来源: 评论
Deep Learning for Violence Detection in Surveillance: The Role of Transfer Learning and Pre-Trained Models
Deep Learning for Violence Detection in Surveillance: The Ro...
收藏 引用
Information Technology (ACIT)
作者: Anum Ilyas Surayya Obaid Narmeen Zakaria Bawany Department of Computer Science and Software Engineering Center for Computing Research Jinah University for Women Karachi Pakistan
In recent years, the use of CCTV footage for proactive crime prevention has surged, particularly in public places like airports, train stations, and malls. However, the efficacy of these surveillance systems becomes q...
来源: 评论
A Blockchain based Framework for Verifying Drug Authenticity
A Blockchain based Framework for Verifying Drug Authenticity
收藏 引用
Information Technology (ACIT)
作者: Soomaiya Hamid Narmeen Zakaria Bawany Kiran Fatima Department of Computer Science and Software Engineering Center for Computing Research Jinnah University for Women Karachi Pakistan
Counterfeit drugs are fake medicines that are potentially harmful for health. Safeguarding the integrity of pharmaceutical distribution plays a crucial role in preventing the circulation of counterfeit drugs. Traditio...
来源: 评论
Process Mining Approach to Analyze Engagement in Campaign Activities  9
Process Mining Approach to Analyze Engagement in Campaign Ac...
收藏 引用
9th IEEE Information Technology International Seminar, ITIS 2023
作者: Nugroho, Aryo Ambarwati, Awalludiyah Faza, Arsi Raniah Falah, Ardi Ilham Putra, Oddy Virgantara Widiastuti, Ika Universitas Narotama Department of Information System Surabaya Indonesia UPN Veteran Jawa Timur Department of Accounting Surabaya Indonesia AONO Research Center Department of Soft Computing Surabaya Indonesia Universitas Darussalam Gontor Department of Informatics Ponorogo Indonesia Ewha Womans University Department of Computer Science & Engineering. Seoul Korea Republic of
Campaign strategies are evolving because of developments in communication technologies. Campaign activities have become more attractive to the younger generation with the existence of social media. There is much resea... 详细信息
来源: 评论
Fused Gromov-Wasserstein graph mixup for graph-level classifications  23
Fused Gromov-Wasserstein graph mixup for graph-level classif...
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Xinyu Ma Xu Chu Yasha Wang Yang Lin Junfeng Zhao Liantao Ma Wenwu Zhu School of Computer Science Peking University Department of Computer Science and Technology Tsinghua University School of Computer Science Peking University and National Research and Engineering Center of Software Engineering Peking University
Graph data augmentation has shown superiority in enhancing generalizability and robustness of GNNs in graph-level classifications. However, existing methods primarily focus on the augmentation in the graph signal spac...
来源: 评论
Mahalanobis Distance-based Multi-view Optimal Transport for Multi-view Crowd Localization
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Qi Zhang, Kaiyi Chan, Antoni B. Huang, Hui Visual Computing Research Center College of Computer Science and Software Engineering Shenzhen University Shenzhen China China Department of Computer Science City University of Hong Kong Hong Kong
Multi-view crowd localization predicts the ground locations of all people in the scene. Typical methods usually estimate the crowd density maps on the ground plane first, and then obtain the crowd locations. However, ... 详细信息
来源: 评论
A Provably Secure and Lightweight Access Control Protocol for EI-Based Vehicle to Grid Environment
收藏 引用
IEEE Internet of Things Journal 2023年 第18期10卷 16650-16657页
作者: Shamshad, Salman Mahmood, Khalid Shamshad, Usman Hussain, Ibrar Hussain, Shafiq Das, Ashok Kumar The University of Lahore Department of Software Engineering Lahore54590 Pakistan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan Riphah International University Riphah School of Computing and Innovation Lahore54000 Pakistan University of Sahiwal Department of Computer Science Sahiwal57000 Pakistan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Old Dominion University Virginia Modeling Analysis and Simulation Center SuffolkVA23435 United States
The energy Internet (EI) presents a novel paradigm for renewable energy distribution that utilizes communication and computing technologies to revolutionize the conventional intelligent transportation systems (ITSs) a... 详细信息
来源: 评论
A Multiform Many-objective Evolutionary Algorithm for Multi-label Feature Selection in Classification
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年
作者: Hancer, Emrah Xue, Bing Zhang, Mengjie Victoria University of Wellington Center for Data Science and Artificial Intelligence School of Engineering and Computer Science Wellington6140 New Zealand Burdur Mehmet Akif Ersoy University Department of Software Engineering Burdur15039 Turkey
Multi-label classification (MLC) deals with instances associated with multiple labels simultaneously and often includes high dimensional data with noisy, irrelevant, and redundant features. Feature selection for MLC i... 详细信息
来源: 评论