咨询与建议

限定检索结果

文献类型

  • 1,845 篇 会议
  • 274 篇 期刊文献
  • 41 册 图书

馆藏范围

  • 2,160 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,345 篇 工学
    • 1,108 篇 计算机科学与技术...
    • 945 篇 软件工程
    • 303 篇 信息与通信工程
    • 177 篇 控制科学与工程
    • 141 篇 生物工程
    • 110 篇 电气工程
    • 98 篇 生物医学工程(可授...
    • 92 篇 电子科学与技术(可...
    • 61 篇 机械工程
    • 57 篇 光学工程
    • 57 篇 安全科学与工程
    • 47 篇 动力工程及工程热...
    • 40 篇 建筑学
    • 38 篇 交通运输工程
    • 37 篇 仪器科学与技术
    • 37 篇 土木工程
  • 577 篇 理学
    • 349 篇 数学
    • 154 篇 生物学
    • 106 篇 统计学(可授理学、...
    • 96 篇 物理学
    • 79 篇 系统科学
  • 411 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 204 篇 图书情报与档案管...
    • 131 篇 工商管理
  • 85 篇 医学
    • 82 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 53 篇 药学(可授医学、理...
  • 81 篇 法学
    • 60 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 44 篇 教育学
    • 44 篇 教育学
  • 28 篇 农学
  • 5 篇 文学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 68 篇 software
  • 66 篇 software enginee...
  • 66 篇 accuracy
  • 61 篇 machine learning
  • 49 篇 feature extracti...
  • 48 篇 training
  • 47 篇 computational mo...
  • 44 篇 real-time system...
  • 40 篇 deep learning
  • 37 篇 computer science
  • 36 篇 semantics
  • 35 篇 artificial intel...
  • 33 篇 internet of thin...
  • 33 篇 predictive model...
  • 32 篇 data mining
  • 32 篇 data models
  • 31 篇 analytical model...
  • 26 篇 scalability
  • 25 篇 wireless sensor ...
  • 25 篇 testing

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 state key labora...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 baldwin timothy
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 14 篇 zain ul abideen
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 baik doo-kwon
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 9 篇 shafiur rahman
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 dong min

语言

  • 2,062 篇 英文
  • 84 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept of Computer Engineering and Software Engineering"
2160 条 记 录,以下是101-110 订阅
排序:
Rain Predictive Model using Machine learning Techniques
Rain Predictive Model using Machine learning Techniques
收藏 引用
2023 International Multi-Disciplinary Conference in Emerging Research Trends, IMCERT 2023
作者: Muneer, Muhammad Shahbaz Nabeel Mustafa, Syed Muhammad Zehra, Syeda Sundus Maqsood, Haniya NED University of Engineering and Technology Dpertment of Computational Finance Karachi Pakistan Sir Syed Uuniversity of Engineering and Technology Dept. of Software Engineering Karachi Pakistan NED University of Engineering and Technology Department of Computer and Information Systems Engineering Karachi Pakistan
Climate is rapidly changing around the world. Over time, there have been significant changes in the weather. Rainfall is now erratic due to climate change. The frequency of extreme weather events like droughts and flo... 详细信息
来源: 评论
Enhanced Federated RL with NEAT, Markov Chains, and Gaussian Processes
收藏 引用
Procedia computer Science 2025年 260卷 742-751页
作者: Robert McMenemy Kallinatha H D Hamsaveni M Sachin D N Software Engineer Independent Researcher Glasgow Area Scotland UK Dept of Computer Science and Engineering Siddaganga Institute of Technology Tumakuru India Dept of Computer Science and Engineering Vidyavardhaka College of Engineering Mysuru India
Reinforcement Learning (RL) is a machine learning approach in which an agent learns to make decisions in an environment to maximize a cumulative reward. When combined with NeuroEvolution of Augmenting Topologies (NEAT... 详细信息
来源: 评论
software Code De-Compilation Techniques and Approaches: A Comparative Study  25
Software Code De-Compilation Techniques and Approaches: A Co...
收藏 引用
25th International Arab Conference on Information Technology, ACIT 2024
作者: Fawareh, Hamed Al-Smadi, Yazan Hassan, Mohammad Fawareh, Faid AlNoor Elrashidi, Ali Zarqa University Dept. of Software Engineering Jordan Zarqa University Dept. of Computer Science Jordan Zarqa University Dept. Of Mathmitical Science Jordan University of Business and Technology Dept. of Electrical Engineering Jeddah21432 Saudi Arabia
De-compilation is the process of executable files as input where the de-compilation process tries to get away the source code, or the majority of it, if the file's source code is lost or damaged for whatever cause...
来源: 评论
PLCD: Policy Learning for Capped Service Mobility Downtime  32
PLCD: Policy Learning for Capped Service Mobility Downtime
收藏 引用
32nd International Conference on computer Communications and Networks, ICCCN 2023
作者: Mwasinga, Lusungu J. Raza, Syed M. Le, Duc-Tai Kim, Moonseong Choo, Hyunseung Sungkyunkwan University Dept. of Computer Science and Engineering Suwon Korea Republic of Sungkyunkwan University Dept. of Electrical and Computer Engineering Suwon Korea Republic of Seoul Theological University Dept. of It Convergence Software Bucheon Korea Republic of
Service mobility in Multi-access Edge Computing (MEC) paradigm is necessary to provide ultra-Reliable Low Latency Communications for the erratically roaming MEC users. It involves relocation of containerized applicati... 详细信息
来源: 评论
Unveiling the Arsenal of User Data Protection Tools and Practices  1
Unveiling the Arsenal of User Data Protection Tools and Prac...
收藏 引用
1st IEEE Karachi Section Humanitarian Technology Conference, Khi-HTC 2024
作者: Moiz, Syed Abro, Abdul Ahad Ebrahim, Mansoor Abro, Abdul Basit Iqra University Main Campus Dept. of Computer Science Karachi Pakistan Iqra University Main Campus Dept. of Software Engineering Karachi Pakistan Indus University Dept. of Computer Science Karachi Pakistan
In our rapidly evolving digital landscape, the imperative of safeguarding personal data has surged in significance. As lives increasingly intertwine with digital technologies, personal information has grown markedly, ... 详细信息
来源: 评论
Enhanced Reversible Data Hiding in Encrypted Images by Pixel Shifting  16
Enhanced Reversible Data Hiding in Encrypted Images by Pixel...
收藏 引用
2024 16th International Conference on Graphics and Image Processing, ICGIP 2024
作者: Yang, Ching-Nung Lu, Yu-Quan Liu, Shu-Yu Xiong, Lizhi Dept. of Computer Sci. and Inf. Engineering National Dong Hwa University Hualien Taiwan School of Computer and Software Nanjing University of Inf. Sci. & Technology Nanjing China
Reversible data hiding (RDH) is one special type of data hiding, and is widely used for many intended applications. Moreover, to protect the cover image, RDH in encrypted image (RDHEI) is accordingly proposed. With th... 详细信息
来源: 评论
Cybersecurity and Privacy Attacks Detection in IoT Networks with Improved Data engineering and Machine Learning Methods  9
Cybersecurity and Privacy Attacks Detection in IoT Networks ...
收藏 引用
9th IEEE International Conference on Big Data Computing Service and Applications, BigDataService 2023
作者: Elmazi, Donald Karras, Dimitrios A. Alkholidi, Abdulsalam Capari, Klea Faculty of Engineering Dept. of Electronics and Telecommunications Tirana Albania Dept. S/W Engineering Tirana Albania Dept. General School of Science Athens Greece Tirana Albania Faculty of Engineering Sana'a University Yemen University of Rijeka Faculty of Engineering Dept. of Computer Engineering Croatia Faculty of Engineering Cit Dept. of Software Engineering Tirana Albania
Presently, the global proliferation of Internet of Things (IoT) devices and applications has accelerated owing to their advantages in enhancing the business and industrial environment, as well as the daily lives of in... 详细信息
来源: 评论
Visualizing the Path of a Photo Taker from Image Metadata  4
Visualizing the Path of a Photo Taker from Image Metadata
收藏 引用
4th International Informatics and software engineering Conference, IISEC 2023
作者: Majid, Rasty Shakhawan Varol, Cihan Varol, Asaf Nasab, Ahad Firat University Department of Software Engineering Erbil Iraq Sam Houston State University Computer Science Department HuntsvilleTX United States College of Engineering and Computer Science Dept. of Engineering Management and Technology ChattanoogaTN United States
One of the most challenging investigations in forensic analysis is the work conducted on smartphones. Specifically using smartphone data to provide evidence for a case is becoming a norm nowadays. Many Android device ... 详细信息
来源: 评论
Dynamic View Synthesis of Thin Structures with Short-term Movements from Monocular Videos Using Neural Radiance Fields  25
Dynamic View Synthesis of Thin Structures with Short-term Mo...
收藏 引用
25th International Conference on Digital Image Computing: Techniques and Applications, DICTA 2024
作者: Rajapaksha, Uchitha Laga, Hamid Diepeveen, Dean Bennamoun, Mohammed Sohel, Ferdous School of Information Technology Murdoch University MurdochWA Australia The University of Western Australia Dept. of Computer Science and Software Engineering CrawleyWA Australia
Learning to generate motions of thin structures such as plant leaves in dynamic view synthesis is challenging. This is because thin structures usually undergo small but fast, non-rigid motions as they interact with ai... 详细信息
来源: 评论
Faceswap Deepfakes Detection using Novel Multi-directional Hexadecimal Feature Descriptor  19
Faceswap Deepfakes Detection using Novel Multi-directional H...
收藏 引用
19th International Bhurban Conference on Applied Sciences and Technology, IBCAST 2022
作者: Qurat-Ul-Ain Javed, Ali Mahmood Malik, Khalid University of Engineering and Technology Dept. of Computer Science Taxila Pakistan University of Engineering and Technology Dept. of Software Engineering Taxila Pakistan Oakland University Dept. of Computer Science and Engineering United States
With the growing number of sophisticated deep learning algorithms and fake video generation applications, it is now possible to create highly realistic deepfake videos. Faceswap is the most commonly employed deepfakes... 详细信息
来源: 评论