咨询与建议

限定检索结果

文献类型

  • 1,845 篇 会议
  • 274 篇 期刊文献
  • 41 册 图书

馆藏范围

  • 2,160 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,345 篇 工学
    • 1,108 篇 计算机科学与技术...
    • 945 篇 软件工程
    • 303 篇 信息与通信工程
    • 177 篇 控制科学与工程
    • 141 篇 生物工程
    • 110 篇 电气工程
    • 98 篇 生物医学工程(可授...
    • 92 篇 电子科学与技术(可...
    • 61 篇 机械工程
    • 57 篇 光学工程
    • 57 篇 安全科学与工程
    • 47 篇 动力工程及工程热...
    • 40 篇 建筑学
    • 38 篇 交通运输工程
    • 37 篇 仪器科学与技术
    • 37 篇 土木工程
  • 577 篇 理学
    • 349 篇 数学
    • 154 篇 生物学
    • 106 篇 统计学(可授理学、...
    • 96 篇 物理学
    • 79 篇 系统科学
  • 411 篇 管理学
    • 232 篇 管理科学与工程(可...
    • 204 篇 图书情报与档案管...
    • 131 篇 工商管理
  • 85 篇 医学
    • 82 篇 临床医学
    • 77 篇 基础医学(可授医学...
    • 53 篇 药学(可授医学、理...
  • 81 篇 法学
    • 60 篇 社会学
  • 47 篇 经济学
    • 47 篇 应用经济学
  • 44 篇 教育学
    • 44 篇 教育学
  • 28 篇 农学
  • 5 篇 文学
  • 4 篇 军事学
  • 2 篇 艺术学

主题

  • 68 篇 software
  • 66 篇 software enginee...
  • 66 篇 accuracy
  • 61 篇 machine learning
  • 49 篇 feature extracti...
  • 48 篇 training
  • 47 篇 computational mo...
  • 44 篇 real-time system...
  • 40 篇 deep learning
  • 37 篇 computer science
  • 36 篇 semantics
  • 35 篇 artificial intel...
  • 33 篇 internet of thin...
  • 33 篇 predictive model...
  • 32 篇 data mining
  • 32 篇 data models
  • 31 篇 analytical model...
  • 26 篇 scalability
  • 25 篇 wireless sensor ...
  • 25 篇 testing

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 state key labora...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 baldwin timothy
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 14 篇 zain ul abideen
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 baik doo-kwon
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 9 篇 shafiur rahman
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 dong min

语言

  • 2,062 篇 英文
  • 84 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept of Computer Engineering and Software Engineering"
2160 条 记 录,以下是51-60 订阅
排序:
Enhanced Classification of Alzheimer's Disease Using Deep Learning and Machine Learning Models with MRI Scans
Enhanced Classification of Alzheimer's Disease Using Deep Le...
收藏 引用
2024 International Conference on Frontiers of Information Technology, FIT 2024
作者: Salahudin, Amna Qadeer, Eeman Ahmed, Ayesha Fahad, Labiba Gillani Dept. of Software Engineering FAST National University of Computer and Emerging Sciences Islamabad Pakistan Dept. of Computer Science FAST National University of Computer and Emerging Sciences Islamabad Pakistan
Alzheimer's disease (AD) is a slowly progressive neurodegenerative disease, which necessitates early and accurate diagnosis for effective management. This research presents a comprehensive approach to the classifi... 详细信息
来源: 评论
Generative Adversarial Networks for Anomaly Detection: A Systematic Literature Review  4
Generative Adversarial Networks for Anomaly Detection: A Sys...
收藏 引用
4th International Conference on Computing, Mathematics and engineering Technologies, iCoMET 2023
作者: Noor, Shah Bazai, Sibghat Ullah Ghafoor, Muhammad Imran Marjan, Shah Akram, Saira Ali, Fatima Dept. Computer Science Quetta Pakistan Pakistan Television Corporation Dept. of Electrical Engineering Superior University Lahore Pakistan Dept. of Software Engineering Quetta Pakistan Dept. of Computer Engineering Quetta Pakistan
In numerous research areas, anomaly identification is a major problem. Identifying and properly classifying data as anomalous is a challenging task that is resolved in various manners over the years. Different approac... 详细信息
来源: 评论
Fingerprint generation and authentication though Adaptive convolution generative adversarial network (ADCGAN)  7
Fingerprint generation and authentication though Adaptive co...
收藏 引用
7th International Multi-Topic ICT Conference: IMTIC 2023
作者: Mustafa, Syed Muhammad Nabeel Zehra, Syeda Sundus Baber, Alina Siddiqui, Maria Andleeb Ned University of Engineering and Technology Dept. of Computer Science & Information Technology Karachi Pakistan Sir Syed University of Engineering and Technology Dept of Software Engineering Karachi Pakistan
Fingerprints are crucial in identification of humans. The uniqueness of finger prints makes it an interesting subject. Fingerprints are termed as a technique used to define, assess, and quantify a person's physica... 详细信息
来源: 评论
MTDC Fault Detection and Localization Using High-Pass Filter  50
MTDC Fault Detection and Localization Using High-Pass Filter
收藏 引用
50th Annual Conference of the IEEE Industrial Electronics Society, IECON 2024
作者: Khan, Saad Ahmed Ukil, Abhisek Nair, Nirmal-Kumar C. Li, Dongyu Dept. of Electrical Computer and Software Engineering The University of Auckland Auckland New Zealand School of Electrical and Automation Engineering East China Jiaotong University Nanchang330013 China
The DC link capacitor discharge in the event of a DC fault is rapid and contains high frequencies. This rapid discharge of high current and frequency interface with DC bus, Voltage Source Converter (VSC), and AC sourc... 详细信息
来源: 评论
Exploring the Potential of Llama Models in Automated Code Refinement: A Replication Study
Exploring the Potential of Llama Models in Automated Code Re...
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Genevieve Caumartin Qiaolin Qin Sharon Chatragadda Janmitsinh Panjrolia Heng Li Diego Elias Costa Dept of Computer Science and Software Engineering Concordia University Montreal Canada Dept of Computer Engineering and Software Engineering Polytechnique Montreal Montreal Canada
Code reviews are an integral part of software development and have been recognized as a crucial practice for minimizing bugs and favouring higher code quality. They serve as an important checkpoint before committing c... 详细信息
来源: 评论
IoT Security: A Deep Learning-Based Approach for Intrusion Detection and Prevention
IoT Security: A Deep Learning-Based Approach for Intrusion D...
收藏 引用
2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques, EASCT 2023
作者: Kauhsik, Bhanu Nandanwar, Himanshu Katarya, Rahul Delhi Technological University Dept. of Software Engineering Delhi India Delhi Technological University Dept. of Computer Science and Engineering Delhi India
The size and market worth of the Internet of Things (IoT) have expanded, but unfortunately, the likelihood of user data being compromised has also risen. This presents a notable danger that has the potential to create... 详细信息
来源: 评论
A Tool for Security Risk Assessment for APT Attacks: using Scenarios, Security Requirements, and Evidence  31
A Tool for Security Risk Assessment for APT Attacks: using S...
收藏 引用
31st IEEE International Requirements engineering Conference, RE 2023
作者: Park, Sihn-Hye Kim, Dongyoon Lee, Seok-Won Ajou University Dept. of Artificial Intelligence Dept. Software and Computer Engineering Suwon Korea Republic of
Advanced Persistent Threat (APT) attacks are complex, employing diverse attack elements and increasingly intelligent techniques. This paper introduces a tool for security risk assessment specifically designed for thes... 详细信息
来源: 评论
GolfPoseNet: Golf-Specific 3D Human Pose Estimation Network
GolfPoseNet: Golf-Specific 3D Human Pose Estimation Network
收藏 引用
2025 International Conference on Electronics, Information, and Communication, ICEIC 2025
作者: Park, BoJeong Kim, JongWoo Mun, SeoYeong Choi, Younglim Kim, Hyunseok Dong-A University Dept. of Electric Engineering Busan Korea Republic of Dong-A University Dept. of Software Innovation Center Busan Korea Republic of Dong-A University Dept. of Computer Engineering Busan Korea Republic of
This paper aims to develop a robotic golf trainer using a wheeled robot and create a model that accurately recognizes the user's golf motion. Since existing 3D pose models show limitations in golf motion recogniti... 详细信息
来源: 评论
Staging of Different Tumor by Utilizing Laser Guidance (@405 nm) in CT Scan Images Along with Statistical Analysis
收藏 引用
Lasers in engineering 2025年 第4-6期59卷 309-325页
作者: Amjad, M. Ullah, H. Siddique, M.A. Majid, M.A. Aleem, A. Akhtar, M. Gilanie, G. Abdullah-Al-Wadud, M. Farhan, M. Akram, A. Batool, Z. Nazir, A. Biophotonics Imaging Techniques Laboratory Institute of Physics The Islamia University of Bahawalpur 63100 Pakistan Department of Computer Science Faculty of Computing The Islamia University of Bahawalpur Bahawalpur Pakistan Dept. of Software Engineering College of Computer and Information Sciences King Saud University Riyadh11543 Saudi Arabia School of Earth Sciences and Engineering Hohai University Nanjing China
Early detection of lung cancer, liver cancer (HCC), and pancreatitis is crucial for effective treatment. This study assessed the use of laser guidance CT scans for diagnosis and staging. 26 patients of CT scan which w... 详细信息
来源: 评论
The Early Detection of Dementia Disease Using Machine Learning Approach
The Early Detection of Dementia Disease Using Machine Learni...
收藏 引用
2023 International Conference on computer Communication and Informatics, ICCCI 2023
作者: Kabir, Md. Shariar Khanom, Jakia Bhuiyan, Md. Atik Tumpa, Zerin Nasrin Rabby, S.K. Fazlee Bilgaiyan, Saurabh Daffodil International University Dept. of Computer Science and Engineering Dhaka Bangladesh Daffodil International University Dept. of Software Engineering Dhaka Bangladesh Kalinga Institute of Industrial Technology School of Computer Engineering Bhubaneswar India
Early dementia detection is a crucial but challenging task in Bangladesh. Often, dementia is not recognized until it is too late to receive effective care. This results in part from a lack of knowledge about the illne... 详细信息
来源: 评论