咨询与建议

限定检索结果

文献类型

  • 1,236 篇 会议
  • 193 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 1,465 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 934 篇 工学
    • 783 篇 计算机科学与技术...
    • 677 篇 软件工程
    • 211 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 99 篇 生物工程
    • 60 篇 电气工程
    • 60 篇 生物医学工程(可授...
    • 46 篇 电子科学与技术(可...
    • 39 篇 安全科学与工程
    • 37 篇 光学工程
    • 32 篇 机械工程
    • 28 篇 交通运输工程
    • 27 篇 动力工程及工程热...
    • 27 篇 建筑学
    • 24 篇 土木工程
  • 385 篇 理学
    • 230 篇 数学
    • 108 篇 生物学
    • 71 篇 统计学(可授理学、...
    • 55 篇 物理学
    • 47 篇 系统科学
  • 288 篇 管理学
    • 166 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 55 篇 医学
    • 53 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
    • 23 篇 公共卫生与预防医...
  • 54 篇 法学
    • 37 篇 社会学
  • 33 篇 教育学
    • 33 篇 教育学
  • 32 篇 经济学
    • 32 篇 应用经济学
  • 18 篇 农学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 51 篇 software
  • 48 篇 software enginee...
  • 36 篇 feature extracti...
  • 34 篇 machine learning
  • 33 篇 computer science
  • 31 篇 accuracy
  • 30 篇 computational mo...
  • 28 篇 deep learning
  • 28 篇 semantics
  • 26 篇 real-time system...
  • 25 篇 artificial intel...
  • 25 篇 training
  • 20 篇 wireless sensor ...
  • 20 篇 data models
  • 19 篇 scalability
  • 19 篇 support vector m...
  • 19 篇 data mining
  • 18 篇 computer archite...
  • 18 篇 quality of servi...
  • 18 篇 predictive model...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 10 篇 college of compu...
  • 10 篇 dept. of compute...
  • 8 篇 daffodil interna...
  • 8 篇 faculty of elect...
  • 8 篇 school of softwa...
  • 8 篇 university of re...
  • 8 篇 dept. of compute...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 shiri nematollaa...
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 8 篇 qusay h. mahmoud
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 shafiur rahman
  • 8 篇 ali nisar
  • 8 篇 ijaz ali zeeshan
  • 7 篇 siddique abu bak...
  • 7 篇 ul abideen zain
  • 7 篇 abideen zain ul

语言

  • 1,404 篇 英文
  • 49 篇 其他
  • 5 篇 中文
  • 4 篇 朝鲜文
  • 3 篇 日文
检索条件"机构=Dept. of Computer Science& Software Engineering"
1465 条 记 录,以下是61-70 订阅
排序:
Staging of Different Tumor by Utilizing Laser Guidance (@405 nm) in CT Scan Images Along with Statistical Analysis
收藏 引用
Lasers in engineering 2025年 第4-6期59卷 309-325页
作者: Amjad, M. Ullah, H. Siddique, M.A. Majid, M.A. Aleem, A. Akhtar, M. Gilanie, G. Abdullah-Al-Wadud, M. Farhan, M. Akram, A. Batool, Z. Nazir, A. Biophotonics Imaging Techniques Laboratory Institute of Physics The Islamia University of Bahawalpur 63100 Pakistan Department of Computer Science Faculty of Computing The Islamia University of Bahawalpur Bahawalpur Pakistan Dept. of Software Engineering College of Computer and Information Sciences King Saud University Riyadh11543 Saudi Arabia School of Earth Sciences and Engineering Hohai University Nanjing China
Early detection of lung cancer, liver cancer (HCC), and pancreatitis is crucial for effective treatment. This study assessed the use of laser guidance CT scans for diagnosis and staging. 26 patients of CT scan which w... 详细信息
来源: 评论
SWIN and Vision Transformer-Driven Crack Detection in the Al Qattara Oasis, UAE: Towards Sustainable Infrastructure Management  11
SWIN and Vision Transformer-Driven Crack Detection in the Al...
收藏 引用
11th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, BDCAT 2024
作者: Ali, Luqman Ambali Parambil, Medha Mohan Swavaf, Muhammed Alnajjar, Fady Aljassmi, Hamad De Man, Adriaan De Emirates Centre for Mobility Research United Arab Emirates University Dept. Computer Science and Software Engineering Al Ain United Arab Emirates United Arab Emirates University Dept. Computer Science and Software Engineering Al Ain United Arab Emirates Emirates Centre for Mobility Research Dept. Civil and Enviromental Engieering Engieering Al Ain United Arab Emirates United Arab Emirates University Dept. Tourism and Heritage Al Ain United Arab Emirates
Heritage sites are central to the cultural identity and historical narrative of a community. The Al Qattara Oasis, located in the United Arab Emirates (UAE), illustrates this function well. This study addresses the pr... 详细信息
来源: 评论
A Deep Learning-Based Spectral Efficiency Maximization in Multiple Users Multiple STAR-RISs Massive MIMO-NOMA Networks  14
A Deep Learning-Based Spectral Efficiency Maximization in Mu...
收藏 引用
14th International Conference on Ubiquitous and Future Networks, ICUFN 2023
作者: Perdana, Ridho Hendra Yoga Nguyen, Toan-Van An, Beongku Hongik University Dept. of Software and Communications Engineering Graduate School Korea Republic of International University Vietnam National University School of Computer Science and Engineering HCM City Viet Nam Hongik University Dept. of Software and Communications Engineering Korea Republic of
In this paper, we investigate a deep learning-based spectral efficiency maximization in multiple users multiple simultaneously transmitting and reflecting reconfigurable intelligent surfaces (STAR-RISs) massive multip... 详细信息
来源: 评论
An In-dept. Study on Handwritten Signature Authentication Using Unique Writer Traits  1
An In-Depth Study on Handwritten Signature Authentication Us...
收藏 引用
1st IEEE International Conference on Advances in Computing, Communication and Networking, ICAC2N 2024
作者: Vamsikrishna, M. Murari, Haritha Manikandan, M. Mishra, Nilamadhab Raghavendra Gupta, T. Patel, Rohit Aditya University Dept. of Computer Applications Kakinada India Spark Infotech Inc Sr Software Engineer PhoenixAZ United States VeL Tech. R Dr.S Dept. of Computer Science and Engineering Tamilnadu India VIT Bhopal University Dept. of Computer Science and Engineering Sehore India HITM Telenagana Hyderabad India Calorx Teachers' University Dept of CSE Gujrat India
Handwriting verification, a subset of signature verification, involves using handwritten text to verify or authorize someone's identification. Although simple handwriting can serve as a signature, it is often modi... 详细信息
来源: 评论
Harnessing LLMs for VQA: A Prompted Benchmark with Animate/Inanimate Keywords  15
Harnessing LLMs for VQA: A Prompted Benchmark with Animate/I...
收藏 引用
15th International Conference on Information and Communication Technology Convergence, ICTC 2024
作者: Lee, Chanwoo Lee, Hyunjeong Kim, Minsang Kim, Hyun Jang, Haneol Park, Cheoneum Seoul Woman's University Dept. of Software Convergence Seoul Korea Republic of Hanbat National University Dept. of Computer Engineering Daejeon Korea Republic of Korea University Dept. of Computer Science and Engineering Seoul Korea Republic of Electronics and Telecommunications Research Institute Superintelligence Creative Research Lab. Daejeon Korea Republic of
In the field of NLP, Large Language Models (LLMs) have recently achieved significant advancements, leading to the development of various benchmarks for their evaluation. Along-side NLP, Vision Language Models (VLMs) h... 详细信息
来源: 评论
Heuristic approaches for hiding sensitive frequent itemsets in uncertain databases  5
Heuristic approaches for hiding sensitive frequent itemsets ...
收藏 引用
5th International Conference on Pattern Analysis and Intelligent Systems, PAIS 2023
作者: Lefkir, Mira Nouioua, Farid Fournier-Viger, Phillipe University Mohamed El Bachir El Ibrahimi of Bordj Bou Arreridj BBA Dept. of Computer Science Algeria Shenzhen University College of Computer Science and Software Engineering Shenzhen China
Pattern mining is a core objective within data mining, involving the detection of frequent itemsets (collections of values) within databases. This process serves to extract valuable insights from the data, facilitatin... 详细信息
来源: 评论
Cybersecurity and Privacy Attacks Detection in IoT Networks with Improved Data engineering and Machine Learning Methods  9
Cybersecurity and Privacy Attacks Detection in IoT Networks ...
收藏 引用
9th IEEE International Conference on Big Data Computing Service and Applications, BigDataService 2023
作者: Elmazi, Donald Karras, Dimitrios A. Alkholidi, Abdulsalam Capari, Klea Faculty of Engineering Dept. of Electronics and Telecommunications Tirana Albania Dept. S/W Engineering Tirana Albania Dept. General School of Science Athens Greece Tirana Albania Faculty of Engineering Sana'a University Yemen University of Rijeka Faculty of Engineering Dept. of Computer Engineering Croatia Faculty of Engineering Cit Dept. of Software Engineering Tirana Albania
Presently, the global proliferation of Internet of Things (IoT) devices and applications has accelerated owing to their advantages in enhancing the business and industrial environment, as well as the daily lives of in... 详细信息
来源: 评论
Identify Initial Nodes for Spreader in A New Diffusion Model Based on Topology (DBT) in Social Networks  9
Identify Initial Nodes for Spreader in A New Diffusion Model...
收藏 引用
9th International Conference on Web Research, ICWR 2023
作者: Khosravi, Ehsan Yazdanifar, Fatemeh Salimi, Nikoo Beni, Hamid Ahmadi Sharif University of Technology Dept. of Computer Engineering Tehran Iran Amirkabir University of Technology Dept. of Mathematics and Computer Science Tehran Iran Engineering and Naval Architecture University of Genoa Dept. of the Electrical Electronics Electronics and Telecommunication Genoa Italy Azarbaijan Shahid Madani University Dept. of Software Engineering Tabriz Iran
With the development of science and technology through social networks, the process of diffusion has become a controversial subject. In social networks, the process of diffusion is transmitted from one individual to a... 详细信息
来源: 评论
Comparison Between Gramian Angular Fields (GAF) and Markov Transition Field (MTF) Images Data by Using them as Input to the Deep Learning Neural Network Solar Flare Production Platform
Comparison Between Gramian Angular Fields (GAF) and Markov T...
收藏 引用
2022 International Conference on engineering and MIS, ICEMIS 2022
作者: Nagem, Tarek A M Hamad Alshareef, Sohil Mohamed, Abdelhafid Gihedan, Akram Albargathe, Salma Libyan British University Dept. Computer System Design Benghazi Libya University of Benghazi Dept. Software Engineering Benghazi Libya College of Computer Technology Dept. Software Engineering Benghazi Libya Darna University Dept. Computer Science Algoba Libya
The prediction of solar storms from real-time satellites data is an essential to protect various aviation, power, and communication infrastructures. For this reason, current research interest is focusing on creating s... 详细信息
来源: 评论
Deep Neural Networks in Social Media Forensics: Unveiling Suspicious Patterns and Advancing Investigations on Twitter  3
Deep Neural Networks in Social Media Forensics: Unveiling Su...
收藏 引用
3rd Intelligent Cybersecurity Conference, ICSC 2023
作者: Sharrab, Yousef Al-Fraihat, Dimah Alsmirat, Mohammad Isra University Dept. of Data Science and Artificial Intelligence Amman Jordan Isra University Dept.of Software Engineering Amman Jordan University of Sharjah Dept. of Computer Science Sharjah United Arab Emirates
Text data forensics, a rapidly developing field that focuses on analyzing textual content to identify criminal or suspicious activities, is becoming increasingly important due to the popularity and the huge number of ... 详细信息
来源: 评论