咨询与建议

限定检索结果

文献类型

  • 1,676 篇 会议
  • 248 篇 期刊文献
  • 38 册 图书

馆藏范围

  • 1,962 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,228 篇 工学
    • 1,018 篇 计算机科学与技术...
    • 867 篇 软件工程
    • 284 篇 信息与通信工程
    • 159 篇 控制科学与工程
    • 131 篇 生物工程
    • 103 篇 电气工程
    • 87 篇 生物医学工程(可授...
    • 86 篇 电子科学与技术(可...
    • 52 篇 光学工程
    • 52 篇 安全科学与工程
    • 51 篇 机械工程
    • 44 篇 动力工程及工程热...
    • 36 篇 建筑学
    • 36 篇 交通运输工程
    • 32 篇 土木工程
    • 31 篇 化学工程与技术
  • 526 篇 理学
    • 319 篇 数学
    • 143 篇 生物学
    • 94 篇 统计学(可授理学、...
    • 89 篇 物理学
    • 66 篇 系统科学
  • 374 篇 管理学
    • 214 篇 管理科学与工程(可...
    • 183 篇 图书情报与档案管...
    • 123 篇 工商管理
  • 73 篇 法学
    • 53 篇 社会学
  • 73 篇 医学
    • 71 篇 临床医学
    • 68 篇 基础医学(可授医学...
    • 47 篇 药学(可授医学、理...
  • 43 篇 经济学
    • 43 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 5 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 61 篇 software
  • 59 篇 software enginee...
  • 56 篇 accuracy
  • 54 篇 machine learning
  • 45 篇 feature extracti...
  • 45 篇 training
  • 39 篇 computational mo...
  • 39 篇 real-time system...
  • 36 篇 deep learning
  • 34 篇 computer science
  • 33 篇 semantics
  • 29 篇 data mining
  • 29 篇 artificial intel...
  • 28 篇 internet of thin...
  • 28 篇 predictive model...
  • 28 篇 data models
  • 26 篇 analytical model...
  • 24 篇 computer archite...
  • 23 篇 support vector m...
  • 22 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of electri...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 ericsson canada

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 10 篇 an beongku
  • 9 篇 ben liang
  • 9 篇 shafiur rahman
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 dong min

语言

  • 1,903 篇 英文
  • 45 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering"
1962 条 记 录,以下是111-120 订阅
排序:
Designing and Simulating a Smart Water Harvesting System Using PLC Techniques
Designing and Simulating a Smart Water Harvesting System Usi...
收藏 引用
2023 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2023
作者: Thabet, Hassaan Th. H. Al-Hilali, Aqeel A. Qasim, Haitham B. Thabit, Thabit H. Mahmood, Firas M. Al-Hadba University College Techniques Engineering Dept. of Medical Instruments Mosul Iraq Al-Farahidi University Dept. of Medical Instruments Engineering Techniques Baghdad Iraq Al-Esraa University College Dept. of Computer Science Baghdad Iraq Ninevah University Dept. of Computer Engineering and Information Mosul Iraq Cihan University-Erbil Dept. of Informatics and Software Engineering Iraq
The presence of water in human life is crucial, and God has blessed humans much with its availability. This paper tries to reduce the amount of water that people use for washing in all aspects of daily life and instea... 详细信息
来源: 评论
Exploiting Impact of Eavesdropping Attacks on Secrecy Performance in WPT-based Secure Multi-hop Transmission  14
Exploiting Impact of Eavesdropping Attacks on Secrecy Perfor...
收藏 引用
14th International Conference on Ubiquitous and Future Networks, ICUFN 2023
作者: Shim, Kyusung An, Beongku Hankyong National University School of Computer Engineering & Applied Mathematics Korea Republic of Hongik University Dept. of Software and Communications Engineering Korea Republic of
In this paper, we study the impact of various eaves-dropping attacks on the secrecy performance in wireless power transfer (WPT)-based secure multi-hop transmission. Since each node has a limited power supply, each no... 详细信息
来源: 评论
SWIN and Vision Transformer-Driven Crack Detection in the Al Qattara Oasis, UAE: Towards Sustainable Infrastructure Management  11
SWIN and Vision Transformer-Driven Crack Detection in the Al...
收藏 引用
11th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, BDCAT 2024
作者: Ali, Luqman Ambali Parambil, Medha Mohan Swavaf, Muhammed Alnajjar, Fady Aljassmi, Hamad De Man, Adriaan De Emirates Centre for Mobility Research United Arab Emirates University Dept. Computer Science and Software Engineering Al Ain United Arab Emirates United Arab Emirates University Dept. Computer Science and Software Engineering Al Ain United Arab Emirates Emirates Centre for Mobility Research Dept. Civil and Enviromental Engieering Engieering Al Ain United Arab Emirates United Arab Emirates University Dept. Tourism and Heritage Al Ain United Arab Emirates
Heritage sites are central to the cultural identity and historical narrative of a community. The Al Qattara Oasis, located in the United Arab Emirates (UAE), illustrates this function well. This study addresses the pr... 详细信息
来源: 评论
Open RAN Slicing with Quantum Optimization
arXiv
收藏 引用
arXiv 2025年
作者: Keyela, Patatchona Cherkaoui, Soumaya Computer Engineering and Software Engineering Dept. Polytechnique Montreal Montreal Canada
RAN slicing technology is a key aspect of the Open RAN paradigm, allowing simultaneous and independent provision of various services such as ultra-reliable low-latency communications (URLLC), enhanced mobile broadband... 详细信息
来源: 评论
Open RAN Slicing with Quantum Optimization
Open RAN Slicing with Quantum Optimization
收藏 引用
International Global Information Infrastructure Symposium (GIIS)
作者: Patatchona Keyela Soumaya Cherkaoui Computer Engineering and Software Engineering Dept. Polytechnique Montreal Montreal Canada
RAN slicing technology is a key aspect of the Open RAN paradigm, allowing simultaneous and independent provision of various services such as ultra-reliable low-latency communications (URLLC), enhanced mobile broadband... 详细信息
来源: 评论
A New Compensation Topology For Inductive Power Transfer (IPT) Systems  49
A New Compensation Topology For Inductive Power Transfer (IP...
收藏 引用
49th Annual Conference of the IEEE Industrial Electronics Society, IECON 2023
作者: Huang, You-Chun Madawala, Udaya Baguley, Craig A. Hsieh, Yao-Ching National Sun Yat-sen University Dept. of Electrical Engineering Kaohsiung Taiwan University of Auckland Dept. of Electrical Computer and Software Engineering Auckland New Zealand Auckland University of Technology Dept. of Electrical and Electronic Engineering Auckland New Zealand
This paper presents a new IPT compensation topology that can be operated at two different frequencies to form either primary series and secondary parallel (S-P) or primary parallel and secondary parallel (P-P) compens... 详细信息
来源: 评论
Automated Optical Inspection for Quality Control in PCBA assembly lines: a case study for Point of Sale Devices Production Lines  6
Automated Optical Inspection for Quality Control in PCBA ass...
收藏 引用
6th International Congress on Human-computer Interaction, Optimization and Robotic Applications, HORA 2024
作者: Aras, Kerem Saif, Syed Saad Giuseppi, Alessandro Coskun, Vedat R&D Center Token Financial Technologies Istanbul Turkey Dept. of Computer Control and Management of Rome La Sapienza Rome Italy Dept. of Software Engineering Istanbul Atlas University Istanbul Turkey
This paper reports on the design and development of a customized Automated Optical Inspection (AOI) solution aimed at detecting defects in a production line related to the correct mounting of integrated circuits. Cont... 详细信息
来源: 评论
Intrusion Detection System Based on Machine Learning Techniques: A Survey  2
Intrusion Detection System Based on Machine Learning Techniq...
收藏 引用
2nd International Conference on Advances in engineering Science and Technology, AEST 2022
作者: Sheet, Omar I. Ibrahim, Laheeb M. University of Mosul College of Computer Sciences & Math Software Engineering Dept. Iraq
The volume of network traffic data has become so big and complicated as a result of the development in Internet-based services that it is extremely difficult to process using typical data processing techniques. Due to... 详细信息
来源: 评论
An In-dept. Study on Handwritten Signature Authentication Using Unique Writer Traits  1
An In-Depth Study on Handwritten Signature Authentication Us...
收藏 引用
1st IEEE International Conference on Advances in Computing, Communication and Networking, ICAC2N 2024
作者: Vamsikrishna, M. Murari, Haritha Manikandan, M. Mishra, Nilamadhab Raghavendra Gupta, T. Patel, Rohit Aditya University Dept. of Computer Applications Kakinada India Spark Infotech Inc Sr Software Engineer PhoenixAZ United States VeL Tech. R Dr.S Dept. of Computer Science and Engineering Tamilnadu India VIT Bhopal University Dept. of Computer Science and Engineering Sehore India HITM Telenagana Hyderabad India Calorx Teachers' University Dept of CSE Gujrat India
Handwriting verification, a subset of signature verification, involves using handwritten text to verify or authorize someone's identification. Although simple handwriting can serve as a signature, it is often modi... 详细信息
来源: 评论
Intelligent Model for Optimizing Gantt Chart in the Planning Stage  11
Intelligent Model for Optimizing Gantt Chart in the Planning...
收藏 引用
11th International Conference on Information Technology, ICIT 2023
作者: Bdair, Noor Alzyadat, Wael Alzubi, Shadi Alzaytoonh University of Jordan Faculty of Science and IT Dept of Software Engineering Jordan Alzaytoonh University of Jordan Faculty of Science and IT Dept. of of Computer Science Jordan
Scheduling tasks under resource constraints is essential for project success, and this research focuses on scheduling tasks efficiently to minimize completion time. To tackle this problem, two optimization techniques ... 详细信息
来源: 评论