咨询与建议

限定检索结果

文献类型

  • 1,676 篇 会议
  • 248 篇 期刊文献
  • 38 册 图书

馆藏范围

  • 1,962 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,228 篇 工学
    • 1,018 篇 计算机科学与技术...
    • 867 篇 软件工程
    • 284 篇 信息与通信工程
    • 159 篇 控制科学与工程
    • 131 篇 生物工程
    • 103 篇 电气工程
    • 87 篇 生物医学工程(可授...
    • 86 篇 电子科学与技术(可...
    • 52 篇 光学工程
    • 52 篇 安全科学与工程
    • 51 篇 机械工程
    • 44 篇 动力工程及工程热...
    • 36 篇 建筑学
    • 36 篇 交通运输工程
    • 32 篇 土木工程
    • 31 篇 化学工程与技术
  • 526 篇 理学
    • 319 篇 数学
    • 143 篇 生物学
    • 94 篇 统计学(可授理学、...
    • 89 篇 物理学
    • 66 篇 系统科学
  • 374 篇 管理学
    • 214 篇 管理科学与工程(可...
    • 183 篇 图书情报与档案管...
    • 123 篇 工商管理
  • 73 篇 法学
    • 53 篇 社会学
  • 73 篇 医学
    • 71 篇 临床医学
    • 68 篇 基础医学(可授医学...
    • 47 篇 药学(可授医学、理...
  • 43 篇 经济学
    • 43 篇 应用经济学
  • 40 篇 教育学
    • 40 篇 教育学
  • 26 篇 农学
  • 5 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 61 篇 software
  • 59 篇 software enginee...
  • 56 篇 accuracy
  • 54 篇 machine learning
  • 45 篇 feature extracti...
  • 45 篇 training
  • 39 篇 computational mo...
  • 39 篇 real-time system...
  • 36 篇 deep learning
  • 34 篇 computer science
  • 33 篇 semantics
  • 29 篇 data mining
  • 29 篇 artificial intel...
  • 28 篇 internet of thin...
  • 28 篇 predictive model...
  • 28 篇 data models
  • 26 篇 analytical model...
  • 24 篇 computer archite...
  • 23 篇 support vector m...
  • 22 篇 quality of servi...

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 16 篇 dept. of compute...
  • 14 篇 dept. of electri...
  • 14 篇 dept. of softwar...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 ericsson canada

作者

  • 19 篇 ku wei-shinn
  • 19 篇 ali raja hashim
  • 19 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 10 篇 ali zeeshan ijaz
  • 10 篇 an beongku
  • 9 篇 ben liang
  • 9 篇 shafiur rahman
  • 8 篇 baik doo-kwon
  • 8 篇 cho seong-je
  • 8 篇 nisar ali
  • 8 篇 dong min

语言

  • 1,903 篇 英文
  • 45 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
检索条件"机构=Dept. of Computer and Software Engineering"
1962 条 记 录,以下是151-160 订阅
排序:
Diving into Brain Complexity: Exploring Functional and Effective Connectivity Networks  18
Diving into Brain Complexity: Exploring Functional and Effec...
收藏 引用
18th IEEE International Conference on Emerging Technologies, ICET 2023
作者: Siddique, Abu Bakar Khalid, Hassan Bin Ali, Raja Hashim University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan
The human brain's intricate functions are under-pinned by a vast network of synapses that enable chemical impulses between neurons. Neuroscientists employ two key approaches, functional and effective connectivity,... 详细信息
来源: 评论
A Preliminary Result of Food Object Detection using Swin Transformer  22
A Preliminary Result of Food Object Detection using Swin Tra...
收藏 引用
8th International Conference on computer Technology Applications, ICCTA 2022
作者: Jung, Daeil Shim, Simon Choo, Charles Hwang, Doosung Nah, Yunmook Oh, Sejong Dept. of Computer Science Dankook University Korea Republic of Dept. of Computer Engineering San Jose State University United States Dept. of Electrical Engineering San Jose State University United States Dept. of Software Science Dankook University Korea Republic of Dept. of Applied Computer Engineering Dankook University Korea Republic of
An inappropriate diet is one of the main causes of poor health. However, it is difficult to sustain a quantitative diet assessment in the general living environment. Food object detection is a key method for solving t... 详细信息
来源: 评论
Frameworks, Applications and Challenges in Streaming Big Data Analytics: A Review  3
Frameworks, Applications and Challenges in Streaming Big Dat...
收藏 引用
3rd International Conference on Innovations in computer Science and software engineering, ICONICS 2022
作者: Nabeel Mustafa, Syed Muhammd Umer Farooque, Muhammad Tahir, Muhammad Khan, Shariq Mahmood Qamar, Rohail NED University of Engineering and Technology Dept. of Computer Science and I.T Karachi Pakistan Sir Syed University of Engineering and Karachi Dept. of Software Engineering Pakistan
Data output has increased dramatically in the twenty-first century. The speed at which data is introduced into the stream has increased as a result of the digitization of practically all industries. Big data refers to... 详细信息
来源: 评论
Leveraging Smart Video-Based Learning to Enhance Student Engagement and Collaboration  6
Leveraging Smart Video-Based Learning to Enhance Student Eng...
收藏 引用
6th International Conference on Advancements in Computing, ICAC 2024
作者: Serasinghe, Chanukya Perera, Nashali Samarasinghe, Devindu Muthusinghe, Madusha Wijesundara, Malitha Sri Lanka Institute of Information Technology Dept. of Computer Science and Software Engineering Malabe Sri Lanka Sri Lanka Institute of Information Technology Faculty of Humanities and Sciences Malabe Sri Lanka
The COVID-19 pandemic has expedited the shift in education to online learning, which has exposed shortcomings in virtual learning environments' personalization and engagement. This research addresses these issues ... 详细信息
来源: 评论
GAN vs. LSTM: Network State Prediction  17
GAN vs. LSTM: Network State Prediction
收藏 引用
17th International Conference on Ubiquitous Information Management and Communication, IMCOM 2023
作者: Byun, Gyurin Raza, Syed M. Yang, Huigyu Kim, Moonseong Choo, Hyunseung Sungkyunkwan University Dept. of Superintelligence Engineering Suwon Korea Republic of College of Computing and Informatics Sungkyunkwan University Suwon Korea Republic of Seoul Theological University Dept. of It Convergence Software Bucheon Korea Republic of Sungkyunkwan University Dept. of Electrical and Computer Engineering Suwon Korea Republic of
Network Traffic prediction is the prerequisite for proactive traffic management, where a longer duration and high accuracy of prediction ensures a more effective solution. This paper exploits Generative Adversarial Ne... 详细信息
来源: 评论
Fine-Tuning Vision Transformer for Arabic Sign Language Video Recognition on Augmented Small-Scale Dataset
Fine-Tuning Vision Transformer for Arabic Sign Language Vide...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Gochoo, Munkhjargal Batnasan, Ganzorig Ahmed, Ahmed Abdelhadi Otgonbold, Munkh-Erdene Alnajjar, Fady Shih, Timothy K. Tan, Tan-Hsu Wee, Lai Khin United Arab Emirates University Dept. of Computer Science and Software Engineering Al Ain United Arab Emirates College of EECS National Central University Taoyuan Taiwan National Taipei University of Technology Dept. of Electrical Engineering Taipei Taiwan University of Malaya Dept. of Biomedical Engineering Kuala Lumpur Malaysia
With the rise of AI, the recognition of Sign Language (SL) through sign-to-text has gained significance in the field of computer vision and deep machine learning. However, there are only a few medium to large open dat... 详细信息
来源: 评论
An Image Analysis-Based Automated Method using Deep Learning for Grain Counting  17
An Image Analysis-Based Automated Method using Deep Learning...
收藏 引用
17th IEEE International Conference on Industrial and Information Systems, ICIIS 2023
作者: Ajikaran, Ramesh Hewarathna, Ashen Iranga Palanisamy, Vigneshwaran Joseph, Charles Thuseethan, Selvarajah Sabaragamuwa University of Sri Lanka Dept. of Computing and Infromation Systems Sri Lanka Sabaragamuwa University of Sri Lanka Dept. of Software Engineering Sri Lanka Fau Dept. of Computer Science Germany School of Information Technology Deakin University Australia
In the process of quality analysis of grains, number counting is one of the key steps for agricultural production. Traditional manual grain counting methods are time-consuming and subject to human error, and automated... 详细信息
来源: 评论
Visualizing the Path of a Photo Taker from Image Metadata  4
Visualizing the Path of a Photo Taker from Image Metadata
收藏 引用
4th International Informatics and software engineering Conference, IISEC 2023
作者: Majid, Rasty Shakhawan Varol, Cihan Varol, Asaf Nasab, Ahad Firat University Department of Software Engineering Erbil Iraq Sam Houston State University Computer Science Department HuntsvilleTX United States College of Engineering and Computer Science Dept. of Engineering Management and Technology ChattanoogaTN United States
One of the most challenging investigations in forensic analysis is the work conducted on smartphones. Specifically using smartphone data to provide evidence for a case is becoming a norm nowadays. Many Android device ... 详细信息
来源: 评论
Leveraging a Hierarchical Selection of Communities in Social Networks to Maximize Diffusion  9
Leveraging a Hierarchical Selection of Communities in Social...
收藏 引用
9th International Conference on Web Research, ICWR 2023
作者: Heidari, Mohsen Fasahat, Mohamad Ali Afsharian, Sanaz Artishdar, Parinaz Esfarayen University Dept. of Electrical Computer and Industrial Engineering North Khorasan Iran Mehr Alborz Higher Education Institute Dept. of Computer Science Tehran Iran Islamic Azad University Damavand Branch English Department Tehran Iran Islamic Azad University Yadegar Emam Khomeini Branch Dept. of Software Engineering Tehran Iran
For businesses, discovering key nodes in social networks has a high computational overhead and cost. Because of this, in the problem of influence maximization, at least key nodes with the most influence in social netw... 详细信息
来源: 评论
AASH: A Lightweight and Efficient Static IoT Malware Detection Technique at Source Code Level  3
AASH: A Lightweight and Efficient Static IoT Malware Detecti...
收藏 引用
3rd Asia Conference on computers and Communications, ACCC 2022
作者: Glani, Yasir Ping, Luo Shah, Syed Asad Software School Tsinghua University Beijing China Dept. of Computer Engineering Bilkent University Ankara Turkey
IoT malware applications significantly threaten user privacy and security. Traditionally, IoT developers have focused primarily on hardware, but connectivity requires additional embedded software, usually developed by... 详细信息
来源: 评论