咨询与建议

限定检索结果

文献类型

  • 1,855 篇 会议
  • 279 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,332 篇 工学
    • 1,069 篇 计算机科学与技术...
    • 903 篇 软件工程
    • 307 篇 信息与通信工程
    • 182 篇 控制科学与工程
    • 138 篇 生物工程
    • 130 篇 电气工程
    • 117 篇 电子科学与技术(可...
    • 102 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 60 篇 机械工程
    • 53 篇 安全科学与工程
    • 48 篇 动力工程及工程热...
    • 38 篇 建筑学
    • 36 篇 仪器科学与技术
    • 36 篇 化学工程与技术
    • 36 篇 交通运输工程
  • 580 篇 理学
    • 341 篇 数学
    • 149 篇 生物学
    • 115 篇 物理学
    • 98 篇 统计学(可授理学、...
    • 72 篇 系统科学
  • 392 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 134 篇 工商管理
  • 87 篇 医学
    • 84 篇 临床医学
    • 78 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 41 篇 教育学
    • 41 篇 教育学
  • 27 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 63 篇 software enginee...
  • 63 篇 software
  • 62 篇 accuracy
  • 58 篇 machine learning
  • 50 篇 computational mo...
  • 50 篇 feature extracti...
  • 48 篇 training
  • 44 篇 deep learning
  • 41 篇 real-time system...
  • 36 篇 semantics
  • 35 篇 computer science
  • 34 篇 analytical model...
  • 33 篇 artificial intel...
  • 32 篇 predictive model...
  • 31 篇 computer archite...
  • 30 篇 internet of thin...
  • 30 篇 data mining
  • 30 篇 data models
  • 25 篇 testing
  • 23 篇 reliability

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 raja hashim ali
  • 18 篇 ali raja hashim
  • 16 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 9 篇 rahman shafiur
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 nisar ali

语言

  • 1,993 篇 英文
  • 169 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2176 条 记 录,以下是421-430 订阅
Enhanced Healthcare Through Metaverse Integration: Explainable AI and Blockchain for Trust, Security, and Immersive Experiences
Enhanced Healthcare Through Metaverse Integration: Explainab...
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Bilal Ibrahim Sowan Hazem Qattous Mohammad Fasha Ahmad Altarawneh Dept. of Bus. Intell. & Data Analytics University of Petra Amman Jordan Dept. of Software Engineering Princess Sumaya University for Technology Amman Jordan Dept. of Computer Science Brunel University of London London UK
The metaverse, a dynamic blend of virtual and augmented reality, holds extraordinary promise for reshaping the healthcare landscape. By integrating advanced technologies such as virtual reality (VR), artificial intell... 详细信息
来源: 评论
Web Accessibility of the Cyprus Island Food Retailers' Websites
Web Accessibility of the Cyprus Island Food Retailers' Websi...
收藏 引用
Human-computer Interaction, Optimization and Robotic Applications (HORA), International Congress on
作者: Erkut Inan Iseri Kaan Uyar Umit Ilhan Dept. of Physics Near East University Nicosia Turkey Dept. of Software Engineering Near East University Nicosia Turkey Dept. of Computer Engineering Near East University Nicosia Turkey
Accessibility is the process of making information and electronic communication environments meaningful and usable for most people including those with disabilities. It is not always an easy task to provide all user c...
来源: 评论
Driving Behavior Classification Using Smartphone Sensor Data
Driving Behavior Classification Using Smartphone Sensor Data
收藏 引用
International Conference on computer Science and engineering (UBMK)
作者: Deniz Dikbıyık Fatih Alagöz Dept. of Software Engineering Boğaziçi University İstanbul Türkiye Dept. of Computer Engineering Boğaziçi University İstanbul Türkiye
Given the substantial number of accidents because of human error, the development of automatic driver behavior monitoring systems has become a pressing need. By providing real-time monitoring and analysis of driving b...
来源: 评论
An Automated Calibration Scheme for PLL in Time-to-Digital Converters  5
An Automated Calibration Scheme for PLL in Time-to-Digital C...
收藏 引用
5th International Conference on Circuits and Systems, ICCS 2023
作者: Xu, Jiayuan Yu, Hang Li, Yan Xi, Daoming Ge, Binjie Liu, Hongzhao College of Computer Science and Software Engineering Shenzhen University Shenzhen Laboratory of Ic Design for Iot Shenzhen China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Hefei China Shenzhen MSU-BIT University Dept. of Electronics and Computer Engineering Shenzhen China Quality and Standards Academy Shenzhen Technology University Shenzhen China
In high performance Time-to-Digital Converters (TDCs), PLL can be adopted to generate the required reference clock, which is in ∼ 100 MHz range. In order to improve the phase noise performance, the full VCO frequency... 详细信息
来源: 评论
Stock Price Prediction Using LSTMSeq2Seq: A Deep Learning Approach with Advanced Feature engineering
Stock Price Prediction Using LSTMSeq2Seq: A Deep Learning Ap...
收藏 引用
International Conference on computer and Information Technology (ICCIT)
作者: Md. Kalim Amzad Chy Abdul Kadar Muhammad Masum Mohammed Shamsul Alam Md. Abul Kalam Azad Md Zia Uddin Dept. of AI Innovation Liberate Labs Texas USA Dept. of Software Engineering Daffodil International University Dhaka Bangladesh Dept. of Computer Science and Engineering International Islamic University Chittagong Chittagong Bangladesh Dept. of Business and Technology Management Islamic University of Technology Gazipur Bangladesh Software and Service Innovation Department SINTEF Digital Oslo Norway
This paper explores stock price prediction in the context of the Bangladesh stock market using advanced deep learning methodologies, specifically the LSTMSeq2Seq model. Traditional analytical techniques often fail to ... 详细信息
来源: 评论
MTDC Fault Detection and Localization Using High-Pass Filter
MTDC Fault Detection and Localization Using High-Pass Filter
收藏 引用
Annual Conference of Industrial Electronics Society
作者: Saad Ahmed Khan Abhisek Ukil Nirmal-Kumar C. Nair Dongyu Li Dept. of Electrical Computer and Software Engineering The University of Auckland Auckland New Zealand School of Electrical and Automation Engineering East China Jiaotong University Nanchang China
The DC link capacitor discharge in the event of a DC fault is rapid and contains high frequencies. This rapid discharge of high current and frequency interface with DC bus, Voltage Source Converter (VSC), and AC sourc... 详细信息
来源: 评论
Web Application-Based Enhanced Esophageal Disease Diagnosis in Low-Resource Settings
Web Application-Based Enhanced Esophageal Disease Diagnosis ...
收藏 引用
IEEE International Conference on Biomedical engineering, computer and Information Technology for Health
作者: Abdullah Al Masum Zishad Hossain Limon Md Ariful Islam Md Shahidur Rahman Mahbub Khan Sheikh Shemanto Afridi Md. Redwan Ahmed Shafiur Rahman Dept. of Information Technology Westcliff University CA USA Dept. of Computer Science Westcliff University CA USA Dept. of Business Administration International American University CA USA Dept. of Engineering management Westcliff University CA USA Dept. of Management Information System Pacific State University CA USA Dept. of Computer Science and Engineering East West University Dhaka Bangladesh Dept. of Software Engineering Daffodil International University Dhaka Bangladesh
An essential part of the digestive system, the esophagus permits food and liquids to move easily from the throat to the stomach. Traditional diagnostic techniques, such as endoscopy and biopsy, are invasive and resour... 详细信息
来源: 评论
A Comparative Study of the Performance of Real time databases and Big data Analytics Frameworks
A Comparative Study of the Performance of Real time database...
收藏 引用
International Multi-Topic ICT Conference (IMTIC)
作者: Syed Muhammd Nabeel Mustafa Muhammad Umer Farooq Syeda Sundus Zehra Jospeh Peter Terenece Noronha Dept. of Computer Science & I.T NED University of Engineering and Technology Karachi Pakistan Dept. of Software Engineering Sir Syed University of Engineering and Technology Karachi Pakistan
The amelioration of information technology and the infiltration of it almost all the sectors of world have resulted in massive efflux of data. The rampant increase in the generation of data has introduced to a new ter...
来源: 评论
SCHC over DtS-IoT: Performance of SCHC Confirmation Modes in Satellite IoT
SCHC over DtS-IoT: Performance of SCHC Confirmation Modes in...
收藏 引用
IEEE World Forum on Internet of Things (WF-IoT)
作者: Rodrigo Munoz-Lara Sandra Céspedes Marcos Diaz Dept.of Electrical Engineering University of Chile Santiago Chile Dept. of Computer Science & Software Eng. Concordia University Montreal QC Canada
Static Context Header Compression and Fragmentation (SCHC) is a standard defined as an adaptation layer for supporting IPv6, UDP, and CoAP protocols in low power wide area network (LPWAN) technologies. SCHC has fragme... 详细信息
来源: 评论
Adaptive Security Policy Management in Cloud Environments Using Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Saqib, Muhammad Mehta, Dipkumar Yashu, Fnu Malhotra, Shubham Dept. of Computer Science Texas Tech University LubbockTX United States C.K.Pithawalla College of Engineering and Technology Gujrat India Dept. of Computer Science Stony Brook University Stony BrookNY United States Dept. of Software Engineering Rochester Institute of Technology RochesterNY United States
The security of cloud environments, such as Amazon Web Services (AWS), is complex and dynamic. Static security policies have become inadequate as threats evolve and cloud resources exhibit elasticity [1]. This paper a... 详细信息
来源: 评论