咨询与建议

限定检索结果

文献类型

  • 1,855 篇 会议
  • 279 篇 期刊文献
  • 42 册 图书

馆藏范围

  • 2,176 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,332 篇 工学
    • 1,069 篇 计算机科学与技术...
    • 903 篇 软件工程
    • 307 篇 信息与通信工程
    • 182 篇 控制科学与工程
    • 138 篇 生物工程
    • 130 篇 电气工程
    • 117 篇 电子科学与技术(可...
    • 102 篇 生物医学工程(可授...
    • 61 篇 光学工程
    • 60 篇 机械工程
    • 53 篇 安全科学与工程
    • 48 篇 动力工程及工程热...
    • 38 篇 建筑学
    • 36 篇 仪器科学与技术
    • 36 篇 化学工程与技术
    • 36 篇 交通运输工程
  • 580 篇 理学
    • 341 篇 数学
    • 149 篇 生物学
    • 115 篇 物理学
    • 98 篇 统计学(可授理学、...
    • 72 篇 系统科学
  • 392 篇 管理学
    • 230 篇 管理科学与工程(可...
    • 188 篇 图书情报与档案管...
    • 134 篇 工商管理
  • 87 篇 医学
    • 84 篇 临床医学
    • 78 篇 基础医学(可授医学...
    • 52 篇 药学(可授医学、理...
  • 75 篇 法学
    • 55 篇 社会学
  • 48 篇 经济学
    • 48 篇 应用经济学
  • 41 篇 教育学
    • 41 篇 教育学
  • 27 篇 农学
  • 6 篇 文学
  • 4 篇 军事学
  • 1 篇 艺术学

主题

  • 63 篇 software enginee...
  • 63 篇 software
  • 62 篇 accuracy
  • 58 篇 machine learning
  • 50 篇 computational mo...
  • 50 篇 feature extracti...
  • 48 篇 training
  • 44 篇 deep learning
  • 41 篇 real-time system...
  • 36 篇 semantics
  • 35 篇 computer science
  • 34 篇 analytical model...
  • 33 篇 artificial intel...
  • 32 篇 predictive model...
  • 31 篇 computer archite...
  • 30 篇 internet of thin...
  • 30 篇 data mining
  • 30 篇 data models
  • 25 篇 testing
  • 23 篇 reliability

机构

  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 dept. of compute...
  • 15 篇 dept. of compute...
  • 15 篇 dept. of softwar...
  • 14 篇 dept. of electri...
  • 13 篇 dept. of compute...
  • 13 篇 dept. of compute...
  • 12 篇 dept. of softwar...
  • 12 篇 dept. of compute...
  • 11 篇 bcmaterials basq...
  • 11 篇 state key labora...
  • 11 篇 bcmaterials basq...
  • 11 篇 dept. of compute...
  • 10 篇 college of compu...
  • 10 篇 dept. of electri...
  • 10 篇 dept. of compute...
  • 9 篇 hongik universit...

作者

  • 19 篇 ku wei-shinn
  • 19 篇 raja hashim ali
  • 18 篇 ali raja hashim
  • 16 篇 usama arshad
  • 15 篇 arshad usama
  • 15 篇 baldwin timothy
  • 14 篇 zain ul abideen
  • 14 篇 yvon savaria
  • 12 篇 min dong
  • 12 篇 shiri nematollaa...
  • 12 篇 beongku an
  • 11 篇 qusay h. mahmoud
  • 11 篇 buyya rajkumar
  • 11 篇 an beongku
  • 10 篇 ali zeeshan ijaz
  • 9 篇 ben liang
  • 9 篇 rahman shafiur
  • 8 篇 m. sawan
  • 8 篇 baik doo-kwon
  • 8 篇 nisar ali

语言

  • 1,993 篇 英文
  • 169 篇 其他
  • 6 篇 朝鲜文
  • 5 篇 中文
  • 3 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Dept. of Computer and Software Engineering Polytechnique"
2176 条 记 录,以下是701-710 订阅
An Edge Detection with LSB and AES Encryption Based Image Steganography
An Edge Detection with LSB and AES Encryption Based Image St...
收藏 引用
International Conference on Information and computer Technologies (ICICT)
作者: Sheikh Thanbir Alam Munira Tabassum Mou Md Maruf Hassan Touhid Bhuiyan Faculty of Electronic Engineering & Technology Malaysia Army War Game Centre Bangladesh Army University Malaysia Perlis Perlis Dhaka Bangladesh Department of Software Engineering Daffodil International University Dhaka Bangladesh Dept. of Computer Science & Engineering Southeast University Bangladesh Washington University of Science & Technology Virginia USA School of IT Washington University of Science and Technology Virginia USA
The protection of confidential data has been a critical concern since ancient times. Steganography and cryptography are two key techniques used to enhance data security. Cryptography transforms confidential data into ... 详细信息
来源: 评论
An Enhanced Genetic Algorithm Framework for Efficient Solutions to Capacitated Vehicle Routing Problems
An Enhanced Genetic Algorithm Framework for Efficient Soluti...
收藏 引用
International Conference on Emerging Technologies, ICET
作者: Usama Arshad Hamza Hasan Ellahie Zain ul Abideen Raja Hashim Ali Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan BCMaterials Basque Center for Materials Applications & Nanostructure Leioa Basque Country Spain Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany
Capacitated Vehicle Routing Problems (CVRPs), a widely acknowledged NP-hard issue, pertains to the optimal routing of a limited-capacity vehicle fleet to fulfill customer demand, aiming for the least possible travel d...
来源: 评论
Technical Debt Management: The Road Ahead for Successful software Delivery
arXiv
收藏 引用
arXiv 2024年
作者: Avgeriou, Paris Ozkaya, Ipek Chatzigeorgiou, Alexander Ciolkowski, Marcus Ernst, Neil A. Koontz, Ronald J. Poort, Eltjo Shull, Forrest Dept. of Computing Science University of Groningen Groningen Netherlands Software Engineering Institute Carnegie Mellon University PittsburghPA United States Dept. of Applied Informatics University of Macedonia Thessaloniki Greece QAware GmbH München Germany Department of Computer Science University of Victoria Victoria Canada The Boeing Company MesaAZ United States CGI Rotterdam Netherlands
Technical Debt, considered by many to be the 'silent killer' of software projects, has undeniably become part of the everyday vocabulary of software engineers. We know it compromises the internal quality of a ... 详细信息
来源: 评论
The YOLOv8 Edge: Harnessing Custom Datasets for Superior Real-Time Detection
The YOLOv8 Edge: Harnessing Custom Datasets for Superior Rea...
收藏 引用
International Conference on Emerging Technologies, ICET
作者: Tafreed Ahmed Ahmad Maaz Danyaal Mahmood Zain ul Abideen Usama Arshad Raja Hashim Ali Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan BCMaterials Basque Center for Materials Applications & Nanostructure Leioa Basque Country Spain Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany
YOLO has become a central real-time object detection system for robotics, driverless cars, and video monitoring applications. Developing a custom object detection solution that can detect specific objects in real-time...
来源: 评论
The real time railway monitoring system suitable for multi-view object based on sensor stream data tracking
The real time railway monitoring system suitable for multi-v...
收藏 引用
2020 International Conference on Information Science and Communications Technologies, ICISCT 2020
作者: Abduvaytov, Abbos Abdu Kayumbek, Rakhimov Mukhammad Jeon, Heung Seok Oh, Ryumduck Korea National University of Transportation Dept. of Software Chungju Korea Republic of Konkuk University Dept. of Computer Engineering Chungju Korea Republic of
A glance on the developments of the railway safety system reveals that the consistent research has made a remarkable progresses finding and devising techniques to alleviate noise and vibration resulting from wheel and... 详细信息
来源: 评论
Intelligent Horizontal Autoscaling in Edge Computing Using a Double Tower Neural Network
SSRN
收藏 引用
SSRN 2022年
作者: Violos, John Tsanakas, Stylianos Theodoropoulos, Theodoros Leivadeas, Aris Tserpes, Konstantinos Varvarigou, Theodora School of Electrical and Computer Engineering National Technical University of Athens Zografou Greece Dept. of Informatics and Telematics Harokopio University of Athens Tavros Greece Dept. of Software and Information Technology Engineering École de Technology Supérieure Montreal Canada
Edge computing is characterised by a varying workload intensity that has a strong effect in the applications performance and their resource requirements. Thus, in order to maintain a sustainable performance a resource... 详细信息
来源: 评论
Investigating the Use of Natural Language Processing in Electronic Medical Record
Investigating the Use of Natural Language Processing in Elec...
收藏 引用
International Conference on Computing and Networking Technology (ICCNT)
作者: Balaram Yadav Kasula Sachin C. Patil Prashamsh Takkalapally Ketan Gupta J. Logeshwaran Dept of Information Technology University Of The Cumberlands Williamsburg KY USA Senior Software Engineer USA Department of Engineering Computing and Mathematical Sciences Lewis University USA Dept. of Information Technology University of The Cumberlands Williamsburg KY USA Department of Computer Science CHRIST (Deemed to be University) Bengaluru Karnataka India
Natural language processing (NLP) implemented in digital scientific records (EMRs) can substantially enhance the nice and efficiency of affected person care. The purpose of NLP implemented in EMRs is to extract applic... 详细信息
来源: 评论
Reversing obfuscated control flow structures in android apps using ReDex optimizer  9
Reversing obfuscated control flow structures in android apps...
收藏 引用
9th International Conference on Smart Media and Applications, SMA 2020
作者: You, Geunha Kim, Gyoosik Park, Jihyeon Cho, Seong-Je Park, Minkyu Dept. of Computer Science and Engineering Dankook University Korea Republic of Dept. of Convergence Technology Korea Telecom Korea Republic of Dept. of Software Science Dankook University Korea Republic of Dept. of Software Technology Konkuk University Korea Republic of
Code obfuscation is a technique that makes programs harder to understand. Malware writers widely the obfuscation technique to evade detection from anti-malware software, or to deter reverse engineering attempts for th... 详细信息
来源: 评论
EEG Feature Extraction with Fast Fourier Transform for Investigating different Brain regions in Cognitive and Reasoning Activity  5
EEG Feature Extraction with Fast Fourier Transform for Inves...
收藏 引用
5th IEEE International Symposium in Robotics and Manufacturing Automation, ROMA 2022
作者: Amin, Hafeez Ullah Hafeez, Yasir Reza, Mohammed Faruque Adil, Syed Hasan Hasan, Rumaisa Abu Ali, Syed Saad Azhar University of Nottingham Malaysia School of Computer Science Faculty of Science and Engineering Semenyih43500 Malaysia Universiti Sains Malaysia Dept. of Neurosciences Kota Bharu Kubang Kerian Malaysia Iqra University Software Engineering Department Karachi Pakistan Universiti Teknologi Petronas Centre for Intelligent Signal and Imaging Research Electrical and Electronics Engineering Department Perak Seri Iskandar32610 Malaysia King Fahd University of Petroleum and Minerals Aerospace Engineering Department Dhahran31261 Saudi Arabia
In this study, cortical brain activity during a pattern matching task (PMT) was measured by employing electroencephalography (EEG). The EEG data were recorded from 128 scalp locations during a pattern-matching task an... 详细信息
来源: 评论
Signed Network Embedding with Dynamic Metric Learning  16
Signed Network Embedding with Dynamic Metric Learning
收藏 引用
16th IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2020
作者: Wu, Huanguang Guan, Donghai Han, Guangjie Yuan, Weiwei Guizani, Mohsen Nanjing University of Aeronautics and Astronautics Dept. of Computer Science and Technology Nanjing China Dalian University of Technology Dept. School of Software Dalian China Qatar University Dept. of Computer Science and Engineering Qatar
Network embedding is an important method to learn low-dimensional vector representations of nodes in networks, which has wide-ranging applications in network analysis such as link prediction. Most existing network emb... 详细信息
来源: 评论