咨询与建议

限定检索结果

文献类型

  • 1,806 篇 会议
  • 1,125 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 2,989 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,883 篇 工学
    • 1,484 篇 计算机科学与技术...
    • 1,256 篇 软件工程
    • 346 篇 信息与通信工程
    • 285 篇 控制科学与工程
    • 217 篇 生物工程
    • 160 篇 电气工程
    • 159 篇 生物医学工程(可授...
    • 146 篇 机械工程
    • 118 篇 光学工程
    • 118 篇 电子科学与技术(可...
    • 71 篇 化学工程与技术
    • 69 篇 安全科学与工程
    • 68 篇 交通运输工程
    • 67 篇 仪器科学与技术
    • 58 篇 动力工程及工程热...
  • 895 篇 理学
    • 491 篇 数学
    • 241 篇 生物学
    • 229 篇 物理学
    • 153 篇 统计学(可授理学、...
    • 127 篇 系统科学
    • 66 篇 化学
  • 599 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 250 篇 图书情报与档案管...
    • 174 篇 工商管理
  • 169 篇 医学
    • 137 篇 临床医学
    • 118 篇 基础医学(可授医学...
    • 74 篇 公共卫生与预防医...
    • 69 篇 药学(可授医学、理...
  • 95 篇 法学
    • 77 篇 社会学
  • 65 篇 经济学
    • 65 篇 应用经济学
  • 51 篇 教育学
  • 34 篇 农学
  • 18 篇 文学
  • 9 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 78 篇 machine learning
  • 73 篇 deep learning
  • 62 篇 artificial intel...
  • 59 篇 software
  • 54 篇 computational mo...
  • 54 篇 accuracy
  • 49 篇 feature extracti...
  • 47 篇 training
  • 45 篇 semantics
  • 44 篇 predictive model...
  • 43 篇 information tech...
  • 41 篇 optimization
  • 39 篇 data mining
  • 37 篇 internet of thin...
  • 36 篇 support vector m...
  • 35 篇 security
  • 34 篇 software testing
  • 31 篇 software systems

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 school of comput...
  • 23 篇 state key labora...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 15 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 herawan tutut
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 muhammad waseem ...
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 12 篇 ahmed bestoun s.
  • 12 篇 belikov juri
  • 12 篇 suhaimi ibrahim

语言

  • 2,814 篇 英文
  • 150 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Science and Software Engineering"
2989 条 记 录,以下是1071-1080 订阅
排序:
Framework of software design patterns for energy-aware embedded systems  15
Framework of software design patterns for energy-aware embed...
收藏 引用
15th International Conference on Evaluation of Novel Approaches to software engineering, ENASE 2020
作者: Schaarschmidt, Marco Uelschen, Michael Pulvermuller, Elke Westerkamp, Clemens Faculty of Engineering and Computer Science University of Applied Sciences Osnabrück Germany Software Engineering Research Group University of Osnabrück Germany
With the increasing size and complexity of embedded systems, the impact of software on energy consumption is becoming more important. Previous research focused mainly on energy optimization at the hardware level. Howe... 详细信息
来源: 评论
Image Reconstruction with B0 Inhomogeneity using an Interpretable Deep Unrolled Network on an Open-bore MRI-Linac
arXiv
收藏 引用
arXiv 2024年
作者: Shan, Shanshan Gao, Yang Waddington, David E.J. Chen, Hongli Whelan, Brendan Liu, Paul Z.Y. Wang, Yaohui Liu, Chunyi Gan, Hongping Gao, Mingyuan Liu, Feng Soochow University Suzhou215123 China Image X Institute Sydney School of Health Sciences Faculty of Medicine and Health University of Sydney Sydney2015 Australia Department of Medical Physics Ingham Institute of Applied Medical Research Liverpool2170 Australia School of Computer Science and Engineering Central South University Changsha410083 China School of Electrical Engineering and Computer Science University of Queensland Brisbane4072 Australia Institute of Electrical Engineering Chinese Academy of Science Beijing100190 China School of Software Northwestern Polytechnical University Taicang215400 China
MRI-Linac systems require fast image reconstruction with high geometric fidelity to localize and track tumours for radiotherapy treatments. However, B0 field inhomogeneity distortions and slow MR acquisition potential... 详细信息
来源: 评论
Assessing Cybersecurity Awareness among The Hashemite University Students In Terms Of computer Usage
Assessing Cybersecurity Awareness among The Hashemite Univer...
收藏 引用
International Conference on Electronics, computers and Artificial Intelligence (ECAI)
作者: Ashraf H. Aljammal Ahmad Qawasmeh Salah Taamneh Fadi Wedyan Mamoon Obiedat Hani Bani Salameh Department of Computer Science and Applications Prince Al Hussein bin Abdullah II Faculty of Information Technology The Hashemite University Zarqa Jordan Department of Engineering Computing and Mathematical Sciences Lewis University Romeoville Illinois USA Department of Information Technology Prince Al Hussein bin Abdullah II Faculty of Information Technology The Hashemite University Zarqa Jordan Department of Software Engineering Prince Al Hussein bin Abdullah II Faculty of Information Technology The Hashemite University Zarqa Jordan
Internet usage among information technology users has expanded substantially, as have cybercrimes with potentially disastrous repercussions. Therefore, internet users have to employ the available security measures and... 详细信息
来源: 评论
Detecting of vertically-oriented texts in images containing natural scenes  17
Detecting of vertically-oriented texts in images containing ...
收藏 引用
17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2020
作者: Ling Ong, Yi Theng Lau, Bee Chai, Almon Mccarthy, Chris Faculty of Engineering Computing and Science Swinburne University of Technology Sarawak Kuching Malaysia Department of Computer Science and Software Engineering Swinburne University of Technology MelbourneVIC Australia
Universally, scene text in natural images is an expressive means of communication. Texts available in an image could provide important information which can enhance the interpretation of the image, for instance texts ... 详细信息
来源: 评论
Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem
Cryptanalysis of a Tightly-Secure Authenticated Key Exchange...
收藏 引用
2021 International Conference on Information Technology, ICIT 2021
作者: Mohammad, Zeyad Alkhatib, Ahmad Aa Lafi, Mohammed Abusukhon, Ahmad Albashish, Dheeb Atwan, Jaffar Al-Zaytoonah University of Jordan IT Faculty Computer Science Dept. Amman Jordan Al-Zaytoonah University of Jordan Department of Software Engineering Amman Jordan Al-Balqa Applied University Prince Abdullah Bin Ghazi Faculty of Information and Communication Technolgy Computer Science Department Sa lt Jordan Al-Balqa Applied University Prince Abdullah Bin Ghazi Faculty of ICT CIS Department Sa lt Jordan
Authenticated key exchange protocols are a fundamental cryptography building block for establishing a secret shared key among participating parties over an open network model. Mohamed et al. proposed a tightly-secure ... 详细信息
来源: 评论
SIBW: A Swarm Intelligence-Based Network Flow Watermarking Approach for Privacy Leakage Detection in Digital Healthcare Systems
收藏 引用
IEEE Journal of Biomedical and Health Informatics 2025年 PP卷 PP页
作者: Qiao, Sibo Guo, Qiang Shi, Fengdong Wang, Min Zhu, Haohao Khan, Fazlullah Rodrigues, Joel J.P.C. Lyu, Zhihan School of Software Tiangong University Tianjin300387 China School of Artificial Intelligence Tiangong University Tianjin300387 China National Demonstration Center for Experimental Engineering Training Education Tiangong University Tianjin300387 China School of Life Sciences Tiangong University Tianjin300387 China School of Control Sciences and Engineering Tiangong University Tianjin300387 China School of Computer Science Faculty of Science and Engineering University of Nottingham Ningbo China Zhejiang Ningbo315104 China Higher School of Technology Amazonas State University Amazonas Manaus69050-010 Brazil Department of Game Design Faculty of Arts Uppsala University Uppsala Sweden
The exponential growth of sensitive patient information and diagnostic records in digital healthcare systems has increased the complexity of data protection, while frequent medical data breaches severely compromise sy... 详细信息
来源: 评论
Parameterized Complexity of Weighted Local Hamiltonian Problems and the Quantum Exponential Time Hypothesis
arXiv
收藏 引用
arXiv 2022年
作者: Bremner, Michael J. Ji, Zhengfeng Li, Xingjian Mathieson, Luke Morales, Mauro E.S. Centre for Quantum Computation and Communication Technology Australia Centre for Quantum Software and Information Australia School of Computer Science Faculty of Engineering & Information Technology University of Technology SydneyNSW2007 Australia Department of Computer Science and Technology Tsinghua University Beijing China
We study a parameterized version of the local Hamiltonian problem, called the weighted local Hamiltonian problem, where the relevant quantum states are superpositions of computational basis states of Hamming weight k.... 详细信息
来源: 评论
Stochastic Optimization for Non-convex Problem with Inexact Hessian Matrix, Gradient, and Function
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Liu Liu, Xuanqing Hsieh, Cho-Jui Tao, Dacheng Institute of Artificial Intelligence State Key Lab of Software Development Environment Beihang University China University of California Los Angeles United States School of Computer Science Sydney AI Centre Faculty of Engineering the University of Sydney SydneyNSW2008 Australia
Trust-region (TR) and adaptive regularization using cubics (ARC) have proven to have some very appealing theoretical properties for non-convex optimization by concurrently computing function value, gradient, and Hessi... 详细信息
来源: 评论
Does color modalities affect handwriting recognition? An empirical study on Persian handwritings using convolutional neural networks
arXiv
收藏 引用
arXiv 2023年
作者: Zohrevand, Abbas Imani, Zahra Sadri, Javad Suen, Ching Y. Dept. of Computer Engineering Kosar University of Bojnord Bojnord Iran Camp in Labs Foundation 1 Westmount Square Bureau 1001 WestmountQCH3Z 2P9 Canada Dept. of Computer Science and Software Engineering Faculty of Engineering and Computer Science Concordia University MontrealQC Canada Center for Pattern Recognition and Machine Intelligence Concordia University MontrealH3G 1M8 Canada
Most of the methods on handwritten recognition in the literature are focused and evaluated on Black and White (BW) image databases. In this paper we try to answer a fundamental question in document recognition. Using ... 详细信息
来源: 评论
The Low-Cost IoT Mornitoring the Quality of River: A Case Study of Wang River in Lampang Municipality
The Low-Cost IoT Mornitoring the Quality of River: A Case St...
收藏 引用
International computer science and engineering Conference (ICSEC)
作者: Narong Krueganta Oran Chieochan Anukit Saokaew Ekkachai Yana Chaowoot Singkaew Weerachai Sawangtook Ekkarat Boonchieng Warakhom Wongchai Sakchai Srimakorn Faculty of Industrial Technology School of Industrial Technology Lampang Rajabhat University Lampang Thailand Faculty of Sciences School of Information Technology Lampang Rajabhat University Lampang Thailand Faculty of Science School of Environmental innovation Lampang Rajabhat University Lampang Thailand Faculty of Industrial Technology School of Computer Engineering Lampang Rajabhat University Lampang Thailand Department of Computer Sciences Faculty of Sciences Chiang Mai University Chiang Mai Thailand Faculty of Industrial Technology School of Industrial Electrical Engineering Lampang Rajabhat University Lampang Thailand Faculty of Industrial Technology School of Software Engineering Lampang Rajabhat University Lampang Thailand
The research project focuses on prototyping an IoT (Internet of Things) system for measuring and monitoring the quality of the Wang River in Lampang Municipality. The system utilizes EC (Electrical Conductivity), pH, ...
来源: 评论