咨询与建议

限定检索结果

文献类型

  • 1,806 篇 会议
  • 1,133 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 2,997 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,889 篇 工学
    • 1,490 篇 计算机科学与技术...
    • 1,260 篇 软件工程
    • 348 篇 信息与通信工程
    • 289 篇 控制科学与工程
    • 217 篇 生物工程
    • 162 篇 电气工程
    • 159 篇 生物医学工程(可授...
    • 147 篇 机械工程
    • 119 篇 电子科学与技术(可...
    • 118 篇 光学工程
    • 71 篇 化学工程与技术
    • 69 篇 安全科学与工程
    • 68 篇 交通运输工程
    • 66 篇 仪器科学与技术
    • 58 篇 动力工程及工程热...
  • 897 篇 理学
    • 492 篇 数学
    • 241 篇 生物学
    • 230 篇 物理学
    • 153 篇 统计学(可授理学、...
    • 128 篇 系统科学
    • 66 篇 化学
  • 602 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 253 篇 图书情报与档案管...
    • 175 篇 工商管理
  • 170 篇 医学
    • 138 篇 临床医学
    • 118 篇 基础医学(可授医学...
    • 74 篇 公共卫生与预防医...
    • 69 篇 药学(可授医学、理...
  • 96 篇 法学
    • 77 篇 社会学
  • 65 篇 经济学
    • 65 篇 应用经济学
  • 50 篇 教育学
  • 34 篇 农学
  • 18 篇 文学
  • 9 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 78 篇 machine learning
  • 76 篇 deep learning
  • 63 篇 artificial intel...
  • 59 篇 software
  • 55 篇 computational mo...
  • 55 篇 accuracy
  • 50 篇 feature extracti...
  • 48 篇 training
  • 45 篇 semantics
  • 44 篇 predictive model...
  • 43 篇 information tech...
  • 41 篇 optimization
  • 39 篇 data mining
  • 37 篇 internet of thin...
  • 36 篇 support vector m...
  • 35 篇 security
  • 34 篇 software testing
  • 31 篇 software systems

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 school of comput...
  • 23 篇 state key labora...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 15 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 herawan tutut
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 muhammad waseem ...
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 12 篇 ahmed bestoun s.
  • 12 篇 belikov juri
  • 12 篇 suhaimi ibrahim

语言

  • 2,823 篇 英文
  • 149 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Science and Software Engineering"
2997 条 记 录,以下是671-680 订阅
排序:
Image Reconstruction Improvement of Variable Coded Aperture Using Deep Learning Method for Gamma and Lensless Imaging Applications
Image Reconstruction Improvement of Variable Coded Aperture ...
收藏 引用
Conference on Lasers and Electro-Optics Europe (CLEO EUROPE)
作者: Ariel Schwarz Amir Shemer Eliezer Danan Noa E. Cohen Yossef Danan Department of Electrical and Electronics Engineering Azrieli College of Engineering Jerusalem Israel Faculty of Engineering Bar-Ilan University Ramat-Gan Israel School of Software Engineering and Computer Science Azrieli College of Engineering Jerusalem Israel
In gamma ray imaging for nuclear medicine, coded aperture is used to improve sensitivity. one of the main reconstructing methods is inverse filtering (deconvolution), where the recorded image is cross-correlated with ... 详细信息
来源: 评论
A Secured and Optimized Broadcast Authentication Scheme for the Internet of Medical Things
A Secured and Optimized Broadcast Authentication Scheme for ...
收藏 引用
Electrical, computer and Energy Technologies (ICECET), International Conference on
作者: Syed Waleed Riaz Fazlullah Khan Insaf Ullah Bandar Alshawi Ryan Alturki Mohammad Wedyan Computer Science Department Abdul Wali Khan University Mardan KPK Pakistan Faculty of Science and Engineering School of Computer Science University of Nottingham Ningbo China Ningbo Zhejiang China Institute for Analytics and Data Science University of Essex Colchester UK Department of Computer and Network Engineering College of Computing Umm Al-Qura University Makkah Saudi Arabia Department of Software Engineering College of Computing Umm Al-Qura University Makkah Saudi Arabia Department of Computer Sciences Faculty of Information Technology and Computer Sciences Yarmouk University (YU) Irbid Jordan
This Internet of Medical Things (IoMT), facilitates the medical stop regarding real-time monitoring of patients, medical emergency management, remote surgery, patient information management, medical equipment, drug mo... 详细信息
来源: 评论
Leveraging Bitcoin Mining Machines in Demand-Response Mechanisms to Mitigate Ramping-Induced Transients
arXiv
收藏 引用
arXiv 2024年
作者: Ginzburg-Ganz, Elinor Eyal, Ittay Machlev, Ram Baimel, Dmitry Santosh, Leena Belikov, Juri Levron, Yoash Segev, I. Keren, S. Andrew and Erna Viterbi Faculty of Electrical & Computer Engineering Technion—Israel Institute of Technology Haifa3200003 Israel Computer Science Faculty of Electrical and Computer Engineering Technion—Israel Institute of Technology Haifa3200003 Israel Shamoon College of Engineering Beer-Sheva84100 Israel Pandit Deendayal Energy University India Department of Software Science Tallinn University of Technology Akadeemia tee 15a Tallinn12618 Estonia
We propose an extended demand response program, based on ancillary service for supplying flexible electricity demand. In our proposed scheme, we suggest a broader management model to control the scheduling and power c...
来源: 评论
Enhancing Password Security: Analyzing Password Management Practices Among IT Students
Enhancing Password Security: Analyzing Password Management P...
收藏 引用
International IEEE Conference and Workshop: Óbuda on Electrical and Power engineering (CANDO-EPE)
作者: Anita Mihalovicsne Kollar Jozsef Katona Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary Institute of Electronics and Communication Systems Kando Kalman Faculty of Electrical Engineering Obuda University Budapest Hungary GAMF Faculty of Engineering and Computer Science John Von Neumann University Kecskemet Hungary Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Business University Budapest Hungary
Today, with the digital world in its full swing, strong password management is key to protecting sensitive information from both internal and external threats. The current research explores the passwords managing beha... 详细信息
来源: 评论
Bridging Machine Learning and Formal Concept Analysis for Effective Crowd Detection
Bridging Machine Learning and Formal Concept Analysis for Ef...
收藏 引用
Information Technology (ACIT)
作者: Anas M. Al-Oraiqat Oleksandr Drieiev Ghassan Samara Sattam Almatarneh Karim A. Al-Oraiqat Hazim Alrawashdeh Hanna Drieieva Ali Elrashidi Yassin M. Y. Hasan Department of Computer Science Faculty of Information Technology Zarqa University Jordan Department of Cybersecurity and Software Central Ukrainian National Technical University Kropyvnytskyi Ukraine Department of Data Science and Artificial Intelligence Faculty of Information Technology Zarqa University Jordan Department of Software Engineering Faculty of Information Technology Zarqa University Jordan Department of Electrical Engineering University of Business and Technology Jeddah Saudi Arabia Electrical Engineering Department Assiut University Egypt
Crowd detection and prevention systems have become essential for managing densely populated areas. Modern systems leverage the combined power of machine learning, data mining, and image processing to extract and analy... 详细信息
来源: 评论
Weighted Density for The Win: Accurate Subspace Density Clustering
Weighted Density for The Win: Accurate Subspace Density Clus...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Maixuan Peng Yuyang Wu Yang Lu Mengke Li Yiqun Zhang Yiu-Ming Cheung School of Computer Science and Technology Guangdong University of Technology Guangzhou China Faculty of Science Wilfrid Laurier University Brantford Canada Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen University Xiamen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Computer Science Hong Kong Baptist University China
k-clustering typically struggles with the detection of irregular-distributed clusters due to the natural bias, while density clustering usually cannot well-adapt to different datasets and clustering tasks as it is not... 详细信息
来源: 评论
Multi-batch Nuclear-norm Adversarial Network for Unsupervised Domain Adaptation
Multi-batch Nuclear-norm Adversarial Network for Unsupervise...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Pei Wang Yun Yang Zhenyu Yu School of Information Science and Engineering Yunnan University Kunming China National Pilot School of Software Yunnan University Kunming China Yunnan Key Laboratory of Software Engineering Yunnan University Kunming China Guangzhou University Guangzhou China CISiP Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur Malaysia
Adversarial learning has achieved great success for unsupervised domain adaptation (UDA). Existing adversarial UDA methods leverage the predicted discriminative information with Nuclear-norm Wasserstein discrepancy fo... 详细信息
来源: 评论
Everything you wanted to know about ChatGPT: Components, capabilities, applications, and opportunities
收藏 引用
Internet Technology Letters 2024年 第6期7卷
作者: Heidari, Arash Navimipour, Nima Jafari Zeadally, Sherali Chamola, Vinay Department of Software Engineering Haliç University Istanbul Turkey Department of Computer Engineering Faculty of Engineering and Natural Science İstanbul Atlas University Istanbul Turkey Department of Computer Engineering Faculty of Engineering and Natural Sciences Kadir Has University Istanbul Turkey Future Technology Research Center National Yunlin University of Science and Technology Douliou Taiwan College of Communication and Information University of Kentucky LexingtonKY United States Pilani India
Conversational Artificial Intelligence (AI) and Natural Language Processing have advanced significantly with the creation of a Generative Pre-trained Transformer (ChatGPT) by OpenAI. ChatGPT uses deep learning techniq... 详细信息
来源: 评论
On Understanding Sports–HAR: Hierarchical, Mobile, Multi-Sensor based Classification of Table–Tennis Strokes
On Understanding Sports–HAR: Hierarchical, Mobile, Multi-Se...
收藏 引用
Intelligent Methods, Systems, and Applications (IMSA)
作者: Mustafa Ezzeldin Amr S. Ghoneim Laila Abdelhamid Ayman Atia Faculty of Computers and AI Software Engineering Helwan University Cairo Egypt Faculty of Computers and AI Computer Science Helwan University Cairo Egypt Faculty of Computers and AI Information Systems Helwan University Cairo Egypt HCI-LAB Faculty of Computers and AI Computer Science Helwan Univeristy Cairo Egypt Faculty of Computer Science October University for Modern Sciences and Arts (MSA) Giza Egypt
Table Tennis is a renowned competitive and recreational sport. An Olympic sport since 1988, table tennis in-cludes several movements, shots (i.e., strokes), and positions. Consequently, many factors can affect the str...
来源: 评论
Investigating Efficacy of Perplexity in Detecting LLM-Generated Code
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Jinwei Zhang, He Yang, Yanjin Cheng, Zeru Lyu, Jun Liu, Bohan Zhou, Xin Yang, Lanxin Bacchelli, Alberto Chiam, Yin Kia Chiew, Thiam Kian State Key Laboratory of Novel Software Technology Software Institute Nanjing University Nanjing210008 China Department of Informatics University of Zürich Zürich8006 Switzerland Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur50603 Malaysia
Large language model-generated code (LLMgCode) has become increasingly prevalent in software development. Many studies report that LLMgCode has more quality and security issues than human-authored code (HaCode). It is... 详细信息
来源: 评论