咨询与建议

限定检索结果

文献类型

  • 1,806 篇 会议
  • 1,133 篇 期刊文献
  • 58 册 图书

馆藏范围

  • 2,997 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,889 篇 工学
    • 1,490 篇 计算机科学与技术...
    • 1,260 篇 软件工程
    • 348 篇 信息与通信工程
    • 289 篇 控制科学与工程
    • 217 篇 生物工程
    • 162 篇 电气工程
    • 159 篇 生物医学工程(可授...
    • 147 篇 机械工程
    • 119 篇 电子科学与技术(可...
    • 118 篇 光学工程
    • 71 篇 化学工程与技术
    • 69 篇 安全科学与工程
    • 68 篇 交通运输工程
    • 66 篇 仪器科学与技术
    • 58 篇 动力工程及工程热...
  • 897 篇 理学
    • 492 篇 数学
    • 241 篇 生物学
    • 230 篇 物理学
    • 153 篇 统计学(可授理学、...
    • 128 篇 系统科学
    • 66 篇 化学
  • 602 篇 管理学
    • 360 篇 管理科学与工程(可...
    • 253 篇 图书情报与档案管...
    • 175 篇 工商管理
  • 170 篇 医学
    • 138 篇 临床医学
    • 118 篇 基础医学(可授医学...
    • 74 篇 公共卫生与预防医...
    • 69 篇 药学(可授医学、理...
  • 96 篇 法学
    • 77 篇 社会学
  • 65 篇 经济学
    • 65 篇 应用经济学
  • 50 篇 教育学
  • 34 篇 农学
  • 18 篇 文学
  • 9 篇 军事学
  • 5 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 110 篇 software enginee...
  • 102 篇 computer science
  • 78 篇 machine learning
  • 76 篇 deep learning
  • 63 篇 artificial intel...
  • 59 篇 software
  • 55 篇 computational mo...
  • 55 篇 accuracy
  • 50 篇 feature extracti...
  • 48 篇 training
  • 45 篇 semantics
  • 44 篇 predictive model...
  • 43 篇 information tech...
  • 41 篇 optimization
  • 39 篇 data mining
  • 37 篇 internet of thin...
  • 36 篇 support vector m...
  • 35 篇 security
  • 34 篇 software testing
  • 31 篇 software systems

机构

  • 45 篇 college of compu...
  • 37 篇 department of so...
  • 32 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 school of comput...
  • 23 篇 state key labora...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of scien...
  • 15 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 school of comput...
  • 14 篇 computer vision ...

作者

  • 37 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 herawan tutut
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zamli kamal z.
  • 16 篇 muhammad adnan k...
  • 16 篇 ow siew hock
  • 15 篇 muhammad waseem ...
  • 15 篇 du bo
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen
  • 14 篇 selamat ali
  • 13 篇 tutut herawan
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 12 篇 ahmed bestoun s.
  • 12 篇 belikov juri
  • 12 篇 suhaimi ibrahim

语言

  • 2,823 篇 英文
  • 149 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 德文
检索条件"机构=Faculty of Computer Science and Software Engineering"
2997 条 记 录,以下是731-740 订阅
排序:
Internet of Things (IoT) for cardiac patients: A comparative study  10
Internet of Things (IoT) for cardiac patients: A comparative...
收藏 引用
10th IEEE International Conference on Intelligent Computing and Information Systems, ICICIS 2021
作者: Helmy, Salma Mostafa A. Alfonse, Marco Amar, Ayman Mahmoud El-Horbaty, El-Sayed M. Ain Shams University Faculty of Computer and Information Sciences Software Engineering Department Cairo Egypt Ain Shams University Faculty of Computer and Information Sciences Computer Science Department Cairo Egypt Ain Shams University Faculty of Medicine Cardiac Surgery Department Cairo Egypt
The internet of things (IoT) had a variety of uses, namely smart homes, smart cities, wearables, smart grid, self-driven cars, IoT retail-shops, farming, industrial internet, smart supply chain management, and the hea... 详细信息
来源: 评论
SAMMS: Multi-modality Deep Learning with the Foundation Model for the Prediction of Cancer Patient Survival
SAMMS: Multi-modality Deep Learning with the Foundation Mode...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Wen Zhu Yiwen Chen Shanling Nie Hai Yang Department of Computer Science and Engineering East China University of Science and Technology Shanghai China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Center for Continuing and Lifelong Education National University of Singapore Singapore Faculty of Engineering The University of Sydney Australia
Cancer survival prediction is pivotal in tailoring individualized treatment strategies and guiding clinician decision-making. Yet, existing methodologies grapple with efficiently harnessing the intricate distribution ...
来源: 评论
Entirety of Quantum Uncertainty and Its Experimental Verification
收藏 引用
Chinese Physics Letters 2021年 第7期38卷 11-16页
作者: Jie Xie Li Zhou Aonan Zhang Huichao Xu Man-Hong Yung Ping Xu Nengkun Yu Lijian Zhang National Laboratory of Solid State Microstructures College of Engineering and Applied Sciences and School of PhysicsNanjing UniversityNanjing 210093China Collaborative Innovation Center of Advanced Microstructures Nanjing UniversityNanjing 210093China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Shenzhen Institute for Quantum Science and Engineering and Department of Physics Southern University of Science and TechnologyShenzhen 518055China Shenzhen Key Laboratory of Quantum Science and Engineering Southern University of Science and TechnologyShenzhen 518055China Institute for Quantum Information&State Key Laboratory of High Performance Computing College of ComputerNational University of Defense TechnologyChangsha 410073China Centre for Quantum Software and Information School of SoftwareFaculty of Engineering and Information TechnologyUniversity of Technology SydneyNSWAustralia
As a foundation of quantum physics,uncertainty relations describe ultimate limit for the measurement uncertainty of incompatible ***,uncertainty relations are formulated by mathematical bounds for a specific *** we pr... 详细信息
来源: 评论
Benchmarking Cryptographic Protocols for (IoT) Malware Defence
Benchmarking Cryptographic Protocols for (IoT) Malware Defen...
收藏 引用
International Symposium on Applied Machine Intelligence and Informatics (SAMI)
作者: Khalil Ben Khaled Dönìz Borsos Jozsef Katona Kandó Kalmán Faculty of Electrical Engineering Institute of Microelectronics and Technology Obuda University Budapest Hungary Kándó Kálmán Faculty of Electrical Engineering Institute of Electronics and Communication Systems Obuda University Budapest Hungary Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary GAMF Faculty of Engineering and Computer Science John Von Neumann University Kecskemet Hungary Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Business University Budapest Hungary
This study presents a comprehensive benchmarking analysis of cryptographic protocols for Internet of Things (IoT) malware defense. The framework was specifically tailored to evaluate cryptographic protocols such as AE... 详细信息
来源: 评论
Generative Technology for Human Emotion Recognition: A Scope Review
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Fei Yuan, Yucheng Xie, Yifan Ren, Hongwei Liu, Ivan He, Ying Ren, Fuji Yu, Fei Richard Ni, Shiguang Shenzhen China Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen China Guangzhou China Department of Psychology Faculty of Arts and Sciences Beijing Normal University at Zhuhai Zhuhai China College of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Affective computing stands at the forefront of artificial intelligence (AI), seeking to imbue machines with the ability to comprehend and respond to human emotions. Central to this field is emotion recognition, which ... 详细信息
来源: 评论
Generative Technology for Human Emotion Recognition: A Scope Review
SSRN
收藏 引用
SSRN 2024年
作者: Ma, Fei Yuan, Yucheng Xie, Yifan Ren, Hongwei Liu, Ivan He, Ying Ren, Fuji Yu, Fei Richard Ni, Shiguang Shenzhen China Tsinghua Shenzhen International Graduate School Tsinghua University Shenzhen China Guangzhou China Department of Psychology Faculty of Arts and Sciences Beijing Normal University at Zhuhai Zhuhai China College of Computer Science and Software Engineering Shenzhen University Shenzhen China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Affective computing stands at the forefront of artificial intelligence (AI), seeking to imbue machines with the ability to comprehend and respond to human emotions. Central to this field is emotion recognition, which ... 详细信息
来源: 评论
A Robust Anonymous Authentication Scheme for Securing IoT-Enabled Healthcare Services
A Robust Anonymous Authentication Scheme for Securing IoT-En...
收藏 引用
Cyber Security in Networking Conference (CSNet)
作者: Sana Ullah Shanshan Tu Akhtar Badshah Muhammad Waqas Department of Enterprise and Technology Atlantic Technological University Galway Ireland College of Computer Science Beijing University of Technology Beijing China Department of Software Engineering Faculty of Engineering University of Malakand Dir Lower Pakistan Faculty of Engineering and Science School of Computing and Mathematical Sciences University of Greenwich U.K. School of Engineering Edith Cowan University Perth WA Australia
Smart wearables and body implanted IoT devices continuously track and transmit health metrics wirelessly to a central controller, such as a personal server, enabling real-time monitoring, proactive treatment and timel... 详细信息
来源: 评论
Depth Based Region Proposal: Multi-Stage Real- Time Object Detection
SSRN
收藏 引用
SSRN 2022年
作者: Ayman, Shehab Eldeen Hussein, Walid Karam, Omar H. Department of Software Engineering Faculty of Informatics and Computer Science The British University in Egypt Cairo Egypt Department of Computer Science Faculty of Informatics and Computer Science The British University in Egypt Cairo Egypt Department of Information Systems Faculty of Informatics and Computer Science The British University in Egypt Cairo Egypt
The majority of real-time object recognition systems operate on two-dimensional images, degrading the influence of the involved objects' third-dimensional (i.e., depth) information. The depth information of a capt... 详细信息
来源: 评论
Depth Based Region Proposal: Towards Robust Two-Stage Real-Time Object Detection
SSRN
收藏 引用
SSRN 2022年
作者: Ayman, Shehab Eldeen Hussein, Walid Karam, Omar H. Department of Software Engineering Faculty of Informatics and Computer Science The British University in Egypt Cairo Egypt Department of Computer Science Faculty of Informatics and Computer Science The British University in Egypt Cairo Egypt Department of Information Systems Faculty of Informatics and Computer Science The British University in Egypt Cairo Egypt
The majority of real-time object recognition systems operate on two-dimensional images, degrading the influence of the involved objects' third-dimensional (i.e., depth) information. The depth information of a capt... 详细信息
来源: 评论
Diversity-seeking Swap Games in Networks  25
Diversity-seeking Swap Games in Networks
收藏 引用
Proceedings of the 24th International Conference on Autonomous Agents and Multiagent Systems
作者: Yaqiao Li Lata Narayanan Jaroslav Opatrny Yi Tian Xu Faculty of Comp. Sci. and Control Eng. Shenzhen University of Advanced Technology Shenzhen China Dept of Computer Science and Software Engineering Concordia University Montreal PQ Canada Independent Researcher Shenzhen Canada
Schelling games use a game-theoretic approach to study the phenomenon of residential segregation. We consider four global measures of diversity, and prove asymptotically tight or almost tight bounds on the price of an... 详细信息
来源: 评论