咨询与建议

限定检索结果

文献类型

  • 738 篇 会议
  • 447 篇 期刊文献
  • 21 册 图书

馆藏范围

  • 1,206 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 771 篇 工学
    • 556 篇 计算机科学与技术...
    • 459 篇 软件工程
    • 168 篇 信息与通信工程
    • 102 篇 控制科学与工程
    • 83 篇 生物工程
    • 80 篇 电气工程
    • 71 篇 机械工程
    • 64 篇 光学工程
    • 61 篇 电子科学与技术(可...
    • 61 篇 生物医学工程(可授...
    • 33 篇 化学工程与技术
    • 31 篇 仪器科学与技术
    • 30 篇 安全科学与工程
    • 28 篇 动力工程及工程热...
    • 27 篇 交通运输工程
  • 345 篇 理学
    • 175 篇 数学
    • 110 篇 物理学
    • 91 篇 生物学
    • 55 篇 统计学(可授理学、...
    • 39 篇 系统科学
    • 32 篇 化学
  • 235 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 101 篇 图书情报与档案管...
    • 60 篇 工商管理
  • 56 篇 医学
    • 53 篇 临床医学
    • 43 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 38 篇 法学
    • 29 篇 社会学
  • 34 篇 教育学
    • 30 篇 教育学
  • 30 篇 经济学
    • 30 篇 应用经济学
  • 22 篇 农学
  • 6 篇 军事学
  • 4 篇 文学
  • 4 篇 艺术学

主题

  • 34 篇 feature extracti...
  • 27 篇 data mining
  • 25 篇 deep learning
  • 25 篇 computational mo...
  • 24 篇 training
  • 23 篇 machine learning
  • 22 篇 accuracy
  • 21 篇 computer science
  • 21 篇 artificial intel...
  • 18 篇 optimization
  • 18 篇 semantics
  • 15 篇 predictive model...
  • 15 篇 databases
  • 14 篇 support vector m...
  • 14 篇 neural networks
  • 13 篇 software enginee...
  • 13 篇 algorithm design...
  • 13 篇 clustering algor...
  • 13 篇 software
  • 13 篇 convolutional ne...

机构

  • 74 篇 faculty of compu...
  • 42 篇 faculty of compu...
  • 41 篇 faculty of compu...
  • 23 篇 faculty of compu...
  • 21 篇 department of co...
  • 20 篇 state key labora...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 16 篇 department of in...
  • 15 篇 huaiyin institut...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 14 篇 national key lab...
  • 14 篇 faculty of compu...
  • 14 篇 computer vision ...
  • 13 篇 faculty of compu...
  • 12 篇 faculty of autom...

作者

  • 59 篇 quanyin zhu
  • 35 篇 zhu quanyin
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 17 篇 gao shangbing
  • 17 篇 yan yunyang
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 hong zhou
  • 15 篇 zhou hong
  • 14 篇 zain ul abideen
  • 12 篇 wanli feng
  • 11 篇 belikov juri
  • 11 篇 pal umapada
  • 11 篇 levron yoash
  • 10 篇 lei zhou
  • 10 篇 ali zeeshan ijaz
  • 10 篇 zhang haiyan
  • 10 篇 li xiang
  • 10 篇 zhengfeng ji

语言

  • 1,142 篇 英文
  • 50 篇 其他
  • 14 篇 中文
  • 1 篇 日文
检索条件"机构=Faculty of Computer and Software Engineering Huaiyin Institute of Technology"
1206 条 记 录,以下是291-300 订阅
排序:
Discovery of association rules between factors affecting user satisfaction in software project by FP-GROWTH Algorithm  18
Discovery of association rules between factors affecting use...
收藏 引用
18th International Conference on Electrical engineering/Electronics, computer, Telecommunications and Information technology, ECTI-CON 2021
作者: Kaewbanjong, Katawut Intakosum, Sarun King Mongkut's Institute of Technology Ladkrabang Software System Engineering Laboratory Department of Computer Science Faculty of Science Bangkok Thailand
The main objective of this work was to find the association rules between factors affecting user satisfaction in software project by using an association rule discovery technique. Data from 191 software projects were ... 详细信息
来源: 评论
Investigating Efficacy of Perplexity in Detecting LLM-Generated Code
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Jinwei Zhang, He Yang, Yanjin Cheng, Zeru Lyu, Jun Liu, Bohan Zhou, Xin Yang, Lanxin Bacchelli, Alberto Chiam, Yin Kia Chiew, Thiam Kian State Key Laboratory of Novel Software Technology Software Institute Nanjing University Nanjing210008 China Department of Informatics University of Zürich Zürich8006 Switzerland Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur50603 Malaysia
Large language model-generated code (LLMgCode) has become increasingly prevalent in software development. Many studies report that LLMgCode has more quality and security issues than human-authored code (HaCode). It is... 详细信息
来源: 评论
Explainable-AI-based two-stage solution for WSN object localization using zero-touch mobile transceivers
收藏 引用
Science China(Information Sciences) 2024年 第7期67卷 27-45页
作者: Kai FANG Junxin CHEN Han ZHU Thippa Reddy GADEKALLU Xiaoping WU Wei WANG School of Mathematics and Computer Science Zhejiang A&F University School of Software Dalian University of Technology Faculty of Applied Sciences Macao Polytechnic University Department of Electrical and Computer Engineering Lebanese American University School of Information Engineering Huzhou University Guangdong-Hong Kong-Macao Joint Laboratory for Emotional Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen MSU-BIT University
Artificial intelligence technology is widely used in the field of wireless sensor networks(WSN).Due to its inexplicability, the interference factors in the process of WSN object localization cannot be effectively elim... 详细信息
来源: 评论
Detection of Toxic Content on Social Networking Platforms Using Fine Tuned ULMFiT Model
收藏 引用
Intelligent Automation & Soft Computing 2023年 第1期35卷 15-30页
作者: Hafsa Naveed Abid Sohail Jasni Mohamad Zain Noman Saleem Rao Faizan Ali Shahid Anwar Department of Software Engineering Faculty of ScienceUniversity of LahorePakistan Department of Computer Science COMSATS University IslamabadLahore CampusPakistan Institute for Big Data Analyics and Artifcial Intelligence(IBDAAI) Kompleks Al-KhawarizmiUniversii Tekoogi MARA40450Shah AlamSelangorMalaysia TechnoGenics SMC PVT LTD LahorePakistan Department of Computer and Infomation Science Universiti Teknologi PETRONASBandar Ser IskandarTronohPerakMalaysia Depatment of Information Engineering Technology National Skils University IslamabadSector H-8/1Faiz AhmedFaiz RoadIslamabadPakistan
Question and answer websites such as Quora,Stack Overflow,Yahoo Answers and Answer Bag are used by *** users post questions on these websites to get the answers from domain specific *** websites are multilingual meani... 详细信息
来源: 评论
An n-MOSFET Layout with Multi-Finger Z Gate for Radiation Tolerance  5
An n-MOSFET Layout with Multi-Finger Z Gate for Radiation To...
收藏 引用
5th IEEE International Conference on Knowledge Innovation and Invention, ICKII 2022
作者: Shan, Chan Liu, Ying Chen, Huan Huo, Dong-Yang Xu, Tian-Rong Jimei University College of Ocean Information Engineering Xiamen China Xiamen Institute of Software Technology Department of Software Technology Xiamen China Minjiang University School of Journalism and Communication Fuzhou China Universiti Malaya Faculty of Computer Science and Information Technology Department of Information Systems Kuala Lumpur Malaysia Universiti Malaya Planning Faculty of Built Environment Department of Urban and Regional Kuala Lumpur Malaysia
In this paper, a new n-MOSFET layout with multi-finger Z gate is proposed to reduce the total ionizing dose (TID) effect. In addition to the proposed layout, multi-finger single gate layout is also simulated using Sen... 详细信息
来源: 评论
FOPC-Det: a universal vehicle detection method for UAV aerial images based on feature optimization and precise convolution
收藏 引用
Measurement Science and technology 2025年 第6期36卷 066011-066011页
作者: XianChun Meng BuShi Liu Bolun Chen WenJie Zhu Yang Gu Ke Ren BinYing Yang Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huaian 223003 People’s Republic of China Faculty of Computer Science and Technology Huaiyin Normal University Huaian 223003 People’s Republic of China
Traffic vehicle detection in UAV aerial images facilitates traffic analysis and holds significant implications for traffic management and optimization. While drone technology provides unique aerial advantages for grou...
来源: 评论
Uniqueness Proof of Optimal Power Management Strategies for Energy Storage Dynamic Models
SSRN
收藏 引用
SSRN 2024年
作者: Goldstein-Tweg, Tom Ginzburg-Ganz, Elinor Belikov, Juri Levron, Yoash The Andrew and Erna Viterbi Faculty of Electrical and Computer Engineering Technion—Israel Institute of Technology Haifa3200003 Israel Department of Software Science Tallinn University of Technology Akadeemia tee 15a Tallinn12618 Estonia
The current paper belongs to a class of research works that aim to find analytic and semi-analytic solutions to optimal power flow problems that involve storage systems. The main contribution of this work is a rigorou... 详细信息
来源: 评论
Simulation on Molten Pool Characteristics of Al2O3 Laser Selective Melting Based on Energy Input Model
Simulation on Molten Pool Characteristics of Al2O3 Laser Sel...
收藏 引用
2019 International Conference on Optoelectronic Science and Materials, ICOSM 2019
作者: Chen, Xiaobing Sun, Quan Sun, Quanping Wu, Haibing Xu, Qian Key Lab of Advanced Manufacturing Technology of Jiangsu Province Huaiyin Institute of Technology Huai'an Jiangsu Province223003 China Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huai'an Jiangsu Province223003 China
In order to obtain the formation rule of molten pool characteristics in SLM process of ceramics, an energy input model for SLM process of Al2O3 ceramics is established. The model is related to laser power P, scanning ... 详细信息
来源: 评论
Machine Learning Approaches for Efficient Traffic Flow in Smart Cities  3
Machine Learning Approaches for Efficient Traffic Flow in Sm...
收藏 引用
3rd Odisha International Conference on Electrical Power engineering, Communication and Computing technology, ODICON 2024
作者: Kulkarni, Aniket Anitha, P. Valluri, John Yesudas Sunena Rose, M.V. Hemavathi, U. Hussein, Omar M. Software Qa Manager Drata Inc San DiegoCA United States Kalasalingam Academy of Research and Education Department of Computer Applications Tamil Nadu Srivilliputhur India Faculty of Management Studies Bengaluru India Department of Computer Science and Engineering Bengaluru India Vel Tech Rangarajan Dr. Sagunthala R&d Institute of Science and Technology Department of Cse Avadi Chennai India Al-Farahidi University Medical Technical College Medical Instrumentation Engineering Baghdad Iraq
These days, a lot of towns struggle with traffic jams during peak hours, which increment contamination, commotion, and feelings of anxiety for the general population. Because neural networks (NN) and machine learning ... 详细信息
来源: 评论
Benchmarking Cryptographic Protocols for (IoT) Malware Defence
Benchmarking Cryptographic Protocols for (IoT) Malware Defen...
收藏 引用
International Symposium on Applied Machine Intelligence and Informatics (SAMI)
作者: Khalil Ben Khaled Dönìz Borsos Jozsef Katona Kandó Kalmán Faculty of Electrical Engineering Institute of Microelectronics and Technology Obuda University Budapest Hungary Kándó Kálmán Faculty of Electrical Engineering Institute of Electronics and Communication Systems Obuda University Budapest Hungary Department of Software Development and Application Institute of Computer Engineering University of Dunaujvaros Dunaujvaros Hungary GAMF Faculty of Engineering and Computer Science John Von Neumann University Kecskemet Hungary Department of Applied Quantitative Methods Faculty of Finance and Accountancy Budapest Business University Budapest Hungary
This study presents a comprehensive benchmarking analysis of cryptographic protocols for Internet of Things (IoT) malware defense. The framework was specifically tailored to evaluate cryptographic protocols such as AE... 详细信息
来源: 评论