咨询与建议

限定检索结果

文献类型

  • 2,676 篇 会议
  • 1,394 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,532 篇 工学
    • 1,993 篇 计算机科学与技术...
    • 1,658 篇 软件工程
    • 500 篇 信息与通信工程
    • 378 篇 控制科学与工程
    • 275 篇 生物工程
    • 235 篇 电气工程
    • 213 篇 生物医学工程(可授...
    • 197 篇 机械工程
    • 170 篇 电子科学与技术(可...
    • 155 篇 光学工程
    • 100 篇 仪器科学与技术
    • 99 篇 安全科学与工程
    • 97 篇 化学工程与技术
    • 89 篇 交通运输工程
    • 85 篇 动力工程及工程热...
  • 1,206 篇 理学
    • 649 篇 数学
    • 321 篇 物理学
    • 312 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 159 篇 系统科学
    • 96 篇 化学
  • 831 篇 管理学
    • 518 篇 管理科学与工程(可...
    • 340 篇 图书情报与档案管...
    • 248 篇 工商管理
  • 216 篇 医学
    • 181 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 93 篇 药学(可授医学、理...
    • 87 篇 公共卫生与预防医...
  • 128 篇 法学
    • 103 篇 社会学
  • 81 篇 经济学
    • 81 篇 应用经济学
  • 78 篇 教育学
  • 40 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 148 篇 software enginee...
  • 103 篇 computer science
  • 100 篇 machine learning
  • 97 篇 deep learning
  • 89 篇 feature extracti...
  • 84 篇 computational mo...
  • 84 篇 accuracy
  • 83 篇 software
  • 81 篇 artificial intel...
  • 75 篇 training
  • 66 篇 optimization
  • 64 篇 data mining
  • 55 篇 predictive model...
  • 53 篇 semantics
  • 53 篇 security
  • 46 篇 support vector m...
  • 45 篇 internet of thin...
  • 45 篇 software testing
  • 45 篇 data models
  • 44 篇 information tech...

机构

  • 45 篇 college of compu...
  • 42 篇 faculty of compu...
  • 38 篇 faculty of softw...
  • 37 篇 department of so...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 19 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,574 篇 英文
  • 532 篇 其他
  • 33 篇 中文
  • 2 篇 日文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Computer and software Engineering"
4139 条 记 录,以下是541-550 订阅
排序:
Design of Deep CNN Model for Effective Traffic Signs Recognition
Design of Deep CNN Model for Effective Traffic Signs Recogni...
收藏 引用
2021 International Russian Automation Conference, RusAutoCon 2021
作者: Sichkar, Valentyn N. Lyamin, Andrey V. Itmo University Faculty of Software Engineering and Computer Systems Saint-Petersburg Russia
In this paper, the method to design deep Convolutional Neural Network (CNN) architecture for the problem of traffic signs classification is proposed. The approach incorporates five main stages followed by each other: ... 详细信息
来源: 评论
Location Detection of an Object Non Line of Sight with Audio Signal
Location Detection of an Object Non Line of Sight with Audio...
收藏 引用
International Artificial Intelligence and Data Processing Symposium (IDAP)
作者: Nevzat Olgun Mücahit Çalişan Department of Software Engineering Afyon Kocatepe University Afyonkarahisar Türkiye Department of Computer Engineering Engineering and Architecture Faculty Bingöl Türkiye
Locating objects Non-Line-of-Sight is an important challenge in many fields such as defense applications, autonomous vehicles, natural disasters, etc. With the advancement of signal processing techniques, there has be... 详细信息
来源: 评论
A Survey of Edge Computing Privacy and Security Threats and Their Countermeasures
A Survey of Edge Computing Privacy and Security Threats and ...
收藏 引用
IEEE computer Society Annual Symposium on VLSI
作者: Ahmed Shafee Tasneem A. Awaad Ahmed Moro Department of Engineering and Computer Science Adams State University Alamosa CO USA Department of Computer and Systems Engineering Faculty of Engineering Ain Shams University Cairo Egypt Siemens Digital Industries Software Lifecycle Collaboration Software Segment Cairo Egypt
Recent advancements in Artificial Intelligence (AI) and the proliferation of the Internet of Things (loT) and mobile devices have generated enormous data volumes, necessitating advanced data processing closer to data ... 详细信息
来源: 评论
Classification of Stakeholders of an Information System using Fuzzy based Adjusted Cosine Similarity Measure during Requirements Elicitation Process
收藏 引用
Procedia computer Science 2023年 230卷 620-628页
作者: Faiz Akram Tanvir Ahmad Mohd. Sadiq Department of Computer Engineering Faculty of Engineering and Technology Jamia Millia Islamia New Delhi-25 India Software Engineering Laboratory Computer Engineering Section UPFET Jamia Millia Islamia New Delhi-25 India
Requirements elicitation process is employed for the identification of stakeholders of an information system. A large number of stakeholders from different domains across the globe participate during the requirements ... 详细信息
来源: 评论
Using Pi Zero SBCs as a Low-Cost Driver Monitoring Solution
Using Pi Zero SBCs as a Low-Cost Driver Monitoring Solution
收藏 引用
Robotics, Automation and Artificial Intelligence (RAAI), IEEE International Conference on
作者: Hady A. Khalil Sherif A. Hammad Hossam E. Abdelmunim Shady A. Maged Department of Mechatronics Engineering Faculty of Engineering Ain Shams University Cairo Egypt Garraio for Software Innovations Cairo Egypt Computer and Systems Engineering Faculty of Engineering Ain Shams University Cairo Egypt
Driver monitoring systems have become a vital component of Advanced Driver Assistance Systems (ADAS) for vehicle safety. According to the U.S. National Highway Traffic Safety Administration, drowsy driving contributes... 详细信息
来源: 评论
Research on Text Summarization Generator Method Based on Input Text Linguistic Features and Copy Mechanism  16
Research on Text Summarization Generator Method Based on Inp...
收藏 引用
16th IEEE International Conference on Intelligent Systems and Knowledge engineering, ISKE 2021
作者: Wang, Liuyang Yu, Yangxin Huaiyin Institute of Technology of China Faculty of Computer Software Engineering Huai'an China
The Sequence-to-Sequence (Seq2Seq) of neural network (NN) method based on recurrent neural network (RNN) and attention mechanism plays an important role in information extraction and automatic summarization. However, ... 详细信息
来源: 评论
A Review of Digital Watermarking Techniques, Characteristics and Attacks in Text Documents  2nd
A Review of Digital Watermarking Techniques, Characteristics...
收藏 引用
2nd International Conference on Innovative Technology, engineering and Sciences, iCITES 2020
作者: Usop, Nur Alya Afikah Hisham, Syifak Izhar Faculty of Computer Science and Software Engineering Universiti Malaysia Pahang Gambang Malaysia
Security plays an important role in many sectors and industries. Nowadays, scams and illegal movements are spreading around the world. Copyright protection for PDF documentation is one of the focus in digital watermar... 详细信息
来源: 评论
Inferring Custom Synthesizable Kernel for Generation of Coprocessors with Out-of-Order Execution  10
Inferring Custom Synthesizable Kernel for Generation of Copr...
收藏 引用
10th Mediterranean Conference on Embedded Computing, MECO 2021
作者: Antonov, Alexander Software Engineering and Computer Systems Faculty ITMO University Saint-Petersburg Russia
The research is devoted to the problem of project- specific steep learning curve when designing complex hardware microarchitectures. To address this issue, it is proposed to use custom synthesizable kernels that provi... 详细信息
来源: 评论
Some Approximation Results on a Class of Szász-Mirakjan-Kantorovich Operators Including Non-negative parameter α
收藏 引用
Numerical Functional Analysis and Optimization 2025年 第6期46卷
作者: Özger, Faruk Aslan, Reşat Ersoy, Merve Department of Computer Engineering Iğdır University Iğdır Turkey Faculty of Sciences Department of Mathematics Van Yuzuncu Yil University Van Turkey Faculty of Engineering Department of Software Engineering Istanbul Topkapi University Istanbul Turkey
Alternative proofs of the Weierstrass uniform approximation theorem have been provided by numerous mathematicians, including renowned ones. Among them, there was Bernstein that used a set of polynomials known as the B... 详细信息
来源: 评论
Explainability-based Trust Algorithm for electricity price forecasting models
收藏 引用
Energy and AI 2023年 第4期14卷 141-158页
作者: Leena Heistrene Ram Machlev Michael Perl Juri Belikov Dmitry Baimel Kfir Levy Shie Mannor Yoash Levron Electrical Engineering Department School of TechnologyPandit Deendayal Energy UniversityGandhinagarGujarat382007India The Andrew and Erna Viterbi Faculty of Electrical&Computer Engineering Technion-Israel Institute of TechnologyHaifa3200003Israel Department of Software Science Tallinn University of TechnologyAkadeemia tee 15ATallinn12618Estonia Electrical&Electronics Engineering Department Sami Shamoon College of EngineeringBeer-Sheva84100Israel
Advanced machine learning(ML)algorithms have outperformed traditional approaches in various forecasting applications,especially electricity price forecasting(EPF).However,the prediction accuracy of ML reduces substant... 详细信息
来源: 评论