咨询与建议

限定检索结果

文献类型

  • 2,690 篇 会议
  • 1,399 篇 期刊文献
  • 70 册 图书

馆藏范围

  • 4,159 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,570 篇 工学
    • 2,018 篇 计算机科学与技术...
    • 1,669 篇 软件工程
    • 504 篇 信息与通信工程
    • 376 篇 控制科学与工程
    • 277 篇 生物工程
    • 235 篇 电气工程
    • 216 篇 生物医学工程(可授...
    • 205 篇 机械工程
    • 166 篇 电子科学与技术(可...
    • 156 篇 光学工程
    • 99 篇 仪器科学与技术
    • 99 篇 安全科学与工程
    • 98 篇 化学工程与技术
    • 89 篇 交通运输工程
    • 82 篇 动力工程及工程热...
  • 1,216 篇 理学
    • 659 篇 数学
    • 318 篇 物理学
    • 317 篇 生物学
    • 196 篇 统计学(可授理学、...
    • 160 篇 系统科学
    • 96 篇 化学
  • 844 篇 管理学
    • 529 篇 管理科学与工程(可...
    • 341 篇 图书情报与档案管...
    • 255 篇 工商管理
  • 216 篇 医学
    • 182 篇 临床医学
    • 154 篇 基础医学(可授医学...
    • 93 篇 药学(可授医学、理...
    • 87 篇 公共卫生与预防医...
  • 132 篇 法学
    • 106 篇 社会学
  • 79 篇 经济学
    • 79 篇 应用经济学
  • 79 篇 教育学
  • 40 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 8 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 149 篇 software enginee...
  • 104 篇 computer science
  • 101 篇 machine learning
  • 97 篇 deep learning
  • 88 篇 feature extracti...
  • 86 篇 accuracy
  • 85 篇 computational mo...
  • 83 篇 software
  • 82 篇 artificial intel...
  • 77 篇 training
  • 68 篇 optimization
  • 63 篇 data mining
  • 55 篇 predictive model...
  • 54 篇 semantics
  • 52 篇 security
  • 47 篇 internet of thin...
  • 47 篇 information tech...
  • 46 篇 support vector m...
  • 46 篇 data models
  • 45 篇 software testing

机构

  • 49 篇 college of compu...
  • 40 篇 faculty of compu...
  • 37 篇 department of so...
  • 37 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 universiti malay...
  • 15 篇 faculty of scien...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 22 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 19 篇 jasni mohamad za...
  • 19 篇 raja hashim ali
  • 18 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 siew hock ow
  • 14 篇 zain ul abideen

语言

  • 3,793 篇 英文
  • 332 篇 其他
  • 35 篇 中文
  • 2 篇 日文
  • 2 篇 斯洛文尼亚文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 德文
  • 1 篇 罗马尼亚文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software Engineering and Computer Engineering"
4159 条 记 录,以下是141-150 订阅
High-Accuracy Hand Segmentation for Palmprint Biometric Systems Improving Auto-Encoder Techniques  8
High-Accuracy Hand Segmentation for Palmprint Biometric Syst...
收藏 引用
8th International Symposium on Innovative Approaches in Smart Technologies, ISAS 2024
作者: Yalcin, Kadir Dogan, Ramazan Ozgur Dogan, Hulya Bingol, Ozkan Graduate Education Institute Gumushane University Department of Artificial Intelligence and Intelligent Systems Gumushane Turkey Trabzon University Faculty of Computer and Information Sciences Department of Artificial Intelligence Engineering Trabzon Turkey Karadeniz Technical University Faculty of Engineering Department of Software Engineering Trabzon Turkey Gumushane University Faculty of Eng. and Natural Sciences Department of Software Engineering Gumushane Turkey
Biometric technologies have been widely adopted in various commercial products, ranging from security systems to personal devices, due to their exceptional reliability and user-friendliness. Among these, palmprint bio... 详细信息
来源: 评论
UVM Based Verification Framework for Deep Learning Hardware Accelerator: Case Study  4
UVM Based Verification Framework for Deep Learning Hardware ...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Aboudeif, Randa Awaad, Tasneem A. Abdelsalam, Mohamed Ismail, Yehea The American University in Cairo Siemens Digital Industries Software Electronics and Communications Engineering Department Cairo Egypt Ain Shams University Siemens Digital Industries Software Department of Computer and Systems Engineering Faculty of Engineering Cairo Egypt Siemens Digital Industries Software Cairo Egypt The American University in Cairo Electronics and Communications Engineering Department Cairo Egypt
Hardware Verification of Deep Learning Accelerators (DLAs) has become critically important for testing the reliability and trustworthiness of Learning Enabled Autonomous Systems (LEAS). In this paper, we introduce a s... 详细信息
来源: 评论
An Implementation of DNS Operator and Network Guideline for Migrating Virtual Machine to KubeVirt  26
An Implementation of DNS Operator and Network Guideline for ...
收藏 引用
26th International computer Science and engineering Conference, ICSEC 2022
作者: Trakulmaiphol, Supakorn Piromsopa, Krerk Chulalongkorn University Software Engineering Program Department of Computer Engineering Faculty of Engineering Bangkok Thailand
We created a customize DNS operator to address the shortcoming of CoreDNS in Kubernetes. While Kubernetes is gaining popularity in orchestrating containers, many organizations with Virtual Machine (VM) based legacy ap... 详细信息
来源: 评论
Classification of Stakeholders of an Information System using Fuzzy based Adjusted Cosine Similarity Measure during Requirements Elicitation Process  3
Classification of Stakeholders of an Information System usin...
收藏 引用
3rd International Conference on Evolutionary Computing and Mobile Sustainable Networks, ICECMSN 2023
作者: Akram, Faiz Ahmad, Tanvir Sadiq, Mohd Department of Computer Engineering Faculty of Engineering and Technology Jamia Millia Islamia New Delhi25 India Software Engineering Laboratory Computer Engineering Section UPFET Jamia Millia Islamia New Delhi25 India
Requirements elicitation process is employed for the identification of stakeholders of an information system. A large number of stakeholders from different domains across the globe participate during the requirements ... 详细信息
来源: 评论
Trustworthiness Evaluation of Deep Learning Accelerators Using UVM-based Verification with Error Injection
Trustworthiness Evaluation of Deep Learning Accelerators Usi...
收藏 引用
2024 Design and Verification Conference and Exhibition Europe, DVCon Europe 2024
作者: Aboudeif, Randa Awaad, Tasneem A. AbdElsalam, Mohamed Ismail, Yehea Electronics and Communications Engineering Department The American University in Cairo Cairo Egypt Siemens Digital Industries Software Cairo Egypt Department of Computer and Systems Engineering Faculty of Engineering Ain Shams University Cairo Egypt
Testing the reliability and trustworthiness of high-performance computing (HPC) applications has made Deep Learning Accelerators (DLAs) verification critically important. In this paper, we introduce a hardware verific... 详细信息
来源: 评论
Optimized Evaluation of Mobile Base Station by Modern Topological Invariants
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 363-378页
作者: Khalid Hamid Muhammad Waseem Iqbal Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Due to a tremendous increase in mobile traffic,mobile operators have started to restructure their networks to offload their *** directions will lead to fundamental changes in the design of future Fifthgeneration(5G)ce... 详细信息
来源: 评论
AdaptVR: An Adaptive Learning VR System for Dental Students Training
AdaptVR: An Adaptive Learning VR System for Dental Students ...
收藏 引用
2024 International Conference on computer and Applications, ICCA 2024
作者: Sherif, Meriam Barakat, Nahla Hamdy, Abeer The British University in Egypt Faculty of Informatics and Computer Science Department of Software Engineering Cairo Egypt The British University in Egypt Faculty of Informatics and Computer Science Department of Artificial Intelligence Cairo Egypt
The paper proposes 'AdaptVR' a virtual reality (VR) system designed to enhance dental training through realistic real tile simulations and adaptive learning environment, to overcome traditional training challe... 详细信息
来源: 评论
Efficient Byzantine-Robust Federated Learning Based on the Multi-Message Shuffle Protocol for Consumer Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Jin, Chunhua Li, Lulu Wang, Jiahao Li, Jinbiao Liu, Junyi Chen, Guanhua Zhang, Hao Weng, Jian Faculty of Computer Software Engineering with Huaiyin Institute of Technology Huai’an China Huaiyin Institute of Technology Faculty of Computer Software Engineering Huai’an China Huaiyin Institute of Technology Faculty of Computer and Software Engineering Huaian China Jinan University College of Information Science and Technology China
The accelerated advancement of consumer Internet of Things (CIoT) devices has resulted in their pervasive integration into the fabric of contemporary lifestyles. As these devices are capable of collecting vast quantit... 详细信息
来源: 评论
Feature Model Configuration Reuse Scheme for Self-Adaptive Systems
收藏 引用
computers, Materials & Continua 2022年 第4期71卷 1249-1262页
作者: Sumaya Alkubaisi Said Ghoul Oguz Ata Electrical and Computer Engineering Department Altinbas UniversityIstanbul34218Turkey Faculty of Information Technology Research Laboratory on Bio-Inspired Software EngineeringPhiladelphia UniversityAmman26160Jordan
Most large-scale systems including self-adaptive systems utilize feature models(FMs)to represent their complex architectures and benefit from the reuse of commonalities and variability ***-adaptive systems(SASs)are ca... 详细信息
来源: 评论
A Fractional Fourier Based Medical Image Authentication Approach
收藏 引用
computers, Materials & Continua 2022年 第2期70卷 3133-3150页
作者: Fayez Alqahtani Mohammed Amoon Walid El-Shafai Department of Software Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11451Saudi Arabia Department of Computer Science Community CollegeKing Saud UniversityRiyadh11437Saudi Arabia Department of Computer Science and Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
Patient medical information in all forms is crucial to keep private and secure,particularly when medical data communication occurs through insecure ***,there is a bad need for protecting and securing the color medical... 详细信息
来源: 评论