咨询与建议

限定检索结果

文献类型

  • 2,662 篇 会议
  • 1,376 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,107 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,519 篇 工学
    • 1,982 篇 计算机科学与技术...
    • 1,655 篇 软件工程
    • 490 篇 信息与通信工程
    • 370 篇 控制科学与工程
    • 275 篇 生物工程
    • 227 篇 电气工程
    • 211 篇 生物医学工程(可授...
    • 196 篇 机械工程
    • 168 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 95 篇 仪器科学与技术
    • 95 篇 化学工程与技术
    • 95 篇 安全科学与工程
    • 87 篇 交通运输工程
    • 81 篇 动力工程及工程热...
  • 1,197 篇 理学
    • 647 篇 数学
    • 319 篇 物理学
    • 311 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 161 篇 系统科学
    • 93 篇 化学
  • 821 篇 管理学
    • 510 篇 管理科学与工程(可...
    • 335 篇 图书情报与档案管...
    • 249 篇 工商管理
  • 212 篇 医学
    • 178 篇 临床医学
    • 152 篇 基础医学(可授医学...
    • 92 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 128 篇 法学
    • 101 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 75 篇 教育学
  • 41 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 147 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 95 篇 deep learning
  • 88 篇 feature extracti...
  • 84 篇 computational mo...
  • 84 篇 accuracy
  • 83 篇 software
  • 80 篇 artificial intel...
  • 73 篇 training
  • 66 篇 optimization
  • 63 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 51 篇 security
  • 46 篇 support vector m...
  • 45 篇 software testing
  • 44 篇 internet of thin...
  • 44 篇 information tech...
  • 44 篇 testing

机构

  • 45 篇 college of compu...
  • 40 篇 faculty of compu...
  • 37 篇 department of so...
  • 37 篇 faculty of softw...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 22 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 16 篇 universiti malay...
  • 15 篇 huaiyin institut...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 21 篇 noraziah ahmad
  • 20 篇 ali raja hashim
  • 20 篇 raja hashim ali
  • 19 篇 jasni mohamad za...
  • 18 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo
  • 15 篇 siew hock ow

语言

  • 3,887 篇 英文
  • 187 篇 其他
  • 30 篇 中文
  • 3 篇 土耳其文
  • 2 篇 日文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Software Engineering and Computer Engineering"
4107 条 记 录,以下是251-260 订阅
排序:
Task Consistent Prototype Learning for Incremental Few-Shot Semantic Segmentation  27th
Task Consistent Prototype Learning for Incremental Few-Shot...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Xu, Wenbo Wu, Yanan Jiang, Haoran Wang, Yang Wu, Qiang Zhang, Jian Faculty of Engineering and Information Technology University of Technology Sydney Sydney2007 Australia School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China Department of Computer Science and Software Engineering Concordia University MontrealH3G2J1 Canada
Incremental Few-Shot Semantic Segmentation (iFSS) tackles a task that requires a model to continually expand its segmentation capability on novel classes using only a few annotated examples. Typical incremental approa... 详细信息
来源: 评论
Crypto-Ransomware Detection Using Selective Hashing
Crypto-Ransomware Detection Using Selective Hashing
收藏 引用
2022 International Conference on Electrical and Computing Technologies and Applications, ICECTA 2022
作者: Almajali, Anas Qaffaf, Ahmad Alkayid, Natali Wadhawan, Yatin The Hashemite University Faculty of Engineering Department of Computer Engineering Zarqa Jordan Software Engineer SeattleWA United States
Ransomware is a malicious software that attempts to encrypt the user's files and demand a ransom in exchange for decrypting the files. This malware may have catastrophic impacts on the availability of data and con... 详细信息
来源: 评论
An software Defined Networking (SDN) Enhanced Edge Computing Framework for Internet of Healthcare Things (IoHT)
An Software Defined Networking (SDN) Enhanced Edge Computing...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Anh, Dang Van Chehri, Abdellah Quy, Nguyen Minh Hue, Chu Thi Minh Nguyen, Dinh C. Quy, Vu Khanh Hung Yen University of Technology and Education Faculty of Information Technology Hungyen Viet Nam Royal Military College of Canada Department of Mathematics and Computer Science Kingston Canada Fpt University Faculty of Software Engineering Hanoi Viet Nam The University of Alabama Department of Electrical and Computer Engineering HuntsvilleAL United States
The rapid proliferation of intelligent Internet of Health Things (IoHT) applications within the context of the COVID-19 pandemic has exerted significant strain on the backhaul network infrastructure. This paper aims t... 详细信息
来源: 评论
Improved Time-Saving Face Detection in Video  9
Improved Time-Saving Face Detection in Video
收藏 引用
9th International engineering Conference on Sustainable Technology and Development, IEC 2023
作者: Qadir, Jihad Anwar Jalal, Shayan Ihsan Jameel, Samer Kais Al-Talabani, Abdulbasit University of Raparin College of Basic Education Department of Computer Science Kurdistan Region Rania Iraq Koya University Faculty of Engineering Department of Software Engineering Kurdistan Region Koya Iraq
Human face detection from video sequences is a difficult problem in computer vision. Face detection is the process of determining the location of a face or faces in each frame of a video. Face detection in real-time v... 详细信息
来源: 评论
A Secured and Optimized Clustering Approch in Vehicular Ad-hoc Network  4
A Secured and Optimized Clustering Approch in Vehicular Ad-h...
收藏 引用
4th IEEE International Conference on Electrical, computer, and Energy Technologies, ICECET 2024
作者: Khan, Imran Khan, Fazlullah Ali, Asad Alshawi, Bandar Alturki, Ryan Wedyan, Mohammad Abdul Wali Khan University Computer Science Department KPK Mardan Pakistan School of Computer Science University of Nottingham Ningbo China Faculty of Science and Engineering Zhejiang315104 China University of Engineering and Technology Department of Computer Science KPK Peshawar Pakistan College of Computing Umm Al-Qura University Department of Computer and Network Engineering Makkah Saudi Arabia College of Computing Umm Al-Qura University Department of Software Engineering Makkah Saudi Arabia Faculty of Information Technology and Computer Sciences Department of Computer Sciences Irbid21163 Jordan
Vehicular ad hoc networks (VANETs) take vital role in intelligent transportation systems, but they face challenges due to dynamic network topology, impacting communication efficiency, especially with increasing active... 详细信息
来源: 评论
Custom Hidden Markov Models for Effective Part-of-Speech Tagging  18
Custom Hidden Markov Models for Effective Part-of-Speech Tag...
收藏 引用
18th IEEE International Conference on Emerging Technologies, ICET 2023
作者: Khalid, Hassan Bin Siddique, Abu Bakar Ali, Raja Hashim Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany
Hidden Markov Models have proved to be a very significant tool for various time-series related problems, especially where context is important. One such problem is Part-of-speech tagging. The work uses a customized HM... 详细信息
来源: 评论
A Spectral Mask - Based on Method for Applying into Generalized Sidelobe Canceller Beamformer  12th
A Spectral Mask - Based on Method for Applying into Gener...
收藏 引用
Proceedings of the12th International Conference on Information Technology and its Applications, CITA 2023
作者: Huy, Nguyen Ba Anh, Pham Tuan The, Quan Trong Faculty of Control Systems and Robotics University ITMO St.Petersburg Russia Faculty of Software Engineering and Computer Systems University ITMO St.Petersburg Russia
The problem of signal processing is extracting the desired target speaker while suppressing the annoying background noise in complex recording situation, where exists third-party talker, transport vehicle or interfere... 详细信息
来源: 评论
Revolutionizing Campus Exploration with GikiLenS: A Deep Learning-Powered Object Detection App  18
Revolutionizing Campus Exploration with GikiLenS: A Deep Lea...
收藏 引用
18th IEEE International Conference on Emerging Technologies, ICET 2023
作者: Mueed, Iqra Arshad, Usama Ali, Raja Hashim Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany
For newcomers and tourists, navigating university campuses can be difficult, resulting in aggravation and lost time. We respond by introducing 'GikiLenS', an object identification application driven by deep le... 详细信息
来源: 评论
EMARec: a sequential recommendation with exponential moving average
收藏 引用
Neural Computing and Applications 2024年 第21期36卷 12917-12933页
作者: Chen, Rui Wang, Zonglin Tang, Cundong Zhang, Jianwei Li, Pu Kong, Xiangjie Huang, Min College of Software Engineering Zhengzhou University of Light Industry Zhengzhou450001 China Henan Joint International Research Laboratory of Computer Animation Implementation Technologies Zhengzhou450001 China School of Information Science and Technology Northwest University Xi’an710127 China Faculty of Information and Engineering Xuchang Vocational Technical College Xuchang461000 China College of Computer Science and Technology Zhejiang University of Technology Hangzhou310023 China
Capturing dynamic preference features from user historical behavioral data is widely applied to improve the accuracy of recommendations in sequential recommendation tasks. However, existing deep neural network-based s... 详细信息
来源: 评论
Diving into Brain Complexity: Exploring Functional and Effective Connectivity Networks  18
Diving into Brain Complexity: Exploring Functional and Effec...
收藏 引用
18th IEEE International Conference on Emerging Technologies, ICET 2023
作者: Siddique, Abu Bakar Khalid, Hassan Bin Ali, Raja Hashim University of Europe for Applied Sciences Dept. of Technology & Software Engineering Berlin Germany Gik Institute of Engg. Sciences & Technology Faculty of Computer Science & Engineering Topi Pakistan
The human brain's intricate functions are under-pinned by a vast network of synapses that enable chemical impulses between neurons. Neuroscientists employ two key approaches, functional and effective connectivity,... 详细信息
来源: 评论