咨询与建议

限定检索结果

文献类型

  • 2,666 篇 会议
  • 1,361 篇 期刊文献
  • 69 册 图书

馆藏范围

  • 4,096 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,500 篇 工学
    • 1,966 篇 计算机科学与技术...
    • 1,643 篇 软件工程
    • 485 篇 信息与通信工程
    • 364 篇 控制科学与工程
    • 275 篇 生物工程
    • 222 篇 电气工程
    • 212 篇 生物医学工程(可授...
    • 193 篇 机械工程
    • 167 篇 电子科学与技术(可...
    • 152 篇 光学工程
    • 97 篇 仪器科学与技术
    • 96 篇 安全科学与工程
    • 95 篇 化学工程与技术
    • 86 篇 交通运输工程
    • 80 篇 动力工程及工程热...
  • 1,191 篇 理学
    • 644 篇 数学
    • 316 篇 物理学
    • 311 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 159 篇 系统科学
    • 94 篇 化学
  • 815 篇 管理学
    • 505 篇 管理科学与工程(可...
    • 333 篇 图书情报与档案管...
    • 246 篇 工商管理
  • 210 篇 医学
    • 177 篇 临床医学
    • 151 篇 基础医学(可授医学...
    • 93 篇 药学(可授医学、理...
    • 84 篇 公共卫生与预防医...
  • 125 篇 法学
    • 100 篇 社会学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 77 篇 教育学
  • 40 篇 农学
  • 26 篇 文学
  • 12 篇 军事学
  • 6 篇 艺术学
  • 3 篇 哲学
  • 1 篇 历史学

主题

  • 148 篇 software enginee...
  • 103 篇 computer science
  • 98 篇 machine learning
  • 91 篇 deep learning
  • 87 篇 feature extracti...
  • 83 篇 computational mo...
  • 83 篇 software
  • 81 篇 accuracy
  • 79 篇 artificial intel...
  • 74 篇 training
  • 65 篇 optimization
  • 64 篇 data mining
  • 54 篇 predictive model...
  • 53 篇 semantics
  • 52 篇 security
  • 46 篇 support vector m...
  • 45 篇 internet of thin...
  • 45 篇 software testing
  • 45 篇 data models
  • 44 篇 information tech...

机构

  • 44 篇 college of compu...
  • 41 篇 faculty of compu...
  • 38 篇 faculty of softw...
  • 37 篇 department of so...
  • 27 篇 department of so...
  • 23 篇 state key labora...
  • 21 篇 school of comput...
  • 21 篇 department of co...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 department of in...
  • 16 篇 universiti malay...
  • 16 篇 faculty of scien...
  • 16 篇 faculty of compu...
  • 15 篇 school of comput...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...

作者

  • 37 篇 tao dacheng
  • 28 篇 herawan tutut
  • 28 篇 quanyin zhu
  • 23 篇 tutut herawan
  • 23 篇 zamli kamal z.
  • 20 篇 ali raja hashim
  • 20 篇 noraziah ahmad
  • 19 篇 jasni mohamad za...
  • 18 篇 raja hashim ali
  • 18 篇 muhammad adnan k...
  • 17 篇 noraziah a.
  • 16 篇 muhammad waseem ...
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 16 篇 zain jasni moham...
  • 16 篇 siew hock ow
  • 15 篇 a. noraziah
  • 15 篇 rahnamayan shahr...
  • 15 篇 selamat ali
  • 15 篇 du bo

语言

  • 3,662 篇 英文
  • 400 篇 其他
  • 32 篇 中文
  • 2 篇 日文
  • 2 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 德文
检索条件"机构=Faculty of Software Engineering and Computer Engineering"
4096 条 记 录,以下是611-620 订阅
排序:
Composite metamorphic relations for integration testing  22
Composite metamorphic relations for integration testing
收藏 引用
8th International Conference on computer Technology Applications, ICCTA 2022
作者: Iakusheva, Sofia Khritankov, Anton Phystech School of Applied Mathematics and Informatics Moscow Institute of Physics and Technology Russia Faculty of Computer Science Dept. of Software Engineering Hse University Russia
Metamorphic testing is a testing method for problems without test oracles. Integration testing allows for detecting errors in complex systems that may not be found during the testing of their components. In this paper... 详细信息
来源: 评论
Ensemble based unsupervised anomaly detection with concept drift adaptation for time series data
Ensemble based unsupervised anomaly detection with concept d...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Danlei Li Nirmal Nair Kevin I-Kai Wang Kouichi Sakurai Department of Electrical Computer and Software Engineering University of Auckland Auckland New Zealand Department of Informatics Faculty of Information Science and Electrical Engineering Kyushu University Fukuoka Japan
Anomaly detection is the identification of instances that substantially deviate from the majority of the data and do not conform to a well-defined normal behavior. Investigating time series anomalies has become increa... 详细信息
来源: 评论
Yemeni Paper Currency Recognition System Using Deep Learning Approach  1st
Yemeni Paper Currency Recognition System Using Deep Learning...
收藏 引用
1st International Conference of Advanced Computing and Informatics, ICACIN 2020
作者: Ba Alawi, Abdulfattah E. Saeed, Ahmed Y. A. Al-Zekri, Burhan T. Radman, Borhan M. N. Saif, Alaa A. Alshami, Maged Alshadadi, Ahmed Mohammad, Muneef A. Mohammed, Ala’a M. Saeed, Osama Y. A. Saeed, Adeeb M. Department of Software Engineering Al-Saeed Faculty of Engineering & IT Taiz University Taiz Yemen Department of Communication and Computer Engineering Al-Saeed Faculty of Engineering & IT Taiz University Taiz Yemen
The recognition of paper currency with various designs is a difficult task for automated banking machines and people with low visions. Due to the wide use of automated system such as ATM, for getting cash, safe and pr... 详细信息
来源: 评论
A High-Resolution Approach for Dynamic Traffic Police Gestures Recognition Based on Spatial Context and Temporal Features Fusion  8
A High-Resolution Approach for Dynamic Traffic Police Gestur...
收藏 引用
8th International Conference on Image, Vision and Computing, ICIVC 2023
作者: He, Jian Jiang, Shengsheng Wei, Xin Zhang, Cheng Dong, Ruihai Beijing Engineering Research Center for IOT Software and Systems Beijing University of Technology Beijing China Beijing University of Technology Faculty of Information Technology Beijing China School of Computer Science University College Dublin Dublin Ireland
According to the requirement of recognizing traffic police gestures for driver assistance systems and intelligent vehicles, a universal model for dynamic traffic police gesture recognition is firstly introduced, of wh... 详细信息
来源: 评论
MSKI-Net: Towards modality-specific knowledge interaction for glioma survival prediction
MSKI-Net: Towards modality-specific knowledge interaction fo...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Su, Ran Xiao, Jin Cui, Hui Xuan, Ping Feng, Xikang Wei, Leyi Jin, Qiangguo Tianjin University School of Computer Software College of Intelligence and Computing Tianjin China La Trobe University Department of Computer Science and Information Technology Melbourne Australia Shantou University School of Engineering Department of Computer Science China Northwestern Polytechnical University School of Software China Macao Polytechnic University AIDD Faculty of Applied Science China Xiamen University School of Information Xiamen China Yangtze River Delta Research Institute Northwestern Polytechnical University Taicang China
Gliomas hold a prominent position in neurooncology due to their high malignancy and poor survival rates. Accurately predicting the prognosis and survival risk of glioma patients is crucial for clinical treatment. Rece... 详细信息
来源: 评论
CAPAST: Content Affinity Preserved Arbitrary Style Transfer
CAPAST: Content Affinity Preserved Arbitrary Style Transfer
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Xinyuan Zheng Xiaojie Li Canghong Shi Jia He Zhan Ao Huang Xian Zhang Imran Mumtaz School of Computer Science Chengdu University of Information Technology China School of Computer and Software Engineering Xihua University China Faculty of Engineering and Mathematical Sciences The University of Western Australia Australia Department of Computer Science University of Agriculture Faisalabad Pakistan
Balancing the consistency of style and the integrity of content is the main challenge in arbitrary style transfer domain. Currently, local style details can be effectively captured by attention mechanism but easily pr... 详细信息
来源: 评论
R-TAP: A Cloud-Based Multi-Region Road Traffic Accident Severity Prediction Model
R-TAP: A Cloud-Based Multi-Region Road Traffic Accident Seve...
收藏 引用
IEEE Industrial Electronics and Applications Conference (IEACon)
作者: Albe Bing Zhe Chai Bee Theng Lau Mark Kit Tsun Tee Chris McCarthy Faculty of Engineering Computing & Science Swinburne University of Technology Sarawak Campus Kuching Malaysia Department of Computer Science & Software Engineering Swinburne University of Technology Melbourne Australia
The tremendous impact of road traffic accidents (RTAs) remains a global concern, especially in low- and middle-income countries (LMICs). While most LMICs have limited budget to afford advanced traffic monitoring syste... 详细信息
来源: 评论
Data Migration from Relational to NoSQL Database: Review and Comparative Study
Data Migration from Relational to NoSQL Database: Review a...
收藏 引用
International Conference on Advanced Intelligent Systems for Sustainable Development, AI2SD 2022
作者: Saadouni, Chaimae El Bouchti, Karim Reda, Oussama Mohamed Ziti, Soumia Department of Computer Science Intelligent Processing Systems and Security Team Mohammed V University Rabat Morocco Algorithms Networks Intelligent Systems and Software Engineering Research Team Faculty of Sciences Mohammed V University Rabat Morocco
New storage requirements, analysis, and visualization of Big Data, which includes structured, semi-structured, and unstructured data, have caused the developers in the past decade to begin preferring Big Data database... 详细信息
来源: 评论
DDoS Detection Using Active and Idle Features of Revised CICFlowMeter and Statistical Approaches  4
DDoS Detection Using Active and Idle Features of Revised CIC...
收藏 引用
4th International Conference on Advanced Science and engineering, ICOASE 2022
作者: Ali, Basheer Husham Sulaiman, Nasri Al-Haddad, S.A.R. Atan, Rodziah Hassan, Siti Lailatul Mohd Department of Electrical and Electronic Engineering Serdang Malaysia Faculty of Engineering Department of Electrical and Electronic Engineering Serdang Malaysia Department of Computer and Communication Systems Engineering Serdang Malaysia Software Eng. and Information Systems Dept Serdang Malaysia School of Electrical Engineering Universiti Teknologi Mara Shah Alam Malaysia
Distributed Denial of services (DDoS) attack is one of the most dangerous attacks that targeted servers. The main consequence of this attack is to prevent users from getting their legitimate services by bringing down ... 详细信息
来源: 评论
Data Transfer for YOLOv5 Based on Selector Network and Partial Pseudo-Labels
Data Transfer for YOLOv5 Based on Selector Network and Parti...
收藏 引用
Cognitive Computing and Complex Data (ICCD), International Conference on the
作者: Guoqiang Qu Jianchu Lin Haiyi Bian Haiping Zhou Muhammad Raees UL Haq Bo Jiang Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huai’an China Faculty of Electronic Information Engineering Huaiyin Institute of Technology Huai’an China Jiangsu Eazytec Co. LTD Yixin China
YOLOv5 is a widely used object detection method for its high-performance of balancing speed and accuracy. Data transfer for YOLOv5 is a challenging task, as it could involve domain shift between different datasets. We... 详细信息
来源: 评论