咨询与建议

限定检索结果

文献类型

  • 1,439 篇 会议
  • 961 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,430 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,507 篇 工学
    • 1,158 篇 计算机科学与技术...
    • 953 篇 软件工程
    • 298 篇 信息与通信工程
    • 223 篇 控制科学与工程
    • 155 篇 电气工程
    • 153 篇 生物工程
    • 134 篇 机械工程
    • 113 篇 电子科学与技术(可...
    • 108 篇 生物医学工程(可授...
    • 98 篇 光学工程
    • 61 篇 交通运输工程
    • 59 篇 化学工程与技术
    • 57 篇 仪器科学与技术
    • 57 篇 动力工程及工程热...
    • 56 篇 安全科学与工程
  • 724 篇 理学
    • 379 篇 数学
    • 226 篇 物理学
    • 175 篇 生物学
    • 115 篇 统计学(可授理学、...
    • 99 篇 系统科学
    • 56 篇 化学
  • 512 篇 管理学
    • 319 篇 管理科学与工程(可...
    • 204 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 134 篇 医学
    • 111 篇 临床医学
    • 94 篇 基础医学(可授医学...
    • 56 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 75 篇 法学
    • 61 篇 社会学
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 48 篇 教育学
  • 30 篇 农学
  • 15 篇 文学
  • 9 篇 军事学
  • 6 篇 艺术学

主题

  • 73 篇 machine learning
  • 71 篇 deep learning
  • 58 篇 computer science
  • 58 篇 software enginee...
  • 54 篇 accuracy
  • 53 篇 feature extracti...
  • 47 篇 computational mo...
  • 46 篇 artificial intel...
  • 46 篇 training
  • 43 篇 software
  • 42 篇 data mining
  • 40 篇 optimization
  • 38 篇 information tech...
  • 38 篇 predictive model...
  • 30 篇 internet of thin...
  • 29 篇 support vector m...
  • 26 篇 educational inst...
  • 26 篇 semantics
  • 26 篇 convolutional ne...
  • 25 篇 security

机构

  • 40 篇 faculty of compu...
  • 37 篇 department of so...
  • 32 篇 college of compu...
  • 27 篇 department of so...
  • 21 篇 department of co...
  • 20 篇 school of comput...
  • 20 篇 state key labora...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of softw...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 huaiyin institut...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...

作者

  • 29 篇 quanyin zhu
  • 22 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 herawan tutut
  • 20 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 muhammad waseem ...
  • 14 篇 zain ul abideen
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 muhammad adnan k...
  • 13 篇 siew hock ow
  • 13 篇 ow siew hock
  • 12 篇 tutut herawan
  • 12 篇 belikov juri
  • 12 篇 levron yoash
  • 11 篇 khan arif ali
  • 11 篇 li qi
  • 11 篇 pal umapada

语言

  • 2,282 篇 英文
  • 125 篇 其他
  • 23 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software Engineering and Computer Technology"
2430 条 记 录,以下是101-110 订阅
排序:
Occluded Person Re-Identification using Region-based Convolutional Neural Networks  23
Occluded Person Re-Identification using Region-based Convolu...
收藏 引用
3rd International Conference on Human Machine Interaction, ICHMI 2023
作者: Islam, Atiqul Tsun, Mark Tee Kit Bee Theng, Lau Chua, Caslon Faculty of Engineering Computing & Science Swinburne University of Technology Sarawak Campus Kuching Malaysia Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia
The ability to continuously follow a target person in a dynamically changing environment remains a major challenge that indoor companion robots confront. Ongoing human following is complicated by close similarity matc... 详细信息
来源: 评论
Dynamic knowledge graph completion through time-aware relational message passing  28
Dynamic knowledge graph completion through time-aware relati...
收藏 引用
28th International computer Conference, computer Society of Iran, CSICC 2023
作者: Baqinejadqazvini, Amirhossein Tahery, Saedeh Farzi, Saeed K. N. Toosi University of Technology Faculty of Computer Engineering Department of Software Engineering Tehran Iran K. N. Toosi University of Technology Faculty of Computer Engineering Department of Artificial Intelligence Tehran Iran Tehran Iran
As the structure of knowledge graphs may vary over time, static knowledge graph completion methods do not deal with time-varying knowledge graphs. However, examining the paths between entities and entities' contex... 详细信息
来源: 评论
K-Banhatti Invariants Empowered Topological Investigation of Bridge Networks
收藏 引用
computers, Materials & Continua 2022年 第12期73卷 5423-5440页
作者: Khalid Hamid Muhammad Waseem Iqbal Erssa Arif Yasir Mahmood Ahmad Salman Khan Nazri Kama Azri Azmi Atif Ikram Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Software Engineering Faculty of Information TechnologyThe University of Lahore54000Pakistan Advanced Informatics Department Razak Faculty of Technology and InformaticsUniversiti Teknologi MalaysiaKuala Lumpur54100Malaysia Faculty of Informatics and Applied Mathematics University Malaysia TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of Lahore54000Pakistan
Any number that can be uniquely determined by a graph is called graph *** the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation *** the fast and advanced env... 详细信息
来源: 评论
Deep Semantic and Attentive Network for Unsupervised Video Summarization
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2022年 第2期18卷 1-21页
作者: Zhong, Sheng-Hua Lin, Jingxu Lu, Jianglin Fares, Ahmed Ren, Tongwei College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical Engineering Computer Systems Engineering Program Faculty of Engineering at Shoubra Benha University Cairo Egypt State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China
With the rapid growth of video data, video summarization is a promising approach to shorten a lengthy video into a compact version. Although supervised summarization approaches have achieved state-of-the-art performan... 详细信息
来源: 评论
Design and Modeling of a Photonic Crystal Multiplexer Using Artificial Intelligence
Advanced Electromagnetics
收藏 引用
Advanced Electromagnetics 2025年 第1期14卷 59-64页
作者: Karami, Pouya Yahya, Salah I. Palash, Behnam Chaudhary, Muhammad Akmal Assaad, Maher Parandin, Fariborz Roshani, Saeed Hazzazi, Fawwaz Roshani, Sobhan Department of Electrical Engineering Kermanshah Branch Islamic Azad University Kermanshah Iran Department of Communication and Computer Engineering Cihan University-Erbil Erbil44001 Iraq Department of Software Engineering Faculty of Engineering Koya University KOY45 Koya Iraq Department of Electrical and Computer Engineering College of Engineering and Information Technology Ajman University 346 Ajman United Arab Emirates Department of Electrical Engineering College of Engineering Prince Sattam bin Abdulaziz University Al-Kharj11492 Saudi Arabia
In this paper, design and modeling of an all-optical 2×1 multiplexer based on 2D photonic crystals and artificial neural networks (ANNs) are presented. The proposed structure aims to maximize the difference betwe... 详细信息
来源: 评论
Comparison of IDS in IoT, Mobile and Cloud based Systems  12
Comparison of IDS in IoT, Mobile and Cloud based Systems
收藏 引用
12th International Symposium on Digital Forensics and Security, ISDFS 2024
作者: Gok, Gorkem Boyaci, Aytug Ulas, Mustafa Firat University Faculty of Technology Department of Software Engineering Elaziǧ Turkey Air Force Academy National Defence University Department of Computer Engineering İstanbul Turkey Firat University Faculty of Engineering Department of Artificial Intelligence and Data Science Engineering Elaziǧ Turkey
This study is meant to research the evolution of intrusion detection and network monitoring within computer, cloud-based systems, IIoT, and mobile environments. The source has outlined the novel technologies in IDS, f... 详细信息
来源: 评论
Deep Learning based Brain Tumor Classification for MR Images using ResNet50  12
Deep Learning based Brain Tumor Classification for MR Images...
收藏 引用
12th International Symposium on Digital Forensics and Security, ISDFS 2024
作者: Kokcam, Omer Mirac Boyaci, Aytug Colak, Muhammed Emre Firat University Faculty of Technology Department of Software Engineering Elaziǧ Turkey National Defence University Department of Computer Engineering Air Force Academy İstanbul Turkey Firat University Faculty of Engineering Department of Artificial Intelligence and Data Science Engineering Elaziǧ Turkey
Brain tumors are abnormal cell growths that occur in various parts of the brain, and the accurate classification of these tumors plays a critical role in determining treatment methods. Classification and diagnosis of ... 详细信息
来源: 评论
Quantum software Models: Quantum Modules Tomography and Recovery Theorem  35
Quantum Software Models: Quantum Modules Tomography and Reco...
收藏 引用
35th International Conference on software engineering and Knowledge engineering, SEKE 2023
作者: Exman, Iaakov Zvulunov, Ariel School of Computer Science Faculty of Sciences HIT – Holon Institute of Technology Holon Israel Software Engineering The Jerusalem College of Engineering Azrieli Jerusalem Israel
Quantum Tomography partially measures and then recovers the remaining density matrix quantum state, in order to verify that a certain device – processor or detector – indeed outputs the intended quantum state. Howev... 详细信息
来源: 评论
The Correlation Between Architecture Smells, Package Stability and Reusability: A Case Study  4
The Correlation Between Architecture Smells, Package Stabili...
收藏 引用
4th IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and computer engineering, MI-STA 2024
作者: Benidris, Mrwan Elfallah, Ehab A. Omar Cheema, Marwa Aslam Alsma, Mohammed Salah Addin Kadiki, Tareq Ziad Elbarsha, Abdelfattah University of Benghazi Faculty of Information Technology Dep. of Computer Science Libya Libyan International Medical University Faculty of Information Technology Dept. of Software Engineering Libya University of Benghazi Faculty of Public Health Health Informatics Department Libya
the design decisions made in the architecture of a software system are essential to its maintainability, and thus its quality is of great importance. Architecture smells (ASs) can be used to identify any quality issue... 详细信息
来源: 评论
Optimized Evaluation of Mobile Base Station by Modern Topological Invariants
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 363-378页
作者: Khalid Hamid Muhammad Waseem Iqbal Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Due to a tremendous increase in mobile traffic,mobile operators have started to restructure their networks to offload their *** directions will lead to fundamental changes in the design of future Fifthgeneration(5G)ce... 详细信息
来源: 评论