咨询与建议

限定检索结果

文献类型

  • 1,439 篇 会议
  • 961 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,430 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,507 篇 工学
    • 1,158 篇 计算机科学与技术...
    • 953 篇 软件工程
    • 298 篇 信息与通信工程
    • 223 篇 控制科学与工程
    • 155 篇 电气工程
    • 153 篇 生物工程
    • 134 篇 机械工程
    • 113 篇 电子科学与技术(可...
    • 108 篇 生物医学工程(可授...
    • 98 篇 光学工程
    • 61 篇 交通运输工程
    • 59 篇 化学工程与技术
    • 57 篇 仪器科学与技术
    • 57 篇 动力工程及工程热...
    • 56 篇 安全科学与工程
  • 724 篇 理学
    • 379 篇 数学
    • 226 篇 物理学
    • 175 篇 生物学
    • 115 篇 统计学(可授理学、...
    • 99 篇 系统科学
    • 56 篇 化学
  • 512 篇 管理学
    • 319 篇 管理科学与工程(可...
    • 204 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 134 篇 医学
    • 111 篇 临床医学
    • 94 篇 基础医学(可授医学...
    • 56 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 75 篇 法学
    • 61 篇 社会学
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 48 篇 教育学
  • 30 篇 农学
  • 15 篇 文学
  • 9 篇 军事学
  • 6 篇 艺术学

主题

  • 73 篇 machine learning
  • 71 篇 deep learning
  • 58 篇 computer science
  • 58 篇 software enginee...
  • 54 篇 accuracy
  • 53 篇 feature extracti...
  • 47 篇 computational mo...
  • 46 篇 artificial intel...
  • 46 篇 training
  • 43 篇 software
  • 42 篇 data mining
  • 40 篇 optimization
  • 38 篇 information tech...
  • 38 篇 predictive model...
  • 30 篇 internet of thin...
  • 29 篇 support vector m...
  • 26 篇 educational inst...
  • 26 篇 semantics
  • 26 篇 convolutional ne...
  • 25 篇 security

机构

  • 40 篇 faculty of compu...
  • 37 篇 department of so...
  • 32 篇 college of compu...
  • 27 篇 department of so...
  • 21 篇 department of co...
  • 20 篇 school of comput...
  • 20 篇 state key labora...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 17 篇 faculty of softw...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 huaiyin institut...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...

作者

  • 29 篇 quanyin zhu
  • 22 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 herawan tutut
  • 20 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 muhammad waseem ...
  • 14 篇 zain ul abideen
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 muhammad adnan k...
  • 13 篇 siew hock ow
  • 13 篇 ow siew hock
  • 12 篇 tutut herawan
  • 12 篇 belikov juri
  • 12 篇 levron yoash
  • 11 篇 khan arif ali
  • 11 篇 li qi
  • 11 篇 pal umapada

语言

  • 2,282 篇 英文
  • 125 篇 其他
  • 23 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software Engineering and Computer Technology"
2430 条 记 录,以下是31-40 订阅
排序:
Application of Lightweight DSC-NET Network Model in Histopathological Images of Lung Cancer and Colon Cancer
Application of Lightweight DSC-NET Network Model in Histopat...
收藏 引用
2023 International Conference on Cognitive Computing and Complex Data, ICCD 2023
作者: An, Wenlong Zong, Hui Zhou, Heng Wang, Jian Huaiyin Institute of Technology Faculty of Computer and Software Engineering Huaian China
Classification of histopathological images is a fundamental task in the workflow of pathological diagnosis. Due to the complexity of pathological images, it is particularly important to use deep learning to improve di... 详细信息
来源: 评论
Offshore software Maintenance Outsourcing Process Model Validation:A Case Study Approach
收藏 引用
computers, Materials & Continua 2023年 第3期74卷 5035-5048页
作者: Atif Ikram Masita Abdul Jalil Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan Faculty of Ocean Engineering Technology and Informatics University Malaysia TerengganuKuala TerengganuMalaysia Department of Computer Science&Information Technology Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajranSaudi Arabia Department of Software Engineering Faculty of Information TechnologyThe University of LahoreLahore54000Pakistan
The successful execution and management of Offshore software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO *** a lot of research on software outsourcing is going on,most of the exis... 详细信息
来源: 评论
A Multi-constraint 3D Mesh Models Deformation Method
A Multi-constraint 3D Mesh Models Deformation Method
收藏 引用
2023 International Conference on Cognitive Computing and Complex Data, ICCD 2023
作者: Zhang, Chuangchuang Chen, Xiaobing Lin, Jianchu Guo, Shuxin Wang, Rongrong Gu, Yinxi Huaiyin Insititute of Technology Faculty of Computer and Software Engineering Huai'an China
Aiming at the problems of too many control vertices and difficult operation of the traditional free deformation technique, a multi-constraint 3D mesh models deformation method is proposed. Firstly, the input model is ... 详细信息
来源: 评论
A privacy and compliance in regulated anonymous payment system based on blockchain
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2024年 第8期15卷 3141-3157页
作者: Elfadul, Issameldeen Wu, Lijun Elhabob, Rashad Elkhalil, Ahmed School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu610054 China School of Computer and Information Engineering Qilu Institute of Technology Shandong Jinan250200 China Faculty of Computer Science and Information Technology Karary University Khartoum Sudan
Decentralized Anonymous Payment Systems (DAP), often known as cryptocurrencies, stand out as some of the most innovative and successful applications on the blockchain. These systems have garnered significant attention... 详细信息
来源: 评论
Optimized digital watermarking: Harnessing the synergies of Schur matrix factorization, DCT, and DWT for superior image ownership proofing
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 19817-19852页
作者: Al-Aiash, Issa Alquran, Rabee AlJamal, Mahmoud Alsarhan, Ayoub Aljaidi, Mohammad Al-Fraihat, Dimah Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa13110 Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman11622 Jordan
The contemporary context of abundant digital dissemination inherently gives rise to the need for media protection and the clear identification of ownership rights. This paper responded to this nagging issue of unautho... 详细信息
来源: 评论
Smart Glove with Mobile Application to Detect Static Arabic Hijaiyah Hand Code for Quran Recitation  21
Smart Glove with Mobile Application to Detect Static Arabic ...
收藏 引用
21st International Learning and technology Conference, L and T 2024
作者: Elshareif, Mohamed Elgilani Eltahir Ahmad Alias, Nurul Aswani Jomhari, Nazean Sofian, Hazrina University of Malaya Faculty of Computer Science and Information Technology Department of Software Engineering Kuala Lumpur Malaysia
The use of assistive technology in the field of education is now a common practice in today's tech-driven era. The implementation is quite rampant in all levels and sections of education, including by special need... 详细信息
来源: 评论
Transaction transmission model for blockchain channels based on non-cooperative games
收藏 引用
Science China(Information Sciences) 2023年 第1期66卷 97-114页
作者: Peiyun ZHANG Chenxi LI Mengchu ZHOU Wenjun HUANG Abdullah ABUSORRAH Omaimah O.BAMASAG Engineering Research Center of Digital Forensics of Ministry of Education School of Computer and SoftwareNanjing University of Information Science and Technology School of Computer and Information Anhui Normal University Department of Electrical and Computer Engineering New Jersey Institute of Technology Center of Research Excellence in Renewable Energy and Power Systems Department of Electrical and Computer Engineering Faculty of Engineering and K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University Department of Computer Science Faculty of Computing and Information Technology Center of Excellence in Smart Environment Research King Abdulaziz University
In blockchain networks, transactions can be transmitted through channels. The existing transmission methods depend on their routing information. If a node randomly chooses a channel to transmit a transaction, the tran... 详细信息
来源: 评论
Detection Algorithm for Safety Helmet Wearing of Chemical Plant Personnel Based on Improved YOLOv5m
Detection Algorithm for Safety Helmet Wearing of Chemical Pl...
收藏 引用
2023 International Conference on Cognitive Computing and Complex Data, ICCD 2023
作者: Li, Qiangqiang Yu, Kun Wang, Haoran Guan, Qianjun Gao, Shihong Jiang, Jiamin Huaiyin Institute of Technology Faculty of Computer and Software Engineering Huai'an Jiangsu China
Wearing a safety helmet at the work site of a chemical plant can effectively prevent safety accidents caused by head injuries, so it is very important to detect whether employees wear safety helmets. In order to solve... 详细信息
来源: 评论
Fake News Classification: Past, Current, and Future
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 2225-2249页
作者: Muhammad Usman Ghani Khan Abid Mehmood Mourad Elhadef Shehzad Ashraf Chaudhry Department of Computer Science University of Engineering and TechnologyLahore54890Pakistan Department of Computer Science&Information Technology Abu Dhabi UniversityAbu Dhabi59911United Arab Emirates Department of Software Engineering Faculty of Engineering and ArchitectureNisantasi UniversityIstanbulTurkey
The proliferation of deluding data such as fake news and phony audits on news web journals,online publications,and internet business apps has been aided by the availability of the web,cell phones,and social *** can qu... 详细信息
来源: 评论
Lightweight Protective Clothing Detection Algorithm Based on Ghost Convolution and GSConv Convolution
Lightweight Protective Clothing Detection Algorithm Based on...
收藏 引用
2023 International Conference on Cognitive Computing and Complex Data, ICCD 2023
作者: Guan, Qianjun Yu, Kun Wang, Haoran Li, Qiangqiang Gao, Shihong Huaiyin Institute of Technology Faculty of Computer and Software Engineering Huai'an Jiangsu China
GhostNet is proposed by Huawei Noah's Ark Laboratory in CVPR2020, which can be used with the same accuracy, with less speed and less computation than SOTA method. This convolution is a low-cost operation used to d... 详细信息
来源: 评论