咨询与建议

限定检索结果

文献类型

  • 1,440 篇 会议
  • 960 篇 期刊文献
  • 30 册 图书

馆藏范围

  • 2,430 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,493 篇 工学
    • 1,146 篇 计算机科学与技术...
    • 944 篇 软件工程
    • 294 篇 信息与通信工程
    • 218 篇 控制科学与工程
    • 153 篇 生物工程
    • 150 篇 电气工程
    • 131 篇 机械工程
    • 112 篇 电子科学与技术(可...
    • 108 篇 生物医学工程(可授...
    • 97 篇 光学工程
    • 60 篇 交通运输工程
    • 59 篇 仪器科学与技术
    • 59 篇 化学工程与技术
    • 57 篇 动力工程及工程热...
    • 56 篇 安全科学与工程
  • 721 篇 理学
    • 379 篇 数学
    • 223 篇 物理学
    • 175 篇 生物学
    • 116 篇 统计学(可授理学、...
    • 98 篇 系统科学
    • 57 篇 化学
  • 506 篇 管理学
    • 315 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 131 篇 医学
    • 109 篇 临床医学
    • 92 篇 基础医学(可授医学...
    • 55 篇 公共卫生与预防医...
    • 54 篇 药学(可授医学、理...
  • 72 篇 法学
    • 60 篇 社会学
  • 62 篇 经济学
    • 62 篇 应用经济学
  • 50 篇 教育学
  • 29 篇 农学
  • 15 篇 文学
  • 9 篇 军事学
  • 6 篇 艺术学

主题

  • 73 篇 machine learning
  • 68 篇 deep learning
  • 59 篇 software enginee...
  • 58 篇 computer science
  • 53 篇 feature extracti...
  • 52 篇 accuracy
  • 47 篇 artificial intel...
  • 46 篇 computational mo...
  • 46 篇 training
  • 43 篇 data mining
  • 42 篇 software
  • 39 篇 optimization
  • 38 篇 information tech...
  • 38 篇 predictive model...
  • 30 篇 internet of thin...
  • 29 篇 support vector m...
  • 27 篇 cloud computing
  • 26 篇 educational inst...
  • 26 篇 semantics
  • 26 篇 security

机构

  • 42 篇 faculty of compu...
  • 37 篇 department of so...
  • 32 篇 college of compu...
  • 27 篇 department of so...
  • 21 篇 department of co...
  • 20 篇 school of comput...
  • 20 篇 state key labora...
  • 19 篇 faculty of compu...
  • 19 篇 gik institute of...
  • 19 篇 university of eu...
  • 19 篇 dept. of technol...
  • 18 篇 faculty of softw...
  • 17 篇 faculty of compu...
  • 16 篇 department of in...
  • 15 篇 national key lab...
  • 15 篇 state key labora...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of compu...
  • 15 篇 faculty of scien...
  • 14 篇 faculty of compu...

作者

  • 29 篇 quanyin zhu
  • 22 篇 tao dacheng
  • 20 篇 ali raja hashim
  • 20 篇 herawan tutut
  • 20 篇 raja hashim ali
  • 16 篇 usama arshad
  • 16 篇 arshad usama
  • 15 篇 muhammad waseem ...
  • 14 篇 zain ul abideen
  • 14 篇 muhammad adnan k...
  • 13 篇 lee sai peck
  • 13 篇 liang peng
  • 13 篇 siew hock ow
  • 13 篇 ow siew hock
  • 12 篇 tutut herawan
  • 12 篇 belikov juri
  • 12 篇 levron yoash
  • 11 篇 khan arif ali
  • 11 篇 hamam habib
  • 11 篇 li qi

语言

  • 2,142 篇 英文
  • 263 篇 其他
  • 26 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 日文
  • 1 篇 土耳其文
检索条件"机构=Faculty of Software Engineering and Computer Technology"
2430 条 记 录,以下是791-800 订阅
排序:
Unified Cross-Task and Cross-Model Consistency for Boundary-Aware Semi-Supervised Medical Image Segmentation
SSRN
收藏 引用
SSRN 2023年
作者: Jia, Xibin Zhang, Wang Wang, Luo Yang, Zhenghan Yang, Dawei Hong, Min Faculty of Information Technology Beijing University of Technology Beijing100124 China Beijing Friendship Hospital The Capital University of Medical Sciences Beijing100050 China Department of Computer Software Engineering Soonchunhyang University Asan31538 Korea Republic of
Semi-supervised learning methods have gained significant attention in recent years due to the challenge of obtaining a large amount of labeled data. While leveraging unlabeled data has shown promise in improving segme... 详细信息
来源: 评论
Deciphering Faces: Enhancing Emotion Detection with Machine Learning Techniques
Deciphering Faces: Enhancing Emotion Detection with Machine ...
收藏 引用
International Conference on Emerging Technologies, ICET
作者: Muhammad Haseeb Ishaq Rafay Mustafa Usama Arshad Zain ul Abideen Raja Hashim Ali Abdullah Habib Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan BCMaterials Basque Center for Materials Applications & Nanostructure Leioa Basque Country Spain Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany
Facial emotion detection holds significant relevance across various domains, from psychology and marketing to education and security. Despite its importance, prevalent techniques often grapple with issues like low pre...
来源: 评论
Malware Attacks Detection in IoT Using Recurrent Neural Network(RNN)
收藏 引用
Intelligent Automation & Soft Computing 2024年 第2期39卷 135-155页
作者: Abeer Abdullah Alsadhan Abdullah A.Al-Atawi Hanen karamti Abid Jameel Islam Zada Tan N.Nguyen Computer Science Department Imam Abdulrahman Bin Faisal UniversityDamam32232Saudi Arabia Department of Computer Science Applied CollegeUniversity of TabukTabuk47512Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Computer Sciences and Information Technology Hazara UniversityMansehraPakistan Faculty of Computing Department of Software EngineeringInternational Islamic UniversityIslamabadPakistan Department of Architectural Engineering Sejong UniversitySeoul05006Korea
IoT(Internet of Things)devices are being used more and more in a variety of businesses and for a variety of tasks,such as environmental data collection in both civilian and military *** are a desirable attack target f... 详细信息
来源: 评论
An Empirical Study on Low Code Programming using Traditional vs Large Language Model Support
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Yongkun Chen, Jiachi Bi, Tingting Grundy, John Wang, Yanlin Yu, Jianxing Chen, Ting Tang, Yutian Zheng, Zibin School of Software Engineering Sun Yat-sen University China The The University of Western Australia Australia The Faculty of Information Technology Monash University Australia The School of Artificial Intelligence Sun Yat-sen University China The School of Computer Science and Engineering University of Electronic Science and Technology of China China University of Glasgow United Kingdom
Low-code programming (LCP) refers to programming using models at higher levels of abstraction, resulting in less manual and more efficient programming, and reduced learning effort for amateur developers. Many LCP tool... 详细信息
来源: 评论
EEiF: Efficient Isolated Forest with e Branches for Anomaly Detection
EEiF: Efficient Isolated Forest with e Branches for Anomaly ...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Yifan Zhang Haolong Xiang Xuyun Zhang Xiaolong Xu Wei Fan Qin Zhang Lianyong Qi School of software Nanjing University of Information Science and Technology China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services China School of Computing Macquarie University Australia Uffield Department of Women's & Reproductive Health University of Oxford England College of Computer Science and Software Engineering Shenzhen University China Faculty of Science and Engineering University of Petroleum (East China) China
Anomaly detection is a popular research topic in Artificial Intelligence and has been widely applied in network security, financial fraud detection, and industrial equipment failure detection. Isolation forest based m... 详细信息
来源: 评论
The:ater 4uality 2nline 0onitoring 6ystem %ased on Wireless Sensor Network  13
The:ater 4uality 2nline 0onitoring 6ystem %ased on Wireless ...
收藏 引用
13th International Symposium on Computational Intelligence and Design, ISCID 2020
作者: Bai, Qiuchan Wu, Jiahao Jin, Chunxia Faculty of Automation Huaiyin Institute of Technology Huaian China Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huaian China
Due to the poor real-time performance of water quality monitoring, secondary pollution, high cost and other issues, this paper proposes to use wireless sensor network technology to design a water quality monitoring sy... 详细信息
来源: 评论
Cloud computing methods for leaking detection of halogen pipeline based on distributed terminals
Cloud computing methods for leaking detection of halogen pip...
收藏 引用
2020 International Conference on Robots and Intelligent Systems, ICRIS 2020
作者: Xu, Min Zhao, Jianyang Ye, Qiwei Ding, Weihong Zhu, Xiaoqi Zhang, Qin Huaiyin Institute of Technology Huaian Faculty of Automation China Huaiyin Institute of Technology Huaian Faculty of Computer and Software Engineering China
In order to ensure the safe transmission of the brine pipeline, this paper designs a leakage detection terminal based on STM32F7. This terminal uses GPS to added time stamps to the collected data. And each distributed... 详细信息
来源: 评论
7He monitoring system of aquaculture environment  13
7He monitoring system of aquaculture environment
收藏 引用
13th International Symposium on Computational Intelligence and Design, ISCID 2020
作者: Jin, Chunxia Bai, Qiuchan Faculty of Computer and Software Engineering Huaiyin Institute of Technology Huaian China Faculty of Automation Huaiyin Institute of Technology Huaian China
According to the needs of the aquaculture industry, this article proposes to design an aquaculture environment monitoring system for collecting temperature, PH, and dissolved oxygen parameters that affect fishery wate... 详细信息
来源: 评论
The YOLOv8 Edge: Harnessing Custom Datasets for Superior Real-Time Detection
The YOLOv8 Edge: Harnessing Custom Datasets for Superior Rea...
收藏 引用
International Conference on Emerging Technologies, ICET
作者: Tafreed Ahmed Ahmad Maaz Danyaal Mahmood Zain ul Abideen Usama Arshad Raja Hashim Ali Faculty of Computer Science & Engineering GIK Institute of Engg. Sciences & Technology Topi Pakistan BCMaterials Basque Center for Materials Applications & Nanostructure Leioa Basque Country Spain Dept. of Technology & Software Engineering University of Europe for Applied Sciences Berlin Germany
YOLO has become a central real-time object detection system for robotics, driverless cars, and video monitoring applications. Developing a custom object detection solution that can detect specific objects in real-time...
来源: 评论
Correction: Agile meets quantum: a novel genetic algorithm model for predicting the success of quantum software development project
收藏 引用
Automated software engineering 2024年 第1期32卷 1-11页
作者: Khan, Arif Ali Akbar, Muhammad Azeem Lahtinen, Valtteri Paavola, Marko Niazi, Mahmood Alatawi, Mohammed Naif Alotaibi, Shoayee Dlaim M3S Empirical Software Engineering Research Unit University of Oulu Oulu Finland Software Engineering Department Lappeenranta-Lahti University of Technology Lappeenranta Finland Quanscient Oy Tampere Finland VTT Technical Research Ctr of Finland Ltd Oulu Finland Department of Information and Computer Science King Fahd University of Petroleum and Minerals Dhahran Saudi Arabia Interdisciplinary Research Centre for Intelligent Secure Systems King Fahd University of Petroleum and Minerals Dhahran Saudi Arabia Information Technology Department Faculty of Computers and Information Technology University of Tabuk Tabuk Saudi Arabia Department of Artificial Intelligence and Data Science College of Computer Science and Engineering University of Hail Hail Saudi Arabia
来源: 评论