咨询与建议

限定检索结果

文献类型

  • 3,687 篇 会议
  • 2,811 篇 期刊文献
  • 167 册 图书

馆藏范围

  • 6,665 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,101 篇 工学
    • 2,955 篇 计算机科学与技术...
    • 2,413 篇 软件工程
    • 886 篇 信息与通信工程
    • 704 篇 控制科学与工程
    • 497 篇 电气工程
    • 480 篇 生物工程
    • 386 篇 电子科学与技术(可...
    • 359 篇 生物医学工程(可授...
    • 320 篇 机械工程
    • 266 篇 光学工程
    • 188 篇 动力工程及工程热...
    • 175 篇 仪器科学与技术
    • 174 篇 安全科学与工程
    • 158 篇 化学工程与技术
    • 147 篇 交通运输工程
  • 2,156 篇 理学
    • 1,094 篇 数学
    • 576 篇 生物学
    • 537 篇 物理学
    • 376 篇 统计学(可授理学、...
    • 313 篇 系统科学
    • 200 篇 化学
  • 1,202 篇 管理学
    • 828 篇 管理科学与工程(可...
    • 421 篇 图书情报与档案管...
    • 409 篇 工商管理
  • 435 篇 医学
    • 381 篇 临床医学
    • 323 篇 基础医学(可授医学...
    • 179 篇 公共卫生与预防医...
    • 170 篇 药学(可授医学、理...
  • 218 篇 法学
    • 173 篇 社会学
  • 148 篇 经济学
    • 147 篇 应用经济学
  • 115 篇 教育学
  • 70 篇 农学
  • 25 篇 文学
  • 24 篇 军事学
  • 12 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 214 篇 computer science
  • 185 篇 machine learning
  • 182 篇 deep learning
  • 149 篇 artificial intel...
  • 130 篇 software enginee...
  • 128 篇 accuracy
  • 115 篇 computational mo...
  • 113 篇 feature extracti...
  • 107 篇 internet of thin...
  • 96 篇 data mining
  • 94 篇 training
  • 87 篇 information syst...
  • 85 篇 wireless sensor ...
  • 80 篇 optimization
  • 75 篇 laboratories
  • 75 篇 predictive model...
  • 71 篇 support vector m...
  • 71 篇 cloud computing
  • 67 篇 computer archite...
  • 67 篇 convolutional ne...

机构

  • 44 篇 department of la...
  • 36 篇 sri lanka instit...
  • 35 篇 college of compu...
  • 34 篇 department of co...
  • 31 篇 graduate school ...
  • 27 篇 department of co...
  • 27 篇 concordia instit...
  • 26 篇 school of comput...
  • 25 篇 sri lanka instit...
  • 24 篇 computer science...
  • 24 篇 department of co...
  • 23 篇 institute of inf...
  • 22 篇 department of in...
  • 22 篇 state key labora...
  • 21 篇 department of el...
  • 21 篇 state key labora...
  • 19 篇 department of co...
  • 19 篇 ieee
  • 19 篇 concordia instit...
  • 19 篇 department of co...

作者

  • 63 篇 leonard barolli
  • 49 篇 arjan durresi
  • 42 篇 fatos xhafa
  • 36 篇 bentahar jamal
  • 29 篇 niyato dusit
  • 22 篇 el-sayed m.el-ke...
  • 22 篇 fan guisheng
  • 21 篇 akio koyama
  • 21 篇 ismail leila
  • 21 篇 mohammad s. obai...
  • 21 篇 keshta ismail
  • 20 篇 pedrycz witold
  • 19 篇 tao yang
  • 18 篇 abdelaziz a.abde...
  • 18 篇 choo kim-kwang r...
  • 17 篇 soni mukesh
  • 17 篇 hayashi eiji
  • 16 篇 mengchu zhou
  • 16 篇 gjergji mino
  • 16 篇 yu huiqun

语言

  • 6,338 篇 英文
  • 271 篇 其他
  • 61 篇 中文
  • 7 篇 日文
  • 1 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Software Engineering Department of Computer Science and Information Systems"
6665 条 记 录,以下是251-260 订阅
排序:
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4615-4630页
作者: Erssa Arif Syed Khuram Shahzad Muhammad Waseem Iqbal Muhammad Arfan Jaffar Abdullah S.Alshahrani Ahmed Alghamdi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Faculty of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword... 详细信息
来源: 评论
The influence of food bloggers toward consumer’s attitude in restaurant selection: a multi-objective metaheuristic approach
收藏 引用
Soft Computing 2025年 1-27页
作者: Tunga, Harinandan Pal, Surjendu Kar, Samarjit Giri, Debasis Bausys, Romualdas Department of Computer Science and Engineering RCC Institute of Information Technology Kolkata India Department of Mathematics National Institute of Technology Durgapur India Department of Information Technology Maulana Abul Kalamazad University of Technology Kolkata India Department of Graphical Systems Vilnius Gediminas Technical University Vilnius Lithuania
Restaurant selection by a consumer is a challenging task. The main problem is the proper optimization of ratings by food bloggers and the cost of food in the restaurant. In this paper, we propose an approach for a res... 详细信息
来源: 评论
Integrated Leaf Disease Recognition Across Diverse Crops through Transfer Learning  5
Integrated Leaf Disease Recognition Across Diverse Crops thr...
收藏 引用
5th International Conference on Innovative Data Communication Technologies and Application, ICIDCA 2024
作者: Tambe, Utkarsh Yashwant Shanthini, A. Hsiung, Pao-Ann Department of Data Science and Business Systems SRM Institute of Science and Technology Kattankulathur Chennai603203 India Department of Computer Science and Information Engineering National Chung Cheng University Chiayi621301 Taiwan
Global food security is seriously threatened by plant diseases and can cause severe economic losses to farmers. Automated detection of plant diseases using computer vision and machine learning techniques has become a ... 详细信息
来源: 评论
Human Age Prediction Based on Brain MRI Using Density-Based Regression
Human Age Prediction Based on Brain MRI Using Density-Based ...
收藏 引用
2023 IEEE International Conference on Industrial Technology, ICIT 2023
作者: Bregu, Ornela Zamzami, Nuha Bouguila, Nizar Concordia Institute for Information Systems Engineering Concordia University Montreal Canada College of Computer Science and Engineering University of Jeddah Department of Computer Science and Ai Jeddah Saudi Arabia
In this paper, we have applied a density-based regression technique to predict the age of a human brain based on Magnetic Resonance Images. We propose four different multivariate discrete distributions to accommodate ... 详细信息
来源: 评论
Suitable is the Best: Task-Oriented Knowledge Fusion in Vulnerability Detection  38
Suitable is the Best: Task-Oriented Knowledge Fusion in Vuln...
收藏 引用
38th Conference on Neural information Processing systems, NeurIPS 2024
作者: Wang, Jingjing Huang, Minhuan Nie, Yuanpin Li, Xiang Du, Qianjin Kong, Wei Deng, Huan Kuang, Xiaohui Institute of Systems Engineering Academy of Military Sciences PLA China Department of Computer Science and Technology Tsinghua University China School of Information Science and Engineering Zhejiang Sci-Tech University China
Deep learning technologies have demonstrated remarkable performance in vulnerability detection. Existing works primarily adopt a uniform and consistent feature learning pattern across the entire target set. While desi...
来源: 评论
A Comparison of Different Optimization Techniques in AlexNet for Plant Disease Classification: SGD, Adadelta, ASGD and Adagrad  5
A Comparison of Different Optimization Techniques in AlexNet...
收藏 引用
5th International Conference on Smart Electronics and Communication, ICOSEC 2024
作者: Ponnila, P. Bazila Banu, A. Bannari Amman Institute of Technology Department of Information Technology Erode Tamilnadu Sathyamangalam India Kpr Institute of Engineering and Technology Department of Computer Science and Business Systems Tamilnadu Coimbatore India
Plant diseases are a biggest challenge for the farmers. Agriculture relies heavily on its production, and diagnosis of plant disease in an accurate manner will help in identification of the appropriate disease. If cor... 详细信息
来源: 评论
PLAME: Piecewise-Linear Approximate Measure for Additive Kernel SVM (Extended abstract)  40
PLAME: Piecewise-Linear Approximate Measure for Additive Ker...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Chan, Tsz Nam Li, Zhe Leong Hou, U. Cheng, Reynold Shenzhen University Department of Computer Science and Software Engineering China Alibaba Cloud University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science China The University of Hong Kong Department of Computer Science and Musketeers Foundation Institute of Data Science Hong Kong
Additive Kernel SVM has been extensively used in many applications, including human activity detection and pedestrian detection. Since training an additive kernel SVM model is very time-consuming, which is not scalabl... 详细信息
来源: 评论
Secure Consumer-Centric Demand Response Management in Resilient Smart Grid as Industry 5.0 Application with Blockchain-Based Authentication
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期70卷 1370-1379页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Saleem, Muhammad Asad Omar, Marwan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan Illinois Institute of Technology Information Technology and Management ChicagoIL60616 United States
The development of the industrial Internet of Things and smart grid networks has emphasized the importance of secure smart grid communication for the future of electric power transmission. However, the current deploym... 详细信息
来源: 评论
Secure Energy Efficiency for ARIS Networks with Deep Learning: Active Beamforming and Position Optimization
收藏 引用
IEEE Transactions on Wireless Communications 2025年 第6期24卷 5282-5296页
作者: Wang, Dawei Wang, Zijun Zhao, Hongbo Zhou, Fuhui Alfarraj, Osama Yang, Weichao Mumtaz, Shahid Leung, Victor C. M. Northwestern Polytechnical University School of Electronics and Information Shaanxi Xi'an710072 China Beihang University School of Electronic and Information Engineering Beijing100191 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing210000 China King Saud University Community College Computer Science Department Riyadh11437 Saudi Arabia Nottingham Trent University Department of Computer Science United Kingdom Shenzhen MSU-BIT University Artificial Intelligence Research Institute Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen528060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Incorporating an active reconfigurable intelligent surface on an unmanned aerial vehicle (UAV), denoted as an aerial reconfigurable intelligent surface (ARIS), introduces a novel dimension for secure transmissions. Gi... 详细信息
来源: 评论
Intrusion Detection Mechanism Using Deep Learning  5
Intrusion Detection Mechanism Using Deep Learning
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent systems, ICICNIS 2024
作者: Ananthi, P. Nirmaladevi, K. Naveen Kumar, S. Kongu Engineering College Department of Computer Technology-PG Tamilnadu Erode638060 India Madanapalle Institute of Technology & Science Department of Computer Applications India M.Sc Software Systems Kongu Engineering College Erode India
In today's connected and data-driven world, networks and digital systems need to be protected from malicious attacks. The effectiveness of conventional Intrusion Detection systems (IDS) in recognizing and impeding... 详细信息
来源: 评论