咨询与建议

限定检索结果

文献类型

  • 3,717 篇 会议
  • 2,852 篇 期刊文献
  • 167 册 图书

馆藏范围

  • 6,736 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,171 篇 工学
    • 3,002 篇 计算机科学与技术...
    • 2,452 篇 软件工程
    • 894 篇 信息与通信工程
    • 716 篇 控制科学与工程
    • 508 篇 电气工程
    • 484 篇 生物工程
    • 395 篇 电子科学与技术(可...
    • 363 篇 生物医学工程(可授...
    • 325 篇 机械工程
    • 275 篇 光学工程
    • 190 篇 动力工程及工程热...
    • 178 篇 安全科学与工程
    • 175 篇 仪器科学与技术
    • 163 篇 化学工程与技术
    • 148 篇 交通运输工程
  • 2,179 篇 理学
    • 1,099 篇 数学
    • 582 篇 生物学
    • 545 篇 物理学
    • 380 篇 统计学(可授理学、...
    • 314 篇 系统科学
    • 204 篇 化学
  • 1,215 篇 管理学
    • 838 篇 管理科学与工程(可...
    • 423 篇 图书情报与档案管...
    • 416 篇 工商管理
  • 444 篇 医学
    • 389 篇 临床医学
    • 328 篇 基础医学(可授医学...
    • 186 篇 公共卫生与预防医...
    • 170 篇 药学(可授医学、理...
  • 223 篇 法学
    • 177 篇 社会学
  • 149 篇 经济学
    • 148 篇 应用经济学
  • 119 篇 教育学
  • 69 篇 农学
  • 24 篇 文学
  • 24 篇 军事学
  • 12 篇 艺术学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 214 篇 computer science
  • 187 篇 deep learning
  • 187 篇 machine learning
  • 147 篇 artificial intel...
  • 131 篇 accuracy
  • 130 篇 software enginee...
  • 115 篇 feature extracti...
  • 114 篇 computational mo...
  • 107 篇 internet of thin...
  • 96 篇 data mining
  • 95 篇 training
  • 87 篇 information syst...
  • 86 篇 wireless sensor ...
  • 80 篇 optimization
  • 78 篇 predictive model...
  • 75 篇 laboratories
  • 71 篇 support vector m...
  • 71 篇 cloud computing
  • 69 篇 convolutional ne...
  • 67 篇 computer archite...

机构

  • 44 篇 department of la...
  • 37 篇 college of compu...
  • 36 篇 sri lanka instit...
  • 34 篇 department of co...
  • 31 篇 graduate school ...
  • 27 篇 school of comput...
  • 27 篇 department of co...
  • 27 篇 concordia instit...
  • 25 篇 sri lanka instit...
  • 25 篇 department of co...
  • 23 篇 institute of inf...
  • 23 篇 department of in...
  • 22 篇 computer science...
  • 22 篇 state key labora...
  • 21 篇 department of el...
  • 21 篇 state key labora...
  • 19 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 ieee
  • 19 篇 concordia instit...

作者

  • 63 篇 leonard barolli
  • 49 篇 arjan durresi
  • 42 篇 fatos xhafa
  • 36 篇 bentahar jamal
  • 29 篇 niyato dusit
  • 22 篇 el-sayed m.el-ke...
  • 22 篇 fan guisheng
  • 21 篇 pedrycz witold
  • 21 篇 akio koyama
  • 21 篇 ismail leila
  • 21 篇 mohammad s. obai...
  • 21 篇 keshta ismail
  • 19 篇 soni mukesh
  • 19 篇 tao yang
  • 18 篇 abdelaziz a.abde...
  • 18 篇 choo kim-kwang r...
  • 17 篇 hayashi eiji
  • 16 篇 mengchu zhou
  • 16 篇 johansson karl h...
  • 16 篇 gjergji mino

语言

  • 6,278 篇 英文
  • 402 篇 其他
  • 61 篇 中文
  • 7 篇 日文
  • 2 篇 德文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Software Engineering Department of Computer Science and Information Systems"
6736 条 记 录,以下是511-520 订阅
排序:
Map Building of Indoor Environment with Sensors using Neural Network
Map Building of Indoor Environment with Sensors using Neural...
收藏 引用
2023 Winter Summit on Smart Computing and Networks, WiSSCoN 2023
作者: Latha Mary, S Angel Ulagapriya, K. Poonguzhali, A. Menaha, R. David, Beaulah Priyadharshini, T.R. Sri Eshwar College of Engineering Department of Computer Science and Business Systems Coimbatore India Vels Institute of Science Technology and Advanced Studies Department of Computer Science and Engineering Chennai India Sri Sairam College of Engineering Department of Electronics and Communication Engineering Bangalore India Sri Eshwar College of Engineering Department of Information Technology Coimbatore India Hindusthan College of Engineering and Technology Department of Information Technology Coimbatore India
The necessity of a blueprint of a building structure is a mandatory requirement for any reconnaissance or rescue operations. In our project, we build a modular system combining sensors related to sonar, laser, micro-w... 详细信息
来源: 评论
Brain Tumor:Hybrid Feature Extraction Based on UNet and 3DCNN
收藏 引用
computer systems science & engineering 2023年 第5期45卷 2093-2109页
作者: Sureshkumar Rajagopal Tamilvizhi Thanarajan Youseef Alotaibi Saleh Alghamdi Center for System Design Chennai Institute of TechnologyChennai600069India Department of Information Technology Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering CollegeChennai600062India Department of Computer Science College of Computer and Information SystemsUmm Al-Qura UniversityMakkah21955Saudi Arabia Department of Information Technology College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia
Automated segmentation of brain tumors using Magnetic Resonance Imaging(MRI)data is critical in the analysis and monitoring of disease *** a result,gliomas are aggressive and diverse tumors that may be split into intr... 详细信息
来源: 评论
Mobile Medical Assistant System for Laboratory Report Analysis and Medical Drug Identification  4
Mobile Medical Assistant System for Laboratory Report Analys...
收藏 引用
4th International Conference on Advancements in Computing, ICAC 2022
作者: Warnakulasuriya, Deshani Dewangi, Tharushi Sewwandi, Navodya Rathnayake, Minoli Kodagoda, Nuwan Suriyawansha, Kushanra Department of Computer Science and Software Engineering Faculty of Computing Sri Lanka Institute of Information Technology Malabe Sri Lanka
It is quite common for medical drugs and prescriptions to be misidentified by hospitals and after drugs are being dispensed to the patients. Misidentification of medical drugs is more common among elderly and visually... 详细信息
来源: 评论
Performance Assessment of Multi-Controller in software Defined Network  4
Performance Assessment of Multi-Controller in Software Defin...
收藏 引用
4th IEEE International Conference on Computing, Communication, and Intelligent systems, ICCCIS 2023
作者: Jaiswal, Ankita Patra, Sudhansu Shekhar Dash, Bibhuti Bhusan Barik, Lalbihari Pandey, Trilok Nath Mishra, Manoj Ranjan School of Computer Engineering KIlT Deemed to Be University Bhubaneswar India King Abdulaziz University Faculty of Computing and Information Technology in Rabigh Department of Information Systems Saudi Arabia School of Computer Science and Engineering Vellore Institute of Technology Chennai India
In a network design, the control plane and the data plane are separated by the architectural concept of software defined networking (SDN). A centralised controller that serves as the only point of control for the whol... 详细信息
来源: 评论
Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 6061-6077页
作者: Muhammad Akram Muhammad Waseem Iqbal Syed Ashraf Ali Muhammad Usman Ashraf Khalid Alsubhi Hani Moaiteq Aljahdali Department of Computer Science Superior University Lahore54000Pakistan Department of Software Engineering Superior University Lahore54000Pakistan Department of Computer Science The Institute of Management Sciences(PAK-AIMS)Lahore54000Pakistan Department of Computer Science GC Women University SialkotPakistan Department of Computer Science King Abdulaziz UniversityJeddahSaudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia
In cipher algorithms,the encryption and decryption are based on the same *** are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwis... 详细信息
来源: 评论
Heavy-Traffic Optimal Size-and State-Aware Dispatching
收藏 引用
Performance Evaluation Review 2024年 第1期52卷 7-8页
作者: Xie, Runhan Grosof, Isaac Scully, Ziv Department of Industrial Engineering and Operations Research University of California Berkeley BerkeleyCA United States Carnegie Mellon University Computer Science Department PittsburghPA United States Georgia Institute of Technology School of Industrial and Systems Engineering AtlantaGA United States School of Operations Research and Information Engineering Cornell University IthacaNY United States
We study the problem of dispatching jobs to multiple FCFS (First-Come, First-Served) queues. We consider the case where the dispatcher is size-aware, meaning it learns the size (i.e. service time) of each job as it ar... 详细信息
来源: 评论
Designing low-diameter interconnection networks with multi-ported host-switch graphs
Designing low-diameter interconnection networks with multi-p...
收藏 引用
作者: Yasudo, Ryota Nakano, Koji Koibuchi, Michihiro Matsutani, Hiroki Amano, Hideharu Graduate School of Advanced Science and Engineering Hiroshima University Hiroshima Japan Information Systems Architecture Science Research Division National Institute of Informatics Tokyo Japan Department of Information and Computer Science Keio University Yokohama Japan
A host-switch graph was originally proposed as a graph that represents a network topology of a computer systems with 1-port host computers and (Formula presented.) -port switches. It has been studied from both theoret... 详细信息
来源: 评论
CASKA-CRT: Chinese Remainder Theorem Empowered Certificateless Aggregate Signcryption Scheme with Key Agreement in IoVs
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 1-16页
作者: Hou, Yingzhe Cao, Yue Xiong, Hu Sun, Zhili Mumtaz, Shahid Tian, Daxin School of Cyber Science and Engineering Wuhan University Wuhan China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Institute of Communication Systems University of Surrey Guildford U.K Department of Applied Informatics Silesian University of Technology Akademicka Gliwice Poland State Key Laboratory of Vehicle-Infrastructure Integrated ITS the State Key Laboratory of Intelligent Transportation System and the School of Transportation Science and Engineering Beihang University Beijing China
To enhance the privacy of messages in Internet of Vehicles (IoVs), it is critical to preserve the communication security between Road Side Unit (RSU) and numerous vehicles. The primitive of signcryption is introduced ... 详细信息
来源: 评论
AI LipReader-Transcribing Speech from Lip Movements
AI LipReader-Transcribing Speech from Lip Movements
收藏 引用
Emerging Smart Computing and Informatics (ESCI), Conference on
作者: D Ajitha Disha Dutta Falguni Saha Parus Giri Rohan Kant Department of Software Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore Vellore India Department of Database Systems School of Computer Science and Engineering Vellore Institute of Technology Vellore India Department of Information Security School of Computer Science and Engineering Vellore Institute of Technology Vellore Vellore India
Lip Reading AI is a discipline that is rapidly changing and has numerous applications in security, accessibility and human-computer interaction. This paper proposes a model which combines Convolutional Neural Networks...
来源: 评论
GAA-Enhanced UNet++ Model for Brain Tumor Segmentation  2
GAA-Enhanced UNet++ Model for Brain Tumor Segmentation
收藏 引用
2nd IEEE International Conference on Networking and Communications, ICNWC 2024
作者: Manigandan, S.K. Ramya, D. Vishnukumar, A. Velmurugan, J. Muthu, V. Vigneshwaran, K. Vel Tech High Tech Dr. Rangarajan Dr. Sakunthala Engineering College Department of Information Technology Chennai India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Information Technology Chennai India Rajalakshmi Engineering College Department of Computer Science and Business Systems Chennai India Saveetha School of Engineering Department of Computer Science and Engineering Chennai India Panimalar Engineering College Department of AIML Chennai India
Advanced techniques in medical image segmentation often leverage deep learning methodologies. UNet and its variants plays a major role in image segmentation of medical images. UNet based networks have so many limitati... 详细信息
来源: 评论