咨询与建议

限定检索结果

文献类型

  • 5,677 篇 会议
  • 3,582 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,371 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,082 篇 工学
    • 4,759 篇 计算机科学与技术...
    • 3,947 篇 软件工程
    • 1,321 篇 信息与通信工程
    • 714 篇 控制科学与工程
    • 689 篇 生物工程
    • 531 篇 电气工程
    • 416 篇 机械工程
    • 398 篇 电子科学与技术(可...
    • 382 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 233 篇 动力工程及工程热...
    • 209 篇 化学工程与技术
    • 204 篇 安全科学与工程
    • 201 篇 仪器科学与技术
    • 196 篇 网络空间安全
    • 170 篇 建筑学
  • 2,786 篇 理学
    • 1,564 篇 数学
    • 758 篇 生物学
    • 612 篇 物理学
    • 468 篇 统计学(可授理学、...
    • 307 篇 系统科学
    • 222 篇 化学
  • 1,886 篇 管理学
    • 1,159 篇 管理科学与工程(可...
    • 797 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 391 篇 医学
    • 332 篇 临床医学
    • 301 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
  • 320 篇 法学
    • 242 篇 社会学
  • 196 篇 经济学
    • 196 篇 应用经济学
  • 172 篇 教育学
  • 90 篇 农学
  • 38 篇 军事学
  • 37 篇 文学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 240 篇 software enginee...
  • 200 篇 feature extracti...
  • 198 篇 deep learning
  • 189 篇 computational mo...
  • 186 篇 machine learning
  • 163 篇 data mining
  • 150 篇 semantics
  • 145 篇 training
  • 140 篇 cloud computing
  • 134 篇 software
  • 127 篇 internet of thin...
  • 127 篇 accuracy
  • 122 篇 authentication
  • 120 篇 optimization
  • 118 篇 predictive model...
  • 106 篇 security
  • 105 篇 artificial intel...
  • 102 篇 servers
  • 101 篇 educational inst...

机构

  • 301 篇 college of compu...
  • 272 篇 school of inform...
  • 268 篇 school of comput...
  • 145 篇 school of comput...
  • 113 篇 state key labora...
  • 91 篇 school of inform...
  • 88 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 57 篇 school of comput...
  • 46 篇 school of softwa...
  • 44 篇 sri lanka instit...
  • 42 篇 college of compu...
  • 41 篇 college of infor...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 39 篇 shandong provinc...
  • 38 篇 department of co...
  • 37 篇 department of so...
  • 37 篇 state key labora...
  • 37 篇 school of comput...

作者

  • 47 篇 shen linlin
  • 35 篇 sun xingming
  • 35 篇 mohammad s. obai...
  • 35 篇 xu xiaolong
  • 33 篇 qi lianyong
  • 33 篇 ismail leila
  • 32 篇 susilo willy
  • 31 篇 tao dacheng
  • 31 篇 mu yi
  • 27 篇 huang min
  • 26 篇 qi liu
  • 24 篇 shen jian
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 22 篇 liu yang
  • 22 篇 zhang zhao
  • 21 篇 fan guisheng
  • 20 篇 lu dianjie
  • 20 篇 wang wei
  • 19 篇 zhi-hui wang

语言

  • 8,315 篇 英文
  • 929 篇 其他
  • 151 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9371 条 记 录,以下是241-250 订阅
排序:
Forecasting Mental Stress Using Machine Learning Algorithms
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4945-4966页
作者: Elias Hossain Abdulwahab Alazeb Naif Almudawi Sultan Almakdi Mohammed Alshehri M.Gazi Golam Faruque Wahidur Rahman Department of Software Engineering Daffodil UniversityDhakaBangladesh Collage of Computer Science and Information System University of NajranNajranSaudi Arabia Department of Computer Science and Engineering Khwaja Yunus Ali UniversitySirajganj 6751Bangladesh
Depression is a crippling affliction and affects millions of individuals around the *** general,the physicians screen patients for mental health disorders on a regular basis and treat patients in collaboration with ps... 详细信息
来源: 评论
A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain
收藏 引用
IEEE Internet of Things Journal 2024年 第6期11卷 10325-10335页
作者: Yang, Ching-Nung Li, Peng Cheng, Hsiang-Han Kuo, Hsin-Chuan Lu, Ming-Chan Xiong, Lizhi National Dong Hwa University Department of Computer Science and Information Engineering Hualien97401 Taiwan North China Electric Power University Department of Mathematics and Physics Hebei Key Laboratory of Physics and Energy Technology Baoding071003 China Nanjing University of Information Science and Technology School of Computer and Software Nanjing210044 China
Secret sharing (SS) is a threshold technology that shares a secret value by generating and distributing n shares in the way that a set of any k shares can recover the secret. On the other hand, blockchain is a decentr... 详细信息
来源: 评论
Optimized digital watermarking: Harnessing the synergies of Schur matrix factorization, DCT, and DWT for superior image ownership proofing
收藏 引用
Multimedia Tools and Applications 2025年 第18期84卷 19817-19852页
作者: Al-Aiash, Issa Alquran, Rabee AlJamal, Mahmoud Alsarhan, Ayoub Aljaidi, Mohammad Al-Fraihat, Dimah Department of Information Technology Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology The Hashemite University Zarqa13133 Jordan Department of Computer Science Faculty of Information Technology Zarqa University Zarqa13110 Jordan Department of Software Engineering Faculty of Information Technology Isra University Amman11622 Jordan
The contemporary context of abundant digital dissemination inherently gives rise to the need for media protection and the clear identification of ownership rights. This paper responded to this nagging issue of unautho... 详细信息
来源: 评论
A Comparative Analysis of Query Generation Methods for IoT Middleware Evaluation  17
A Comparative Analysis of Query Generation Methods for IoT M...
收藏 引用
IEEE Congress on Cybermatics: 17th IEEE International Conference on Internet of Things, iThings 2024, 20th IEEE International Conference on Green Computing and Communications, GreenCom 2024, 17th IEEE International Conference on Cyber, Physical and Social Computing, CPSCom 2024, 10th IEEE International Conference on Smart Data, SmartData 2024
作者: De Silva, Ravindi Zaslavsky, Arkady Loke, Seng W. Jayaraman, Prem Prakash Deakin University School of Information Technology Melbourne Australia Swinburne University of Technology Department of Computer Science and Software Engineering Melbourne Australia
The rapid expansion of Internet of Things (IoT) applications necessitates the demand for efficient IoT middleware platforms, especially Context Management Platforms (CMPs) for accessing real-time contextual informatio... 详细信息
来源: 评论
Improving Fake News Detection with a Mixture of Experts: Leveraging Sentiment Analysis and Sarcasm Detection as Core Expert Models  6
Improving Fake News Detection with a Mixture of Experts: Lev...
收藏 引用
6th International Conference on Advancements in Computing, ICAC 2024
作者: Gunasekara, Tharindu Thihan, Disira Kodithuwakku, Sansika Dissanayake, Dinuka Fernando, Harinda Vidhanaarachchi, Samitha Sindhujan, Archchana Sri Lanka Institute of Information Technology Malabe Dept. of Software Engineering Sri Lanka Sri Lanka Institute of Information Technology Malabe Dept. of Computer Computer Systems Engineering Sri Lanka University of Surrey Dept. of Computer Science and Electronic Engineering United Kingdom
Fake news continues to proliferate, posing an increasing threat to public discourse. The paper proposes a framework of a Mixture of Experts, Sentiment Analysis, and Sarcasm Detection experts for improved fake news det... 详细信息
来源: 评论
Enhancing Communication Accessibility:UrSL-CNN Approach to Urdu Sign Language Translation for Hearing-Impaired Individuals
收藏 引用
computer Modeling in engineering & sciences 2024年 第10期141卷 689-711页
作者: Khushal Das Fazeel Abid Jawad Rasheed Kamlish Tunc Asuroglu Shtwai Alsubai Safeeullah Soomro Department of Computer Engineering Modeling Electronics and Systems EngineeringUniversity of CalabriaRende Cosenza87036Italy Department of Information Systems University of Management and TechnologyLahore54770Pakistan Department of Computer Engineering Istanbul Sabahattin Zaim UniversityIstanbul34303Turkey Department of Software Engineering Istanbul Nisantasi UniversityIstanbul34398Turkey Department of Computer Science COMSATS University IslamabadLahore CampusLahore54700Pakistan Faculty of Medicine and Health Technology Tampere UniversityTampere33720Finland Department of Computer Science College of Computer Engineering and Sciences in Al-KharjPrince Sattam Bin Abdulaziz UniversityP.O.Box 151Al-Kharj11942Saudi Arabia Second Department of Computer Science College of Engineering and ComputingGeorge Mason UniversityFairfaxVA 4418USA
Deaf people or people facing hearing issues can communicate using sign language(SL),a visual *** works based on rich source language have been proposed;however,the work using poor resource language is still *** other ... 详细信息
来源: 评论
Multi-Person Estimation Method Combining Interactive and Contextual information  5
Multi-Person Estimation Method Combining Interactive and Con...
收藏 引用
5th International Seminar on Artificial Intelligence, Networking and information Technology, AINIT 2024
作者: Chen, Zhuxiang Li, Shujie Jia, Wei School of Computer Science and Information Engineering Hefei University of Technology Hefei China School of Software Hefei University of Technology Hefei China
Multi-person pose estimation based on monocular cameras is one of the hot research topics in computer vision. Current monocular multi-person 3D pose estimation methods often treat individuals as independent entities f... 详细信息
来源: 评论
Dynamic defenses in cyber security:Techniques,methods and challenges Author links open overlay panel
收藏 引用
Digital Communications and Networks 2022年 第4期8卷 422-435页
作者: Yu Zheng Zheng Li Xiaolong Xu Qingzhan Zhao School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044JiangsuChina Key Laboratory for Novel Software Technology Nanjing UniversityNanjing210023JiangsuChina College of Information Science and Technology Shihezi University Geospatial Information Engineering Research CenterChina
Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human ***,security pr... 详细信息
来源: 评论
Proactive Caching at the Wireless Edge:A Novel Predictive User Popularity-Aware Approach
收藏 引用
computer Modeling in engineering & sciences 2024年 第8期140卷 1997-2017页
作者: Yunye Wan Peng Chen Yunni Xia Yong Ma Dongge Zhu Xu Wang Hui Liu Weiling Li Xianhua Niu Lei Xu Yumin Dong College of Computer Science Chongqing UniversityChongqing400044China School of Computer and Software Engineering Xihua UniversityChengdu610039China School of Computer and Information Engineering Jiangxi Normal UniversityNanchang330022China Electric Power Research Institute of State Grid Ningxia Electric Power Co. Ltd.Yinchuan750002China College of Mechanical and Vehicle Engineering Chongqing UniversityChongqing400030China School of Computer Science and Technology Beijing Institute of TechnologyBeijing100083China School of Computer Science and Technology Dongguan University of TechnologyDongguan523808China School of Emergency Management Xihua UniversityChengdu610039China College of Computer and Information Science Chongqing Normal UniversityChongqing401331China
Mobile Edge Computing(MEC)is a promising technology that provides on-demand computing and efficient storage services as close to end users as *** an MEC environment,servers are deployed closer to mobile terminals to e... 详细信息
来源: 评论
RGB-T object tracking with adaptive decision fusion  2
RGB-T object tracking with adaptive decision fusion
收藏 引用
2nd International Conference on Algorithms, Microchips, and Network Applications, AMNA 2023
作者: Bai, Yida Yang, Ming Department of Software Engineering College of Computer & Information Science Southwest University Chongqing400715 China Department of Computer Science College of Computer & Information Science Southwest University Chongqing400715 China
Visual object tracking is a traditional task in computer vision, which has developed with several decades. With the development of machine learning, correlation filter (CF) has been proposed with satisfying performanc... 详细信息
来源: 评论