咨询与建议

限定检索结果

文献类型

  • 5,677 篇 会议
  • 3,599 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,388 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,085 篇 工学
    • 4,762 篇 计算机科学与技术...
    • 3,949 篇 软件工程
    • 1,322 篇 信息与通信工程
    • 717 篇 控制科学与工程
    • 689 篇 生物工程
    • 530 篇 电气工程
    • 416 篇 机械工程
    • 397 篇 电子科学与技术(可...
    • 381 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 233 篇 动力工程及工程热...
    • 209 篇 化学工程与技术
    • 204 篇 安全科学与工程
    • 201 篇 仪器科学与技术
    • 197 篇 网络空间安全
    • 170 篇 建筑学
  • 2,786 篇 理学
    • 1,564 篇 数学
    • 758 篇 生物学
    • 612 篇 物理学
    • 468 篇 统计学(可授理学、...
    • 307 篇 系统科学
    • 222 篇 化学
  • 1,887 篇 管理学
    • 1,160 篇 管理科学与工程(可...
    • 797 篇 图书情报与档案管...
    • 511 篇 工商管理
  • 392 篇 医学
    • 333 篇 临床医学
    • 301 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
  • 320 篇 法学
    • 242 篇 社会学
  • 199 篇 经济学
    • 197 篇 应用经济学
  • 172 篇 教育学
  • 90 篇 农学
  • 38 篇 军事学
  • 37 篇 文学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 241 篇 software enginee...
  • 200 篇 deep learning
  • 198 篇 feature extracti...
  • 187 篇 computational mo...
  • 186 篇 machine learning
  • 163 篇 data mining
  • 150 篇 semantics
  • 146 篇 training
  • 138 篇 cloud computing
  • 132 篇 software
  • 131 篇 accuracy
  • 128 篇 internet of thin...
  • 122 篇 authentication
  • 121 篇 optimization
  • 117 篇 predictive model...
  • 106 篇 artificial intel...
  • 105 篇 security
  • 102 篇 servers
  • 101 篇 educational inst...

机构

  • 301 篇 college of compu...
  • 272 篇 school of inform...
  • 268 篇 school of comput...
  • 145 篇 school of comput...
  • 115 篇 state key labora...
  • 89 篇 school of inform...
  • 88 篇 school of softwa...
  • 57 篇 school of comput...
  • 55 篇 shandong provinc...
  • 46 篇 school of softwa...
  • 43 篇 college of compu...
  • 43 篇 shandong provinc...
  • 42 篇 sri lanka instit...
  • 41 篇 college of infor...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of so...
  • 36 篇 university of el...
  • 36 篇 state key labora...

作者

  • 52 篇 shen linlin
  • 38 篇 xu xiaolong
  • 35 篇 sun xingming
  • 34 篇 qi lianyong
  • 34 篇 ismail leila
  • 31 篇 tao dacheng
  • 31 篇 mu yi
  • 29 篇 mohammad s. obai...
  • 28 篇 huang min
  • 27 篇 susilo willy
  • 26 篇 qi liu
  • 24 篇 shen jian
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 22 篇 liu yang
  • 22 篇 zhang zhao
  • 22 篇 fan guisheng
  • 20 篇 lu dianjie
  • 20 篇 wang wei
  • 19 篇 zhi-hui wang

语言

  • 8,329 篇 英文
  • 931 篇 其他
  • 152 篇 中文
  • 4 篇 德文
  • 3 篇 日文
  • 2 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9388 条 记 录,以下是461-470 订阅
排序:
A Stealthy Backdoor Attack Method Based on Generative Adversarial Networks  5
A Stealthy Backdoor Attack Method Based on Generative Advers...
收藏 引用
5th Asia-Pacific Conference on Image Processing, Electronics and computers, IPEC 2024
作者: Tan, Yayue Yu, Gao Zhang, Yaqi Tang, Yongqing Southwest University College of Computer and Information Science School of Software Chongqing China Payment core platform Ant Group Co. Ltd Department of Payment Platform Technology Chengdu China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu China
Deep neural networks have been widely and successfully applied to many critical tasks, such as image pattern recognition, natural language processing and autonomous driving, and large amounts of training data and incr... 详细信息
来源: 评论
Achieving Efficient and Accurate Segmentation for Autonomous Driving  9
Achieving Efficient and Accurate Segmentation for Autonomous...
收藏 引用
9th International Conference on Intelligent Informatics and BioMedical sciences, ICIIBMS 2024
作者: Ouyang, Ningkang Dong, Jie Han, Yi Zhao, ChenYu North China University of Water Resources and Electric Power School of Information Engineering Zhengzhou China Anyang Institute of Technology Engineering Department of Computer Science and Information Anyang China Zhengzhou Software Vocational and Technical College School of Artificial Intelligence Zhengzhou China
Autonomous driving technology, as a mainstream trend in today's technological development, holds significant commercial value. Semantic segmentation, a core technology in this field, faces challenges with current ... 详细信息
来源: 评论
A PSO Improved with Imbalanced Mutation and Task Rescheduling for Task Offloading in End-Edge-Cloud Computing
收藏 引用
computer Systems science & engineering 2023年 第11期47卷 2259-2274页
作者: Kaili Shao Hui Fu Ying Song Bo Wang Faculty of Engineering Huanghe Science and Technology UniversityZhengzhou 450003China Computer School Beijing Information Science and Technology UniversityBeijing100192China Software Engineering College Zhengzhou University of Light IndustryZhengzhou450001China
To serve various tasks requested by various end devices with different requirements,end-edge-cloud(E2C)has attracted more and more attention from specialists in both academia and industry,by combining both benefits of... 详细信息
来源: 评论
Optimal Resource Allocation Method for Device-to-Device Communication in 5G Networks
收藏 引用
computers, Materials & Continua 2022年 第4期71卷 1-15页
作者: Fahd N.Al-Wesabi Imran Khan Saleem Latteef Mohammed Huda Farooq Jameel Mohammad Alamgeer Ali M.Al-Sharafi Byung Seo Kim Department of Computer Science King Khalid UniversityMuhayel AseerKSA Faculty of Computer and IT Sana’a UniversityYemen Department of Electrical Engineering University of Engineering and TechnologyPeshawarPakistan Department of Medical Instrumentation Techniques Engineering Electrical Engineering Technical CollegeMiddle Technical UniversityBaghdad10013Iraq Department of Information Systems King Khalid UniversityMayahel AseerKSA Department of Computer Science College of Computers and Information TechnologyUniversity of BishaKSA Department of Software and Communications Engineering Hongik UniversityKorea
With the rapid development of the next-generation mobile network,the number of terminal devices and applications is growing ***,how to obtain a higher data rate,wider network coverage and higher resource utilization i... 详细信息
来源: 评论
An Efficient Classification Techniques for Brain Tumor Using Features Extraction and Statistic Methods, with Machine Learning Algorithms
An Efficient Classification Techniques for Brain Tumor Using...
收藏 引用
作者: Badshah, Shah Hussain Farhatullah khan, Gul Zaman Hassan, Muhammad Abul Junaid, Hazrat Sohail, Muhammad Mahbob, Muhammad Awais Ahamad, Izaz Ullah, Nadeem Department of Computing and Technology Abasyn University Peshawar Pakistan School of Automation China University of Geosciences Wuhan430074 China Department of Computer Software Engineering University of Engineering and Technology Mardan Pakistan Department of Computer Science and Information Technology University of Malakand Dir Lower Pakistan Department of Computer Science Bahria University Islamabad Pakistan Department of Computer Science University of Engineering and Technology Taxila Pakistan Department of Information Engineering and Computer Science University of Trento Trento38122 Italy
Today, brain tumor is a very dangerous disease that can even cause death. There are many ways to classify Brain MRI images of tumors. Various aspects of current research have limitations;some methods are accurate but ... 详细信息
来源: 评论
Recognition of Urdu Handwritten Alphabet Using Convolutional Neural Network (CNN)
收藏 引用
computers, Materials & Continua 2022年 第11期73卷 2967-2984页
作者: Gulzar Ahmed Tahir Alyas Muhammad Waseem Iqbal Muhammad Usman Ashraf Ahmed Mohammed Alghamdi Adel A.Bahaddad Khalid Ali Almarhabi Department of Computer Science University of South AsiaLahore54000Pakistan Department of Computer Science Lahore Garrison UniversityLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Department of Computer Science GC Women UniversitySialkot53310Pakistan Department of Software Engineering College of Computer Science and EngineeringUniversity of Jeddah21493Saudi Arabia Department of Information System Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Computer Science College of Computing in Al-QunfudahUmm Al-Qura UniversityMakkah24381Saudi Arabia
Handwritten character recognition systems are used in every field of life nowadays,including shopping malls,banks,educational institutes,*** is the national language of Pakistan,and it is the fourth spoken language in... 详细信息
来源: 评论
Optimization of Interactive Videos Empowered the Experience of Learning Management System
收藏 引用
computer Systems science & engineering 2023年 第7期46卷 1021-1038页
作者: Muhammad Akram Muhammad Waseem Iqbal M.Usman Ashraf Erssa Arif Khalid Alsubhi Hani Moaiteq Aljahdali Department of Computer Science Superior University Lahore54000Pakistan Department of Software Engineering Superior University Lahore54000Pakistan Department of Computer Science GC Women University SialkotPakistan Department of Computer Science King Abdulaziz UniversityJeddahSaudi Arabia Faculty of Computing and Information Technology King Abdulaziz UniversityJeddahSaudi Arabia
The Learning management system(LMS)is now being used for uploading educational content in both distance and blended *** platform has two types of users:the educators who upload the content,and the students who have to... 详细信息
来源: 评论
Stock Price Prediction using CuDNNLSTM and multiple CNN layers
Stock Price Prediction using CuDNNLSTM and multiple CNN laye...
收藏 引用
2023 IEEE International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2023
作者: Kanwal, Anika Chandrasekaran, Siva Akhunzada, Adnan Swinburne University of Technology Department of Computer Science and Software Engineering Melbourne Australia University of Doha for Science and Technology Department of Computing and Information Technology Doha Qatar
Academic and financial sectors are interested in research areas that focus on understanding the patterns of financial activities and predicting their future changes. The daily movement of financial data involves compl... 详细信息
来源: 评论
Insider Attack Detection Using Deep Belief Neural Network in Cloud Computing
收藏 引用
computer Systems science & engineering 2022年 第5期41卷 479-492页
作者: A.S.Anakath R.Kannadasan Niju P.Joseph P.Boominathan G.R.Sreekanth School of Computing E.G.S.Pillay Engineering CollegeNagapattinam611002TamilnaduIndia Department of Software Systems School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014TamilnaduIndia Department of Computer Science CHRIST(Deemed to be University)Bengaluru560029India Department of Information Security School of Computer Science and Engineering(SCOPE)Vellore Institute of Technology UniversityVellore632014TamilnaduIndia Department of Computer Science and Engineering Kongu Engineering CollegeErode638060TamilnaduIndia
Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information *** use of cloud computing has realized the rapid increase of infor... 详细信息
来源: 评论
Network Coverage Improvement during Natural Disaster using Self-Organizing Maps
Network Coverage Improvement during Natural Disaster using S...
收藏 引用
2023 International Conference on Electrical, computer, Communications and Mechatronics engineering, ICECCME 2023
作者: Hoang, Nam Devabhakthini, Prathyusha Shukla, Raj Mani Bhunia, Suman Miami University Department of Computer Science and Software Engineering OxfordOH United States Anglia Ruskin University Computing and Information Science Cambridge United Kingdom
This paper presents an emergency response management system to tackle the problem of the absence of network connectivity during the time of a natural disaster. Network connectivity is often enabled by the base station... 详细信息
来源: 评论