咨询与建议

限定检索结果

文献类型

  • 5,663 篇 会议
  • 3,600 篇 期刊文献
  • 112 册 图书

馆藏范围

  • 9,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,114 篇 工学
    • 4,785 篇 计算机科学与技术...
    • 3,974 篇 软件工程
    • 1,329 篇 信息与通信工程
    • 720 篇 控制科学与工程
    • 689 篇 生物工程
    • 543 篇 电气工程
    • 419 篇 机械工程
    • 402 篇 电子科学与技术(可...
    • 382 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 233 篇 动力工程及工程热...
    • 209 篇 化学工程与技术
    • 203 篇 安全科学与工程
    • 200 篇 仪器科学与技术
    • 198 篇 网络空间安全
    • 172 篇 建筑学
  • 2,795 篇 理学
    • 1,567 篇 数学
    • 758 篇 生物学
    • 615 篇 物理学
    • 469 篇 统计学(可授理学、...
    • 307 篇 系统科学
    • 221 篇 化学
  • 1,896 篇 管理学
    • 1,166 篇 管理科学与工程(可...
    • 799 篇 图书情报与档案管...
    • 515 篇 工商管理
  • 392 篇 医学
    • 333 篇 临床医学
    • 301 篇 基础医学(可授医学...
    • 183 篇 公共卫生与预防医...
  • 321 篇 法学
    • 243 篇 社会学
  • 197 篇 经济学
    • 196 篇 应用经济学
  • 173 篇 教育学
  • 91 篇 农学
  • 38 篇 文学
  • 38 篇 军事学
  • 15 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 257 篇 computer science
  • 239 篇 software enginee...
  • 197 篇 deep learning
  • 196 篇 feature extracti...
  • 185 篇 computational mo...
  • 182 篇 machine learning
  • 162 篇 data mining
  • 149 篇 semantics
  • 145 篇 training
  • 136 篇 cloud computing
  • 130 篇 software
  • 127 篇 accuracy
  • 125 篇 internet of thin...
  • 121 篇 optimization
  • 119 篇 authentication
  • 116 篇 predictive model...
  • 107 篇 artificial intel...
  • 104 篇 security
  • 101 篇 educational inst...
  • 100 篇 servers

机构

  • 297 篇 college of compu...
  • 267 篇 school of comput...
  • 266 篇 school of inform...
  • 143 篇 school of comput...
  • 117 篇 state key labora...
  • 87 篇 school of softwa...
  • 84 篇 school of inform...
  • 55 篇 school of comput...
  • 52 篇 shandong provinc...
  • 46 篇 school of softwa...
  • 43 篇 college of compu...
  • 42 篇 sri lanka instit...
  • 42 篇 shandong provinc...
  • 41 篇 college of infor...
  • 40 篇 school of comput...
  • 39 篇 department of co...
  • 39 篇 department of co...
  • 37 篇 university of el...
  • 37 篇 department of so...
  • 36 篇 school of comput...

作者

  • 51 篇 shen linlin
  • 37 篇 xu xiaolong
  • 35 篇 sun xingming
  • 34 篇 qi lianyong
  • 34 篇 ismail leila
  • 31 篇 tao dacheng
  • 31 篇 mu yi
  • 29 篇 mohammad s. obai...
  • 29 篇 susilo willy
  • 28 篇 huang min
  • 25 篇 qi liu
  • 24 篇 shen jian
  • 23 篇 liu yang
  • 23 篇 wang guojun
  • 23 篇 jiacun wang
  • 22 篇 zhang zhao
  • 22 篇 fan guisheng
  • 21 篇 wang wei
  • 20 篇 lu dianjie
  • 20 篇 mahmood khalid

语言

  • 8,749 篇 英文
  • 494 篇 其他
  • 146 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Software Engineering LaboratoryDepartment of Computer Science and Information Engineering"
9375 条 记 录,以下是4861-4870 订阅
排序:
A Parallel Segmentation after Classification Algorithm of Multi-Spectral Image of K-Means of Deep Learning and Panchromatic Based On Wavelet
A Parallel Segmentation after Classification Algorithm of Mu...
收藏 引用
2019第十一届数字图像处理国际会议
作者: Jinxi Peng Yuanqi Su Xiaorong Xue Donghong Song Xiaoyong Xue Department of Computer Science and Technology & AI Xi'an JiaoTong University Department of AI & software Engineering South China institute of software Engineering Guangzhou University The School of Computer and Information Engineering Anyang Normal University The Middle School of Luonan County
[Purpose]To take the advantages of a variety of remote sensing data,the application of remote sensing image classification is a very important *** sensing image classification is large in computing capacity and time-c... 详细信息
来源: 评论
Modeling of Layered Supply Chain Network Considering Similarity
Modeling of Layered Supply Chain Network Considering Similar...
收藏 引用
第32届中国控制与决策会议
作者: Yi Zhang Yurong Song Guoping Jiang Bin Yu School of Computer Science Software and Network Space SecurityNanjing University of Posts and Telecommunications School of Automation Nanjing University of Posts and Telecommunications Jiangsu Engineering Lab for IOT Intelligent Robots(IOTRobot) Hengyang Key Laboratory of Information Secure and its application research
The supply chain network is a complex network with the risk of cascading *** study the cascading failure in it,an accurate supply chain network model needs to be *** this paper,we construct a layered supply chain netw... 详细信息
来源: 评论
Generating Reliable Friends via Adversarial Training to Improve Social Recommendation
Generating Reliable Friends via Adversarial Training to Impr...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Junliang Yu Min Gao Hongzhi Yin Jundong Li Chongming Gao Qinyong Wang School of Information Technology and Electrical Engineering The University of Queensland School of Big Data and Software Engineering Chongqing University Department of Electrical and Computer Engineering University of Virginia Department of Computer Science and School of Data Science University of Virginia
Most of the recent studies of social recommendation assume that people share similar preferences with their friends and the online social relations are helpful in improving traditional recommender systems. However, th...
来源: 评论
Density peaks based clustering for single-cell interpretation via multikernel learning
收藏 引用
Procedia computer science 2019年 147卷 71-76页
作者: Samina Kausar Rashid Mehmood Muhammad Shahid Iqbal Rongfang Bie Shujaat Ali Yasir Shabir School of Computer Engineering and Science Shanghai University Shanghai 200444 China Department of Software Engineering University of Kotli AJ & K Pakistan School of Computer Science and Technology Anhui University Hefei China College of Information Science and Technology Beijing Normal University Beijing 100875 China
The development in single-cell technology has enabled to quantify the high throughput gene expressions of individual cell, and it became possible to discover heterogeneity at cell level. To detect heterogeneity within... 详细信息
来源: 评论
Secure high capacity data hiding scheme based on reference matrix
收藏 引用
International Journal of Network Security 2019年 第6期21卷 918-929页
作者: Li, Xiao-Shuang Chang, Chin-Chen He, Ming-Xing Lin, Chia-Chen School of Computer and Software Engineering Xi Hua University Taichung433 Taiwan Department of Information Engineering and Computer Science Feng Chia University Taichung433 Taiwan Department of Computer Science and Information Management Providence University Taichung433 Taiwan
In this paper, a secure high-capacity data hiding scheme based on a reference matrix is proposed. With the help of the numbering reference matrix and a look-up table, each pixel pair of a cover image can conceal 6 sec... 详细信息
来源: 评论
An approach to deep learning service provision with elastic remote interfaces  5th
An approach to deep learning service provision with elastic ...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Sun, Mingxu Yang, Zhiyun Wu, Hao Liu, Qi Liu, Xiaodong School of Electrical Engineering University of Jinan Jinan China Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China School of Computing Edinburgh Napier University 10 Colinton Road EdinburghEH10 5DT United Kingdom
Deep learning has been widely applied for computer vision, natural language processing, and information retrieval etc. Using a deep learning framework can reduce learning curve of beginners facilitating them to get in... 详细信息
来源: 评论
CorrDetector: A framework for structural corrosion detection from drone images using ensemble deep learning
arXiv
收藏 引用
arXiv 2021年
作者: Mohammad Forkana, Abdur Rahim Kang, Yong-Bin Jayaraman, Prem Prakash Liao, Kewen Kaul, Rohit Morgan, Graham Ranjan, Rajiv Sinha, Samir Department of Computer Science and Software Engineering Swinburne University of Technology MelbourneVIC Australia Department of Media and Communication Swinburne University of Technology MelbourneVIC Australia Discipline of Information Technology Peter Faber Business School Australian Catholic University SydneyNSW Australia Newcastle University Newcastle upon TyneNE1 7RU United Kingdom Robonomics AI York Street SydneyNSW Australia
In this paper, we propose a new technique that applies automated image analysis in the area of structural corrosion monitoring and demonstrate improved efficacy compared to existing approaches. Structural corrosion mo... 详细信息
来源: 评论
Analysis of the Efficiency-Energy with Regression and Classification in Household Using K-NN  1
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Sun, Mingxu Liu, Xiaodong Mbonihankuye, Scholas School of Electrical Engineering University of Jinan Jinan China School of Computing Edinburgh Napier University 10 Colinton Road EdinburghEH10 5DT United Kingdom Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China
This paper aims to study energy consumption in a house. Home energy management system (HEMS) has become very important, because energy consumption of a residential sector accounts for a significant amount of total ene... 详细信息
来源: 评论
Cell quantization tool for anterior chamber OCT images
收藏 引用
Transactions of the Korean Institute of Electrical Engineers 2020年 第7期69卷 1073-1080页
作者: Lee, Yeongseop Kang, Taeseen Han, Yongseop Kim, Jinhyun Kim, Kyong Hoon Lee, Seongjin Dept. of Aerospace and Software Engineering Gyeongsang National University Korea Republic of Dept. of Informatics Gyeongsang National University Korea Republic of Dept of Ophthalmology Gyeongsang National University Changwon Hospital Changwon Korea Republic of Dept of Ophthalmology College of Medicine Gyeongsang National University Jinju Korea Republic of Dept of Information and Communication Engineering Gyeongsang University Korea Republic of School of Computer Science and Engineering Kyungpook National University Korea Republic of
In general, ophthalmologists visually grade the state of a patient by counting the cells within the anterior chamber OCT image. The manual cell counting method is highly inaccurate and spends a lot of time to determin... 详细信息
来源: 评论
A histogram specification technique for dark image enhancement using a local transformation method
收藏 引用
IPSJ Transactions on computer Vision and Applications 2018年 第1期10卷 1页
作者: Hussain, Khalid Rahman, Shanto Rahman, Md. Mostafijur Khaled, Shah Mostafa Abdullah-Al Wadud, M. Hossain Khan, Muhammad Asif Shoyaib, Mohammad Institute of Information Technology University of Dhaka Dhaka1000 Bangladesh Department of Software Engineering King Saud University Riyadh Saudi Arabia Department of Computer Science and Engineering University of Dhaka Dhaka1000 Bangladesh
Traditional image enhancement techniques produce different types of noise such as unnatural effects, over-enhancement, and artifacts, and these drawbacks become more prominent in enhancing dark images. To overcome the... 详细信息
来源: 评论