咨询与建议

限定检索结果

文献类型

  • 8,802 篇 会议
  • 4,753 篇 期刊文献
  • 104 册 图书

馆藏范围

  • 13,659 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,752 篇 工学
    • 6,702 篇 计算机科学与技术...
    • 5,545 篇 软件工程
    • 1,923 篇 信息与通信工程
    • 1,040 篇 控制科学与工程
    • 974 篇 生物工程
    • 746 篇 电气工程
    • 637 篇 电子科学与技术(可...
    • 607 篇 机械工程
    • 570 篇 生物医学工程(可授...
    • 542 篇 光学工程
    • 347 篇 化学工程与技术
    • 332 篇 仪器科学与技术
    • 308 篇 动力工程及工程热...
    • 304 篇 安全科学与工程
    • 271 篇 网络空间安全
    • 265 篇 交通运输工程
  • 4,187 篇 理学
    • 2,295 篇 数学
    • 1,066 篇 物理学
    • 1,056 篇 生物学
    • 691 篇 统计学(可授理学、...
    • 430 篇 系统科学
    • 364 篇 化学
  • 2,678 篇 管理学
    • 1,666 篇 管理科学与工程(可...
    • 1,152 篇 图书情报与档案管...
    • 740 篇 工商管理
  • 563 篇 医学
    • 489 篇 临床医学
    • 425 篇 基础医学(可授医学...
  • 436 篇 法学
    • 335 篇 社会学
  • 286 篇 经济学
    • 285 篇 应用经济学
  • 277 篇 教育学
    • 271 篇 教育学
  • 147 篇 农学
  • 49 篇 文学
  • 48 篇 军事学
  • 29 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 316 篇 software enginee...
  • 299 篇 deep learning
  • 293 篇 feature extracti...
  • 284 篇 computational mo...
  • 247 篇 data mining
  • 236 篇 machine learning
  • 209 篇 semantics
  • 199 篇 training
  • 179 篇 information tech...
  • 174 篇 internet of thin...
  • 173 篇 optimization
  • 173 篇 accuracy
  • 165 篇 predictive model...
  • 153 篇 computer science
  • 143 篇 neural networks
  • 128 篇 educational inst...
  • 127 篇 authentication
  • 127 篇 software
  • 125 篇 real-time system...
  • 125 篇 cloud computing

机构

  • 815 篇 school of inform...
  • 266 篇 school of comput...
  • 238 篇 school of softwa...
  • 191 篇 school of softwa...
  • 179 篇 state key labora...
  • 161 篇 college of compu...
  • 146 篇 university of el...
  • 145 篇 school of comput...
  • 72 篇 school of inform...
  • 62 篇 school of softwa...
  • 54 篇 school of softwa...
  • 51 篇 school of comput...
  • 50 篇 college of softw...
  • 49 篇 key laboratory f...
  • 49 篇 school of inform...
  • 43 篇 school of softwa...
  • 41 篇 software enginee...
  • 40 篇 sri lanka instit...
  • 39 篇 school of big da...
  • 39 篇 school of inform...

作者

  • 49 篇 liu risheng
  • 35 篇 sun xingming
  • 35 篇 bieliková mária
  • 34 篇 qi lianyong
  • 32 篇 xiong hu
  • 32 篇 tao dacheng
  • 30 篇 yongbin yu
  • 30 篇 jin jin
  • 28 篇 wang lei
  • 28 篇 qi liu
  • 26 篇 liu yang
  • 25 篇 chaolong zhang
  • 25 篇 ma long
  • 24 篇 jiacun wang
  • 23 篇 dan tang
  • 23 篇 lei he
  • 23 篇 hang lei
  • 22 篇 liu bo
  • 22 篇 wang jian
  • 22 篇 yu yongbin

语言

  • 12,118 篇 英文
  • 1,335 篇 其他
  • 234 篇 中文
  • 5 篇 日文
  • 4 篇 德文
  • 3 篇 法文
  • 3 篇 斯洛文尼亚文
  • 1 篇 朝鲜文
检索条件"机构=Software Engineering and Information Technology"
13659 条 记 录,以下是721-730 订阅
排序:
Deep Learning Algorithm for Person Re-Identification Based on Dual Network Architecture
收藏 引用
Computers, Materials & Continua 2025年 第5期83卷 2889-2905页
作者: Meng Zhu Xingyue Wang Honge Ren Abeer Hakeem Linda Mohaisen College of Information Engineering Harbin UniversityHarbin150086China Heilongjiang Provincial Key Laboratory of the Intelligent Perception and Intelligent Software Harbin UniversityHarbin150086China College of Computer and Control Engineering Northeast Forestry UniversityHarbin150040China Heilongjiang Forestry Intelligent Equipment Engineering Research Center Northeast Forestry UniversityHarbin150040China Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Saudi Arabia
Changing a person’s posture and low resolution are the key challenges for person re-identification(ReID)in various deep learning *** this paper,we introduce an innovative architecture using a dual attention network t... 详细信息
来源: 评论
The Correlation Between Architecture Smells, Package Stability and Reusability: A Case Study  4
The Correlation Between Architecture Smells, Package Stabili...
收藏 引用
4th IEEE International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer engineering, MI-STA 2024
作者: Benidris, Mrwan Elfallah, Ehab A. Omar Cheema, Marwa Aslam Alsma, Mohammed Salah Addin Kadiki, Tareq Ziad Elbarsha, Abdelfattah University of Benghazi Faculty of Information Technology Dep. of Computer Science Libya Libyan International Medical University Faculty of Information Technology Dept. of Software Engineering Libya University of Benghazi Faculty of Public Health Health Informatics Department Libya
the design decisions made in the architecture of a software system are essential to its maintainability, and thus its quality is of great importance. Architecture smells (ASs) can be used to identify any quality issue... 详细信息
来源: 评论
DNBP-CCA:A Novel Approach to Enhancing Heterogeneous Data Traffic and Reliable Data Transmission for Body Area Network
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2851-2878页
作者: Abdulwadood Alawadhi Mohd.Hasbullah Omar Abdullah Almogahed Noradila Nordin Salman A.Alqahtani Atif M.Alamri InterNetWorks Research Laboratory School of ComputingUniversiti Utara MalaysiaSintok06010Malaysia Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn MalaysiaParit RajaJohor86400Malaysia School of Games&Creative Technology University for the Creative ArtsFarnhamGU97DSUK Computer Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia
The increased adoption of Internet of Medical Things (IoMT) technologies has resulted in the widespread use ofBody Area Networks (BANs) in medical and non-medical domains. However, the performance of IEEE 802.15.4-bas... 详细信息
来源: 评论
A blockchain-based framework for data quality in edge-computing-enabled crowdsensing
收藏 引用
Frontiers of Computer Science 2023年 第4期17卷 127-139页
作者: Jian AN Siyuan WU Xiaolin GUI Xin HE Xuejun ZHANG School of Computer Science and Technology Shaanxi Province Key Laboratory of Computer NetworkXi’an Jiaotong UniversityXi’an 710049China School of Software Henan UniversityKaifeng 475001China School of Electronic and Information Engineering Lanzhou Jiaotong UniversityLanzhou 730070China
With the rapid development of mobile technology and smart devices,crowdsensing has shown its large potential to collect massive *** the limitation of calculation power,edge computing is introduced to release unnecessa... 详细信息
来源: 评论
Cyber security skills development in South Africa: Addressing the Gender Gap in the Industry  8
Cyber security skills development in South Africa: Addressin...
收藏 引用
8th Conference on information Communication technology and Society, ICTAS 2024
作者: Ramonyai, Tebogo Motlatso Mpekoa, Noluntu Tom, Sheethal University of Johannesburg Academy of Computer Science & Software Engineering Cape Town South Africa IIE Varsity College School of Information Technology Cape Town South Africa
This paper investigates the gender gap in South Africa's cybersecurity sector and its effects on both the sector and the nation's economic growth. There is a significant shortage of skilled workers in the sect... 详细信息
来源: 评论
Effective IDS under constraints of modern enterprise networks: Revisiting the OpTC dataset  7
Effective IDS under constraints of modern enterprise network...
收藏 引用
7th Conference on Cloud and Internet of Things, CIoT 2024
作者: Nikulshin, Victor Talhi, Chamseddine École de technologie supérieure Department of Software Engineering and Information Technology MontrealQCH3C 1K3 Canada
The lack of high-quality public datasets is a major obstacle for the creation of practical and effective intrusion detection systems. Hundreds of new publications dedicated to this topic are released every year, but t... 详细信息
来源: 评论
Self-adaptive Bat Algorithm With Genetic Operations
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2022年 第7期9卷 1284-1294页
作者: Jing Bi Haitao Yuan Jiahui Zhai MengChu Zhou H.Vincent Poor School of Software Engineering Faculty of Information TechnologyBeijing University of TechnologyBeijing 100124China Department of Electrical and Computer Engineering New Jersey Institute of TechnologyNewark NJ 07102 USA School of Automation Science and Electrical Engineering Beihang UniversityBeijing 100191China Department of Electrical Engineering Princeton UniversityPrinceton NJ 08544 USA IEEE
Swarm intelligence in a bat algorithm(BA)provides social *** operations for reproducing individuals in a genetic algorithm(GA)offer global search ability in solving complex optimization *** integration provides an opp... 详细信息
来源: 评论
Quantum-safe cryptography:crossroads of coding theory and cryptography
收藏 引用
Science China(information Sciences) 2022年 第1期65卷 95-115页
作者: Jiabo WANG Ling LIU Shanxiang LYU Zheng WANG Mengfan ZHENG Fuchun LIN Zhao CHEN Liuguo YIN Xiaofu WU Cong LING Beijing National Research Center for Information Science and Technology Tsinghua University Department of Software Engineering Shenzhen University College of Cyber Security Jinan University School of Information Science and Engineering Southeast University Department of Electrical and Electronic Engineering Imperial College London National Engineering Research Center of Communications and Networking Nanjing University of Posts and Telecommunications
We present an overview of quantum-safe cryptography(QSC) with a focus on post-quantum cryptography(PQC) and information-theoretic security. From a cryptographic point of view, lattice and code-based schemes are among ... 详细信息
来源: 评论
Enhanced Steganalysis for Color Images Using Curvelet Features and Support Vector Machine
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 1311-1328页
作者: Arslan Akram Imran Khan Javed Rashid Mubbashar Saddique Muhammad Idrees Yazeed Yasin Ghadi Abdulmohsen Algarni Faculty of Computer Science and Information Technology Department of Computer ScienceSuperior UniversityLahore54000Pakistan Machine Learning Code(MLC)Lab Meharban HouseHouse Number 209Zafar ColonyOkara56300Pakistan Information Technology Services University of OkaraOkara56310Pakistan Department of Computer Science&Engineering University of Engineering&Technology LahoreNarowal CampusNarowal51601Pakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain11671Abu Dhabi Department of Computer Science King Khalid UniversityAbha61421Saudi Arabia
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information... 详细信息
来源: 评论
Multi-view k-means clustering algorithm with improved initialization strategy: Effective multi-view clustering algorithm  4
Multi-view k-means clustering algorithm with improved initia...
收藏 引用
4th International Conference on Artificial Intelligence and Computer engineering, ICAICE 2023
作者: Qu, Fuheng Liu, Houfei Yang, Yong Shao, Mingyang College of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China School of Software Engineering Jilin Technology College of Electronic Information Jilin132021 China
This paper proposes an improved initialization strategy for the multi-view k-means clustering algorithm based on the adaptive sparse membership and weight allocation multi-view k-means clustering algorithm (MVASM). Th... 详细信息
来源: 评论