咨询与建议

限定检索结果

文献类型

  • 4,493 篇 会议
  • 2,994 篇 期刊文献
  • 67 册 图书

馆藏范围

  • 7,554 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,777 篇 工学
    • 3,676 篇 计算机科学与技术...
    • 3,018 篇 软件工程
    • 1,060 篇 信息与通信工程
    • 599 篇 控制科学与工程
    • 581 篇 生物工程
    • 516 篇 电气工程
    • 356 篇 生物医学工程(可授...
    • 343 篇 电子科学与技术(可...
    • 320 篇 机械工程
    • 263 篇 光学工程
    • 200 篇 动力工程及工程热...
    • 179 篇 化学工程与技术
    • 169 篇 安全科学与工程
    • 166 篇 网络空间安全
    • 165 篇 交通运输工程
    • 155 篇 仪器科学与技术
  • 2,261 篇 理学
    • 1,324 篇 数学
    • 638 篇 生物学
    • 432 篇 物理学
    • 413 篇 统计学(可授理学、...
    • 230 篇 系统科学
    • 192 篇 化学
  • 1,461 篇 管理学
    • 863 篇 管理科学与工程(可...
    • 641 篇 图书情报与档案管...
    • 346 篇 工商管理
  • 361 篇 医学
    • 304 篇 临床医学
    • 272 篇 基础医学(可授医学...
    • 158 篇 公共卫生与预防医...
    • 154 篇 药学(可授医学、理...
  • 209 篇 法学
    • 163 篇 社会学
  • 131 篇 经济学
  • 101 篇 教育学
  • 85 篇 农学
  • 19 篇 文学
  • 18 篇 艺术学
  • 13 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 217 篇 training
  • 209 篇 deep learning
  • 206 篇 feature extracti...
  • 180 篇 computational mo...
  • 165 篇 semantics
  • 162 篇 machine learning
  • 154 篇 educational inst...
  • 150 篇 accuracy
  • 141 篇 computer science
  • 124 篇 optimization
  • 122 篇 software enginee...
  • 122 篇 predictive model...
  • 121 篇 data models
  • 105 篇 cloud computing
  • 104 篇 data mining
  • 101 篇 internet of thin...
  • 91 篇 security
  • 85 篇 neural networks
  • 84 篇 artificial intel...
  • 83 篇 clustering algor...

机构

  • 1,224 篇 college of compu...
  • 156 篇 college of compu...
  • 131 篇 shenzhen univers...
  • 115 篇 college of compu...
  • 107 篇 college of compu...
  • 102 篇 college of compu...
  • 97 篇 college of compu...
  • 94 篇 software college...
  • 91 篇 state key labora...
  • 80 篇 school of softwa...
  • 71 篇 school of comput...
  • 66 篇 national enginee...
  • 60 篇 college of compu...
  • 58 篇 the college of c...
  • 57 篇 college of softw...
  • 57 篇 college of compu...
  • 57 篇 college of compu...
  • 57 篇 state key labora...
  • 53 篇 school of inform...
  • 47 篇 school of comput...

作者

  • 61 篇 shen linlin
  • 48 篇 jingsha he
  • 44 篇 leung victor c.m...
  • 36 篇 laizhong cui
  • 34 篇 lin qiuzhen
  • 34 篇 zhong ming
  • 34 篇 he jingsha
  • 33 篇 wang xingwei
  • 32 篇 zhen ji
  • 31 篇 victor c. m. leu...
  • 30 篇 kaishun wu
  • 30 篇 jianqiang li
  • 29 篇 ismail leila
  • 28 篇 zhou jie
  • 28 篇 leung victor c. ...
  • 25 篇 niyato dusit
  • 25 篇 huang min
  • 25 篇 li yan
  • 24 篇 yan li
  • 24 篇 wu kaishun

语言

  • 7,114 篇 英文
  • 314 篇 其他
  • 131 篇 中文
  • 3 篇 日文
  • 2 篇 朝鲜文
检索条件"机构=Software Engineering in College of Computer Science"
7554 条 记 录,以下是361-370 订阅
排序:
Textual Authenticity in the AI Era: Evaluating BERT and RoBERTa with Logistic Regression and Neural Networks for Text Classification  16
Textual Authenticity in the AI Era: Evaluating BERT and RoBE...
收藏 引用
16th International Symposium on Electronics and Telecommunications, ISETC 2024
作者: Hazim, Layth Rafea Ata, Oguz Altinbas University Dept. of Electrical and Computer Engineering Istanbul Turkey College of Computer Science and Mathematics Tikrit University Tikrit Iraq Altinbas University Dept. of Software Engineering Istanbul Turkey
AI-generated content impersonating human writing is an issue that has gained attention as AI spreads its wings. This particular study serves as a comparison between the existing Logistic Regression and Feedforward Neu... 详细信息
来源: 评论
Deeply‐Recursive Attention Network for video steganography
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第4期8卷 1507-1523页
作者: Jiabao Cui Liangli Zheng Yunlong Yu Yining Lin Huajian Ni Xin Xu Zhongfei Zhang College of Computer Science and Technology Zhejiang UniversityHangzhouChina School of Software Technology Zhejiang UniversityNingboChina College of Information Science and Electronic Engineering Zhejiang UniversityHangzhouChina Shanghai SUPREMIND Technology Co. Ltd.ShanghaiChina College of Intelligence Science and Technology National University of Defense TechnologyChangshaChina Department of Computer Science Binghamton UniversityBinghamtonNew YorkUSA
Video steganography plays an important role in secret communication that conceals a secret video in a cover video by perturbing the value of pixels in the cover *** is the first and foremost requirement of any stegano... 详细信息
来源: 评论
Surface Defect Detection Algorithm for Strip Steel Based on Improved YOLOv7 Model
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer science 2024年 第3期51卷 308-316页
作者: Wang, Zhu Liu, Weisheng the College of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan China the College of Computer Science and Software Engineering the University of Science and Technology Liaoning CO Anshan114051 China
This research proposes a refined deep learning framework aimed at boosting the precision and efficacy of detecting surface imperfections in strip steel. This method integrates enhancement and simplification techniques... 详细信息
来源: 评论
UEBCS: software Development Technology Based on Component Selection  18th
UEBCS: Software Development Technology Based on Component S...
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Zhao, Yingnan Qi, Xuezhao Li, Jian Lu, Dan College of Computer Science and Technology Harbin Engineering University Harbin150009 China Harbin Institute of Technology Software Engineering Co. Ltd. Harbin China
Current software development has moved away from the traditional manual workshop model and emphasizes improving software product quality. To address the issue of repetitive work, software reuse techniques can be adopt... 详细信息
来源: 评论
Optimal Bounds for Distinct Quartics  51
Optimal Bounds for Distinct Quartics
收藏 引用
51st International Colloquium on Automata, Languages, and Programming, ICALP 2024
作者: Charalampopoulos, Panagiotis Gawrychowski, Pawel Ghazawi, Samah School of Computing and Mathematical Sciences Birkbeck University of London United Kingdom Institute of Computer Science University of Wroclaw Poland Department of Computer Science University of Haifa Israel Department of Software Engineering Braude College of Engineering Karmiel Israel
A fundamental concept related to strings is that of repetitions. It has been extensively studied in many versions, from both purely combinatorial and algorithmic angles. One of the most basic questions is how many dis... 详细信息
来源: 评论
Intrusion Detection Mechanism Using Deep Learning  5
Intrusion Detection Mechanism Using Deep Learning
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent Systems, ICICNIS 2024
作者: Ananthi, P. Nirmaladevi, K. Naveen Kumar, S. Kongu Engineering College Department of Computer Technology-PG Tamilnadu Erode638060 India Madanapalle Institute of Technology & Science Department of Computer Applications India M.Sc Software Systems Kongu Engineering College Erode India
In today's connected and data-driven world, networks and digital systems need to be protected from malicious attacks. The effectiveness of conventional Intrusion Detection Systems (IDS) in recognizing and impeding... 详细信息
来源: 评论
Using Blockchain to Overcome the Issues in Land Registry Management: A Systematic Review  1
Using Blockchain to Overcome the Issues in Land Registry Man...
收藏 引用
1st International Conference in Advanced Innovation on Smart City, ICAISC 2023
作者: Riaz, Ayesha Ikram, Muhammad Jawad Asadullah, Najmussaba University of Engineering and Technology Department of Computer Software Engineering Mardan Pakistan Jeddah International College Department of Computer Science and Information Technology Jeddah Saudi Arabia
A Blockchain network contains a distributed ledger that is used to store a secure and permanent record of transactions among multiple parties. As the registries of land records are historically stored in the form of p... 详细信息
来源: 评论
Automatic Anomaly Monitoring in Public Surveillance Areas
收藏 引用
Intelligent Automation & Soft Computing 2023年 第3期35卷 2655-2671页
作者: Mohammed Alarfaj Mahwish Pervaiz Yazeed Yasin Ghadi Tamara al Shloul Suliman A.Alsuhibany Ahmad Jalal Jeongmin Park Department of Electrical Engineering College of EngineeringKing Faisal UniversityAl-Ahsa31982Saudi Arabia Department of Computer Science Bahria UniversityIslamabadPakistan Department of Computer Science and Software Engineering Al Ain UniversityAl Ain15551UAE Department of Humanities and Social Science Al Ain UniversityAl Ain15551UAE Department of Computer Science College of ComputerQassim UniversityBuraydah51452Saudi Arabia Department of Computer Science Air UniversityIslamabadPakistan Department of Computer Engineering Korea Polytechnic University237 Sangidaehak-ro Siheung-siGyeonggi-do15073Korea
With the dramatic increase in video surveillance applications and public safety measures,the need for an accurate and effective system for abnormal/sus-picious activity classification also *** it has multiple applicati... 详细信息
来源: 评论
Research on Script-Based software Component Development  18th
Research on Script-Based Software Component Development
收藏 引用
18th International Conference on Green, Pervasive, and Cloud Computing, GPC 2023
作者: Zhao, Yingnan Sun, Yang Fan, Bin Lu, Dan College of Computer Science and Technology Harbin Engineering University Harbin150009 China Harbin Institute of Technology Software Engineering Co. Ltd. Harbin China
As software demand proliferates and software size and complexity increase, traditional software development models face enormous challenges. As a result, new software development techniques are being explored to meet ... 详细信息
来源: 评论
PAIR: Protein-aptamer interaction prediction based on language models and contrastive learning framework
PAIR: Protein-aptamer interaction prediction based on langua...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Zhang, Jun Yan, Zhiqiang Zeng, Hao Zhu, Zexuan Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China Shenzhen University College of Computer Science and Software Engineering Shenzhen China
Aptamers are single-stranded DNA or RNA oligonucleotides that selectively bind to specific targets, making them valuable for drug design and diagnostic applications. Identifying the interactions between aptamers and t... 详细信息
来源: 评论