咨询与建议

限定检索结果

文献类型

  • 5,962 篇 会议
  • 3,394 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 9,396 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,592 篇 工学
    • 3,459 篇 计算机科学与技术...
    • 2,766 篇 软件工程
    • 1,096 篇 信息与通信工程
    • 969 篇 控制科学与工程
    • 743 篇 电气工程
    • 741 篇 电子科学与技术(可...
    • 572 篇 生物工程
    • 491 篇 机械工程
    • 443 篇 光学工程
    • 412 篇 生物医学工程(可授...
    • 394 篇 仪器科学与技术
    • 297 篇 动力工程及工程热...
    • 294 篇 化学工程与技术
    • 223 篇 交通运输工程
    • 210 篇 材料科学与工程(可...
    • 198 篇 土木工程
    • 167 篇 安全科学与工程
  • 2,963 篇 理学
    • 1,422 篇 数学
    • 877 篇 物理学
    • 638 篇 生物学
    • 457 篇 统计学(可授理学、...
    • 355 篇 系统科学
    • 300 篇 化学
  • 1,468 篇 管理学
    • 958 篇 管理科学与工程(可...
    • 559 篇 图书情报与档案管...
    • 401 篇 工商管理
  • 383 篇 医学
    • 326 篇 临床医学
    • 258 篇 基础医学(可授医学...
    • 171 篇 药学(可授医学、理...
  • 207 篇 法学
    • 173 篇 社会学
  • 155 篇 经济学
  • 93 篇 农学
  • 83 篇 教育学
  • 32 篇 文学
  • 23 篇 军事学
  • 16 篇 艺术学
  • 1 篇 哲学

主题

  • 302 篇 computer science
  • 181 篇 feature extracti...
  • 175 篇 deep learning
  • 171 篇 computational mo...
  • 147 篇 data mining
  • 145 篇 systems engineer...
  • 127 篇 optimization
  • 121 篇 machine learning
  • 117 篇 neural networks
  • 105 篇 accuracy
  • 103 篇 control systems
  • 98 篇 semantics
  • 94 篇 computer archite...
  • 88 篇 laboratories
  • 85 篇 predictive model...
  • 84 篇 educational inst...
  • 81 篇 costs
  • 79 篇 training
  • 77 篇 reliability
  • 77 篇 bandwidth

机构

  • 101 篇 national enginee...
  • 99 篇 college of compu...
  • 78 篇 school of comput...
  • 72 篇 department of co...
  • 70 篇 national enginee...
  • 56 篇 college of infor...
  • 43 篇 school of comput...
  • 41 篇 the key laborato...
  • 40 篇 school of optica...
  • 38 篇 school of comput...
  • 36 篇 school of inform...
  • 35 篇 school of comput...
  • 31 篇 national enginee...
  • 31 篇 university of ch...
  • 30 篇 faculty of compu...
  • 28 篇 huazhong univers...
  • 27 篇 school of comput...
  • 27 篇 hubei province k...
  • 26 篇 school of comput...
  • 25 篇 hubei key labora...

作者

  • 72 篇 hai jin
  • 38 篇 jin hai
  • 32 篇 yang yang
  • 30 篇 shen linlin
  • 29 篇 xiaofei liao
  • 24 篇 mei-ling shyu
  • 22 篇 hu shengshan
  • 21 篇 chen shu-ching
  • 21 篇 abdelwahed motwa...
  • 20 篇 jianchao zeng
  • 20 篇 ji zhen
  • 20 篇 shu-ching chen
  • 20 篇 dutta paramartha
  • 18 篇 wang xingjun
  • 17 篇 zhen ji
  • 15 篇 wang lei
  • 15 篇 long zheng
  • 15 篇 zhuang songlin
  • 15 篇 tomio watanabe
  • 15 篇 han zhu

语言

  • 8,371 篇 英文
  • 778 篇 其他
  • 220 篇 中文
  • 32 篇 日文
  • 6 篇 朝鲜文
  • 1 篇 德文
检索条件"机构=System Engineering and Computer Science"
9396 条 记 录,以下是1061-1070 订阅
排序:
IoT for Water Quality Categorization  5
IoT for Water Quality Categorization
收藏 引用
5th International Conference on Cybernetics and Intelligent systems, ICORIS 2023
作者: Sastrohartono, Hermantoro Krisdiarto, Andreas Wahyu Uktoro, Arief Ika Rahutomo, Reza Suparyanto, Teddy Pardamean, Bens Institute of Agriculture Stiper Faculty of Agricultural Technology Agricultural Engineering Department Yogyakarta Indonesia Bina Nusantara University School of Information Systems Information System Department Jakarta11480 Indonesia Bina Nusantara University Bioinformatics & Data Science Research Center Jakarta11480 Indonesia Bina Nusantara University Binus Graduate Program Master of Computer Science Computer Science Department Jakarta11480 Indonesia
In agricultural water research, the adoption of Internet of Things (IoT) technology has emerged as a pivotal approach for large-scale data collection. Water availability in the context of water quality is very importa... 详细信息
来源: 评论
WB-KNN for emotion recognition from physiological signals
收藏 引用
Optoelectronics Letters 2021年 第7期17卷 444-448页
作者: XIE Weilun XUE Wanli School of Computer Science and Engineering Tianjin University of TechnologyTianjin 300384China Engineering Research Center of Learning-Based Intelligent System Ministry of EducationTianjin 300384China
K-nearest neighbor(KNN) has yielded excellent performance in physiological signals based on emotion recognition. But there are still some issues: the majority vote only by the nearest neighbors is too simple to deal w... 详细信息
来源: 评论
A Case Study of Big Data Processing in the Cloud Environments with Insights into Advantages, Tools, and Techniques
A Case Study of Big Data Processing in the Cloud Environment...
收藏 引用
International Conference on Confluence The Next Generation Information Technology Summit (Confluence)
作者: Pullela Harish Chowdary Puneet Thapar Arsalan Ahmed Alyas Urvashi Singh Department of Computer Science and Engineering Lovely Professional University Phagwara Punjab India Information System Technologies Wilmington University United States
Every single day, users are increasing as the world has explored technology where data is producing more and more big data and cloud technologies are the reason behind the scene because big data and cloud computing ar...
来源: 评论
Edge computing hardware design for Cubesat camera  11
Edge computing hardware design for Cubesat camera
收藏 引用
11th IEEE Global Conference on Consumer Electronics, GCCE 2022
作者: Lee, Pei-Jun Yu, Chun-Hsien Shiu, Shiuan-Hal Weng, Chi Wei Huang, Shu-Chun Xu, Guo-Cheng Department of Electronic and Computer Engineering National Taiwan University of Science and Technology Taipei Taiwan Research and Development Department Liscotech System Co.Ltd Taipei Taiwan
In this paper, we designed and implemented an FPGA-based image system for satellite applications. The FPGA utilizes LVDS receivers to capture data up to eight 180MHz channels. The captured image data will be adjusted ... 详细信息
来源: 评论
Proposed National Artificial Intelligence Strategy
Proposed National Artificial Intelligence Strategy
收藏 引用
Computational Intelligence Approaches and Applications (ICCIAA), International Conference on
作者: Bilal Zahran Belal Ayyoub Department of computer science University of Petra Jordan Department of computer information system Al-Balqa Applied University Jordan Department of Electrical Engineering Al-Balqa Applied University Jordan
The rapid pace of development in Artificial Intelligence (AI) necessitates formulating effective national strategies for its maximization and minimizing its accompanying repercussions. In this article, a proposed Nati... 详细信息
来源: 评论
Identifying The Coconut Leaf Disease Using Deep Transfer Learning Approach
Identifying The Coconut Leaf Disease Using Deep Transfer Lea...
收藏 引用
Smart Information systems and Technologies (SIST), IEEE International Conference on
作者: Hemayet Hossain Tuhin Md Abdul Kayum Md Rahmatul Kabir Rasel Sarker Shah Md Tanvir Siddiquee Bishwajeet Pandey Department of Computer Science and Engineering Daffodil International University Dhaka Bangladesh Department of Intelligent System and Cyber Security Astana IT University Kazakhstan
Coconut is one of the main economic crops in Bangladesh. It is a tree whose every part is useful in one way or another in public life. The leaves, flowers, fruits, stems, and roots of this tree are used as raw materia... 详细信息
来源: 评论
Multi-Scale Feature Extraction with Supervised Contrastive Learning for Vulnerability Detection  36
Multi-Scale Feature Extraction with Supervised Contrastive L...
收藏 引用
36th International Conference on Software engineering and Knowledge engineering, SEKE 2024
作者: Zhao, Yahui Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Pengcheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
The capacity of Deep Learning to automatically learn features from source code has facilitated its extensive utilization in detecting software vulnerabilities. However, existing pre-trained models regard code snippets... 详细信息
来源: 评论
A Scalable, Efficient, and Robust Dynamic Memory Management Library for HLS-based FPGAs
A Scalable, Efficient, and Robust Dynamic Memory Management ...
收藏 引用
IEEE/ACM International Symposium on Microarchitecture (MICRO)
作者: Qinggang Wang Long Zheng Zhaozeng An Shuyi Xiong Runze Wang Yu Huang Pengcheng Yao Xiaofei Liao Hai Jin Jingling Xue National Engineering Research Center for Big Data Technology and System/Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Zhejiang Lab Hangzhou China School of Computer Science and Engineering University of New South Wales Sydney NSW Australia
Nowadays, high-level synthesis (HLS) has gained prominence for FPGA-based architecture prototyping, enhancing productivity significantly. Despite this advancement, HLS tools are impeded by a critical drawback: they la...
来源: 评论
On Pipelined GCN with Communication-Efficient Sampling and Inclusion-Aware Caching
On Pipelined GCN with Communication-Efficient Sampling and I...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Shulin Wang Qiang Yu Xiong Wang Yuqing Li Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China School of Cyber Science and Engineering Wuhan University Wuhan China
Graph convolutional network (GCN) has achieved enormous success in learning structural information from unstructured data. As graphs become increasingly large, distributed training for GCNs is severely prolonged by fr... 详细信息
来源: 评论
Vulnerability Detection Based on Pre-trained Code Language Model and Convolutional Neural Network  36
Vulnerability Detection Based on Pre-trained Code Language M...
收藏 引用
36th International Conference on Software engineering and Knowledge engineering, SEKE 2024
作者: Liao, Tingfeng Lu, Lu Liang, Zhihong Suo, Siliang School of Computer Science and Engineering South China University of Technology Guangzhou China Pazhou Laboratory Guangzhou China Pengcheng Laboratory Shenzhen China Electric Power Research Institute CSG Guangzhou China Guangdong Provincial Key Laboratory of Power System Network Security Guangzhou China
Software vulnerabilities damage the reliability of software systems. Recently, many methods based on deep learning have been proposed for vulnerability detection by learning features from code sequences or various pro... 详细信息
来源: 评论