咨询与建议

限定检索结果

文献类型

  • 4,167 篇 会议
  • 3,748 篇 期刊文献
  • 64 册 图书

馆藏范围

  • 7,979 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,455 篇 工学
    • 4,069 篇 计算机科学与技术...
    • 3,354 篇 软件工程
    • 1,283 篇 信息与通信工程
    • 676 篇 控制科学与工程
    • 655 篇 生物工程
    • 567 篇 电气工程
    • 431 篇 电子科学与技术(可...
    • 413 篇 生物医学工程(可授...
    • 412 篇 光学工程
    • 391 篇 机械工程
    • 230 篇 动力工程及工程热...
    • 215 篇 化学工程与技术
    • 197 篇 仪器科学与技术
    • 179 篇 网络空间安全
    • 168 篇 安全科学与工程
    • 158 篇 交通运输工程
    • 150 篇 建筑学
  • 2,652 篇 理学
    • 1,431 篇 数学
    • 714 篇 生物学
    • 661 篇 物理学
    • 439 篇 统计学(可授理学、...
    • 256 篇 系统科学
    • 238 篇 化学
  • 1,588 篇 管理学
    • 940 篇 管理科学与工程(可...
    • 713 篇 图书情报与档案管...
    • 356 篇 工商管理
  • 368 篇 医学
    • 310 篇 临床医学
    • 269 篇 基础医学(可授医学...
    • 157 篇 药学(可授医学、理...
  • 265 篇 法学
    • 196 篇 社会学
  • 135 篇 经济学
  • 130 篇 教育学
  • 82 篇 农学
  • 31 篇 文学
  • 29 篇 军事学
  • 21 篇 艺术学
  • 4 篇 哲学
  • 1 篇 历史学

主题

  • 192 篇 feature extracti...
  • 164 篇 semantics
  • 159 篇 computational mo...
  • 158 篇 deep learning
  • 154 篇 machine learning
  • 151 篇 training
  • 112 篇 data mining
  • 109 篇 optimization
  • 108 篇 internet of thin...
  • 106 篇 cloud computing
  • 99 篇 accuracy
  • 93 篇 predictive model...
  • 90 篇 convolution
  • 86 篇 authentication
  • 83 篇 reinforcement le...
  • 82 篇 software enginee...
  • 82 篇 neural networks
  • 81 篇 computer science
  • 79 篇 data models
  • 78 篇 image segmentati...

机构

  • 272 篇 school of inform...
  • 260 篇 school of comput...
  • 164 篇 school of comput...
  • 102 篇 state key labora...
  • 100 篇 college of compu...
  • 94 篇 school of softwa...
  • 84 篇 school of inform...
  • 67 篇 school of comput...
  • 61 篇 school of comput...
  • 55 篇 college of compu...
  • 46 篇 shandong provinc...
  • 45 篇 school of softwa...
  • 45 篇 university of ch...
  • 44 篇 school of comput...
  • 43 篇 school of comput...
  • 40 篇 school of comput...
  • 40 篇 school of comput...
  • 39 篇 shanghai key lab...
  • 39 篇 school of softwa...
  • 37 篇 university of el...

作者

  • 47 篇 yang jian
  • 35 篇 qi lianyong
  • 34 篇 zhang wenqiang
  • 33 篇 xu xiaolong
  • 30 篇 tao dacheng
  • 29 篇 wang wei
  • 26 篇 sun xingming
  • 25 篇 wang lei
  • 23 篇 qi liu
  • 23 篇 yang yang
  • 23 篇 zhang zhao
  • 23 篇 hu shengshan
  • 23 篇 wang yan
  • 20 篇 lu dianjie
  • 20 篇 timofte radu
  • 20 篇 liu qi
  • 20 篇 shen jian
  • 20 篇 wang meng
  • 19 篇 liu yang
  • 18 篇 niyato dusit

语言

  • 6,593 篇 英文
  • 1,276 篇 其他
  • 131 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Applied Software Engineering Lab School of Computer Engineering & Information Technology"
7979 条 记 录,以下是4691-4700 订阅
排序:
Multi-task learning for object keypoints detection and classification
收藏 引用
Pattern Recognition Letters 2020年 130卷 182-188页
作者: Jie Xu Lin Zhao Shanshan Zhang Chen Gong Jian Yang PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education and Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing 210094 China State Key Laboratory of Integrated Services Networks Xidian Univeristy Xi’an 710071 China
Object keypoints detection and classification are both central research topics in computer vision . Due to their wide range potential applications in the real world, substantial efforts have been taken to advance thei...
来源: 评论
Preservation Mechanism of Network Electronic Records Based on Broadcast-Storage Network in Urban Construction
收藏 引用
Journal of New Media 2019年 第1期1卷 27-34页
作者: Fujian Zhu Yongjun Ren Qirun Wang Jinyue Xia School of Computer and Software Nanjing University of Information Science&TechnologyNanjingChina Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjingChina School of engineering and technology University of HertfordshireHertfordUK School of Computer Information and Engineering Changzhou Institute of TechnologyChangzhouChina International Business Machines Corporation(IBM) New YorkUSA
With the wide application of information technology in urban infrastructure,urban construction has entered the stage of smart city,forming a large number of network electronic *** electronic records play a vital role ... 详细信息
来源: 评论
Ensuring Readability of Electronic Records Based on Virtualization technology in Cloud Storage
收藏 引用
Journal on Internet of Things 2019年 第1期1卷 33-39页
作者: Qirun Wang Fujian Zhu Yan Leng Yongjun Ren Jinyue Xia School of engineering and technology University of HertfordshireHertfordUK School of Computer Information and Engineering Changzhou Institute of TechnologyChangzhouChina Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Nanjing University of Information Science&TechnologyNanjingChina School of Computer and Software Nanjing University of Information Science&TechnologyNanjingChina International Business Machines Corporation(IBM) New YorkUSA
With the rapid development of E-commerce and E-government, there are somany electronic records have been produced. The increasing number of electronicrecords brings about storage difficulties, the traditional electron... 详细信息
来源: 评论
Corrigendum to “DeepQSP: Identification of Quorum Sensing Peptides Through Neural Network Model” [Results in engineering 24 (2024) 102878]
收藏 引用
Results in engineering 2024年 24卷
作者: Md. Ashikur Rahman Md. Mamun Ali Kawsar Ahmed Imran Mahmud Francis M. Bui Li Chen Santosh Kumar Mohammad Ali Moni Department of Software Engineering Daffodil International University Daffodil Smart City Birulia Dhaka 1216 Bangladesh Division of Biomedical Engineering University of Saskatchewan 57 Campus Drive Saskatoon SK S7N 5A9 Canada Department of Electrical and Computer Engineering University of Saskatchewan 57 Campus Drive Saskatoon SK S7N 5A9 Canada Bio-photomatiχ Information and Communication Technology Mawlana Bhashani Science and Technology University Santosh Tangail 1902 Bangladesh Health Informatics Research Lab Department of Computer Science and Engineering Daffodil International University Daffodil Smart City Birulia Dhaka 1216 Bangladesh Department of Electronics and Communication Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh 522302 India AI & Digital Health Technology Artificial Intelligence & Cyber Future Institute Charles Sturt University Bathurst NSW 2795 Australia AI & Digital Health Technology Rural Health Research Institute Charles Sturt University Orange NSW 2800 Australia
来源: 评论
Generating reliable friends via adversarial training to improve social recommendation
arXiv
收藏 引用
arXiv 2019年
作者: Yu, Junliang Gao, Min Yin, Hongzhi Li, Jundong Gao, Chongming Wang, Qinyong School of Information Technology and Electrical Engineering University of Queensland Australia School of Big Data and Software Engineering Chongqing University China Department of Electrical and Computer Engineering University of Virginia United States
Most of the recent studies of social recommendation assume that people share similar preferences with their friends and the online social relations are helpful in improving traditional recommender systems. However, th... 详细信息
来源: 评论
An improved simulation model for pedestrian crowd evacuation
arXiv
收藏 引用
arXiv 2020年
作者: Muhammed, Danial A. Rashid, Tarik A. Alsadoon, Abeer Bacanin, Nebojsa Fattah, Polla Mohammadi, Mokhtar Banerjee, Indradip Computer Department College of Science University of Sulaimani SulaymaniyahKRG46001 Iraq Computer Science and Engineering Department University of Kurdistan Hewler ErbilKRG44001 Iraq Department of Information Technology School of Computing and Mathematics Charles Sturt University Sydney BathurstNSW2795 Australia Faculty of Informatics and Computing Vice-dean Singidunum University Belgrade11000 Serbia Software and Informatics Engineering Dept Engineering College Salahaddin University-Erbil ErbilKRG44001 Iraq Department of Information Technology Lebanese French University ErbilKRG44001 Iraq Department of Computer Science and Engineering University Institute of Technology The University of Burdwan BurdwanWest Bengal713101 India
This paper works on one of the most recent pedestrian crowd evacuation models, i.e., "a simulation model for pedestrian crowd evacuation based on various AI techniques", developed in late 2019. This study ad... 详细信息
来源: 评论
Intelligent reflecting surface aided MISO uplink communication network: Feasibility and power minimization for perfect and imperfect CSI
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Yang Zhao, Jun Li, Ming Wu, Qingqing School of Information and Communication Engineering Dalian University of Technology Dalian China School of Computer Science and Engineering Nanyang Technological University Singapore National Mobile Communications Research Laboratory Southeast University Nanjing210096 China State Key Lab. of Internet of Things for Smart City University of Macau Macau China
In this paper, we consider the weighted sum-power minimization under quality-of-service (QoS) constraints in the multi-user multi-input-single-output (MISO) uplink wireless network assisted by intelligent reflecting s... 详细信息
来源: 评论
Feedforward neural network based on ensemble evolutionary algorithm with self-adaptive strategy and parameter for intrusion detection
收藏 引用
International Journal of Wireless and Mobile Computing 2019年 第2期17卷 202-211页
作者: Xue, Yu Tang, Tao Liu, Alex X. School of Computer and Software Nanjing University of Information Science and Technology Pukou Nanjing China Department of Computer Science and Engineering Michigan State University East Lansing United States
The applications of Wireless Sensor Networks (WSNs) have driven the development of many fields, and the information security is an important issue in the WSNs. Intrusion Detection System (IDS) is a kind of effective s... 详细信息
来源: 评论
STR: Secure computation on additive shares using the share-transform-reveal strategy
arXiv
收藏 引用
arXiv 2020年
作者: Xia, Zhihua Gu, Qi Zhou, Wenhao Xiong, Lizhi Weng, Jian Xiong, Naixue N. College of Cyber Security Jinan University Guangzhou510632 China Engineering Research Center of Digital Forensics Ministry of Education School of Computer and Software Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology Nanjing210044 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China The College of Intelligence and Computing Tianjin University Tianjin300350 China
The rapid development of cloud computing probably benefits many of us while the privacy risks brought by semi-honest cloud servers have aroused the attention of more and more people and legislatures. In the last two d... 详细信息
来源: 评论
The Evaluation and Comparative Analysis of Role Based Access Control and Attribute Based Access Control Model  15
The Evaluation and Comparative Analysis of Role Based Access...
收藏 引用
15th International computer Conference on Wavelet Active Media technology and information Processing, ICCWAMTIP 2018
作者: Aftab, Muhammad Umar Qin, Zhiguang Zakria Ali, Safeer Pirah, P. Khan, Jalaluddin School of Information and Software Engineering University of Electronic Science and Technology of China China School of Computer Science and Engineering University of Electronic Science and Technology of China China
Access control is used as a mechanism to secure the organizations from internal and external attacks. The implementation of access control is done with the help of different access control models through which RBAC an... 详细信息
来源: 评论