咨询与建议

限定检索结果

文献类型

  • 644 篇 期刊文献
  • 573 篇 会议
  • 3 册 图书

馆藏范围

  • 1,220 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 818 篇 工学
    • 629 篇 计算机科学与技术...
    • 533 篇 软件工程
    • 197 篇 信息与通信工程
    • 130 篇 生物工程
    • 112 篇 控制科学与工程
    • 98 篇 电气工程
    • 93 篇 生物医学工程(可授...
    • 73 篇 光学工程
    • 67 篇 电子科学与技术(可...
    • 46 篇 化学工程与技术
    • 35 篇 机械工程
    • 29 篇 动力工程及工程热...
    • 25 篇 建筑学
    • 24 篇 仪器科学与技术
    • 24 篇 安全科学与工程
    • 24 篇 网络空间安全
  • 449 篇 理学
    • 232 篇 数学
    • 149 篇 生物学
    • 100 篇 统计学(可授理学、...
    • 73 篇 物理学
    • 57 篇 化学
    • 43 篇 系统科学
  • 247 篇 管理学
    • 149 篇 管理科学与工程(可...
    • 100 篇 图书情报与档案管...
    • 59 篇 工商管理
  • 87 篇 医学
    • 71 篇 临床医学
    • 64 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
    • 31 篇 公共卫生与预防医...
  • 33 篇 法学
    • 24 篇 社会学
  • 20 篇 农学
  • 14 篇 经济学
  • 6 篇 教育学
  • 5 篇 军事学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 47 篇 feature extracti...
  • 41 篇 deep learning
  • 39 篇 training
  • 36 篇 semantics
  • 28 篇 computational mo...
  • 28 篇 accuracy
  • 26 篇 data models
  • 23 篇 machine learning
  • 23 篇 cloud computing
  • 22 篇 big data
  • 21 篇 predictive model...
  • 19 篇 contrastive lear...
  • 19 篇 federated learni...
  • 18 篇 convolution
  • 17 篇 visualization
  • 17 篇 security
  • 16 篇 optimization
  • 16 篇 correlation
  • 15 篇 task analysis
  • 15 篇 artificial intel...

机构

  • 124 篇 college of compu...
  • 103 篇 national enginee...
  • 48 篇 school of big da...
  • 35 篇 school of big da...
  • 34 篇 college of compu...
  • 34 篇 college of big d...
  • 30 篇 key laboratory o...
  • 29 篇 college of compu...
  • 29 篇 shenzhen researc...
  • 24 篇 college of compu...
  • 23 篇 school of comput...
  • 22 篇 big data institu...
  • 22 篇 guangdong provin...
  • 19 篇 shenzhen institu...
  • 17 篇 shenzhen univers...
  • 16 篇 peng cheng labor...
  • 16 篇 college of compu...
  • 14 篇 school of comput...
  • 14 篇 state key labora...
  • 14 篇 shenzhen univers...

作者

  • 37 篇 shen linlin
  • 18 篇 li jianqiang
  • 15 篇 shi qingjiang
  • 15 篇 huang joshua zhe...
  • 13 篇 gao can
  • 13 篇 linlin shen
  • 12 篇 xiuhua li
  • 12 篇 victor c. m. leu...
  • 12 篇 wang jinbao
  • 12 篇 jianqiang li
  • 11 篇 li xiuhua
  • 11 篇 jie chen
  • 10 篇 pan jeng-shyang
  • 10 篇 xiaofei wang
  • 10 篇 abduljabbar zaid...
  • 9 篇 zhou jie
  • 9 篇 zhong ming
  • 9 篇 tian chunwei
  • 9 篇 yu jiguo
  • 9 篇 jian-tao zhou

语言

  • 1,061 篇 英文
  • 149 篇 其他
  • 14 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Big Data Institute College of Computer Science and Software Engineering"
1220 条 记 录,以下是1031-1040 订阅
排序:
Context aware 3d unet for brain tumor segmentation
arXiv
收藏 引用
arXiv 2020年
作者: Ahmad, Parvez Qamar, Saqib Shen, Linlin Saeed, Adnan National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China School of Hydropower and Information Technology Huazhong University of Science and Technology Wuhan430074 China
Deep convolutional neural network (CNN) achieves remarkable performance for medical image analysis. UNet is the primary source in the performance of 3D CNN architectures for medical imaging tasks, including brain tumo... 详细信息
来源: 评论
Iterative pseudo-labeling based adaptive copy-paste supervision for semi-supervised tumor segmentation
收藏 引用
Knowledge-Based Systems 2025年 324卷
作者: Qiangguo Jin Hui Cui Junbo Wang Changming Sun Yimiao He Ping Xuan Linlin Wang Cong Cong Leyi Wei Ran Su School of Software Northwestern Polytechnical University Shaanxi China Yangtze River Delta Research Institute of Northwestern Polytechnical University Taicang China Department of Computer Science and Information Technology La Trobe University Melbourne Australia CSIRO Data61 Sydney Australia Department of Computer Science School of Engineering Shantou University Guangdong China Shandong Cancer Hospital and Institute Shandong First Medical University and Shandong Academy of Medical Sciences Shandong China Australian Institute of Health Innovation (AIHI) Macquarie University Australia School of Software Shandong University Shandong China Centre for Artificial Intelligence driven Drug Discovery Faculty of Applied Science Macao Polytechnic University Macao Special Administrative Region of China School of Computer Software College of Intelligence and Computing Tianjin University Tianjin China
Semi-supervised learning (SSL) has attracted considerable attention in medical image processing. The latest SSL methods use a combination of consistency regularization and pseudo-labeling to achieve remarkable success...
来源: 评论
How good is query optimizer in Spark?  14th
How good is query optimizer in Spark?
收藏 引用
14th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2018
作者: Ren, Zujie Yun, Na Li, Youhuizi Wan, Jian Wang, Yuan Yu, Lihua Fan, Xinxin School of Computer Science Hangzhou Dianzi University Hangzhou China Department of Software Engineering Zhejiang University of Science and Technology Hangzhou China Key Enterprise Research Institute of NetEase Big Data of Zhejiang Province Netease Hangzhou Network Co. Ltd. Hangzhou China
In the big data community, Spark plays an important role and is used to process interactive queries. Spark employs a query optimizer, called Catalyst, to interpret SQL queries to optimized query execution plans. Catal... 详细信息
来源: 评论
Automatic Generation Method of Ancient Poetry Based on LSTM
Automatic Generation Method of Ancient Poetry Based on LSTM
收藏 引用
IEEE Conference on Industrial Electronics and Applications (ICIEA)
作者: Hanshuang Zhang Zhi Zhang College of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Wuhan China
This paper mainly focuses on the literary genre of ancient poetry with a certain rhythm and cadence, and proposes a novel automatic generation model of ancient poetry. The model uses about 300,000 Tang poems and Song ... 详细信息
来源: 评论
A spatial correlation based partial coverage scheduling scheme in wireless sensor networks
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2020年 第2期5卷 34-43页
作者: Zhang, Jing Nian, Hongrui Ye, Xiucai Ji, Xiaorong He, Yao College of Information Science and Engineering Institute of Artificial Intelligence Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology 33th Xueyuan Road University Town Minhou FuzhouFujian350118 China College of Information Science and Engineering Fujian University of Technology Fuzhou350118 China Department of Computer Science University of Tsukuba Tsukuba3058573 Japan
Wireless Sensor Networks are formed by a mass of various sensors, they are adopted in lots of applications. Because of the existence of spatial correlation in WSNs, the information from some geographic independence se... 详细信息
来源: 评论
Comparing Recommendation Algorithms in Session-based E-commerce Sites
Comparing Recommendation Algorithms in Session-based E-comme...
收藏 引用
International Conference on Intelligent Computing, Automation and Systems (ICICAS)
作者: Mingtian Peng Jiahe Zhang Shilin Wen Chi Harold Liu TravelSky Technology Limited Beijing Engineering Research Center of Civil Aviation Big Data and Key Laboratory of Intelligent Passenger Service of Civil Aviation-CAAC Beijing China College of Computer Science Beijing Institute of Technology Beijing China
Recommender systems have become widely used in various website applications. With the integration of deep learning and recommender systems, the classic Session-based Recommender System (SRS) appears, which can obtain ... 详细信息
来源: 评论
Text Cover Steganography Using Font Color of the Invisible Characters and Optimized Primary Color-intensities
Text Cover Steganography Using Font Color of the Invisible C...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Feno Heriniaina Rabevohitra Yantao Li School of Big Data and Software Engineering Chongqing University Chongqing China College of Computer Science Chongqing University Chongqing China
Text cover steganography is concerned with using text support for hiding information. Despite its long and old history, the art of cover writing is still attracting the attention of researchers in the domain of inform... 详细信息
来源: 评论
An Asymmetric Controlled Bidirectional Quantum State Transmission Protocol
收藏 引用
computers, Materials & Continua 2019年 第4期59卷 215-227页
作者: Yiru Sun Yuling Chen Haseeb Ahmad Zhanhong Wei GuiZhou University Sate Key Laboratory of Public Big DataGuizhou550025China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Department of Computer Science National Textile University Faisalabad37610Pakistan College of Information Engineering Beijing Institute of Petrochemical TechnologyBeijing102617China
In this paper,we propose an asymmetric controlled bidirectional transmission *** the protocol,by using the thirteen-qubit entangled state as the quantum channel,Alice can realize the transmission of a two-qubit equato... 详细信息
来源: 评论
Message Authentication with a New Quantum Hash Function
收藏 引用
computers, Materials & Continua 2019年 第5期59卷 635-648页
作者: Yalan Wang Yuling Chen Haseeb Ahmad Zhanhong Wei GuiZhou University State Key Laboratory of Public Big DataGuiZhou Guiyang550025China Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Department of Computer Science National Textile University Faisalabad37610Pakistan College of Information Engineering Beijing Institute of Petrochemical TechnologyBeijing102617China
To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various ***,with the computing power improving,the existing encryption and authentication schemes are bei... 详细信息
来源: 评论
Hyperspectral Image Classification-Traditional to Deep Models: A Survey for Future Prospects
arXiv
收藏 引用
arXiv 2021年
作者: Ahmad, Muhammad Shabbir, Sidrah Roy, Swalpa Kumar Hong, Danfeng Wu, Xin Yao, Jing Khan, Adil Mehmood Mazzara, Manuel Distefano, Salvatore Chanussot, Jocelyn Department of Computer Science National University of Computer and Emerging Sciences Islamabad Chiniot-Faisalabad Campus Chiniot35400 Pakistan Dipartimento di Matematica e Informatica-MIFT University of Messina Messina98121 Italy Pakistan The Department of Computer Science and Engineering Jalpaiguri Government Engineering College West Bengal 735102 India The Key Laboratory of Digital Earth Science Aerospace Information Research Institute Chinese Academy of Sciences Beijing100094 China The School of Information and Electronics Beijing Institute of Technology Beijing100081 China Beijing Key Laboratory of Fractional Signals and Systems Beijing100081 China The Institute of Data Science and Artificial Intelligence Innopolis University Innopolis 420500 Russia Institute of Software Development and Engineering Innopolis University Innopolis420500 Russia The Univ. Grenoble Alpes CNRS Grenoble INP GIPSA-Lab Grenoble38000 France
Hyperspectral Imaging (HSI) has been extensively utilized in many real-life applications because it benefits from the detailed spectral information contained in each pixel. Notably, the complex characteristics i.e., t... 详细信息
来源: 评论