咨询与建议

限定检索结果

文献类型

  • 1,209 篇 期刊文献
  • 1,152 篇 会议
  • 8 册 图书

馆藏范围

  • 2,369 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,572 篇 工学
    • 896 篇 计算机科学与技术...
    • 755 篇 软件工程
    • 412 篇 控制科学与工程
    • 272 篇 信息与通信工程
    • 243 篇 电气工程
    • 189 篇 机械工程
    • 184 篇 电子科学与技术(可...
    • 170 篇 生物工程
    • 142 篇 生物医学工程(可授...
    • 132 篇 光学工程
    • 87 篇 化学工程与技术
    • 81 篇 仪器科学与技术
    • 80 篇 动力工程及工程热...
    • 64 篇 土木工程
    • 61 篇 材料科学与工程(可...
    • 61 篇 安全科学与工程
    • 57 篇 力学(可授工学、理...
    • 57 篇 交通运输工程
  • 937 篇 理学
    • 474 篇 数学
    • 248 篇 物理学
    • 193 篇 生物学
    • 148 篇 系统科学
    • 148 篇 统计学(可授理学、...
    • 85 篇 化学
  • 392 篇 管理学
    • 244 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 64 篇 工商管理
  • 180 篇 医学
    • 146 篇 临床医学
    • 110 篇 基础医学(可授医学...
    • 72 篇 药学(可授医学、理...
  • 51 篇 法学
  • 32 篇 经济学
  • 32 篇 农学
  • 13 篇 教育学
  • 5 篇 艺术学
  • 4 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学

主题

  • 60 篇 feature extracti...
  • 45 篇 training
  • 44 篇 optimization
  • 43 篇 control systems
  • 40 篇 deep learning
  • 39 篇 educational inst...
  • 39 篇 computational mo...
  • 36 篇 image segmentati...
  • 33 篇 semantics
  • 31 篇 machine learning
  • 30 篇 robustness
  • 27 篇 neural networks
  • 26 篇 accuracy
  • 25 篇 object detection
  • 23 篇 mathematical mod...
  • 22 篇 convolution
  • 21 篇 heuristic algori...
  • 20 篇 support vector m...
  • 20 篇 forecasting
  • 19 篇 computer science

机构

  • 109 篇 college of contr...
  • 57 篇 college of compu...
  • 40 篇 fujian provincia...
  • 29 篇 college of compu...
  • 27 篇 college of compu...
  • 26 篇 college of compu...
  • 24 篇 college of compu...
  • 21 篇 school of comput...
  • 21 篇 computer enginee...
  • 21 篇 college of mecha...
  • 21 篇 department of co...
  • 21 篇 college of elect...
  • 21 篇 college of compu...
  • 20 篇 school of inform...
  • 20 篇 college of compu...
  • 20 篇 college of compu...
  • 20 篇 college of scien...
  • 19 篇 department of co...
  • 19 篇 college of compu...
  • 19 篇 school of contro...

作者

  • 37 篇 li zuoyong
  • 24 篇 abdelhameed ibra...
  • 23 篇 el-sayed m.el-ke...
  • 18 篇 abdelaziz a.abde...
  • 18 篇 zuoyong li
  • 17 篇 johansson karl h...
  • 16 篇 doaa sami khafag...
  • 14 篇 wu junfeng
  • 14 篇 teng shenghua
  • 14 篇 zhiyun lin
  • 13 篇 yang kailun
  • 13 篇 chen zengqiang
  • 13 篇 chen jiming
  • 12 篇 wang tao
  • 12 篇 zengqiang chen
  • 11 篇 zidong wang
  • 11 篇 fan haoyi
  • 11 篇 liu yong
  • 11 篇 wu zongze
  • 11 篇 minyue fu

语言

  • 2,187 篇 英文
  • 128 篇 其他
  • 46 篇 中文
  • 11 篇 日文
  • 2 篇 德文
  • 1 篇 法文
检索条件"机构=College of Computer Science and Control Engineering"
2369 条 记 录,以下是1491-1500 订阅
排序:
A differentially k-anonymity-based location privacy-preserving for mobile crowdsourcing systems
收藏 引用
Procedia computer science 2018年 129卷 28-34页
作者: Yingjie Wang Zhipeng Cai Zhongyang Chi Xiangrong Tong Lijie Li School of Computer Science and Engineering South China University of Technology Guangzhou 510006 China School of Computer and Control Engineering Yantai University Yantai 264005 China Department of Computer Science Georgia State University Atlanta 30303 USA College of Computer Science and Technology Harbin Engineering University Harbin 150001 China
With the rapid development of mobile devices, the problem privacy leaking has become an important research focus in the field of mobile crowdsourcing. In order to guarantee the security and truthfulness of mobile crow... 详细信息
来源: 评论
Loop Invariant Generation for Non-monotone Loop Structures
Loop Invariant Generation for Non-monotone Loop Structures
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Chunyan Hou Jinsong Wang Chen Chen Kai Shi School of Computer Science and Engineering Tianjin University of Technology Tianjin China College of Computer and Control Engineering Nankai University Tianjin China
A key problem in any automatic software verification system is the inference of loop invariants. When analyzing program structures involving disjunctive semantics, abstract interpretation has the problem of precision ... 详细信息
来源: 评论
An Effective Retinal Blood Vessel Segmentation by Using Automatic Random Walks Based on Centerline Extraction
收藏 引用
BioMed Research International 2020年 第0期2020卷 000-000页
作者: Gao, Jianqing Chen, Guannan Lin, Wenru Smart Home Information Collection and Processing on Internet of Things Laboratory of Digital Fujian Fujian Jiangxia University Fuzhou 350108 China School of Electronic Information Science Fujian Jiangxia University Fuzhou 350108 China Key Laboratory of OptoElectronic Science and Technology for Medicine of Ministry of Education Fujian Provincial Key Laboratory for Photonics Technology Fujian Normal University Fuzhou 350007 China Fujian Provincial Engineering Technology Research Center of Photoelectric Sensing Application Fujian Normal University Fuzhou 350117 China College of Computer and Control Engineering Minjiang University Fuzhou 350121 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou 350121 China
The retinal blood vessel analysis has been widely used in the diagnoses of diseases by ophthalmologists. According to the complex morphological characteristics of the blood vessels in normal and abnormal images, an au...
来源: 评论
SD-Unet: A Structured Dropout U-Net for Retinal Vessel Segmentation
SD-Unet: A Structured Dropout U-Net for Retinal Vessel Segme...
收藏 引用
IEEE Symposium on Bioinformatics and Bioengineering (BIBE)
作者: Changlu Guo Márton Szemenyei Yang Pei Yugen Yi Wei Zhou Department of Control Engineering and Information Technology Budapest University of Technology and Economics Budapest Hungary Budapest University of Technology and Economics Budapest Hungary School of Software Jiangxi Normal University Nanchang China College of Computer Science Shenyang Aerospace University Shenyang China
At present, artificial visual diagnosis of fundus diseases has low manual reading efficiency and strong subjectivity, which easily causes false and missed detections. Automatic segmentation of retinal blood vessels in... 详细信息
来源: 评论
An Edge Computing Platform of Guide-dog Robot for Visually Impaired
An Edge Computing Platform of Guide-dog Robot for Visually I...
收藏 引用
International Symposium on Autonomous Decentralized Systems (ISADAS)
作者: Jinhui Zhu Yinong Chen Mei Zhang Qiang Chen Ying Guo Huaqing Min Zhilie Chen School of Software Engineering South China University of Technology Guangzhou China School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe USA School of Automation Science and Control Engineering South China University of Technology Guangzhou China College of computer & information science Southwest University Chongqing China School of Information Science and Technology Qingdao University of Science and Technology Qingdao China EVOC Intelligent Technology Company Limited Shen zhen China
Information processing of guide dog robot requires expensive computing resources to meet real-time performance. We propose an edge computing framework based on Intel Up-Squared board and neural compute stick. Image pr... 详细信息
来源: 评论
Mercury-related health benefits from retrofitting coal-fired power plants in China
arXiv
收藏 引用
arXiv 2020年
作者: Li, Jiashuo Zhou, Sili Wei, Wendong Qi, Jianchuan Li, Yumeng Chen, Bin Zhang, Ning Guan, Dabo Qian, Haoqi Wu, Xiaohui Miao, Jiawen Chen, Long Liang, Sai Feng, Kuishuang Institute of Blue and Green Development Shandong University Weihai264209 State Key Laboratory of Coal Combustion School of Energy and Power Engineering Huazhong University of Science and Technology Wuhan430074 China School of International and Public Affairs Shanghai Jiao Tong University Shanghai200030 China State Key Joint Laboratory of Environment Simulation and Pollution Control School of Environment Beijing Normal University Beijing100875 China Laboratory of Anthropogenic Systems Ecology College of Engineering Peking University Beijing100871 China Department of Earth System Science Tsinghua University Beijing100871 China Institute for Global Public Policy Fudan University Shanghai200433 China School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai200093 China Key Laboratory of Geographic Information Science Ministry of Education School of Geographic Sciences East China Normal University Shanghai200241 China
China has implemented retrofitting measures in coal-fired power plants (CFPPs) to reduce air pollution through small unit shutdown (SUS), the installation of air pollution control devices (APCDs) and power generation ... 详细信息
来源: 评论
MIMO Scheduling Effectiveness Analysis for Bursty Data Service from View of QoE
收藏 引用
Chinese Journal of Electronics 2017年 第5期26卷 1079-1085页
作者: CHEN Lei JIANG Dingde BAO Rong XIONG Jiping LIU Fuqiang BEI Lulu Jiangsu Province Key Laboratory of Intelligent Industry Control Technology Xuzhou University of Technology School of Computer Science and Engineering Northeastern University College of Mathematics Physics and Information EngineeringZhejiang Normal University College of Electronics and Information Engineering Tongji University
In the user selection phrase of the conventional Multiple-input-multiple-output(MIMO) scheduling schemes,the frequent user exchange deteriorates the Quality of user experience(Qo E) of the bursty data *** the channel ... 详细信息
来源: 评论
Developing an Identity Recognition Low-cost Home Service Robot Based on Turtlebot and ROS  29
Developing an Identity Recognition Low-cost Home Service Rob...
收藏 引用
第29届中国控制与决策会议
作者: Chengguang Xu Wenyu Li Jeffrey Too Chuan TAN Zengqiang Chen Han Zhang Feng Duan College of Computer and Control Engineering Nankai University Institute of Industrial Science University of Tokyo
Aging population and disabled assistance have become serious social problems these years. However, it is impossible to make sure that every old people has a caregiver. Therefore, the home service robot is a good metho... 详细信息
来源: 评论
Using Chinese characters to generate text-based passwords for information security
arXiv
收藏 引用
arXiv 2019年
作者: Yao, Bing Mu, Yarong Sun, Yirong Sun, Hui Zhang, Xiaohui Wang, Hongyu Su, Jing Zhang, Mingjun Yang, Sihua Zhao, Meimei Wang, Xiaomin Ma, Fei Yao, Ming Yang, Chao Xie, Jianming College of Mathematics and Statistics Northwest Normal University Lanzhou730070 China School of Information Engineering Lanzhou University of Finance and Economics Lanzhou730030 China College of Science Gansu Agricultural University Lanzhou730070 China School of Electronics Engineering and Computer Science Peking University Beijing100871 China Department of Information Process and Control Engineering Lanzhou Petrochemical College of Vocational Technology Lanzhou730060 China School of Mathematics Physics & Statistics Shanghai University of Engineering Science Shanghai201620 China Department of Mathematics Lanzhou City University Lanzhou730070 China School of Electronics and Information Engineering Lanzhou Jiaotong University Lanzhou730070 China
Graphical passwords (GPWs) are in many areas of the current world, in which the two-dimensional code has been applied successfully nowadays. Topological graphic passwords (Topsnut-gpws) are a new type of cryptography,... 详细信息
来源: 评论
A New Anti-Spam Model Based on E-mail Address Concealment Technique
收藏 引用
Wuhan University Journal of Natural sciences 2018年 第1期23卷 79-83页
作者: ZHANG Yuqiang HE Jingsha XU Jing Beijing Institute of Aerospace Control Devices Beijing100039 China College of Computer Science and Technology Beijing University of Technology Beijing 100124 China School of Software Engineering Beijing University ofTechnology Beijing 100124 China Department of Automation Tsinghua University Beijing100084 China
To deal with the junk e-mail problem caused by the e-mail address leakage for a majority of Internet users, this paper presents a new privacy protection model in which the e-mail address of the user is treated as a pi... 详细信息
来源: 评论