咨询与建议

限定检索结果

文献类型

  • 60,075 篇 会议
  • 36,792 篇 期刊文献
  • 502 册 图书

馆藏范围

  • 97,369 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 60,626 篇 工学
    • 39,834 篇 计算机科学与技术...
    • 32,384 篇 软件工程
    • 13,247 篇 信息与通信工程
    • 9,118 篇 控制科学与工程
    • 6,953 篇 电气工程
    • 6,496 篇 电子科学与技术(可...
    • 6,346 篇 生物工程
    • 4,914 篇 机械工程
    • 4,685 篇 生物医学工程(可授...
    • 4,307 篇 化学工程与技术
    • 4,236 篇 光学工程
    • 3,247 篇 动力工程及工程热...
    • 3,194 篇 仪器科学与技术
    • 3,026 篇 材料科学与工程(可...
    • 2,519 篇 网络空间安全
    • 2,154 篇 安全科学与工程
    • 2,106 篇 交通运输工程
  • 34,407 篇 理学
    • 16,991 篇 数学
    • 11,044 篇 物理学
    • 7,358 篇 生物学
    • 5,142 篇 统计学(可授理学、...
    • 4,396 篇 化学
    • 3,147 篇 系统科学
  • 16,708 篇 管理学
    • 10,504 篇 管理科学与工程(可...
    • 6,860 篇 图书情报与档案管...
    • 3,970 篇 工商管理
  • 4,974 篇 医学
    • 4,036 篇 临床医学
    • 3,349 篇 基础医学(可授医学...
    • 2,013 篇 药学(可授医学、理...
  • 2,507 篇 法学
    • 1,993 篇 社会学
  • 1,686 篇 农学
  • 1,608 篇 经济学
  • 1,078 篇 教育学
  • 431 篇 文学
  • 275 篇 军事学
  • 212 篇 艺术学
  • 23 篇 哲学
  • 16 篇 历史学

主题

  • 2,666 篇 educational inst...
  • 2,597 篇 feature extracti...
  • 2,538 篇 accuracy
  • 2,295 篇 deep learning
  • 2,274 篇 computer science
  • 1,984 篇 computational mo...
  • 1,918 篇 training
  • 1,806 篇 machine learning
  • 1,396 篇 data mining
  • 1,327 篇 predictive model...
  • 1,296 篇 support vector m...
  • 1,257 篇 optimization
  • 1,234 篇 internet of thin...
  • 1,166 篇 real-time system...
  • 1,163 篇 semantics
  • 1,052 篇 data models
  • 990 篇 neural networks
  • 976 篇 convolutional ne...
  • 961 篇 security
  • 895 篇 image segmentati...

机构

  • 2,517 篇 college of compu...
  • 2,448 篇 college of compu...
  • 1,167 篇 school of comput...
  • 1,146 篇 college of compu...
  • 1,038 篇 college of compu...
  • 1,026 篇 department of ph...
  • 999 篇 cavendish labora...
  • 960 篇 physikalisches i...
  • 953 篇 oliver lodge lab...
  • 791 篇 university of ch...
  • 608 篇 infn sezione di ...
  • 586 篇 infn sezione di ...
  • 562 篇 infn laboratori ...
  • 554 篇 department of ph...
  • 551 篇 fakultät physik ...
  • 550 篇 school of physic...
  • 539 篇 infn sezione di ...
  • 538 篇 horia hulubei na...
  • 534 篇 school of physic...
  • 534 篇 imperial college...

作者

  • 269 篇 barter w.
  • 246 篇 a. gomes
  • 236 篇 beiter a.
  • 235 篇 blake t.
  • 232 篇 c. alexa
  • 232 篇 s. chen
  • 231 篇 j. m. izen
  • 231 篇 j. wang
  • 228 篇 bellee v.
  • 225 篇 amato s.
  • 224 篇 g. bella
  • 224 篇 j. strandberg
  • 224 篇 d. calvet
  • 224 篇 c. amelung
  • 224 篇 betancourt c.
  • 223 篇 bencivenni g.
  • 222 篇 brundu d.
  • 222 篇 borsato m.
  • 221 篇 bowcock t.j.v.
  • 221 篇 boettcher t.

语言

  • 84,139 篇 英文
  • 10,990 篇 其他
  • 2,332 篇 中文
  • 39 篇 日文
  • 28 篇 德文
  • 28 篇 斯洛文尼亚文
  • 26 篇 法文
  • 4 篇 朝鲜文
  • 2 篇 阿拉伯文
  • 2 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=College of Computer Science and Technology Harbin University of Science and Technology"
97369 条 记 录,以下是211-220 订阅
排序:
Enhancing strength-ductility synergy in high-Mn steel by tuning stacking fault energy via precipitation
收藏 引用
Journal of Materials science & technology 2024年 第20期187卷 240-247页
作者: Hao Cheng Lixin Sun Wentao Li Yang Zhang Ye Cui Dan Chen Zhongwu Zhang Key Laboratory of Superlight Materials and Surface Technology Ministry of EducationCollege of Materials Science and Chemical EngineeringHarbin Engineering UniversityHarbin 150001China
Deformation-induced twinning or martensitic transformation can improve the work-hardening capabil-ity of alloys with face-centered cubic(FCC)structures and suppress strain *** stacking fault energy(SFE)of alloys plays... 详细信息
来源: 评论
Memory-efficient detection of large-scale obfuscated malware
收藏 引用
International Journal of Wireless and Mobile Computing 2024年 第1期26卷 48-60页
作者: Wang, Yueming Zhang, Meng College of Computer Science and Technology Jilin University Jilin Changchun China
Obfuscation techniques are frequently used in malicious programs to evade detection. However, current effective methods often require much memory space during training. This paper proposes a machine-learning-based sol... 详细信息
来源: 评论
Distribution,enrichment mechanism and risk assessment for fluoride in groundwater:a case study of Mihe-Weihe River Basin,China
收藏 引用
Frontiers of Environmental science & Engineering 2023年 第6期17卷 63-83页
作者: Xingyue Qu Peihe Zhai Longqing Shi Xingwei Qu Ahmer Bilal Jin Han Xiaoge Yu College of Earth Science and Engineering Shandong University of Science and TechnologyQingdao 266590China College of Safety and Environmental Engineering Shandong University of Science and TechnologyQingdao 266590China College of Computer Science and Engineering Shandong University of Science and TechnologyQingdao 266590China Department of Resource and Civil Engineering Shandong University of Science and TechnologyTai'an 271019China
Due to the unclear distribution characteristics and causes of fluoride in groundwater of Mihe-Weihe River Basin(China),there is a higher risk for the future development and utilization of ***,based on the systematic s... 详细信息
来源: 评论
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid Badr Almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 评论
Refractory high-entropy alloys with ultra-high strength and strain hardening ability induced by heterogeneous deformation and microbands
收藏 引用
Journal of Materials science & technology 2024年 第25期192卷 215-227页
作者: Yaxi Ma Yang Zhang Lixin Sun Zhongwu Zhang Key Laboratory of Superlight Materials and Surface Technology Ministry of EducationCollege of Materials Science and Chemical EngineeringHarbin Engineering UniversityHarbin 150001China
Refractory high-entropy alloys(RHEAs)are potential materials for high-temperature structural applica-tions due to their excellent high-temperature ***,the early onset of plastic instability in RHEAs is a critical issu... 详细信息
来源: 评论
Microstructure Recrystallization and Mechanical Properties of a Cold-Rolled TiNbZrTaHf Refractory High-Entropy Alloy
收藏 引用
Acta Metallurgica Sinica(English Letters) 2024年 第4期37卷 633-647页
作者: Chuan Rong Jieren Yang Xiaoliang Zhao Ke Huang Ying Liu Xiaohong Wang Dongdong Zhu Ruirun Chen College of Materials Science and Engineering Sichuan UniversityChengdu610065China Key Laboratory of Air-Driven Equipment Technology of Zhejiang Province Quzhou UniversityQuzhou324000China School of Materials Science and Engineering Harbin Institute of TechnologyHarbin150001China
The equiatomic TiNbZrTaHf alloy was successfully rolled at room temperature with the reduction of ~ 85%. The microstructure and tensile properties were investigated after cold working and annealing. It was determined ... 详细信息
来源: 评论
Improved PBFT Consensus Algorithm Based on Threshold Signature and RabbitMQ
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2024年 第3期9卷 1476-1490页
作者: Xu, Xiang Liu, Chun-Yuan School of Computer and Information Engineering Heilongjiang University of Science and Technology Harbin Heilongjiang150022 China
Due to its decentralized and tamper-proof features, blockchain is frequently employed in the financial, traceability, and distributed storage industries. The agreement algorithm, which is a crucial component of the bl... 详细信息
来源: 评论
Frequency-aware Generative Models for Multivariate Time Series Imputation  38
Frequency-aware Generative Models for Multivariate Time Seri...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Yang, Xinyu Sun, Yu Yuan, Xiaojie Chen, Xinyang College of Computer Science DISSec Nankai University China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
Missing data in multivariate time series are common issues that can affect the analysis and downstream applications. Although multivariate time series data generally consist of the trend, seasonal and residual terms, ...
来源: 评论
Identification for the Low-Contrast Image Signal with Regularized Variational Term and Dynamical Saturating Nonlinearity
收藏 引用
Journal of Systems science & Complexity 2023年 第3期36卷 1089-1102页
作者: ZHANG Ning MA Yumei PAN Zhenkuan HUANG Baoxiang WANG Dongcheng College of Computer Science&Technology Qingdao UniversityQingdao 266071China
In recent years,image processing based on stochastic resonance(SR)has received more and more *** this paper,a new model combining dynamical saturating nonlinearity with regularized variational term for enhancement of ... 详细信息
来源: 评论
Directional nearest neighbor query method for specified geographical direction space based on Voronoi diagram
收藏 引用
High technology Letters 2022年 第2期28卷 122-133页
作者: LI Song SONG Shuang HAO Xiaohong ZHANG Liping College of Computer Science and Technology Harbin University of Science and TechnologyHarbin 150080P.R.China
The existing nearest neighbor query methods cannot directly perform the nearest neighbor query of specified geographical direction *** order to compensate the shortcomings of the existing methods,a directional nearest... 详细信息
来源: 评论