咨询与建议

限定检索结果

文献类型

  • 60,647 篇 会议
  • 37,201 篇 期刊文献
  • 502 册 图书

馆藏范围

  • 98,350 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 61,315 篇 工学
    • 40,463 篇 计算机科学与技术...
    • 32,712 篇 软件工程
    • 13,623 篇 信息与通信工程
    • 9,517 篇 控制科学与工程
    • 7,240 篇 电气工程
    • 6,614 篇 电子科学与技术(可...
    • 6,374 篇 生物工程
    • 5,027 篇 机械工程
    • 4,731 篇 生物医学工程(可授...
    • 4,375 篇 化学工程与技术
    • 4,337 篇 光学工程
    • 3,333 篇 动力工程及工程热...
    • 3,259 篇 仪器科学与技术
    • 3,056 篇 材料科学与工程(可...
    • 2,696 篇 网络空间安全
    • 2,258 篇 安全科学与工程
    • 2,214 篇 交通运输工程
  • 34,759 篇 理学
    • 17,113 篇 数学
    • 11,168 篇 物理学
    • 7,412 篇 生物学
    • 5,173 篇 统计学(可授理学、...
    • 4,490 篇 化学
    • 3,157 篇 系统科学
  • 17,021 篇 管理学
    • 10,731 篇 管理科学与工程(可...
    • 6,969 篇 图书情报与档案管...
    • 4,005 篇 工商管理
  • 5,151 篇 医学
    • 4,102 篇 临床医学
    • 3,390 篇 基础医学(可授医学...
    • 2,044 篇 公共卫生与预防医...
  • 2,574 篇 法学
    • 2,052 篇 社会学
  • 1,713 篇 农学
  • 1,624 篇 经济学
  • 1,094 篇 教育学
  • 471 篇 文学
  • 276 篇 军事学
  • 213 篇 艺术学
  • 23 篇 哲学
  • 16 篇 历史学

主题

  • 2,666 篇 educational inst...
  • 2,630 篇 feature extracti...
  • 2,581 篇 accuracy
  • 2,376 篇 deep learning
  • 2,272 篇 computer science
  • 1,995 篇 computational mo...
  • 1,943 篇 training
  • 1,864 篇 machine learning
  • 1,403 篇 data mining
  • 1,343 篇 predictive model...
  • 1,302 篇 support vector m...
  • 1,281 篇 optimization
  • 1,248 篇 internet of thin...
  • 1,183 篇 real-time system...
  • 1,167 篇 semantics
  • 1,058 篇 data models
  • 1,002 篇 neural networks
  • 997 篇 convolutional ne...
  • 981 篇 security
  • 916 篇 artificial intel...

机构

  • 2,526 篇 college of compu...
  • 2,468 篇 college of compu...
  • 1,172 篇 school of comput...
  • 1,154 篇 college of compu...
  • 1,047 篇 college of compu...
  • 1,023 篇 department of ph...
  • 997 篇 cavendish labora...
  • 959 篇 physikalisches i...
  • 953 篇 oliver lodge lab...
  • 802 篇 university of ch...
  • 608 篇 infn sezione di ...
  • 586 篇 infn sezione di ...
  • 562 篇 infn laboratori ...
  • 554 篇 department of ph...
  • 551 篇 fakultät physik ...
  • 548 篇 school of physic...
  • 539 篇 infn sezione di ...
  • 538 篇 horia hulubei na...
  • 534 篇 school of physic...
  • 534 篇 imperial college...

作者

  • 269 篇 barter w.
  • 246 篇 a. gomes
  • 235 篇 blake t.
  • 232 篇 c. alexa
  • 232 篇 beiter a.
  • 232 篇 s. chen
  • 231 篇 j. m. izen
  • 231 篇 j. wang
  • 228 篇 bellee v.
  • 225 篇 amato s.
  • 224 篇 g. bella
  • 224 篇 j. strandberg
  • 224 篇 d. calvet
  • 224 篇 c. amelung
  • 224 篇 betancourt c.
  • 223 篇 bencivenni g.
  • 222 篇 brundu d.
  • 222 篇 borsato m.
  • 221 篇 bowcock t.j.v.
  • 221 篇 boettcher t.

语言

  • 80,705 篇 英文
  • 15,440 篇 其他
  • 2,411 篇 中文
  • 39 篇 日文
  • 35 篇 斯洛文尼亚文
  • 30 篇 德文
  • 29 篇 法文
  • 4 篇 朝鲜文
  • 3 篇 阿拉伯文
  • 2 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=College of Computer Science and Technology Harbin University of Science and Technology"
98350 条 记 录,以下是431-440 订阅
排序:
Outer-Independent Roman Domination on Cartesian Product of Paths
收藏 引用
Journal of Mathematical Research with Applications 2025年 第1期45卷 11-19页
作者: Junzhe GUO Hong GAO Yuansheng YANG College of Science Dalian Maritime University School of Computer Science and Technology Dalian University of Technology
Outer-independent Roman domination on graphs originates from the defensive strategy of Ancient Rome, which is that if any city without an army is attacked, a neighboring city with two armies could mobilize an army to ... 详细信息
来源: 评论
A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 2741-2757页
作者: Muhammad Usman Sana Zhanli Li Tayybah Kiren Hannan Bin Liaqat Shahid Naseem Atif Saeed College of Computer Science and Technology Xi’an University of Science and TechnologyXi’anShaanxi710054China Department of Computer Science(RCET Campus) University of Engineering and TechnologyLahore39161Pakistan Department of Information Sciences Division of Science&TechnologyUniversity of EducationLahore54700Pakistan Department of Computer Science COMSATS UniversityIslamabadLahore54700Pakistan
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt... 详细信息
来源: 评论
Social Media-Based Surveillance Systems for Health Informatics Using Machine and Deep Learning Techniques:A Comprehensive Review and Open Challenges
收藏 引用
computer Modeling in Engineering & sciences 2024年 第5期139卷 1167-1202页
作者: Samina Amin Muhammad Ali Zeb Hani Alshahrani Mohammed Hamdi Mohammad Alsulami Asadullah Shaikh Institute of Computing Kohat University of Science and TechnologyKohat26000Pakistan Department of Computer Science College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia Department of Information System College of Computer Science and Information SystemsNajran UniversityNajran61441Saudi Arabia
Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic *** review discusses the current state of SM-based surv... 详细信息
来源: 评论
Prioritized Random Access Based on Compute-and-Forward
收藏 引用
China Communications 2025年 第4期22卷 254-267页
作者: Xu Yu Cui Chen Guo Qing School of Electronics and Information Engineering Harbin Institute of TechnologyHarbin 150001China National Engineering Research Center of Visual Technology School of Computer SciencePeking UniversityBeijing 100871China
In wireless networks,the prioritized transmission scheme is essential for accommodating different priority classes of users sharing a common *** this paper,we propose a prioritized random access scheme based on comput... 详细信息
来源: 评论
Correction to: Adaptive learning-enhanced lightweight network for real-time vehicle density estimation (The Visual computer, (2024), 10.1007/s00371-024-03572-3)
收藏 引用
Visual computer 2024年 第6期41卷 4393-4394页
作者: Qin, Ling-Xiao Sun, Hong-Mei Duan, Xiao-Meng Che, Cheng-Yue Jia, Rui-Sheng College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
Correction: The Visual computer https://***/10.1007/s00371-024-03572-3 The publication of this article unfortunately contained mistakes. Figure 3 was not correct. The corrected figure is given below. Wrong figure...
来源: 评论
Biomedically Informed ECG Synthesis: Customizing Cardiac Cycle Phases with Diffusion Model
Biomedically Informed ECG Synthesis: Customizing Cardiac Cyc...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Lin, Yuxin Ma, Jing Wang, Wei Wu, Zhihao Dong, Suyu Luo, Gongning Wang, Kuanquan Harbin Institute of Technology School of Computer Science and Technology Shenzhen China Northeast Forestry University College of Computer and Control Engineering Harbin China Harbin Institute of Technology Faculty of Computing Harbin China
Cardiovascular diseases are a major global health challenge, with electrocardiography (ECG) being critical for diagnosis and monitoring. As artificial intelligence and automated ECG diagnostic technologies rapidly adv... 详细信息
来源: 评论
DACSC: Secure Authentication Protocol Based on Dynamic Authentication Credentials and IntelSGX in Cloud Computing Environments
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2023年 第3期8卷 948-964页
作者: Ni, Lina Ni, Boguang Tang, Yuncan Zhang, Jinquan College of Computer Science and Engineering Shandong University of Science and Technology Qingdao266590 China
Cloud computing is a new super computing paradigm, which has greatly changed the way users store and process data. Meanwhile, with the prosperity of cloud computing, there are many hidden dangers in data privacy and s... 详细信息
来源: 评论
A Note on Approximating Weighted Nash Social Welfare with Additive Valuations  51
A Note on Approximating Weighted Nash Social Welfare with Ad...
收藏 引用
51st International Colloquium on Automata, Languages, and Programming, ICALP 2024
作者: Feng, Yuda Li, Shi Department of Computer Science and Technology Harbin Institute of Technology Heilongjiang China Department of Computer Science and Technology Nanjing University Jiangsu China
We give the first O(1)-approximation for the weighted Nash Social Welfare problem with additive valuations. The approximation ratio we obtain is e1/e + ϵ ≈ 1.445 + ϵ, which matches the best known approximation ratio ... 详细信息
来源: 评论
Optimized Visual Recognition Through a Deep Convolutional Neural Network With Hierarchical Modular Organization
收藏 引用
IEEE Access 2024年 12卷 95517-95528页
作者: Clinton Sitepu, Ade Liu, Chuan-Ming National Taipei University of Technology College of Electrical Engineering and Computer Science Taipei10608 Taiwan National Taipei University of Technology Department of Computer Science and Information Engineering Taipei10608 Taiwan
Artificial Intelligence, including machine learning and deep convolutional neural networks (DCNNs), relies on complex algorithms and neural networks to process and analyze data. DCNNs for visual recognition often requ... 详细信息
来源: 评论
Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 2727-2740页
作者: Maryam Alhassan Abdul Raouf Khan Department of Computer Science College of Computer Science and Information TechnologyKing Faisal UniversityAlahssa31982Kingdom of Saudi Arabia
Preserving privacy is imperative in the new unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)architecture to ensure that sensitive information is protected and kept secure throughout the ***,efficiency ... 详细信息
来源: 评论