咨询与建议

限定检索结果

文献类型

  • 2,428 篇 会议
  • 2,214 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 4,651 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,102 篇 工学
    • 1,519 篇 计算机科学与技术...
    • 1,292 篇 软件工程
    • 765 篇 控制科学与工程
    • 505 篇 信息与通信工程
    • 491 篇 电气工程
    • 378 篇 电子科学与技术(可...
    • 344 篇 机械工程
    • 316 篇 化学工程与技术
    • 293 篇 生物工程
    • 252 篇 生物医学工程(可授...
    • 210 篇 光学工程
    • 203 篇 仪器科学与技术
    • 180 篇 环境科学与工程(可...
    • 174 篇 动力工程及工程热...
    • 148 篇 材料科学与工程(可...
    • 110 篇 土木工程
    • 104 篇 安全科学与工程
    • 94 篇 交通运输工程
  • 1,837 篇 理学
    • 836 篇 数学
    • 517 篇 物理学
    • 350 篇 生物学
    • 290 篇 化学
    • 272 篇 系统科学
    • 249 篇 统计学(可授理学、...
  • 673 篇 管理学
    • 429 篇 管理科学与工程(可...
    • 231 篇 图书情报与档案管...
    • 117 篇 工商管理
  • 281 篇 医学
    • 234 篇 临床医学
    • 180 篇 基础医学(可授医学...
    • 116 篇 药学(可授医学、理...
  • 83 篇 法学
  • 78 篇 农学
  • 65 篇 经济学
  • 30 篇 教育学
  • 9 篇 军事学
  • 8 篇 艺术学
  • 4 篇 文学
  • 1 篇 哲学

主题

  • 120 篇 feature extracti...
  • 94 篇 educational inst...
  • 81 篇 control systems
  • 76 篇 optimization
  • 74 篇 computational mo...
  • 68 篇 training
  • 63 篇 deep learning
  • 62 篇 mathematical mod...
  • 60 篇 semantics
  • 58 篇 robustness
  • 55 篇 accuracy
  • 54 篇 neural networks
  • 44 篇 image segmentati...
  • 41 篇 support vector m...
  • 40 篇 visualization
  • 40 篇 heuristic algori...
  • 38 篇 object detection
  • 38 篇 algorithm design...
  • 38 篇 machine learning
  • 36 篇 stability analys...

机构

  • 253 篇 college of compu...
  • 103 篇 college of contr...
  • 102 篇 college of compu...
  • 90 篇 college of compu...
  • 80 篇 college of compu...
  • 61 篇 college of compu...
  • 56 篇 college of artif...
  • 52 篇 fujian provincia...
  • 43 篇 nankai universit...
  • 42 篇 university of ch...
  • 42 篇 school of contro...
  • 37 篇 college of envir...
  • 37 篇 tsinghua univers...
  • 35 篇 university of sc...
  • 34 篇 college of elect...
  • 33 篇 school of comput...
  • 32 篇 china institute ...
  • 32 篇 pakistan institu...
  • 31 篇 chongqing univer...
  • 31 篇 yerevan physics ...

作者

  • 45 篇 li zuoyong
  • 43 篇 zengqiang chen
  • 42 篇 chen zengqiang
  • 25 篇 chen yu
  • 24 篇 cao jun
  • 24 篇 clementi catia
  • 24 篇 busto jose
  • 24 篇 el-sayed m.el-ke...
  • 24 篇 cammi antonio
  • 24 篇 dmitrievsky serg...
  • 24 篇 gonchar maxim
  • 24 篇 antonelli vito
  • 24 篇 brigatti augusto
  • 24 篇 fang jian
  • 24 篇 cao chuanya
  • 24 篇 druillole frédér...
  • 24 篇 gong hui
  • 24 篇 cao guofu
  • 24 篇 fan lei
  • 24 篇 gornushkin yuri

语言

  • 4,384 篇 英文
  • 150 篇 其他
  • 116 篇 中文
  • 7 篇 德文
  • 7 篇 法文
  • 6 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=College of Computer and Control Engineering Nankai University"
4651 条 记 录,以下是31-40 订阅
排序:
Deep Learning Algorithm for Person Re-Identification Based on Dual Network Architecture
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2889-2905页
作者: Meng Zhu Xingyue Wang Honge Ren Abeer Hakeem Linda Mohaisen College of Information Engineering Harbin UniversityHarbin150086China Heilongjiang Provincial Key Laboratory of the Intelligent Perception and Intelligent Software Harbin UniversityHarbin150086China College of Computer and Control Engineering Northeast Forestry UniversityHarbin150040China Heilongjiang Forestry Intelligent Equipment Engineering Research Center Northeast Forestry UniversityHarbin150040China Faculty of Computing and Information Technology King Abdulaziz UniversityJeddah21589Saudi Arabia
Changing a person’s posture and low resolution are the key challenges for person re-identification(ReID)in various deep learning *** this paper,we introduce an innovative architecture using a dual attention network t... 详细信息
来源: 评论
Exploring NetGPT-enabled Dynamic Resource Management for Mobile D2D in Industrial IoT
收藏 引用
IEEE Network 2025年 第3期39卷 37-46页
作者: Chen, Baotong Liang, Haiquan Wan, Jiafu Wang, Chuangjian Yan, Xuguo Xia, Xuhui Alqahtani, Salman A. Wuhan University of Science and Technology Key Laboratory of Metallurgical Equipment and Control Technology Ministry of Education Wuhan430081 China Wuhan University of Science and Technology Hubei Key Laboratory of Mechanical Transmission and Manufacturing Engineering Wuhan430081 China South China University of Technology School of Mechanical & Automotive Engineering Guangzhou510641 China King Saud University College of Computer and Information Sciences Computer Engineering Department Riyadh17748 Saudi Arabia
AI large model-centered intelligent applications holds promises to revolutionize network quality of service (QoS). therefore, the deployment and utilization of such models in the Industrial Internet of Things (Industr... 详细信息
来源: 评论
Adjacency-Aware Fuzzy Label Learning for Skin Disease Diagnosis
收藏 引用
IEEE Transactions on Fuzzy Systems 2025年 第5期33卷 1429-1440页
作者: Zhou, Murong Zuo, Baifu Wang, Guohua Luo, Gongning Li, Fanding Dong, Suyu Wang, Wei Wang, Kuanquan Li, Xiangyu Xu, Lifeng Quzhou People's Hospital Quzhou Affiliated Hospital of Wenzhou Medical University Quzhou324000 China Northeast Forestry University College of Computer and Control Engineering Harbin150040 China Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Harbin Institute of Technology Shenzhen518000 China
Automatic acne severity grading is crucial for the accurate diagnosis and effective treatment of skin diseases. However, the acne severity grading process is often ambiguous due to the similar appearance of acne with ... 详细信息
来源: 评论
Security Offloading Scheduling and Caching Optimization Algorithm in UAV Edge Computing
收藏 引用
IEEE Systems Journal 2025年 第1期19卷 96-106页
作者: Qiu, Jianli Kuang, Zhufang Huang, Zhenqi Lin, Siyu Central South University of Forestry and Technology College of Computer and Mathematics Changsha410004 China Beijing Jiaotong University School of Electronic and Information Engineering Beijing100044 China Beijing Jiaotong University State Key Laboratory of Rail Traffic Control and Safety Beijing100044 China
Mobile edge computing, a prospective wireless communication framework, can contribute to offload a large number of tasks to unmanned aerial vehicle (UAV) mobile edge servers. Besides, the demand for server computation... 详细信息
来源: 评论
An efficient and high-performance WSNs restoration algorithm for fault nodes based on FT in data aggregation scheduling
收藏 引用
International Journal of Cognitive Computing in engineering 2025年 6卷 508-515页
作者: Li, Cheng Zhang, Guoyin College of Computer Science and Technology Harbin Engineering University Heilongjiang Harbin150001 China College of Computer and Control Engineering Qiqihar University Heilongjiang Qiqihar161006 China
In wireless sensor networks(WSNs), data aggregation effectively reduces network traffic, thereby reducing energy consumption and improving network life cycle. Nevertheless, in the process of data aggregation schedulin... 详细信息
来源: 评论
BlockWhisper: A Blockchain-Based Hybrid Covert Communication Scheme with Strong Ability to Evade Detection  24th
BlockWhisper: A Blockchain-Based Hybrid Covert Communication...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Wu, Zehui Xu, Yuwei Huang, Ranfeng Fan, Xinhe Xu, Jingdong Cheng, Guang School of Cyber Science and Engineering Southeast University Nanjing China Purple Mountain Laboratories for Network and Communication Security Nanjing China Engineering Research Center of Blockchain Application Supervision and Management Nanjing China Software College Northeastern University Shenyang China College of Computer Science Nankai University Tianjin China
In light of the pervasive significance of privacy protection in contemporary society, the exploration of covert communication technology has been extensive, which is designed to safeguard communication behaviors and c... 详细信息
来源: 评论
Optimization of Magnetic Couplers in Wireless Charging Systems Using the Surrogate Model
收藏 引用
IEEE Journal of Emerging and Selected Topics in Power Electronics 2025年
作者: Li, Zhenjie Li, Xianzhen Yuan, Dechun Zhang, Jiawei Liu, Yiqi Northeast Forestry University College of Computer and Control Engineering Harbin150040 China
This article proposes a general and efficient surrogate model-based parameter optimization method, consisting of the Taguchi method, finite element method (FEM) simulation, genetic algorithm-backpropagation (GA-BP) ne... 详细信息
来源: 评论
Research on detecting internal trunk-boring insects in living trees based on BP-UNet
收藏 引用
Nondestructive Testing and Evaluation 2025年
作者: Zhou, Hongwei Xia, Bo Liu, Guoyang Zhou, Hongju College of Computer and Control Engineering Northeast Forestry University Harbin China Electronic Engineering College Heilongjiang University Harbin China
The invasion of trunk-boring insects halts tree growth and causes tree death, making it a key factor in forest destruction. To address the issue of low detection accuracy due to the small size and high concealment of ... 详细信息
来源: 评论
Analysis of Subsynchronous Oscillations Caused by Interactions of DFIG-Based Farms and SVGs
收藏 引用
IEEE Transactions on Power Systems 2025年 第2期40卷 1570-1582页
作者: Li, Kejiang Chen, Wuhui Qin, Wei Li, Canbing Qin, Wenping Qiu, Jing Guo, Xiaolong Chang, Xiqiang Liu, Defu College of Electrical and Power Engineering Taiyuan030024 China Shanghai Jiao Tong University School of Electronic Information and Electrical Engineering Shanghai200240 China The University of Sydney School of Electrical and Computer Engineering SydneyNSW2006 Australia State Grid Xinjiang Electrical Power Company Ltd. Xinjiang Control Center for Power Dispatching Wulumuqi830002 China
The static var generators (SVGs) installed at the point of common coupling (PCC) of wind farms can significantly impact the sub-synchronous oscillation (SSO) performance of the power system with grid-connected wind fa... 详细信息
来源: 评论
An Adaptive Fuzzy SIR Model for Real-Time Malware Spread Prediction in Industrial Internet of Things Networks
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Zheng, Yan Na, Zhenyu Ji, Weidong Lu, Yang Harbin Normal University College of Computer and Information Engineering Harbin150010 China Northeast Forestry University College of Computer and Control Engineering Harbin150010 China
The Industrial Internet of Things (IIoT) networks serve as the foundational infrastructure for real-time communication and data exchange in smart manufacturing. Predicting the spread of malware within IIoT networks is... 详细信息
来源: 评论