咨询与建议

限定检索结果

文献类型

  • 1,474 篇 会议
  • 733 篇 期刊文献
  • 19 册 图书

馆藏范围

  • 2,226 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,475 篇 工学
    • 1,089 篇 计算机科学与技术...
    • 871 篇 软件工程
    • 438 篇 信息与通信工程
    • 255 篇 控制科学与工程
    • 167 篇 生物工程
    • 162 篇 电气工程
    • 142 篇 电子科学与技术(可...
    • 124 篇 光学工程
    • 113 篇 生物医学工程(可授...
    • 112 篇 机械工程
    • 106 篇 网络空间安全
    • 82 篇 安全科学与工程
    • 77 篇 仪器科学与技术
    • 77 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 60 篇 化学工程与技术
  • 750 篇 理学
    • 419 篇 数学
    • 191 篇 物理学
    • 185 篇 生物学
    • 144 篇 统计学(可授理学、...
    • 84 篇 系统科学
    • 67 篇 化学
  • 466 篇 管理学
    • 266 篇 管理科学与工程(可...
    • 212 篇 图书情报与档案管...
    • 75 篇 工商管理
  • 113 篇 医学
    • 92 篇 临床医学
    • 90 篇 基础医学(可授医学...
    • 54 篇 药学(可授医学、理...
    • 49 篇 公共卫生与预防医...
  • 80 篇 法学
    • 55 篇 社会学
  • 46 篇 农学
  • 30 篇 经济学
  • 18 篇 教育学
  • 16 篇 军事学
  • 11 篇 文学
  • 8 篇 艺术学

主题

  • 64 篇 deep learning
  • 53 篇 accuracy
  • 46 篇 feature extracti...
  • 46 篇 machine learning
  • 44 篇 computational mo...
  • 38 篇 internet of thin...
  • 38 篇 training
  • 37 篇 convolutional ne...
  • 31 篇 data mining
  • 31 篇 real-time system...
  • 28 篇 optimization
  • 27 篇 semantics
  • 27 篇 data models
  • 25 篇 cloud computing
  • 24 篇 predictive model...
  • 22 篇 support vector m...
  • 22 篇 authentication
  • 21 篇 object detection
  • 21 篇 convolution
  • 21 篇 artificial intel...

机构

  • 66 篇 department of co...
  • 59 篇 vivekananda glob...
  • 57 篇 faculty of infor...
  • 49 篇 college of compu...
  • 45 篇 maharishi school...
  • 42 篇 hunan provincial...
  • 39 篇 department of co...
  • 36 篇 department of co...
  • 27 篇 infn e laborator...
  • 27 篇 faculty of scien...
  • 27 篇 department for p...
  • 27 篇 department of ph...
  • 27 篇 west university ...
  • 27 篇 research center ...
  • 27 篇 kirchhoff-instit...
  • 27 篇 graduate school ...
  • 27 篇 department physi...
  • 27 篇 institute of phy...
  • 27 篇 deutsches elektr...
  • 27 篇 institute of phy...

作者

  • 23 篇 c. alexa
  • 23 篇 j. m. izen
  • 23 篇 j. gao
  • 23 篇 g. bella
  • 23 篇 j. strandberg
  • 23 篇 d. calvet
  • 23 篇 c. amelung
  • 23 篇 b. konya
  • 23 篇 f. pastore
  • 23 篇 a. grummer
  • 23 篇 k. j. r. cormier
  • 23 篇 n. orlando
  • 23 篇 f. a. förster
  • 23 篇 y. tayalati
  • 23 篇 t. pham
  • 23 篇 g. spigo
  • 23 篇 v. chiarella
  • 23 篇 m. lu
  • 23 篇 f. siegert
  • 23 篇 a. e. c. coimbra

语言

  • 1,891 篇 英文
  • 299 篇 其他
  • 39 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Application and Information Technology"
2226 条 记 录,以下是301-310 订阅
排序:
A range and radial velocity measurement method based on up-chirp and down-chirp LFM signal in pulsed radar
A range and radial velocity measurement method based on up-c...
收藏 引用
IET International Radar Conference 2023, IRC 2023
作者: Chen, Hao Lei, Yi Key Lab of Aperture Array and Space Application East China Research Institute of Electronic Engineering Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Range accuracy and radial velocity accuracy are important indexes in pulsed radar. However, in pulsed radar using linear frequency modulation (LFM) pulse, the range-Doppler coupling of LFM signal will lead to large ra... 详细信息
来源: 评论
Sparse Attention-based Hierarchical Node Representation for Spatial Domain Identification
Sparse Attention-based Hierarchical Node Representation for ...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Peng, Wei Ping, Zhihao Dai, Wei Fu, Xiaodong Liu, Li Liu, Lijun Yu, Ning Kunming University of Science and Technology Faculty of Information Engineering and Automation Kunming China Computer Technology Application Key Lab of Yunnan Province Kunming University of Science and Technology Kunming China State University of New York The College at Brockport Department of Computing Sciences BrockportNY14422 United States
Using deep learning models on spatial transcriptomics data to identify the spatial domain is crucial for uncovering the spatial distribution of cells and gene expression patterns within tissues, essential for understa... 详细信息
来源: 评论
RailPC: A large-scale railway point cloud semantic segmentation dataset
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第6期9卷 1548-1560页
作者: Tengping Jiang Shiwei Li Qinyu Zhang Guangshuai Wang Zequn Zhang Fankun Zeng Peng An Xin Jin Shan Liu Yongjun Wang Jiangsu Center for Collaborative Innovation in Geographical Information Resource Development and Application Nanjing Normal UniversityNanjingChina Technology Innovation Center for Integrated Applications in Remote Sensing and Navigation Ministry of Natural ResourcesNanjingChina Eastern Institute of Technology(EIT) NingboChina Tianjin Key Laboratory of Rail Transit Navigation Positioning and Spatio-temporal Big Data Technology TianjinChina College of Computer Science and Engineering Northwest Normal UniversityLanzhouChina Mckelvey School of Engineering Washington University in St.LouisSt.LouisMissouriUSA School of Electronic and Information Engineering Ningbo University of TechnologyNingboChina
Semantic segmentation in the context of 3D point clouds for the railway environment holds a significant economic value,but its development is severely hindered by the lack of suitable and specific ***,the models train... 详细信息
来源: 评论
A Robust DL Approach for Detection of Invasive Ductal Carcinoma in Whole Slide Images using DenseNet169
A Robust DL Approach for Detection of Invasive Ductal Carcin...
收藏 引用
2024 International Conference on Communication, computer Sciences and Engineering, IC3SE 2024
作者: Menaka, C. Sharma, Sunil Naval, Preeti Brar, Khushmeen Anand, Rohit Alabdeli, Haider Pant, Shivani Department Of Computer Science And Information Technology Bangalore India Vivekananda Global University Department Of Computer Science & Application Jaipur India Maharishi University Of Information Technology Maharishi School Of Engineering & Technology Uttar Pradesh India Chandigarh University Department Of Electronics And Communication Engineering Punjab Mohali India G.B Pant Okhla-1 Campus Department Of Ece New Delhi India The Islamic University Najaf Iraq Uttaranchal University Uttaranchal Institute Of Technology Uttarakhand India
The present research introduces a deep learning method for automatically recognizing and evaluating tissue areas that correspond to invasive ductal carcinoma (IDC) in whole slide images (WSI) of breast cancer (BCa). L... 详细信息
来源: 评论
Network Security and Protection Strategies for Big Data: Challenges and Innovations  6
Network Security and Protection Strategies for Big Data: Cha...
收藏 引用
6th International Conference on Contemporary Computing and Informatics, IC3I 2023
作者: Gupta, Manish Kumar Rai, Ashok Kumar Farooq, Mansoor Santhiya, P. Madan Mohan Malaviya University of Technology Department of Information Technology & Computer Application UP Gorakhpur India Madan Mohan Malaviya University of Technology Department of Computer Science & Engineering UP Gorakhpur India University of Kashmir Department of Management Studies Jammu & Kashmir India Sathyabama Institute of Science and Technology Department of Computer Science & Engineering Tamilnadu Chennai India
The emergence of Big Data (BD) has enabled organizations to process large and intricate datasets, uncover hidden patterns, gain valuable insights, and facilitate data sharing across networks. However, the transmission... 详细信息
来源: 评论
Design and Implementation of a Game Session Plugin based on Unreal Engine  23
Design and Implementation of a Game Session Plugin based on ...
收藏 引用
8th International Conference on Cyber Security and information Engineering, ICCSIE 2023
作者: Wen, Siyao Li, Dandan Yuan, Junlong Huang, Jingbin Zhou, Long School of Computer and Information Engineering Hubei Normal University Huangshi China National Engineering Research Center of Educational Big Data Application Technology Central China Normal University Wuhan China
With the rise in popularity of multiplayer online games, efficient game network communication has become increasingly vital. This research paper presents a comprehensive design and implementation of a network session ... 详细信息
来源: 评论
RTAD-HIS: Regulated transformer architecture based anomaly detection framework towards security in healthcare IoT systems
收藏 引用
Applied Soft Computing 2025年 177卷
作者: Rai, Arun Kumar Verma, Deepak Kumar Dwivedi, Rajendra Kumar Department of Computer Science and Engineering University Institute of Engineering & Technology Chhatrapati Shahu Ji Maharaj University Kanpur India Department of Information Technology and Computer Application Madan Mohan Malaviya University of Technology Gorakhpur India
The rapid expansion of Healthcare Internet of Things (HIS) devices has transformed modern medical systems by enabling real-time patient monitoring, seamless data exchange, and automated diagnostics. However, existing ... 详细信息
来源: 评论
An Integrated Approach of Proposed Pruning Based Feature Selection Technique (PBFST) for Phishing E-mail Detection
收藏 引用
Recent Advances in computer Science and Communications 2022年 第5期15卷 683-692页
作者: Hota, Hari Shanker Sharma, Dinesh Shrivas, Akhilesh Department of Computer Science & Application Atal Bihari Vajpayee Vishwavidyalaya CG Bilaspur India Department of Business Management & Accounting University of Maryland Eastern Shore United States Department of Computer Science & Information Technology Guru Ghasidas Vishwavidyalaya CG Bilaspur India
Background: The entire world is shifting towards electronic communication through Email for fast and secure communication. Millions of people, including organization, government, and others, are using Email services. ... 详细信息
来源: 评论
A Blind Batch Encryption and Public Ledger-Based Protocol for Sharing Sensitive Data
收藏 引用
China Communications 2024年 第1期21卷 310-322页
作者: Zhiwei Wang Nianhua Yang Qingqing Chen Wei Shen Zhiying Zhang School of Computer Sciences Nanjing University of Posts and TelecommunicationsNanjing 210023China Dept.of Intelligent Science and Information Law East China University of Political Science and LawShanghai 201620China Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal UniversityHaikou 571158China State Key Laboratory of Public Big Data Guizhou UniversityGuizhou 550025China Yunnan Key Laboratory of Blockchain Application Technology Yunnan Innovation Research Institute of Beijing University of Aeronautics and AstronauticsKunming 650233
For the goals of security and privacy preservation,we propose a blind batch encryption-and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and all... 详细信息
来源: 评论
Make U-Net Greater: An Easy-to-Embed Approach to Improve Segmentation Performance Using Hypergraph
收藏 引用
computer Systems Science & Engineering 2022年 第7期42卷 319-333页
作者: Jing Peng Jingfu Yang Chaoyang Xia Xiaojie Li Yanfen Guo Ying Fu Xinlai Chen Zhe Cui Chengdu Institute of Computer Application University of Chinese Academy of SciencesChengdu610041China School of Computer Science Chengdu University of Information TechnologyChengdu610225China University of Chinese Academy of Sciences Beijing100049China Department of Experimental Rheumatology Nijmegen6525GANetherlands
semantics information while maintaining spatial detail ***-range context information plays a crucial role in this ***-ever,the traditional convolution kernel only provides the local and small size of the receptivefi***... 详细信息
来源: 评论