咨询与建议

限定检索结果

文献类型

  • 862 篇 会议
  • 810 篇 期刊文献

馆藏范围

  • 1,672 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,105 篇 工学
    • 705 篇 计算机科学与技术...
    • 587 篇 软件工程
    • 238 篇 信息与通信工程
    • 148 篇 控制科学与工程
    • 135 篇 生物工程
    • 122 篇 电气工程
    • 109 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 90 篇 核科学与技术
    • 80 篇 机械工程
    • 77 篇 生物医学工程(可授...
    • 53 篇 仪器科学与技术
    • 50 篇 化学工程与技术
    • 44 篇 材料科学与工程(可...
    • 35 篇 网络空间安全
    • 34 篇 动力工程及工程热...
    • 31 篇 交通运输工程
  • 709 篇 理学
    • 330 篇 物理学
    • 281 篇 数学
    • 148 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 52 篇 化学
    • 41 篇 系统科学
  • 265 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 127 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 66 篇 医学
    • 50 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 40 篇 法学
    • 34 篇 社会学
  • 20 篇 经济学
  • 20 篇 教育学
  • 19 篇 农学
  • 9 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 100 篇 hadron colliders
  • 50 篇 deep learning
  • 37 篇 semantics
  • 33 篇 feature extracti...
  • 32 篇 training
  • 29 篇 w & z bosons
  • 28 篇 higgs bosons
  • 26 篇 data mining
  • 24 篇 computational mo...
  • 23 篇 graph neural net...
  • 22 篇 machine learning
  • 20 篇 accuracy
  • 20 篇 data models
  • 18 篇 convolutional ne...
  • 17 篇 object detection
  • 17 篇 convolution
  • 16 篇 semantic segment...
  • 16 篇 relativistic hea...
  • 16 篇 computer vision
  • 16 篇 forecasting

机构

  • 140 篇 irfu cea univers...
  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 126 篇 charles universi...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 122 篇 infn sezione di ...
  • 122 篇 department of ph...
  • 121 篇 imperial college...
  • 121 篇 university of de...
  • 119 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 1,552 篇 英文
  • 88 篇 其他
  • 35 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Technology Application Key Laboratory"
1672 条 记 录,以下是171-180 订阅
排序:
Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computing  16th
Research on Highly Secure Metaverse Based on Extended Realit...
收藏 引用
16th EAI International Conference on Wireless Internet, WiCON 2023
作者: Fu, Jinrong Liu, Yiwen Yan, Haobo Yang, Yahui Peng, Ling Shi, Yuanquan Feng, Tao School of Computer and Artificial Intelligence Huaihua University Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China School of Foreign Languages Huaihua University Huaihua418000 China
With the explosion of ChatGPT, the development of artificial intelligence technology ushered in another explosion. Similarly, with the rapid development of extended reality technology and Internet of Things technology... 详细信息
来源: 评论
ARF-NET:Method of spinal segmentation in deformed spine radiographs  11
ARF-NET:Method of spinal segmentation in deformed spine radi...
收藏 引用
11th International Conference on Information Systems and Computing technology, ISCTech 2023
作者: Lin, XiaTian Liu, Yingli Shen, Tao Gao, Ming Kunming University of Science and Technology Faculty of Information Engineering and Automation Kunming650093 China Kunming University of Science and Technology Yunnan Key Laboratory of Computer Technologies Application Kunming650500 China The First People's Hospital of Yunnan Province Kunming650500 China
Deformed spine radiograph spine segmentation can help doctors to analyze the disease site faster, which is a necessary part of the current development of competent healthcare. For scoliosis diagnosis, this paper desig... 详细信息
来源: 评论
A Stronger Leakage Model Based on Conditional Generative Adversarial Networks for Correlation Power Analysis
收藏 引用
International Journal of Circuit Theory and applications 2025年 第0期
作者: Tang, Cheng Li, Lang Ou, Yu College of Computer Science and Technology Hengyang Normal University Hengyang China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University Hengyang China
Deep learning-based side-channel attacks (DL-SCA) have attracted widespread attention in recent years, and most of the researchers are devoted to finding the optimal DL-SCA method. At the same time, traditional SCA me... 详细信息
来源: 评论
Intelligent Logistics Service Quality Assurance Mechanism Based on Federated Collaborative Cache in 5G+ Edge Computing Environment  16th
Intelligent Logistics Service Quality Assurance Mechanism Ba...
收藏 引用
16th EAI International Conference on Wireless Internet, WiCON 2023
作者: Liu, Yiwen Fu, Jinrong Zhao, Zikai Yang, Yahui Peng, Ling Qu, Taiguo Feng, Tao School of Computer and Artificial Intelligence Huaihua University Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China School of Foreign Languages Huaihua University Huaihua418000 China
Aiming at the problem of quality assurance of intelligent logistics service in 5G+ edge computing environment, this paper proposes a mechanism based on federated cooperative cache, which aims to utilize the computing ... 详细信息
来源: 评论
A New Image Encryption Strategy Based on Arnold Transformation and Logistic Map  11th
A New Image Encryption Strategy Based on Arnold Transformati...
收藏 引用
11th International Conference on computer Engineering and Networks, CENet2021
作者: Sun, Xiyu Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Aiming at the problem of digital image encryption, an image encryption algorithm is proposed. The algorithm is divided into preparation stage and permutation diffusion stage. In the preparation stage, Arnold algorithm... 详细信息
来源: 评论
Exploration and Practice of Course Homework Metaverse Based on Extended Reality Under Edge Computing  1
收藏 引用
3rd EAI International Conference on Edge Computing and IoT, EAI ICECI 2022
作者: Fu, Jinrong Liu, Yiwen Yan, Haobo Gao, Yanxia Xiao, Jianhua School of Computer and Artificial Intelligence Huaihua University Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China
The metaverse originated from science fiction at first, but it gradually came into reality with the continuous power of technology. Aiming at the problems of course work in Chinese universities, such as its function i... 详细信息
来源: 评论
Prediction for Surface Subsidence of Shield Construction in Water-Rich Sand Egg Stratum Based on Edge Intelligence  1
收藏 引用
3rd EAI International Conference on Edge Computing and IoT, EAI ICECI 2022
作者: Gao, Yanxia Liu, Yiwen Mi, Chunqiao Tang, Pengju Shi, Yuanquan School of Computer and Artificial Intelligence Huaihua University Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China
The refinement and intelligent control of shield tunneling is the development trend of modern tunnel construction technology. In order to better predict and control the surface subsidence caused by shield excavation, ... 详细信息
来源: 评论
A new S-box construction method meeting strict avalanche criterion
A new S-box construction method meeting strict avalanche cri...
收藏 引用
作者: Li, Lang Liu, Jinggen Guo, Ying Liu, Botao College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
S-box is the main security component in lightweight block ciphers. Finding new algorithms and technical applications to generate S-box is still a current research topic. We proposed an S-box construction method that s... 详细信息
来源: 评论
A New Encryption Scheme Based on RSA Encryption Algorithm and Chen Chaotic System  12th
A New Encryption Scheme Based on RSA Encryption Algorithm an...
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: He, Chenchen Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Nowadays the security of images is obviously more important. Some scholars have applied Rivest-Shamir-Adleman (RSA) algorithm and Chen chaotic system to image encryption. However, the application of the two methods in... 详细信息
来源: 评论
A Hybrid Blockchain Scheme for Tracing Manufacturing Processes and Trading Transactions  22
A Hybrid Blockchain Scheme for Tracing Manufacturing Process...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with applications, ISPA 2024
作者: Yuan, Ye Yang, Mingxing Xiong, Ruoting Sun, Yani Zhang, Xianchao Ren, Wei HuBei Land Resources Vocational College China China University of Geosciences Gemological Institute Wuhan China University of East Anglia School of Computing Science United Kingdom Yunnan Innovation Institute Beihang University Yunnan Key Laboratory of Blockchain Application Technology Kunming China Jiaxing University Key Laboratory of Medical Electronics and Digital Health of Zhejiang Province Jiaxing China State Key Laboratory of Geo-Information Engineering Key Laboratory of Surveying and Mapping Science and Geospatial Information Technology Mnr Beijing China Ministry of Education China China University of Geosciences School of Computer Science Wuhan China
Blockchain can be envisioned as an enabling framework in terms of cryptography and distributed computing to construct trusted data records among un-trusted users. It can be applied in two typical scenarios - historica... 详细信息
来源: 评论