咨询与建议

限定检索结果

文献类型

  • 960 篇 期刊文献
  • 517 篇 会议
  • 3 册 图书

馆藏范围

  • 1,480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 864 篇 工学
    • 451 篇 计算机科学与技术...
    • 355 篇 软件工程
    • 144 篇 信息与通信工程
    • 114 篇 控制科学与工程
    • 108 篇 化学工程与技术
    • 105 篇 电气工程
    • 94 篇 电子科学与技术(可...
    • 82 篇 生物工程
    • 59 篇 机械工程
    • 56 篇 生物医学工程(可授...
    • 54 篇 光学工程
    • 52 篇 动力工程及工程热...
    • 49 篇 材料科学与工程(可...
    • 45 篇 冶金工程
    • 41 篇 交通运输工程
    • 37 篇 土木工程
    • 34 篇 核科学与技术
    • 31 篇 力学(可授工学、理...
    • 28 篇 安全科学与工程
  • 742 篇 理学
    • 405 篇 物理学
    • 234 篇 数学
    • 135 篇 化学
    • 98 篇 生物学
    • 63 篇 统计学(可授理学、...
    • 46 篇 系统科学
  • 197 篇 管理学
    • 131 篇 管理科学与工程(可...
    • 66 篇 图书情报与档案管...
    • 49 篇 工商管理
  • 62 篇 医学
    • 50 篇 临床医学
    • 38 篇 基础医学(可授医学...
  • 28 篇 法学
  • 19 篇 教育学
  • 17 篇 经济学
  • 14 篇 农学
  • 4 篇 文学
  • 4 篇 军事学
  • 2 篇 艺术学
  • 1 篇 历史学

主题

  • 49 篇 hadrons
  • 26 篇 bosons
  • 24 篇 computer science
  • 24 篇 wireless sensor ...
  • 22 篇 particle decays
  • 22 篇 hadron colliders
  • 16 篇 bottom mesons
  • 16 篇 deep learning
  • 16 篇 hadronic decays
  • 15 篇 tellurium compou...
  • 14 篇 phase space meth...
  • 14 篇 authentication
  • 14 篇 monitoring
  • 14 篇 computational mo...
  • 13 篇 quantum chromody...
  • 13 篇 neural networks
  • 13 篇 algorithm design...
  • 13 篇 genetic algorith...
  • 13 篇 branching fracti...
  • 13 篇 accuracy

机构

  • 351 篇 university of ch...
  • 344 篇 iccub universita...
  • 339 篇 infn sezione di ...
  • 337 篇 department of ph...
  • 334 篇 school of physic...
  • 333 篇 infn sezione di ...
  • 331 篇 infn sezione di ...
  • 331 篇 infn sezione di ...
  • 327 篇 cavendish labora...
  • 327 篇 institute of par...
  • 326 篇 universiteit maa...
  • 326 篇 imperial college...
  • 325 篇 department of ph...
  • 322 篇 stfc rutherford ...
  • 320 篇 h.h. wills physi...
  • 320 篇 horia hulubei na...
  • 320 篇 van swinderen in...
  • 313 篇 infn sezione di ...
  • 312 篇 infn sezione di ...
  • 311 篇 infn sezione di ...

作者

  • 230 篇 barter w.
  • 229 篇 brundu d.
  • 204 篇 bellee v.
  • 201 篇 blake t.
  • 200 篇 borsato m.
  • 200 篇 betancourt c.
  • 199 篇 aliouche z.
  • 199 篇 belin s.
  • 198 篇 amato s.
  • 196 篇 birch m.
  • 196 篇 boettcher t.
  • 196 篇 atzeni m.
  • 194 篇 bowcock t.j.v.
  • 194 篇 cali s.
  • 193 篇 andreianov a.
  • 193 篇 bencivenni g.
  • 192 篇 bay a.
  • 192 篇 boyer a.
  • 191 篇 bhom j.
  • 190 篇 byczynski w.

语言

  • 1,371 篇 英文
  • 59 篇 其他
  • 48 篇 中文
  • 1 篇 日文
检索条件"机构=Department of Computer Science and Technology Hunan Vocational Institute of Safety and Technology"
1480 条 记 录,以下是1-10 订阅
排序:
Drug-Target Interactions Prediction Based on Signed Heterogeneous Graph Neural Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 231-244页
作者: Ming CHEN Yajian JIANG Xiujuan LEI Yi PAN Chunyan JI Wei JIANG College of Information Science and Engineering Hunan Normal University School of Computer Science Shaanxi Normal University Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of Sciences Computer Science Department BNU-HKBU United International College
Drug-target interactions(DTIs) prediction plays an important role in the process of drug *** computational methods treat it as a binary prediction problem, determining whether there are connections between drugs and t... 详细信息
来源: 评论
VGWO: Variant Grey Wolf Optimizer with High Accuracy and Low Time Complexity
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 1617-1644页
作者: Junqiang Jiang Zhifang Sun Xiong Jiang Shengjie Jin Yinli Jiang Bo Fan School of Information Science and Engineering Hunan Institute of Science and TechnologyYueyang414006China Department of Computer and Information Science Linköping UniversityLinköping58183Sweden Department of Safety and Quality Hunan Construction Investment GroupChangsha410004China
The grey wolf optimizer(GWO)is a swarm-based intelligence optimization algorithm by simulating the steps of searching,encircling,and attacking prey in the process of wolf *** with its advantages of simple principle an... 详细信息
来源: 评论
A Real-time Execution System of Multimodal Transformer through PIM-GPU Collaboration  24
A Real-time Execution System of Multimodal Transformer throu...
收藏 引用
61st ACM/IEEE Design Automation Conference, DAC 2024
作者: Ji, Shengyi Liu, Chubo Ding, Yan Liao, Qing Tang, Zhuo College of Information Science and Engineering Hunan University Changsha China Department of Computer Science and Technology Harbin Institute of Technology Shenzhen China
Multimodal transformer excels in various applications, but faces great challenges such as high memory consumption and limited data reuse that hinder real-time performance. To address these issues, we propose a process... 详细信息
来源: 评论
Enhancing data sovereignty to improve intelligent mobility services in smart cities
Urban Governance
收藏 引用
Urban Governance 2025年 第1期5卷 20-31页
作者: Anthony, Bokolo Sarshar, Sizarta Department of Applied Data Science Institute for Energy Technology Halden 1777 Norway Department of Computer Science and Communication Østfold University College Halden Norway Department of Risk and Safety Institute for Energy Technology Halden 1777 Norway
Smart cities aim to provide more digitalized, equitable, sustainable, and liveable cities. In smart cities data evolves as an important asset and citizens data in particular is being used to provide data-driven mobili... 详细信息
来源: 评论
Visual Transformer for Image Splicing Localization  4
Visual Transformer for Image Splicing Localization
收藏 引用
4th International Conference on Big Data and Artificial Intelligence and Software Engineering, ICBASE 2023
作者: Li, Jie Wang, Zuling Hangzhou Normal University Department of Computer Science Hangzhou China Chongqing Vocational Institute of Safety & Technology Department of Network and Information Security Chongqing China
Image splicing, a prevalent form of image tampering with potential security implications, has prompted the need for reliable models to detect and locate manipulated regions. While convolutional neural network (CNN) ba... 详细信息
来源: 评论
Implementation of Secure and Verifiable Access Control Procedures using the NTRU Cryptosystem to Store Big Data in the Cloud Environment
收藏 引用
Recent Patents on Engineering 2025年 第2期19卷 57-70页
作者: Babu B, Ravindra Saxena, Swati Widjaja, Gunawan Vinodha D, Vedha Omarov, Batyrkhan Ramaiah, Gurumurthy B. Vats, Prashant Adama Ethiopia Department of Computer Science KCG College of Technology Chennai India Universitas Krisnadwipayana Jawa Barat 13077 Indonesia Department of Electronics and Communication Engineering JCT College Of Engineering and Technology Pichanur Coimbatore India International University of Tourism and Hospitality Turkistan Kazakhstan Technical and Vocational Training Institute Addis Ababa Ethiopia Department of Computer Science and Engineering Faculty of Engineering and Technology SGT University Haryana Gurugram India
Background: Due to their complexity and size, deploying ciphertexts for clouds is considered the most useful approach to accessing large data stores. Methods: However, access to a user's access legitimacy and impr... 详细信息
来源: 评论
Unveiling the safety Aspects of DevSecOps: Evolution, Gaps and Trends
收藏 引用
Recent Advances in computer science and Communications 2023年 第3期16卷 61-69页
作者: Ramaj, Xhesika Sánchez-Gordón, Mary Chockalingam, Sabarathinam Colomo-Palacios, Ricardo Department of Computer Science and Communication Faculty of Computer Sciences Engineering and Economics Østfold University College Halden Norway Department of Risk Safety and Security Institute for Energy Technology Halden Norway
Background: The popularity of DevSecOps is on the rise because it promises to integrate a greater degree of security into software delivery pipelines. However, there is also an unacceptable risk related to safety that... 详细信息
来源: 评论
Reflecting on Integrating Team-Based Learning into Project-Based Practical Courses to Enhance Social-Emotional Learning  13th
Reflecting on Integrating Team-Based Learning into Project-B...
收藏 引用
13th International Conference on Frontier Computing, FC 2023
作者: Lin, Ching-Yao Lin, Chih-Che Graduate Institute of Technology and Vocational Education National Taipei University of Technology Taipei Taiwan Department of Computer Science Taipei Municipal Sung-Shan Vocational Industrial-Agricultural Senior High School Taipei Taiwan
Taiwan’s new 12-year basic education curriculum has been in place for four years. The development of the curriculum is based on the spirit of whole-person education, with "spontaneity, interaction, and mutual be... 详细信息
来源: 评论
Provable Data Possession with Outsourced Tag Generation for AI-Driven E-Commerce
收藏 引用
computers, Materials & Continua 2025年 第5期83卷 2719-2734页
作者: Yi Li Wenying Zheng Yu-Sheng Su Meiqin Tang School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China School of Computer Science and Technology(School of Artificial Intelligence) Zhejiang Sci-Tech UniversityHangzhou310018China Department of Computer Science and Information Engineering National Chung Cheng UniversityChiayi621301TaiwanChina Advanced Institute of Manufacturing with High-tech Innovations National Chung Cheng UniversityChiayi621301TaiwanChina Department of Computer Science and Engineering National Taiwan Ocean UniversityKeelung202301TaiwanChina School of Integrated Circuits Wuxi Vocational College of Science and TechnologyWuxi214028China
AI applications have become ubiquitous,bringing significant convenience to various *** e-commerce,AI can enhance product recommendations for individuals and provide businesses with more accurate predictions for market... 详细信息
来源: 评论
Dis-NDVW: Distributed Network Asset Detection and Vulnerability Warning Platform
收藏 引用
computers, Materials & Continua 2023年 第7期76卷 771-791页
作者: Leilei Li Yansong Wang Dongjie Zhu Xiaofang Li Haiwen Du Yixuan Lu Rongning Qu Russell Higgs Artificial Intelligence Academy Wuxi Vocational College of Science and TechnologyWuxi214068China School of Computer Science and Technology Harbin Institute of TechnologyWeihai264209China Department of Mathematics Harbin Institute of TechnologyWeihai264209China School of Astronautics Harbin Institute of TechnologyHarbin150001China School of Mathematics and Statistics University College DublinDublinDO4 V1W8Ireland
With the rapid development of Internet technology,the issues of network asset detection and vulnerability warning have become hot topics of concern in the ***,most existing detection tools operate in a single-node mod... 详细信息
来源: 评论