咨询与建议

限定检索结果

文献类型

  • 13,632 篇 期刊文献
  • 11,653 篇 会议
  • 97 册 图书
  • 1 篇 科技报告

馆藏范围

  • 25,383 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,059 篇 工学
    • 9,868 篇 计算机科学与技术...
    • 8,286 篇 软件工程
    • 3,176 篇 信息与通信工程
    • 2,209 篇 生物工程
    • 1,994 篇 控制科学与工程
    • 1,862 篇 电气工程
    • 1,665 篇 生物医学工程(可授...
    • 1,446 篇 电子科学与技术(可...
    • 1,384 篇 光学工程
    • 1,154 篇 化学工程与技术
    • 856 篇 机械工程
    • 849 篇 仪器科学与技术
    • 718 篇 动力工程及工程热...
    • 626 篇 材料科学与工程(可...
    • 618 篇 安全科学与工程
  • 10,809 篇 理学
    • 4,838 篇 数学
    • 3,538 篇 物理学
    • 2,658 篇 生物学
    • 2,021 篇 统计学(可授理学、...
    • 1,250 篇 化学
    • 1,041 篇 地球物理学
    • 872 篇 系统科学
  • 3,972 篇 管理学
    • 2,362 篇 管理科学与工程(可...
    • 1,718 篇 图书情报与档案管...
    • 1,234 篇 工商管理
  • 2,094 篇 医学
    • 1,689 篇 临床医学
    • 1,287 篇 基础医学(可授医学...
    • 783 篇 公共卫生与预防医...
    • 736 篇 药学(可授医学、理...
  • 773 篇 法学
    • 673 篇 社会学
  • 586 篇 经济学
  • 494 篇 农学
  • 264 篇 教育学
  • 72 篇 文学
  • 45 篇 军事学
  • 25 篇 艺术学
  • 4 篇 历史学
  • 3 篇 哲学

主题

  • 841 篇 deep learning
  • 757 篇 accuracy
  • 514 篇 machine learning
  • 465 篇 feature extracti...
  • 433 篇 training
  • 359 篇 predictive model...
  • 348 篇 computational mo...
  • 309 篇 real-time system...
  • 301 篇 convolutional ne...
  • 287 篇 internet of thin...
  • 270 篇 support vector m...
  • 254 篇 data models
  • 246 篇 semantics
  • 235 篇 optimization
  • 231 篇 neural networks
  • 200 篇 big data
  • 197 篇 reinforcement le...
  • 196 篇 image segmentati...
  • 184 篇 reliability
  • 182 篇 data mining

机构

  • 444 篇 university of ch...
  • 430 篇 department of ph...
  • 392 篇 iccub universita...
  • 304 篇 imperial college...
  • 299 篇 physik-institut ...
  • 298 篇 nikhef national ...
  • 297 篇 stfc rutherford ...
  • 291 篇 center for high ...
  • 289 篇 school of physic...
  • 288 篇 cavendish labora...
  • 287 篇 department of ph...
  • 287 篇 institute of par...
  • 287 篇 physikalisches i...
  • 285 篇 school of physic...
  • 285 篇 oliver lodge lab...
  • 285 篇 school of physic...
  • 280 篇 henryk niewodnic...
  • 279 篇 massachusetts in...
  • 279 篇 van swinderen in...
  • 279 篇 departamento de ...

作者

  • 232 篇 beiter a.
  • 219 篇 barter w.
  • 204 篇 bellee v.
  • 194 篇 bowcock t.j.v.
  • 193 篇 casse g.
  • 172 篇 brundu d.
  • 162 篇 blake t.
  • 154 篇 betancourt c.
  • 148 篇 bencivenni g.
  • 147 篇 borsato m.
  • 146 篇 back j.j.
  • 146 篇 bay a.
  • 144 篇 boettcher t.
  • 142 篇 amato s.
  • 142 篇 cattaneo m.
  • 142 篇 albrecht j.
  • 140 篇 bediaga i.
  • 140 篇 braun s.
  • 140 篇 borisyak m.
  • 140 篇 bizzeti a.

语言

  • 22,664 篇 英文
  • 2,476 篇 其他
  • 261 篇 中文
  • 9 篇 法文
  • 8 篇 德文
  • 2 篇 葡萄牙文
  • 2 篇 俄文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 日文
  • 1 篇 朝鲜文
  • 1 篇 荷兰文
  • 1 篇 土耳其文
检索条件"机构=Department of Data Science and Big Data Technology"
25383 条 记 录,以下是31-40 订阅
排序:
Towards Adapting CLIP for Gaze Object Prediction
收藏 引用
Proceedings of the ACM on Human-Computer Interaction 2024年 第ISS期8卷 155-164页
作者: Chen, Dazhi Gou, Gang State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China
This paper aims to investigate the problem of gaze object prediction in single images. We propose an application-friendly network based on CLIP for gaze object prediction. To avoid domain bias, we utilize a shallow fe... 详细信息
来源: 评论
Classification and structural characteristics of amorphous materials based on interpretable deep learning
收藏 引用
Chinese Physics B 2023年 第9期32卷 356-363页
作者: 崔佳梅 李韵洁 赵偲 郑文 Institute of Public Safety and Big Data College of Data ScienceTaiyuan University of TechnologyJinzhong 030600China Shanxi Engineering Research Center for Intelligent Data Assisted Treatment Changzhi Medical CollegeChangzhi 046000China
Defining the structure characteristics of amorphous materials is one of the fundamental problems that need to be solved urgently in complex materials because of their complex structure and long-range *** this study,we... 详细信息
来源: 评论
STPGTN-AMulti-Branch Parameters Identification Method Considering Spatial Constraints and Transient Measurement data
收藏 引用
Computer Modeling in Engineering & sciences 2023年 第9期136卷 2635-2654页
作者: Shuai Zhang Liguo Weng Jiangsu Key Laboratory of Big Data Analysis Technology Nanjing University of Information Science and TechnologyNanjing210044China
Transmission line(TL)Parameter Identification(PI)method plays an essential role in the transmission *** existing PI methods usually have two limitations:(1)These methods only model for single TL,and can not consider t... 详细信息
来源: 评论
A Note of the Interpolating Sequence in Q_(p)∩H^(∞)
收藏 引用
Wuhan University Journal of Natural sciences 2024年 第1期29卷 1-6页
作者: ZHOU Jizhen SUN Hejie School of Mathematics and Big Data Anhui University of Science and TechnologyHuainan 232001AnhuiChina
In this paper,{z_(n)}_(n=1)^(∞)acts as an interpolating sequence for Q_(p)∩H^(∞).An analytic function f is constructed,and f(z_(n))=∑_(j)λ_(j)f_(z_(j))(z_(n))=λ_(n),n=1,2,…for any{λ_(n)}∈l~∞,wheref and{λn}... 详细信息
来源: 评论
Research on one-stop traditional Chinese medicine service system based on character recognition  4
Research on one-stop traditional Chinese medicine service sy...
收藏 引用
4th IEEE International Conference on Information technology, big data and Artificial Intelligence, ICIBA 2024
作者: Wang, Beile Yang, Qingqiu Kong, Huafeng Wuhan Business University Department of Information Engineering Wuhan China Major in Data Science and Big Data Technology China
In recent years, China has introduced numerous policies aimed at fostering the growth of the traditional Chinese medicine (TCM) industry. Concurrently, the enrichment of TCM healthcare resources has s purred an increa... 详细信息
来源: 评论
Enhancing Adversarial Example Transferability via Regularized Constrained Feature Layer
收藏 引用
Computers, Materials & Continua 2025年 第4期83卷 157-175页
作者: Xiaoyin Yi Long Chen Jiacheng Huang Ning Yu Qian Huang School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Chongqing Key Laboratory of Public Big Data Security Technology Chongqing401420China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of EducationChongqing400065China Artificial Intelligence and Big Data College Chongqing Polytechnic University of Electronic TechnologyChongqing401331China
Transfer-based Adversarial Attacks(TAAs)can deceive a victim model even without prior *** is achieved by leveraging the property of adversarial *** is,when generated from a surrogate model,they retain their features i... 详细信息
来源: 评论
A New Modified Nonlinear Conjugate Gradient Method with Sufficient Descent Property for Unconstrained Optimization
收藏 引用
Engineering Letters 2023年 第3期31卷 1036-1044页
作者: Fang, Minglei Wang, Min Ding, Defeng Sheng, Yuting School of Mathematics and Big Data Anhui University of Science and Technology Huainan232001 China
Motivated by some well-known conjugate gradient methods, in this paper, we propose a new hybrid conjugate gradient method for unconstrained optimization. Without any dependence on line search, the new method generates... 详细信息
来源: 评论
Precise control of page cache for containers
收藏 引用
Frontiers of Computer science 2024年 第2期18卷 17-30页
作者: Kun WANG Song WU Shengbang LI Zhuo HUANG Hao FAN Chen YU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China
Container-based virtualization isbecoming increasingly popular in cloud computing due to its efficiency and *** isolation is a fundamental property of *** works have indicated weak resource isolation could cause signi... 详细信息
来源: 评论
Bi-Jordan n-Derivations on Triangular Rings: Maximal Quotient Rings and Faithful Module
收藏 引用
Journal of Mathematical Research with Applications 2024年 第5期44卷 596-616页
作者: Xinfeng LIANG Lingling ZHAO School of Mathematics and Big Data Anhui University of Science and Technology
In this paper, we mainly study the structure of bi-Jordan n-derivations in triangular rings under conditions of maximal quotient rings and faithful bimodules, respectively. It is shown that every bi-Jordan n-derivatio... 详细信息
来源: 评论
Resource investment for DDoS attack resistant SDN: a practical assessment
收藏 引用
science China(Information sciences) 2023年 第7期66卷 112-129页
作者: Bin YUAN Fan ZHANG Jun WAN Huan ZHAO Shui YU Deqing ZOU Qiangsheng HUA Hai JIN School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science University of Technology Sydney
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi... 详细信息
来源: 评论